query_id
stringlengths 32
32
| query
stringlengths 6
2.48k
| positive_passages
listlengths 1
17
| negative_passages
listlengths 10
100
| subset
stringclasses 7
values |
---|---|---|---|---|
091891a7bfc530d874755bd034d1e055 | Interpreting Visual Question Answering Models | [
{
"docid": "56934c400280e56dffbb27e6d06c21b9",
"text": "Training large-scale question answering systems is complicated because training sources usually cover a small portion of the range of possible questions. This paper studies the impact of multitask and transfer learning for simple question answering ; a setting for which the reasoning required to answer is quite easy, as long as one can retrieve the correct evidence given a question, which can be difficult in large-scale conditions. To this end, we introduce a new dataset of 100k questions that we use in conjunction with existing benchmarks. We conduct our study within the framework of Memory Networks (Weston et al., 2015) because this perspective allows us to eventually scale up to more complex reasoning, and show that Memory Networks can be successfully trained to achieve excellent performance .",
"title": ""
}
] | [
{
"docid": "36f960b37e7478d8ce9d41d61195f83a",
"text": "An effective technique in locating a source based on intersections of hyperbolic curves defined by the time differences of arrival of a signal received at a number of sensors is proposed. The approach is noniterative and gives au explicit solution. It is an approximate realization of the maximum-likelihood estimator and is shown to attain the Cramer-Rao lower bound near the small error region. Comparisons of performance with existing techniques of beamformer, sphericat-interpolation, divide and conquer, and iterative Taylor-series methods are made. The proposed technique performs significantly better than sphericalinterpolation, and has a higher noise threshold than divide and conquer before performance breaks away from the Cramer-Rao lower bound. It provides an explicit solution form that is not available in the beamformmg and Taylor-series methods. Computational complexity is comparable to spherical-interpolation but substantially less than the Taylor-series method.",
"title": ""
},
{
"docid": "69561d0f42cf4aae73d4c97c1871739e",
"text": "Recent methods based on 3D skeleton data have achieved outstanding performance due to its conciseness, robustness, and view-independent representation. With the development of deep learning, Convolutional Neural Networks (CNN) and Long Short Term Memory (LSTM)-based learning methods have achieved promising performance for action recognition. However, for CNN-based methods, it is inevitable to loss temporal information when a sequence is encoded into images. In order to capture as much spatial-temporal information as possible, LSTM and CNN are adopted to conduct effective recognition with later score fusion. In addition, experimental results show that the score fusion between CNN and LSTM performs better than that between LSTM and LSTM for the same feature. Our method achieved state-of-the-art results on NTU RGB+D datasets for 3D human action analysis. The proposed method achieved 87.40% in terms of accuracy and ranked 1st place in Large Scale 3D Human Activity Analysis Challenge in Depth Videos.",
"title": ""
},
{
"docid": "c664918193470b20af2ce2ecf0c8e1c7",
"text": "The exceptional electronic properties of graphene, with its charge carriers mimicking relativistic quantum particles and its formidable potential in various applications, have ensured a rapid growth of interest in this new material. We report on electron transport in quantum dot devices carved entirely from graphene. At large sizes (>100 nanometers), they behave as conventional single-electron transistors, exhibiting periodic Coulomb blockade peaks. For quantum dots smaller than 100 nanometers, the peaks become strongly nonperiodic, indicating a major contribution of quantum confinement. Random peak spacing and its statistics are well described by the theory of chaotic neutrino billiards. Short constrictions of only a few nanometers in width remain conductive and reveal a confinement gap of up to 0.5 electron volt, demonstrating the possibility of molecular-scale electronics based on graphene.",
"title": ""
},
{
"docid": "dbda7c4876586773889b7579829a02cb",
"text": "There has been an increase in the amount of multilingual text on the Internet due to the proliferation of news sources and blogs. The Urdu language, in particular, has experienced explosive growth on the Web. Text mining for information discovery, which includes tasks such as identifying topics, relationships and events, and sentiment analysis, requires sophisticated natural language processing (NLP). NLP systems begin with modules such as word segmentation, part-of-speech tagging, and morphological analysis and progress to modules such as shallow parsing and named entity tagging. While there have been considerable advances in developing such comprehensive NLP systems for English, the work for Urdu is still in its infancy. The tasks of interest in Urdu NLP includes analyzing data sources such as blogs and comments to news articles to provide insight into social and human behavior. All of this requires a robust NLP system. The objective of this work is to develop an NLP infrastructure for Urdu that is customizable and capable of providing basic analysis on which more advanced information extraction tools can be built. This system assimilates resources from various online sources to facilitate improved named entity tagging and Urdu-to-English transliteration. The annotated data required to train the learning models used here is acquired by standardizing the currently limited resources available for Urdu. Techniques such as bootstrap learning and resource sharing from a syntactically similar language, Hindi, are explored to augment the available annotated Urdu data. Each of the new Urdu text processing modules has been integrated into a general text-mining platform. The evaluations performed demonstrate that the accuracies have either met or exceeded the state of the art.",
"title": ""
},
{
"docid": "0af3e6e48d3745b7ea52aae25c26fe10",
"text": "MOEA/D is a recently proposed methodology of Multiobjective Evolution Algorithms that decomposes multiobjective problems into a number of scalar subproblems and optimizes them simultaneously. However, classical MOEA/D uses same weight vectors for different shapes of Pareto front. We propose a novel method called Pareto-adaptive weight vectors (paλ) to automatically adjust the weight vectors by the geometrical characteristics of Pareto front. Evaluation on different multiobjective problems confirms that the new algorithm obtains higher hypervolume, better convergence and more evenly distributed solutions than classical MOEA/D and NSGA-II.",
"title": ""
},
{
"docid": "48be442dfe31fbbbefb6fbf0833112fb",
"text": "When documents and queries are presented in different languages, the common approach is to translate the query into the document language. While there are a variety of query translation approaches, recent research suggests that combining multiple methods into a single ”structured query” is the most effective. In this paper, we introduce a novel approach for producing a unique combination recipe for each query, as it has also been shown that the optimal combination weights differ substantially across queries and other task specifics. Our query-specific combination method generates statistically significant improvements over other combination strategies presented in the literature, such as uniform and task-specific weighting. An in-depth empirical analysis presents insights about the effect of data size, domain differences, labeling and tuning on the end performance of our approach.",
"title": ""
},
{
"docid": "63405a3fc4815e869fc872bb96bb8a33",
"text": "We demonstrate how to learn efficient heuristics for automated reasoning algorithms through deep reinforcement learning. We consider search algorithms for quantified Boolean logics, that already can solve formulas of impressive size up to 100s of thousands of variables. The main challenge is to find a representation which lends to making predictions in a scalable way. The heuristics learned through our approach significantly improve over the handwritten heuristics for several sets of formulas.",
"title": ""
},
{
"docid": "4b8f4a8b6c303ea0a20c48840f677ea7",
"text": "PURPOSE/OBJECTIVES\nTo identify subgroups of outpatients with cancer based on their experiences with the symptoms of fatigue, sleep disturbance, depression, and pain; to explore whether patients in the subgroups differed on selected demographic, disease, and treatment characteristics; and to determine whether patients in the subgroups differed on two important patient outcomes: functional status and quality of life (QOL).\n\n\nDESIGN\nDescriptive, correlational study.\n\n\nSETTING\nFour outpatient oncology practices in northern California.\n\n\nSAMPLE\n191 outpatients with cancer receiving active treatment.\n\n\nMETHODS\nPatients completed a demographic questionnaire, Karnofsky Performance Status scale, Lee Fatigue Scale, General Sleep Disturbance Scale, Center for Epidemiological Studies Depression Scale, Multidimensional Quality-of-Life Scale Cancer, and a numeric rating scale of worst pain intensity. Medical records were reviewed for disease and treatment information. Cluster analysis was used to identify patient subgroups based on patients symptom experiences. Differences in demographic, disease, and treatment characteristics as well as in outcomes were evaluated using analysis of variance and chi square analysis.\n\n\nMAIN RESEARCH VARIABLES\nSubgroup membership, fatigue, sleep disturbance, depression, pain, functional status, and QOL.\n\n\nFINDINGS\nFour relatively distinct patient subgroups were identified based on patients experiences with four highly prevalent and related symptoms.\n\n\nCONCLUSIONS\nThe subgroup of patients who reported low levels of all four symptoms reported the best functional status and QOL.\n\n\nIMPLICATIONS FOR NURSING\nThe findings from this study need to be replicated before definitive clinical practice recommendations can be made. Until that time, clinicians need to assess patients for the occurrence of multiple symptoms that may place them at increased risk for poorer outcomes.",
"title": ""
},
{
"docid": "388101f40ff79f2543b111aad96c4180",
"text": "Based on available literature, ecology and economy of light emitting diode (LED) lights in plant foods production were assessed and compared to high pressure sodium (HPS) and compact fluorescent light (CFL) lamps. The assessment summarises that LEDs are superior compared to other lamp types. LEDs are ideal in luminous efficiency, life span and electricity usage. Mercury, carbon dioxide and heat emissions are also lowest in comparison to HPS and CFL lamps. This indicates that LEDs are indeed economic and eco-friendly lighting devices. The present review indicates also that LEDs have many practical benefits compared to other lamp types. In addition, they are applicable in many purposes in plant foods production. The main focus of the review is the targeted use of LEDs in order to enrich phytochemicals in plants. This is an expedient to massive improvement in production efficiency, since it diminishes the number of plants per phytochemical unit. Consequently, any other production costs (e.g. growing space, water, nutrient and transport) may be reduced markedly. Finally, 24 research articles published between 2013 and 2017 were reviewed for targeted use of LEDs in the specific, i.e. blue range (400-500 nm) of spectrum. The articles indicate that blue light is efficient in enhancing the accumulation of health beneficial phytochemicals in various species. The finding is important for global food production. © 2017 Society of Chemical Industry.",
"title": ""
},
{
"docid": "231d7797961326974ca3a3d2271810ae",
"text": "Agile methods form an alternative to waterfall methodologies. Little is known about activity composition, the proportion of varying activities in agile processes and the extent to which the proportions of activities differ from \"waterfall\" processes. In the current study, we examine the variation in per formative routines in one large agile and traditional lifecycle project using an event sequencing method. Our analysis shows that the enactment of waterfall and agile routines differ significantly suggesting that agile process is composed of fewer activities which are repeated iteratively1.",
"title": ""
},
{
"docid": "c61107e9c5213ddb8c5e3b1b14dca661",
"text": "In advanced driving assistance systems, it is important to be able to detect the region covered by the road in the images. This paper proposes a method for estimating the road region in images captured by a vehicle-mounted monocular camera. Our proposed method first estimates all of relevant parameters for the camera motion and the 3D road plane from correspondence points between successive images. By calculating a homography matrix from the estimated camera motion and the estimated road plane parameters, and then warping the image at the previous frame, the road region can be determined. To achieve robustness in various road scenes, our method selects the threshold for determining the road region adaptively and incorporates the assumption of a simple road region boundary. In our experiments, it has been shown that the proposed method is able to estimate the road region in real road environments.",
"title": ""
},
{
"docid": "a861082476893281800441c46e71d652",
"text": "Current debates on design research, and its relation to other research fields and scientific disciplines, refer back to a fundamental distinction introduced by Herb Simon (Simon, 1996 (1981)): Design and design research do not primarily focus on explaining the world as it is; they share with engineering a fundamental interest in focusing on the world as it could be. In parallel, we observe a growing interest in the science studies to interpret scientific research as a constructive and creative practice (Knorr Cetina, 1999; 2002), organized as experimental systems (Rheinberger, 2001). Design fiction is a new approach, which integrates these two perspectives, in order to develop a method toolbox for design research for a complex world (Bleecker, 2009; Wiedmer & Caviezel, 2009; Grand 2010).",
"title": ""
},
{
"docid": "fc3b45bf5fa1843d7284103e37326b71",
"text": "The N-terminal cleavage product of human insulin-like growth factor-1 (IGF-1) in the brain is the tripeptide molecule Glypromate (Gly-Pro-Glu). Glypromate has demonstrated neuroprotective effects in numerous in vitro and in vivo models of brain injury and is in clinical trials for the prevention of cognitive impairment following cardiac surgery. NNZ-2566 is a structural analogue of Glypromate, resulting from alpha-methylation of the proline moiety, which has improved the elimination half-life and oral bioavailability over the parent peptide. In vivo, NNZ-2566 reduces injury size in rats subjected to focal stroke. An intravenous infusion of NNZ-2566 of 4 h duration (3-10 mg/kg/h), initiated 3 h after endothelin-induced middle-cerebral artery constriction, significantly reduced infarct area as assessed on day 5. Neuroprotective efficacy in the MCAO model was also observed following oral administration of the drug (30-60 mg/kg), when formulated as a microemulsion. In vitro, NNZ-2566 significantly attenuates apoptotic cell death in primary striatal cultures, suggesting attenuation of apoptosis is one mechanism of action underlying its neuroprotective effects. NNZ-2566 is currently in clinical trials for the treatment of cognitive deficits following traumatic brain injury, and these data further support the development of the drug as a neuroprotective agent for acute brain injury.",
"title": ""
},
{
"docid": "26f2e3918eb624ce346673d10b5d2eb7",
"text": "We consider generation and comprehension of natural language referring expression for objects in an image. Unlike generic image captioning which lacks natural standard evaluation criteria, quality of a referring expression may be measured by the receivers ability to correctly infer which object is being described. Following this intuition, we propose two approaches to utilize models trained for comprehension task to generate better expressions. First, we use a comprehension module trained on human-generated expressions, as a critic of referring expression generator. The comprehension module serves as a differentiable proxy of human evaluation, providing training signal to the generation module. Second, we use the comprehension model in a generate-and-rerank pipeline, which chooses from candidate expressions generated by a model according to their performance on the comprehension task. We show that both approaches lead to improved referring expression generation on multiple benchmark datasets.",
"title": ""
},
{
"docid": "f162ca10328e222567d33ac4920a2c94",
"text": "We live in a digital world where every detail of our information is being transferred from one smart device to another via cross-platform, third-party cloud services. Smart technologies, such as, smartphones are playing dynamic roles in order to successfully complete our daily routines and official tasks that require access to all types of critical data. Before the advent of these smart technologies, securing critical information was quite a challenge. However, after the advent and global adoption of such technologies, information security has become one of the primary and most fundamental task for security professionals. The integration of social media has made this task even more challenging to undertake successfully. To this day, there are plentiful studies in which numerous authentication and security techniques were proposed and developed for smartphone and cloud computing technologies. These studies have successfully addressed multiple authentication threats and other related issues in existing the smartphone and cloud computing technologies. However, to the best of our understanding and knowledge, these studies lack many aspects in terms of authentication attacks, logical authentication analysis, and the absence of authentication implementation scenarios. Due to these authentication anomalies and ambiguities, such studies cannot be fully considered for successful implementation. Therefore, in this paper, we have performed a comprehensive security analysis and review of various smartphone and cloud computing authentication frameworks and protocols to outline up-to-date authentication threats and issues in the literature. These authentication challenges are further summarized and presented in the form of different graphs to illustrate where the research is currently heading. Finally, based on those outcomes, we identify the latest and existing authentication uncertainties, threats, and other related issues to address future directions and open research issues in the domain of the smartphone-and cloud-computing authentication.",
"title": ""
},
{
"docid": "0b22d7708437c47d5e83ea9fc5f24406",
"text": "The American Association for Respiratory Care has declared a benchmark for competency in mechanical ventilation that includes the ability to \"apply to practice all ventilation modes currently available on all invasive and noninvasive mechanical ventilators.\" This level of competency presupposes the ability to identify, classify, compare, and contrast all modes of ventilation. Unfortunately, current educational paradigms do not supply the tools to achieve such goals. To fill this gap, we expand and refine a previously described taxonomy for classifying modes of ventilation and explain how it can be understood in terms of 10 fundamental constructs of ventilator technology: (1) defining a breath, (2) defining an assisted breath, (3) specifying the means of assisting breaths based on control variables specified by the equation of motion, (4) classifying breaths in terms of how inspiration is started and stopped, (5) identifying ventilator-initiated versus patient-initiated start and stop events, (6) defining spontaneous and mandatory breaths, (7) defining breath sequences (8), combining control variables and breath sequences into ventilatory patterns, (9) describing targeting schemes, and (10) constructing a formal taxonomy for modes of ventilation composed of control variable, breath sequence, and targeting schemes. Having established the theoretical basis of the taxonomy, we demonstrate a step-by-step procedure to classify any mode on any mechanical ventilator.",
"title": ""
},
{
"docid": "b18c8b7472ba03a260d63b886a6dc11d",
"text": "In this paper, we propose a novel technique for automatic table detection in document images. Lines and tables are among the most frequent graphic, non-textual entities in documents and their detection is directly related to the OCR performance as well as to the document layout description. We propose a workflow for table detection that comprises three distinct steps: (i) image pre-processing; (ii) horizontal and vertical line detection and (iii) table detection. The efficiency of the proposed method is demonstrated by using a performance evaluation scheme which considers a great variety of documents such as forms, newspapers/magazines, scientific journals, tickets/bank cheques, certificates and handwritten documents.",
"title": ""
},
{
"docid": "b261534c045299c1c3a0e0cc37caa618",
"text": "Michelangelo (1475-1564) had a life-long interest in anatomy that began with his participation in public dissections in his early teens, when he joined the court of Lorenzo de' Medici and was exposed to its physician-philosopher members. By the age of 18, he began to perform his own dissections. His early anatomic interests were revived later in life when he aspired to publish a book on anatomy for artists and to collaborate in the illustration of a medical anatomy text that was being prepared by the Paduan anatomist Realdo Colombo (1516-1559). His relationship with Colombo likely began when Colombo diagnosed and treated him for nephrolithiasis in 1549. He seems to have developed gouty arthritis in 1555, making the possibility of uric acid stones a distinct probability. Recurrent urinary stones until the end of his life are well documented in his correspondence, and available documents imply that he may have suffered from nephrolithiasis earlier in life. His terminal illness with symptoms of fluid overload suggests that he may have sustained obstructive nephropathy. That this may account for his interest in kidney function is evident in his poetry and drawings. Most impressive in this regard is the mantle of the Creator in his painting of the Separation of Land and Water in the Sistine Ceiling, which is in the shape of a bisected right kidney. His use of the renal outline in a scene representing the separation of solids (Land) from liquid (Water) suggests that Michelangelo was likely familiar with the anatomy and function of the kidney as it was understood at the time.",
"title": ""
},
{
"docid": "851a966bbfee843e5ae1eaf21482ef87",
"text": "The Pittsburgh Sleep Quality Index (PSQI) is a widely used measure of sleep quality in adolescents, but information regarding its psychometric strengths and weaknesses in this population is limited. In particular, questions remain regarding whether it measures one or two sleep quality domains. The aims of the present study were to (a) adapt the PSQI for use in adolescents and young adults, and (b) evaluate the psychometric properties of the adapted measure in this population. The PSQI was slightly modified to make it more appropriate for use in youth populations and was translated into Spanish for administration to the sample population available to the study investigators. It was then administered with validity criterion measures to a community-based sample of Spanish adolescents and young adults (AYA) between 14 and 24 years old (N = 216). The results indicated that the questionnaire (AYA-PSQI-S) assesses a single factor. The total score evidenced good convergent and divergent validity and moderate reliability (Cronbach's alpha = .72). The AYA-PSQI-S demonstrates adequate psychometric properties for use in clinical trials involving adolescents and young adults. Additional research to further evaluate the reliability and validity of the measure for use in clinical settings is warranted.",
"title": ""
}
] | scidocsrr |
1d1c6ddf68518be598efebfa4b7c63ca | A Learning-based Framework for Hybrid Depth-from-Defocus and Stereo Matching | [
{
"docid": "4421a42fc5589a9b91215b68e1575a3f",
"text": "We present a method for extracting depth information from a rectified image pair. Our approach focuses on the first stage of many stereo algorithms: the matching cost computation. We approach the problem by learning a similarity measure on small image patches using a convolutional neural network. Training is carried out in a supervised manner by constructing a binary classification data set with examples of similar and dissimilar pairs of patches. We examine two network architectures for this task: one tuned for speed, the other for accuracy. The output of the convolutional neural network is used to initialize the stereo matching cost. A series of post-processing steps follow: cross-based cost aggregation, semiglobal matching, a left-right consistency check, subpixel enhancement, a median filter, and a bilateral filter. We evaluate our method on the KITTI 2012, KITTI 2015, and Middlebury stereo data sets and show that it outperforms other approaches on all three data sets.",
"title": ""
}
] | [
{
"docid": "f267f44fe9463ac0114335959f9739fa",
"text": "HTTP Adaptive Streaming (HAS) is today the number one video technology for over-the-top video distribution. In HAS, video content is temporally divided into multiple segments and encoded at different quality levels. A client selects and retrieves per segment the most suited quality version to create a seamless playout. Despite the ability of HAS to deal with changing network conditions, HAS-based live streaming often suffers from freezes in the playout due to buffer under-run, low average quality, large camera-to-display delay, and large initial/channel-change delay. Recently, IETF has standardized HTTP/2, a new version of the HTTP protocol that provides new features for reducing the page load time in Web browsing. In this paper, we present ten novel HTTP/2-based methods to improve the quality of experience of HAS. Our main contribution is the design and evaluation of a push-based approach for live streaming in which super-short segments are pushed from server to client as soon as they become available. We show that with an RTT of 300 ms, this approach can reduce the average server-to-display delay by 90.1% and the average start-up delay by 40.1%.",
"title": ""
},
{
"docid": "81b24cc33a54dcd6ca4af6264ad24a9a",
"text": "In many envisioned drone-based applications, drones will communicate with many different smart objects, such as sensors and embedded devices. Securing such communications requires an effective and efficient encryption key establishment protocol. However, the design of such a protocol must take into account constrained resources of smart objects and the mobility of drones. In this paper, a secure communication protocol between drones and smart objects is presented. To support the required security functions, such as authenticated key agreement, non-repudiation, and user revocation, we propose an efficient Certificateless Signcryption Tag Key Encapsulation Mechanism (eCLSC-TKEM). eCLSC-TKEM reduces the time required to establish a shared key between a drone and a smart object by minimizing the computational overhead at the smart object. Also, our protocol improves drone's efficiency by utilizing dual channels which allows many smart objects to concurrently execute eCLSC-TKEM. We evaluate our protocol on commercially available devices, namely AR.Drone2.0 and TelosB, by using a parking management testbed. Our experimental results show that our protocol is much more efficient than other protocols.",
"title": ""
},
{
"docid": "b4c8a34f9bda4b232d73ee7eafb30f88",
"text": "Bargaining with reading habit is no need. Reading is not kind of something sold that you can take or not. It is a thing that will change your life to life better. It is the thing that will give you many things around the world and this universe, in the real world and here after. As what will be given by this artificial intelligence a new synthesis, how can you bargain with the thing that has many benefits for you?",
"title": ""
},
{
"docid": "4a2fcdf5394e220a579d1414588a124a",
"text": "In this paper we introduce AR Scratch, the first augmented-reality (AR) authoring environment designed for children. By adding augmented-reality functionality to the Scratch programming platform, this environment allows pre-teens to create programs that mix real and virtual spaces. Children can display virtual objects on a real-world space seen through a camera, and they can control the virtual world through interactions between physical objects. This paper describes the system design process, which focused on appropriately presenting the AR technology to the typical Scratch population (children aged 8-12), as influenced by knowledge of child spatial cognition, programming expertise, and interaction metaphors. Evaluation of this environment is proposed, accompanied by results from an initial pilot study, as well as discussion of foreseeable impacts on the Scratch user community.",
"title": ""
},
{
"docid": "65e273d046a8120532d8cd04bcadca56",
"text": "This paper explores the relationship between domain scheduling in avirtual machine monitor (VMM) and I/O performance. Traditionally, VMM schedulers have focused on fairly sharing the processor resources among domains while leaving the scheduling of I/O resources as asecondary concern. However, this can resultin poor and/or unpredictable application performance, making virtualization less desirable for applications that require efficient and consistent I/O behavior.\n This paper is the first to study the impact of the VMM scheduler on performance using multiple guest domains concurrently running different types of applications. In particular, different combinations of processor-intensive, bandwidth-intensive, andlatency-sensitive applications are run concurrently to quantify the impacts of different scheduler configurations on processor and I/O performance. These applications are evaluated on 11 different scheduler configurations within the Xen VMM. These configurations include a variety of scheduler extensions aimed at improving I/O performance. This cross product of scheduler configurations and application types offers insight into the key problems in VMM scheduling for I/O and motivates future innovation in this area.",
"title": ""
},
{
"docid": "6cd4ed54497e30aba681b1e2bc79d29c",
"text": "Industrial systems consider only partially security, mostly relying on the basis of “isolated” networks, and controlled access environments. Monitoring and control systems such as SCADA/DCS are responsible for managing critical infrastructures operate in these environments, where a false sense of security assumptions is usually made. The Stuxnet worm attack demonstrated widely in mid 2010 that many of the security assumptions made about the operating environment, technological capabilities and potential threat risk analysis are far away from the reality and challenges modern industrial systems face. We investigate in this work the highly sophisticated aspects of Stuxnet, the impact that it may have on existing security considerations and pose some thoughts on the next generation SCADA/DCS systems from a security perspective.",
"title": ""
},
{
"docid": "47a87a903c4a8ef650fdbf670fca8568",
"text": "Social networks are a popular movement on the web. On the Semantic Web, it is simple to make trust annotations to social relationships. In this paper, we present a two level approach to integrating trust, provenance, and annotations in Semantic Web systems. We describe an algorithm for inferring trust relationships using provenance information and trust annotations in Semantic Web-based social networks. Then, we present an application, FilmTrust, that combines the computed trust values with the provenance of other annotations to personalize the website. The FilmTrust system uses trust to compute personalized recommended movie ratings and to order reviews. We believe that the results obtained with FilmTrust illustrate the success that can be achieved using this method of combining trust and provenance on the Semantic Web.",
"title": ""
},
{
"docid": "21042ce5670109dd548e43ca46cacbfd",
"text": "The CRISPR/Cas adaptive immune system provides resistance against phages and plasmids in Archaea and Bacteria. CRISPR loci integrate short DNA sequences from invading genetic elements that provide small RNA-mediated interference in subsequent exposure to matching nucleic acids. In Streptococcus thermophilus, it was previously shown that the CRISPR1/Cas system can provide adaptive immunity against phages and plasmids by integrating novel spacers following exposure to these foreign genetic elements that subsequently direct the specific cleavage of invasive homologous DNA sequences. Here, we show that the S. thermophilus CRISPR3/Cas system can be transferred into Escherichia coli and provide heterologous protection against plasmid transformation and phage infection. We show that interference is sequence-specific, and that mutations in the vicinity or within the proto-spacer adjacent motif (PAM) allow plasmids to escape CRISPR-encoded immunity. We also establish that cas9 is the sole cas gene necessary for CRISPR-encoded interference. Furthermore, mutation analysis revealed that interference relies on the Cas9 McrA/HNH- and RuvC/RNaseH-motifs. Altogether, our results show that active CRISPR/Cas systems can be transferred across distant genera and provide heterologous interference against invasive nucleic acids. This can be leveraged to develop strains more robust against phage attack, and safer organisms less likely to uptake and disseminate plasmid-encoded undesirable genetic elements.",
"title": ""
},
{
"docid": "6eb1730f03265d09db40bbda8c71c2cd",
"text": "In this opinion piece, we argue that there is a need for alternative design directions to complement existing AI efforts in narrative and character generation and algorithm development. To make our argument, we a) outline the predominant roles and goals of AI research in storytelling; b) present existing discourse on the benefits and harms of narratives; and c) highlight the pain points in character creation revealed by semi-structured interviews we conducted with 14 individuals deeply involved in some form of character creation. We conclude by proffering several specific design avenues that we believe can seed fruitful research collaborations. In our vision, AI collaborates with humans during creative processes and narrative generation, helps amplify voices and perspectives that are currently marginalized or misrepresented, and engenders experiences of narrative that support spectatorship and listening roles.",
"title": ""
},
{
"docid": "56444dce712e313c0c014a260f97a6b3",
"text": "Ecology and historical (phylogeny-based) biogeography have much to offer one another, but exchanges between these fields have been limited. Historical biogeography has become narrowly focused on using phylogenies to discover the history of geological connections among regions. Conversely, ecologists often ignore historical biogeography, even when its input can be crucial. Both historical biogeographers and ecologists have more-or-less abandoned attempts to understand the processes that determine the large-scale distribution of clades. Here, we describe the chasm that has developed between ecology and historical biogeography, some of the important questions that have fallen into it and how it might be bridged. To illustrate the benefits of an integrated approach, we expand on a model that can help explain the latitudinal gradient of species richness.",
"title": ""
},
{
"docid": "7917c6d9a9d495190e5b7036db92d46d",
"text": "Background A precise understanding of the anatomical structures of the heart and great vessels is essential for surgical planning in order to avoid unexpected findings. Rapid prototyping techniques are used to print three-dimensional (3D) replicas of patients’ cardiovascular anatomy based on 3D clinical images such as MRI. The purpose of this study is to explore the use of 3D patient-specific cardiovascular models using rapid prototyping techniques to improve surgical planning in patients with complex congenital heart disease.",
"title": ""
},
{
"docid": "9eee385499bfb25dd728dde7dfdc7951",
"text": "Unsupervised video segmentation plays an important role in a wide variety of applications from object identification to compression. However, to date, fast motion, motion blur and occlusions pose significant challenges. To address these challenges for unsupervised video segmentation, we develop a novel saliency estimation technique as well as a novel neighborhood graph, based on optical flow and edge cues. Our approach leads to significantly better initial foreground-background estimates and their robust as well as accurate diffusion across time. We evaluate our proposed algorithm on the challenging DAVIS, SegTrack v2 and FBMS-59 datasets. Despite the usage of only a standard edge detector trained on 200 images, our method achieves state-of-the-art results outperforming deep learning based methods in the unsupervised setting. We even demonstrate competitive results comparable to deep learning based methods in the semi-supervised setting on the DAVIS dataset.",
"title": ""
},
{
"docid": "cf54533bc317b960fc80f22baa26d7b1",
"text": "The state-of-the-art named entity recognition (NER) systems are statistical machine learning models that have strong generalization capability (i.e., can recognize unseen entities that do not appear in training data) based on lexical and contextual information. However, such a model could still make mistakes if its features favor a wrong entity type. In this paper, we utilize Wikipedia as an open knowledge base to improve multilingual NER systems. Central to our approach is the construction of high-accuracy, highcoverage multilingual Wikipedia entity type mappings. These mappings are built from weakly annotated data and can be extended to new languages with no human annotation or language-dependent knowledge involved. Based on these mappings, we develop several approaches to improve an NER system. We evaluate the performance of the approaches via experiments on NER systems trained for 6 languages. Experimental results show that the proposed approaches are effective in improving the accuracy of such systems on unseen entities, especially when a system is applied to a new domain or it is trained with little training data (up to 18.3 F1 score improvement).",
"title": ""
},
{
"docid": "62166980f94bba5e75c9c6ad4a4348f1",
"text": "In this paper the design and the implementation of a linear, non-uniform antenna array for a 77-GHz MIMO FMCW system that allows for the estimation of both the distance and the angular position of a target are presented. The goal is to achieve a good trade-off between the main beam width and the side lobe level. The non-uniform spacing in addition with the MIMO principle offers a superior performance compared to a classical uniform half-wavelength antenna array with an equal number of elements. However the design becomes more complicated and can not be tackled using analytical methods. Starting with elementary array factor considerations the design is approached using brute force, stepwise brute force, and particle swarm optimization. The particle swarm optimized array was also implemented. Simulation results and measurements are presented and discussed.",
"title": ""
},
{
"docid": "30d0ff3258decd5766d121bf97ae06d4",
"text": "In this paper, we present a new image forgery detection method based on deep learning technique, which utilizes a convolutional neural network (CNN) to automatically learn hierarchical representations from the input RGB color images. The proposed CNN is specifically designed for image splicing and copy-move detection applications. Rather than a random strategy, the weights at the first layer of our network are initialized with the basic high-pass filter set used in calculation of residual maps in spatial rich model (SRM), which serves as a regularizer to efficiently suppress the effect of image contents and capture the subtle artifacts introduced by the tampering operations. The pre-trained CNN is used as patch descriptor to extract dense features from the test images, and a feature fusion technique is then explored to obtain the final discriminative features for SVM classification. The experimental results on several public datasets show that the proposed CNN based model outperforms some state-of-the-art methods.",
"title": ""
},
{
"docid": "ab572c22a75656c19e50b311eb4985ec",
"text": "With the increasingly complex electromagnetic environment of communication, as well as the gradually increased radar signal types, how to effectively identify the types of radar signals at low SNR becomes a hot topic. A radar signal recognition algorithm based on entropy features, which describes the distribution characteristics for different types of radar signals by extracting Shannon entropy, Singular spectrum Shannon entropy and Singular spectrum index entropy features, was proposed to achieve the purpose of signal identification. Simulation results show that, the algorithm based on entropies has good anti-noise performance, and it can still describe the characteristics of signals well even at low SNR, which can achieve the purpose of identification and classification for different radar signals.",
"title": ""
},
{
"docid": "8a92594dbd75885002bad0dc2e658e10",
"text": "Exposure to some music, in particular classical music, has been reported to produce transient increases in cognitive performance. The authors investigated the effect of listening to an excerpt of Vivaldi's Four Seasons on category fluency in healthy older adult controls and Alzheimer's disease patients. In a counterbalanced repeated-measure design, participants completed two, 1-min category fluency tasks whilst listening to an excerpt of Vivaldi and two, 1-min category fluency tasks without music. The authors report a positive effect of music on category fluency, with performance in the music condition exceeding performance without music in both the healthy older adult control participants and the Alzheimer's disease patients. In keeping with previous reports, the authors conclude that music enhances attentional processes, and that this can be demonstrated in Alzheimer's disease.",
"title": ""
},
{
"docid": "a8785a543b30082141df4956838b956a",
"text": "Covalent organic frameworks (COFs) are newly emerged crystalline porous polymers with well-defined skeletons and nanopores mainly consisted of light-weight elements (H, B, C, N and O) linked by dynamic covalent bonds. Compared with conventional materials, COFs possess some unique and attractive features, such as large surface area, pre-designable pore geometry, excellent crystallinity, inherent adaptability and high flexibility in structural and functional design, thus exhibiting great potential for various applications. Especially, their large surface area and tunable porosity and π conjugation with unique photoelectric properties will enable COFs to serve as a promising platform for drug delivery, bioimaging, biosensing and theranostic applications. In this review, we trace the evolution of COFs in terms of linkages and highlight the important issues on synthetic method, structural design, morphological control and functionalization. And then we summarize the recent advances of COFs in the biomedical and pharmaceutical sectors and conclude with a discussion of the challenges and opportunities of COFs for biomedical purposes. Although currently still at its infancy stage, COFs as an innovative source have paved a new way to meet future challenges in human healthcare and disease theranostic.",
"title": ""
},
{
"docid": "80563d90bfdccd97d9da0f7276468a43",
"text": "An essential aspect of knowing language is knowing the words of that language. This knowledge is usually thought to reside in the mental lexicon, a kind of dictionary that contains information regarding a word's meaning, pronunciation, syntactic characteristics, and so on. In this article, a very different view is presented. In this view, words are understood as stimuli that operate directly on mental states. The phonological, syntactic and semantic properties of a word are revealed by the effects it has on those states.",
"title": ""
},
{
"docid": "8869e69647a16278d7a2ac26316ec5d0",
"text": "Despite significant progress, most existing visual dictionary learning methods rely on image descriptors alone or together with class labels. However, Web images are often associated with text data which may carry substantial information regarding image semantics, and may be exploited for visual dictionary learning. This paper explores this idea by leveraging relational information between image descriptors and textual words via co-clustering, in addition to information of image descriptors. Existing co-clustering methods are not optimal for this problem because they ignore the structure of image descriptors in the continuous space, which is crucial for capturing visual characteristics of images. We propose a novel Bayesian co-clustering model to jointly estimate the underlying distributions of the continuous image descriptors as well as the relationship between such distributions and the textual words through a unified Bayesian inference. Extensive experiments on image categorization and retrieval have validated the substantial value of the proposed joint modeling in improving visual dictionary learning, where our model shows superior performance over several recent methods.",
"title": ""
}
] | scidocsrr |
a5bb2e5e82d446b9c2ecfd4f8958eba2 | A Scalable Compact Wideband Dual-Polarized Printed Dipole Antenna for Base Station Applications | [
{
"docid": "8be94cf3744cf18e29c4f41b727cc08a",
"text": "A printed dipole with an integrated balun features a broad operating bandwidth. The feed point of conventional balun structures is fixed at the top of the integrated balun, which makes it difficult to match to a 50-Omega feed. In this communication, we demonstrate that it is possible to directly match with the 50-Omega feed by adjusting the position of the feed point of the integrated balun. The printed dipole with the hereby presented adjustable integrated balun maintains the broadband performance and exhibits flexibility for the matching to different impedance values, which is extremely important for the design of antenna arrays since the mutual coupling between antenna elements commonly changes the input impedance of each single element. An equivalent-circuit analysis is presented for the understanding of the mechanism of the impedance match. An eight-element linear antenna array is designed as a benchmarking topology for broadband wireless base stations.",
"title": ""
},
{
"docid": "429c6591223007b40ef7bffc5d9ac4db",
"text": "A compact dual-polarized double E-shaped patch antenna with high isolation for pico base station applications is presented in this communication. The proposed antenna employs a stacked configuration composed of two layers of substrate. Two modified E-shaped patches are printed orthogonally on both sides of the upper substrate. Two probes are used to excite the E-shaped patches, and each probe is connected to one patch separately. A circular patch is printed on the lower substrate to broaden the impedance bandwidth. Both simulated and measured results show that the proposed antenna has a port isolation higher than 30 dB over the frequency band of 2.5 GHz - 2.7 GHz, while the return loss is less than - 15 dB within the band. Moreover, stable radiation pattern with a peak gain of 6.8 dBi - 7.4 dBi is obtained within the band.",
"title": ""
},
{
"docid": "2939f23334ab58a1e1e3fed766ef205b",
"text": "We demonstrate a dual-polarization slot antenna for indoor small-cell multiple-input-multiple-output (MIMO) systems. The symmetric structure and differential feeding promotes destructive interference of cross-polarized radiation in the far field to achieve high cross-polarization discrimination (XPD) in all directions. In addition, a very similar radiation pattern is observed not only between the major planes of each polarization but also between the two polarization orientations. Therefore, the proposed antenna can be considered as a stronger candidate for indoor small-cell MIMO systems. With an average XPD of 26.4 dB in all directions, the 3-D ray-tracing simulation results show a more than 22% increase in the system throughput compared to previous dual-polarization antennas for a single-user MIMO system in a typical indoor environment.",
"title": ""
},
{
"docid": "a1554514d8288ba569608659fa93ab03",
"text": "Smart antennas have received increasing interest for mitigating interference in the multiple-input-multiple-output (MIMO) wireless local area network (WLAN). In this paper, a dual-band dual-polarized compact bowtie dipole antenna array is proposed to support anti-interference MIMO WLAN applications. In the antenna array, there are 12 antennas, six for horizontal polarization and six for vertical polarization. In order to achieve dual linear polarizations and beam switching, six horizontal antennas are placed in a sequential, rotating arrangement on a horizontal substrate panel with an equal inclination angle of 60 ° to form a symmetrical structure, while the other six antennas for vertical polarization are inserted through slots made on the horizontal substrate panel. Furthermore, six pairs of meandered slits are introduced to reduce the mutual coupling between horizontal antennas in the lower band. A prototype of the array with a dimension of 150 × 150 × 60 mm3 is manufactured and exhibits the characteristics of high isolation, good front-to-back ratio, and average gains of 4.5 and 5 dBi over the 2.4- and 5-GHz band, respectively. The MIMO performance of the array is analyzed and evaluated by mutual coupling, the total active reflection coefficient (TARC) and the envelope correlation coefficient. The anti-interference capability of the array is also investigated by the experiment.",
"title": ""
}
] | [
{
"docid": "46639d24ffb635490f75c715236673c4",
"text": "-We show that standard multilayer feedfbrward networks with as few as a single hidden layer and arbitrary bounded and nonconstant activation function are universal approximators with respect to LP(lt) performance criteria, for arbitrary finite input environment measures p, provided only that sufficiently many hidden units are available. If the activation function is continuous, bounded and nonconstant, then continuous mappings can be learned uniformly over compact input sets. We also give very general conditions ensuring that networks with sufficiently smooth activation functions are capable of arbitrarily accurate approximation to a_Function and its derivatives. Keywords--Multilayer feedforward networks, Activation function, Universal approximation capabilities, Input environment measure, D'(p) approximation, Uniform approximation, Sobolev spaces, Smooth approximation. 1. I N T R O D U C T I O N The approximation capabilities of neural network architectures have recently been investigated by many authors, including Carroll and Dickinson (1989), Cybenko (1989), Funahashi (1989), Gallant and White (1988), Hecht-Nielsen (1989), Hornik, Stinchcombe, and White (1989, 1990), lrie and Miyake (1988), Lapedes and Farber (1988), Stinchcombe and White (1989, 1990). (This list is by no means complete.) If we think of the network architecture as a rule for computing values at l output units given values at k input units, hence implementing a class of mappings from R k to R ~, we can ask how well arbitrary mappings from R k to R t can be approximated by the network, in particular, if as many hidden units as required for internal representation and computation may be employed. How to measure the accuracy of approximation depends on how we measure closeness between functions, which in turn varies significantly with the specific problem to be dealt with. In many applications, it is necessary to have the network perform simultaneously well on all input samples taken from some compact input set X in R k. In this case, closeness is Requests for reprints should be sent to Kurt Hornik, Institut fur Statistik und Wahrscheinlichkeitstheorie, Technische Universit/~t Wien, Wiedner Hauptstral3e 8-10/107, A-1040 Wien, Austria. measured by the uniform distance between functions on X, that is, P~,.x(f, g) = sup If(x) g(x) i. In other applications, we think of the inputs as random variables and are interested in the average performance where the average is taken with respect to the input environment measure/2, where p(R k) < ~. In this case, closeness is measured by the LP(p) distances Pp.~,(f, g) = [fRk [f(x) -g(x)l\" dl~(X)] 'p, 1 -< p < 0o, the most popular choice being p --2, corresponding to mean square error. Of course, there are many more ways of measuring closeness of functions. In particular, in many applications, it is also necessary that the derivatives of the approximating function implemented by the network closely resemble those of the function to be approximated, up to some order. This issue was first taken up in Hornik et al. (1990), who discuss the sources of need of smooth functional approximation in more detail. Typical examples arise in robotics (learning of smooth movements) and signal processing (analysis of chaotic time series); for a recent application to problems of nonparametric inference in statistics and econometrics, see Gallant and White (1989). All papers establishing certain approximation ca-",
"title": ""
},
{
"docid": "e84e27610c27b5880977aca20d04dba3",
"text": "Automatic bug fixing has become a promising direction for reducing manual effort in debugging. However, general approaches to automatic bug fixing may face some fundamental difficulties. In this paper, we argue that automatic fixing of specific types of bugs can be a useful complement.\n This paper reports our first attempt towards automatically fixing memory leaks in C programs. Our approach generates only safe fixes, which are guaranteed not to interrupt normal execution of the program. To design such an approach, we have to deal with several challenging problems such as inter-procedural leaks, global variables, loops, and leaks from multiple allocations. We propose solutions to all the problems and integrate the solutions into a coherent approach.\n We implemented our inter-procedural memory leak fixing into a tool named LeakFix and evaluated LeakFix on 15 programs with 522k lines of code. Our evaluation shows that LeakFix is able to successfully fix a substantial number of memory leaks, and LeakFix is scalable for large applications.",
"title": ""
},
{
"docid": "1202e46fcc6c2f88b81fcf153ed4fd7d",
"text": "Recently, several high dimensional classification methods have been proposed to automatically discriminate between patients with Alzheimer's disease (AD) or mild cognitive impairment (MCI) and elderly controls (CN) based on T1-weighted MRI. However, these methods were assessed on different populations, making it difficult to compare their performance. In this paper, we evaluated the performance of ten approaches (five voxel-based methods, three methods based on cortical thickness and two methods based on the hippocampus) using 509 subjects from the ADNI database. Three classification experiments were performed: CN vs AD, CN vs MCIc (MCI who had converted to AD within 18 months, MCI converters - MCIc) and MCIc vs MCInc (MCI who had not converted to AD within 18 months, MCI non-converters - MCInc). Data from 81 CN, 67 MCInc, 39 MCIc and 69 AD were used for training and hyperparameters optimization. The remaining independent samples of 81 CN, 67 MCInc, 37 MCIc and 68 AD were used to obtain an unbiased estimate of the performance of the methods. For AD vs CN, whole-brain methods (voxel-based or cortical thickness-based) achieved high accuracies (up to 81% sensitivity and 95% specificity). For the detection of prodromal AD (CN vs MCIc), the sensitivity was substantially lower. For the prediction of conversion, no classifier obtained significantly better results than chance. We also compared the results obtained using the DARTEL registration to that using SPM5 unified segmentation. DARTEL significantly improved six out of 20 classification experiments and led to lower results in only two cases. Overall, the use of feature selection did not improve the performance but substantially increased the computation times.",
"title": ""
},
{
"docid": "b325f262a6f84637c8a175c29f07db34",
"text": "The aim of this article is to present a synthetic overview of the state of knowledge regarding the Celtic cultures in the northwestern Iberian Peninsula. It reviews the difficulties linked to the fact that linguists and archaeologists do not agree on this subject, and that the hegemonic view rejects the possibility that these populations can be considered Celtic. On the other hand, the examination of a range of direct sources of evidence, including literary and epigraphic texts, and the application of the method of historical anthropology to the available data, demonstrate the validity of the consideration of Celtic culture in this region, which can be described as a protohistorical society of the Late Iron Age, exhibiting a hierarchical organization based on ritually chosen chiefs whose power was based in part on economic redistribution of resources, together with a priestly elite more or less of the druidic type. However, the method applied cannot on its own answer the questions of when and how this Celtic cultural dimension of the proto-history of the northwestern Iberian Peninsula developed.",
"title": ""
},
{
"docid": "fb7181d8e6aba6d43201ea08b945180d",
"text": "In this paper, a single-stage solution for solar photovoltaic (PV) pumping system using a dual-inverter fed open-end winding induction motor drive is presented. The three-level dual-inverter requires a low PV bus voltage compared with its conventional three-level counterpart. This could avoid large string of PV modules and helps in reducing the voltage rating of the capacitors and semiconductor devices used in the system. This may further help in reduction of cost of the system. The proposed single-stage system is operated using an integrated control algorithm, which includes the maximum power point tracking (MPPT), the V/f control, and the sample-averaged zero-sequence elimination (SAZE) pulsewidth modulation (PWM) technique. While the MPPT algorithm ensures the extraction of maximum power from the PV source, the V/f control improves the motor pump performance. Furthermore, the zero-sequence current is avoided by the SAZE PWM algorithm. Thus, the integrated control algorithm improves the overall performance of the system. Furthermore, this paper also presents the details of system design and analysis of its dynamic behavior during transient environmental conditions. The performance of the system is verified using MATLAB simulation and hardware prototype.",
"title": ""
},
{
"docid": "be95384cb710593dd7c620becff334be",
"text": "1College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350117, Fujian, China 2College of Computer and Information, Hohai University, Nanjing 211100, Jiangsu, China 3Jiangsu Key Laboratory of Big Data Security & Intelligent Processing, Nanjing University of Posts and Telecommunications, China 4Mathematics and Computer Science Department, Gannan Normal University, Ganzhou 341000, Jiangxi, China",
"title": ""
},
{
"docid": "f1ac14dd7efc1ef56d5aa51de465ee50",
"text": "The problem of discovering association rules has received considerable research attention and several fast algorithms for mining association rules have been developed. In practice, users are often interested in a subset of association rules. For example, they may only want rules that contain a specific item or rules that contain children of a specific item in a hierarchy. While such constraints can be applied as a postprocessing step, integrating them into the mining algorithm can dramatically reduce the execution time. We consider the problem of integrating constraints that n..,, l.....l,.... ,....,,....:,,, -1.~.. cl., -..s..a..-m e.. ..l.“,“, CUG Y”“Ac;Qu GnpLz:I)DIVua “YGI “Us: pGYaLcG “I OLJDciliLG of items into the association discovery algorithm. We present three integrated algorithms for mining association rules with item constraints and discuss their tradeoffs.",
"title": ""
},
{
"docid": "8a5ae40bc5921d7614ca34ddf53cebbc",
"text": "In natural language processing community, sentiment classification based on insufficient labeled data is a well-known challenging problem. In this paper, a novel semi-supervised learning algorithm called active deep network (ADN) is proposed to address this problem. First, we propose the semi-supervised learning framework of ADN. ADN is constructed by restricted Boltzmann machines (RBM) with unsupervised fine-tuned by gradient-descent based supervised learning with an exponential loss function. Second, in the semi-supervised learning framework, we apply active learning to identify reviews that should be labeled as training data, then using the selected labeled reviews and all unlabeled reviews to train ADN architecture. Moreover, we combine the information density with ADN, and propose information ADN (IADN) method, which can apply the information density of all unlabeled reviews in choosing the manual labeled reviews. Experiments on five sentiment classification datasets show that ADN and IADN outperform classical semi-supervised learning algorithms, and deep learning techniques applied for sentiment classification. & 2013 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "729581c92155092a82886e58284e8b92",
"text": "We investigate here the capabilities of a 400-element reconfigurable transmitarray antenna to synthesize monopulse radiation patterns for radar applications in X-band. The generation of the sum (Σ) and difference (A) patterns are demonstrated both theoretically and experimentally for broadside as well as tilted beams in different azimuthal planes. Two different feed configurations have been considered, namely, a single focal source and a four-element focal source configuration. The latter enables the simultaneous generation of a Σ- and two A-patterns in orthogonal planes, which is an important advantage for tracking applications with stringent requirements in speed and accuracy.",
"title": ""
},
{
"docid": "5b2a2079025d899b7ce4184ee824e8e8",
"text": "This paper presents a control scheme based on deep reinforcement learning for a two-dimensional positioning system with electromagnetic actuators. Two neuro-controllers are trained and used for controlling the X-Y position of an object. The neuro-controllers learning approach is based on the actor-critic architecture and the deep deterministic policy gradient (DDPG) algorithm using the Q-learning method. The performance of the control system is verified for different setpoints and working conditions.",
"title": ""
},
{
"docid": "668b8d1475bae5903783159a2479cc32",
"text": "As environmental concerns and energy consumption continue to increase, utilities are looking at cost effective strategies for improved network operation and consumer consumption. Smart grid is a collection of next generation power delivery concepts that includes new power delivery components, control and monitoring throughout the power grid and more informed customer options. This session will cover utilization of AMI networks to realize some of the smart grid goals.",
"title": ""
},
{
"docid": "f57fad4c48d053413053869ae591560f",
"text": "In this paper we introduce a new simple strategy into edge-searching of a graph, which is useful to the various subgraph listing problems. Applying the strategy, we obtain the following four algorithms. The first one lists all the triangles in a graph G in O(a(G)m) time, where m is the number of edges of G and a(G) the arboricity of G. The second finds all the quadrangles in O(a(G)m) time. Since a(G) is at most three for a planar graph G, both run in linear time for a planar graph. The third lists all the complete subgraphs K of order in O(la(G)t-2m) time. The fourth lists all the cliques in O(a(G)m) time per clique. All the algorithms require linear space. We also establish an upper bound on a(G) for a graph G: a(G) <[(2m+ n)1/2/2], where n is the number of vertices in G. Key words, arboricity, clique, complete subgraph, independent set, quadrangle, subgraph listing algorithm, triangle",
"title": ""
},
{
"docid": "7df626465d52dfe5859e682c685c62bc",
"text": "This thesis addresses the task of error detection in the choice of content words focusing on adjective–noun and verb–object combinations. We show that error detection in content words is an under-explored area in research on learner language since (i) most previous approaches to error detection and correction have focused on other error types, and (ii) the approaches that have previously addressed errors in content words have not performed error detection proper. We show why this task is challenging for the existing algorithms and propose a novel approach to error detection in content words. We note that since content words express meaning, an error detection algorithm should take the semantic properties of the words into account. We use a compositional distribu-tional semantic framework in which we represent content words using their distributions in native English, while the meaning of the combinations is represented using models of com-positional semantics. We present a number of measures that describe different properties of the modelled representations and can reliably distinguish between the representations of the correct and incorrect content word combinations. Finally, we cast the task of error detection as a binary classification problem and implement a machine learning classifier that uses the output of the semantic measures as features. The results of our experiments confirm that an error detection algorithm that uses semantically motivated features achieves good accuracy and precision and outperforms the state-of-the-art approaches. We conclude that the features derived from the semantic representations encode important properties of the combinations that help distinguish the correct combinations from the incorrect ones. The approach presented in this work can naturally be extended to other types of content word combinations. Future research should also investigate how the error correction component for content word combinations could be implemented. 3 4 Acknowledgements First and foremost, I would like to express my profound gratitude to my supervisor, Ted Briscoe, for his constant support and encouragement throughout the course of my research. This work would not have been possible without his invaluable guidance and advice. I am immensely grateful to my examiners, Ann Copestake and Stephen Pulman, for providing their advice and constructive feedback on the final version of the dissertation. I am also thankful to my colleagues at the Natural Language and Information Processing research group for the insightful and inspiring discussions over these years. In particular, I would like to express my gratitude to would like to thank …",
"title": ""
},
{
"docid": "496fdf000074eb55f9e42e356d97b4b1",
"text": "Attention networks have proven to be an effective approach for embedding categorical inference within a deep neural network. However, for many tasks we may want to model richer structural dependencies without abandoning end-to-end training. In this work, we experiment with incorporating richer structural distributions, encoded using graphical models, within deep networks. We show that these structured attention networks are simple extensions of the basic attention procedure, and that they allow for extending attention beyond the standard softselection approach, such as attending to partial segmentations or to subtrees. We experiment with two different classes of structured attention networks: a linearchain conditional random field and a graph-based parsing model, and describe how these models can be practically implemented as neural network layers. Experiments show that this approach is effective for incorporating structural biases, and structured attention networks outperform baseline attention models on a variety of synthetic and real tasks: tree transduction, neural machine translation, question answering, and natural language inference. We further find that models trained in this way learn interesting unsupervised hidden representations that generalize simple attention.",
"title": ""
},
{
"docid": "86ef327af44b036259bd7025f1264dc8",
"text": "Objective\nOur objective was to review the characteristics, current applications, and evaluation measures of conversational agents with unconstrained natural language input capabilities used for health-related purposes.\n\n\nMethods\nWe searched PubMed, Embase, CINAHL, PsycInfo, and ACM Digital using a predefined search strategy. Studies were included if they focused on consumers or healthcare professionals; involved a conversational agent using any unconstrained natural language input; and reported evaluation measures resulting from user interaction with the system. Studies were screened by independent reviewers and Cohen's kappa measured inter-coder agreement.\n\n\nResults\nThe database search retrieved 1513 citations; 17 articles (14 different conversational agents) met the inclusion criteria. Dialogue management strategies were mostly finite-state and frame-based (6 and 7 conversational agents, respectively); agent-based strategies were present in one type of system. Two studies were randomized controlled trials (RCTs), 1 was cross-sectional, and the remaining were quasi-experimental. Half of the conversational agents supported consumers with health tasks such as self-care. The only RCT evaluating the efficacy of a conversational agent found a significant effect in reducing depression symptoms (effect size d = 0.44, p = .04). Patient safety was rarely evaluated in the included studies.\n\n\nConclusions\nThe use of conversational agents with unconstrained natural language input capabilities for health-related purposes is an emerging field of research, where the few published studies were mainly quasi-experimental, and rarely evaluated efficacy or safety. Future studies would benefit from more robust experimental designs and standardized reporting.\n\n\nProtocol Registration\nThe protocol for this systematic review is registered at PROSPERO with the number CRD42017065917.",
"title": ""
},
{
"docid": "6b3c1648794783cdec26b076b7378fda",
"text": "Depression is a serious health disorder. In this study, we investigate the feasibility of depression screening using sensor data collected from smartphones. We extract various behavioral features from smartphone sensing data and investigate the efficacy of various machine learning tools to predict clinical diagnoses and PHQ-9 scores (a quantitative tool for aiding depression screening in practice). A notable feature of our study is that we leverage a dataset that includes clinical ground truth. We find that behavioral data from smartphones can predict clinical depression with good accuracy. In addition, combining behavioral data and PHQ-9 scores can provide prediction accuracy significantly exceeding each in isolation, indicating that behavioral data captures relevant features that are not reflected by PHQ-9 scores. Finally, we develop multi-feature regression models for PHQ-9 scores that achieve significantly improved accuracy compared to direct regression models based on single features.",
"title": ""
},
{
"docid": "16a6c26d6e185be8383c062c6aa620f8",
"text": "In this research, we suggested a vision-based traffic accident detection system for automatically detecting, recording, and reporting traffic accidents at intersections. This model first extracts the vehicles from the video image of CCD camera, tracks the moving vehicles, and extracts features such as the variation rate of the velocity, position, area, and direction of moving vehicles. The model then makes decisions on the traffic accident based on the extracted features. And we suggested and designed the metadata registry for the system to improve the interoperability. In the field test, 4 traffic accidents were detected and recorded by the system. The video clips are invaluable for intersection safety analysis.",
"title": ""
},
{
"docid": "94db708f9166bb335f1430f279cd9db9",
"text": "Human emotion is a temporally dynamic event which can be inferred from both audio and video feature sequences. In this paper we investigate the long short term memory recurrent neural network (LSTM-RNN) based encoding method for category emotion recognition in the video. LSTM-RNN is able to incorporate knowledge about how emotion evolves over long range successive frames and emotion clues from isolated frame. After encoding, each video clip can be represented by a vector for each input feature sequence. The vectors contain both frame level and sequence level emotion information. These vectors are then concatenated and fed into support vector machine (SVM) to get the final prediction result. Extensive evaluations on Emotion Challenge in the Wild (EmotiW2015) dataset show the efficiency of the proposed encoding method and competitive results are obtained. The final recognition accuracy achieves 46.38% for audio-video emotion recognition sub-challenge, where the challenge baseline is 39.33%.",
"title": ""
},
{
"docid": "4bc73a7e6a6975ba77349cac62a96c18",
"text": "BACKGROUND\nIn May 2013, the iTunes and Google Play stores contained 23,490 and 17,756 smartphone applications (apps) categorized as Health and Fitness, respectively. The quality of these apps, in terms of applying established health behavior change techniques, remains unclear.\n\n\nMETHODS\nThe study sample was identified through systematic searches in iTunes and Google Play. Search terms were based on Boolean logic and included AND combinations for physical activity, healthy lifestyle, exercise, fitness, coach, assistant, motivation, and support. Sixty-four apps were downloaded, reviewed, and rated based on the taxonomy of behavior change techniques used in the interventions. Mean and ranges were calculated for the number of observed behavior change techniques. Using nonparametric tests, we compared the number of techniques observed in free and paid apps and in iTunes and Google Play.\n\n\nRESULTS\nOn average, the reviewed apps included 5 behavior change techniques (range 2-8). Techniques such as self-monitoring, providing feedback on performance, and goal-setting were used most frequently, whereas some techniques such as motivational interviewing, stress management, relapse prevention, self-talk, role models, and prompted barrier identification were not. No differences in the number of behavior change techniques between free and paid apps, or between the app stores were found.\n\n\nCONCLUSIONS\nThe present study demonstrated that apps promoting physical activity applied an average of 5 out of 23 possible behavior change techniques. This number was not different for paid and free apps or between app stores. The most frequently used behavior change techniques in apps were similar to those most frequently used in other types of physical activity promotion interventions.",
"title": ""
},
{
"docid": "ffde9de213d2b4f7387e8b92bdb517e6",
"text": "Renewable energy sources based on photovoltaic (PV) along with battery-based energy storage necessitate power conditioning to meet load requirements and/or be connected to the electrical grid. The power conditioning is achieved via a dc-dc converter and a DC-AC inverter stages to produce the desired AC source. This is also the case even when the load is of dc type, such as the typical portable electronic devices that require AC adaptors to be powered from the AC mains. The letter presents a hybrid PV-battery-powered dc bus system that eliminates the DC-AC conversion stage, resulting in lower cost and improved overall energy conversion efficiency. It is also shown experimentally that the switching ac adaptors associated with the various commonly used portable electronic devices can be reused with the proposed dc bus system. A novel high-gain hybrid boost-flyback converter is also introduced with several times higher voltage conversion ratio than the conventional boost converter topology. This arrangement results in higher DC bus levels and lower cable conduction losses. Moreover, the voltage stress on the hybrid boost-flyback converter power switch is within half the output voltage. Experimental results taken from a laboratory prototype are presented to confirm the effectiveness of the proposed converter/system.",
"title": ""
}
] | scidocsrr |
7f1829f6a8415c6abc1bdc9e485a2760 | Data Poisoning Attacks on Multi-Task Relationship Learning | [
{
"docid": "67e85e8b59ec7dc8b0019afa8270e861",
"text": "Machine learning’s ability to rapidly evolve to changing and complex situations has helped it become a fundamental tool for computer security. That adaptability is also a vulnerability: attackers can exploit machine learning systems. We present a taxonomy identifying and analyzing attacks against machine learning systems. We show how these classes influence the costs for the attacker and defender, and we give a formal structure defining their interaction. We use our framework to survey and analyze the literature of attacks against machine learning systems. We also illustrate our taxonomy by showing how it can guide attacks against SpamBayes, a popular statistical spam filter. Finally, we discuss how our taxonomy suggests new lines of defenses.",
"title": ""
}
] | [
{
"docid": "01e96ffcbf3514c2a058fc30dd969731",
"text": "Fish display robust neuroendocrine and physiologic stress responses to noxious stimuli. Many anesthetic, sedative, or analgesic drugs used in other vertebrates reduce stress in fi sh, decrease handling trauma, minimize movement and physiologic changes in response to nociceptive stimuli, and can be used for euthanasia. But extrapolating from limited published anesthetic and sedative data to all fi sh species is potentially harmful because of marked anatomic, physiologic, and behavioral variations; instead, a stepwise approach to anesthetizing or sedating unfamiliar species or using unproven drugs for familiar species is advisable. Additionally, knowledge of how water quality infl uences anesthesia or sedation helps limit complications. The most common method of drug administration is through immersion, a technique analogous to gaseous inhalant anesthesia in terrestrial animals, but the use of injectable anesthetic and sedative agents (primarily intramuscularly, but also intravenously) is increasing. Regardless of the route of administration, routine preprocedural preparation is appropriate, to stage both the animals and the supplies for induction, maintenance, and recovery. Anesthetic and sedation monitoring and resuscitation are similar to those for other vertebrates. Euthanasia is most commonly performed using an overdose of an immersion drug but injectable agents are also effective. Analgesia is an area in need of signifi cant research as only a few studies exist and they provide some contrasting results. However, fi sh have μ and κ opiate receptors throughout the brain, making it reasonable to expect some effect of at least opioid treatments in fi sh experiencing noxious stimuli.",
"title": ""
},
{
"docid": "d0d7016430b55ae6dec0edf3b5e1b1fd",
"text": "• Our goal is to extend the Julia static analyzer, based on abstract interpretation, to perform formally correct analyses of Android programs. This article is an in depth description of such an extension,of the difficulties that we faced and of the results that we obtained. • We have extended the class analysis of the Julia analyzer, which lies at the heart of many other analyses, by considering some Android key specific features • Classcast, dead code, nullness and termination analysis are done. • Formally correct results in at most 7 min and on standard hardware. • As a language, Android is Java with an extended library for mobile and interactive applications, hence based on an eventdriven architecture. (WRONG)",
"title": ""
},
{
"docid": "e19c448b964c085cf938c288b5951392",
"text": "This paper presents the design and simulation of a broadband 3×4 Butler matrix for the IEEE 802.11 b/g/n and ISM bands. The aim of this study is to develop an antenna array feeding networks for Multiple-Input Multiple-Output (MIMO) applications, based on an asymmetric Butler matrix. The asymmetric structure allows to create a further beam on the array's normal axis, in addition to the same beams which are created by the symmetrical version. The proposed circuit presents a high isolation and wideband features. The circuit can be used for both transmission and reception systems to ensure the Multi-User MIMO (MU-MIMO) service.",
"title": ""
},
{
"docid": "330329a7ce02b89373b935c99e4f1471",
"text": "Feature extraction, deformation handling, occlusion handling, and classification are four important components in pedestrian detection. Existing methods learn or design these components either individually or sequentially. The interaction among these components is not yet well explored. This paper proposes that they should be jointly learned in order to maximize their strengths through cooperation. We formulate these four components into a joint deep learning framework and propose a new deep network architecture. By establishing automatic, mutual interaction among components, the deep model achieves a 9% reduction in the average miss rate compared with the current best-performing pedestrian detection approaches on the largest Caltech benchmark dataset.",
"title": ""
},
{
"docid": "d4bbd07979940fd2b152144ab626fdb1",
"text": "Extracting minutiae from fingerprint images is one of the most important steps in automatic fingerprint identification and classification. Minutiae are local discontinuities in the fingerprint pattern, mainly terminations and bifurcations. In this work we propose two methods for fingerprint image enhancement. The first one is carried out using local histogram equalization, Wiener filtering, and image binarization. The second method use a unique anisotropic filter for direct grayscale enhancement. The results achieved are compared with those obtained through some other methods. Both methods show some improvement in the minutiae detection process in terms of either efficiency or time required.",
"title": ""
},
{
"docid": "d2bf32b4daeb003d615bfc04e0e4e307",
"text": "To date, cardiovascular disease (CVD) is the first leading cause of global death. The Electrocardiogram (ECG) is the most widely adopted clinical tool that measures and records the electrical activity of the heart from the body surface. The mainstream resting ECG machines for CVD diagnosis and supervision can be ineffective in detecting abnormal transient heart activities, which may not occur during an individual's hospital visit. Common Holter-based portable solutions offer 24-hour ECG recording, containing hundreds of thousands of heart beats that not only are tedious and time-consuming to analyze manually but also miss the capability to provide any real-time feedback. In this study, we seek to establish a cell phone-based personalized medicine technology for CVD, capable of performing continuous monitoring and recording of ECG in real time, generating individualized cardiac health summary report in layman's language, automatically detecting abnormal CVD conditions and classifying them at any place and anytime. Specifically, we propose to develop an artificial neural network (ANN)-based machine learning technique, combining both individualized medical information and clinical ECG database data, to train the cell phone to learn to adapt to its user's physiological conditions to achieve better ECG feature extraction and more accurate CVD classification results.",
"title": ""
},
{
"docid": "52d380b7f20e410ff428c6f46bea256d",
"text": "Entity Linking is the task of assigning entities from a Knowledge Base to textual mentions of such entities in a document. State-of-the-art approaches rely on lexical and statistical features which are abundant for popular entities but sparse for unpopular ones, resulting in a clear bias towards popular entities and poor accuracy for less popular ones. In this work, we present a novel approach that is guided by a natural notion of semantic similarity which is less amenable to such bias. We adopt a unified semantic representation for entities and documents - the probability distribution obtained from a random walk on a subgraph of the knowledge base - which can overcome the feature sparsity issue that affects previous work. Our algorithm continuously updates the semantic signature of the document as mentions are disambiguated, thus focusing the search based on context. Our experimental evaluation uses well-known benchmarks and different samples of a Wikipedia-based benchmark with varying entity popularity; the results illustrate well the bias of previous methods and the superiority of our approach, especially for the less popular entities.",
"title": ""
},
{
"docid": "0caf6ead2548d556d9dd0564fb59d8cc",
"text": "A modified microstrip Franklin array antenna (MFAA) is proposed for short-range radar applications in vehicle blind spot information systems (BLIS). It is shown that the radiating performance [i.e., absolute gain value and half-power beamwidth (HPBW) angle] can be improved by increasing the number of radiators in the MFAA structure and assigning appropriate values to the antenna geometry parameters. The MFAA possesses a high absolute gain value (>10 dB), good directivity (HPBW <20°) in the E-plane, and large-range coverage (HPBW >80°) in the H-plane at an operating frequency of 24 GHz. Moreover, the 10-dB impedance bandwidth of the proposed antenna is around 250 MHz. The MFAA is, thus, an ideal candidate for automotive BLIS applications.",
"title": ""
},
{
"docid": "9ffb34f554e9d31938b77a33be187014",
"text": "Job recommendation systems mainly use different sources of data in order to give the better content for the end user. Developing the well-performing system requires complex hybrid approaches of representing similarity based on the content of job postings and resumes as well as interactions between them. We develop an efficient hybrid networkbased job recommendation system which uses Personalized PageRank algorithm in order to rank vacancies for the users based on the similarity between resumes and job posts as textual documents, along with previous interactions of users with vacancies. Our approach achieved the recall of 50% and generated more applies for the jobs during the online A/B test than previous algorithms.",
"title": ""
},
{
"docid": "d97db033372376bd0d57908853b64378",
"text": "This paper discussed an object-oriented design for general game using C# and XNA using design pattern. We presented application of structural patterns, creat ional pattern and behavioral pattern to create game sprite, manag e game state and game sprites, different collision and rewards a mong sprites or between sprites and map; we also discussed how t o apply design patterns to handle communications between sp rites and NPC by using observer pattern and mediator patterns . Although lots of design patterns are discussed, other design patterns might suitable as well because game programming are so co mplicated to separate each pattern independently. Keywords-Game, Programming, Design Patterns, UML, XNA, C#",
"title": ""
},
{
"docid": "6228498fed5b26c0def578251aa1c749",
"text": "Observation-Level Interaction (OLI) is a sensemaking technique relying upon the interactive semantic exploration of data. By manipulating data items within a visualization, users provide feedback to an underlying mathematical model that projects multidimensional data into a meaningful two-dimensional representation. In this work, we propose, implement, and evaluate an OLI model which explicitly defines clusters within this data projection. These clusters provide targets against which data values can be manipulated. The result is a cooperative framework in which the layout of the data affects the clusters, while user-driven interactions with the clusters affect the layout of the data points. Additionally, this model addresses the OLI \"with respect to what\" problem by providing a clear set of clusters against which interaction targets are judged and computed.",
"title": ""
},
{
"docid": "8cfcadd2216072dbeb5c7f5d99326c49",
"text": "In this paper, a human eye localization algorithm in images and video is presented for faces with frontal pose and upright orientation. A given face region is filtered by a high-pass filter of a wavelet transform. In this way, edges of the region are highlighted, and a caricature-like representation is obtained. After analyzing horizontal projections and profiles of edge regions in the high-pass filtered image, the candidate points for each eye are detected. All the candidate points are then classified using a support vector machine based classifier. Locations of each eye are estimated according to the most probable ones among the candidate points. It is experimentally observed that our eye localization method provides promising results for both image and video processing applications.",
"title": ""
},
{
"docid": "eaca5794d84a96f8c8e7807cf83c3f00",
"text": "Background Women represent 15% of practicing general surgeons. Gender-based discrimination has been implicated as discouraging women from surgery. We sought to determine women's perceptions of gender-based discrimination in the surgical training and working environment. Methods Following IRB approval, we fielded a pilot survey measuring perceptions and impact of gender-based discrimination in medical school, residency training, and surgical practice. It was sent electronically to 1,065 individual members of the Association of Women Surgeons. Results We received 334 responses from medical students, residents, and practicing physicians with a response rate of 31%. Eighty-seven percent experienced gender-based discrimination in medical school, 88% in residency, and 91% in practice. Perceived sources of gender-based discrimination included superiors, physician peers, clinical support staff, and patients, with 40% emanating from women and 60% from men. Conclusions The majority of responses indicated perceived gender-based discrimination during medical school, residency, and practice. Gender-based discrimination comes from both sexes and has a significant impact on women surgeons.",
"title": ""
},
{
"docid": "e95257d099750281c83d98af2e194b34",
"text": "This paper presents a real-coded memetic algorithm that applies a crossover hill-climbing to solutions produced by the genetic operators. On the one hand, the memetic algorithm provides global search (reliability) by means of the promotion of high levels of population diversity. On the other, the crossover hill-climbing exploits the self-adaptive capacity of real-parameter crossover operators with the aim of producing an effective local tuning on the solutions (accuracy). An important aspect of the memetic algorithm proposed is that it adaptively assigns different local search probabilities to individuals. It was observed that the algorithm adjusts the global/local search balance according to the particularities of each problem instance. Experimental results show that, for a wide range of problems, the method we propose here consistently outperforms other real-coded memetic algorithms which appeared in the literature.",
"title": ""
},
{
"docid": "c74290691708a5ef66209369c8a377af",
"text": "Network traffic has traditionally exhibited temporal locality in the header field of packets. Such locality is intuitive and is a consequence of the semantics of network protocols. However, in contrast, the locality in the packet payload has not been studied in significant detail. In this work we study temporal locality in the packet payload. Temporal locality can also be viewed as redundancy, and we observe significant redundancy in the packet payload. We investigate mechanisms to exploit it in a networking application. We choose Intrusion Detection Systems (IDS) as a case study. An IDS like the popular Snort operates by scanning packet payload for known attack strings. It first builds a Finite State Machine (FSM) from a database of attack strings, and traverses this FSM using bytes from the packet payload. So temporal locality in network traffic provides us an opportunity to accelerate this FSM traversal. Our mechanism dynamically identifies redundant bytes in the packet and skips their redundant FSM traversal. We further parallelize our mechanism by performing the redundancy identification concurrently with stages of Snort packet processing. IDS are commonly deployed in commodity processors, and we evaluate our mechanism on an Intel Core i3. Our performance study indicates that the length of the redundant chunk is a key factor in performance. We also observe important performance benefits in deploying our redundancy-aware mechanism in the Snort IDS[32].",
"title": ""
},
{
"docid": "774372d0c5cb7c1b1fdef213bb498e14",
"text": "The emerging technique of real-time fMRI neurofeedback trains individuals to regulate their own brain activity via feedback from an fMRI measure of neural activity. Optimum feedback presentation has yet to be determined, particularly when working with clinical populations. To this end, we compared continuous against intermittent feedback in subjects with tinnitus. Fourteen participants with tinnitus completed the whole experiment consisting of nine runs (3 runs × 3 days). Prior to the neurofeedback, the target region was localized within the auditory cortex using auditory stimulation (1 kHz tone pulsating at 6 Hz) in an ON-OFF block design. During neurofeedback runs, participants received either continuous (n = 7, age 46.84 ± 12.01, Tinnitus Functional Index (TFI) 49.43 ± 15.70) or intermittent feedback (only after the regulation block) (n = 7, age 47.42 ± 12.39, TFI 49.82 ± 20.28). Participants were asked to decrease auditory cortex activity that was presented to them by a moving bar. In the first and the last session, participants also underwent arterial spin labeling (ASL) and resting-state fMRI imaging. We assessed tinnitus severity using the TFI questionnaire before all sessions, directly after all sessions and six weeks after all sessions. We then compared neuroimaging results from neurofeedback using a general linear model (GLM) and region-of-interest analysis as well as behavior measures employing a repeated-measures ANOVA. In addition, we looked at the seed-based connectivity of the auditory cortex using resting-state data and the cerebral blood flow using ASL data. GLM group analysis revealed that a considerable part of the target region within the auditory cortex was significantly deactivated during neurofeedback. When comparing continuous and intermittent feedback groups, the continuous group showed a stronger deactivation of parts of the target region, specifically the secondary auditory cortex. This result was confirmed in the region-of-interest analysis that showed a significant down-regulation effect for the continuous but not the intermittent group. Additionally, continuous feedback led to a slightly stronger effect over time while intermittent feedback showed best results in the first session. Behaviorally, there was no significant effect on the total TFI score, though on a descriptive level TFI scores tended to decrease after all sessions and in the six weeks follow up in the continuous group. Seed-based connectivity with a fixed-effects analysis revealed that functional connectivity increased over sessions in the posterior cingulate cortex, premotor area and part of the insula when looking at all patients while cerebral blood flow did not change significantly over time. Overall, these results show that continuous feedback is suitable for long-term neurofeedback experiments while intermittent feedback presentation promises good results for single session experiments when using the auditory cortex as a target region. In particular, the down-regulation effect is more pronounced in the secondary auditory cortex, which might be more susceptible to voluntary modulation in comparison to a primary sensory region.",
"title": ""
},
{
"docid": "f43d024b61620a19cfbc3d76b6253332",
"text": "Equipped with sensors that are capable of collecting physiological and environmental data continuously, wearable technologies have the potential to become a valuable component of personalized healthcare and health management. However, in addition to the potential benefits of wearable devices, the widespread and continuous use of wearables also poses many privacy challenges. In some instances, users may not be aware of the risks associated with wearable devices, while in other cases, users may be aware of the privacy-related risks, but may beunable to negotiate complicated privacy settings to meet their needs and preferences. This lack of awareness could have an adverse impact on users in the future, even becoming a \"skeleton in the closet.\" In this work, we conducted 32 semi-structured interviews to understand how users perceive privacy in wearable computing. Results suggest that user concerns toward wearable privacy have different levels of variety ranging from no concern to highly concerned. In addition, while user concerns and benefits are similar among participants in our study, these variablesshould be investigated more extensively for the development of privacy enhanced wearable technologies.",
"title": ""
},
{
"docid": "664d2c51bba8b0343979a1dacdf1370e",
"text": "While great progress has been made recently in automatic image manipulation, it has been limited to object centric images like faces or structured scene datasets. In this work, we take a step towards general scene-level image editing by developing an automatic interaction-free object removal model. Our model learns to find and remove objects from general scene images using image-level labels and unpaired data in a generative adversarial network (GAN) framework. We achieve this with two key contributions: a two-stage editor architecture consisting of a mask generator and image in-painter that co-operate to remove objects, and a novel GAN based prior for the mask generator that allows us to flexibly incorporate knowledge about object shapes. We experimentally show on two datasets that our method effectively removes a wide variety of objects using weak supervision only.",
"title": ""
},
{
"docid": "154e25caf9eb954bb7658304dd37a8a2",
"text": "RFID is an automatic identification technology that enables tracking of people and objects. Both identity and location are generally key information for indoor services. An obvious and interesting method to obtain these two types of data is to localize RFID tags attached to devices or objects or carried by people. However, signals in indoor environments are generally harshly impaired and tags have very limited capabilities which pose many challenges for positioning them. In this work, we propose a classification and survey the current state-of-art of RFID localization by first presenting this technology and positioning principles. Then, we explain and classify RFID localization techniques. Finally, we discuss future trends in this domain.",
"title": ""
},
{
"docid": "a08d783229b59342cdb015e051450f94",
"text": "We consider the problem of estimating the remaining useful life (RUL) of a system or a machine from sensor data. Many approaches for RUL estimation based on sensor data make assumptions about how machines degrade. Additionally, sensor data from machines is noisy and oen suers from missing values in many practical seings. We propose Embed-RUL: a novel approach for RUL estimation from sensor data that does not rely on any degradation-trend assumptions, is robust to noise, and handles missing values. EmbedRUL utilizes a sequence-to-sequence model based on Recurrent Neural Networks (RNNs) to generate embeddings for multivariate time series subsequences. e embeddings for normal and degraded machines tend to be dierent, and are therefore found to be useful for RUL estimation. We show that the embeddings capture the overall paern in the time series while ltering out the noise, so that the embeddings of two machines with similar operational behavior are close to each other, even when their sensor readings have signicant and varying levels of noise content. We perform experiments on publicly available turbofan engine dataset and a proprietary real-world dataset, and demonstrate that Embed-RUL outperforms the previously reported [24] state-of-the-art on several metrics.",
"title": ""
}
] | scidocsrr |
a73bd43d92c13f9ba84224aa833cea0d | Wake on wireless: : an event driven energy saving strategy for battery operated devices | [
{
"docid": "f3bc3e8c34574be5db727acc1aa72e64",
"text": "In this paper we investigate possible ways to improve the energy efficiency of a general purpose microprocessor. We show that the energy of a processor depends on its performance, so we chose the energy-delay product to compare different processors. To improve the energy-delay product we explore methods of reducing energy consumption that do not lead to performance loss (i.e., wasted energy), and explore methods to reduce delay by exploiting instruction level parallelism. We found that careful design reduced the energy dissipation by almost 25%. Pipelining can give approximately a 2x improvement in energydelay product. Superscalar issue, however, does not improve the energy-delay product any further since the overhead required offsets the gains in performance. Further improvements will be hard to come by since a large fraction of the energy (5040%) is dissipated in the clock network and the on-chip memories. Thus, the efficiency of processors will depend more on the technology being used and the algorithm chosen by the programmer than the micro-architecture.",
"title": ""
}
] | [
{
"docid": "55304b1a38d49cd65658964c3aea5df5",
"text": "In this paper, we take the view that any formalization of commitments has to come together with a formalization of time, events/actions and change. We enrich a suitable formalism for reasoning about time, event/action and change in order to represent and reason about commitments. We employ a three-valued based temporal first-order non-monotonic logic (TFONL) that allows an explicit representation of time and events/action. TFONL subsumes the action languages presented in the literature and takes into consideration the frame, qualification and ramification problems, and incorporates to a domain description the set of rules governing change. It can handle protocols for the different types of dialogues such as information seeking, inquiry and negotiation. We incorporate commitments into TFONL to obtain Com-TFONL. Com-TFONL allows an agent to reason about its commitments and about other agents’ behaviour during a dialogue. Thus, agents can employ social commitments to act on, argue with and reason about during interactions with other agents. Agents may use their reasoning and argumentative capabilities in order to determine the appropriate communicative acts during conversations. Furthermore, Com-TFONL allows for an integration of commitments and arguments which helps in capturing the public aspects of a conversation and the reasoning aspects required in coherent conversations.",
"title": ""
},
{
"docid": "f92f0a3d46eaf14e478a41f87b8ad369",
"text": "The agricultural productivity of India is gradually declining due to destruction of crops by various natural calamities and the crop rotation process being affected by irregular climate patterns. Also, the interest and efforts put by farmers lessen as they grow old which forces them to sell their agricultural lands, which automatically affects the production of agricultural crops and dairy products. This paper mainly focuses on the ways by which we can protect the crops during an unavoidable natural disaster and implement technology induced smart agro-environment, which can help the farmer manage large fields with less effort. Three common issues faced during agricultural practice are shearing furrows in case of excess rain or flood, manual watering of plants and security against animal grazing. This paper provides a solution for these problems by helping farmer monitor and control various activities through his mobile via GSM and DTMF technology in which data is transmitted from various sensors placed in the agricultural field to the controller and the status of the agricultural parameters are notified to the farmer using which he can take decisions accordingly. The main advantage of this system is that it is semi-automated i.e. the decision is made by the farmer instead of fully automated decision that results in precision agriculture. It also overcomes the existing traditional practices that require high money investment, energy, labour and time.",
"title": ""
},
{
"docid": "b629ae23b7351c59c55ee9e9f1a33117",
"text": "75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 Tthe treatment of chronic hepatitis C virus (HCV) infection has been nothing short of remarkable with the prospect of elimination never more within reach. Attention has shifted to the safety and efficacy of DAAs in special populations, such as hepatitis B virus (HBV)/HCV coinfected individuals. Although the true prevalence of coinfection is unknown, studies from the United States report that 1.4% to 5.8% of HCV-infected individuals are hepatitis B surface antigen (HBsAg) positive compared with 1.4% to 4.1% in China. Coinfection is associated with higher rates of cirrhosis, decompensation, and hepatocellular carcinoma compared with monoinfected individuals. Because HBsAgpositive individuals were excluded from clinical trials of DAAs, HBV reactivation after HCV clearance was only reported after DAAs entered clinical use. Reports of severe and even fatal cases led the US Food and Drug Administration (FDA) to issue a strong directive regarding the risk of HBV reactivation with DAA treatment. The FDA boxed warning was based on 29 cases of HBV reactivation, including 2 fatal events and one that led to liver transplantation. However, owing to the nature of postapproval reporting, critical data were often missing, including baseline HBV serology, making it difficult to truly assess the risk. To err on the safe side, the FDA recommended screening all individuals scheduled to receive DAAs for evidence of current or past HBV infection with follow-up HBV DNA testing for any positive serology. Differing recommendations from international guidelines left clinicians unsure of how to proceed. The study by Liu et al in this issue of Gastroenterology provides much-needed data regarding the risk of HBV reactivation in coinfected individuals treated with DAAs. This prospective study enrolled 111 patients with HBV/ HCV coinfection who received sofosbuvir/ledipasvir for 12 weeks. Notably, although 61% were infected with HCV genotype 1, 39% had genotype 2 infection, a group for whom sofosbuvir/ledipasvir is not currently recommended. All patients achieved sustained virologic response (SVR). More important, the authors carefully evaluated what happened to HBV during and after HCV therapy. Patients were divided into 2 groups: those with undetectable HBV DNA and those with an HBV DNA of >20 IU/mL at baseline. Increases in HBV DNA levels were common in both groups. DNA increased to quantifiable levels in 31 of 37 initially",
"title": ""
},
{
"docid": "a20ba0bb564711edc201b0e021e0dee9",
"text": "We approach the task of human silhouette extraction from color and thermal image sequences using automatic image registration. Image registration between color and thermal images is a challenging problem due to the difficulties associated with finding correspondence. However, the moving people in a static scene provide cues to address this problem. In this paper, we propose a hierarchical scheme to automatically find the correspondence between the preliminary human silhouettes extracted from synchronous color and thermal image sequences for image registration. Next, we discuss strategies for probabilistically combining cues from registered color and thermal images for improved human silhouette detection. It is shown that the proposed approach achieves good results for image registration and human silhouette extraction. Experimental results also show a comparison of various sensor fusion strategies and demonstrate the improvement in performance over nonfused cases for human silhouette extraction. 2006 Published by Elsevier Ltd on behalf of Pattern Recognition Society.",
"title": ""
},
{
"docid": "0190bdc5eafae72620f7fabbcdcc223c",
"text": "Breast cancer is regarded as one of the most frequent mortality causes among women. As early detection of breast cancer increases the survival chance, creation of a system to diagnose suspicious masses in mammograms is important. In this paper, two automated methods are presented to diagnose mass types of benign and malignant in mammograms. In the first proposed method, segmentation is done using an automated region growing whose threshold is obtained by a trained artificial neural network (ANN). In the second proposed method, segmentation is performed by a cellular neural network (CNN) whose parameters are determined by a genetic algorithm (GA). Intensity, textural, and shape features are extracted from segmented tumors. GA is used to select appropriate features from the set of extracted features. In the next stage, ANNs are used to classify the mammograms as benign or malignant. To evaluate the performance of the proposed methods different classifiers (such as random forest, naïve Bayes, SVM, and KNN) are used. Results of the proposed techniques performed on MIAS and DDSM databases are promising. The obtained sensitivity, specificity, and accuracy rates are 96.87%, 95.94%, and 96.47%, respectively. 2014 Published by Elsevier Ltd.",
"title": ""
},
{
"docid": "6851e4355ab4825b0eb27ac76be2329f",
"text": "Segmentation of novel or dynamic objects in a scene, often referred to as “background subtraction” or “foreground segmentation”, is a critical early in step in most computer vision applications in domains such as surveillance and human-computer interaction. All previously described, real-time methods fail to handle properly one or more common phenomena, such as global illumination changes, shadows, inter-reflections, similarity of foreground color to background, and non-static backgrounds (e.g. active video displays or trees waving in the wind). The recent advent of hardware and software for real-time computation of depth imagery makes better approaches possible. We propose a method for modeling the background that uses per-pixel, time-adaptive, Gaussian mixtures in the combined input space of depth and luminance-invariant color. This combination in itself is novel, but we further improve it by introducing the ideas of 1) modulating the background model learning rate based on scene activity, and 2) making colorbased segmentation criteria dependent on depth observations. Our experiments show that the method possesses much greater robustness to problematic phenomena than the prior state-of-the-art, without sacrificing real-time performance, making it well-suited for a wide range of practical applications in video event detection and recognition.",
"title": ""
},
{
"docid": "1bd06d0d120b28f5d0720643fcdb9944",
"text": "Indoor positioning system based on Receive Signal Strength Indication (RSSI) from Wireless access equipment have become very popular in recent years. This system is very useful in many applications such as tracking service for older people, mobile robot localization and so on. While Outdoor environment using Global Navigation Satellite System (GNSS) and cellular [14] network works well and widespread for navigator. However, there was a problem with signal propagation from satellites. They cannot be used effectively inside the building areas until a urban environment. In this paper we propose the Wi-Fi Fingerprint Technique using Fuzzy set theory to adaptive Basic K-Nearest Neighbor algorithm to classify the labels of a database system. It was able to improve the accuracy and robustness. The performance of our simple algorithm is evaluated by the experimental results which show that our proposed scheme can achieve a certain level of positioning system accuracy.",
"title": ""
},
{
"docid": "e71402bed9c526d9152885ef86c30bb5",
"text": "Narratives structure our understanding of the world and of ourselves. They exploit the shared cognitive structures of human motivations, goals, actions, events, and outcomes. We report on a computational model that is motivated by results in neural computation and captures fine-grained, context sensitive information about human goals, processes, actions, policies, and outcomes. We describe the use of the model in the context of a pilot system that is able to interpret simple stories and narrative fragments in the domain of international politics and economics. We identify problems with the pilot system and outline extensions required to incorporate several crucial dimensions of narrative structure.",
"title": ""
},
{
"docid": "7f5bc643261247c0f977130405c6440d",
"text": "In medical image analysis applications, the availability of the large amounts of annotated data is becoming increasingly critical. However, annotated medical data is often scarce and costly to obtain. In this paper, we address the problem of synthesizing retinal color images by applying recent techniques based on adversarial learning. In this setting, a generative model is trained to maximize a loss function provided by a second model attempting to classify its output into real or synthetic. In particular, we propose to implement an adversarial autoencoder for the task of retinal vessel network synthesis. We use the generated vessel trees as an intermediate stage for the generation of color retinal images, which is accomplished with a generative adversarial network. Both models require the optimization of almost everywhere differentiable loss functions, which allows us to train them jointly. The resulting model offers an end-to-end retinal image synthesis system capable of generating as many retinal images as the user requires, with their corresponding vessel networks, by sampling from a simple probability distribution that we impose to the associated latent space. We show that the learned latent space contains a well-defined semantic structure, implying that we can perform calculations in the space of retinal images, e.g., smoothly interpolating new data points between two retinal images. Visual and quantitative results demonstrate that the synthesized images are substantially different from those in the training set, while being also anatomically consistent and displaying a reasonable visual quality.",
"title": ""
},
{
"docid": "e271df30b1f2b9ba0c9834b68dd3a9b0",
"text": "Partial shading of PV arrays reduces the energy yield of PV systems and the arrays exhibit multiple peaks in the P-V characteristics. The losses due to partial shading are not proportional to the shaded area but depend on the shading pattern, array configuration and the physical location of shaded modules in the array. This paper presents a technique to configure the modules in the array so as to enhance the generated power from the array under partial shading conditions. In this approach, the physical location of the modules in a Total Cross Tied (TCT) connected PV array are arranged based on the Su Do Ku puzzle pattern so as to distribute the shading effect over the entire array. Further, this arrangement of modules is done without altering the electrical connection of the modules in the array. The Su Do Ku arrangement reduces the effect of shading of modules in any row thereby enhancing the generated PV power. The performance of the system is investigated for different shading patterns and the results show that positioning the modules of the array according to “Su Do Ku” puzzle pattern yields improved performance under partially shaded conditions.",
"title": ""
},
{
"docid": "3d3589a002f8195bb20324dd8a8f5d76",
"text": "Vacuum-based end effectors are widely used in industry and are often preferred over parallel-jaw and multifinger grippers due to their ability to lift objects with a single point of contact. Suction grasp planners often target planar surfaces on point clouds near the estimated centroid of an object. In this paper, we propose a compliant suction contact model that computes the quality of the seal between the suction cup and local target surface and a measure of the ability of the suction grasp to resist an external gravity wrench. To characterize grasps, we estimate robustness to perturbations in end-effector and object pose, material properties, and external wrenches. We analyze grasps across 1,500 3D object models to generate Dex-Net 3.0, a dataset of 2.8 million point clouds, suction grasps, and grasp robustness labels. We use Dex-Net 3.0 to train a Grasp Quality Convolutional Neural Network (GQ-CNN) to classify robust suction targets in point clouds containing a single object. We evaluate the resulting system in 350 physical trials on an ABB YuMi fitted with a pneumatic suction gripper. When evaluated on novel objects that we categorize as Basic (prismatic or cylindrical), Typical (more complex geometry), and Adversarial (with few available suction-grasp points) Dex-Net 3.0 achieves success rates of 98%, 82%, and 58% respectively, improving to 81% in the latter case when the training set includes only adversarial objects. Code, datasets, and supplemental material can be found at http://berkeleyautomation.github.io/dex-net.",
"title": ""
},
{
"docid": "67e930a26ec2dc18735f688c1643a69f",
"text": "I design a small object detection network, which is simplified from YOLO(You Only Look Once[15]) network. YOLO is a fast and elegant network that can extract meta features, predict bounding boxes and assign scores to bounding boxes. Compared with RCNN, it doesn’t have complex pipline, which is easier for me to implement. Start from a ImageNet pretrained model, I train my YOLO on PASCAL VOC2007 training dataset. And validate my YOLO on PASCAL VOC2007 validation dataset. Finally, I evaluate my YOLO on an artwork dataset(Picasso dataset). With the best parameters, I got 40% precision and 35% recall.",
"title": ""
},
{
"docid": "3e18913532544d8572c9817be7209612",
"text": "We introduce a new approach to image reconstruction from highly incomplete data. The available data are assumed to be a small collection of spectral coefficients of an arbitrary linear transform. This reconstruction problem is the subject of intensive study in the recent field of \"compressed sensing\" (also known as \"compressive sampling\"). Our approach is based on a quite specific recursive filtering procedure. At every iteration the algorithm is excited by injection of random noise in the unobserved portion of the spectrum and a spatially adaptive image denoising filter, working in the image domain, is exploited to attenuate the noise and reveal new features and details out of the incomplete and degraded observations. This recursive algorithm can be interpreted as a special type of the Robbins-Monro stochastic approximation procedure with regularization enabled by a spatially adaptive filter. Overall, we replace the conventional parametric modeling used in CS by a nonparametric one. We illustrate the effectiveness of the proposed approach for two important inverse problems from computerized tomography: Radon inversion from sparse projections and limited-angle tomography. In particular we show that the algorithm allows to achieve exact reconstruction of synthetic phantom data even from a very small number projections. The accuracy of our reconstruction is in line with the best results in the compressed sensing field.",
"title": ""
},
{
"docid": "40479536efec6311cd735f2bd34605d7",
"text": "The vast quantity of information brought by big data as well as the evolving computer hardware encourages success stories in the machine learning community. In the meanwhile, it poses challenges for the Gaussian process (GP), a well-known non-parametric and interpretable Bayesian model, which suffers from cubic complexity to training size. To improve the scalability while retaining the desirable prediction quality, a variety of scalable GPs have been presented. But they have not yet been comprehensively reviewed and discussed in a unifying way in order to be well understood by both academia and industry. To this end, this paper devotes to reviewing state-of-theart scalable GPs involving two main categories: global approximations which distillate the entire data and local approximations which divide the data for subspace learning. Particularly, for global approximations, we mainly focus on sparse approximations comprising prior approximations which modify the prior but perform exact inference, and posterior approximations which retain exact prior but perform approximate inference; for local approximations, we highlight the mixture/product of experts that conducts model averaging from multiple local experts to boost predictions. To present a complete review, recent advances for improving the scalability and model capability of scalable GPs are reviewed. Finally, the extensions and open issues regarding the implementation of scalable GPs in various scenarios are reviewed and discussed to inspire novel ideas for future research avenues.",
"title": ""
},
{
"docid": "95513348196c70bb6242137685a6fbe5",
"text": "People speak at different levels of specificity in different situations.1 A conversational agent should have this ability and know when to be specific and when to be general. We propose an approach that gives a neural network–based conversational agent this ability. Our approach involves alternating between data distillation and model training : removing training examples that are closest to the responses most commonly produced by the model trained from the last round and then retrain the model on the remaining dataset. Dialogue generation models trained with different degrees of data distillation manifest different levels of specificity. We then train a reinforcement learning system for selecting among this pool of generation models, to choose the best level of specificity for a given input. Compared to the original generative model trained without distillation, the proposed system is capable of generating more interesting and higher-quality responses, in addition to appropriately adjusting specificity depending on the context. Our research constitutes a specific case of a broader approach involving training multiple subsystems from a single dataset distinguished by differences in a specific property one wishes to model. We show that from such a set of subsystems, one can use reinforcement learning to build a system that tailors its output to different input contexts at test time. Depending on their knowledge, interlocutors, mood, etc.",
"title": ""
},
{
"docid": "6d3924db47747758928c24e13042e875",
"text": "BACKGROUND AND OBJECTIVES\nAccidental dural puncture (ADP) during epidural analgesia is a debilitating complication. Symptoms of ADP post-dural puncture headache (PDPH) are headache while rising from supine to upright position, nausea, and neck stiffness. While age, gender and needle characteristics are established risk factors for ADP, little is known about risk factors in laboring women.\n\n\nMETHODS\nAll cases of ADP during epidural analgesia treated with blood-patching during a 3-years period were retrospectively reviewed. Each case was matched to two controls according to delivery period.\n\n\nRESULTS\nForty-nine cases of blood patches after ADP out 17 977 epidural anesthesia procedures were identified (0.27%). No differences were found between cases and controls with regards to body mass index, labor stage at time of epidural, length of second stage, location of epidural along the lumbar vertebrae, anesthesiologist's experience or time when epidural was done. In cases of ADP, significantly lower doses of local anesthetics were injected (10.9 versus 13.5 cc, p < 0.001); anesthesiologists reported significantly more trials of epidurals (70 versus 2.8% more than one trial, p < 0.001), more patient movement during the procedure (13 versus 0%, p < 0.001), more intra-procedure suspicion of ADP (69 versus 0%, p < 0.001) and more cases where CSF/blood was drawn with the syringe (57 versus 2.4%, p < 0.001).\n\n\nCONCLUSION\nADP during labor is a rare but debilitating complication. Risk factors for this iatrogenic complication include patient movement and repeated epidural trials. Intra-procedure identification of ADP is common, allowing early intervention with blood patching where indicated.",
"title": ""
},
{
"docid": "a6acba54f34d1d101f4abb00f4fe4675",
"text": "We study the potential flow of information in interaction networks, that is, networks in which the interactions between the nodes are being recorded. The central notion in our study is that of an information channel. An information channel is a sequence of interactions between nodes forming a path in the network which respects the time order. As such, an information channel represents a potential way information could have flown in the interaction network. We propose algorithms to estimate information channels of limited time span from every node to other nodes in the network. We present one exact and one more efficient approximate algorithm. Both algorithms are onepass algorithms. The approximation algorithm is based on an adaptation of the HyperLogLog sketch, which allows easily combining the sketches of individual nodes in order to get estimates of how many unique nodes can be reached from groups of nodes as well. We show how the results of our algorithm can be used to build efficient influence oracles for solving the Influence maximization problem which deals with finding top k seed nodes such that the information spread from these nodes is maximized. Experiments show that the use of information channels is an interesting data-driven and model-independent way to find top k influential nodes in interaction networks.",
"title": ""
},
{
"docid": "241832008579819b88714dad2771c467",
"text": "OBJECTIVE\nTo assess the efficacy of prenasal thickness (PNT) and nasal bone (NB) for prediction of Down syndrome (DS) fetuses in the second trimester ultrasound examination.\n\n\nSTUDY DESIGN\nPNT was measured from stored two-dimensional fetal profile images taken at 15-23 weeks in 242 fetuses with normal karyotype (Group 1) and 24 fetuses with DS (Group 2). It was measured as the shortest distance from the anterior edge of the lowest part of the frontal bone to the skin. The efficacy of PNT, NB, PNT/NB and biparietal diameter (BPD)/NB was evaluated for prediction of DS.\n\n\nRESULTS\nPNT values increased with gestational age in normal fetuses. PNT measurement was ≥95th percentile in 54.2% (13/24) of the DS cases and 2.9% of the normal cases. Receiver operator curve analysis showed that PNT/NB ratio had the best area under the curve with a detection rate of 80% for a false positive rate of 5% at a cut-off value of 0.76.\n\n\nCONCLUSIONS\nPNT is increased in fetuses with DS as compared to normal fetuses. PNT/NB≥0.76 in the second trimester is a better predictor of DS than the use of PNT or NB alone.",
"title": ""
},
{
"docid": "5d80bf63f19f3aa271c0d16e179c90d6",
"text": "3D meshes are deployed in a wide range of application processes (e.g., transmission, compression, simplification, watermarking and so on) which inevitably introduce geometric distortions that may alter the visual quality of the rendered data. Hence, efficient model-based perceptual metrics, operating on the geometry of the meshes being compared, have been recently introduced to control and predict these visual artifacts. However, since the 3D models are ultimately visualized on 2D screens, it seems legitimate to use images of the models (i.e., snapshots from different viewpoints) to evaluate their visual fidelity. In this work we investigate the use of image metrics to assess the visual quality of 3D models. For this goal, we conduct a wide-ranging study involving several 2D metrics, rendering algorithms, lighting conditions and pooling algorithms, as well as several mean opinion score databases. The collected data allow (1) to determine the best set of parameters to use for this image-based quality assessment approach and (2) to compare this approach to the best performing model-based metrics and determine for which use-case they are respectively adapted. We conclude by exploring several applications that illustrate the benefits of image-based quality assessment.",
"title": ""
},
{
"docid": "95063d2a5b2df6c13c89ecfdceeb6c06",
"text": "This paper proposes a novel reference signal generation method for the unified power quality conditioner (UPQC) adopted to compensate current and voltage-quality problems of sensitive loads. The UPQC consists of a shunt and series converter having a common dc link. The shunt converter eliminates current harmonics originating from the nonlinear load side and the series converter mitigates voltage sag/swell originating from the supply side. The developed controllers for shunt and series converters are based on an enhanced phase-locked loop and nonlinear adaptive filter. The dc link control strategy is based on the fuzzy-logic controller. A fast sag/swell detection method is also presented. The efficacy of the proposed system is tested through simulation studies using the Power System Computer Aided Design/Electromagnetic Transients dc analysis program. The proposed UPQC achieves superior capability of mitigating the effects of voltage sag/swell and suppressing the load current harmonics under distorted supply conditions.",
"title": ""
}
] | scidocsrr |
9e5015fdd74d1cc798e4ddae4dd3f0e1 | RRA: Recurrent Residual Attention for Sequence Learning | [
{
"docid": "dadd12e17ce1772f48eaae29453bc610",
"text": "Publications Learning Word Vectors for Sentiment Analysis. Andrew L. Maas, Raymond E. Daly, Peter T. Pham, Dan Huang, Andrew Y. Ng, and Christopher Potts. The 49 th Annual Meeting of the Association for Computational Linguistics (ACL 2011). Spectral Chinese Restaurant Processes: Nonparametric Clustering Based on Similarities. Richard Socher, Andrew Maas, and Christopher D. Manning. The 15 th International Conference on Artificial Intelligence and Statistics (AISTATS 2010). A Probabilistic Model for Semantic Word Vectors. Andrew L. Maas and Andrew Y. Ng. NIPS 2010 Workshop on Deep Learning and Unsupervised Feature Learning. One-Shot Learning with Bayesian Networks. Andrew L. Maas and Charles Kemp. Proceedings of the 31 st",
"title": ""
}
] | [
{
"docid": "97e4facde730c97a080ed160682f5dd0",
"text": "The application of deep learning to symbolic domains remains an active research endeavour. Graph neural networks (GNN), consisting of trained neural modules which can be arranged in different topologies at run time, are sound alternatives to tackle relational problems which lend themselves to graph representations. In this paper, we show that GNNs are capable of multitask learning, which can be naturally enforced by training the model to refine a single set of multidimensional embeddings ∈ R and decode them into multiple outputs by connecting MLPs at the end of the pipeline. We demonstrate the multitask learning capability of the model in the relevant relational problem of estimating network centrality measures, i.e. is vertex v1 more central than vertex v2 given centrality c?. We then show that a GNN can be trained to develop a lingua franca of vertex embeddings from which all relevant information about any of the trained centrality measures can be decoded. The proposed model achieves 89% accuracy on a test dataset of random instances with up to 128 vertices and is shown to generalise to larger problem sizes. The model is also shown to obtain reasonable accuracy on a dataset of real world instances with up to 4k vertices, vastly surpassing the sizes of the largest instances with which the model was trained (n = 128). Finally, we believe that our contributions attest to the potential of GNNs in symbolic domains in general and in relational learning in particular.",
"title": ""
},
{
"docid": "c6d3f20e9d535faab83fb34cec0fdb5b",
"text": "Over the past two decades several attempts have been made to address the problem of face recognition and a voluminous literature has been produced. Current face recognition systems are able to perform very well in controlled environments e.g. frontal face recognition, where face images are acquired under frontal pose with strict constraints as defined in related face recognition standards. However, in unconstrained situations where a face may be captured in outdoor environments, under arbitrary illumination and large pose variations these systems fail to work. With the current focus of research to deal with these problems, much attention has been devoted in the facial feature extraction stage. Facial feature extraction is the most important step in face recognition. Several studies have been made to answer the questions like what features to use, how to describe them and several feature extraction techniques have been proposed. While many comprehensive literature reviews exist for face recognition a complete reference for different feature extraction techniques and their advantages/disadvantages with regards to a typical face recognition task in unconstrained scenarios is much needed. In this chapter we present a comprehensive review of the most relevant feature extraction techniques used in 2D face recognition and introduce a new feature extraction technique termed as Face-GLOH-signature to be used in face recognition for the first time (Sarfraz and Hellwich, 2008), which has a number of advantages over the commonly used feature descriptions in the context of unconstrained face recognition. The goal of feature extraction is to find a specific representation of the data that can highlight relevant information. This representation can be found by maximizing a criterion or can be a pre-defined representation. Usually, a face image is represented by a high dimensional vector containing pixel values (holistic representation) or a set of vectors where each vector summarizes the underlying content of a local region by using a high level 1",
"title": ""
},
{
"docid": "2c15bef67e6bdbfaf66e1164f8dddf52",
"text": "Social behavior is ordinarily treated as being under conscious (if not always thoughtful) control. However, considerable evidence now supports the view that social behavior often operates in an implicit or unconscious fashion. The identifying feature of implicit cognition is that past experience influences judgment in a fashion not introspectively known by the actor. The present conclusion--that attitudes, self-esteem, and stereotypes have important implicit modes of operation--extends both the construct validity and predictive usefulness of these major theoretical constructs of social psychology. Methodologically, this review calls for increased use of indirect measures--which are imperative in studies of implicit cognition. The theorized ordinariness of implicit stereotyping is consistent with recent findings of discrimination by people who explicitly disavow prejudice. The finding that implicit cognitive effects are often reduced by focusing judges' attention on their judgment task provides a basis for evaluating applications (such as affirmative action) aimed at reducing such unintended discrimination.",
"title": ""
},
{
"docid": "0ea6d4a02a4013a0f9d5aa7d27b5a674",
"text": "Recently, there has been growing interest in social network analysis. Graph models for social network analysis are usually assumed to be a deterministic graph with fixed weights for its edges or nodes. As activities of users in online social networks are changed with time, however, this assumption is too restrictive because of uncertainty, unpredictability and the time-varying nature of such real networks. The existing network measures and network sampling algorithms for complex social networks are designed basically for deterministic binary graphs with fixed weights. This results in loss of much of the information about the behavior of the network contained in its time-varying edge weights of network, such that is not an appropriate measure or sample for unveiling the important natural properties of the original network embedded in the varying edge weights. In this paper, we suggest that using stochastic graphs, in which weights associated with the edges are random variables, can be a suitable model for complex social network. Once the network model is chosen to be stochastic graphs, every aspect of the network such as path, clique, spanning tree, network measures and sampling algorithms should be treated stochastically. In particular, the network measures should be reformulated and new network sampling algorithms must be designed to reflect the stochastic nature of the network. In this paper, we first define some network measures for stochastic graphs, and then we propose four sampling algorithms based on learning automata for stochastic graphs. In order to study the performance of the proposed sampling algorithms, several experiments are conducted on real and synthetic stochastic graphs. The performances of these algorithms are studied in terms of Kolmogorov-Smirnov D statistics, relative error, Kendall’s rank correlation coefficient and relative cost.",
"title": ""
},
{
"docid": "746895b98974415f71912ed5dcd6ed61",
"text": "In the present study, Hu-Mikβ1, a humanized mAb directed at the shared IL-2/IL-15Rβ subunit (CD122) was evaluated in patients with T-cell large granular lymphocytic (T-LGL) leukemia. Hu-Mikβ1 blocked the trans presentation of IL-15 to T cells expressing IL-2/IL-15Rβ and the common γ-chain (CD132), but did not block IL-15 action in cells that expressed the heterotrimeric IL-15 receptor in cis. There was no significant toxicity associated with Hu-Mikβ1 administration in patients with T-LGL leukemia, but no major clinical responses were observed. One patient who had previously received murine Mikβ1 developed a measurable Ab response to the infused Ab. Nevertheless, the safety profile of this first in-human study of the humanized mAb to IL-2/IL-15Rβ (CD122) supports its evaluation in disorders such as refractory celiac disease, in which IL-15 and its receptor have been proposed to play a critical role in the pathogenesis and maintenance of disease activity.",
"title": ""
},
{
"docid": "215bb5273dbf5c301ae4170b5da39a34",
"text": "We describe a simple but effective method for cross-lingual syntactic transfer of dependency parsers, in the scenario where a large amount of translation data is not available. This method makes use of three steps: 1) a method for deriving cross-lingual word clusters, which can then be used in a multilingual parser; 2) a method for transferring lexical information from a target language to source language treebanks; 3) a method for integrating these steps with the density-driven annotation projection method of Rasooli and Collins (2015). Experiments show improvements over the state-of-the-art in several languages used in previous work, in a setting where the only source of translation data is the Bible, a considerably smaller corpus than the Europarl corpus used in previous work. Results using the Europarl corpus as a source of translation data show additional improvements over the results of Rasooli and Collins (2015). We conclude with results on 38 datasets from the Universal Dependencies corpora.",
"title": ""
},
{
"docid": "08ecf17772853fe198c96837d43cf572",
"text": "Long-lasting insecticidal nets (LLINs) and indoor residual spraying (IRS) interventions can reduce malaria transmission by targeting mosquitoes when they feed upon sleeping humans and/or when they rest inside houses, livestock shelters or other man-made structures. However, many malaria vector species can maintain robust transmission, despite high coverage of LLINs/IRS containing insecticides to which they are physiologically fully susceptible, because they exhibit one or more behaviours that define the biological limits of achievable impact with these interventions: (1) natural or insecticide-induced avoidance of contact with treated surfaces within houses and early exit from them, minimizing exposure hazard of vectors which feed indoors upon humans, (2) feeding upon humans when they are active and unprotected outdoors, attenuating personal protection and any consequent community-wide suppression of transmission, (3) feeding upon animals, minimizing contact with insecticides targeted at humans or houses, (4) resting outdoors, away from insecticide-treated surfaces of nets, walls and roofs. Residual malaria transmission is therefore defined as all forms of transmission that can persist after achieving full population-wide coverage with effective LLIN and/or IRS containing active ingredients to which local vector populations are fully susceptible. Residual transmission is sufficiently intense across most of the tropics to render malaria elimination infeasible without new or improved vector control methods. Many novel or improved vector control strategies to address residual transmission are emerging that either (1) enhance control of adult vectors that enter houses to feed and/or rest by killing, repelling or excluding them, (2) kill or repel adult mosquitoes when they attack people outdoors, (3) kill adult mosquitoes when they attack livestock, (4) kill adult mosquitoes when they feed upon sugar, or (5) kill immature mosquitoes at aquatic habitats. However, none of these options has sufficient supporting evidence to justify full-scale programmatic implementation so concerted investment in their rigorous selection, development and evaluation is required over the coming decade to enable control and, ultimately, elimination of residual malaria transmission. In the meantime, national programmes may assess options for addressing residual transmission under programmatic conditions through exploratory pilot studies with strong monitoring, evaluation and operational research components, similarly to the Onchocerciasis Control Programme.",
"title": ""
},
{
"docid": "8c31d750a503929a0776ae3b1e1d9f41",
"text": "Topic segmentation and labeling is often considered a prerequisite for higher-level conversation analysis and has been shown to be useful in many Natural Language Processing (NLP) applications. We present two new corpora of email and blog conversations annotated with topics, and evaluate annotator reliability for the segmentation and labeling tasks in these asynchronous conversations. We propose a complete computational framework for topic segmentation and labeling in asynchronous conversations. Our approach extends state-of-the-art methods by considering a fine-grained structure of an asynchronous conversation, along with other conversational features by applying recent graph-based methods for NLP. For topic segmentation, we propose two novel unsupervised models that exploit the fine-grained conversational structure, and a novel graph-theoretic supervised model that combines lexical, conversational and topic features. For topic labeling, we propose two novel (unsupervised) random walk models that respectively capture conversation specific clues from two different sources: the leading sentences and the fine-grained conversational structure. Empirical evaluation shows that the segmentation and the labeling performed by our best models beat the state-of-the-art, and are highly correlated with human annotations.",
"title": ""
},
{
"docid": "b2589260e4e8d26df598bb873646b7ec",
"text": "In this paper, the performance of a topological-metric visual-path-following framework is investigated in different environments. The framework relies on a monocular camera as the only sensing modality. The path is represented as a series of reference images such that each neighboring pair contains a number of common landmarks. Local 3-D geometries are reconstructed between the neighboring reference images to achieve fast feature prediction. This condition allows recovery from tracking failures. During navigation, the robot is controlled using image-based visual servoing. The focus of this paper is on the results from a number of experiments that were conducted in different environments, lighting conditions, and seasons. The experiments with a robot car show that the framework is robust to moving objects and moderate illumination changes. It is also shown that the system is capable of online path learning.",
"title": ""
},
{
"docid": "14a3e0f52760802ae74a21cd0cb66507",
"text": "Credit scoring has been regarded as a core appraisal tool of different institutions during the last few decades, and has been widely investigated in different areas, such as finance and accounting. Different scoring techniques are being used in areas of classification and prediction, where statistical techniques have conventionally been used. Both sophisticated and traditional techniques, as well as performance evaluation criteria are investigated in the literature. The principal aim of this paper is to carry out a comprehensive review of 214 articles/books/theses that involve credit scoring applications in various areas, in general, but primarily in finance and banking, in particular. This paper also aims to investigate how credit scoring has developed in importance, and to identify the key determinants in the construction of a scoring model, by means of a widespread review of different statistical techniques and performance evaluation criteria. Our review of literature revealed that there is no overall best statistical technique used in building scoring models and the best technique for all circumstances does not yet exist. Also, the applications of the scoring methodologies have been widely extended to include different areas, and this subsequently can help decision makers, particularly in banking, to predict their clients‟ behaviour. Finally, this paper also suggests a number of directions for future research.",
"title": ""
},
{
"docid": "e3bbd0ccc00cd545f11d05ab1421ed01",
"text": "The expectation-confirmation model (ECM) of IT continuance is a model for investigating continued information technology (IT) usage behavior. This paper reports on a study that attempts to expand the set of post-adoption beliefs in the ECM, in order to extend the application of the ECM beyond an instrumental focus. The expanded ECM, incorporating the post-adoption beliefs of perceived usefulness, perceived enjoyment and perceived ease of use, was empirically validated with data collected from an on-line survey of 811 existing users of mobile Internet services. The data analysis showed that the expanded ECM has good explanatory power (R 1⁄4 57:6% of continued IT usage intention and R 1⁄4 67:8% of satisfaction), with all paths supported. Hence, the expanded ECM can provide supplementary information that is relevant for understanding continued IT usage. The significant effects of post-adoption perceived ease of use and perceived enjoyment signify that the nature of the IT can be an important boundary condition in understanding the continued IT usage behavior. At a practical level, the expanded ECM presents IT product/service providers with deeper insights into how to address IT users’ satisfaction and continued patronage. r 2006 Elsevier Ltd. All rights reserved.",
"title": ""
},
{
"docid": "b8dae71335b9c6caa95bed38d32f102a",
"text": "Mining frequent closed itemsets provides complete and non-redundant results for frequent pattern analysis. Extensive studies have proposed various strategies for efficient frequent closed itemset mining, such as depth-first search vs. breadthfirst search, vertical formats vs. horizontal formats, tree-structure vs. other data structures, top-down vs. bottom-up traversal, pseudo projection vs. physical projection of conditional database, etc. It is the right time to ask \"what are the pros and cons of the strategies?\" and \"what and how can we pick and integrate the best strategies to achieve higher performance in general cases?\"In this study, we answer the above questions by a systematic study of the search strategies and develop a winning algorithm CLOSET+. CLOSET+ integrates the advantages of the previously proposed effective strategies as well as some ones newly developed here. A thorough performance study on synthetic and real data sets has shown the advantages of the strategies and the improvement of CLOSET+ over existing mining algorithms, including CLOSET, CHARM and OP, in terms of runtime, memory usage and scalability.",
"title": ""
},
{
"docid": "0dfd5345c2dc3fe047dcc635760ffedd",
"text": "This paper presents a fast, joint spatial- and Doppler velocity-based, probabilistic approach for ego-motion estimation for single and multiple radar-equipped robots. The normal distribution transform is used for the fast and accurate position matching of consecutive radar detections. This registration technique is successfully applied to laser-based scan matching. To overcome discontinuities of the original normal distribution approach, an appropriate clustering technique provides a globally smooth mixed-Gaussian representation. It is shown how this matching approach can be significantly improved by taking the Doppler information into account. The Doppler information is used in a density-based approach to extend the position matching to a joint likelihood optimization function. Then, the estimated ego-motion maximizes this function. Large-scale real world experiments in an urban environment using a 77 GHz radar show the robust and accurate ego-motion estimation of the proposed algorithm. In the experiments, comparisons are made to state-of-the-art algorithms, the vehicle odometry, and a high-precision inertial measurement unit.",
"title": ""
},
{
"docid": "c8f97cc28c124f08c161898f1c1023ad",
"text": "Nonnegative matrix factorization (NMF) is a widely-used method for low-rank approximation (LRA) of a nonnegative matrix (matrix with only nonnegative entries), where nonnegativity constraints are imposed on factor matrices in the decomposition. A large body of past work on NMF has focused on the case where the data matrix is complete. In practice, however, we often encounter with an incomplete data matrix where some entries are missing (e.g., a user-rating matrix). Weighted low-rank approximation (WLRA) has been studied to handle incomplete data matrix. However, there is only few work on weighted nonnegative matrix factorization (WNMF) that is WLRA with nonnegativity constraints. Existing WNMF methods are limited to a direct extension of NMF multiplicative updates, which suffer from slow convergence while the implementation is easy. In this paper we develop relatively fast and scalable algorithms for WNMF, borrowed from well-studied optimization techniques: (1) alternating nonnegative least squares; (2) generalized expectation maximization. Numerical experiments on MovieLens and Netflix prize datasets confirm the useful behavior of our methods, in a task of collaborative prediction.",
"title": ""
},
{
"docid": "f83017ad2454c465d19f70f8ba995e95",
"text": "The origins of life on Earth required the establishment of self-replicating chemical systems capable of maintaining and evolving biological information. In an RNA world, single self-replicating RNAs would have faced the extreme challenge of possessing a mutation rate low enough both to sustain their own information and to compete successfully against molecular parasites with limited evolvability. Thus theoretical analyses suggest that networks of interacting molecules were more likely to develop and sustain life-like behaviour. Here we show that mixtures of RNA fragments that self-assemble into self-replicating ribozymes spontaneously form cooperative catalytic cycles and networks. We find that a specific three-membered network has highly cooperative growth dynamics. When such cooperative networks are competed directly against selfish autocatalytic cycles, the former grow faster, indicating an intrinsic ability of RNA populations to evolve greater complexity through cooperation. We can observe the evolvability of networks through in vitro selection. Our experiments highlight the advantages of cooperative behaviour even at the molecular stages of nascent life.",
"title": ""
},
{
"docid": "87037d2da4c9fcf346023562a46773eb",
"text": "From the perspective of kinematics, dual-arm manipulation in robots differs from single-arm manipulation in that it requires high dexterity in a specific region of the manipulator’s workspace. This feature has motivated research on the specialized design of manipulators for dualarm robots. These recently introduced robots often utilize a shoulder structure with a tilted angle of some magnitude. The tilted shoulder yields better kinematic performance for dual-arm manipulation, such as a wider common workspace for each arm. However, this method tends to reduce total workspace volume, which results in lower kinematic performance for single-arm tasks in the outer region of the workspace. To overcome this trade-off, the authors of this study propose a design for a dual-arm robot with a biologically inspired four degree-of-freedom shoulder mechanism. This study analyzes the kinematic performance of the proposed design and compares it with that of a conventional dual-arm robot from the perspective of workspace and single-/dual-arm manipulability. The comparative analysis Electronic supplementary material The online version of this article (doi:10.1007/s11370-017-0215-z) contains supplementary material, which is available to authorized users. B Ji-Hun Bae joseph@kitech.re.kr Dong-Hyuk Lee donghyuk@kitech.re.kr Hyeonjun Park pionyy@kitech.re.kr Jae-Han Park hans1024@kitech.re.kr Moon-Hong Baeg mhbaeg@kitech.re.kr 1 Robot Control and Cognition Lab., Robot R&D Group, Korea Institute of Industrial Technology (KITECH), Ansan, Korea revealed that the proposed structure can significantly enhance singleand dual-arm kinematic performance in comparison with conventional dual-arm structures. This superior kinematic performance was verified through experiments, which showed that the proposed method required shorter settling time and trajectory-following performance than the conventional dual-arm robot.",
"title": ""
},
{
"docid": "3b2a3fc20a03d829e4c019fbdbc0f2ae",
"text": "First cars equipped with 24 GHz short range radar (SRR) systems in combination with 77 GHz long range radar (LRR) system enter the market in autumn 2005 enabling new safety and comfort functions. In Europe the 24 GHz ultra wideband (UWB) frequency band is temporally allowed only till end of June 2013 with a limitation of the car pare penetration of 7%. From middle of 2013 new cars have to be equipped with SRR sensors which operate in the frequency band of 79 GHz (77 GHz to 81 GHz). The development of the 79 GHz SRR technology within the German government (BMBF) funded project KOKON is described",
"title": ""
},
{
"docid": "c2da0c999b00aa25753dee4e5d4521b7",
"text": "Quality degradation and computational complexity are the major challenges for image interpolation algorithms. Advanced interpolation techniques achieve to preserve fine image details but typically suffer from lower computational efficiency, while simpler interpolation techniques lead to lower quality images. In this paper, we propose an edge preserving technique based on inverse gradient weights as well as pixel locations for interpolation. Experimental results confirm that the proposed algorithm exhibits better image quality compared to conventional algorithms. At the same time, our approach is shown to be faster than several advanced edge preserving interpolation algorithms.",
"title": ""
},
{
"docid": "d658b95cc9dc81d0dbb3918795ccab50",
"text": "A brain–computer interface (BCI) is a communication channel which does not depend on the brain’s normal output pathways of peripheral nerves and muscles [1–3]. It supplies paralyzed patients with a new approach to communicate with the environment. Among various brain monitoring methods employed in current BCI research, electroencephalogram (EEG) is the main interest due to its advantages of low cost, convenient operation and non-invasiveness. In present-day EEG-based BCIs, the following signals have been paid much attention: visual evoked potential (VEP), sensorimotor mu/beta rhythms, P300 evoked potential, slow cortical potential (SCP), and movement-related cortical potential (MRCP). Details about these signals can be found in chapter “Brain Signals for Brain–Computer Interfaces”. These systems offer some practical solutions (e.g., cursor movement and word processing) for patients with motor disabilities. In this chapter, practical designs of several BCIs developed in Tsinghua University will be introduced. First of all, we will propose the paradigm of BCIs based on the modulation of EEG rhythms and challenges confronting practical system designs. In Sect. 2, modulation and demodulation methods of EEG rhythms will be further explained. Furthermore, practical designs of a VEP-based BCI and a motor imagery based BCI will be described in Sect. 3. Finally, Sect. 4 will present some real-life application demos using these practical BCI systems.",
"title": ""
},
{
"docid": "5d17ff397a09da24945bb549a8bfd3ec",
"text": "For applications of 5G (5th generation mobile networks) communication systems, dual-polarized patch array antenna operating at 28.5 GHz is designed on the package substrate. To verify the radiation performance of designed antenna itself, a test package including two patch antennas is also design and its scattering parameters were measured. Using a large height of dielectric materials, 1.5 ∼ 2.0 GHz of antenna bandwidth is achieved which is wide enough. Besides, the dielectric constants are reduced to reflect variances of material properties in the higher frequency region. Measured results of the test package show a good performance at the operating frequency, indicating that the fabricated antenna package will perform well, either. In the future work, manufacturing variances will be investigated further.",
"title": ""
}
] | scidocsrr |
8bcf0a9eed2179d9bb6d3fa3a3e7f29e | Linear classifier design under heteroscedasticity in Linear Discriminant Analysis | [
{
"docid": "5d0a77058d6b184cb3c77c05363c02e0",
"text": "For two-class discrimination, Ref. [1] claimed that, when covariance matrices of the two classes were unequal, a (class) unbalanced dataset had a negative effect on the performance of linear discriminant analysis (LDA). Through re-balancing 10 realworld datasets, Ref. [1] provided empirical evidence to support the claim using AUC (Area Under the receiver operating characteristic Curve) as the performance metric. We suggest that such a claim is vague if not misleading, there is no solid theoretical analysis presented in [1], and AUC can lead to a quite different conclusion from that led to by misclassification error rate (ER) on the discrimination performance of LDA for unbalanced datasets. Our empirical and simulation studies suggest that, for LDA, the increase of the median of AUC (and thus the improvement of performance of LDA) from re-balancing is relatively small, while, in contrast, the increase of the median of ER (and thus the decline in performance of LDA) from re-balancing is relatively large. Therefore, from our study, there is no reliable empirical evidence to support the claim that a (class) unbalanced data set has a negative effect on the performance of LDA. In addition, re-balancing affects the performance of LDA for datasets with either equal or unequal covariance matrices, indicating that having unequal covariance matrices is not a key reason for the difference in performance between original and re-balanced data.",
"title": ""
}
] | [
{
"docid": "3c22c94c9ab99727840c2ca00c66c0f3",
"text": "The impact of numerous distributed generators (DGs) coupled with the implementation of virtual inertia on the transient stability of power systems has been studied extensively. Time-domain simulation is the most accurate and reliable approach to evaluate the dynamic behavior of power systems. However, the computational efficiency is restricted by their multi-time-scale property due to the combination of various DGs and synchronous generators. This paper presents a novel projective integration method (PIM) for the efficient transient stability simulation of power systems with high DG penetration. One procedure of the proposed PIM is decomposed into two stages, which adopt mixed explicit-implicit integration methods to achieve both efficiency and numerical stability. Moreover, the stability of the PIM is not affected by its parameter, which is related to the step size. Based on this property, an adaptive parameter scheme is developed based on error estimation to fit the time constants of the system dynamics and further increase the simulation speed. The presented approach is several times faster than the conventional integration methods with a similar level of accuracy. The proposed method is demonstrated using test systems with DGs and virtual synchronous generators, and the performance is verified against MATLAB/Simulink and DIgSILENT PowerFactory.",
"title": ""
},
{
"docid": "89297a4aef0d3251e8d947ccc2acacc7",
"text": "We propose a novel probabilistic framework for learning visual models of 3D object categories by combining appearance information and geometric constraints. Objects are represented as a coherent ensemble of parts that are consistent under 3D viewpoint transformations. Each part is a collection of salient image features. A generative framework is used for learning a model that captures the relative position of parts within each of the discretized viewpoints. Contrary to most of the existing mixture of viewpoints models, our model establishes explicit correspondences of parts across different viewpoints of the object class. Given a new image, detection and classification are achieved by determining the position and viewpoint of the model that maximize recognition scores of the candidate objects. Our approach is among the first to propose a generative probabilistic framework for 3D object categorization. We test our algorithm on the detection task and the viewpoint classification task by using “car” category from both the Savarese et al. 2007 and PASCAL VOC 2006 datasets. We show promising results in both the detection and viewpoint classification tasks on these two challenging datasets.",
"title": ""
},
{
"docid": "e2b74db574db8001dace37cbecb8c4eb",
"text": "Distributed key-value stores are now a standard component of high-performance web services and cloud computing applications. While key-value stores offer significant performance and scalability advantages compared to traditional databases, they achieve these properties through a restricted API that limits object retrieval---an object can only be retrieved by the (primary and only) key under which it was inserted. This paper presents HyperDex, a novel distributed key-value store that provides a unique search primitive that enables queries on secondary attributes. The key insight behind HyperDex is the concept of hyperspace hashing in which objects with multiple attributes are mapped into a multidimensional hyperspace. This mapping leads to efficient implementations not only for retrieval by primary key, but also for partially-specified secondary attribute searches and range queries. A novel chaining protocol enables the system to achieve strong consistency, maintain availability and guarantee fault tolerance. An evaluation of the full system shows that HyperDex is 12-13x faster than Cassandra and MongoDB for finding partially specified objects. Additionally, HyperDex achieves 2-4x higher throughput for get/put operations.",
"title": ""
},
{
"docid": "e599659ec215993598b98d26384ce6ac",
"text": "The Computer aided modeling and optimization analysis of crankshaft is to study was to evaluate and compare the fatigue performance of two competing manufacturing technologies for automotive crankshafts, namely forged steel and ductile cast iron. In this study a dynamic simulation was conducted on two crankshafts, cast iron and forged steel, from similar single cylinder four stroke engines.Finite element analyses was performed to obtain the variation of stress magnitude at critical locations. The dynamic analysis was done analytically and was verified by simulations in ANSYS.Results achived from aforementioned analysis were used in optimization of the forged steel crankshaft.Geometry,material and manufacturing processes were optimized considering different constraints,manufacturing feasibility and cost.The optimization process included geometry changes compatible with the current engine,fillet rolling and result in increased fatigue strength and reduced cost of the crankshaft, without changing connecting rod and engine block.",
"title": ""
},
{
"docid": "d2c202e120fecf444e77b08bd929e296",
"text": "Deep Learning has been applied successfully to speech processing. In this paper we propose an architecture for speech synthesis using multiple speakers. Some hidden layers are shared by all the speakers, while there is a specific output layer for each speaker. Objective and perceptual experiments prove that this scheme produces much better results in comparison with single speaker model. Moreover, we also tackle the problem of speaker interpolation by adding a new output layer (α-layer) on top of the multi-output branches. An identifying code is injected into the layer together with acoustic features of many speakers. Experiments show that the α-layer can effectively learn to interpolate the acoustic features between speakers.",
"title": ""
},
{
"docid": "49680e94843e070a5ed0179798f66f33",
"text": "Routing protocols for Wireless Sensor Networks (WSN) are designed to select parent nodes so that data packets can reach their destination in a timely and efficient manner. Typically neighboring nodes with strongest connectivity are more selected as parents. This Greedy Routing approach can lead to unbalanced routing loads in the network. Consequently, the network experiences the early death of overloaded nodes causing permanent network partition. Herein, we propose a framework for load balancing of routing in WSN. In-network path tagging is used to monitor network traffic load of nodes. Based on this, nodes are identified as being relatively overloaded, balanced or underloaded. A mitigation algorithm finds suitable new parents for switching from overloaded nodes. The routing engine of the child of the overloaded node is then instructed to switch parent. A key future of the proposed framework is that it is primarily implemented at the Sink and so requires few changes to existing routing protocols. The framework was implemented in TinyOS on TelosB motes and its performance was assessed in a testbed network and in TOSSIM simulation. The algorithm increased the lifetime of the network by 41 % as recorded in the testbed experiment. The Packet Delivery Ratio was also improved from 85.97 to 99.47 %. Finally a comparative study was performed using the proposed framework with various existing routing protocols.",
"title": ""
},
{
"docid": "f055f5f02b264b47c6218ea6683bcc7b",
"text": "Prepositions are very common and very ambiguous, and understanding their sense is critical for understanding the meaning of the sentence. Supervised corpora for the preposition-sense disambiguation task are small, suggesting a semi-supervised approach to the task. We show that signals from unannotated multilingual data can be used to improve supervised prepositionsense disambiguation. Our approach pre-trains an LSTM encoder for predicting the translation of a preposition, and then incorporates the pre-trained encoder as a component in a supervised classification system, and fine-tunes it for the task. The multilingual signals consistently improve results on two preposition-sense datasets.",
"title": ""
},
{
"docid": "41a74c1664143f602bdde3be9e26312f",
"text": "This paper presents a new class of gradient methods for distributed machine learning that adaptively skip the gradient calculations to learn with reduced communication and computation. Simple rules are designed to detect slowly-varying gradients and, therefore, trigger the reuse of outdated gradients. The resultant gradient-based algorithms are termed Lazily Aggregated Gradient — justifying our acronym LAG used henceforth. Theoretically, the merits of this contribution are: i) the convergence rate is the same as batch gradient descent in strongly-convex, convex, and nonconvex smooth cases; and, ii) if the distributed datasets are heterogeneous (quantified by certain measurable constants), the communication rounds needed to achieve a targeted accuracy are reduced thanks to the adaptive reuse of lagged gradients. Numerical experiments on both synthetic and real data corroborate a significant communication reduction compared to alternatives.",
"title": ""
},
{
"docid": "f499ea5160d1e787a51b456ee01c3814",
"text": "In this paper, a tri band compact octagonal fractal monopole MIMO antenna is presented. The proposed antenna is microstrip line fed and its structure is based on fractal geometry where the resonance frequency of antenna is lowered by applying iteration techniques. The simulated bandwidth of the antenna are 2.3706GHz to 2.45GHz, 3.398GHz to 3.677GHz and 4.9352GHz to 5.8988GHz (S11 <; -10 dB), covering the bands of WLAN and WiMAX. The characteristics of small size, nearly omnidirectional radiation pattern and moderate gain make the proposed MIMO antenna entirely applicable to WLAN and WiMAX applications. The proposed antenna has compact size of 50 mm × 50 mm. Details of the proposed antenna design and performance are presented and discussed.",
"title": ""
},
{
"docid": "3ddf6fab70092eade9845b04dd8344a0",
"text": "Fractional Fourier transform (FRFT) is a generalization of the Fourier transform, rediscovered many times over the past 100 years. In this paper, we provide an overview of recent contributions pertaining to the FRFT. Specifically, the paper is geared toward signal processing practitioners by emphasizing the practical digital realizations and applications of the FRFT. It discusses three major topics. First, the manuscripts relates the FRFT to other mathematical transforms. Second, it discusses various approaches for practical realizations of the FRFT. Third, we overview the practical applications of the FRFT. From these discussions, we can clearly state that the FRFT is closely related to other mathematical transforms, such as time–frequency and linear canonical transforms. Nevertheless, we still feel that major contributions are expected in the field of the digital realizations and its applications, especially, since many digital realizations of a b Purchase Export Previous article Next article Check if you have access through your login credentials or your institution.",
"title": ""
},
{
"docid": "843a56ac5a061e8131bd4ce3ff7238a5",
"text": "OBJECTIVE\nTo compare the efficacy of 2 atypical anti-psychotic drugs, olanzapine and risperidone, in the treatment of paradoxical insomnia.\n\n\nMETHODS\nIn this cross-sectional study over a 2-year period (September 2008 to September 2010), 29 patients with paradoxical insomnia, diagnosed in Kermanshah, Iran by both psychiatric interview and actigraphy, were randomly assigned to 2 groups. For 8 weeks, the first group (n=14) was treated with 10 mg olanzapine daily, and the second group (n=15) was treated with 4 mg risperidone daily. All participants completed the Pittsburgh Sleep Quality Inventory (PSQI) at baseline and at the end of the study.\n\n\nRESULTS\nAs expected, a baseline actigraphy analysis showed that total sleep time was not significantly different between the 2 treatment groups (p<0.3). In both groups, sleep quality was improved (p<0.001) with treatment. When comparing the 2 treatments directions, a significant difference emerged (9.21+/-2.35, 6.07+/-4.46) among the 2 treatment groups based on data from the PSQI. Patients who were treated with olanzapine showed greater improvement than patients who were treated by risperidone (p<0.04).\n\n\nCONCLUSION\nAtypical anti-psychotic drugs such as olanzapine and risperidone may be beneficial options for treatment of paradoxical insomnia. Larger clinical trials with longer periods of follow-up are needed for further investigation.",
"title": ""
},
{
"docid": "f78b6308d5fc78ec6440433af45925bb",
"text": "Recognizing the potentially ruinous effect of negative reviews on the reputation of the hosts as well as a subjective nature of the travel experience judgements, peer-to-peer accommodation sharing platforms, like Airbnb, have readily embraced the “response” option, empowering hosts with the voice to challenge, deny or at least apologize for the subject of critique. However, the effects of different response strategies on trusting beliefs towards the host remain unclear. To fill this gap, this study focuses on understanding the impact of different response strategies and review negativity on trusting beliefs towards the host in peer-to-peer accommodation sharing setting utilizing experimental methods. Examination of two different contexts, varying in the controllability of the subject of complaint, reveals that when the subject of complaint is controllable by a host, such strategies as confession / apology and denial can improve trusting beliefs towards the host. However, when the subject of criticism is beyond the control of the host, denial of the issue does not yield guest’s confidence in the host, whereas confession and excuse have positive influence on trusting beliefs.",
"title": ""
},
{
"docid": "b722f2fbdf20448e3a7c28fc6cab026f",
"text": "Alternative Mechanisms Rationale/Arguments/ Assumptions Connected Literature/Theory Resulting (Possible) Effect Support for/Against A1. Based on WTP and Exposure Theory A1a Light user segments (who are likely to have low WTP) are more likely to reduce (or even discontinue in extreme cases) their consumption of NYT content after the paywall implementation. Utility theory — WTP (Danaher 2002) Juxtaposing A1a and A1b leads to long tail effect due to the disproportionate reduction of popular content consumption (as a results of reduction of content consumption by light users). A1a. Supported (see the descriptive statistics in Table 11). A1b. Supported (see results from the postestimation of finite mixture model in Table 9) Since the resulting effects as well as both the assumptions (A1a and A1b) are supported, we suggest that there is support for this mechanism. A1b Light user segments are more likely to consume popular articles whereas the heavy user segment is more likely to consume a mix of niche articles and popular content. Exposure theory (McPhee 1963)",
"title": ""
},
{
"docid": "c5cc7fc9651ff11d27e08e1910a3bd20",
"text": "An omnidirectional circularly polarized (OCP) antenna operating at 28 GHz is reported and has been found to be a promising candidate for device-to-device (D2D) communications in the next generation (5G) wireless systems. The OCP radiation is realized by systematically integrating electric and magnetic dipole elements into a compact disc-shaped configuration (9.23 mm $^{3} =0.008~\\lambda _{0}^{3}$ at 28 GHz) in such a manner that they are oriented in parallel and radiate with the proper phase difference. The entire antenna structure was printed on a single piece of dielectric substrate using standard PCB manufacturing technologies and, hence, is amenable to mass production. A prototype OCP antenna was fabricated on Rogers 5880 substrate and was tested. The measured results are in good agreement with their simulated values and confirm the reported design concepts. Good OCP radiation patterns were produced with a measured peak realized RHCP gain of 2.2 dBic. The measured OCP overlapped impedance and axial ratio bandwidth was 2.2 GHz, from 26.5 to 28.7 GHz, an 8 % fractional bandwidth, which completely covers the 27.5 to 28.35 GHz band proposed for 5G cellular systems.",
"title": ""
},
{
"docid": "929f294583267ca8cb8616e803687f1e",
"text": "Recent systems for natural language understanding are strong at overcoming linguistic variability for lookup style reasoning. Yet, their accuracy drops dramatically as the number of reasoning steps increases. We present the first formal framework to study such empirical observations, addressing the ambiguity, redundancy, incompleteness, and inaccuracy that the use of language introduces when representing a hidden conceptual space. Our formal model uses two interrelated spaces: a conceptual meaning space that is unambiguous and complete but hidden, and a linguistic symbol space that captures a noisy grounding of the meaning space in the symbols or words of a language. We apply this framework to study the connectivity problem in undirected graphs---a core reasoning problem that forms the basis for more complex multi-hop reasoning. We show that it is indeed possible to construct a high-quality algorithm for detecting connectivity in the (latent) meaning graph, based on an observed noisy symbol graph, as long as the noise is below our quantified noise level and only a few hops are needed. On the other hand, we also prove an impossibility result: if a query requires a large number (specifically, logarithmic in the size of the meaning graph) of hops, no reasoning system operating over the symbol graph is likely to recover any useful property of the meaning graph. This highlights a fundamental barrier for a class of reasoning problems and systems, and suggests the need to limit the distance between the two spaces, rather than investing in multi-hop reasoning with\"many\"hops.",
"title": ""
},
{
"docid": "ea9bafe86af4418fa51abe27a2c2180b",
"text": "In this work, we propose a novel phenomenological model of the EEG signal based on the dynamics of a coupled Duffing-van der Pol oscillator network. An optimization scheme is adopted to match data generated from the model with clinically obtained EEG data from subjects under resting eyes-open (EO) and eyes-closed (EC) conditions. It is shown that a coupled system of two Duffing-van der Pol oscillators with optimized parameters yields signals with characteristics that match those of the EEG in both the EO and EC cases. The results, which are reinforced using statistical analysis, show that the EEG recordings under EC and EO resting conditions are clearly distinct realizations of the same underlying model occurring due to parameter variations with qualitatively different nonlinear dynamic characteristics. In addition, the interplay between noise and nonlinearity is addressed and it is shown that, for appropriately chosen values of noise intensity in the model, very good agreement exists between the model output and the EEG in terms of the power spectrum as well as Shannon entropy. In summary, the results establish that an appropriately tuned stochastic coupled nonlinear oscillator network such as the Duffing-van der Pol system could provide a useful framework for modeling and analysis of the EEG signal. In turn, design of algorithms based on the framework has the potential to positively impact the development of novel diagnostic strategies for brain injuries and disorders. © 2014 Elsevier Ltd. All rights reserved.",
"title": ""
},
{
"docid": "21c7cbcf02141c60443f912ae5f1208b",
"text": "A novel driving scheme based on simultaneous emission is reported for 2D/3D AMOLED TVs. The new method reduces leftright crosstalk without sacrificing luminance. The new scheme greatly simplifies the pixel circuit as the number of transistors for Vth compensation is reduced from 6 to 3. The capacitive load of scan lines is reduced by 48%, enabling very high refresh rate (240 Hz).",
"title": ""
},
{
"docid": "afd378cf5e492a9627e746254586763b",
"text": "Gradient-based optimization has enabled dramatic advances in computational imaging through techniques like deep learning and nonlinear optimization. These methods require gradients not just of simple mathematical functions, but of general programs which encode complex transformations of images and graphical data. Unfortunately, practitioners have traditionally been limited to either hand-deriving gradients of complex computations, or composing programs from a limited set of coarse-grained operators in deep learning frameworks. At the same time, writing programs with the level of performance needed for imaging and deep learning is prohibitively difficult for most programmers.\n We extend the image processing language Halide with general reverse-mode automatic differentiation (AD), and the ability to automatically optimize the implementation of gradient computations. This enables automatic computation of the gradients of arbitrary Halide programs, at high performance, with little programmer effort. A key challenge is to structure the gradient code to retain parallelism. We define a simple algorithm to automatically schedule these pipelines, and show how Halide's existing scheduling primitives can express and extend the key AD optimization of \"checkpointing.\"\n Using this new tool, we show how to easily define new neural network layers which automatically compile to high-performance GPU implementations, and how to solve nonlinear inverse problems from computational imaging. Finally, we show how differentiable programming enables dramatically improving the quality of even traditional, feed-forward image processing algorithms, blurring the distinction between classical and deep methods.",
"title": ""
},
{
"docid": "debb2bc6845eb2355c54c2599b40e102",
"text": "Graphs are used to model many real objects such as social networks and web graphs. Many real applications in various fields require efficient and effective management of large-scale, graph-structured data. Although distributed graph engines such as GBase and Pregel handle billion-scale graphs, users need to be skilled at managing and tuning a distributed system in a cluster, which is a non-trivial job for ordinary users. Furthermore, these distributed systems need many machines in a cluster in order to provide reasonable performance. Several recent works proposed non-distributed graph processing platforms as complements to distributed platforms. In fact, efficient non-distributed platforms require less hardware resource and can achieve better energy efficiency than distributed ones. GraphChi is a representative non-distributed platform that is disk-based and can process billions of edges on CPUs in a single PC. However, the design drawbacks of GraphChi on I/O and computation model have limited its parallelism and performance. In this paper, we propose a general, disk-based graph engine called gGraph to process billion-scale graphs efficiently by utilizing both CPUs and GPUs in a single PC. GGraph exploits full parallelism and full overlap of computation and I/O processing as much as possible. Experiment results show that gGraph outperforms GraphChi and PowerGraph. In addition, gGraph achieves the best energy efficiency among all evaluated platforms.",
"title": ""
},
{
"docid": "f49bb940c12e2eac57112862a564c95f",
"text": "Hydrogels in which cells are encapsulated are of great potential interest for tissue engineering applications. These gels provide a structure inside which cells can spread and proliferate. Such structures benefit from controlled microarchitectures that can affect the behavior of the enclosed cells. Microfabrication-based techniques are emerging as powerful approaches to generate such cell-encapsulating hydrogel structures. In this paper we introduce common hydrogels and their crosslinking methods and review the latest microscale approaches for generation of cell containing gel particles. We specifically focus on microfluidics-based methods and on techniques such as micromolding and electrospinning.",
"title": ""
}
] | scidocsrr |
ea214ffc910915536a269875faebe93b | Dynamic Deformation Analysis of Power Transformer Windings in Short-Circuit Fault by FEM | [
{
"docid": "e4e12d6395bac797fa42cb9a19c381cb",
"text": "The short-circuit force induces critical mechanical stress on a transformer. This paper deals with experimental verification and finite element analysis (FEA) for short-circuit force prediction of a 50 kVA dry-type transformer. We modeled high voltage (HV) winding into 20 sections and low voltage (LV) winding into 22 sections as similar as those windings of a model transformer. With this modeling technique, we could calculate electromagnetic forces acting on each section of the windings of a dry-type transformer under short-circuit condition. The magnetic vector potentials, magnetic flux densities, and electromagnetic forces due to short-circuit current are solved by FEA. The electromagnetic forces consisting of radial and axial directions depend both on short-circuit current and leakage flux density. These results were used as input source of sequential finite element method (FEM) to predict the resultant mechanical forces considering the structural characteristics such as stress distributions or deformations of windings, accurately. The obtained resultant mechanical forces in HV winding are compared with those of the experimental ones.",
"title": ""
}
] | [
{
"docid": "6db439b2753b9b6b8a298292410ca6f6",
"text": "MOTIVATION\nMost existing methods for predicting causal disease genes rely on specific type of evidence, and are therefore limited in terms of applicability. More often than not, the type of evidence available for diseases varies-for example, we may know linked genes, keywords associated with the disease obtained by mining text, or co-occurrence of disease symptoms in patients. Similarly, the type of evidence available for genes varies-for example, specific microarray probes convey information only for certain sets of genes. In this article, we apply a novel matrix-completion method called Inductive Matrix Completion to the problem of predicting gene-disease associations; it combines multiple types of evidence (features) for diseases and genes to learn latent factors that explain the observed gene-disease associations. We construct features from different biological sources such as microarray expression data and disease-related textual data. A crucial advantage of the method is that it is inductive; it can be applied to diseases not seen at training time, unlike traditional matrix-completion approaches and network-based inference methods that are transductive.\n\n\nRESULTS\nComparison with state-of-the-art methods on diseases from the Online Mendelian Inheritance in Man (OMIM) database shows that the proposed approach is substantially better-it has close to one-in-four chance of recovering a true association in the top 100 predictions, compared to the recently proposed Catapult method (second best) that has <15% chance. We demonstrate that the inductive method is particularly effective for a query disease with no previously known gene associations, and for predicting novel genes, i.e. genes that are previously not linked to diseases. Thus the method is capable of predicting novel genes even for well-characterized diseases. We also validate the novelty of predictions by evaluating the method on recently reported OMIM associations and on associations recently reported in the literature.\n\n\nAVAILABILITY\nSource code and datasets can be downloaded from http://bigdata.ices.utexas.edu/project/gene-disease.",
"title": ""
},
{
"docid": "c16f21fd2b50f7227ea852882004ef5b",
"text": "We study a stock dealer’s strategy for submitting bid and ask quotes in a limit order book. The agent faces an inventory risk due to the diffusive nature of the stock’s mid-price and a transactions risk due to a Poisson arrival of market buy and sell orders. After setting up the agent’s problem in a maximal expected utility framework, we derive the solution in a two step procedure. First, the dealer computes a personal indifference valuation for the stock, given his current inventory. Second, he calibrates his bid and ask quotes to the market’s limit order book. We compare this ”inventory-based” strategy to a ”naive” best bid/best ask strategy by simulating stock price paths and displaying the P&L profiles of both strategies. We find that our strategy has a P&L profile that has both a higher return and lower variance than the benchmark strategy.",
"title": ""
},
{
"docid": "bdb761f7af69d850e6f9aa91ce2b9aa1",
"text": "Stencil printing remains the technology route of choice for flip chip bumping because of its economical advantages over traditionally costly evaporation and electroplating processes. This paper provides the first research results on stencil printing of 80 μm and 60 μm pitch peripheral array configurations with Type 7 Sn63/Pb37 solder paste. In specific, the paste particle size ranges from 2 μm to 11μm with an average particle size of 6.5 μm taken into account for aperture packing considerations. Furthermore, the present study unveils the determining role of stencil design and paste characteristics on the final bumping results. The limitations of stencil design are discussed and guidelines for printing improvement are given. Printing of Type 7 solder paste has yielded promising results. Solder bump deposits of 25 μm and 42 μm have been demonstrated on 80 μm pitch rectangular and round pads, respectively. Stencil printing challenges at 60 μm pitch peripheral arrays are also discussed.",
"title": ""
},
{
"docid": "96bddddd86976f4dff0b984ef062704b",
"text": "How do the structures of the medial temporal lobe contribute to memory? To address this question, we examine the neurophysiological correlates of both recognition and associative memory in the medial temporal lobe of humans, monkeys, and rats. These cross-species comparisons show that the patterns of mnemonic activity observed throughout the medial temporal lobe are largely conserved across species. Moreover, these findings show that neurons in each of the medial temporal lobe areas can perform both similar as well as distinctive mnemonic functions. In some cases, similar patterns of mnemonic activity are observed across all structures of the medial temporal lobe. In the majority of cases, however, the hippocampal formation and surrounding cortex signal mnemonic information in distinct, but complementary ways.",
"title": ""
},
{
"docid": "b0e5885587ab3796fe1ed0490ddda1bd",
"text": "BACKGROUND\nEpicanthal deformity is one of the most frequently encountered cosmetic problems in Asian people. Herein, we introduce a new method for correction of epicanthal folds, which always is performed in combination with double eyelidplasty.\n\n\nMETHODS\nFirst, through upper and lower palpebral margin incisions, we release and excise the connective and orbicularis oculi muscle dense fibres underlying the epicanthal folds, as well as the superficial head of the medial canthal ligament. After repositioning the medial canthus in a double eyelidplastic procedure, we cut off the redundant skin tissue and close the incisions.\n\n\nRESULTS\n82 epicanthoplasties have been performed during the past 2 years. Follow-up time ranged from 1 to 32 months. Postsurgery scars were invisible in all cases. All patients were satisfied with the results. No recurrence of the epicanthal fold was observed.\n\n\nCONCLUSION\nThe new method introduced has advantages in avoiding scar formation and is an especially suitable approach for epicanthoplasty in Asian patients.",
"title": ""
},
{
"docid": "779a8cf77a038dd2d0f852e3bd6e78fe",
"text": "Systematic reviews are generally placed above narrative reviews in an assumed hierarchy of secondary research evidence. We argue that systematic reviews and narrative reviews serve different purposes and should be viewed as complementary. Conventional systematic reviews address narrowly focused questions; their key contribution is summarising data. Narrative reviews provide interpretation and critique; their key contribution is deepening understanding. This article is protected by copyright. All rights reserved.",
"title": ""
},
{
"docid": "a258b7049e03279c2831619aa829492a",
"text": "Ribonuclease III (RNase III) enzymes occur ubiquitously in biology and are responsible for processing RNA precursors into functional RNAs that participate in protein synthesis, RNA interference and a range of other cellular activities. Members of the RNase III enzyme family, including Escherichia coli RNase III, Rnt1, Dicer and Drosha, share the ability to recognize and cleave double-stranded RNA (dsRNA), typically at specific positions or sequences. Recent biochemical and structural data have shed new light on how RNase III enzymes catalyze dsRNA hydrolysis and how substrate specificity is achieved. A major theme emerging from these studies is that accessory domains present in different RNase III enzymes are the key determinants of substrate selectivity, which in turn dictates the specialized biological function of each type of RNase III protein.",
"title": ""
},
{
"docid": "ff0b13d3841913de36104e37cc893b26",
"text": "Modeling of intrabody communication (IBC) entails the understanding of the interaction between electromagnetic fields and living tissues. At the same time, an accurate model can provide practical hints toward the deployment of an efficient and secure communication channel for body sensor networks. In the literature, two main IBC coupling techniques have been proposed: galvanic and capacitive coupling. Nevertheless, models that are able to emulate both coupling approaches have not been reported so far. In this paper, a simple model based on a distributed parameter structure with the flexibility to adapt to both galvanic and capacitive coupling has been proposed. In addition, experimental results for both coupling methods were acquired by means of two harmonized measurement setups. The model simulations have been subsequently compared with the experimental data, not only to show their validity but also to revise the practical frequency operation range for both techniques. Finally, the model, along with the experimental results, has also allowed us to provide some practical rules to optimally tackle IBC design.",
"title": ""
},
{
"docid": "79b1e8eb4e3c074cd8d21c6ce10bb959",
"text": "To advance the realization of algae as a feedstock for biodiesel, process technologies and closed-loop biomass use must be optimized. Life-cycle analysis (LCA) of the biodiesel production process highlights the potential significant impact of improvements in the extraction of algal lipids and conversion into biodiesel. Further, a single-step lipid extraction and transesterification process was shown to have the highest energy rewards. This work investigates the potential for using scCO2 for the extraction and conversion process. scCO2 is shown to be an effective and selective solvent for extracting triglycerides from algal biomass. This work also explores the fundamental science necessary to achieve a one-pot approach that both extracts and transesterifies lipid from algae using supercritical carbon dioxide/methanol (scCO2/MeOH) and heterogeneous catalysts. A variety of basic and acidic heterogeneous catalysts have been surveyed for their effectiveness at transesterification of triglyceride (TG) to fatty acid methyl esters (FAME). Further the enhanced solubility of FAME over reaction intermediates, TG, and glycerol, is likely to provide a driving force for reaction. This research offers the foundations for a simple one-pot system wherein biodiesel can be directly, selectively, and sustainably produced from algae for further application in an algae",
"title": ""
},
{
"docid": "9f01314a03290cf3d481f731648eb138",
"text": "Recent advances in hardware and software for mobile computing have enabled a new breed of mobile AR systems and applications. A new breed of computing called “augmented ubiquitous computing” has resulted from the convergence of wearable computing, wireless networking and mobile AR interfaces. In this paper we provide a survey of different mobile and wireless technologies and how they have impact AR. Our goal is to place them into different categories so that it becomes easier to understand the state of art and to help identify new directions of research.",
"title": ""
},
{
"docid": "e4dd63dcf11cac8ebff7b53bae58a05a",
"text": "Earth orbiting satellites come in a wide range of shapes and sizes to meet a diverse variety of uses and applications. Large satellites with masses over 1000 kg support high-resolution remote sensing of the Earth, high bandwidth communications services, and world-class scientific studies but take lengthy developments and are costly to build and launch. The advent of commercially available, high-volume, and hence low-cost microelectronics has enabled a different approach through miniaturization. This results in physically far smaller satellites that dramatically reduce timescales and costs and that are able to provide operational and commercially viable services. This paper charts the evolution and rise of small satellites from being an early curiosity with limited utility through to the present where small satellites are a key element of modern space capabilities.",
"title": ""
},
{
"docid": "fadabf5ba39d455ca59cc9dc0b37f79b",
"text": "We propose a speech enhancement algorithm based on single- and multi-microphone processing techniques. The core of the algorithm estimates a time-frequency mask which represents the target speech and use masking-based beamforming to enhance corrupted speech. Specifically, in single-microphone processing, the received signals of a microphone array are treated as individual signals and we estimate a mask for the signal of each microphone using a deep neural network (DNN). With these masks, in multi-microphone processing, we calculate a spatial covariance matrix of noise and steering vector for beamforming. In addition, we propose a masking-based post-filter to further suppress the noise in the output of beamforming. Then, the enhanced speech is sent back to DNN for mask re-estimation. When these steps are iterated for a few times, we obtain the final enhanced speech. The proposed algorithm is evaluated as a frontend for automatic speech recognition (ASR) and achieves a 5.05% average word error rate (WER) on the real environment test set of CHiME-3, outperforming the current best algorithm by 13.34%.",
"title": ""
},
{
"docid": "28152cab5f477d9620edaab440467de2",
"text": "The ever-increasing density in cloud computing parties, i.e. users, services, providers and data centres, has led to a significant exponential growth in: data produced and transferred among the cloud computing parties; network traffic; and the energy consumed by the cloud computing massive infrastructure, which is required to respond quickly and effectively to users requests. Transferring big data volume among the aforementioned parties requires a high bandwidth connection, which consumes larger amounts of energy than just processing and storing big data on cloud data centres, and hence producing high carbon dioxide emissions. This power consumption is highly significant when transferring big data into a data centre located relatively far from the users geographical location. Thus, it became high-necessity to locate the lowest energy consumption route between the user and the designated data centre, while making sure the users requirements, e.g. response time, are met. The main contribution of this paper is GreeDi, a network-based routing algorithm to find the most energy efficient path to the cloud data centre for processing and storing big data. The algorithm is, first, formalised by the situation calculus. The linear, goal and dynamic programming approaches used to model the algorithm. The algorithm is then evaluated against the baseline shortest path algorithm with minimum number of nodes traversed, using a real Italian ISP physical network topology.",
"title": ""
},
{
"docid": "4852971924b06e1314b8946078e15b44",
"text": "In this work we introduce a graph theoretical method to compare MEPs, which is independent of molecular alignment. It is based on the edit distance of weighted rooted trees, which encode the geometrical and topological information of Negative Molecular Isopotential Surfaces. A meaningful chemical classification of a set of 46 molecules with different functional groups was achieved. Structure--activity relationships for the corticosteroid binding affinity (CBG) of 31 steroids by means of hierarchical clustering resulted in a clear partitioning in high, intermediate, and low activity groups, whereas the results from quantitative structure--activity relationships, obtained from a partial least-squares analysis, showed comparable or better cross-validated correlation coefficients than the ones reported for previous methods based solely in the MEP.",
"title": ""
},
{
"docid": "d925c828547a6d0685f5c4c040a00a76",
"text": "Least mean square (LMS) based adaptive algorithms have been attracted much attention since their low computational complexity and robust recovery capability. To exploit the channel sparsity, LMS-based adaptive sparse channel estimation methods, e.g., zero-attracting LMS (ZA-LMS), reweighted zero-attracting LMS (RZA-LMS) and Lp - norm sparse LMS (LP-LMS), have also been proposed. To take full advantage of channel sparsity, in this paper, we propose several improved adaptive sparse channel estimation methods using Lp -norm normalized LMS (LP-NLMS) and L0 -norm normalized LMS (L0-NLMS). Comparing with previous methods, effectiveness of the proposed methods is confirmed by computer simulations.",
"title": ""
},
{
"docid": "f71c8f16ffeaacf8e7d81b357957ad89",
"text": "Multi-antenna technologies such as beamforming and Multiple-Input, Multiple-Output (MIMO) are anticipated to play a key role in “5G” systems, which are expected to be deployed in the year 2020 and beyond. With a class of 5G systems expected to be deployed in both cm-wave (3-30 GHz) and mm-wave (30-300 GHz) bands, the unique characteristics and challenges of those bands have prompted a revisiting of the design and performance tradeoffs associated with existing multi-antenna techniques in order to determine the preferred framework for deploying MIMO technology in 5G systems. In this paper, we discuss key implementation issues surrounding the deployment of transmit MIMO processing for 5G systems. We describe MIMO architectures where the transmit MIMO processing is implemented at baseband, RF, and a combination of RF and baseband (a hybrid approach). We focus on the performance and implementation issues surrounding several candidate techniques for multi-user-MIMO (MU-MIMO) transmission in the mm-wave bands.",
"title": ""
},
{
"docid": "a2196e1ace9469ed1408f34ea67ee510",
"text": "Most current virtual reality (VR) interactions are mediated by hand-held input devices or hand gestures and they usually display only a partial representation of the user in the synthetic environment. We believe, representing the user as a full avatar that is controlled by natural movements of the person in the real world will lead to a greater sense of presence in VR. Possible applications exist in various domains such as entertainment, therapy, travel, real estate, education, social interaction and professional assistance. In this demo, we present MetaSpace, a virtual reality system that allows co-located users to explore a VR world together by walking around in physical space. Each user's body is represented by an avatar that is dynamically controlled by their body movements. We achieve this by tracking each user's body with a Kinect device such that their physical movements are mirrored in the virtual world. Users can see their own avatar and the other person's avatar allowing them to perceive and act intuitively in the virtual environment.",
"title": ""
},
{
"docid": "80f6d8109c56b6573c3c0a9a3bc989f8",
"text": "In coded aperture imaging the attainable quality of the reconstructed images strongly depends on the choice of the aperture pattern. Optimum mask patterns can be designed from binary arrays with constant sidelobes of their periodic autocorrelation function, the so{called URAs. However, URAs exist for a restricted number of aperture sizes and open fractions only. Using a mismatched lter decoding scheme, artifact{free reconstructions can be obtained even if the aperture array violates the URA condition. A general expression and an upper bound for the signal{to{noise ratio as a function of the aperture array and the relative detector noise level are derived. Combinatorial optimization algorithms, such as the Great Deluge algorithm, are employed for the design of near{optimum aperture arrays. The signal{to{noise ratio of the reconstructions is predicted to be only slightly inferior to the URA case while no restrictions with respect to the aperture size or open fraction are imposed.",
"title": ""
},
{
"docid": "b475a47a9c8e8aca82c236250bbbfc33",
"text": "OBJECTIVE\nTo issue a recommendation on the types and amounts of physical activity needed to improve and maintain health in older adults.\n\n\nPARTICIPANTS\nA panel of scientists with expertise in public health, behavioral science, epidemiology, exercise science, medicine, and gerontology.\n\n\nEVIDENCE\nThe expert panel reviewed existing consensus statements and relevant evidence from primary research articles and reviews of the literature.\n\n\nPROCESS\nAfter drafting a recommendation for the older adult population and reviewing drafts of the Updated Recommendation from the American College of Sports Medicine (ACSM) and the American Heart Association (AHA) for Adults, the panel issued a final recommendation on physical activity for older adults.\n\n\nSUMMARY\nThe recommendation for older adults is similar to the updated ACSM/AHA recommendation for adults, but has several important differences including: the recommended intensity of aerobic activity takes into account the older adult's aerobic fitness; activities that maintain or increase flexibility are recommended; and balance exercises are recommended for older adults at risk of falls. In addition, older adults should have an activity plan for achieving recommended physical activity that integrates preventive and therapeutic recommendations. The promotion of physical activity in older adults should emphasize moderate-intensity aerobic activity, muscle-strengthening activity, reducing sedentary behavior, and risk management.",
"title": ""
}
] | scidocsrr |
22239accc498928007bf36ee6dc778d7 | On Estimation and Selection for Topic Models | [
{
"docid": "c17e6363762e0e9683b51c0704d43fa7",
"text": "Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org/about/terms.html. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use.",
"title": ""
}
] | [
{
"docid": "8f704e4c4c2a0c696864116559a0f22c",
"text": "Friendships with competitors can improve the performance of organizations through the mechanisms of enhanced collaboration, mitigated competition, and better information exchange. Moreover, these benefits are best achieved when competing managers are embedded in a cohesive network of friendships (i.e., one with many friendships among competitors), since cohesion facilitates the verification of information culled from the network, eliminates the structural holes faced by customers, and facilitates the normative control of competitors. The first part of this analysis examines the performance implications of the friendship-network structure within the Sydney hotel industry, with performance being the yield (i.e., revenue per available room) of a given hotel. This shows that friendships with competitors lead to dramatic improvements in hotel yields. Performance is further improved if a manager’s competitors are themselves friends, evidencing the benefit of cohesive friendship networks. The second part of the analysis examines the structure of friendship ties among hotel managers and shows that friendships are more likely between managers who are competitors.",
"title": ""
},
{
"docid": "1f81e5e9851b4750aac009da5ae578a1",
"text": "This paper describes a method to automatically create dialogue resources annotated with dialogue act information by reusing existing dialogue corpora. Numerous dialogue corpora are available for research purposes and many of them are annotated with dialogue act information that captures the intentions encoded in user utterances. Annotated dialogue resources, however, differ in various respects: data collection settings and modalities used, dialogue task domains and scenarios (if any) underlying the collection, number and roles of dialogue participants involved and dialogue act annotation schemes applied. The presented study encompasses three phases of data-driven investigation. We, first, assess the importance of various types of features and their combinations for effective cross-domain dialogue act classification. Second, we establish the best predictive model comparing various cross-corpora training settings. Finally, we specify models adaptation procedures and explore late fusion approaches to optimize the overall classification decision taking process. The proposed methodology accounts for empirically motivated and technically sound classification procedures that may reduce annotation and training costs significantly.",
"title": ""
},
{
"docid": "7c8ab43cfd1c9e03b33a1454651512a7",
"text": "The authors investigated the extent to which touch, vision, and audition mediate the processing of statistical regularities within sequential input. Few researchers have conducted rigorous comparisons across sensory modalities; in particular, the sense of touch has been virtually ignored. The current data reveal not only commonalities but also modality constraints affecting statistical learning across the senses. To be specific, the authors found that the auditory modality displayed a quantitative learning advantage compared with vision and touch. In addition, they discovered qualitative learning biases among the senses: Primarily, audition afforded better learning for the final part of input sequences. These findings are discussed in terms of whether statistical learning is likely to consist of a single, unitary mechanism or multiple, modality-constrained ones.",
"title": ""
},
{
"docid": "f636dece7889f998fa10c19736d90a9a",
"text": "Our use of language depends upon two capacities: a mental lexicon of memorized words and a mental grammar of rules that underlie the sequential and hierarchical composition of lexical forms into predictably structured larger words, phrases, and sentences. The declarative/procedural model posits that the lexicon/grammar distinction in language is tied to the distinction between two well-studied brain memory systems. On this view, the memorization and use of at least simple words (those with noncompositional, that is, arbitrary form-meaning pairings) depends upon an associative memory of distributed representations that is subserved by temporal-lobe circuits previously implicated in the learning and use of fact and event knowledge. This \"declarative memory\" system appears to be specialized for learning arbitrarily related information (i.e., for associative binding). In contrast, the acquisition and use of grammatical rules that underlie symbol manipulation is subserved by frontal/basal-ganglia circuits previously implicated in the implicit (nonconscious) learning and expression of motor and cognitive \"skills\" and \"habits\" (e.g., from simple motor acts to skilled game playing). This \"procedural\" system may be specialized for computing sequences. This novel view of lexicon and grammar offers an alternative to the two main competing theoretical frameworks. It shares the perspective of traditional dual-mechanism theories in positing that the mental lexicon and a symbol-manipulating mental grammar are subserved by distinct computational components that may be linked to distinct brain structures. However, it diverges from these theories where they assume components dedicated to each of the two language capacities (that is, domain-specific) and in their common assumption that lexical memory is a rote list of items. Conversely, while it shares with single-mechanism theories the perspective that the two capacities are subserved by domain-independent computational mechanisms, it diverges from them where they link both capacities to a single associative memory system with broad anatomic distribution. The declarative/procedural model, but neither traditional dual- nor single-mechanism models, predicts double dissociations between lexicon and grammar, with associations among associative memory properties, memorized words and facts, and temporal-lobe structures, and among symbol-manipulation properties, grammatical rule products, motor skills, and frontal/basal-ganglia structures. In order to contrast lexicon and grammar while holding other factors constant, we have focused our investigations of the declarative/procedural model on morphologically complex word forms. Morphological transformations that are (largely) unproductive (e.g., in go-went, solemn-solemnity) are hypothesized to depend upon declarative memory. These have been contrasted with morphological transformations that are fully productive (e.g., in walk-walked, happy-happiness), whose computation is posited to be solely dependent upon grammatical rules subserved by the procedural system. Here evidence is presented from studies that use a range of psycholinguistic and neurolinguistic approaches with children and adults. It is argued that converging evidence from these studies supports the declarative/procedural model of lexicon and grammar.",
"title": ""
},
{
"docid": "07c43b1daa2520196e733b6efbd75a2b",
"text": "Disruptive digital technologies empower customers to define how they would like to interact with organizations. Consequently, organizations often struggle to implement an appropriate omni-channel strategy (OCS) that both meets customers’ interaction preferences and can be operated efficiently. Despite this strong practical need, research on omni-channel management predominantly adopts a descriptive perspective. There is little prescriptive knowledge to support organizations in assessing the business value of OCSs and comparing them accordingly. To address this research gap, we propose an economic decision model that helps select an appropriate OCS, considering online and offline channels, the opening and closing of channels, non-sequential customer journeys, and customers’ channel preferences. Drawing from investment theory and value-based management, the decision model recommends implementing the OCS with the highest contribution to an organization’s long-term firm value. We validate the decision model using real-world data on the omni-channel environment of a German financial service provider.",
"title": ""
},
{
"docid": "3c02edb767f39d38ede6310987ca5816",
"text": "OBJECTIVE\nThe Connor-Davidson Resilience Scale (CD-RISC) measures various aspects of psychological resilience in patients with posttraumatic stress disorder (PTSD) and other psychiatric ailments. This study sought to assess the reliability and validity of the Korean version of the Connor-Davidson Resilience Scale (K-CD-RISC).\n\n\nMETHODS\nIn total, 576 participants were enrolled (497 females and 79 males), including hospital nurses, university students, and firefighters. Subjects were evaluated using the K-CD-RISC, the Beck Depression Inventory (BDI), the Impact of Event Scale-Revised (IES-R), the Rosenberg Self-Esteem Scale (RSES), and the Perceived Stress Scale (PSS). Test-retest reliability and internal consistency were examined as a measure of reliability, and convergent validity and factor analysis were also performed to evaluate validity.\n\n\nRESULTS\nCronbach's alpha coefficient and test-retest reliability were 0.93 and 0.93, respectively. The total score on the K-CD-RISC was positively correlated with the RSES (r=0.56, p<0.01). Conversely, BDI (r=-0.46, p<0.01), PSS (r=-0.32, p<0.01), and IES-R scores (r=-0.26, p<0.01) were negatively correlated with the K-CD-RISC. The K-CD-RISC showed a five-factor structure that explained 57.2% of the variance.\n\n\nCONCLUSION\nThe K-CD-RISC showed good reliability and validity for measurement of resilience among Korean subjects.",
"title": ""
},
{
"docid": "8096886eff1b288561cbe75302e8c578",
"text": "In this paper, we develop a framework to classify supply chain risk management problems and approaches for the solution of these problems. We argue that risk management problems need to be handled at three levels strategic, operational and tactical. In addition, risk within the supply chain might manifest itself in the form of deviations, disruptions and disasters. To handle unforeseen events in the supply chain there are two obvious approaches: (1) to design chains with built in risk-tolerance and (2) to contain the damage once the undesirable event has occurred. Both of these approaches require a clear understanding of undesirable events that may take place in the supply chain and also the associated consequences and impacts from these events. We can then focus our efforts on mapping out the propagation of events in the supply chain due to supplier non-performance, and employ our insight to develop two mathematical programming based preventive models for strategic level deviation and disruption management. The first model, a simple integer quadratic optimization model, adapted from the Markowitz model, determines optimal partner selection with the objective of minimizing both the operational cost and the variability of total operational cost. The second model, a simple mixed integer programming optimization model, adapted from the credit risk minimization model, determines optimal partner selection such that the supply shortfall is minimized even in the face of supplier disruptions. Hence, both of these models offer possible approaches to robust supply chain design.",
"title": ""
},
{
"docid": "95fb51b0b6d8a3a88edfc96157233b10",
"text": "Various types of video can be captured with fisheye lenses; their wide field of view is particularly suited to surveillance video. However, fisheye lenses introduce distortion, and this changes as objects in the scene move, making fisheye video difficult to interpret. Current still fisheye image correction methods are either limited to small angles of view, or are strongly content dependent, and therefore unsuitable for processing video streams. We present an efficient and robust scheme for fisheye video correction, which minimizes time-varying distortion and preserves salient content in a coherent manner. Our optimization process is controlled by user annotation, and takes into account a wide set of measures addressing different aspects of natural scene appearance. Each is represented as a quadratic term in an energy minimization problem, leading to a closed-form solution via a sparse linear system. We illustrate our method with a range of examples, demonstrating coherent natural-looking video output. The visual quality of individual frames is comparable to those produced by state-of-the-art methods for fisheye still photograph correction.",
"title": ""
},
{
"docid": "406fab96a8fd49f4d898a9735ee1512f",
"text": "An otolaryngology phenol applicator kit can be successfully and safely used in the performance of chemical matricectomy. The applicator kit provides a convenient way to apply phenol to the nail matrix precisely and efficiently, whereas minimizing both the risk of application to nonmatrix surrounding soft tissue and postoperative recovery time.Given the smaller size of the foam-tipped applicator, we feel that this is a more precise tool than traditional cotton-tipped applicators for chemical matricectomy. Particularly with regard to lower extremity nail ablation and matricectomy, minimizing soft tissue inflammation could in turn reduce the risk of postoperative infections, decrease recovery time, as well and make for a more positive overall patient experience.",
"title": ""
},
{
"docid": "4f0274c2303560867fb1f4fe922db86f",
"text": "Cerebral activation was measured with positron emission tomography in ten human volunteers. The primary auditory cortex showed increased activity in response to noise bursts, whereas acoustically matched speech syllables activated secondary auditory cortices bilaterally. Instructions to make judgments about different attributes of the same speech signal resulted in activation of specific lateralized neural systems. Discrimination of phonetic structure led to increased activity in part of Broca's area of the left hemisphere, suggesting a role for articulatory recoding in phonetic perception. Processing changes in pitch produced activation of the right prefrontal cortex, consistent with the importance of right-hemisphere mechanisms in pitch perception.",
"title": ""
},
{
"docid": "3e83f454f66e8aba14733205c8e19753",
"text": "BACKGROUND\nNormal-weight adults gain lower-body fat via adipocyte hyperplasia and upper-body subcutaneous (UBSQ) fat via adipocyte hypertrophy.\n\n\nOBJECTIVES\nWe investigated whether regional fat loss mirrors fat gain and whether the loss of lower-body fat is attributed to decreased adipocyte number or size.\n\n\nDESIGN\nWe assessed UBSQ, lower-body, and visceral fat gains and losses in response to overfeeding and underfeeding in 23 normal-weight adults (15 men) by using dual-energy X-ray absorptiometry and abdominal computed tomography scans. Participants gained ∼5% of weight in 8 wk and lost ∼80% of gained fat in 8 wk. We measured abdominal subcutaneous and femoral adipocyte sizes and numbers after weight gain and loss.\n\n\nRESULTS\nVolunteers gained 3.1 ± 2.1 (mean ± SD) kg body fat with overfeeding and lost 2.4 ± 1.7 kg body fat with underfeeding. Although UBSQ and visceral fat gains were completely reversed after 8 wk of underfeeding, lower-body fat had not yet returned to baseline values. Abdominal and femoral adipocyte sizes, but not numbers, decreased with weight loss. Decreases in abdominal adipocyte size and UBSQ fat mass were correlated (ρ = 0.76, P = 0.001), as were decreases in femoral adipocyte size and lower-body fat (ρ = 0.49, P = 0.05).\n\n\nCONCLUSIONS\nUBSQ and visceral fat increase and decrease proportionately with a short-term weight gain and loss, whereas a gain of lower-body fat does not relate to the loss of lower-body fat. The loss of lower-body fat is attributed to a reduced fat cell size, but not number, which may result in long-term increases in fat cell numbers.",
"title": ""
},
{
"docid": "137b9760d265304560f1cac14edb7f21",
"text": "Gallstones are solid particles formed from bile in the gall bladder. In this paper, we propose a technique to automatically detect Gallstones in ultrasound images, christened as, Automated Gallstone Segmentation (AGS) Technique. Speckle Noise in the ultrasound image is first suppressed using Anisotropic Diffusion Technique. The edges are then enhanced using Unsharp Filtering. NCUT Segmentation Technique is then put to use to segment the image. Afterwards, edges are detected using Sobel Edge Detection. Further, Edge Thickening Process is used to smoothen the edges and probability maps are generated using Floodfill Technique. Then, the image is scribbled using Automatic Scribbling Technique. Finally, we get the segmented gallstone within the gallbladder using the Closed Form Matting Technique.",
"title": ""
},
{
"docid": "d9cf753cf3e7a73a69199e67fc7fcc3e",
"text": "Litz wire is useful for high-frequency power but has high cost, limited thermal conductivity, and decreased effectiveness above 1 MHz. Multiple parallel layers of foil have the potential to overcome these limitations, but techniques are needed to enforce current sharing between the foil layers, as is accomplished by twisting in litz wire. Four strategies for this include already known techniques for interchanging foil layer positions, which are reviewed, and three new approaches: 1) balancing flux linkage by adjusting spacing between layers, 2) using capacitance between layers to provide ballast impedance, and 3) adding miniature balancing transformers to the foil terminations. The methods are analyzed and their scope of applicability is compared.",
"title": ""
},
{
"docid": "c0c30c3b9539511e9079ec7894ad754f",
"text": "Cardiovascular disease remains the world's leading cause of death. Yet, we have known for decades that the vast majority of atherosclerosis and its subsequent morbidity and mortality are influenced predominantly by diet. This paper will describe a health-promoting whole food, plant-based diet; delineate macro- and micro-nutrition, emphasizing specific geriatric concerns; and offer guidance to physicians and other healthcare practitioners to support patients in successfully utilizing nutrition to improve their health.",
"title": ""
},
{
"docid": "4a16195478fcb1285ed5e5129a49199d",
"text": "BACKGROUND AND PURPOSE\nLittle research has been done regarding the attitudes and behaviors of physical therapists relative to the use of evidence in practice. The purposes of this study were to describe the beliefs, attitudes, knowledge, and behaviors of physical therapist members of the American Physical Therapy Association (APTA) as they relate to evidence-based practice (EBP) and to generate hypotheses about the relationship between these attributes and personal and practice characteristics of the respondents.\n\n\nMETHODS\nA survey of a random sample of physical therapist members of APTA resulted in a 48.8% return rate and a sample of 488 that was fairly representative of the national membership. Participants completed a questionnaire designed to determine beliefs, attitudes, knowledge, and behaviors regarding EBP, as well as demographic information about themselves and their practice settings. Responses were summarized for each item, and logistic regression analyses were used to examine relationships among variables.\n\n\nRESULTS\nRespondents agreed that the use of evidence in practice was necessary, that the literature was helpful in their practices, and that quality of patient care was better when evidence was used. Training, familiarity with and confidence in search strategies, use of databases, and critical appraisal tended to be associated with younger therapists with fewer years since they were licensed. Seventeen percent of the respondents stated they read fewer than 2 articles in a typical month, and one quarter of the respondents stated they used literature in their clinical decision making less than twice per month. The majority of the respondents had access to online information, although more had access at home than at work. According to the respondents, the primary barrier to implementing EBP was lack of time.\n\n\nDISCUSSION AND CONCLUSION\nPhysical therapists stated they had a positive attitude about EBP and were interested in learning or improving the skills necessary to implement EBP. They noted that they needed to increase the use of evidence in their daily practice.",
"title": ""
},
{
"docid": "7e736d4f906a28d4796fe7ac404b5f94",
"text": "The internal program representation chosen for a software development environment plays a critical role in the nature of that environment. A form should facilitate implementation and contribute to the responsiveness of the environment to the user. The program dependence graph (PDG) may be a suitable internal form. It allows programs to be sliced in linear time for debugging and for use by language-directed editors. The slices obtained are more accurate than those obtained with existing methods because I/O is accounted for correctly and irrelevant statements on multi-statement lines are not displayed. The PDG may be interpreted in a data driven fashion or may have highly optimized (including vectorized) code produced from it. It is amenable to incremental data flow analysis, improving response time to the user in an interactive environment and facilitating debugging through data flow anomaly detection. It may also offer a good basis for software complexity metrics, adding to the completeness of an environment based on it.",
"title": ""
},
{
"docid": "041b308fe83ac9d5a92e33fd9c84299a",
"text": "Spaceborne synthetic aperture radar systems are severely constrained to a narrow swath by ambiguity limitations. Here a vertically scanned-beam synthetic aperture system (SCANSAR) is proposed as a solution to this problem. The potential length of synthetic aperture must be shared between beam positions, so the along-track resolution is poorer; a direct tradeoff exists between resolution and swath width. The length of the real aperture is independently traded against the number of scanning positions. Design curves and equations are presented for spaceborne SCANSARs for altitudes between 400 and 1400 km and inner angles of incidence between 20° and 40°. When the real antenna is approximately square, it may also be used for a microwave radiometer. The combined radiometer and synthetic-aperture (RADISAR) should be useful for those applications where the poorer resolution of the radiometer is useful for some purposes, but the finer resolution of the radar is needed for others.",
"title": ""
},
{
"docid": "756929d22f107a5ff0b3bf0b19414a06",
"text": "Users of social networking sites such as Facebook frequently post self-portraits on their profiles. While research has begun to analyze the motivations for posting such pictures, less is known about how selfies are evaluated by recipients. Although producers of selfies typically aim to create a positive impression, selfies may also be regarded as narcissistic and therefore fail to achieve the intended goal. The aim of this study is to examine the potentially ambivalent reception of selfies compared to photos taken by others based on the Brunswik lens model Brunswik (1956). In a between-subjects online experiment (N = 297), Facebook profile mockups were shown which differed with regard to picture type (selfie vs. photo taken by others), gender of the profile owner (female vs. male), and number of individuals within a picture (single person vs. group). Results revealed that selfies were indeed evaluated more negatively than photos taken by others. Persons in selfies were rated as less trustworthy, less socially attractive, less open to new experiences, more narcissistic and more extroverted than the same persons in photos taken by others. In addition, gender differences were observed in the perception of pictures. Male profile owners were rated as more narcissistic and less trustworthy than female profile owners, but there was no significant interaction effect of type of picture and gender. Moreover, a mediation analysis of presumed motives for posting selfies revealed that negative evaluations of selfie posting individuals were mainly driven by the perceived motivation of impression management. Findings suggest that selfies are likely to be evaluated less positively than producers of selfies might suppose.",
"title": ""
},
{
"docid": "13055a3a35f058eb3622fb60afc436fc",
"text": "AIM\nTo investigate the probability of and factors influencing periapical status of teeth following primary (1°RCTx) or secondary (2°RCTx) root canal treatment.\n\n\nMETHODOLOGY\nThis prospective study involved annual clinical and radiographic follow-up of 1°RCTx (1170 roots, 702 teeth and 534 patients) or 2°RCTx (1314 roots, 750 teeth and 559 patients) carried out by Endodontic postgraduate students for 2-4 (50%) years. Pre-, intra- and postoperative data were collected prospectively on customized forms. The proportion of roots with complete periapical healing was estimated, and prognostic factors were investigated using multiple logistic regression models. Clustering effects within patients were adjusted in all models using robust standard error.\n\n\nRESULTS\nproportion of roots with complete periapical healing after 1°RCTx (83%; 95% CI: 81%, 85%) or 2°RCTx (80%; 95% CI: 78%, 82%) were similar. Eleven prognostic factors were identified. The conditions that were found to improve periapical healing significantly were: the preoperative absence of a periapical lesion (P = 0.003); in presence of a periapical lesion, the smaller its size (P ≤ 0.001), the better the treatment prognosis; the absence of a preoperative sinus tract (P = 0.001); achievement of patency at the canal terminus (P = 0.001); extension of canal cleaning as close as possible to its apical terminus (P = 0.001); the use of ethylene-diamine-tetra-acetic acid (EDTA) solution as a penultimate wash followed by final rinse with NaOCl solution in 2°RCTx cases (P = 0.002); abstaining from using 2% chlorexidine as an adjunct irrigant to NaOCl solution (P = 0.01); absence of tooth/root perforation (P = 0.06); absence of interappointment flare-up (pain or swelling) (P =0.002); absence of root-filling extrusion (P ≤ 0.001); and presence of a satisfactory coronal restoration (P ≤ 0.001).\n\n\nCONCLUSIONS\nSuccess based on periapical health associated with roots following 1°RCTx (83%) or 2°RCTx (80%) was similar, with 10 factors having a common effect on both, whilst the 11th factor 'EDTA as an additional irrigant' had different effects on the two treatments.",
"title": ""
},
{
"docid": "b475a47a9c8e8aca82c236250bbbfc33",
"text": "OBJECTIVE\nTo issue a recommendation on the types and amounts of physical activity needed to improve and maintain health in older adults.\n\n\nPARTICIPANTS\nA panel of scientists with expertise in public health, behavioral science, epidemiology, exercise science, medicine, and gerontology.\n\n\nEVIDENCE\nThe expert panel reviewed existing consensus statements and relevant evidence from primary research articles and reviews of the literature.\n\n\nPROCESS\nAfter drafting a recommendation for the older adult population and reviewing drafts of the Updated Recommendation from the American College of Sports Medicine (ACSM) and the American Heart Association (AHA) for Adults, the panel issued a final recommendation on physical activity for older adults.\n\n\nSUMMARY\nThe recommendation for older adults is similar to the updated ACSM/AHA recommendation for adults, but has several important differences including: the recommended intensity of aerobic activity takes into account the older adult's aerobic fitness; activities that maintain or increase flexibility are recommended; and balance exercises are recommended for older adults at risk of falls. In addition, older adults should have an activity plan for achieving recommended physical activity that integrates preventive and therapeutic recommendations. The promotion of physical activity in older adults should emphasize moderate-intensity aerobic activity, muscle-strengthening activity, reducing sedentary behavior, and risk management.",
"title": ""
}
] | scidocsrr |
ad3929e06206e98baf0d78b76e9d66a7 | A Novel Cogging Torque Reduction Method for Interior Type Permanent Magnet Motor | [
{
"docid": "2c92d42311f9708b7cb40f34551315e0",
"text": "This work characterizes electromagnetic excitation forces in interior permanent-magnet (IPM) brushless direct current (BLDC) motors and investigates their effects on noise and vibration. First, the electromagnetic excitations are classified into three sources: 1) so-called cogging torque, for which we propose an efficient technique of computation that takes into account saturation effects as a function of rotor position; 2) ripples of mutual and reluctance torque, for which we develop an equation to characterize the combination of space harmonics of inductances and flux linkages related to permanent magnets and time harmonics of current; and 3) fluctuation of attractive forces in the radial direction between the stator and rotor, for which we analyze contributions of electric currents as well as permanent magnets by the finite-element method. Then, the paper reports on an experimental investigation of influences of structural dynamic characteristics such as natural frequencies and mode shapes, as well as electromagnetic excitation forces, on noise and vibration in an IPM motor used in washing machines.",
"title": ""
}
] | [
{
"docid": "ed20f85a638c4e0079bac55db1d52d01",
"text": "Cloaking is a common 'bait-and-switch' technique used to hide the true nature of a Web site by delivering blatantly different semantic content to different user segments. It is often used in search engine optimization (SEO) to obtain user traffic illegitimately for scams. In this paper, we measure and characterize the prevalence of cloaking on different search engines, how this behavior changes for targeted versus untargeted advertising and ultimately the response to site cloaking by search engine providers. Using a custom crawler, called Dagger, we track both popular search terms (e.g., as identified by Google, Alexa and Twitter) and targeted keywords (focused on pharmaceutical products) for over five months, identifying when distinct results were provided to crawlers and browsers. We further track the lifetime of cloaked search results as well as the sites they point to, demonstrating that cloakers can expect to maintain their pages in search results for several days on popular search engines and maintain the pages themselves for longer still.",
"title": ""
},
{
"docid": "bab36592a2f3df97a8580169ad92adef",
"text": "Two hundred and nine pupils were randomly allocated to either a cognitive behaviourally based stress management intervention (SMI) group, or a non-intervention control group. Mood and motivation measures were administered pre and post intervention. Standardized examinations were taken 8-10 weeks later. As hypothesized, results indicated that an increase in the functionality of pupils' cognitions served as the mechanism by which mental health improved in the SMI group. In contrast, the control group demonstrated no such improvements. Also, as predicted, an increase in motivation accounted for the SMI group's significantly better performance on the standardized, academic assessments that comprise the United Kingdom's General Certificate of Secondary Education. Indeed, the magnitude of this enhanced performance was, on average, one-letter grade. Discussion focuses on the theoretical and practical implications of these findings.",
"title": ""
},
{
"docid": "89bec90bd6715a3907fba9f0f7655158",
"text": "Long text brings a big challenge to neural network based text matching approaches due to their complicated structures. To tackle the challenge, we propose a knowledge enhanced hybrid neural network (KEHNN) that leverages prior knowledge to identify useful information and filter out noise in long text and performs matching from multiple perspectives. The model fuses prior knowledge into word representations by knowledge gates and establishes three matching channels with words, sequential structures of text given by Gated Recurrent Units (GRUs), and knowledge enhanced representations. The three channels are processed by a convolutional neural network to generate high level features for matching, and the features are synthesized as a matching score by a multilayer perceptron. In this paper, we focus on exploring the use of taxonomy knowledge for text matching. Evaluation results from extensive experiments on public data sets of question answering and conversation show that KEHNN can significantly outperform state-of-the-art matching models and particularly improve matching accuracy on pairs with long text.",
"title": ""
},
{
"docid": "3eb022b3ec1517bc54670a68c8a14106",
"text": "Waste as a management issue has been evident for over four millennia. Disposal of waste to the biosphere has given way to thinking about, and trying to implement, an integrated waste management approach. In 1996 the United Nations Environmental Programme (UNEP) defined 'integrated waste management' as 'a framework of reference for designing and implementing new waste management systems and for analysing and optimising existing systems'. In this paper the concept of integrated waste management as defined by UNEP is considered, along with the parameters that constitute integrated waste management. The examples used are put into four categories: (1) integration within a single medium (solid, aqueous or atmospheric wastes) by considering alternative waste management options, (2) multi-media integration (solid, aqueous, atmospheric and energy wastes) by considering waste management options that can be applied to more than one medium, (3) tools (regulatory, economic, voluntary and informational) and (4) agents (governmental bodies (local and national), businesses and the community). This evaluation allows guidelines for enhancing success: (1) as experience increases, it is possible to deal with a greater complexity; and (2) integrated waste management requires a holistic approach, which encompasses a life cycle understanding of products and services. This in turn requires different specialisms to be involved in the instigation and analysis of an integrated waste management system. Taken together these advance the path to sustainability.",
"title": ""
},
{
"docid": "ef365e432e771c812300b654ceaff419",
"text": "OBJECTIVE\nPretreatment of myoinositol is a very new method that was evaluated in multiple small studies to manage poor ovarian response in assisted reproduction. This study was to determine the efficacy of myoinositol supplement in infertile women undergoing ovulation induction for intracytoplasmic sperm injection (ICSI) or in vitro fertilization embryo transfer (IVF-ET).\n\n\nMETHODS\nA meta-analysis and systematic review of published articles evaluating the efficacy of myo-inositol in patients undergoing ovulation induction for ICSI or IVF-ET was performed.\n\n\nRESULTS\nSeven trials with 935 women were included. Myoinositol supplement was associated with significantly improved clinical pregnancy rate [95% confidence interval (CI), 1.04-1.96; P = .03] and abortion rate (95% CI, 0.08-0.50; P = .0006). Meanwhile, Grade 1 embryos proportion (95% CI, 1.10-2.74; P = .02), germinal vescicle and degenerated oocytes retrieved (95% CI, 0.11-0.86; P = .02), and total amount of ovulation drugs (95% CI, -591.69 to -210.39; P = .001) were also improved in favor of myo-inositol. There were no significant difference in total oocytes retrieved, MII stage oocytes retrieved, stimulation days, and E2 peak level.\n\n\nCONCLUSIONS\nMyoinositol supplement increase clinical pregnancy rate in infertile women undergoing ovulation induction for ICSI or IVF-ET. It may improve the quality of embryos, and reduce the unsuitable oocytes and required amount of stimulation drugs.",
"title": ""
},
{
"docid": "394e20d6fd7f69ce2f5308951244328f",
"text": "Digital multimedia such as images and videos are prevalent on today’s internet and cause significant social impact, which can be evidenced by the proliferation of social networking sites with user generated contents. Due to the ease of generating and modifying images and videos, it is critical to establish trustworthiness for online multimedia information. In this paper, we propose a new framework to perform multimedia forensics by using compact side information to reconstruct the processing history of a multimedia document. We refer to this framework as FASHION, standing for Forensic hASH for informatION assurance. As a first step in the modular design for FASHION, we propose new algorithms based on Radon transform and scale space theory to effectively estimate the parameters of geometric transforms and detect local tampering that an image may have undergone. The FASHION framework is designed to answer a much broader range of questions regarding the processing history of multimedia data than simple binary decision from robust image hashing, and also offers more efficient and accurate forensic analysis than multimedia forensic techniques that do not use any side information.",
"title": ""
},
{
"docid": "7ecf315d70e6d438ef90ec76b192b65f",
"text": "Stress is a common condition, a response to a physical threat or psychological distress, that generates a host of chemical and hormonal reactions in the body. In essence, the body prepares to fight or fiee, pumping more blood to the heart and muscles and shutting down all nonessential functions. As a temporary state, this reaction serves the body well to defend itself When the stress reaction is prolonged, however, the normal physical functions that have in response either been exaggerated or shut down become dysfunctional. Many have noted the benefits of exercise in diminishing the stress response, and a host of studies points to these benefits. Yoga, too, has been recommended and studied in relationship to stress, although the studies are less scientifically replicable. Nonetheless, several researchers claim highly beneficial results from Yoga practice in alleviating stress and its effects. The practices recommended range from intense to moderate to relaxed asana sequences, along yNith.pranayama and meditation. In all these approaches to dealing with stress, one common element stands out: The process is as important as the activity undertaken. Because it fosters self-awareness. Yoga is a promising approach for dealing with the stress response. Yoga and the Stress Response Stress has become a common catchword in our society to indicate a host of difficulties, both as cause and effect. The American Academy of Family Physicians has noted that stress-related symptoms prompt two-thirds of the office visits to family physicians.' Exercise and alternative therapies are now commonly prescribed for stress-related complaints and illness. Even a recent issue of Consumer Reports suggests Yoga for stress relief.̂ Many books and articles claim, as does Dr. Susan Lark, that practicing Yoga will \"provide effective relief of anxiety and stress.\"^ But is this an accurate promise? What Is the Stress Response? A review of the current thinking on stress reveals that the process is both biochemical and psychological. A very good summary of research on the stress response is contained in Robert Sapolsky's Why Zebras Don't Get",
"title": ""
},
{
"docid": "4e5dd7032d9b3fc4563c893a26867e93",
"text": "User interaction in visual analytic systems is critical to enabling visual data exploration. Through interacting with visualizations, users engage in sensemaking, a process of developing and understanding relationships within datasets through foraging and synthesis. For example, two-dimensional layouts of high-dimensional data can be generated by dimension reduction models, and provide users with an overview of the relationships between information. However, exploring such spatializations can require expertise with the internal mechanisms and parameters of these models. The core contribution of this work is semantic interaction, capable of steering such models without requiring expertise in dimension reduction models, but instead leveraging the domain expertise of the user. Semantic interaction infers the analytical reasoning of the user with model updates, steering the dimension reduction model for visual data exploration. As such, it is an approach to user interaction that leverages interactions designed for synthesis, and couples them with the underlying mathematical model to provide computational support for foraging. As a result, semantic interaction performs incremental model learning to enable synergy between the user’s insights and the mathematical model. The contributions of this work are organized by providing a description of the principles of semantic interaction, providing design guidelines through the development of a visual analytic prototype, ForceSPIRE, and the evaluation of the impact of semantic interaction on the analytic process. The positive results of semantic interaction open a fundamentally new design space for designing user interactions in visual analytic systems. This research was funded in part by the National Science Foundation, CCF-0937071 and CCF-0937133, the Institute for Critical Technology and Applied Science at Virginia Tech, and the National Geospatial-Intelligence Agency contract #HMI1582-05-1-2001.",
"title": ""
},
{
"docid": "75a9715ce9eaffaa43df5470ad7cacca",
"text": "Resting frontal electroencephalographic (EEG) asymmetry has been hypothesized as a marker of risk for major depressive disorder (MDD), but the extant literature is based predominately on female samples. Resting frontal asymmetry was assessed on 4 occasions within a 2-week period in 306 individuals aged 18-34 (31% male) with (n = 143) and without (n = 163) lifetime MDD as defined by the Diagnostic and Statistical Manual of Mental Disorders, 4th edition (American Psychiatric Association, 1994). Lifetime MDD was linked to relatively less left frontal activity for both sexes using a current source density (CSD) reference, findings that were not accounted for solely by current MDD status or current depression severity, suggesting that CSD-referenced EEG asymmetry is a possible endophenotype for depression. In contrast, results for average and linked mastoid references were less consistent but demonstrated a link between less left frontal activity and current depression severity in women.",
"title": ""
},
{
"docid": "532980d1216f9f10332cc13b6a093fb4",
"text": "Several studies on sentence processing suggest that the mental lexicon keeps track of the mutual expectations between words. Current DSMs, however, represent context words as separate features, which causes the loss of important information for word expectations, such as word order and interrelations. In this paper, we present a DSM which addresses the issue by defining verb contexts as joint dependencies. We test our representation in a verb similarity task on two datasets, showing that joint contexts are more efficient than single dependencies, even with a relatively small amount of training data.",
"title": ""
},
{
"docid": "8eec38aad55b37482d6f93a5f909b945",
"text": "Linking or matching databases is becoming increasingly important in many data mining projects, as linked data can contain information that is not available otherwise, or that would be too expensive to collect manually. A main challenge when linking large databases is the classification of the compared record pairs into matches and non-matches. In traditional record linkage, classification thresholds have to be set either manually or using an EM-based approach. More recently developed classification methods are mainly based on supervised machine learning techniques and thus require training data, which is often not available in real world situations or has to be prepared manually. In this paper, a novel two-step approach to record pair classification is presented. In a first step, example training data of high quality is generated automatically, and then used in a second step to train a supervised classifier. Initial experimental results on both real and synthetic data show that this approach can outperform traditional unsupervised clustering, and even achieve linkage quality almost as good as fully supervised techniques.",
"title": ""
},
{
"docid": "0bcb2fdf59b88fca5760bfe456d74116",
"text": "A good distance metric is crucial for unsupervised learning from high-dimensional data. To learn a metric without any constraint or class label information, most unsupervised metric learning algorithms appeal to projecting observed data onto a low-dimensional manifold, where geometric relationships such as local or global pairwise distances are preserved. However, the projection may not necessarily improve the separability of the data, which is the desirable outcome of clustering. In this paper, we propose a novel unsupervised adaptive metric learning algorithm, called AML, which performs clustering and distance metric learning simultaneously. AML projects the data onto a low-dimensional manifold, where the separability of the data is maximized. We show that the joint clustering and distance metric learning can be formulated as a trace maximization problem, which can be solved via an iterative procedure in the EM framework. Experimental results on a collection of benchmark data sets demonstrated the effectiveness of the proposed algorithm.",
"title": ""
},
{
"docid": "ce04dd56c71acc8752b1965fd89d5c35",
"text": "Existing methods for 3D scene flow estimation often fail in the presence of large displacement or local ambiguities, e.g., at texture-less or reflective surfaces. However, these challenges are omnipresent in dynamic road scenes, which is the focus of this work. Our main contribution is to overcome these 3D motion estimation problems by exploiting recognition. In particular, we investigate the importance of recognition granularity, from coarse 2D bounding box estimates over 2D instance segmentations to fine-grained 3D object part predictions. We compute these cues using CNNs trained on a newly annotated dataset of stereo images and integrate them into a CRF-based model for robust 3D scene flow estimation - an approach we term Instance Scene Flow. We analyze the importance of each recognition cue in an ablation study and observe that the instance segmentation cue is by far strongest, in our setting. We demonstrate the effectiveness of our method on the challenging KITTI 2015 scene flow benchmark where we achieve state-of-the-art performance at the time of submission.",
"title": ""
},
{
"docid": "6264a8e43070f686375150b4beadaee7",
"text": "A control law for an integrated power/attitude control system (IPACS) for a satellite is presented. Four or more energy/momentum wheels in an arbitrary noncoplanar con guration and a set of three thrusters are used to implement the torque inputs. The energy/momentum wheels are used as attitude-control actuators, as well as an energy storage mechanism, providing power to the spacecraft. In that respect, they can replace the currently used heavy chemical batteries. The thrusters are used to implement the torques for large and fast (slew) maneuvers during the attitude-initialization and target-acquisition phases and to implement the momentum management strategies. The energy/momentum wheels are used to provide the reference-tracking torques and the torques for spinning up or down the wheels for storing or releasing kinetic energy. The controller published in a previous work by the authors is adopted here for the attitude-tracking function of the wheels. Power tracking for charging and discharging the wheels is added to complete the IPACS framework. The torques applied by the energy/momentum wheels are decomposed into two spaces that are orthogonal to each other, with the attitude-control torques and power-tracking torques in each space. This control law can be easily incorporated in an IPACS system onboard a satellite. The possibility of the occurrence of singularities, in which no arbitrary energy pro le can be tracked, is studied for a generic wheel cluster con guration. A standard momentum management scheme is considered to null the total angular momentum of the wheels so as to minimize the gyroscopic effects and prevent the singularity from occurring. A numerical example for a satellite in a low Earth near-polar orbit is provided to test the proposed IPACS algorithm. The satellite’s boresight axis is required to track a ground station, and the satellite is required to rotate about its boresight axis so that the solar panel axis is perpendicular to the satellite–sun vector.",
"title": ""
},
{
"docid": "a1b6fc8362fab0c062ad31a205e74898",
"text": "Air-gapped computers are disconnected from the Internet physically and logically. This measure is taken in order to prevent the leakage of sensitive data from secured networks. It has been shown that malware can exfiltrate data from air-gapped computers by transmitting ultrasonic signals via the computer’s speakers. However, such acoustic communication relies on the availability of speakers on a computer.",
"title": ""
},
{
"docid": "8fdb49c00aa8771ae69802ee1b16d664",
"text": "A deep Boltzmann machine (DBM) is a recently introduced Markov random field model that has multiple layers of hidden units. It has been shown empirically that it is difficult to train a DBM with approximate maximum-likelihood learning using the stochastic gradient unlike its simpler special case, restricted Boltzmann machines (RBM). In this paper, we propose a novel pretraining algorithm that consists of two stages; obtaining approximate posterior distributions over hidden units from a simpler model and maximizing the variational lower-bound given the fixed hidden posterior distributions. We show empirically that the proposed method overcomes the difficulty in training DBMs from randomly initialized parameters and results in a better, or comparable, generative model when compared to the conventional pretraining algorithm.",
"title": ""
},
{
"docid": "ce35e9efdddd5da0109794645270be8f",
"text": "The objective of generalized sampling expansion (GSE) is the reconstruction of an unknown, continuously defined function f (t) from samples of the responses from M linear time-invariant (LTI) systems that are each sampled using the 1/Mth Nyquist rate. In this paper, we investigate the GSE for lowpass and bandpass signals with multiple sampling rates in the fractional Fourier transform (FRFT) domain. First, we propose an improvement of Papoulis' GSE, which has multiple sampling rates in the FRFT domain. Based on the proposed GSE, we derive the periodic nonuniform sampling scheme and the derivative interpolation method by designing different fractional filters and selecting specific sampling rates. In addition, the Papoulis GSE and the previous GSE associated with FRFT are shown to be special instances of our results. Second, we address the problem of the GSE of fractional bandpass signals. A new GSE for fractional bandpass signals with equal sampling rates is derived. We show that the restriction of an even number of channels in the GSE for fractional bandpass signals is unnecessary, and perfect signal reconstruction is possible for any arbitrary number of channels. Further, we develop the GSE for a fractional bandpass signal with multiple sampling rates. Lastly, we discuss the application of the proposed method in the context of single-image super-resolution reconstruction based on GSE. Illustrations and simulations are presented to verify the validity and effectiveness of the proposed results.",
"title": ""
},
{
"docid": "0150caaaa121afdbf04dbf496d3770c3",
"text": "The use of interactive technologies to aid in the implementation of smart cities has a significant potential to support disabled users in performing their activities as citizens. In this study, we present an investigation of the accessibility of a sample of 10 mobile Android™ applications of Brazilian municipalities, two from each of the five big geographical regions of the country, focusing especially on users with visual disabilities. The results showed that many of the applications were not in accordance with accessibility guidelines, with an average of 57 instances of violations and an average of 11.6 different criteria violated per application. The main problems included issues like not addressing labelling of non-textual content, headings, identifying user location, colour contrast, enabling users to interact using screen reader gestures, focus visibility and lack of adaptation of text contained in image. Although the growth in mobile applications for has boosted the possibilities aligned with the principles of smart cities, there is a strong need for including accessibility in the design of such applications in order for disabled people to benefit from the potential they can have for their lives.",
"title": ""
},
{
"docid": "a9440a3eb37360176f5ee792da1dbdf3",
"text": "Background: Test quality is a prerequisite for achieving production system quality. While the concept of quality is multidimensional, most of the effort in testing context hasbeen channelled towards measuring test effectiveness. Objective: While effectiveness of tests is certainly important, we aim to identify a core list of testing principles that also address other quality facets of testing, and to discuss how they can be quantified as indicators of test quality. Method: We have conducted a two-day workshop with our industry partners to come up with a list of relevant principles and best practices expected to result in high quality tests. We then utilised our academic and industrial training materials together with recommendations in practitioner oriented testing books to refine the list. We surveyed existing literature for potential metrics to quantify identified principles. Results: We have identified a list of 15 testing principles to capture the essence of testing goals and best practices from quality perspective. Eight principles do not map toexisting test smells and we propose metrics for six of those. Further, we have identified additional potential metrics for the seven principles that partially map to test smells. Conclusion: We provide a core list of testing principles along with a discussion of possible ways to quantify them for assessing goodness of tests. We believe that our work wouldbe useful for practitioners in assessing the quality of their tests from multiple perspectives including but not limited to maintainability, comprehension and simplicity.",
"title": ""
},
{
"docid": "c09391a25defcb797a7c8da3f429fafa",
"text": "BACKGROUND\nTo examine the postulated relationship between Ambulatory Care Sensitive Conditions (ACSC) and Primary Health Care (PHC) in the US context for the European context, in order to develop an ACSC list as markers of PHC effectiveness and to specify which PHC activities are primarily responsible for reducing hospitalization rates.\n\n\nMETHODS\nTo apply the criteria proposed by Solberg and Weissman to obtain a list of codes of ACSC and to consider the PHC intervention according to a panel of experts. Five selection criteria: i) existence of prior studies; ii) hospitalization rate at least 1/10,000 or 'risky health problem'; iii) clarity in definition and coding; iv) potentially avoidable hospitalization through PHC; v) hospitalization necessary when health problem occurs. Fulfilment of all criteria was required for developing the final ACSC list. A sample of 248,050 discharges corresponding to 2,248,976 inhabitants of Catalonia in 1996 provided hospitalization rate data. A Delphi survey was performed with a group of 44 experts reviewing 113 ICD diagnostic codes (International Classification of Diseases, 9th Revision, Clinical Modification), previously considered to be ACSC.\n\n\nRESULTS\nThe five criteria selected 61 ICD as a core list of ACSC codes and 90 ICD for an expanded list.\n\n\nCONCLUSIONS\nA core list of ACSC as markers of PHC effectiveness identifies health conditions amenable to specific aspects of PHC and minimizes the limitations attributable to variations in hospital admission policies. An expanded list should be useful to evaluate global PHC performance and to analyse market responsibility for ACSC by PHC and Specialist Care.",
"title": ""
}
] | scidocsrr |
ec8ca1843aede3eba3652535c2ba7e56 | Arithmetic Coding for Data Compression | [
{
"docid": "bbf581230ec60c2402651d51e3a37211",
"text": "The state of the art in data compression is arithmetic coding, not the better-known Huffman method. Arithmetic coding gives greater compression, is faster for adaptive models, and clearly separates the model from the channel encoding.",
"title": ""
}
] | [
{
"docid": "eb761eb499b2dc82f7f2a8a8a5ff64a7",
"text": "We consider the situation in which digital data is to be reliably transmitted over a discrete, memoryless channel (dmc) that is subjected to a wire-tap at the receiver. We assume that the wire-tapper views the channel output via a second dmc). Encoding by the transmitter and decoding by the receiver are permitted. However, the code books used in these operations are assumed to be known by the wire-tapper. The designer attempts to build the encoder-decoder in such a way as to maximize the transmission rate R, and the equivocation d of the data as seen by the wire-tapper. In this paper, we find the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission. In particular, if d is equal to Hs, the entropy of the data source, then we consider that the transmission is accomplished in perfect secrecy. Our results imply that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy.",
"title": ""
},
{
"docid": "69d3c943755734903b9266ca2bd2fad1",
"text": "This paper describes experiments in Machine Learning for text classification using a new representation of text based on WordNet hypernyms. Six binary classification tasks of varying diff iculty are defined, and the Ripper system is used to produce discrimination rules for each task using the new hypernym density representation. Rules are also produced with the commonly used bag-of-words representation, incorporating no knowledge from WordNet. Experiments show that for some of the more diff icult tasks the hypernym density representation leads to significantly more accurate and more comprehensible rules.",
"title": ""
},
{
"docid": "c3f25271d25590bf76b36fee4043d227",
"text": "Over the past few decades, application of artificial neural networks (ANN) to time-series forecasting (TSF) has been growing rapidly due to several unique features of ANN models. However, to date, a consistent ANN performance over different studies has not been achieved. Many factors contribute to the inconsistency in the performance of neural network models. One such factor is that ANN modeling involves determining a large number of design parameters, and the current design practice is essentially heuristic and ad hoc, this does not exploit the full potential of neural networks. Systematic ANN modeling processes and strategies for TSF are, therefore, greatly needed. Motivated by this need, this paper attempts to develop an automatic ANN modeling scheme. It is based on the generalized regression neural network (GRNN), a special type of neural network. By taking advantage of several GRNN properties (i.e., a single design parameter and fast learning) and by incorporating several design strategies (e.g., fusing multiple GRNNs), we have been able to make the proposed modeling scheme to be effective for modeling large-scale business time series. The initial model was entered into the NN3 time-series competition. It was awarded the best prediction on the reduced dataset among approximately 60 different models submitted by scholars worldwide.",
"title": ""
},
{
"docid": "a09cb533a0a90a056857d597213efdf2",
"text": "一 引言 图像的边缘是图像的重要的特征,它给出了图像场景中物体的轮廓特征信息。当要对图 像中的某一个物体进行识别时,边缘信息是重要的可以利用的信息,例如在很多系统中采用 的模板匹配的识别算法。基于此,我们设计了一套基于 PCI Bus和 Vision Bus的可重构的机 器人视觉系统[3]。此系统能够实时的对图像进行采集,并可以通过系统实时的对图像进行 边缘的提取。 对于图像的边缘提取,采用二阶的边缘检测算子处理后要进行过零点检测,计算量很大 而且用硬件实现资源占用大且速度慢,所以在我们的视觉系统中,卷积器中选择的是一阶的 边缘检测算子。采用一阶的边缘检测算子进行卷积运算之后,仅仅需要对卷积得到的图像进 行阈值处理就可以得到图像的边缘,而阈值处理的操作用硬件实现占用资源少且速度快。由 于本视觉系统要求与应用环境下的精密装配机器人配合使用,系统的实时性要求非常高。因 此,如何对实时采集图像进行快速实时的边缘提取阈值的自动选取,是我们必须要考虑的问 题。 遗传算法是一种仿生物系统的基因进化的迭代搜索算法,其基本思想是由美国Michigan 大学的 J.Holland 教授提出的。由于遗传算法的整体寻优策略以及优化计算时不依赖梯度信 息,所以它具有很强的全局搜索能力,即对于解空间中的全局最优解有着很强的逼近能力。 它适用于问题结构不是十分清楚,总体很大,环境复杂的场合,而对于实时采集的图像进行 边缘检测阈值的选取就是此类问题。本文在对传统的遗传算法进行改进的基础上,提出了一 种对于实时采集图像进行边缘检测的阈值的自动选取方法。",
"title": ""
},
{
"docid": "a8d3a75cdc3bb43217a0120edf5025ff",
"text": "An important approach to text mining involves the use of natural-language information extraction. Information extraction (IE) distills structured data or knowledge from unstructured text by identifying references to named entities as well as stated relationships between such entities. IE systems can be used to directly extricate abstract knowledge from a text corpus, or to extract concrete data from a set of documents which can then be further analyzed with traditional data-mining techniques to discover more general patterns. We discuss methods and implemented systems for both of these approaches and summarize results on mining real text corpora of biomedical abstracts, job announcements, and product descriptions. We also discuss challenges that arise when employing current information extraction technology to discover knowledge in text.",
"title": ""
},
{
"docid": "71dd012b54ae081933bddaa60612240e",
"text": "This paper analyzes & compares four adders with different logic styles (Conventional, transmission gate, 14 transistors & GDI based technique) for transistor count, power dissipation, delay and power delay product. It is performed in virtuoso platform, using Cadence tool with available GPDK - 90nm kit. The width of NMOS and PMOS is set at 120nm and 240nm respectively. Transmission gate full adder has sheer advantage of high speed but consumes more power. GDI full adder gives reduced voltage swing not being able to pass logic 1 and logic 0 completely showing degraded output. Transmission gate full adder shows better performance in terms of delay (0.417530 ns), whereas 14T full adder shows better performance in terms of all three aspects.",
"title": ""
},
{
"docid": "79a20b9a059a2b4cc73120812c010495",
"text": "The present article summarizes the state of the art algorithms to compute the discrete Moreau envelope, and presents a new linear-time algorithm, named NEP for NonExpansive Proximal mapping. Numerical comparisons between the NEP and two existing algorithms: The Linear-time Legendre Transform (LLT) and the Parabolic Envelope (PE) algorithms are performed. Worst-case time complexity, convergence results, and examples are included. The fast Moreau envelope algorithms first factor the Moreau envelope as several one-dimensional transforms and then reduce the brute force quadratic worst-case time complexity to linear time by using either the equivalence with Fast Legendre Transform algorithms, the computation of a lower envelope of parabolas, or, in the convex case, the non expansiveness of the proximal mapping.",
"title": ""
},
{
"docid": "efe70da1a3118e26acf10aa480ad778d",
"text": "Background: Facebook (FB) is becoming an increasingly salient feature in peoples’ lives and has grown into a bastion in our current society with over 1 billion users worldwide –the majority of which are college students. However, recent studies conducted suggest that the use of Facebook may impacts individuals’ well being. Thus, this paper aimed to explore the effects of Facebook usage on adolescents’ emotional states of depression, anxiety, and stress. Method and Material: A cross sectional design was utilized in this investigation. The study population included 76 students enrolled in the Bachelor of Science in Nursing program from a government university in Samar, Philippines. Facebook Intensity Scale (FIS) and the Depression Anxiety and Stress Scale (DASS) were the primary instruments used in this study. Results: Findings indicated correlation coefficients of 0.11 (p=0.336), 0.07 (p=0.536), and 0.10 (p=0.377) between Facebook Intensity Scale (FIS) and Depression, Anxiety, and Stress scales in the DASS. Time spent on FBcorrelated significantly with depression (r=0.233, p=0.041) and anxiety (r=0.259, p=0.023). Similarly, the three emotional states (depression, anxiety, and stress) correlated significantly. Conclusions: Intensity of Facebook use is not directly related to negative emotional states. However, time spent on Facebooking increases depression and anxiety scores. Implications of the findings to the fields of counseling and psychology are discussed.",
"title": ""
},
{
"docid": "c487af41ead3ee0bc8fe6c95b356a80b",
"text": "With such a large volume of material accessible from the World Wide Web, there is an urgent need to increase our knowledge of factors in#uencing reading from screen. We investigate the e!ects of two reading speeds (normal and fast) and di!erent line lengths on comprehension, reading rate and scrolling patterns. Scrolling patterns are de\"ned as the way in which readers proceed through the text, pausing and scrolling. Comprehension and reading rate are also examined in relation to scrolling patterns to attempt to identify some characteristics of e!ective readers. We found a reduction in overall comprehension when reading fast, but the type of information recalled was not dependent on speed. A medium line length (55 characters per line) appears to support e!ective reading at normal and fast speeds. This produced the highest level of comprehension and was also read faster than short lines. Scrolling patterns associated with better comprehension (more time in pauses and more individual scrolling movements) contrast with scrolling patterns used by faster readers (less time in pauses between scrolling). Consequently, e!ective readers can only be de\"ned in relation to the aims of the reading task, which may favour either speed or accuracy. ( 2001 Academic Press",
"title": ""
},
{
"docid": "34623fb38c81af8efaf8e7073e4c43bc",
"text": "The k-means problem consists of finding k centers in R that minimize the sum of the squared distances of all points in an input set P from R to their closest respective center. Awasthi et. al. recently showed that there exists a constant ε′ > 0 such that it is NP-hard to approximate the k-means objective within a factor of 1 + ε′. We establish that the constant ε′ is at least 0.0013. For a given set of points P ⊂ R, the k-means problem consists of finding a partition of P into k clusters (C1, . . . , Ck) with corresponding centers (c1, . . . , ck) that minimize the sum of the squared distances of all points in P to their corresponding center, i.e. the quantity arg min (C1,...,Ck),(c1,...,ck) k ∑",
"title": ""
},
{
"docid": "455e3f0c6f755d78ecafcdff14c46014",
"text": "BACKGROUND\nIn neonatal and early childhood surgeries such as meningomyelocele repairs, closing deep wounds and oncological treatment, tensor fasciae lata (TFL) flaps are used. However, there are not enough data about structural properties of TFL in foetuses, which can be considered as the closest to neonates in terms of sampling. This study's main objective is to gather data about morphological structures of TFL in human foetuses to be used in newborn surgery.\n\n\nMATERIALS AND METHODS\nFifty formalin-fixed foetuses (24 male, 26 female) with gestational age ranging from 18 to 30 weeks (mean 22.94 ± 3.23 weeks) were included in the study. TFL samples were obtained by bilateral dissection and then surface area, width and length parameters were recorded. Digital callipers were used for length and width measurements whereas surface area was calculated using digital image analysis software.\n\n\nRESULTS\nNo statistically significant differences were found in terms of numerical value of parameters between sides and sexes (p > 0.05). Linear functions for TFL surface area, width, anterior and posterior margin lengths were calculated as y = -225.652 + 14.417 × age (weeks), y = -5.571 + 0.595 × age (weeks), y = -4.276 + 0.909 × age (weeks), and y = -4.468 + 0.779 × age (weeks), respectively.\n\n\nCONCLUSIONS\nLinear functions for TFL surface area, width and lengths can be used in designing TFL flap dimensions in newborn surgery. In addition, using those described linear functions can also be beneficial in prediction of TFL flap dimensions in autopsy studies.",
"title": ""
},
{
"docid": "89322e0d2b3566aeb85eeee9f505d5b2",
"text": "Parkinson's disease is a neurological disorder with evolving layers of complexity. It has long been characterised by the classical motor features of parkinsonism associated with Lewy bodies and loss of dopaminergic neurons in the substantia nigra. However, the symptomatology of Parkinson's disease is now recognised as heterogeneous, with clinically significant non-motor features. Similarly, its pathology involves extensive regions of the nervous system, various neurotransmitters, and protein aggregates other than just Lewy bodies. The cause of Parkinson's disease remains unknown, but risk of developing Parkinson's disease is no longer viewed as primarily due to environmental factors. Instead, Parkinson's disease seems to result from a complicated interplay of genetic and environmental factors affecting numerous fundamental cellular processes. The complexity of Parkinson's disease is accompanied by clinical challenges, including an inability to make a definitive diagnosis at the earliest stages of the disease and difficulties in the management of symptoms at later stages. Furthermore, there are no treatments that slow the neurodegenerative process. In this Seminar, we review these complexities and challenges of Parkinson's disease.",
"title": ""
},
{
"docid": "6033f644fb18ce848922a51d3b0000ab",
"text": "This paper tests two of the simplest and most popular trading rules moving average and trading range break, by utilitizing a very long data series, the Dow Jones index from 1897 to 1986. Standard statistical analysis is extended through the use .of bootstrap techniques. Overall our results provide strong support for the technical strategies that are explored. The returns obtained from buy (sell) signals are not consistent with the three popular null models: the random walk, the AR(I) and the GARCH-M. Consistently, buy signals generate higher returns than sell signals. Moreover, returns following sell signals are negative which is not easily explained by any of the currently existing equilibrium models. Furthermore the returns following buy signals are less volatile than returns following sell signals. The term, \"technical analysis,\" is a general heading for a myriad of trading techniques. Technical analysts attempt to forecast prices by the study of past prices and a few other related summary statistics about security trading. They believe that shifts in supply and demand can be detected in charts of market action. Technical analysis is considered by many to be the original form of investment analysis, dating back to the 1800's. It came into widespread use before the period of extensive and fully disclosed financial information, which in turn enabled the practice of fnndamental analysis to develop. In the U.S., the use of trading rules to detect patterns in stock prices is probably as old as the stock market itself. The oldest technique is attributed to Charles Dow and is traced to the late 1800's. Many of the techniques used today have been utilized for over 60 years. These techniques for discovering hidden relations in stock returns can range from extremely simple to quite elaborate. The attitude of academics towards technical analysis, until recently, is well described by Malkiel(1981): \"Obviously, I am biased against the chartist. This is not only a personal predilection, but a professional one as well. Technical analysis is anathema to, the academic world. We love to pick onit. Our bullying tactics' are prompted by two considerations: (1) the method is patently false; and (2) it's easy to pick on. And while it may seem a bit unfair to pick on such a sorry target, just remember': His your money we are trying to save.\" , Nonetheless, technical analysis has been enjoying a renaissance on Wall Street. All major brokerage firms publish technical commentary on the market and individual securities\" and many of the newsletters published by various \"experts\" are based on technical analysis. In recent years the efficient market hypothesis has come under serious siege. Various papers suggested that stock returns are not fully explained by common risk measures. A significant relationship between expected return and fundamental variables such as price-earnings ratio, market-to, book ratio and size was documented. Another group ofpapers has uncovered systematic patterns in stock returns related to various calendar periods such as the weekend effect, the tnrn-of-the-month effect, the holiday effect and the, January effect. A line of research directly related to this work provides evidence of predictability of equity returns from past returns. De Bandt and Thaler(1985), Fama and French(1986), and Poterba and Summers(1988) find negative serial correlation in returns of individual stocks aid various portfolios over three to ten year intervals. Rosenberg, Reid, and Lanstein(1985) provide evidence for the presence of predictable return reversals on a monthly basis",
"title": ""
},
{
"docid": "f4b0a7e2ab8728b682b8d399a887c3df",
"text": "This paper presents a framework for localization or grounding of phrases in images using a large collection of linguistic and visual cues.1 We model the appearance, size, and position of entity bounding boxes, adjectives that contain attribute information, and spatial relationships between pairs of entities connected by verbs or prepositions. We pay special attention to relationships between people and clothing or body part mentions, as they are useful for distinguishing individuals. We automatically learn weights for combining these cues and at test time, perform joint inference over all phrases in a caption. The resulting system produces a 4% improvement in accuracy over the state of the art on phrase localization on the Flickr30k Entities dataset [25] and a 4-10% improvement for visual relationship detection on the Stanford VRD dataset [20].",
"title": ""
},
{
"docid": "90d1d78d3d624d3cb1ecc07e8acaefd4",
"text": "Wheat straw is an abundant agricultural residue with low commercial value. An attractive alternative is utilization of wheat straw for bioethanol production. However, production costs based on the current technology are still too high, preventing commercialization of the process. In recent years, progress has been made in developing more effective pretreatment and hydrolysis processes leading to higher yield of sugars. The focus of this paper is to review the most recent advances in pretreatment, hydrolysis and fermentation of wheat straw. Based on the type of pretreatment method applied, a sugar yield of 74-99.6% of maximum theoretical was achieved after enzymatic hydrolysis of wheat straw. Various bacteria, yeasts and fungi have been investigated with the ethanol yield ranging from 65% to 99% of theoretical value. So far, the best results with respect to ethanol yield, final ethanol concentration and productivity were obtained with the native non-adapted Saccharomyses cerevisiae. Some recombinant bacteria and yeasts have shown promising results and are being considered for commercial scale-up. Wheat straw biorefinery could be the near-term solution for clean, efficient and economically-feasible production of bioethanol as well as high value-added products.",
"title": ""
},
{
"docid": "8646bc8ddeadf17e443e5ddcf705e492",
"text": "This paper proposes a model predictive control (MPC) scheme for the interleaved dc-dc boost converter with coupled inductors. The main control objectives are the regulation of the output voltage to its reference value, despite changes in the input voltage and the load, and the equal sharing of the load current by the two circuit inductors. An inner control loop, using MPC, regulates the input current to its reference that is provided by the outer loop, which is based on a load observer. Simulation results are provided to highlight the performance of the proposed control scheme.",
"title": ""
},
{
"docid": "2113655d3467fbdbf7769e36952d2a6f",
"text": "The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system and the amount of protection offered by privacy-enhancing technologies. In this way, privacy metrics contribute to improving user privacy in the digital world. The diversity and complexity of privacy metrics in the literature make an informed choice of metrics challenging. As a result, instead of using existing metrics, new metrics are proposed frequently, and privacy studies are often incomparable. In this survey, we alleviate these problems by structuring the landscape of privacy metrics. To this end, we explain and discuss a selection of over 80 privacy metrics and introduce categorizations based on the aspect of privacy they measure, their required inputs, and the type of data that needs protection. In addition, we present a method on how to choose privacy metrics based on nine questions that help identify the right privacy metrics for a given scenario, and highlight topics where additional work on privacy metrics is needed. Our survey spans multiple privacy domains and can be understood as a general framework for privacy measurement.",
"title": ""
},
{
"docid": "b0901a572ecaaeb1233b92d5653c2f12",
"text": "This qualitative study offers a novel exploration of the links between social media, virtual intergroup contact, and empathy by examining how empathy is expressed through interactions on a popular social media blog. Global leaders are encouraging individuals to engage in behaviors and support policies that provide basic social foundations. It is difficult to motivate people to undertake such actions. However, research shows that empathy intensifies motivation to help others. It can cause individuals to see the world from the perspective of stigmatized group members and increase positive feelings. Social media offers a new pathway for virtual intergroup contact, providing opportunities to increase conversation about disadvantaged others and empathy. We examined expressions of empathy within a popular blog, Humans of New York (HONY), and engaged in purposeful case selection by focusing on (1) events where specific prosocial action was taken corresponding to interactions on the HONY blog and (2) presentation of people in countries other than the United States. Nine overarching themes; (1) perspective taking, (2) fantasy, (3) empathic concern, (4) personal distress, (5) relatability, (6) prosocial action, (7) community appreciation, (8) anti-empathy, and (9) rejection of anti-empathy, exemplify how the HONY community expresses and shares empathic thoughts and feelings.",
"title": ""
},
{
"docid": "976aee37c264dbf53b7b1fbbf0d583c4",
"text": "This paper applies Halliday's (1994) theory of the interpersonal, ideational and textual meta-functions of language to conceptual metaphor. Starting from the observation that metaphoric expressions tend to be organized in chains across texts, the question is raised what functions those expressions serve in different parts of a text as well as in relation to each other. The empirical part of the article consists of the sample analysis of a business magazine text on marketing. This analysis is two-fold, integrating computer-assisted quantitative investigation with qualitative research into the organization and multifunctionality of metaphoric chains as well as the cognitive scenarios evolving from those chains. The paper closes by summarizing the main insights along the lines of the three Hallidayan meta-functions of conceptual metaphor and suggesting functional analysis of metaphor at levels beyond that of text. Im vorliegenden Artikel wird Hallidays (1994) Theorie der interpersonellen, ideellen und textuellen Metafunktion von Sprache auf das Gebiet der konzeptuellen Metapher angewandt. Ausgehend von der Beobachtung, dass metaphorische Ausdrücke oft in textumspannenden Ketten angeordnet sind, wird der Frage nachgegangen, welche Funktionen diese Ausdrücke in verschiedenen Teilen eines Textes und in Bezug aufeinander erfüllen. Der empirische Teil der Arbeit besteht aus der exemplarischen Analyse eines Artikels aus einem Wirtschaftsmagazin zum Thema Marketing. Diese Analysis gliedert sich in zwei Teile und verbindet computergestütze quantitative Forschung mit einer qualitativen Untersuchung der Anordnung und Multifunktionalität von Metaphernketten sowie der kognitiven Szenarien, die aus diesen Ketten entstehen. Der Aufsatz schließt mit einer Zusammenfassung der wesentlichen Ergebnisse im Licht der Hallidayschen Metafunktionen konzeptueller Metaphern und gibt einen Ausblick auf eine funktionale Metaphernanalyse, die über die rein textuelle Ebene hinausgeht.",
"title": ""
},
{
"docid": "9cea5720bdba8af6783d9e9f8bc7b7d1",
"text": "BACKGROUND\nFeasible, cost-effective instruments are required for the surveillance of moderate-to-vigorous physical activity (MVPA) and sedentary behaviour (SB) and to assess the effects of interventions. However, the evidence base for the validity and reliability of the World Health Organisation-endorsed Global Physical Activity Questionnaire (GPAQ) is limited. We aimed to assess the validity of the GPAQ, compared to accelerometer data in measuring and assessing change in MVPA and SB.\n\n\nMETHODS\nParticipants (n = 101) were selected randomly from an on-going research study, stratified by level of physical activity (low, moderate or highly active, based on the GPAQ) and sex. Participants wore an accelerometer (Actigraph GT3X) for seven days and completed a GPAQ on Day 7. This protocol was repeated for a random sub-sample at a second time point, 3-6 months later. Analysis involved Wilcoxon-signed rank tests for differences in measures, Bland-Altman analysis for the agreement between measures for median MVPA and SB mins/day, and Spearman's rho coefficient for criterion validity and extent of change.\n\n\nRESULTS\n95 participants completed baseline measurements (44 females, 51 males; mean age 44 years, (SD 14); measurements of change were calculated for 41 (21 females, 20 males; mean age 46 years, (SD 14). There was moderate agreement between GPAQ and accelerometer for MVPA mins/day (r = 0.48) and poor agreement for SB (r = 0.19). The absolute mean difference (self-report minus accelerometer) for MVPA was -0.8 mins/day and 348.7 mins/day for SB; and negative bias was found to exist, with those people who were more physically active over-reporting their level of MVPA: those who were more sedentary were less likely to under-report their level of SB. Results for agreement in change over time showed moderate correlation (r = 0.52, p = 0.12) for MVPA and poor correlation for SB (r = -0.024, p = 0.916).\n\n\nCONCLUSIONS\nLevels of agreement with objective measurements indicate the GPAQ is a valid measure of MVPA and change in MVPA but is a less valid measure of current levels and change in SB. Thus, GPAQ appears to be an appropriate measure for assessing the effectiveness of interventions to promote MVPA.",
"title": ""
}
] | scidocsrr |
2c080e7343fd71060049df0f6fda1cc7 | A detail analysis on intrusion detection datasets | [
{
"docid": "11a2882124e64bd6b2def197d9dc811a",
"text": "1 Abstract— Clustering is the most acceptable technique to analyze the raw data. Clustering can help detect intrusions when our training data is unlabeled, as well as for detecting new and unknown types of intrusions. In this paper we are trying to analyze the NSL-KDD dataset using Simple K-Means clustering algorithm. We tried to cluster the dataset into normal and four of the major attack categories i.e. DoS, Probe, R2L, U2R. Experiments are performed in WEKA environment. Results are verified and validated using test dataset. Our main objective is to provide the complete analysis of NSL-KDD intrusion detection dataset.",
"title": ""
},
{
"docid": "320c7c49dd4341cca532fa02965ef953",
"text": "During the last decade, anomaly detection has attracted the attention of many researchers to overcome the weakness of signature-based IDSs in detecting novel attacks, and KDDCUP'99 is the mostly widely used data set for the evaluation of these systems. Having conducted a statistical analysis on this data set, we found two important issues which highly affects the performance of evaluated systems, and results in a very poor evaluation of anomaly detection approaches. To solve these issues, we have proposed a new data set, NSL-KDD, which consists of selected records of the complete KDD data set and does not suffer from any of mentioned shortcomings.",
"title": ""
}
] | [
{
"docid": "91cb2ee27517441704bf739ee811d6c6",
"text": "The primo vascular system has a specific anatomical and immunohistochemical signature that sets it apart from the arteriovenous and lymphatic systems. With immune and endocrine functions, the primo vascular system has been found to play a large role in biological processes, including tissue regeneration, inflammation, and cancer metastases. Although scientifically confirmed in 2002, the original discovery was made in the early 1960s by Bong-Han Kim, a North Korean scientist. It would take nearly 40 years after that discovery for scientists to revisit Kim's research to confirm the early findings. The presence of primo vessels in and around blood and lymph vessels, nerves, viscera, and fascia, as well as in the brain and spinal cord, reveals a common link that could potentially open novel possibilities of integration with cranial, lymphatic, visceral, and fascial approaches in manual medicine.",
"title": ""
},
{
"docid": "9308c1dfdf313f6268db9481723f533d",
"text": "We report the discovery of a highly active Ni-Co alloy electrocatalyst for the oxidation of hydrazine (N(2)H(4)) and provide evidence for competing electrochemical (faradaic) and chemical (nonfaradaic) reaction pathways. The electrochemical conversion of hydrazine on catalytic surfaces in fuel cells is of great scientific and technological interest, because it offers multiple redox states, complex reaction pathways, and significantly more favorable energy and power densities compared to hydrogen fuel. Structure-reactivity relations of a Ni(60)Co(40) alloy electrocatalyst are presented with a 6-fold increase in catalytic N(2)H(4) oxidation activity over today's benchmark catalysts. We further study the mechanistic pathways of the catalytic N(2)H(4) conversion as function of the applied electrode potential using differentially pumped electrochemical mass spectrometry (DEMS). At positive overpotentials, N(2)H(4) is electrooxidized into nitrogen consuming hydroxide ions, which is the fuel cell-relevant faradaic reaction pathway. In parallel, N(2)H(4) decomposes chemically into molecular nitrogen and hydrogen over a broad range of electrode potentials. The electroless chemical decomposition rate was controlled by the electrode potential, suggesting a rare example of a liquid-phase electrochemical promotion effect of a chemical catalytic reaction (\"EPOC\"). The coexisting electrocatalytic (faradaic) and heterogeneous catalytic (electroless, nonfaradaic) reaction pathways have important implications for the efficiency of hydrazine fuel cells.",
"title": ""
},
{
"docid": "724845cb5c9f531e09f2c8c3e6f52fe4",
"text": "Deep learning has given way to a new era of machine learning, apart from computer vision. Convolutional neural networks have been implemented in image classification, segmentation and object detection. Despite recent advancements, we are still in the very early stages and have yet to settle on best practices for network architecture in terms of deep design, small in size and a short training time. In this work, we propose a very deep neural network comprised of 16 Convolutional layers compressed with the Fire Module adapted from the SQUEEZENET model. We also call for the addition of residual connections to help suppress degradation. This model can be implemented on almost every neural network model with fully incorporated residual learning. This proposed model Residual-Squeeze-VGG16 (ResSquVGG16) trained on the large-scale MIT Places365-Standard scene dataset. In our tests, the model performed with accuracy similar to the pre-trained VGG16 model in Top-1 and Top-5 validation accuracy while also enjoying a 23.86% reduction in training time and an 88.4% reduction in size. In our tests, this model was trained from scratch. Keywords— Convolutional Neural Networks; VGG16; Residual learning; Squeeze Neural Networks; Residual-Squeeze-VGG16; Scene Classification; ResSquVGG16.",
"title": ""
},
{
"docid": "3a06104103bbfbadbe67a89e84f425ab",
"text": "According to the Technology Acceptance Model (TAM), behavioral intentions to use a new IT are primarily the product of a rational analysis of its desirable perceived outcomes, namely perceived usefulness (PU) and perceived ease of use (PEOU). But what happens with the continued use of an IT among experienced users? Does habit also kick in as a major factor or is continued use only the product of its desirable outcomes? This study examines this question in the context of experienced online shoppers. The data show that, as hypothesized, online shoppers’ intentions to continue using a website that they last bought at depend not only on PU and PEOU, but also on habit. In fact, habit alone can explain a large proportion of the variance of continued use of a website. Moreover, the explained variance indicates that habit may also be a major predictor of PU and PEOU among experienced shoppers. Implications are discussed.",
"title": ""
},
{
"docid": "73af8236cc76e386aa76c6d20378d774",
"text": "Turkish Wikipedia Named-Entity Recognition and Text Categorization (TWNERTC) dataset is a collection of automatically categorized and annotated sentences obtained from Wikipedia. We constructed large-scale gazetteers by using a graph crawler algorithm to extract relevant entity and domain information from a semantic knowledge base, Freebase1. The constructed gazetteers contains approximately 300K entities with thousands of fine-grained entity types under 77 different domains. Since automated processes are prone to ambiguity, we also introduce two new content specific noise reduction methodologies. Moreover, we map fine-grained entity types to the equivalent four coarse-grained types, person, loc, org, misc. Eventually, we construct six different dataset versions and evaluate the quality of annotations by comparing ground truths from human annotators. We make these datasets publicly available to support studies on Turkish named-entity recognition (NER) and text categorization (TC).",
"title": ""
},
{
"docid": "b26882cddec1690e3099757e835275d2",
"text": "Accumulating evidence suggests that, independent of physical activity levels, sedentary behaviours are associated with increased risk of cardio-metabolic disease, all-cause mortality, and a variety of physiological and psychological problems. Therefore, the purpose of this systematic review is to determine the relationship between sedentary behaviour and health indicators in school-aged children and youth aged 5-17 years. Online databases (MEDLINE, EMBASE and PsycINFO), personal libraries and government documents were searched for relevant studies examining time spent engaging in sedentary behaviours and six specific health indicators (body composition, fitness, metabolic syndrome and cardiovascular disease, self-esteem, pro-social behaviour and academic achievement). 232 studies including 983,840 participants met inclusion criteria and were included in the review. Television (TV) watching was the most common measure of sedentary behaviour and body composition was the most common outcome measure. Qualitative analysis of all studies revealed a dose-response relation between increased sedentary behaviour and unfavourable health outcomes. Watching TV for more than 2 hours per day was associated with unfavourable body composition, decreased fitness, lowered scores for self-esteem and pro-social behaviour and decreased academic achievement. Meta-analysis was completed for randomized controlled studies that aimed to reduce sedentary time and reported change in body mass index (BMI) as their primary outcome. In this regard, a meta-analysis revealed an overall significant effect of -0.81 (95% CI of -1.44 to -0.17, p = 0.01) indicating an overall decrease in mean BMI associated with the interventions. There is a large body of evidence from all study designs which suggests that decreasing any type of sedentary time is associated with lower health risk in youth aged 5-17 years. In particular, the evidence suggests that daily TV viewing in excess of 2 hours is associated with reduced physical and psychosocial health, and that lowering sedentary time leads to reductions in BMI.",
"title": ""
},
{
"docid": "353bbc5e68ec1d53b3cd0f7c352ee699",
"text": "• A submitted manuscript is the author's version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the publisher's website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features the final layout of the paper including the volume, issue and page numbers.",
"title": ""
},
{
"docid": "3d45de7d6ef9e162552698839550a6ee",
"text": "The queries people issue to a search engine and the results clicked following a query change over time. For example, after the earthquake in Japan in March 2011, the query japan spiked in popularity and people issuing the query were more likely to click government-related results than they would prior to the earthquake. We explore the modeling and prediction of such temporal patterns in Web search behavior. We develop a temporal modeling framework adapted from physics and signal processing and harness it to predict temporal patterns in search behavior using smoothing, trends, periodicities, and surprises. Using current and past behavioral data, we develop a learning procedure that can be used to construct models of users' Web search activities. We also develop a novel methodology that learns to select the best prediction model from a family of predictive models for a given query or a class of queries. Experimental results indicate that the predictive models significantly outperform baseline models that weight historical evidence the same for all queries. We present two applications where new methods introduced for the temporal modeling of user behavior significantly improve upon the state of the art. Finally, we discuss opportunities for using models of temporal dynamics to enhance other areas of Web search and information retrieval.",
"title": ""
},
{
"docid": "2d0a82799d75c08f288d1105280a6d60",
"text": "The increasing complexity of deep learning architectures is resulting in training time requiring weeks or even months. This slow training is due in part to \"vanishing gradients,\" in which the gradients used by back-propagation are extremely large for weights connecting deep layers (layers near the output layer), and extremely small for shallow layers (near the input layer), this results in slow learning in the shallow layers. Additionally, it has also been shown that in highly non-convex problems, such as deep neural networks, there is a proliferation of high-error low curvature saddle points, which slows down learning dramatically [1]. In this paper, we attempt to overcome the two above problems by proposing an optimization method for training deep neural networks which uses learning rates which are both specific to each layer in the network and adaptive to the curvature of the function, increasing the learning rate at low curvature points. This enables us to speed up learning in the shallow layers of the network and quickly escape high-error low curvature saddle points. We test our method on standard image classification datasets such as MNIST, CIFAR10 and ImageNet, and demonstrate that our method increases accuracy as well as reduces the required training time over standard algorithms.",
"title": ""
},
{
"docid": "ee03340751553afa79f6183a230f64f0",
"text": "We provide an overview of the recent trends toward digitalization and large-scale data analytics in healthcare. It is expected that these trends are instrumental in the dramatic changes in the way healthcare will be organized in the future. We discuss the recent political initiatives designed to shift care delivery processes from paper to electronic, with the goals of more effective treatments with better outcomes; cost pressure is a major driver of innovation. We describe newly developed networks of healthcare providers, research organizations, and commercial vendors to jointly analyze data for the development of decision support systems. We address the trend toward continuous healthcare where health is monitored by wearable and stationary devices; a related development is that patients increasingly assume responsibility for their own health data. Finally, we discuss recent initiatives toward a personalized medicine, based on advances in molecular medicine, data management, and data analytics.",
"title": ""
},
{
"docid": "dd130195f82c005d1168608a0388e42d",
"text": "CONTEXT\nThe educational environment makes an important contribution to student learning. The DREEM questionnaire is a validated tool assessing the environment.\n\n\nOBJECTIVES\nTo translate and validate the DREEM into Greek.\n\n\nMETHODS\nForward translations from English were produced by three independent Greek translators and then back translations by five independent bilingual translators. The Greek DREEM.v0 that was produced was administered to 831 undergraduate students from six Greek medical schools. Cronbach's alpha and test-retest correlation were used to evaluate reliability and factor analysis was used to assess validity. Questions that increased alpha if deleted and/or sorted unexpectedly in factor analysis were further checked through two focus groups.\n\n\nFINDINGS\nQuestionnaires were returned by 487 respondents (59%), who were representative of all surveyed students by gender but not by year of study or medical school. The instrument's overall alpha was 0.90, and for the learning, teachers, academic, atmosphere and social subscales the alphas were 0.79 (expected 0.69), 0.78 (0.67), 0.69 (0.60), 0.68 (0.69), 0.48 (0.57), respectively. In a subset of the whole sample, test and retest alphas were both 0.90, and mean item scores highly correlated (p<0.001). Factor analysis produced meaningful subscales but not always matching the original ones. Focus group evaluation revealed possible misunderstanding for questions 17, 25, 29 and 38, which were revised in the DREEM.Gr.v1. The group mean overall scale score was 107.7 (SD 20.2), with significant differences across medical schools (p<0.001).\n\n\nCONCLUSION\nAlphas and test-retest correlation suggest the Greek translated and validated DREEM scale is a reliable tool for assessing the medical education environment and for informing policy. Factor analysis and focus group input suggest it is a valid tool. Reasonable school differences suggest the instrument's sensitivity.",
"title": ""
},
{
"docid": "3cc84fda5e04ccd36f5b632d9da3a943",
"text": "We present a new algorithm, called marching cubes, that creates triangle models of constant density surfaces from 3D medical data. Using a divide-and-conquer approach to generate inter-slice connectivity, we create a case table that defines triangle topology. The algorithm processes the 3D medical data in scan-line order and calculates triangle vertices using linear interpolation. We find the gradient of the original data, normalize it, and use it as a basis for shading the models. The detail in images produced from the generated surface models is the result of maintaining the inter-slice connectivity, surface data, and gradient information present in the original 3D data. Results from computed tomography (CT), magnetic resonance (MR), and single-photon emission computed tomography (SPECT) illustrate the quality and functionality of marching cubes. We also discuss improvements that decrease processing time and add solid modeling capabilities.",
"title": ""
},
{
"docid": "bbedbe2d901f63e3f163ea0f24a2e2d7",
"text": "a r t i c l e i n f o a b s t r a c t The leader trait perspective is perhaps the most venerable intellectual tradition in leadership research. Despite its early prominence in leadership research, it quickly fell out of favor among leadership scholars. Thus, despite recent empirical support for the perspective, conceptual work in the area lags behind other theoretical perspectives. Accordingly, the present review attempts to place the leader trait perspective in the context of supporting intellectual traditions, including evolutionary psychology and behavioral genetics. We present a conceptual model that considers the source of leader traits, mediators and moderators of their effects on leader emergence and leadership effectiveness, and distinguish between perceived and actual leadership effectiveness. We consider both the positive and negative effects of specific \" bright side \" personality traits: the Big Five traits, core self-evaluations, intelligence, and charisma. We also consider the positive and negative effects of \" dark side \" leader traits: Narcissism, hubris, dominance, and Machiavellianism. If one sought to find singular conditions that existed across species, one might find few universals. One universal that does exist, at least those species that have brains and nervous systems, is leadership. From insects to reptiles to mammals, leadership exists as surely as collective activity exists. There is the queen bee, and there is the alpha male. Though the centrality of leadership may vary by species (it seems more important to mammals than, say, to avians and reptiles), it is fair to surmise that whenever there is social activity, a social structure develops, and one (perhaps the) defining characteristic of that structure is the emergence of a leader or leaders. The universality of leadership, however, does not deny the importance of individual differences — indeed the emergence of leadership itself is proof of individual differences. Moreover, even casual observation of animal (including human) collective behavior shows the existence of a leader. Among a herd of 100 cattle or a pride of 20 lions, one is able to detect a leadership structure (especially at times of eating, mating, and attack). One quickly wonders: What has caused this leadership structure to emerge? Why has one animal (the alpha) emerged to lead the collective? And how does this leadership cause this collective to flourish — or founder? Given these questions, it is of no surprise that the earliest conceptions of leadership focused on individual …",
"title": ""
},
{
"docid": "dc198f396142376e36d7143a5bfe7d19",
"text": "Successful direct pulp capping of cariously exposed permanent teeth with reversible pulpitis and incomplete apex formation can prevent the need for root canal treatment. A case report is presented which demonstrates the use of mineral trioxide aggregate (MTA) as a direct pulp capping material for the purpose of continued maturogenesis of the root. Clinical and radiographic follow-up demonstrated a vital pulp and physiologic root development in comparison with the contralateral tooth. MTA can be considered as an effective material for vital pulp therapy, with the goal of maturogenesis.",
"title": ""
},
{
"docid": "de99ebecca6a9c3e6539ba00fd91feba",
"text": "In previous lectures, we have analyzed random forms of optimization problems, in which the randomness was injected (via random projection) for algorithmic reasons. On the other hand, in statistical problems—even without considering approximations—the starting point is a random instance of an optimization problem. To be more concrete, suppose that we are interested in estimating some parameter θ * ∈ R d based on a set of n samples, say {Z 1 ,. .. , Z n }. Many estimators of θ * are based on solving the (random) optimization problem θ ∈ argmin θ∈C L n (θ), where C ⊂ R d is some subset of R d , and L n (θ) = 1 n n i=1 i (θ; Z i) decomposes as a sum of terms, one for each data point. Our interest will be in analyzing the sequence {θ t } ∞ t=0 generated by some optimization algorithm. A traditional analysis in (deterministic) optimization involves bounding the optimization error θ t − θ, measuring the distance between the iterates and (some) optimum. On the other hand, the population version of this problem is defined in terms of the averaged function ¯ L(θ) : = E[L n (θ)]. If the original problem has been constructed in a reasonable way, then it should be the case that θ * ∈ arg min θ∈C ¯ L(θ), meaning that the quantity of interest is a global minimizer of the population function.",
"title": ""
},
{
"docid": "514f65393daf3c02b1100e16e22b24be",
"text": "A capsule is a collection of neurons which represents different variants of a pattern in the network. The routing scheme ensures only certain capsules which resemble lower counterparts in the higher layer should be activated. However, the computational complexity becomes a bottleneck for scaling up to larger networks, as lower capsules need to correspond to each and every higher capsule. To resolve this limitation, we approximate the routing process with two branches: a master branch which collects primary information from its direct contact in the lower layer and an aide branch that replenishes master based on pattern variants encoded in other lower capsules. Compared with previous iterative and unsupervised routing scheme, these two branches are communicated in a fast, supervised and one-time pass fashion. The complexity and runtime of the model are therefore decreased by a large margin. Motivated by the routing to make higher capsule have agreement with lower capsule, we extend the mechanism as a compensation for the rapid loss of information in nearby layers. We devise a feedback agreement unit to send back higher capsules as feedback. It could be regarded as an additional regularization to the network. The feedback agreement is achieved by comparing the optimal transport divergence between two distributions (lower and higher capsules). Such an add-on witnesses a unanimous gain in both capsule and vanilla networks. Our proposed EncapNet performs favorably better against previous state-of-the-arts on CIFAR10/100, SVHN and a subset of ImageNet.",
"title": ""
},
{
"docid": "82c03a96e993095abb66d35508e287b4",
"text": "By all accounts, 2016 is the year of the chatbot. Some commentators take the view that chatbot technology will be so disruptive that it will eliminate the need for websites and apps. But chatbots have a long history. So what’s new, and what’s different this time? And is there an opportunity here to improve how our industry does technology transfer? 1 The year of interacting conversationally This year’s most hyped language technology is the intelligent virtual assistant. Whether you call these things digital assistants, conversational interfaces or just chatbots, the basic concept is the same: achieve some result by conversing with a machine in a dialogic fashion, using natural language. Most visible at the forefront of the technology, we have the voice-driven digital assistants from the Big Four: Apple’s Siri, Microsoft’s Cortana, Amazon’s Alexa and Google’s new Assistant. Following up behind, we have many thousands of text-based chatbots that target specific functionalities, enabled by tools that let you build bots for a number of widely used messaging platforms. Many see this technology as heralding a revolution in how we interact with devices, websites and apps. The MIT Technology Review lists conversational interfaces as one of the ten breakthrough technologies of 2016. In January of this year, Uber’s Chris Messina wrote an influential blog piece declaring 2016 the year of conversational commerce. In March, Microsoft CEO Satya Nadella announced that chatbots were the next big thing, on a par with the graphical user interface, the web browser 1 https://www.technologyreview.com/s/600766/10-breakthrough-technologies2016-conversational-interfaces 2 https://medium.com/chris-messina/2016-will-be-the-year-of-conversationalcommerce-1586e85e3991 https://www.cambridge.org/core/terms. https://doi.org/10.1017/S1351324916000243 Downloaded from https://www.cambridge.org/core. IP address: 54.70.40.11, on 03 Aug 2018 at 20:59:31, subject to the Cambridge Core terms of use, available at",
"title": ""
},
{
"docid": "58702f835df43337692f855f35a9f903",
"text": "A dual-mode wide-band transformer based VCO is proposed. The two port impedance of the transformer based resonator is analyzed to derive the optimum primary to secondary capacitor load ratio, for robust mode selectivity and minimum power consumption. Fabricated in a 16nm FinFET technology, the design achieves 2.6× continuous tuning range spanning 7-to-18.3 GHz using a coil area of 120×150 μm2. The absence of lossy switches helps in maintaining phase noise of -112 to -100 dBc/Hz at 1 MHz offset, across the entire tuning range. The VCO consumes 3-4.4 mW and realizes power frequency tuning normalized figure of merit of 12.8 and 2.4 dB at 7 and 18.3 GHz respectively.",
"title": ""
},
{
"docid": "c784bfbd522bb4c9908c3f90a31199fe",
"text": "Vedolizumab (VDZ) inhibits α4β7 integrins and is used to target intestinal immune responses in patients with inflammatory bowel disease, which is considered to be relatively safe. Here we report on a fatal complication following VDZ administration. A 64-year-old female patient with ulcerative colitis (UC) refractory to tumor necrosis factor inhibitors was treated with VDZ. One week after the second VDZ infusion, she was admitted to hospital with severe diarrhea and systemic inflammatory response syndrome (SIRS). Blood stream infections were ruled out, and endoscopy revealed extensive ulcerations of the small intestine covered with pseudomembranes, reminiscent of invasive candidiasis or mesenteric ischemia. Histology confirmed subtotal destruction of small intestinal epithelia and colonization with Candida. Moreover, small mesenteric vessels were occluded by hyaline thrombi, likely as a result of SIRS, while perfusion of large mesenteric vessels was not compromised. Beta-D-glucan concentrations were highly elevated, and antimycotic therapy was initiated for suspected invasive candidiasis but did not result in any clinical benefit. Given the non-responsiveness to anti-infective therapies, an autoimmune phenomenon was suspected and immunosuppressive therapy was escalated. However, the patient eventually died from multi-organ failure. This case should raise the awareness for rare but severe complications related to immunosuppressive therapy, particularly in high risk patients.",
"title": ""
}
] | scidocsrr |
7fabdf6063107d656b2ae326017db1fe | Interpersonal influences on adolescent materialism : A new look at the role of parents and peers | [
{
"docid": "d602cafe18d720f024da1b36c9283ba5",
"text": "Associations between materialism and peer relations are likely to exist in elementary school children but have not been studied previously. The first two studies introduce a new Perceived Peer Group Pressures (PPGP) Scale suitable for this age group, demonstrating that perceived pressure regarding peer culture (norms for behavioral, attitudinal, and material characteristics) can be reliably measured and that it is connected to children's responses to hypothetical peer pressure vignettes. Studies 3 and 4 evaluate the main theoretical model of associations between peer relations and materialism. Study 3 supports the hypothesis that peer rejection is related to higher perceived peer culture pressure, which in turn is associated with greater materialism. Study 4 confirms that the endorsement of social motives for materialism mediates the relationship between perceived peer pressure and materialism.",
"title": ""
}
] | [
{
"docid": "49c1924821c326f803cefff58ca7ab67",
"text": "Dynamic binary analysis is a prevalent and indispensable technique in program analysis. While several dynamic binary analysis tools and frameworks have been proposed, all suffer from one or more of: prohibitive performance degradation, a semantic gap between the analysis code and the program being analyzed, architecture/OS specificity, being user-mode only, and lacking APIs. We present DECAF, a virtual machine based, multi-target, whole-system dynamic binary analysis framework built on top of QEMU. DECAF provides Just-In-Time Virtual Machine Introspection and a plugin architecture with a simple-to-use event-driven programming interface. DECAF implements a new instruction-level taint tracking engine at bit granularity, which exercises fine control over the QEMU Tiny Code Generator (TCG) intermediate representation to accomplish on-the-fly optimizations while ensuring that the taint propagation is sound and highly precise. We perform a formal analysis of DECAF's taint propagation rules to verify that most instructions introduce neither false positives nor false negatives. We also present three platform-neutral plugins—Instruction Tracer, Keylogger Detector, and API Tracer, to demonstrate the ease of use and effectiveness of DECAF in writing cross-platform and system-wide analysis tools. Implementation of DECAF consists of 9,550 lines of C++ code and 10,270 lines of C code and we evaluate DECAF using CPU2006 SPEC benchmarks and show average overhead of 605 percent for system wide tainting and 12 percent for VMI.",
"title": ""
},
{
"docid": "2ab6b91f6e5e01b3bb8c8e5c0fbdcf24",
"text": "Application markets such as Apple’s App Store and Google’s Play Store have played an important role in the popularity of smartphones and mobile devices. However, keeping malware out of application markets is an ongoing challenge. While recent work has developed various techniques to determine what applications do, no work has provided a technical approach to answer, what do users expect? In this paper, we present the first step in addressing this challenge. Specifically, we focus on permissions for a given application and examine whether the application description provides any indication for why the application needs a permission. We present WHYPER, a framework using Natural Language Processing (NLP) techniques to identify sentences that describe the need for a given permission in an application description. WHYPER achieves an average precision of 82.8%, and an average recall of 81.5% for three permissions (address book, calendar, and record audio) that protect frequentlyused security and privacy sensitive resources. These results demonstrate great promise in using NLP techniques to bridge the semantic gap between user expectations and application functionality, further aiding the risk assessment of mobile applications.",
"title": ""
},
{
"docid": "3c444d8918a31831c2dc73985d511985",
"text": "This paper presents methods for collecting and analyzing physiological data during real-world driving tasks to determine a driver's relative stress level. Electrocardiogram, electromyogram, skin conductance, and respiration were recorded continuously while drivers followed a set route through open roads in the greater Boston area. Data from 24 drives of at least 50-min duration were collected for analysis. The data were analyzed in two ways. Analysis I used features from 5-min intervals of data during the rest, highway, and city driving conditions to distinguish three levels of driver stress with an accuracy of over 97% across multiple drivers and driving days. Analysis II compared continuous features, calculated at 1-s intervals throughout the entire drive, with a metric of observable stressors created by independent coders from videotapes. The results show that for most drivers studied, skin conductivity and heart rate metrics are most closely correlated with driver stress level. These findings indicate that physiological signals can provide a metric of driver stress in future cars capable of physiological monitoring. Such a metric could be used to help manage noncritical in-vehicle information systems and could also provide a continuous measure of how different road and traffic conditions affect drivers.",
"title": ""
},
{
"docid": "fa6ec1ff4a0849e5a4ec2dda7b20d966",
"text": "Most digital still cameras acquire imagery with a color filter array (CFA), sampling only one color value for each pixel and interpolating the other two color values afterwards. The interpolation process is commonly known as demosaicking. In general, a good demosaicking method should preserve the high-frequency information of imagery as much as possible, since such information is essential for image visual quality. We discuss in this paper two key observations for preserving high-frequency information in CFA demosaicking: (1) the high frequencies are similar across three color components, and 2) the high frequencies along the horizontal and vertical axes are essential for image quality. Our frequency analysis of CFA samples indicates that filtering a CFA image can better preserve high frequencies than filtering each color component separately. This motivates us to design an efficient filter for estimating the luminance at green pixels of the CFA image and devise an adaptive filtering approach to estimating the luminance at red and blue pixels. Experimental results on simulated CFA images, as well as raw CFA data, verify that the proposed method outperforms the existing state-of-the-art methods both visually and in terms of peak signal-to-noise ratio, at a notably lower computational cost.",
"title": ""
},
{
"docid": "eced59d8ec159f3127e7d2aeca76da96",
"text": "Mano-a-Mano is a unique spatial augmented reality system that combines dynamic projection mapping, multiple perspective views and device-less interaction to support face to face, or dyadic, interaction with 3D virtual objects. Its main advantage over more traditional AR approaches, such as handheld devices with composited graphics or see-through head worn displays, is that users are able to interact with 3D virtual objects and each other without cumbersome devices that obstruct face to face interaction. We detail our prototype system and a number of interactive experiences. We present an initial user experiment that shows that participants are able to deduce the size and distance of a virtual projected object. A second experiment shows that participants are able to infer which of a number of targets the other user indicates by pointing.",
"title": ""
},
{
"docid": "c797b2a78ea6eb434159fd948c0a1bf0",
"text": "Feature extraction is an essential part in applications that require computer vision to recognize objects in an image processed. To extract the features robustly, feature extraction algorithms are often very demanding in computation so that the performance achieved by pure software is far from real-time. Among those feature extraction algorithms, scale-invariant feature transform (SIFT) has gained a lot of popularity recently. In this paper, we propose an all-hardware SIFT accelerator-the fastest of its kind to our knowledge. It consists of two interactive hardware components, one for key point identification, and the other for feature descriptor generation. We successfully developed a segment buffer scheme that could not only feed data to the computing modules in a data-streaming manner, but also reduce about 50% memory requirement than a previous work. With a parallel architecture incorporating a three-stage pipeline, the processing time of the key point identification is only 3.4 ms for one video graphics array (VGA) image. Taking also into account the feature descriptor generation part, the overall SIFT processing time for a VGA image can be kept within 33 ms (to support real-time operation) when the number of feature points to be extracted is fewer than 890.",
"title": ""
},
{
"docid": "d43dc521d3f0f17ccd4840d6081dcbfe",
"text": "In Vehicular Ad hoc NETworks (VANETs), authentication is a crucial security service for both inter-vehicle and vehicle-roadside communications. On the other hand, vehicles have to be protected from the misuse of their private data and the attacks on their privacy, as well as to be capable of being investigated for accidents or liabilities from non-repudiation. In this paper, we investigate the authentication issues with privacy preservation and non-repudiation in VANETs. We propose a novel framework with preservation and repudiation (ACPN) for VANETs. In ACPN, we introduce the public-key cryptography (PKC) to the pseudonym generation, which ensures legitimate third parties to achieve the non-repudiation of vehicles by obtaining vehicles' real IDs. The self-generated PKCbased pseudonyms are also used as identifiers instead of vehicle IDs for the privacy-preserving authentication, while the update of the pseudonyms depends on vehicular demands. The existing ID-based signature (IBS) scheme and the ID-based online/offline signature (IBOOS) scheme are used, for the authentication between the road side units (RSUs) and vehicles, and the authentication among vehicles, respectively. Authentication, privacy preservation, non-repudiation and other objectives of ACPN have been analyzed for VANETs. Typical performance evaluation has been conducted using efficient IBS and IBOOS schemes. We show that the proposed ACPN is feasible and adequate to be used efficiently in the VANET environment.",
"title": ""
},
{
"docid": "6a04e07937d1c5beef84acb0a4e0e328",
"text": "Linear hashing and spiral storage are two dynamic hashing schemes originally designed for external files. This paper shows how to adapt these two methods for hash tables stored in main memory. The necessary data structures and algorithms are described, the expected performance is analyzed mathematically, and actual execution times are obtained and compared with alternative techniques. Linear hashing is found to be both faster and easier to implement than spiral storage. Two alternative techniques are considered: a simple unbalanced binary tree and double hashing with periodic rehashing into a larger table. The retrieval time of linear hashing is similar to double hashing and substantially faster than a binary tree, except for very small trees. The loading times of double hashing (with periodic reorganization), a binary tree, and linear hashing are similar. Overall, linear hashing is a simple and efficient technique for applications where the cardinality of the key set is not known in advance.",
"title": ""
},
{
"docid": "6c4433b640cf1d7557b2e74cbd2eee85",
"text": "A compact Ka-band broadband waveguide-based travelingwave spatial power combiner is presented. The low loss micro-strip probes are symmetrically inserted into both broadwalls of waveguide, quadrupling the coupling ways but the insertion loss increases little. The measured 16 dB return-loss bandwidth of the eight-way back-toback structure is from 30 GHz to 39.4 GHz (more than 25%) and the insertion loss is less than 1 dB, which predicts the power-combining efficiency is higher than 90%.",
"title": ""
},
{
"docid": "89349e8f3e7d8df8bb8ab6f55404a91f",
"text": "Due to the high intake of sugars, especially sucrose, global trends in food processing have encouraged producers to use sweeteners, particularly synthetic ones, to a wide extent. For several years, increasing attention has been paid in the literature to the stevia (Stevia rebauidana), containing glycosidic diterpenes, for which sweetening properties have been identified. Chemical composition, nutritional value and application of stevia leaves are briefl y summarized and presented.",
"title": ""
},
{
"docid": "31873424960073962d3d8eba151f6a4b",
"text": "Multiple view data, which have multiple representations from different feature spaces or graph spaces, arise in various data mining applications such as information retrieval, bioinformatics and social network analysis. Since different representations could have very different statistical properties, how to learn a consensus pattern from multiple representations is a challenging problem. In this paper, we propose a general model for multiple view unsupervised learning. The proposed model introduces the concept of mapping function to make the different patterns from different pattern spaces comparable and hence an optimal pattern can be learned from the multiple patterns of multiple representations. Under this model, we formulate two specific models for two important cases of unsupervised learning, clustering and spectral dimensionality reduction; we derive an iterating algorithm for multiple view clustering, and a simple algorithm providing a global optimum to multiple spectral dimensionality reduction. We also extend the proposed model and algorithms to evolutionary clustering and unsupervised learning with side information. Empirical evaluations on both synthetic and real data sets demonstrate the effectiveness of the proposed model and algorithms.",
"title": ""
},
{
"docid": "3323474060ba5f1fbbbdcb152c22a6a9",
"text": "A compact triple-band microstrip slot antenna applied to WLAN/WiMAX applications is proposed in this letter. This antenna has a simpler structure than other antennas designed for realizing triple-band characteristics. It is just composed of a microstrip feed line, a substrate, and a ground plane on which some simple slots are etched. Then, to prove the validation of the design, a prototype is fabricated and measured. The experimental data show that the antenna can provide three impedance bandwidths of 600 MHz centered at 2.7 GHz, 430 MHz centered at 3.5 GHz, and 1300 MHz centered at 5.6 GHz.",
"title": ""
},
{
"docid": "713010fe0ee95840e6001410f8a164cc",
"text": "Three studies tested the idea that when social identity is salient, group-based appraisals elicit specific emotions and action tendencies toward out-groups. Participants' group memberships were made salient and the collective support apparently enjoyed by the in-group was measured or manipulated. The authors then measured anger and fear (Studies 1 and 2) and anger and contempt (Study 3), as well as the desire to move against or away from the out-group. Intergroup anger was distinct from intergroup fear, and the inclination to act against the out-group was distinct from the tendency to move away from it. Participants who perceived the in-group as strong were more likely to experience anger toward the out-group and to desire to take action against it. The effects of perceived in-group strength on offensive action tendencies were mediated by anger.",
"title": ""
},
{
"docid": "a7e8c3a64f6ba977e142de9b3dae7e57",
"text": "Craniofacial superimposition is a process that aims to identify a person by overlaying a photograph and a model of the skull. This process is usually carried out manually by forensic anthropologists; thus being very time consuming and presenting several difficulties in finding a good fit between the 3D model of the skull and the 2D photo of the face. In this paper we present a fast and automatic procedure to tackle the superimposition problem. The proposed method is based on real-coded genetic algorithms. Synthetic data are used to validate the method. Results on a real case from our Physical Anthropology lab of the University of Granada are also presented.",
"title": ""
},
{
"docid": "77cfc86c63ca0a7b3ed3b805ea16b9c9",
"text": "The research presented in this paper is about detecting collaborative networks inside the structure of a research social network. As case study we consider ResearchGate and SEE University academic staff. First we describe the methodology used to crawl and create an academic-academic network depending from their fields of interest. We then calculate and discuss four social network analysis centrality measures (closeness, betweenness, degree, and PageRank) for entities in this network. In addition to these metrics, we have also investigated grouping of individuals, based on automatic clustering depending from their reciprocal relationships.",
"title": ""
},
{
"docid": "7354d8c1e8253a99cfd62d8f96e57a77",
"text": "In the past few decades, clustering has been widely used in areas such as pattern recognition, data analysis, and image processing. Recently, clustering has been recognized as a primary data mining method for knowledge discovery in spatial databases, i.e. databases managing 2D or 3D points, polygons etc. or points in some d-dimensional feature space. The well-known clustering algorithms, however, have some drawbacks when applied to large spatial databases. First, they assume that all objects to be clustered reside in main memory. Second, these methods are too inefficient when applied to large databases. To overcome these limitations, new algorithms have been developed which are surveyed in this paper. These algorithms make use of efficient query processing techniques provided by spatial database systems.",
"title": ""
},
{
"docid": "23493c14053a4608203f8e77bd899445",
"text": "In this paper, lossless and near-lossless compression algorithms for multichannel electroencephalogram (EEG) signals are presented based on image and volumetric coding. Multichannel EEG signals have significant correlation among spatially adjacent channels; moreover, EEG signals are also correlated across time. Suitable representations are proposed to utilize those correlations effectively. In particular, multichannel EEG is represented either in the form of image (matrix) or volumetric data (tensor), next a wavelet transform is applied to those EEG representations. The compression algorithms are designed following the principle of “lossy plus residual coding,” consisting of a wavelet-based lossy coding layer followed by arithmetic coding on the residual. Such approach guarantees a specifiable maximum error between original and reconstructed signals. The compression algorithms are applied to three different EEG datasets, each with different sampling rate and resolution. The proposed multichannel compression algorithms achieve attractive compression ratios compared to algorithms that compress individual channels separately.",
"title": ""
},
{
"docid": "3a3c0c21d94c2469bd95a103a9984354",
"text": "Recently it was shown that the problem of Maximum Inner Product Search (MIPS) is efficient and it admits provably sub-linear hashing algorithms. Asymmetric transformations before hashing were the key in solving MIPS which was otherwise hard. In [18], the authors use asymmetric transformations which convert the problem of approximate MIPS into the problem of approximate near neighbor search which can be efficiently solved using hashing. In this work, we provide a different transformation which converts the problem of approximate MIPS into the problem of approximate cosine similarity search which can be efficiently solved using signed random projections. Theoretical analysis show that the new scheme is significantly better than the original scheme for MIPS. Experimental evaluations strongly support the theoretical findings.",
"title": ""
}
] | scidocsrr |
7fc4b30a0ea6873fc03082ded61a82ed | A vision of industry 4 . 0 from an artificial intelligence point of view | [
{
"docid": "22fd1487e69420597c587e03f2b48f65",
"text": "Design and operation of a manufacturing enterprise involve numerous types of decision-making at various levels and domains. A complex system has a large number of design variables and decision-making requires real-time data collected from machines, processes, and business environments. Enterprise systems (ESs) are used to support data acquisition, communication, and all decision-making activities. Therefore, information technology (IT) infrastructure for data acquisition and sharing affects the performance of an ES greatly. Our objective is to investigate the impact of emerging Internet of Things (IoT) on ESs in modern manufacturing. To achieve this objective, the evolution of manufacturing system paradigms is discussed to identify the requirements of decision support systems in dynamic and distributed environments; recent advances in IT are overviewed and associated with next-generation manufacturing paradigms; and the relation of IT infrastructure and ESs is explored to identify the technological gaps in adopting IoT as an IT infrastructure of ESs. The future research directions in this area are discussed.",
"title": ""
},
{
"docid": "eead063c20e32f53ec8a5e81dbac951c",
"text": "We are currently experiencing the fourth Industrial Revolution in terms of cyber physical systems. These systems are industrial automation systems that enable many innovative functionalities through their networking and their access to the cyber world, thus changing our everyday lives significantly. In this context, new business models, work processes and development methods that are currently unimaginable will arise. These changes will also strongly influence the society and people. Family life, globalization, markets, etc. will have to be redefined. However, the Industry 4.0 simultaneously shows characteristics that represent the challenges regarding the development of cyber-physical systems, reliability, security and data protection. Following a brief introduction to Industry 4.0, this paper presents a prototypical application that demonstrates the essential aspects.",
"title": ""
}
] | [
{
"docid": "623cdf022d333ca4d6b244f54d301650",
"text": "Alveolar rhabdomyosarcoma (ARMS) are aggressive soft tissue tumors harboring specific fusion transcripts, notably PAX3-FOXO1 (P3F). Current therapy concepts result in unsatisfactory survival rates making the search for innovative approaches necessary: targeting PAX3-FOXO1 could be a promising strategy. In this study, we developed integrin receptor-targeted Lipid-Protamine-siRNA (LPR) nanoparticles using the RGD peptide and validated target specificity as well as their post-silencing effects. We demonstrate that RGD-LPRs are specific to ARMS in vitro and in vivo. Loaded with siRNA directed against the breakpoint of P3F, these particles efficiently down regulated the fusion transcript and inhibited cell proliferation, but did not induce substantial apoptosis. In a xenograft ARMS model, LPR nanoparticles targeting P3F showed statistically significant tumor growth delay as well as inhibition of tumor initiation when injected in parallel with the tumor cells. These findings suggest that RGD-LPR targeting P3F are promising to be highly effective in the setting of minimal residual disease for ARMS.",
"title": ""
},
{
"docid": "d56fb6c80cc0d48602b48f506b0601a6",
"text": "In application domains such as healthcare, we want accurate predictive models that are also causally interpretable. In pursuit of such models, we propose a causal regularizer to steer predictive models towards causally-interpretable solutions and theoretically study its properties. In a large-scale analysis of Electronic Health Records (EHR), our causally-regularized model outperforms its L1-regularized counterpart in causal accuracy and is competitive in predictive performance. We perform non-linear causality analysis by causally regularizing a special neural network architecture. We also show that the proposed causal regularizer can be used together with neural representation learning algorithms to yield up to 20% improvement over multilayer perceptron in detecting multivariate causation, a situation common in healthcare, where many causal factors should occur simultaneously to have an effect on the target variable.",
"title": ""
},
{
"docid": "6ee26f725bfb63a6ff72069e48404e68",
"text": "OBJECTIVE\nTo determine which routinely collected exercise test variables most strongly correlate with survival and to derive a fitness risk score that can be used to predict 10-year survival.\n\n\nPATIENTS AND METHODS\nThis was a retrospective cohort study of 58,020 adults aged 18 to 96 years who were free of established heart disease and were referred for an exercise stress test from January 1, 1991, through May 31, 2009. Demographic, clinical, exercise, and mortality data were collected on all patients as part of the Henry Ford ExercIse Testing (FIT) Project. Cox proportional hazards models were used to identify exercise test variables most predictive of survival. A \"FIT Treadmill Score\" was then derived from the β coefficients of the model with the highest survival discrimination.\n\n\nRESULTS\nThe median age of the 58,020 participants was 53 years (interquartile range, 45-62 years), and 28,201 (49%) were female. Over a median of 10 years (interquartile range, 8-14 years), 6456 patients (11%) died. After age and sex, peak metabolic equivalents of task and percentage of maximum predicted heart rate achieved were most highly predictive of survival (P<.001). Subsequent addition of baseline blood pressure and heart rate, change in vital signs, double product, and risk factor data did not further improve survival discrimination. The FIT Treadmill Score, calculated as [percentage of maximum predicted heart rate + 12(metabolic equivalents of task) - 4(age) + 43 if female], ranged from -200 to 200 across the cohort, was near normally distributed, and was found to be highly predictive of 10-year survival (Harrell C statistic, 0.811).\n\n\nCONCLUSION\nThe FIT Treadmill Score is easily attainable from any standard exercise test and translates basic treadmill performance measures into a fitness-related mortality risk score. The FIT Treadmill Score should be validated in external populations.",
"title": ""
},
{
"docid": "0123fd04bc65b8dfca7ff5c058d087da",
"text": "The authors forward the hypothesis that social exclusion is experienced as painful because reactions to rejection are mediated by aspects of the physical pain system. The authors begin by presenting the theory that overlap between social and physical pain was an evolutionary development to aid social animals in responding to threats to inclusion. The authors then review evidence showing that humans demonstrate convergence between the 2 types of pain in thought, emotion, and behavior, and demonstrate, primarily through nonhuman animal research, that social and physical pain share common physiological mechanisms. Finally, the authors explore the implications of social pain theory for rejection-elicited aggression and physical pain disorders.",
"title": ""
},
{
"docid": "9592fc0ec54a5216562478414dc68eb4",
"text": "We consider the problem of finding the best arm in a stochastic multi-armed bandit game. The regret of a forecaster is here defined by the gap between the mean reward of the optimal arm and the mean reward of the ultimately chosen arm. We propose a highly exploring UCB policy and a new algorithm based on successive rejects. We show that these algorithms are essentially optimal since their regret decreases exponentially at a rate which is, up to a logarithmic factor, the best possible. However, while the UCB policy needs the tuning of a parameter depending on the unobservable hardness of the task, the successive rejects policy benefits from being parameter-free, and also independent of the scaling of the rewards. As a by-product of our analysis, we show that identifying the best arm (when it is unique) requires a number of samples of order (up to a log(K) factor) ∑ i 1/∆ 2 i , where the sum is on the suboptimal arms and ∆i represents the difference between the mean reward of the best arm and the one of arm i. This generalizes the well-known fact that one needs of order of 1/∆ samples to differentiate the means of two distributions with gap ∆.",
"title": ""
},
{
"docid": "cc9de768281e58749cd073d25a97d39c",
"text": "The Dynamic Adaptive Streaming over HTTP (referred as MPEG DASH) standard is designed to provide high quality of media content over the Internet delivered from conventional HTTP web servers. The visual content, divided into a sequence of segments, is made available at a number of different bitrates so that an MPEG DASH client can automatically select the next segment to download and play back based on current network conditions. The task of transcoding media content to different qualities and bitrates is computationally expensive, especially in the context of large-scale video hosting systems. Therefore, it is preferably executed in a powerful cloud environment, rather than on the source computer (which may be a mobile device with limited memory, CPU speed and battery life). In order to support the live distribution of media events and to provide a satisfactory user experience, the overall processing delay of videos should be kept to a minimum. In this paper, we propose a novel dynamic scheduling methodology on video transcoding for MPEG DASH in a cloud environment, which can be adapted to different applications. The designed scheduler monitors the workload on each processor in the cloud environment and selects the fastest processors to run high-priority jobs. It also adjusts the video transcoding mode (VTM) according to the system load. Experimental results show that the proposed scheduler performs well in terms of the video completion time, system load balance, and video playback smoothness.",
"title": ""
},
{
"docid": "af22932b48a2ea64ecf3e5ba1482564d",
"text": "Collaborative embedded systems (CES) heavily rely on information models to understand the contextual situations they are exposed to. These information models serve different purposes. First, during development time it is necessary to model the context for eliciting and documenting the requirements that a CES is supposed to achieve. Second, information models provide information to simulate different contextual situations and CES ́s behavior in these situations. Finally, CESs need information models about their context during runtime in order to react to different contextual situations and exchange context information with other CESs. Heavyweight ontologies, based on Ontology Web Language (OWL), have already proven suitable for representing knowledge about contextual situations during runtime. Furthermore, lightweight ontologies (e.g. class diagrams) have proven their practicality for creating domain specific languages for requirements documentation. However, building an ontology (lightor heavyweight) is a non-trivial task that needs to be integrated into development methods for CESs such that it serves the above stated purposes in a seamless way. This paper introduces the requirements for the building of ontologies and proposes a method that is integrated into the engineering of CESs.",
"title": ""
},
{
"docid": "20ef5a8b6835bedd44d571952b46ca90",
"text": "This paper proposes an XYZ-flexure parallel mechanism (FPM) with large displacement and decoupled kinematics structure. The large-displacement FPM has large motion range more than 1 mm. Moreover, the decoupled XYZ-stage has small cross-axis error and small parasitic rotation. In this study, the typical prismatic joints are investigated, and a new large-displacement prismatic joint using notch hinges is designed. The conceptual design of the FPM is proposed by assembling these modular prismatic joints, and then the optimal design of the FPM is conducted. The analytical models of linear stiffness and dynamics are derived using pseudo-rigid-body (PRB) method. Finally, the numerical simulation using ANSYS is conducted for modal analysis to verify the analytical dynamics equation. Experiments are conducted to verify the proposed design for linear stiffness, cross-axis error and parasitic rotation",
"title": ""
},
{
"docid": "e21aed852a892cbede0a31ad84d50a65",
"text": "0377-2217/$ see front matter 2010 Elsevier B.V. A doi:10.1016/j.ejor.2010.09.010 ⇑ Corresponding author. Tel.: +1 662 915 5519. E-mail addresses: crego@bus.olemiss.edu (C. R (D. Gamboa), fred.glover@colorado.edu (F. Glover), colin.j.osterman@navy.mil (C. Osterman). Heuristics for the traveling salesman problem (TSP) have made remarkable advances in recent years. We survey the leading methods and the special components responsible for their successful implementations, together with an experimental analysis of computational tests on a challenging and diverse set of symmetric and asymmetric TSP benchmark problems. The foremost algorithms are represented by two families, deriving from the Lin–Kernighan (LK) method and the stem-and-cycle (S&C) method. We show how these families can be conveniently viewed within a common ejection chain framework which sheds light on their similarities and differences, and gives clues about the nature of potential enhancements to today’s best methods that may provide additional gains in solving large and difficult TSPs. 2010 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "612423df25809938ada93f24be7d2ac5",
"text": "Gradient descent training techniques are remarkably successful in training analog-valued artificial neural networks (ANNs). Such training techniques, however, do not transfer easily to spiking networks due to the spike generation hard nonlinearity and the discrete nature of spike communication. We show that in a feedforward spiking network that uses a temporal coding scheme where information is encoded in spike times instead of spike rates, the network input–output relation is differentiable almost everywhere. Moreover, this relation is piecewise linear after a transformation of variables. Methods for training ANNs thus carry directly to the training of such spiking networks as we show when training on the permutation invariant MNIST task. In contrast to rate-based spiking networks that are often used to approximate the behavior of ANNs, the networks we present spike much more sparsely and their behavior cannot be directly approximated by conventional ANNs. Our results highlight a new approach for controlling the behavior of spiking networks with realistic temporal dynamics, opening up the potential for using these networks to process spike patterns with complex temporal information.",
"title": ""
},
{
"docid": "4c74b49b01e550cee8b49cbf3d142c15",
"text": "Neural embeddings are a popular set of methods for representing words, phrases or text as a low dimensional vector (typically 50-500 dimensions). However, it is difficult to interpret these dimensions in a meaningful manner, and creating neural embeddings requires extensive training and tuning of multiple parameters and hyperparameters. We present here a simple unsupervised method for representing words, phrases or text as a low dimensional vector, in which the meaning and relative importance of dimensions is transparent to inspection. We have created a near-comprehensive vector representation of words, and selected bigrams, trigrams and abbreviations, using the set of titles and abstracts in PubMed as a corpus. This vector is used to create several novel implicit word-word and text-text similarity metrics. The implicit word-word similarity metrics correlate well with human judgement of word pair similarity and relatedness, and outperform or equal all other reported methods on a variety of biomedical benchmarks, including several implementations of neural embeddings trained on PubMed corpora. Our implicit word-word metrics capture different aspects of word-word relatedness than word2vecbased metrics and are only partially correlated (rho = ~0.5-0.8 depending on task and corpus). The vector representations of words, bigrams, trigrams, abbreviations, and PubMed title+abstracts are all publicly available from http://arrowsmith.psych.uic.edu for release under CC-BY-NC license. Several public web query interfaces are also available at the same site, including one which allows the user to specify a given word and view its most closely related terms according to direct co-occurrence as well as different implicit similarity metrics.",
"title": ""
},
{
"docid": "7070a2d1e1c098950996d794c372cbc7",
"text": "Selecting the right audience for an advertising campaign is one of the most challenging, time-consuming and costly steps in the advertising process. To target the right audience, advertisers usually have two options: a) market research to identify user segments of interest and b) sophisticated machine learning models trained on data from past campaigns. In this paper we study how demand-side platforms (DSPs) can leverage the data they collect (demographic and behavioral) in order to learn reputation signals about end user convertibility and advertisement (ad) quality. In particular, we propose a reputation system which learns interest scores about end users, as an additional signal of ad conversion, and quality scores about ads, as a signal of campaign success. Then our model builds user segments based on a combination of demographic, behavioral and the new reputation signals and recommends transparent targeting rules that are easy for the advertiser to interpret and refine. We perform an experimental evaluation on industry data that showcases the benefits of our approach for both new and existing advertiser campaigns.",
"title": ""
},
{
"docid": "c4c482cc453884d0016c442b580e3424",
"text": "PURPOSE/OBJECTIVES\nTo better understand treatment-induced changes in sexuality from the patient perspective, to learn how women manage these changes in sexuality, and to identify what information they want from nurses about this symptom.\n\n\nRESEARCH APPROACH\nQualitative descriptive methods.\n\n\nSETTING\nAn outpatient gynecologic clinic in an urban area in the southeastern United States served as the recruitment site for patients.\n\n\nPARTICIPANTS\nEight women, ages 33-69, receiving first-line treatment for ovarian cancer participated in individual interviews. Five women, ages 40-75, participated in a focus group and their status ranged from newly diagnosed to terminally ill from ovarian cancer.\n\n\nMETHODOLOGIC APPROACH\nBoth individual interviews and a focus group were conducted. Content analysis was used to identify themes that described the experience of women as they became aware of changes in their sexuality. Triangulation of approach, the researchers, and theory allowed for a rich description of the symptom experience.\n\n\nFINDINGS\nRegardless of age, women reported that ovarian cancer treatment had a detrimental impact on their sexuality and that the changes made them feel \"no longer whole.\" Mechanical changes caused by surgery coupled with hormonal changes added to the intensity and dimension of the symptom experience. Physiologic, psychological, and social factors also impacted how this symptom was experienced.\n\n\nCONCLUSIONS\nRegardless of age or relationship status, sexuality is altered by the diagnosis and treatment of ovarian cancer.\n\n\nINTERPRETATION\nNurses have an obligation to educate women with ovarian cancer about anticipated changes in their sexuality that may come from treatment.",
"title": ""
},
{
"docid": "e6088779901bd4bfaf37a3a1784c3854",
"text": "There has been recently a great progress in the field of automatically generated knowledge bases and corresponding disambiguation systems that are capable of mapping text mentions onto canonical entities. Efforts like the before mentioned have enabled researchers and analysts from various disciplines to semantically “understand” contents. However, most of the approaches have been specifically designed for the English language and in particular support for Arabic is still in its infancy. Since the amount of Arabic Web contents (e.g. in social media) has been increasing dramatically over the last years, we see a great potential for endeavors that support an entity-level analytics of these data. To this end, we have developed a framework called AIDArabic that extends the existing AIDA system by additional components that allow the disambiguation of Arabic texts based on an automatically generated knowledge base distilled from Wikipedia. Even further, we overcome the still existing sparsity of the Arabic Wikipedia by exploiting the interwiki links between Arabic and English contents in Wikipedia, thus, enriching the entity catalog as well as disambiguation context.",
"title": ""
},
{
"docid": "9d9086fbdfa46ded883b14152df7f5a5",
"text": "This paper presents a low power continuous time 2nd order Low Pass Butterworth filter operating at power supply of 0.5V suitably designed for biomedical applications. A 3-dB bandwidth of 100 Hz using technology node of 0.18μm is achieved. The operational transconductance amplifier is a significant building block in continuous time filter design. To achieve necessary voltage headroom a pseudo-differential architecture is used to design bulk driven transconductor. In contrast, to the gate-driven OTA bulk-driven have the ability to operate over a wide input range. The output common mode voltage of the transconductor is set by a Common Mode Feedback (CMFB) circuit. The simulation results show that the filter has a peak-to-peak signal swing of 150mV (differential) for 1% THD, a dynamic range of 74.62 dB and consumes a total power of 0.225μW when operating at a supply voltage of 0.5V. The Figure of Merit (FOM) achieved by the filter is 0.055 fJ, lowest among similar low-voltage filters found in the literature.",
"title": ""
},
{
"docid": "30178d1de9d0aab8c3ab0ac9be674d8c",
"text": "The immune system protects from infections primarily by detecting and eliminating the invading pathogens; however, the host organism can also protect itself from infectious diseases by reducing the negative impact of infections on host fitness. This ability to tolerate a pathogen's presence is a distinct host defense strategy, which has been largely overlooked in animal and human studies. Introduction of the notion of \"disease tolerance\" into the conceptual tool kit of immunology will expand our understanding of infectious diseases and host pathogen interactions. Analysis of disease tolerance mechanisms should provide new approaches for the treatment of infections and other diseases.",
"title": ""
},
{
"docid": "171fd68f380f445723b024f290a02d69",
"text": "Cytokines, produced at the site of entry of a pathogen, drive inflammatory signals that regulate the capacity of resident and newly arrived phagocytes to destroy the invading pathogen. They also regulate antigen presenting cells (APCs), and their migration to lymph nodes to initiate the adaptive immune response. When naive CD4+ T cells recognize a foreign antigen-derived peptide presented in the context of major histocompatibility complex class II on APCs, they undergo massive proliferation and differentiation into at least four different T-helper (Th) cell subsets (Th1, Th2, Th17, and induced T-regulatory (iTreg) cells in mammals. Each cell subset expresses a unique set of signature cytokines. The profile and magnitude of cytokines produced in response to invasion of a foreign organism or to other danger signals by activated CD4+ T cells themselves, and/or other cell types during the course of differentiation, define to a large extent whether subsequent immune responses will have beneficial or detrimental effects to the host. The major players of the cytokine network of adaptive immunity in fish are described in this review with a focus on the salmonid cytokine network. We highlight the molecular, and increasing cellular, evidence for the existence of T-helper cells in fish. Whether these cells will match exactly to the mammalian paradigm remains to be seen, but the early evidence suggests that there will be many similarities to known subsets. Alternative or additional Th populations may also exist in fish, perhaps influenced by the types of pathogen encountered by a particular species and/or fish group. These Th cells are crucial for eliciting disease resistance post-vaccination, and hopefully will help resolve some of the difficulties in producing efficacious vaccines to certain fish diseases.",
"title": ""
},
{
"docid": "49445cfa92b95045d23a54eca9f9a592",
"text": "---------------------------------------------------------------------***--------------------------------------------------------------------Abstract In this competitive world, business is becoming highly saturated. Especially, the field of telecommunication faces complex challenges due to a number of vibrant competitive service providers. Therefore, it has become very difficult for them to retain existing customers. Since the cost of acquiring new customers is much higher than the cost of retaining the existing customers, it is the time for the telecom industries to take necessary steps to retain the customers to stabilize their market value. In the past decade, several data mining techniques have been proposed in the literature for predicting the churners using heterogeneous customer records. This paper reviews the different categories of customer data available in open datasets, predictive models and performance metrics used in the literature for churn prediction in telecom industry.",
"title": ""
},
{
"docid": "fddf6e71af23aba468989d6d09da989c",
"text": "The rapidly increasing pervasiveness and integration of computers in human society calls for a broad discipline under which this development can be studied. We argue that to design and use technology one needs to develop and use models of humans and machines in all their aspects, including cognitive and memory models, but also social influence and (artificial) emotions. We call this wider discipline Behavioural Computer Science (BCS), and argue in this paper for why BCS models should unify (models of) the behaviour of humans and machines when designing information and communication technology systems. Thus, one main point to be addressed is the incorporation of empirical evidence for actual human behaviour, instead of making inferences about behaviour based on the rational agent model. Empirical studies can be one effective way to constantly update the behavioural models. We are motivated by the future advancements in artificial intelligence which will give machines capabilities that from many perspectives will be indistinguishable from those of humans. Such machine behaviour would be studied using BCS models, looking at questions about machine trust like “Can a self driving car trust its passengers?”, or artificial influence like “Can the user interface adapt to the user’s behaviour, and thus influence this behaviour?”. We provide a few directions for approaching BCS, focusing on modelling of human and machine behaviour, as well as their interaction.",
"title": ""
}
] | scidocsrr |
276ce39f90cdd8bc86d4434f5451e320 | An overview of end-to-end language understanding and dialog management for personal digital assistants | [
{
"docid": "a48278ee8a21a33ff87b66248c6b0b8a",
"text": "We describe a unified multi-turn multi-task spoken language understanding (SLU) solution capable of handling multiple context sensitive classification (intent determination) and sequence labeling (slot filling) tasks simultaneously. The proposed architecture is based on recurrent convolutional neural networks (RCNN) with shared feature layers and globally normalized sequence modeling components. The temporal dependencies within and across different tasks are encoded succinctly as recurrent connections. The dialog system responses beyond SLU component are also exploited as effective external features. We show with extensive experiments on a number of datasets that the proposed joint learning framework generates state-of-the-art results for both classification and tagging, and the contextual modeling based on recurrent and external features significantly improves the context sensitivity of SLU models.",
"title": ""
},
{
"docid": "6f768934f02c0e559801a7b98d0fbbd7",
"text": "Voice-activated intelligent assistants, such as Siri, Google Now, and Cortana, are prevalent on mobile devices. However, it is challenging to evaluate them due to the varied and evolving number of tasks supported, e.g., voice command, web search, and chat. Since each task may have its own procedure and a unique form of correct answers, it is expensive to evaluate each task individually. This paper is the first attempt to solve this challenge. We develop consistent and automatic approaches that can evaluate different tasks in voice-activated intelligent assistants. We use implicit feedback from users to predict whether users are satisfied with the intelligent assistant as well as its components, i.e., speech recognition and intent classification. Using this approach, we can potentially evaluate and compare different tasks within and across intelligent assistants ac-cording to the predicted user satisfaction rates. Our approach is characterized by an automatic scheme of categorizing user-system interaction into task-independent dialog actions, e.g., the user is commanding, selecting, or confirming an action. We use the action sequence in a session to predict user satisfaction and the quality of speech recognition and intent classification. We also incorporate other features to further improve our approach, including features derived from previous work on web search satisfaction prediction, and those utilizing acoustic characteristics of voice requests. We evaluate our approach using data collected from a user study. Results show our approach can accurately identify satisfactory and unsatisfactory sessions.",
"title": ""
},
{
"docid": "a64bcfefdebc43809636d6d39887f6e2",
"text": "This paper investigates the use of deep belief networks (DBN) for semantic tagging, a sequence classification task, in spoken language understanding (SLU). We evaluate the performance of the DBN based sequence tagger on the well-studied ATIS task and compare our technique to conditional random fields (CRF), a state-of-the-art classifier for sequence classification. In conjunction with lexical and named entity features, we also use dependency parser based syntactic features and part of speech (POS) tags [1]. Under both noisy conditions (output of automatic speech recognition system) and clean conditions (manual transcriptions), our deep belief network based sequence tagger outperforms the best CRF based system described in [1] by an absolute 2% and 1% F-measure, respectively.Upon carrying out an analysis of cases where CRF and DBN models made different predictions, we observed that when discrete features are projected onto a continuous space during neural network training, the model learns to cluster these features leading to its improved generalization capability, relative to a CRF model, especially in cases where some features are either missing or noisy.",
"title": ""
},
{
"docid": "fbda5771eb59ef5abf6810b47412452d",
"text": "We demonstrate the Task Completion Platform (TCP); a multi-domain dialogue platform that can host and execute large numbers of goal-orientated dialogue tasks. The platform features a task configuration language, TaskForm, that allows the definition of each individual task to be decoupled from the overarching dialogue policy used by the platform to complete those tasks. This separation allows for simple and rapid authoring of new tasks, while dialogue policy and platform functionality evolve independent of the tasks. The current platform includes machine learnt models that provide contextual slot carry-over, flexible item selection, and task selection/switching. Any new task immediately gains the benefit of these pieces of built-in platform functionality. The platform is used to power many of the multi-turn dialogues supported by the Cortana personal assistant.",
"title": ""
}
] | [
{
"docid": "48c0cf44910459d16a45b31d25855b70",
"text": "In this paper, a beam-steering antenna array that employs a new type of reconfigurable phase shifter is presented. The phase shifter consists of a number of cascaded reconfigurable defected microstrip structure (DMS) units. Each DMS unit is made by etching a slot in a microstrip line and loading the slot with PIN diodes. The “on” and “off” states of the PIN diodes in the DMS unit provide the phase shifts by changing the current paths. Analyses on the performance of various phase shifters cascading different numbers of DMS units are conducted by both simulations and experiments. Using the proposed phase-shifter units and Wilkinson power dividers, a four-element beam-steering antenna array was designed, fabricated, and tested. Experimental results agree well with the simulated ones. The proposed antenna array employing DMS-based phase shifters offers a low-cost solution to beamforming in wireless communications.",
"title": ""
},
{
"docid": "2e0a8498613410fd5827e30b7b4daade",
"text": "Linux containers in the commercial world are changing the landscape for application development and deployments. Container technologies are also making inroads into HPC environments, as exemplified by NERSC’s Shifter and LBL’s Singularity. While the first generation of HPC containers offers some of the same benefits as the existing open container frameworks, like CoreOS or Docker, they do not address the cloud/commercial feature sets such as virtualized networks, full isolation, and orchestration. This paper will explore the use of containers in the HPC environment and summarize our study to determine how best to use these technologies in the HPC environment at scale. KeywordsShifter; HPC; Cray; container; virtualization; Docker; CoreOS",
"title": ""
},
{
"docid": "e8d2bad4083a4a6cf5f96aedd5112f3f",
"text": "Mechanic's hands is a poorly defined clinical finding that has been reported in a variety of rheumatologic diseases. Morphologic descriptions include hyperkeratosis on the sides of the digits that sometimes extends to the distal tips, diffuse palmar scale, and (more recently observed) linear discrete scaly papules in a similar lateral distribution. The association of mechanic's hands with dermatomyositis, although recognized, is still debatable. In this review, most studies have shown that mechanic's hands is commonly associated with dermatomyositis and displays histopathologic findings of interface dermatitis, colloid bodies, and interstitial mucin, which are consistent with a cutaneous connective tissue disease. A more specific definition of this entity would help to determine its usefulness in classifying and clinically identifying patients with dermatomyositis, with implications related to subsequent screening for associated comorbidities in this setting.",
"title": ""
},
{
"docid": "b9c253196a1cac6109e814e5d9a7cd97",
"text": "In this digital age, most business is conducted electronically. This contemporary paradigm creates openings for potentially harmful unanticipated information security incidents of both a criminal or civil nature, with the potential to cause considerable direct and indirect damage to smaller businesses. Electronic evidence is fundamental to the successful handling of such incidents. If an organisation does not prepare proactively for such incidents it is highly likely that important relevant digital evidence will not be available. Not being able to respond effectively could be extremely damaging to smaller companies, as they are unable to absorb losses as easily as larger organisations. In order to prepare smaller businesses for incidents of this nature, the implementation of Digital Forensic Readiness policies and procedures is necessitated. Numerous varying factors such as the perceived high cost, as well as the current lack of forensic skills, make the implementation of Digital Forensic Readiness appear difficult if not infeasible for smaller organisations. In order to solve this problem it is necessary to develop a scalable and flexible framework for the implementation of Digital Forensic Readiness based on the individual risk profile of a small to medium enterprise (SME). This paper aims to determine, from literature, the concepts of Digital Forensic Readiness and how they apply to SMEs. Based on the findings, the aspects of Digital Forensics and organisational characteristics that should be included in such a framework is highlighted.",
"title": ""
},
{
"docid": "8107b3dc36d240921571edfc778107ff",
"text": "FinFET devices have been proposed as a promising substitute for conventional bulk CMOS-based devices at the nanoscale due to their extraordinary properties such as improved channel controllability, a high on/off current ratio, reduced short-channel effects, and relative immunity to gate line-edge roughness. This brief builds standard cell libraries for the advanced 7-nm FinFET technology, supporting multiple threshold voltages and supply voltages. The circuit synthesis results of various combinational and sequential circuits based on the presented 7-nm FinFET standard cell libraries forecast 10× and 1000× energy reductions on average in a superthreshold regime and 16× and 3000× energy reductions on average in a near-threshold regime as compared with the results of the 14-nm and 45-nm bulk CMOS technology nodes, respectively.",
"title": ""
},
{
"docid": "26095dbc82b68c32881ad9316256bc42",
"text": "BACKGROUND\nSchizophrenia causes great suffering for patients and families. Today, patients are treated with medications, but unfortunately many still have persistent symptoms and an impaired quality of life. During the last 20 years of research in cognitive behavioral therapy (CBT) for schizophrenia, evidence has been found that the treatment is good for patients but it is not satisfactory enough, and more studies are being carried out hopefully to achieve further improvement.\n\n\nPURPOSE\nClinical trials and meta-analyses are being used to try to prove the efficacy of CBT. In this article, we summarize recent research using the cognitive model for people with schizophrenia.\n\n\nMETHODS\nA systematic search was carried out in PubMed (Medline). Relevant articles were selected if they contained a description of cognitive models for schizophrenia or psychotic disorders.\n\n\nRESULTS\nThere is now evidence that positive and negative symptoms exist in a continuum, from normality (mild form and few symptoms) to fully developed disease (intensive form with many symptoms). Delusional patients have reasoning bias such as jumping to conclusions, and those with hallucination have impaired self-monitoring and experience their own thoughts as voices. Patients with negative symptoms have negative beliefs such as low expectations regarding pleasure and success. In the entire patient group, it is common to have low self-esteem.\n\n\nCONCLUSIONS\nThe cognitive model integrates very well with the aberrant salience model. It takes into account neurobiology, cognitive, emotional and social processes. The therapist uses this knowledge when he or she chooses techniques for treatment of patients.",
"title": ""
},
{
"docid": "bce7787c5d56985006231471b57926c8",
"text": "Isoquercitrin is a rare, natural ingredient with several biological activities that is a key precursor for the synthesis of enzymatically modified isoquercitrin (EMIQ). The enzymatic production of isoquercitrin from rutin catalyzed by hesperidinase is feasible; however, the bioprocess is hindered by low substrate concentration and a long reaction time. Thus, a novel biphase system consisting of [Bmim][BF4]:glycine-sodium hydroxide (pH 9) (10:90, v/v) and glyceryl triacetate (1:1, v/v) was initially established for isoquercitrin production. The biotransformation product was identified using liquid chromatography-mass spectrometry, and the bonding mechanism of the enzyme and substrate was inferred using circular dichroism spectra and kinetic parameters. The highest rutin conversion of 99.5% and isoquercitrin yield of 93.9% were obtained after 3 h. The reaction route is environmentally benign and mild, and the biphase system could be reused. The substrate concentration was increased 2.6-fold, the reaction time was reduced to three tenths the original time. The three-dimensional structure of hesperidinase was changed in the biphase system, which α-helix and random content were reduced and β-sheet content was increased. Thus, the developed biphase system can effectively strengthen the hesperidinase-catalyzed synthesis of isoquercitrin with high yield.",
"title": ""
},
{
"docid": "fa34e68369a138cbaaf9ad085803e504",
"text": "This paper proposes an optimal rotor design method of an interior permanent magnet synchronous motor (IPMSM) by using a permanent magnet (PM) shape. An IPMSM is a structure in which PMs are buried in an inner rotor. The torque, torque ripple, and safety factor of IPMSM can vary depending on the position of the inserted PMs. To determine the optimal design variables according to the placement of the inserted PMs, parameter analysis was performed. Therefore, a response surface methodology, which is one of the statistical analysis design methods, was used. Among many other response surface methodologies, Box-Behnken design is the most commonly used. For the purpose of this research, Box-Behnken design was used to find the design parameter that can achieve minimum experimental variables of objective function. This paper determines the insert position of the PM to obtain high-torque, low-torque ripple by using a finite-element-method, and this paper obtains an optimal design by using a mechanical stiffness method in which a safety factor is considered.",
"title": ""
},
{
"docid": "ab430a12088341758de5cde60ef26070",
"text": "BACKGROUND\nThe nonselective 5-HT(4) receptor agonists, cisapride and tegaserod have been associated with cardiovascular adverse events (AEs).\n\n\nAIM\nTo perform a systematic review of the safety profile, particularly cardiovascular, of 5-HT(4) agonists developed for gastrointestinal disorders, and a nonsystematic summary of their pharmacology and clinical efficacy.\n\n\nMETHODS\nArticles reporting data on cisapride, clebopride, prucalopride, mosapride, renzapride, tegaserod, TD-5108 (velusetrag) and ATI-7505 (naronapride) were identified through a systematic search of the Cochrane Library, Medline, Embase and Toxfile. Abstracts from UEGW 2006-2008 and DDW 2008-2010 were searched for these drug names, and pharmaceutical companies approached to provide unpublished data.\n\n\nRESULTS\nRetrieved articles on pharmacokinetics, human pharmacodynamics and clinical data with these 5-HT(4) agonists, are reviewed and summarised nonsystematically. Articles relating to cardiac safety and tolerability of these agents, including any relevant case reports, are reported systematically. Two nonselective 5-HT(4) agonists had reports of cardiovascular AEs: cisapride (QT prolongation) and tegaserod (ischaemia). Interactions with, respectively, the hERG cardiac potassium channel and 5-HT(1) receptor subtypes have been suggested to account for these effects. No cardiovascular safety concerns were reported for the newer, selective 5-HT(4) agonists prucalopride, velusetrag, naronapride, or for nonselective 5-HT(4) agonists with no hERG or 5-HT(1) affinity (renzapride, clebopride, mosapride).\n\n\nCONCLUSIONS\n5-HT(4) agonists for GI disorders differ in chemical structure and selectivity for 5-HT(4) receptors. Selectivity for 5-HT(4) over non-5-HT(4) receptors may influence the agent's safety and overall risk-benefit profile. Based on available evidence, highly selective 5-HT(4) agonists may offer improved safety to treat patients with impaired GI motility.",
"title": ""
},
{
"docid": "62d940d69688bd66d30aca31eb98e256",
"text": "Recent years have seen increasing demand for treatments aimed at improving dental esthetics. In this context, both patients and dentists prefer to preserve dental structures as far as possible; thanks to technological advances, especially in adhesive dentistry, new materials and minimally invasive techniques such as \"no-prep\" (no preparation) veneers have made this possible. Nevertheless, no-prep veneers have specific indications and suffer certain disadvantages.\n\n\nOBJECTIVES\nThis clinical case describes the rehabilitation of the upper anterior region by means of no-prep veneers, with BOPT (Biologically Oriented Preparation Technique) cervical margins. The patient had requested an aesthetic treatment to improve irregularities of the gingival margins associated with the presence of diastemata resulting from microdontia. Key words:BOPT, micro-veneers, hybrid ceramic, ultra-fine veneers, diastemata, without prosthetic finish line, no-prep.",
"title": ""
},
{
"docid": "46a11a7ea2d8ada47e069b3ece775a32",
"text": "OBJECTIVE\nTo develop and validate a short questionnaire to estimate physical activity (PA) practice and sedentary behavior for the adult population.\n\n\nMETHODS\nThe short questionnaire was developed using data from a cross-sectional population-based survey (n = 6352) that included the Minnesota leisure-time PA questionnaire. Activities that explained a significant proportion of the variability of population PA practice were identified. Validation of the short questionnaire included a cross-sectional component to assess validity with respect to the data collected by accelerometers and a longitudinal component to assess reliability and sensitivity to detect changes (n = 114, aged 35 to 74 years).\n\n\nRESULTS\nSix types of activities that accounted for 87% of population variability in PA estimated with the Minnesota questionnaire were selected. The short questionnaire estimates energy expenditure in total PA and by intensity (light, moderate, vigorous), and includes 2 questions about sedentary behavior and a question about occupational PA. The short questionnaire showed high reliability, with intraclass correlation coefficients ranging between 0.79 to 0.95. The Spearman correlation coefficients between estimated energy expenditure obtained with the questionnaire and the number of steps detected by the accelerometer were as follows: 0.36 for total PA, 0.40 for moderate intensity, and 0.26 for vigorous intensity. The questionnaire was sensitive to detect changes in moderate and vigorous PA (correlation coefficients ranging from 0.26 to 0.34).\n\n\nCONCLUSION\nThe REGICOR short questionnaire is reliable, valid, and sensitive to detect changes in moderate and vigorous PA. This questionnaire could be used in daily clinical practice and epidemiological studies.",
"title": ""
},
{
"docid": "fd14b9e25affb05fd9b05036f3ce350b",
"text": "Recent advances in pedestrian detection are attained by transferring the learned features of Convolutional Neural Network (ConvNet) to pedestrians. This ConvNet is typically pre-trained with massive general object categories (e.g. ImageNet). Although these features are able to handle variations such as poses, viewpoints, and lightings, they may fail when pedestrian images with complex occlusions are present. Occlusion handling is one of the most important problem in pedestrian detection. Unlike previous deep models that directly learned a single detector for pedestrian detection, we propose DeepParts, which consists of extensive part detectors. DeepParts has several appealing properties. First, DeepParts can be trained on weakly labeled data, i.e. only pedestrian bounding boxes without part annotations are provided. Second, DeepParts is able to handle low IoU positive proposals that shift away from ground truth. Third, each part detector in DeepParts is a strong detector that can detect pedestrian by observing only a part of a proposal. Extensive experiments in Caltech dataset demonstrate the effectiveness of DeepParts, which yields a new state-of-the-art miss rate of 11:89%, outperforming the second best method by 10%.",
"title": ""
},
{
"docid": "09ecaf2cb56296c8097525b2c1ffb7dc",
"text": "Fruit and vegetables classification and recognition are still challenging in daily production and life. In this paper, we propose an efficient fruit and vegetables classification system using image saliency to draw the object regions and convolutional neural network (CNN) model to extract image features and implement classification. Image saliency is utilized to select main saliency regions according to saliency map. A VGG model is chosen to train for fruit and vegetables classification. Another contribution in this paper is that we establish a fruit and vegetables images database spanning 26 categories, which covers the major types in real life. Experiments are conducted on our own database, and the results show that our classification system achieves an excellent accuracy rate of 95.6%.",
"title": ""
},
{
"docid": "3111ef9867be7cf58be9694cbe2a14d9",
"text": "Grammatical Error Diagnosis for Chinese has always been a challenge for both foreign learners and NLP researchers, for the variousity of grammar and the flexibility of expression. In this paper, we present a model based on Bidirectional Long Short-Term Memory(Bi-LSTM) neural networks, which treats the task as a sequence labeling problem, so as to detect Chinese grammatical errors, to identify the error types and to locate the error positions. In the corpora of this year’s shared task, there can be multiple errors in a single offset of a sentence, to address which, we simutaneously train three Bi-LSTM models sharing word embeddings which label Missing, Redundant and Selection errors respectively. We regard word ordering error as a special kind of word selection error which is longer during training phase, and then separate them by length during testing phase. In NLP-TEA 3 shared task for Chinese Grammatical Error Diagnosis(CGED), Our system achieved relatively high F1 for all the three levels in the traditional Chinese track and for the detection level in the Simpified Chinese track.",
"title": ""
},
{
"docid": "1b2682d250ec1cddbb14303b14effef3",
"text": "This paper presents a path planning concept for trucks with trailers with kingpin hitching. This system is nonholonomic, has no flat output and is not stable in backwards driving direction. These properties are major challenges for path planning. The presented approach concentrates on the loading bay scenario. The considered task is to plan a path for the truck-trailer system from a start to a specified target configuration corresponding to the loading bay. Thereby, close distances to obstacles and multiple driving direction changes have to be handled. Furthermore, a so-called jackknife position has to be avoided. In a first step, an initial path is planned from the target to the start configuration using a tree-based path planner. Afterwards this path is refined locally by solving an optimal control problem. Due to the local nature of the planner, heuristic rules for direction changes are formulated. The performance of the proposed path planner is evaluated in simulation studies.",
"title": ""
},
{
"docid": "7bce92a72a19aef0079651c805883eb5",
"text": "Highly realistic virtual human models are rapidly becoming commonplace in computer graphics. These models, often represented by complex shape and requiring labor-intensive process, challenge the problem of automatic modeling. This paper studies the problem and solutions to automatic modeling of animatable virtual humans. Methods for capturing the shape of real people, parameterization techniques for modeling static shape (the variety of human body shapes) and dynamic shape (how the body shape changes as it moves) of virtual humans are classified, summarized and compared. Finally, methods for clothed virtual humans are reviewed.",
"title": ""
},
{
"docid": "9fd5e182851ff0be67e8865c336a1f77",
"text": "Following the developments of wireless and mobile communication technologies, mobile-commerce (M-commerce) has become more and more popular. However, most of the existing M-commerce protocols do not consider the user anonymity during transactions. This means that it is possible to trace the identity of a payer from a M-commerce transaction. Luo et al. in 2014 proposed an NFC-based anonymous mobile payment protocol. It used an NFC-enabled smartphone and combined a built-in secure element (SE) as a trusted execution environment to build an anonymous mobile payment service. But their scheme has several problems and cannot be functional in practice. In this paper, we introduce a new NFC-based anonymous mobile payment protocol. Our scheme has the following features:(1) Anonymity. It prevents the disclosure of user's identity by using virtual identities instead of real identity during the transmission. (2) Efficiency. Confidentiality is achieved by symmetric key cryptography instead of public key cryptography so as to increase the performance. (3) Convenience. The protocol is based on NFC and is EMV compatible. (4) Security. All the transaction is either encrypted or signed by the sender so the confidentiality and authenticity are preserved.",
"title": ""
},
{
"docid": "1c386cf468f62a812640b7f8b528bb73",
"text": "An efficient nanomedical platform that can combine two-photon cell imaging, near infrared (NIR) light and pH dual responsive drug delivery, and photothermal treatment was successfully developed based on fluorescent porous carbon-nanocapsules (FPC-NCs, size ∼100 nm) with carbon dots (CDs) embedded in the shell. The stable, excitation wavelength (λex)-tunable and upconverted fluorescence from the CDs embedded in the porous carbon shell enable the FPC-NCs to serve as an excellent confocal and two-photon imaging contrast agent under the excitation of laser with a broad range of wavelength from ultraviolet (UV) light (405 nm) to NIR light (900 nm). The FPC-NCs demonstrate a very high loading capacity (1335 mg g(-1)) toward doxorubicin drug benefited from the hollow cavity structure, porous carbon shell, as well as the supramolecular π stacking and electrostatic interactions between the doxorubicin molecules and carbon shell. In addition, a responsive release of doxorubicin from the FPC-NCs can be activated by lowering the pH to acidic (from 7.4 to 5.0) due to the presence of pH-sensitive carboxyl groups on the FPC-NCs and amino groups on doxorubicin molecules. Furthermore, the FPC-NCs can absorb and effectively convert the NIR light to heat, thus, manifest the ability of NIR-responsive drug release and combined photothermal/chemo-therapy for high therapeutic efficacy.",
"title": ""
},
{
"docid": "42d3f666325c3c9e2d61fcbad3c6659a",
"text": "Supernumerary or accessory nostrils are a very rare type of congenital nasal anomaly, with only a few cases reported in the literature. They can be associated with such malformations as facial clefts and they can be unilateral or bilateral, with most cases reported being unilateral. The accessory nostril may or may not communicate with the ipsilateral nasal cavity, probably depending on the degree of embryological progression of the anomaly. A case of simple supernumerary left nostril with no nasal cavity communication and with a normally developed nose is presented. The surgical treatment is described and the different speculative theories related to the embryogenesis of supernumerary nostrils are also reviewed.",
"title": ""
},
{
"docid": "a0b862a758c659b62da2114143bf7687",
"text": "The class imbalanced problem occurs in various disciplines when one of target classes has a tiny number of instances comparing to other classes. A typical classifier normally ignores or neglects to detect a minority class due to the small number of class instances. SMOTE is one of over-sampling techniques that remedies this situation. It generates minority instances within the overlapping regions. However, SMOTE randomly synthesizes the minority instances along a line joining a minority instance and its selected nearest neighbours, ignoring nearby majority instances. Our technique called SafeLevel-SMOTE carefully samples minority instances along the same line with different weight degree, called safe level. The safe level computes by using nearest neighbour minority instances. By synthesizing the minority instances more around larger safe level, we achieve a better accuracy performance than SMOTE and Borderline-SMOTE.",
"title": ""
}
] | scidocsrr |
01422d25c62ea15fd60f954b897e18ca | Localization in highly dynamic environments using dual-timescale NDT-MCL | [
{
"docid": "0203b3995c21e5e7026fe787eaef6e09",
"text": "Pose SLAM is the variant of simultaneous localization and map building (SLAM) is the variant of SLAM, in which only the robot trajectory is estimated and where landmarks are only used to produce relative constraints between robot poses. To reduce the computational cost of the information filter form of Pose SLAM and, at the same time, to delay inconsistency as much as possible, we introduce an approach that takes into account only highly informative loop-closure links and nonredundant poses. This approach includes constant time procedures to compute the distance between poses, the expected information gain for each potential link, and the exact marginal covariances while moving in open loop, as well as a procedure to recover the state after a loop closure that, in practical situations, scales linearly in terms of both time and memory. Using these procedures, the robot operates most of the time in open loop, and the cost of the loop closure is amortized over long trajectories. This way, the computational bottleneck shifts to data association, which is the search over the set of previously visited poses to determine good candidates for sensor registration. To speed up data association, we introduce a method to search for neighboring poses whose complexity ranges from logarithmic in the usual case to linear in degenerate situations. The method is based on organizing the pose information in a balanced tree whose internal levels are defined using interval arithmetic. The proposed Pose-SLAM approach is validated through simulations, real mapping sessions, and experiments using standard SLAM data sets.",
"title": ""
},
{
"docid": "48903eded4e1a88114e3917e2e6173b6",
"text": "The problem of generating maps with mobile robots has received considerable attention over the past years. Most of the techniques developed so far have been designed for situations in which the environment is static during the mapping process. Dynamic objects, however, can lead to serious errors in the resulting maps such as spurious objects or misalignments due to localization errors. In this paper we consider the problem of creating maps with mobile robots in dynamic environments. We present a new approach that interleaves mapping and localization with a probabilistic technique to identify spurious measurements. In several experiments we demonstrate that our algorithm generates accurate 2d and 3d in different kinds of dynamic indoor and outdoor environments. We also use our algorithm to isolate the dynamic objects and to generate three-dimensional representation of them.",
"title": ""
},
{
"docid": "bef4cf486ddc37d8ff4d5ed7a2b72aba",
"text": "We propose an on-line algorithm for simultaneous localization and mapping of dynamic environments. Our algorithm is capable of differentiating static and dynamic parts of the environment and representing them appropriately on the map. Our approach is based on maintaining two occupancy grids. One grid models the static parts of the environment, and the other models the dynamic parts of the environment. The union of the two grid maps provides a complete description of the environment over time. We also maintain a third map containing information about static landmarks detected in the environment. These landmarks provide the robot with localization. Results in simulation and real robots experiments show the efficiency of our approach and also show how the differentiation of dynamic and static entities in the environment and SLAM can be mutually beneficial.",
"title": ""
}
] | [
{
"docid": "f136e875f021ea3ea67a87c6d0b1e869",
"text": "Platelet-rich plasma (PRP) has been utilized for many years as a regenerative agent capable of inducing vascularization of various tissues using blood-derived growth factors. Despite this, drawbacks mostly related to the additional use of anti-coagulants found in PRP have been shown to inhibit the wound healing process. For these reasons, a novel platelet concentrate has recently been developed with no additives by utilizing lower centrifugation speeds. The purpose of this study was therefore to investigate osteoblast behavior of this novel therapy (injectable-platelet-rich fibrin; i-PRF, 100% natural with no additives) when compared to traditional PRP. Human primary osteoblasts were cultured with either i-PRF or PRP and compared to control tissue culture plastic. A live/dead assay, migration assay as well as a cell adhesion/proliferation assay were investigated. Furthermore, osteoblast differentiation was assessed by alkaline phosphatase (ALP), alizarin red and osteocalcin staining, as well as real-time PCR for genes encoding Runx2, ALP, collagen1 and osteocalcin. The results showed that all cells had high survival rates throughout the entire study period irrespective of culture-conditions. While PRP induced a significant 2-fold increase in osteoblast migration, i-PRF demonstrated a 3-fold increase in migration when compared to control tissue-culture plastic and PRP. While no differences were observed for cell attachment, i-PRF induced a significantly higher proliferation rate at three and five days when compared to PRP. Furthermore, i-PRF induced significantly greater ALP staining at 7 days and alizarin red staining at 14 days. A significant increase in mRNA levels of ALP, Runx2 and osteocalcin, as well as immunofluorescent staining of osteocalcin was also observed in the i-PRF group when compared to PRP. In conclusion, the results from the present study favored the use of the naturally-formulated i-PRF when compared to traditional PRP with anti-coagulants. Further investigation into the direct role of fibrin and leukocytes contained within i-PRF are therefore warranted to better elucidate their positive role in i-PRF on tissue wound healing.",
"title": ""
},
{
"docid": "46950519803aba56a0cce475964b99d7",
"text": "The coverage problem in the field of robotics is the problem of moving a sensor or actuator over all points in a given region. Example applications of this problem are lawn mowing, spray painting, and aerial or underwater mapping. In this paper, I consider the single-robot offline version of this problem, i.e. given a map of the region to be covered, plan an efficient path for a single robot that sweeps the sensor or actuator over all points. One basic approach to this problem is to decompose the region into subregions, select a sequence of those subregions, and then generate a path that covers each subregion in turn. This paper addresses the problem of creating a good decomposition. Under certain assumptions, the cost to cover a polygonal subregion is proportional to its minimum altitude. An optimal decomposition then minimizes the sum of subregion altitudes. This paper describes an algorithm to find the minimal sum of altitudes (MSA) decomposition of a region with a polygonal boundary and polygonal holes. This algorithm creates an initial decomposition based upon multiple line sweeps and then applies dynamic programming to find the optimal decomposition. This paper describes the algorithm and reports results from an implementation. Several appendices give details and proofs regarding line sweep algorithms.",
"title": ""
},
{
"docid": "f74aa960091bef1701dbc616657facb3",
"text": "Adverse reactions and unintended effects can occasionally occur with toxins for cosmetic use, even although they generally have an outstanding safety profile. As the use of fillers becomes increasingly more common, adverse events can be expected to increase as well. This article discusses complication avoidance, addressing appropriate training and proper injection techniques, along with patient selection and patient considerations. In addition to complications, avoidance or amelioration of common adverse events is discussed.",
"title": ""
},
{
"docid": "fdbe390730b949ccaa060a84257af2f1",
"text": "An increase in the prevalence of chronic disease has led to a rise in the demand for primary healthcare services in many developed countries. Healthcare technology tools may provide the leverage to alleviate the shortage of primary care providers. Here we describe the development and usage of an automated healthcare kiosk for the management of patients with stable chronic disease in the primary care setting. One-hundred patients with stable chronic disease were recruited from a primary care clinic. They used a kiosk in place of doctors’ consultations for two subsequent follow-up visits. Patient and physician satisfaction with kiosk usage were measured on a Likert scale. Kiosk blood pressure measurements and triage decisions were validated and optimized. Patients were assessed if they could use the kiosk independently. Patients and physicians were satisfied with all areas of kiosk usage. Kiosk triage decisions were accurate by the 2nd month of the study. Blood pressure measurements by the kiosk were equivalent to that taken by a nurse (p = 0.30, 0.14). Independent kiosk usage depended on patients’ language skills and educational levels. Healthcare kiosks represent an alternative way to manage patients with stable chronic disease. They have the potential to replace physician visits and improve access to primary healthcare. Patients welcome the use of healthcare technology tools, including those with limited literacy and education. Optimization of environmental and patient factors may be required prior to the implementation of kiosk-based technology in the healthcare setting.",
"title": ""
},
{
"docid": "f098bcf49fc82868cdc89a159e0c49eb",
"text": "Progressive Visual Analytics aims at improving the interactivity in existing analytics techniques by means of visualization as well as interaction with intermediate results. One key method for data analysis is dimensionality reduction, for example, to produce 2D embeddings that can be visualized and analyzed efficiently. t-Distributed Stochastic Neighbor Embedding (tSNE) is a well-suited technique for the visualization of high-dimensional data. tSNE can create meaningful intermediate results but suffers from a slow initialization that constrains its application in Progressive Visual Analytics. We introduce a controllable tSNE approximation (A-tSNE), which trades off speed and accuracy, to enable interactive data exploration. We offer real-time visualization techniques, including a density-based solution and a Magic Lens to inspect the degree of approximation. With this feedback, the user can decide on local refinements and steer the approximation level during the analysis. We demonstrate our technique with several datasets, in a real-world research scenario and for the real-time analysis of high-dimensional streams to illustrate its effectiveness for interactive data analysis.",
"title": ""
},
{
"docid": "0c4f02b3b361d60da1aec0f0c100dcf9",
"text": "Architecture Compliance Checking (ACC) is an approach to verify the conformance of implemented program code to high-level models of architectural design. ACC is used to prevent architectural erosion during the development and evolution of a software system. Static ACC, based on static software analysis techniques, focuses on the modular architecture and especially on rules constraining the modular elements. A semantically rich modular architecture (SRMA) is expressive and may contain modules with different semantics, like layers and subsystems, constrained by rules of different types. To check the conformance to an SRMA, ACC-tools should support the module and rule types used by the architect. This paper presents requirements regarding SRMA support and an inventory of common module and rule types, on which basis eight commercial and non-commercial tools were tested. The test results show large differences between the tools, but all could improve their support of SRMA, what might contribute to the adoption of ACC in practice.",
"title": ""
},
{
"docid": "a84d2de19a34b914e583c9f4379b68da",
"text": "English) xx Abstract(Arabic) xxiiArabic) xxii",
"title": ""
},
{
"docid": "22ad829acba8d8a0909f2b8e31c1f0c3",
"text": "Covariance matrices capture correlations that are invaluable in modeling real-life datasets. Using all d elements of the covariance (in d dimensions) is costly and could result in over-fitting; and the simple diagonal approximation can be over-restrictive. In this work, we present a new model, the Low-Rank Gaussian Mixture Model (LRGMM), for modeling data which can be extended to identifying partitions or overlapping clusters. The curse of dimensionality that arises in calculating the covariance matrices of the GMM is countered by using low-rank perturbed diagonal matrices. The efficiency is comparable to the diagonal approximation, yet one can capture correlations among the dimensions. Our experiments reveal the LRGMM to be an efficient and highly applicable tool for working with large high-dimensional datasets.",
"title": ""
},
{
"docid": "4ee17de5de87d923fafc9dbbe7266f2b",
"text": "Introduction Researchers have agreed that a favorable corporate reputation is one of the most important intangible assets driving company performance (Chun 2005; Fisher-Buttinger and Vallaster 2011; Gibson et al. 2006). Not to be confused with brand identity and image, corporate reputation is often defined as consumers’ accumulated opinions, perceptions, and attitudes towards the company (Fombrun et al. 2000; Fombrun and Shanley 1990; Hatch and Schultz 2001; Weigelt and Camerer 1988). In addition, corporate reputation is established by individuals’ relative perspective; thus, corporate reputation is closely linked to the consumers’ subjective evaluation about the company (Fombrun and Shanley 1990; Weigelt and Camerer 1988). The effect of corporate reputation on corporate performance has been supported in many articles. Earlier studies have reported that a positive reputation has a significant Abstract",
"title": ""
},
{
"docid": "17db752bfc7ce75ded5b3836c5ae3dd7",
"text": "Knowledge-based question answering relies on the availability of facts, the majority of which cannot be found in structured sources (e.g. Wikipedia info-boxes, Wikidata). One of the major components of extracting facts from unstructured text is Relation Extraction (RE). In this paper we propose a novel method for creating distant (weak) supervision labels for training a large-scale RE system. We also provide new evidence about the effectiveness of neural network approaches by decoupling the model architecture from the feature design of a state-of-the-art neural network system. Surprisingly, a much simpler classifier trained on similar features performs on par with the highly complex neural network system (at 75x reduction to the training time), suggesting that the features are a bigger contributor to the final performance.",
"title": ""
},
{
"docid": "685a3c1eee19ee71c36447c49aca757f",
"text": "Advanced diagnostic technologies, such as polymerase chain reaction (PCR) and enzyme-linked immunosorbent assay (ELISA), have been widely used in well-equipped laboratories. However, they are not affordable or accessible in resource-limited settings due to the lack of basic infrastructure and/or trained operators. Paper-based diagnostic technologies are affordable, user-friendly, rapid, robust, and scalable for manufacturing, thus holding great potential to deliver point-of-care (POC) diagnostics to resource-limited settings. In this review, we present the working principles and reaction mechanism of paper-based diagnostics, including dipstick assays, lateral flow assays (LFAs), and microfluidic paper-based analytical devices (μPADs), as well as the selection of substrates and fabrication methods. Further, we report the advances in improving detection sensitivity, quantification readout, procedure simplification and multi-functionalization of paper-based diagnostics, and discuss the disadvantages of paper-based diagnostics. We envision that miniaturized and integrated paper-based diagnostic devices with the sample-in-answer-out capability will meet the diverse requirements for diagnosis and treatment monitoring at the POC.",
"title": ""
},
{
"docid": "59a4bf897006a0bcadb562ff6446e4e5",
"text": "As the number and variety of cyber threats increase, it becomes more critical to share intelligence information in a fast and efficient manner. However, current cyber threat intelligence data do not contain sufficient information about how to specify countermeasures or how institutions should apply countermeasures automatically on their networks. A flexible and agile network architecture is required in order to determine and deploy countermeasures quickly. Software-defined networks facilitate timely application of cyber security measures thanks to their programmability. In this work, we propose a novel model for producing software-defined networking-based solutions against cyber threats and configuring networks automatically using risk analysis. We have developed a prototype implementation of the proposed model and demonstrated the applicability of the model. Furthermore, we have identified and presented future research directions in this area.",
"title": ""
},
{
"docid": "dcece9a321b4483de7327de29a641fd2",
"text": "A class of optimal control problems for quasilinear elliptic equations is considered, where the coefficients of the elliptic differential operator depend on the state function. Firstand second-order optimality conditions are discussed for an associated control-constrained optimal control problem. In particular, the Pontryagin maximum principle and second-order sufficient optimality conditions are derived. One of the main difficulties is the non-monotone character of the state equation.",
"title": ""
},
{
"docid": "fb9afce9cc1683cb3adc2e3c747758e4",
"text": "Hundreds of millions of users each day use web search engines to meet their information needs. Advances in web search effectiveness are therefore perhaps the most significant public outcomes of IR research. Query expansion is one such method for improving the effectiveness of ranked retrieval by adding additional terms to a query. In previous approaches to query expansion, the additional terms are selected from highly ranked documents returned from an initial retrieval run. We propose a new method of obtaining expansion terms, based on selecting terms from past user queries that are associated with documents in the collection. Our scheme is effective for query expansion for web retrieval: our results show relative improvements over unexpanded full text retrieval of 26%--29%, and 18%--20% over an optimised, conventional expansion approach.",
"title": ""
},
{
"docid": "d0992076bfbf8cac6fd66c5bbfb671eb",
"text": "In this paper, we propose a supervised model for ranking word importance that incorporates a rich set of features. Our model is superior to prior approaches for identifying words used in human summaries. Moreover we show that an extractive summarizer which includes our estimation of word importance results in summaries comparable with the state-of-the-art by automatic evaluation. Disciplines Computer Engineering | Computer Sciences Comments University of Pennsylvania Department of Computer and Information Science Technical Report No. MSCIS-14-02. This technical report is available at ScholarlyCommons: http://repository.upenn.edu/cis_reports/989 Improving the Estimation of Word Importance for News Multi-Document Summarization Extended Technical Report Kai Hong University of Pennsylvania Philadelphia, PA, 19104 hongkai1@seas.upenn.edu Ani Nenkova University of Pennsylvania Philadelphia, PA, 19104 nenkova@seas.upenn.edu",
"title": ""
},
{
"docid": "3e6dbaf4ef18449c82e29e878fa9a8c5",
"text": "The description of a software architecture style must include the structural model of the components and their interactions, the laws governing the dynamic changes in the architecture, and the communication pattern. In our work we represent a system as a graph where hyperedges are components and nodes are ports of communication. The construction and dynamic evolut,ion of the style will be represented as context-free productions and graph rewriting. To model the evolution of the system we propose to use techniques of constraint solving. From this approach we obtain an intuitive way to model systems with nice characteristics for the description of dynamic architectures and reconfiguration and, a unique language to describe the style, model the evolution of the system and prove properties.",
"title": ""
},
{
"docid": "7e58396148d8e8c8ca7d3439c6b5c872",
"text": "The traditional inductor-based buck converter has been the dominant design for step-down switched-mode voltage regulators for decades. Switched-capacitor (SC) DC-DC converters, on the other hand, have traditionally been used in low- power (<;10mW) and low-conversion-ratio (<;4:1) applications where neither regulation nor efficiency is critical. However, a number of SC converter topologies are very effective in their utilization of switches and passive elements, especially in relation to the ever-popular buck converters [1,2,5]. This work encompasses the complete design, fabrication, and test of a CMOS-based switched-capacitor DC-DC converter, addressing the ubiquitous 12 to 1.5V board-mounted point-of-load application. In particular, the circuit developed in this work attains higher efficiency (92% peak, and >;80% over a load range of 5mA to 1A) than surveyed competitive buck converters, while requiring less board area and less costly passive components. The topology and controller enable a wide input voltage (V!N) range of 7.5 to 13.5V with an output voltage (Vοuτ) of 1.5V Control techniques based on feedback and feedforward provide tight regulation (30mVpp) under worst-case load-step (1A) conditions. This work shows that SC converters can outperform buck converters, and thus the scope of SC converter applications can and should be expanded.",
"title": ""
},
{
"docid": "b0fac0b564e662b43c77593902e502fc",
"text": "Three methods for fitting the diffusion model (Ratcliff, 1978) to experimental data are examined. Sets of simulated data were generated with known parameter values, and from fits of the model, we found that the maximum likelihood method was better than the chi-square and weighted least squares methods by criteria of bias in the parameters relative to the parameter values used to generate the data and standard deviations in the parameter estimates. The standard deviations in the parameter values can be used as measures of the variability in parameter estimates from fits to experimental data. We introduced contaminant reaction times and variability into the other components of processing besides the decision process and found that the maximum likelihood and chi-square methods failed, sometimes dramatically. But the weighted least squares method was robust to these two factors. We then present results from modifications of the maximum likelihood and chi-square methods, in which these factors are explicitly modeled, and show that the parameter values of the diffusion model are recovered well. We argue that explicit modeling is an important method for addressing contaminants and variability in nondecision processes and that it can be applied in any theoretical approach to modeling reaction time.",
"title": ""
},
{
"docid": "127bbcb3df6c43c2d791929426e5e087",
"text": "Uplift modeling is a classification method that determines the incremental impact of an action on a given population. Uplift modeling aims at maximizing the area under the uplift curve, which is the difference between the subject and control sets’ area under the lift curve. Lift and uplift curves are seldom used outside of the marketing domain, whereas the related ROC curve is frequently used in multiple areas. Achieving a good uplift using an ROC-based model instead of lift may be more intuitive in several areas, and may help uplift modeling reach a wider audience. We alter SAYL, an uplift-modeling statistical relational learner, to use ROC instead of lift. We test our approach on a screening mammography dataset. SAYL-ROC outperforms SAYL on our data, though not significantly, suggesting that ROC can be used for uplift modeling. On the other hand, SAYL-ROC returns larger models, reducing interpretability.",
"title": ""
},
{
"docid": "f6a9670544a784a5fc431746557473a3",
"text": "Massive multiple-input multiple-output (MIMO) systems are cellular networks where the base stations (BSs) are equipped with unconventionally many antennas, deployed on co-located or distributed arrays. Huge spatial degrees-of-freedom are achieved by coherent processing over these massive arrays, which provide strong signal gains, resilience to imperfect channel knowledge, and low interference. This comes at the price of more infrastructure; the hardware cost and circuit power consumption scale linearly/affinely with the number of BS antennas N. Hence, the key to cost-efficient deployment of large arrays is low-cost antenna branches with low circuit power, in contrast to today's conventional expensive and power-hungry BS antenna branches. Such low-cost transceivers are prone to hardware imperfections, but it has been conjectured that the huge degrees-of-freedom would bring robustness to such imperfections. We prove this claim for a generalized uplink system with multiplicative phase-drifts, additive distortion noise, and noise amplification. Specifically, we derive closed-form expressions for the user rates and a scaling law that shows how fast the hardware imperfections can increase with N while maintaining high rates. The connection between this scaling law and the power consumption of different transceiver circuits is rigorously exemplified. This reveals that one can make √N the circuit power increase as N, instead of linearly, by careful circuit-aware system design.",
"title": ""
}
] | scidocsrr |
e4d7a87c92ac8e6993e5bd4fb588f345 | Computer-Assisted Text Analysis for Social Science: Topic Models and Beyond | [
{
"docid": "fce925493fc9f7cbbe4c202e5e625605",
"text": "Topic models are a useful and ubiquitous tool for understanding large corpora. However, topic models are not perfect, and for many users in computational social science, digital humanities, and information studies—who are not machine learning experts—existing models and frameworks are often a “take it or leave it” proposition. This paper presents a mechanism for giving users a voice by encoding users’ feedback to topic models as correlations between words into a topic model. This framework, interactive topic modeling (itm), allows untrained users to encode their feedback easily and iteratively into the topic models. Because latency in interactive systems is crucial, we develop more efficient inference algorithms for tree-based topic models. We validate the framework both with simulated and real users.",
"title": ""
}
] | [
{
"docid": "70f4620fb6bbcb35fe15c402fae49ef9",
"text": "BACKGROUND AND OBJECTIVES\nLong-term use of antiretroviral therapy (ART) to treat HIV infection has been associated with dyslipidemia and metabolic and cardiovascular complications. Available options for patients at risk of cardiovascular disease include antiretroviral drugs with improved lipid profiles. Dolutegravir is one of a new generation of HIV integrase inhibitors recently incorporated into the US Department of Health and Human Services, German, Spanish, and Italian HIV treatment guidelines as a preferred first-line third agent in combination with dual nucleoside reverse transcriptase inhibitor (NRTI) backbone therapies. To understand the lipid profile of dolutegravir in the context of combination ART, we analyzed the lipid outcomes at 48 weeks in ART-naive participants in four phase IIb-IIIb clinical trials.\n\n\nMETHODS\nVariables included in this analysis were total cholesterol (TC), low-density lipoprotein (LDL) cholesterol (LDL-C), high-density lipoprotein (HDL) cholesterol (HDL-C), TC/HDL ratio, and triglycerides at baseline and week 48.\n\n\nRESULTS\nIn a comparative analysis, dolutegravir demonstrated a broadly neutral effect on lipids versus efavirenz or ritonavir-boosted darunavir; in both comparisons, patients taking dolutegravir exhibited smaller increases in TC, LDL-C, and triglyceride levels. In comparison with raltegravir, dolutegravir exhibited a similar lipid profile, including small increases in TC, LDL-C, and triglyceride levels for both agents. In the pooled dolutegravir analysis, minimal increases in LDL-C and triglycerides were observed but mean values at 48 weeks remained below National Cholesterol Education Program target levels. HDL-C levels increased at 48 weeks, and the mean TC/HDL-C ratio was 0.6 at 48 weeks; these values are associated with a lower risk of cardiovascular disease.\n\n\nCONCLUSIONS\nTogether, these data show that dolutegravir has a safer lipid profile in combination ART and provides an important treatment option for older patients who may have other risk factors for metabolic syndrome or cardiovascular disease.",
"title": ""
},
{
"docid": "3bd639feecf4194c73c3e20ae4ef8203",
"text": "We present an optimized implementation of the Fan-Vercauteren variant of Brakerski’s scale-invariant homomorphic encryption scheme. Our algorithmic improvements focus on optimizing decryption and homomorphic multiplication in the Residue Number System (RNS), using the Chinese Remainder Theorem (CRT) to represent and manipulate the large coefficients in the ciphertext polynomials. In particular, we propose efficient procedures for scaling and CRT basis extension that do not require translating the numbers to standard (positional) representation. Compared to the previously proposed RNS design due to Bajard et al. [3], our procedures are simpler and faster, and introduce a lower amount of noise. We implement our optimizations in the PALISADE library and evaluate the runtime performance for the range of multiplicative depths from 1 to 100. For example, homomorphic multiplication for a depth-20 setting can be executed in 62 ms on a modern server system, which is already practical for some outsourced-computing applications. Our algorithmic improvements can also be applied to other scale-invariant homomorphic encryption schemes, such as YASHE.",
"title": ""
},
{
"docid": "62e0f08dc9f0415cdff69e7c94c82a9a",
"text": "In August 2012, the American Psychological Association (APA) Council of Representatives voted overwhelmingly to adopt as APA policy a Resolution on the Recognition of Psychotherapy Effectiveness. This invited article traces the origins and intentions of that resolution and its protracted journey through the APA governance labyrinth. We summarize the planned dissemination and projected results of the resolution and identify several lessons learned through the entire process.",
"title": ""
},
{
"docid": "4d383a53c180d5dc4473ab9d7795639a",
"text": "With pervasive applications of medical imaging in health-care, biomedical image segmentation plays a central role in quantitative analysis, clinical diagnosis, and medical intervention. Since manual annotation suffers limited reproducibility, arduous efforts, and excessive time, automatic segmentation is desired to process increasingly larger scale histopathological data. Recently, deep neural networks (DNNs), particularly fully convolutional networks (FCNs), have been widely applied to biomedical image segmentation, attaining much improved performance. At the same time, quantization of DNNs has become an active research topic, which aims to represent weights with less memory (precision) to considerably reduce memory and computation requirements of DNNs while maintaining acceptable accuracy. In this paper, we apply quantization techniques to FCNs for accurate biomedical image segmentation. Unlike existing literatures on quantization which primarily targets memory and computation complexity reduction, we apply quantization as a method to reduce overfitting in FCNs for better accuracy. Specifically, we focus on a state-of-the-art segmentation framework, suggestive annotation [26], which judiciously extracts representative annotation samples from the original training dataset, obtaining an effective small-sized balanced training dataset. We develop two new quantization processes for this framework: (1) suggestive annotation with quantization for highly representative training samples, and (2) network training with quantization for high accuracy. Extensive experiments on the MICCAI Gland dataset show that both quantization processes can improve the segmentation performance, and our proposed method exceeds the current state-of-the-art performance by up to 1%. In addition, our method has a reduction of up to 6.4x on memory usage.",
"title": ""
},
{
"docid": "122ef555ab2919bb2c0006e90dc2f093",
"text": "This paper presents comparison of maximum likelihood (ML) and discriminative maximum mutual information (MMI) training for acoustic modeling in language identification (LID). Both approaches are compared on state-of-the-art shifted delta-cepstra features, the results are reported on data from NIST 2003 evaluations. Clear advantage of MMI over ML training is shown. Further improvements of acoustic LID are discussed: heteroscedastic linear discriminant analysis (HLDA) for feature de-correlation and dimensionality reduction and ergodic hidden Markov models (EHMM) for better modeling of dynamics in the acoustic space. The final error rate compares favorably to other results published on NIST 2003 data",
"title": ""
},
{
"docid": "043b4305f9f3c239b0f2061b8afa0648",
"text": "Proliferation of information is a major confront faced by e-commerce industry. To ease the customers from this information proliferation, Recommender Systems (RS) were introduced. To improve the computational time of a RS for large scale data, the process of recommendation can be implemented on a scalable, fault tolerant and a distributed processing framework. This paper proposes a Content-Based RS implemented on scalable, fault tolerant and distributed framework of Hadoop Map Reduce. To generate recommendations with improved computational time, the proposed technique of Map Reduce Content-Based Recommendation (MRCBR) is implemented using Hadoop Map Reduce which follows the traditional process of content-based recommendation. MRCBR technique comprises of user profiling and document feature extraction which uses the vector space model followed by computing similarity to generate recommendation for the target user. Recommendations generated for the target user is a set of Top N documents. The proposed technique of recommendation is executed on a cluster of Hadoop and is tested for News dataset. News items are collected using RSS feeds and are stored in MongoDB. Computational time of MRCBR is evaluated with a Speedup factor and performance is evaluated with the standard evaluation metric of Precision, Recall and F-Measure.",
"title": ""
},
{
"docid": "ef068ddc1d7cd8dd26acf4fafc54254d",
"text": "In this paper, we study object detection using a large pool of unlabeled images and only a few labeled images per category, named “few-shot object detection”. The key challenge consists in generating trustworthy training samples as many as possible from the pool. Using few training examples as seeds, our method iterates between model training and high-confidence sample selection. In training, easy samples are generated first and, then the poorly initialized model undergoes improvement. As the model becomes more discriminative, challenging but reliable samples are selected. After that, another round of model improvement takes place. To further improve the precision and recall of the generated training samples, we embed multiple detection models in our framework, which has proven to outperform the single model baseline and the model ensemble method. Experiments on PASCAL VOC’07 and ILSVRC’13 indicate that by using as few as three or four samples selected for each category, our method produces very competitive results when compared to the state-of-the-art weakly-supervised approaches using a large number of image-level labels.",
"title": ""
},
{
"docid": "92d4facca9b6be43e493cd55b1a83252",
"text": "Ontology Based Data Access (OBDA) [4] is a paradigm of accessing data trough a conceptual layer. Usually, the conceptual layer is expressed in the form of an RDF(S) [10] or OWL [15] ontology, and the data is stored in relational databases. The terms in the conceptual layer are mapped to the data layer using mappings which associate to each element of the conceptual layer a (possibly complex SQL) query over the data sources. The mappings have been formalized in the recent R2RML W3C standard [6]. This virtual graph can then be queried using an RDF query language such as SPARQL [7]. Formally, an OBDA system is a triple O = 〈T ,S,M〉, where:",
"title": ""
},
{
"docid": "b41d56e726628673d12b9efcb715a69c",
"text": "Ten new phenylpropanoid glucosides, tadehaginosides A-J (1-10), and the known compound tadehaginoside (11) were obtained from Tadehagi triquetrum. These phenylpropanoid glucosides were structurally characterized through extensive physical and chemical analyses. Compounds 1 and 2 represent the first set of dimeric derivatives of tadehaginoside with an unusual bicyclo[2.2.2]octene skeleton, whereas compounds 3 and 4 contain a unique cyclobutane basic core in their carbon scaffolds. The effects of these compounds on glucose uptake in C2C12 myotubes were evaluated. Compounds 3-11, particularly 4, significantly increased the basal and insulin-elicited glucose uptake. The results from molecular docking, luciferase analyses, and ELISA indicated that the increased glucose uptake may be due to increases in peroxisome proliferator-activated receptor γ (PPARγ) activity and glucose transporter-4 (GLUT-4) expression. These results indicate that the isolated phenylpropanoid glucosides, particularly compound 4, have the potential to be developed into antidiabetic compounds.",
"title": ""
},
{
"docid": "72a6a7fe366def9f97ece6d1ddc46a2e",
"text": "Our work in this paper presents a prediction of quality of experience based on full reference parametric (SSIM, VQM) and application metrics (resolution, bit rate, frame rate) in SDN networks. First, we used DCR (Degradation Category Rating) as subjective method to build the training model and validation, this method is based on not only the quality of received video but also the original video but all subjective methods are too expensive, don't take place in real time and takes much time for example our method takes three hours to determine the average MOS (Mean Opinion Score). That's why we proposed novel method based on machine learning algorithms to obtain the quality of experience in an objective manner. Previous researches in this field help us to use four algorithms: Decision Tree (DT), Neural Network, K nearest neighbors KNN and Random Forest RF thanks to their efficiency. We have used two metrics recommended by VQEG group to assess the best algorithm: Pearson correlation coefficient r and Root-Mean-Square-Error RMSE. The last part of the paper describes environment based on: Weka to analyze ML algorithms, MSU tool to calculate SSIM and VQM and Mininet for the SDN simulation.",
"title": ""
},
{
"docid": "fd576b16a55c8f6bc4922561ef0d80bd",
"text": "Abs t rad -Th i s paper presents all controllers for the general ~'® control problem (with no assumptions on the plant matrices). Necessary and sufficient conditions for the existence of an ~® controller of any order are given in terms of three Linear Matrix Inequalities (LMIs). Our existence conditions are equivalent to Scherer's results, but with a more elementary derivation. Furthermore, we provide the set of all ~(= controllers explicitly parametrized in the state space using the positive definite solutions to the LMIs. Even under standard assumptions (full rank, etc.), our controller parametrization has an advantage over the Q-parametrization. The freedom Q (a real-rational stable transfer matrix with the ~® norm bounded above by a specified number) is replaced by a constant matrix L of fixed dimension with a norm bound, and the solutions (X, Y) to the LMIs. The inequality formulation converts the existence conditions to a convex feasibility problem, and also the free matrix L and the pair (X, Y) define a finite dimensional design space, as opposed to the infinite dimensional space associated with the Q-parametrization.",
"title": ""
},
{
"docid": "f7bc42beb169e42496b674c918541865",
"text": "Brain endothelial cells are unique among endothelial cells in that they express apical junctional complexes, including tight junctions, which quite resemble epithelial tight junctions both structurally and functionally. They form the blood-brain-barrier (BBB) which strictly controls the exchanges between the blood and the brain compartments by limiting passive diffusion of blood-borne solutes while actively transporting nutrients to the brain. Accumulating experimental and clinical evidence indicate that BBB dysfunctions are associated with a number of serious CNS diseases with important social impacts, such as multiple sclerosis, stroke, brain tumors, epilepsy or Alzheimer's disease. This review will focus on the implication of brain endothelial tight junctions in BBB architecture and physiology, will discuss the consequences of BBB dysfunction in these CNS diseases and will present some therapeutic strategies for drug delivery to the brain across the BBB.",
"title": ""
},
{
"docid": "e389bed063035d3e9160d3136d2729a0",
"text": "We introduce and construct timed commitment schemes, an extension to the standard notion of commitments in which a potential forced opening phase permits the receiver to recover (with effort) the committed value without the help of the committer. An important application of our timed-commitment scheme is contract signing: two mutually suspicious parties wish to exchange signatures on a contract. We show a two-party protocol that allows them to exchange RSA or Rabin signatures. The protocol is strongly fair: if one party quits the protocol early, then the two parties must invest comparable amounts of time to retrieve the signatures. This statement holds even if one party has many more machines than the other. Other applications, including honesty preserving auctions and collective coin-flipping, are discussed.",
"title": ""
},
{
"docid": "15c805c71f822f8e12d7f12f321f7844",
"text": "The movement pattern of mobile users plays an important role in performance analysis of wireless computer and communication networks. In this paper, we first give an overview and classification of mobility models used for simulation-based studies. Then, we present an enhanced random mobility model, which makes the movement trace of mobile stations more realistic than common approaches for random mobility. Our movement concept is based on random processes for speed and direction control in which the new values are correlated to previous ones. Upon a speed change event, a new target speed is chosen, and an acceleration is set to achieve this target speed. The principles for direction changes are similar. Finally, we discuss strategies for the stations' border behavior (i.e., what happens when nodes move out of the simulation area) and show the effects of certain border behaviors and mobility models on the spatial user distribution.",
"title": ""
},
{
"docid": "1ac3f0ba0502e01f0e5bae95329cd33f",
"text": "Two studies examined hypotheses drawn from a proposed modification of the social-cognitive model of achievement motivation that centered on the 2 x 2 achievement goal framework. Implicit theories of ability were shown to be direct predictors of performance attainment and intrinsic motivation, and the goals of the 2 x 2 framework were shown to account for these direct relations. Perceived competence was shown to be a direct predictor of achievement goals, not a moderator of relations implicit theory or achievement goal effects. The results highlight the utility of attending to the approach-avoidance distinction in conceptual models of achievement motivation and are fully in line with the hierarchical model of achievement motivation.",
"title": ""
},
{
"docid": "859e5fda6de846a73c291dbe656d4137",
"text": "A platform to study ultrasound as a source for wireless energy transfer and communication for implanted medical devices is described. A tank is used as a container for a pair of electroacoustic transducers, where a control unit is fixed to one wall of the tank and a transponder can be manually moved in three axes and rotate using a mechanical system. The tank is filled with water to allow acoustic energy and data transfer, and the system is optimized to avoid parasitic effects due to cables, reflection paths and cross talk problems. A printed circuit board is developed to test energy scavenging such that enough acoustic intensity is generated by the control unit to recharge a battery loaded to the transponder. In the same manner, a second printed circuit board is fabricated to study transmission of information through acoustic waves.",
"title": ""
},
{
"docid": "c65cebec214fc6c45e266bfcce731676",
"text": "Creativity is central to much human problem solving and innovation. Brainstorming processes attempt to leverage group creativity, but group dynamics sometimes limit their utility. We present IdeaExpander, a tool to support group brainstorming by intelligently selecting pictorial stimuli based on the group's conversation The design is based on theories of how perception, thinking, and communication interact; a pilot study (N=16) suggests that it increases individuals' idea production and that people value it.",
"title": ""
},
{
"docid": "68a537c35da5546f60672c38f968b97a",
"text": "Visual analysis of human motion is currently one of the most active research topics in computer vision. This strong interest is driven by a wide spectrum of promising applications in many areas such as virtual reality, smart surveillance, perceptual interface, etc. Human motion analysis concerns the detection, tracking and recognition of people, and more generally, the understanding of human behaviors, from image sequences involving humans. This paper provides a comprehensive survey of research on computer-vision-based human motion analysis. The emphasis is on three major issues involved in a general human motion analysis system, namely human detection, tracking and activity understanding. Various methods for each issue are discussed in order to examine the state of the art. Finally, some research challenges and future directions are discussed. ? 2002 Pattern Recognition Society. Published by Elsevier Science Ltd. All rights reserved.",
"title": ""
},
{
"docid": "17caec370a97af736d948123f9e7be73",
"text": "Multiple-purpose forensics has been attracting increasing attention worldwide. However, most of the existing methods based on hand-crafted features often require domain knowledge and expensive human labour and their performances can be affected by factors such as image size and JPEG compression. Furthermore, many anti-forensic techniques have been applied in practice, making image authentication more difficult. Therefore, it is of great importance to develop methods that can automatically learn general and robust features for image operation detectors with the capability of countering anti-forensics. In this paper, we propose a new convolutional neural network (CNN) approach for multi-purpose detection of image manipulations under anti-forensic attacks. The dense connectivity pattern, which has better parameter efficiency than the traditional pattern, is explored to strengthen the propagation of general features related to image manipulation detection. When compared with three state-of-the-art methods, experiments demonstrate that the proposed CNN architecture can achieve a better performance (i.e., with a 11% improvement in terms of detection accuracy under anti-forensic attacks). The proposed method can also achieve better robustness against JPEG compression with maximum improvement of 13% on accuracy under low-quality JPEG compression.",
"title": ""
},
{
"docid": "a4e6b629ec4b0fdf8784ba5be1a62260",
"text": "Today's real-world databases typically contain millions of items with many thousands of fields. As a result, traditional distribution-based outlier detection techniques have more and more restricted capabilities and novel k-nearest neighbors based approaches have become more and more popular. However, the problems with these k-nearest neighbors rankings for top n outliers, are very computationally expensive for large datasets, and doubts exist in general whether they would work well for high dimensional datasets. To partially circumvent these problems, we propose in this paper a new global outlier factor and a new local outlier factor and an efficient outlier detection algorithm developed upon them that is easy to implement and can provide competing performances with existing solutions. Experiments performed on both synthetic and real data sets demonstrate the efficacy of our method. & 2014 Elsevier Ltd. All rights reserved.",
"title": ""
}
] | scidocsrr |
84d7a912ed66e09ac70ade8323c0003f | Programming with personalized pagerank: a locally groundable first-order probabilistic logic | [
{
"docid": "26a599c22c173f061b5d9579f90fd888",
"text": "markov logic an interface layer for artificial markov logic an interface layer for artificial shinichi tsukada in size 22 syyjdjbook.buncivy yumina ooba in size 24 ajfy7sbook.ztoroy okimi in size 15 edemembookkey.16mb markov logic an interface layer for artificial intelligent systems (ai-2) ubc computer science interface layer for artificial intelligence daniel lowd essential principles for autonomous robotics markovlogic: aninterfacelayerfor arti?cialintelligence official encyclopaedia of sheffield united football club hot car hot car firext answers || 2007 acura tsx hitch manual course syllabus university of texas at dallas jump frog jump cafebr 1994 chevy silverado 1500 engine ekpbs readings in earth science alongs johnson owners manual pdf firext thomas rescues the diesels cafebr dead sea scrolls and the jewish origins of christianity install gimp help manual by iitsuka asao vox diccionario abreviado english spanis mdmtv nobutaka in size 26 bc13xqbookog.xxuz mechanisms in b cell neoplasia 1992 workshop at the spocks world diane duane nabbit treasury of saints fiores reasoning with probabilistic university of texas at austin gp1300r yamaha waverunner service manua by takisawa tomohide repair manual haier hpr10xc6 air conditioner birdz mexico icons mexico icons oobags asus z53 manual by hatsutori yoshino industrial level measurement by haruyuki morimoto",
"title": ""
}
] | [
{
"docid": "b803d626421c7e7eaf52635c58523e8f",
"text": "Force-directed algorithms are among the most flexible methods for calculating layouts of simple undirected graphs. Also known as spring embedders, such algorithms calculate the layout of a graph using only information contained within the structure of the graph itself, rather than relying on domain-specific knowledge. Graphs drawn with these algorithms tend to be aesthetically pleasing, exhibit symmetries, and tend to produce crossing-free layouts for planar graphs. In this survey we consider several classical algorithms, starting from Tutte’s 1963 barycentric method, and including recent scalable multiscale methods for large and dynamic graphs.",
"title": ""
},
{
"docid": "505b1fc76ef4e3fa6b0d5101e3dfd4fb",
"text": "In this work the problem of guided improvisation is approached and elaborated; then a new method, Variable Markov Oracle, for guided music synthesis is proposed as the first step to tackle the guided improvisation problem. Variable Markov Oracle is based on previous results from Audio Oracle, which is a fast indexing and recombination method of repeating sub-clips in an audio signal. The newly proposed Variable Markov Oracle is capable of identifying inherent datapoint clusters in an audio signal while tracking the sequential relations among clusters at the same time. With a target audio signal indexed by Variable Markov Oracle, a query-matching algorithm is devised to synthesize new music materials by recombination of the target audio matched to a query audio. This approach makes the query-matching algorithm a solution to the guided music synthesis problem. The query-matching algorithm is efficient and intelligent since it follows the inherent clusters discovered by Variable Markov Oracle, creating a query-by-content result which allows numerous applications in concatenative synthesis, machine improvisation and interactive music system. Examples of using Variable Markov Oracle to synthesize new musical materials based on given music signals in the style of",
"title": ""
},
{
"docid": "40f193415f27aab5f6331072cea31642",
"text": "This paper discusses the benefits and limitations of adaptive sample size re-estimation for phase 3 confirmatory clinical trials. Comparisons are made with more traditional fixed sample and group sequential designs. It is seen that the real benefit of the adaptive approach arises through the ability to invest sample size resources into the trial in stages. The trial starts with a small up-front sample size commitment. Additional sample size resources are committed to the trial only if promising results are obtained at an interim analysis. This strategy is shown through examples of actual trials, one in neurology and one in cardiology, to be more advantageous than the fixed sample or group sequential approaches in certain settings. A major factor that has generated controversy and inhibited more widespread use of these methods has been their reliance on non-standard tests and p-values for preserving the type-1 error. If, however, the sample size is only increased when interim results are promising, one can dispense with these non-standard methods of inference. Therefore, in the spirit of making adaptive increases in trial size more widely appealing and readily implementable we here define those promising circumstances in which a conventional final inference can be performed while preserving the overall type-1 error. Methodological, regulatory and operational issues are examined.",
"title": ""
},
{
"docid": "e8babc224158f04da2eccd13a4b14b76",
"text": "SFI Working Papers contain accounts of scienti5ic work of the author(s) and do not necessarily represent the views of the Santa Fe Institute. We accept papers intended for publication in peer-‐reviewed journals or proceedings volumes, but not papers that have already appeared in print. Except for papers by our external faculty, papers must be based on work done at SFI, inspired by an invited visit to or collaboration at SFI, or funded by an SFI grant.",
"title": ""
},
{
"docid": "1014a33211c9ca3448fa02cf734a5775",
"text": "We propose a general method called truncated gradient to induce sparsity in the weights of online learning algorithms with convex loss functions. This method has several essential properties: 1. The degree of sparsity is continuous a parameter controls the rate of sparsi cation from no sparsi cation to total sparsi cation. 2. The approach is theoretically motivated, and an instance of it can be regarded as an online counterpart of the popular L1-regularization method in the batch setting. We prove that small rates of sparsi cation result in only small additional regret with respect to typical online learning guarantees. 3. The approach works well empirically. We apply the approach to several datasets and nd that for datasets with large numbers of features, substantial sparsity is discoverable.",
"title": ""
},
{
"docid": "9387c02974103731846062b549022819",
"text": "Machine comprehension of text is an important problem in natural language processing. A recently released dataset, the Stanford Question Answering Dataset (SQuAD), offers a large number of real questions and their answers created by humans through crowdsourcing. SQuAD provides a challenging testbed for evaluating machine comprehension algorithms, partly because compared with previous datasets, in SQuAD the answers do not come from a small set of candidate answers and they have variable lengths. We propose an end-to-end neural architecture for the task. The architecture is based on match-LSTM, a model we proposed previously for textual entailment, and Pointer Net, a sequence-to-sequence model proposed by Vinyals et al. (2015) to constrain the output tokens to be from the input sequences. We propose two ways of using Pointer Net for our task. Our experiments show that both of our two models substantially outperform the best results obtained by Rajpurkar et al. (2016) using logistic regression and manually crafted features.",
"title": ""
},
{
"docid": "f9824ae0b73ebecf4b3a893392e77d67",
"text": "This paper proposes genetic algorithms (GAs) approach to feature discretization and the determination of connection weights for artificial neural networks (ANNs) to predict the stock price index. Previous research proposed many hybrid models of ANN and GA for the method of training the network, feature subset selection, and topology optimization. In most of these studies, however, GA is only used to improve the learning algorithm itself. In this study, GA is employed not only to improve the learning algorithm, but also to reduce the complexity in feature space. GA optimizes simultaneously the connection weights between layers and the thresholds for feature discretization. The genetically evolved weights mitigate the well-known limitations of the gradient descent algorithm. In addition, globally searched feature discretization reduces the dimensionality of the feature space and eliminates irrelevant factors. Experimental results show that GA approach to the feature discretization model outperforms the other two conventional models. q 2000 Published by Elsevier Science Ltd.",
"title": ""
},
{
"docid": "f64390896e5529f676484b9b0f4eab84",
"text": "Identifying the object that attracts human visual attention is an essential function for automatic services in smart environments. However, existing solutions can compute the gaze direction without providing the distance to the target. In addition, most of them rely on special devices or infrastructure support. This paper explores the possibility of using a smartphone to detect the visual attention of a user. By applying the proposed VADS system, acquiring the location of the intended object only requires one simple action: gazing at the intended object and holding up the smartphone so that the object as well as user's face can be simultaneously captured by the front and rear cameras. We extend the current advances of computer vision to develop efficient algorithms to obtain the distance between the camera and user, the user's gaze direction, and the object's direction from camera. The object's location can then be computed by solving a trigonometric problem. VADS has been prototyped on commercial off-the-shelf (COTS) devices. Extensive evaluation results show that VADS achieves low error (about 1.5° in angle and 0.15m in distance for objects within 12m) as well as short latency. We believe that VADS enables a large variety of applications in smart environments.",
"title": ""
},
{
"docid": "1940721177615adccce0906e7c93cd28",
"text": "Pattern Matching is a computationally intensive task used in many research fields and real world applications. Due to the ever-growing volume of data to be processed, and increasing link speeds, the number of patterns to be matched has risen significantly. In this paper we explore the parallel capabilities of modern General Purpose Graphics Processing Units (GPGPU) applications for high speed pattern matching. A highly compressed failure-less Aho-Corasick algorithm is presented for Intrusion Detection Systems on off-the-shelf hardware. This approach maximises the bandwidth for data transfers between the host and the Graphics Processing Unit (GPU). Experiments are performed on multiple alphabet sizes, demonstrating the capabilities of the library to be used in different research fields, while sustaining an adequate throughput for intrusion detection systems or DNA sequencing. The work also explores the performance impact of adequate prefix matching for alphabet sizes and varying pattern numbers achieving speeds up to 8Gbps and low memory consumption for intrusion detection systems.",
"title": ""
},
{
"docid": "957073d854607640cc3ca2255efe7315",
"text": "The mixed methods approach has emerged as a ‘‘third paradigm’’ for social research. It has developed a platform of ideas and practices that are credible and distinctive and that mark the approach out as a viable alternative to quantitative and qualitative paradigms. However, there are also a number of variations and inconsistencies within the mixed methods approach that should not be ignored. This article argues the need for a vision of research paradigm that accommodates such variations and inconsistencies. It is argued that the use of ‘‘communities of practice’’ as the basis for such a research paradigm is (a) consistent with the pragmatist underpinnings of the mixed methods approach, (b) accommodates a level of diversity, and (c) has good potential for understanding the methodological choices made by those conducting mixed methods research.",
"title": ""
},
{
"docid": "56ced0e34c82f085eeba595753d423d1",
"text": "The correctness of software is affected by its constant changes. For that reason, developers use change-impact analysis to identify early the potential consequences of changing their software. Dynamic impact analysis is a practical technique that identifies potential impacts of changes for representative executions. However, it is unknown how reliable its results are because their accuracy has not been studied. This paper presents the first comprehensive study of the predictive accuracy of dynamic impact analysis in two complementary ways. First, we use massive numbers of random changes across numerous Java applications to cover all possible change locations. Then, we study more than 100 changes from software repositories, which are representative of developer practices. Our experimental approach uses sensitivity analysis and execution differencing to systematically measure the precision and recall of dynamic impact analysis with respect to the actual impacts observed for these changes. Our results for both types of changes show that the most cost-effective dynamic impact analysis known is surprisingly inaccurate with an average precision of 38-50% and average recall of 50-56% in most cases. This comprehensive study offers insights on the effectiveness of existing dynamic impact analyses and motivates the future development of more accurate impact analyses.",
"title": ""
},
{
"docid": "1073c1f4013f6c57259502391d75d356",
"text": "A long-standing dream of Artificial Intelligence (AI) has pursued to enrich computer programs with commonsense knowledge enabling machines to reason about our world. This paper offers a new practical insight towards the automation of commonsense reasoning with first-order logic (FOL) ontologies. We propose a new black-box testing methodology of FOL SUMO-based ontologies by exploiting WordNet and its mapping into SUMO. Our proposal includes a method for the (semi-)automatic creation of a very large set of tests and a procedure for its automated evaluation by using automated theorem provers (ATPs). Applying our testing proposal, we are able to successfully evaluate a) the competency of several translations of SUMO into FOL and b) the performance of various automated ATPs. In addition, we are also able to evaluate the resulting set of tests according to different quality criteria.",
"title": ""
},
{
"docid": "69e90a5882bdea0055bb61463687b0c1",
"text": "www.frontiersinecology.org © The Ecological Society of America E generate a range of goods and services important for human well-being, collectively called ecosystem services. Over the past decade, progress has been made in understanding how ecosystems provide services and how service provision translates into economic value (Daily 1997; MA 2005; NRC 2005). Yet, it has proven difficult to move from general pronouncements about the tremendous benefits nature provides to people to credible, quantitative estimates of ecosystem service values. Spatially explicit values of services across landscapes that might inform land-use and management decisions are still lacking (Balmford et al. 2002; MA 2005). Without quantitative assessments, and some incentives for landowners to provide them, these services tend to be ignored by those making land-use and land-management decisions. Currently, there are two paradigms for generating ecosystem service assessments that are meant to influence policy decisions. Under the first paradigm, researchers use broad-scale assessments of multiple services to extrapolate a few estimates of values, based on habitat types, to entire regions or the entire planet (eg Costanza et al. 1997; Troy and Wilson 2006; Turner et al. 2007). Although simple, this “benefits transfer” approach incorrectly assumes that every hectare of a given habitat type is of equal value – regardless of its quality, rarity, spatial configuration, size, proximity to population centers, or the prevailing social practices and values. Furthermore, this approach does not allow for analyses of service provision and changes in value under new conditions. For example, if a wetland is converted to agricultural land, how will this affect the provision of clean drinking water, downstream flooding, climate regulation, and soil fertility? Without information on the impacts of land-use management practices on ecosystem services production, it is impossible to design policies or payment programs that will provide the desired ecosystem services. In contrast, under the second paradigm for generating policy-relevant ecosystem service assessments, researchers carefully model the production of a single service in a small area with an “ecological production function” – how provision of that service depends on local ecological variables (eg Kaiser and Roumasset 2002; Ricketts et al. 2004). Some of these production function approaches also use market prices and non-market valuation methods to estimate the economic value of the service and how that value changes under different ecological conditions. Although these methods are superior to the habitat assessment benefits transfer approach, these studies lack both the scope (number of services) and scale (geographic and temporal) to be relevant for most policy questions. What is needed are approaches that combine the rigor of the small-scale studies with the breadth of broad-scale assessments (see Boody et al. 2005; Jackson et al. 2005; ECOSYSTEM SERVICES ECOSYSTEM SERVICES ECOSYSTEM SERVICES",
"title": ""
},
{
"docid": "f3818583b2b010d2870e1e7c112d4936",
"text": "In this paper, we describe a user study comparing five different locomotion interfaces for virtual reality locomotion. We compared a standard non-motion cueing interface, Joystick (Xbox), with four motion cueing interfaces, NaviChair (stool with springs), MuvMan (sit/stand active stool), Head-Directed (Oculus Rift DK2), and Swivel Chair (everyday office chair with leaning capability). Each interface had two degrees of freedom to move forward/backward and rotate using velocity (rate) control. The aim of this mixed methods study was to better understand relevant user experience factors and guide the design of future locomotion interfaces. This study employed methods from HCI to provide an understanding of why users behave a certain way while using the interface and to unearth any new issues with the design. Participants were tasked to search for objects in a virtual city while they provided talk-aloud feedback and we logged their behaviour. Subsequently, they completed a post-experimental questionnaire on their experience. We found that the qualitative themes of control, usability, and experience echoed the results of the questionnaire, providing internal validity. The quantitative measures revealed the Joystick to be significantly more comfortable and precise than the motion cueing interfaces. However, the qualitative feedback and interviews showed this was due to the reduced perceived controllability and safety of the motion cueing interfaces. Designers of these interfaces should consider using a backrest if users need to lean backwards and avoid using velocity-control for rotations when using HMDs.",
"title": ""
},
{
"docid": "557e9a167245dcbb7a70229042ff5b0f",
"text": "We present a survey of research into automated and semiautomated computer systems for expressive performance of music. We will examine the motivation for such systems and then examine the majority of the systems developed over the last 25 years. To highlight some of the possible future directions for new research, the review uses primary terms of reference based on four elements: testing status, expressive representation, polyphonic ability, and performance creativity.",
"title": ""
},
{
"docid": "c08e33f44b8e27529385b1557906dc81",
"text": "A key challenge in wireless cognitive radio networks is to maximize the total throughput also known as the sum rates of all the users while avoiding the interference of unlicensed band secondary users from overwhelming the licensed band primary users. We study the weighted sum rate maximization problem with both power budget and interference temperature constraints in a cognitive radio network. This problem is nonconvex and generally hard to solve. We propose a reformulation-relaxation technique that leverages nonnegative matrix theory to first obtain a relaxed problem with nonnegative matrix spectral radius constraints. A useful upper bound on the sum rates is then obtained by solving a convex optimization problem over a closed bounded convex set. It also enables the sum-rate optimality to be quantified analytically through the spectrum of specially-crafted nonnegative matrices. Furthermore, we obtain polynomial-time verifiable sufficient conditions that can identify polynomial-time solvable problem instances, which can be solved by a fixed-point algorithm. As a by-product, an interesting optimality equivalence between the nonconvex sum rate problem and the convex max-min rate problem is established. In the general case, we propose a global optimization algorithm by utilizing our convex relaxation and branch-and-bound to compute an ε-optimal solution. Our technique exploits the nonnegativity of the physical quantities, e.g., channel parameters, powers and rates, that enables key tools in nonnegative matrix theory such as the (linear and nonlinear) Perron-Frobenius theorem, quasi-invertibility, Friedland-Karlin inequalities to be employed naturally. Numerical results are presented to show that our proposed algorithms are theoretically sound and have relatively fast convergence time even for large-scale problems",
"title": ""
},
{
"docid": "b5d18b82e084042a6f31cb036ee83af5",
"text": "In this paper, signal and power integrity of complete High Definition Multimedia Interface (HDMI) channel with IBIS-AMI model is presented. Gigahertz serialization and deserialization (SERDES) has become a leading inter-chip and inter-board data transmission technique in high-end computing devices. The IBIS-AMI model is used for circuit simulation of high-speed serial interfaces. A 3D frequency-domain simulator (FEM) was used to estimate the channel loss for data bus and HDMI connector. Compliance testing is performed for HDMI channels to ensure channel parameters are meeting HDMI specifications.",
"title": ""
},
{
"docid": "7c4c33097c12f55a08f8a7cc3634c5cb",
"text": "Pattern queries are widely used in complex event processing (CEP) systems. Existing pattern matching techniques, however, can provide only limited performance for expensive queries in real-world applications, which may involve Kleene closure patterns, flexible event selection strategies, and events with imprecise timestamps. To support these expensive queries with high performance, we begin our study by analyzing the complexity of pattern queries, with a focus on the fundamental understanding of which features make pattern queries more expressive and at the same time more computationally expensive. This analysis allows us to identify performance bottlenecks in processing those expensive queries, and provides key insights for us to develop a series of optimizations to mitigate those bottlenecks. Microbenchmark results show superior performance of our system for expensive pattern queries while most state-of-the-art systems suffer from poor performance. A thorough case study on Hadoop cluster monitoring further demonstrates the efficiency and effectiveness of our proposed techniques.",
"title": ""
},
{
"docid": "6d23bd2813ea3785b8b20d24e31279d8",
"text": "General-purpose GPUs have been widely utilized to accelerate parallel applications. Given a relatively complex programming model and fast architecture evolution, producing efficient GPU code is nontrivial. A variety of simulation and profiling tools have been developed to aid GPU application optimization and architecture design. However, existing tools are either limited by insufficient insights or lacking in support across different GPU architectures, runtime and driver versions. This paper presents CUDAAdvisor, a profiling framework to guide code optimization in modern NVIDIA GPUs. CUDAAdvisor performs various fine-grained analyses based on the profiling results from GPU kernels, such as memory-level analysis (e.g., reuse distance and memory divergence), control flow analysis (e.g., branch divergence) and code-/data-centric debugging. Unlike prior tools, CUDAAdvisor supports GPU profiling across different CUDA versions and architectures, including CUDA 8.0 and Pascal architecture. We demonstrate several case studies that derive significant insights to guide GPU code optimization for performance improvement.",
"title": ""
},
{
"docid": "1e7826486d770d3604155764f2d22934",
"text": "The Cambridge Study in Delinquent Development is a prospective longitudinal survey of 411 London males from ages 8 years old to 32 years old. This article investigates the prediction of adolescent aggression (ages 12-14 years old), teenage violence (ages 16-18 years old), adult violence (age 32 years old), and convictions for violence. Generally, the best predictors were measures of economic deprivation, family criminality, poor child-rearing, school failure, hyperactivity-impulsivity-attention deficit, and antisocial child behavior. Similar predictors applied to all four measures of aggression and violence. It is concluded that aggression and violence are elements of a more general antisocial tendency, and that the predictors of aggression and violence are similar to the predictors of antisocial and criminal behavior in general.",
"title": ""
}
] | scidocsrr |
aea2649de50aa4c1952860511f8fdc55 | Purpose and Polarity of Citation: Towards NLP-based Bibliometrics | [
{
"docid": "565941db0284458e27485d250493fd2a",
"text": "Identifying background (context) information in scientific articles can help scholars understand major contributions in their research area more easily. In this paper, we propose a general framework based on probabilistic inference to extract such context information from scientific papers. We model the sentences in an article and their lexical similarities as aMarkov Random Fieldtuned to detect the patterns that context data create, and employ a Belief Propagationmechanism to detect likely context sentences. We also address the problem of generating surveys of scientific papers. Our experiments show greater pyramid scores for surveys generated using such context information rather than citation sentences alone.",
"title": ""
},
{
"docid": "8fc87a5f89792b3ea69833dcae90cd6e",
"text": "The Joint Conference on Lexical and Computational Semantics (*SEM) each year hosts a shared task on semantic related topics. In its first edition held in 2012, the shared task was dedicated to resolving the scope and focus of negation. This paper presents the specifications, datasets and evaluation criteria of the task. An overview of participating systems is provided and their results are summarized.",
"title": ""
},
{
"docid": "356144b7bd59e7609ec426965b73ce37",
"text": "Sentiment analysis of citations in scientific papers and articles is a new and interesting problem due to the many linguistic differences between scientific texts and other genres. In this paper, we focus on the problem of automatic identification of positive and negative sentiment polarity in citations to scientific papers. Using a newly constructed annotated citation sentiment corpus, we explore the effectiveness of existing and novel features, including n-grams, specialised science-specific lexical features, dependency relations, sentence splitting and negation features. Our results show that 3-grams and dependencies perform best in this task; they outperform the sentence splitting, science lexicon and negation based features.",
"title": ""
},
{
"docid": "8bb5794d38528ab459813ab1fa484a69",
"text": "We introduce the ACL Anthology Network (AAN), a manually curated networked database of citations, collaborations, and summaries in the field of Computational Linguistics. We also present a number of statistics about the network including the most cited authors, the most central collaborators, as well as network statistics about the paper citation, author citation, and author collaboration networks.",
"title": ""
}
] | [
{
"docid": "3ab61b4f5e59b15e98fd2979a84ba43c",
"text": "MIL-STD-1760, a Department of Defense Interface Standard, was developed to reduce the proliferation of interfaces between aircraft and their stores, and instead to promote interoperability between weapons and aircraft platforms. The original version of the MIL-STD-1760 defined a standardized electrical interface and connector that included both digital and analog databuses, a standardized message protocol (MIL-STD-1553), power, and discrete signals. In 2007, the latest version of MIL-STD-1760 was released. MIL-STD-1760E, employed the previously unused High Bandwidth 2 and High Bandwidth 4 pins of the standardized MIL-STD-1760 connector. These pins were utilized to carry a Fibre Channel based high speed digital databus, FC-AE-1553 which is an adaptation of MIL-STD-1553 for Fibre Channel. This paper provides a brief technical overview of the HS1760 databus and related standardized protocols and also provides an overview of the key technical considerations that must be accounted for when designing test and simulation equipment used to test various aircraft systems and stores which employ the MIL-STD-1760E interface.",
"title": ""
},
{
"docid": "fb2bcd65bb2a74fc08a2026eef258655",
"text": "Social network analysis has recently gained a lot of interest because of the advent and the increasing popularity of social media, such as blogs, social networks, micro logging, or customer review sites. Such media often serve as platforms for information dissemination and product placement or promotion. In this environment, influence and trust are becoming essential qualities among user interactions. In this work, we perform an extensive study of various metrics related to the aforementioned elements, and their effect in the process of information propagation in the virtual world. In order to better understand the properties of links and the dynamics of social networks, we distinguish between permanent and transient links and in the latter case, we consider the link freshness. Moreover, we distinguish between local and global influence and compare suggestions provided by locally or globally trusted users.",
"title": ""
},
{
"docid": "d52bfde050e6535645c324e7006a50e7",
"text": "Modern machine learning algorithms are increasingly computationally demanding, requiring specialized hardware and distributed computation to achieve high performance in a reasonable time frame. Many hyperparameter search algorithms have been proposed for improving the efficiency of model selection, however their adaptation to the distributed compute environment is often ad-hoc. We propose Tune, a unified framework for model selection and training that provides a narrow-waist interface between training scripts and search algorithms. We show that this interface meets the requirements for a broad range of hyperparameter search algorithms, allows straightforward scaling of search to large clusters, and simplifies algorithm implementation. We demonstrate the implementation of several state-of-the-art hyperparameter search algorithms in Tune. Tune is available at http://ray.readthedocs.io/en/latest/tune.html.",
"title": ""
},
{
"docid": "57d1648391cac4ccfefd85aacef6b5ba",
"text": "Competition in the wireless telecommunications industry is fierce. To maintain profitability, wireless carriers must control churn, which is the loss of subscribers who switch from one carrier to another.We explore techniques from statistical machine learning to predict churn and, based on these predictions, to determine what incentives should be offered to subscribers to improve retention and maximize profitability to the carrier. The techniques include logit regression, decision trees, neural networks, and boosting. Our experiments are based on a database of nearly 47,000 U.S. domestic subscribers and includes information about their usage, billing, credit, application, and complaint history. Our experiments show that under a wide variety of assumptions concerning the cost of intervention and the retention rate resulting from intervention, using predictive techniques to identify potential churners and offering incentives can yield significant savings to a carrier. We also show the importance of a data representation crafted by domain experts. Finally, we report on a real-world test of the techniques that validate our simulation experiments.",
"title": ""
},
{
"docid": "89b92204d76120bef660eb55303752d2",
"text": "In this paper, we present a design of RTE template structure for AUTOSAR-based vehicle applications. Due to an increase in software complexity in recent years, much greater efforts are necessary to manage and develop software modules in automotive industries. To deal with this issue, an automotive Open system architecture (AUTOSAR) partnership was launched. This embedded platform standardizes software architectures and provides a methodology supporting distributed process. The RTE that is located at the heart of AUTOSAR implements the virtual function bus functionality for a particle electronic control unit (ECU). It enables to communicate between application software components. The purpose of this paper is to design a RTE structure with the AUTOSAR standard concept. As a future work, this research will be further extended, and we will propose the development of a RTE generator that is drawn on an AUTOSAR RTE template structure.",
"title": ""
},
{
"docid": "3ab1222d051c42e400940afad76919ce",
"text": "OBJECTIVES\nThe purpose of this study was to evaluate the feasibility, safety, and clinical outcomes up to 1 year in patients undergoing combined simultaneous thoracoscopic surgical and transvenous catheter atrial fibrillation (AF) ablation.\n\n\nBACKGROUND\nThe combination of the transvenous endocardial approach with the thoracoscopic epicardial approach in a single AF ablation procedure overcomes the limitations of both techniques and should result in better outcomes.\n\n\nMETHODS\nA cohort of 26 consecutive patients with AF who underwent hybrid thoracoscopic surgical and transvenous catheter ablation were followed, with follow-up of up to 1 year.\n\n\nRESULTS\nTwenty-six patients (42% with persistent AF) underwent successful hybrid procedures. There were no complications. The mean follow-up period was 470 ± 154 days. In 23% of the patients, the epicardial lesions were not transmural, and endocardial touch-up was necessary. One-year success, defined according to the Heart Rhythm Society, European Heart Rhythm Association, and European Cardiac Arrhythmia Society consensus statement for the catheter and surgical ablation of AF, was 93% for patients with paroxysmal AF and 90% for patients with persistent AF. Two patients underwent catheter ablation for recurrent AF or left atrial flutter after the hybrid procedure.\n\n\nCONCLUSIONS\nA combined transvenous endocardial and thoracoscopic epicardial ablation procedure for AF is feasible and safe, with a single-procedure success rate of 83% at 1 year.",
"title": ""
},
{
"docid": "ea5431e8f2f1e197988cf1b52ee685ce",
"text": "Prunus mume (mei), which was domesticated in China more than 3,000 years ago as ornamental plant and fruit, is one of the first genomes among Prunus subfamilies of Rosaceae been sequenced. Here, we assemble a 280M genome by combining 101-fold next-generation sequencing and optical mapping data. We further anchor 83.9% of scaffolds to eight chromosomes with genetic map constructed by restriction-site-associated DNA sequencing. Combining P. mume genome with available data, we succeed in reconstructing nine ancestral chromosomes of Rosaceae family, as well as depicting chromosome fusion, fission and duplication history in three major subfamilies. We sequence the transcriptome of various tissues and perform genome-wide analysis to reveal the characteristics of P. mume, including its regulation of early blooming in endodormancy, immune response against bacterial infection and biosynthesis of flower scent. The P. mume genome sequence adds to our understanding of Rosaceae evolution and provides important data for improvement of fruit trees.",
"title": ""
},
{
"docid": "7456ceee02f50c9e92a665d362a9a419",
"text": "Visualization of dynamically changing networks (graphs) is a significant challenge for researchers. Previous work has experimentally compared animation, small multiples, and other techniques, and found trade-offs between these. One potential way to avoid such trade-offs is to combine previous techniques in a hybrid visualization. We present two taxonomies of visualizations of dynamic graphs: one of non-hybrid techniques, and one of hybrid techniques. We also describe a prototype, called DiffAni, that allows a graph to be visualized as a sequence of three kinds of tiles: diff tiles that show difference maps over some time interval, animation tiles that show the evolution of the graph over some time interval, and small multiple tiles that show the graph state at an individual time slice. This sequence of tiles is ordered by time and covers all time slices in the data. An experimental evaluation of DiffAni shows that our hybrid approach has advantages over non-hybrid techniques in certain cases.",
"title": ""
},
{
"docid": "92ac3bfdcf5e554152c4ce2e26b77315",
"text": "How can we perform efficient inference and learning in directed probabilistic models, in the presence of continuous latent variables with intractable posterior distributions, and large datasets? We introduce a stochastic variational inference and learning algorithm that scales to large datasets and, under some mild differentiability conditions, even works in the intractable case. Our contributions is two-fold. First, we show that a reparameterization of the variational lower bound yields a lower bound estimator that can be straightforwardly optimized using standard stochastic gradient methods. Second, we show that for i.i.d. datasets with continuous latent variables per datapoint, posterior inference can be made especially efficient by fitting an approximate inference model (also called a recognition model) to the intractable posterior using the proposed lower bound estimator. Theoretical advantages are reflected in experimental results.",
"title": ""
},
{
"docid": "c2c85e02b2eb3c73ece4e43aae42ff28",
"text": "The security of many computer systems hinges on the secrecy of a single word – if an adversary obtains knowledge of a password, they will gain access to the resources controlled by this password. Human users are the ‘weakest link’ in password control, due to our propensity to reuse passwords and to create weak ones. Policies which forbid such unsafe password practices are often violated, even if these policies are well-advertised. We have studied how users perceive their accounts and their passwords. Our participants mentally classified their accounts and passwords into a few groups, based on a small number of perceived similarities. Our participants used stronger passwords, and reused passwords less, in account groups which they considered more important. Our participants thus demonstrated awareness of the basic tenets of password safety, but they did not behave safely in all respects. Almost half of our participants reused at least one of the passwords in their high-importance accounts. Our findings add to the body of evidence that a typical computer user suffers from ‘password overload’. Our concepts of password and account grouping point the way toward more intuitive user interfaces for passwordand account-management systems. .",
"title": ""
},
{
"docid": "f8a8ac0f26667a1744f724a5df213734",
"text": "An important design decision in the construction of a simulator is how to enable users to access the data generated in each run of a simulation experiment. As the simulator executes, the samples of performance metrics that are generated beg to be exposed either in their raw state or after having undergone mathematical processing. Also of concern is the particular format this data assumes when externalized to mass storage, since it determines the ease of processing by other applications or interpretation by the user. In this paper, we present a framework for the ns-3 network simulator for capturing data from inside an experiment, subjecting it to mathematical transformations, and ultimately marshaling it into various output formats. The application of this functionality is illustrated and analyzed via a study of common use cases. Although the implementation of our approach is specific to ns-3, this design presents lessons transferrable to other platforms.",
"title": ""
},
{
"docid": "369e5fb60d3afc993821159b64bc3560",
"text": "For five years, we collected annual snapshots of file-system metadata from over 60,000 Windows PC file systems in a large corporation. In this article, we use these snapshots to study temporal changes in file size, file age, file-type frequency, directory size, namespace structure, file-system population, storage capacity and consumption, and degree of file modification. We present a generative model that explains the namespace structure and the distribution of directory sizes. We find significant temporal trends relating to the popularity of certain file types, the origin of file content, the way the namespace is used, and the degree of variation among file systems, as well as more pedestrian changes in size and capacities. We give examples of consequent lessons for designers of file systems and related software.",
"title": ""
},
{
"docid": "0f6dbf39b8e06a768b3d2b769327168d",
"text": "In this paper, we focus on how to boost the multi-view clustering by exploring the complementary information among multi-view features. A multi-view clustering framework, called Diversity-induced Multi-view Subspace Clustering (DiMSC), is proposed for this task. In our method, we extend the existing subspace clustering into the multi-view domain, and utilize the Hilbert Schmidt Independence Criterion (HSIC) as a diversity term to explore the complementarity of multi-view representations, which could be solved efficiently by using the alternating minimizing optimization. Compared to other multi-view clustering methods, the enhanced complementarity reduces the redundancy between the multi-view representations, and improves the accuracy of the clustering results. Experiments on both image and video face clustering well demonstrate that the proposed method outperforms the state-of-the-art methods.",
"title": ""
},
{
"docid": "1a4d6e0a35f2405535f93f2ce3d9bd43",
"text": "We introduce a wide class of low-density parity-check (LDPC) codes, large enough to include LDPC codes over finite fields, rings, or groups, as well as some nonlinear codes. A belief-propagation decoding procedure with the same complexity as for the decoding of LDPC codes over finite fields is also presented. Moreover, an encoding procedure is developed",
"title": ""
},
{
"docid": "2950e3c1347c4adeeb2582046cbea4b8",
"text": "We present Mime, a compact, low-power 3D sensor for unencumbered free-form, single-handed gestural interaction with head-mounted displays (HMDs). Mime introduces a real-time signal processing framework that combines a novel three-pixel time-of-flight (TOF) module with a standard RGB camera. The TOF module achieves accurate 3D hand localization and tracking, and it thus enables motion-controlled gestures. The joint processing of 3D information with RGB image data enables finer, shape-based gestural interaction.\n Our Mime hardware prototype achieves fast and precise 3D gestural control. Compared with state-of-the-art 3D sensors like TOF cameras, the Microsoft Kinect and the Leap Motion Controller, Mime offers several key advantages for mobile applications and HMD use cases: very small size, daylight insensitivity, and low power consumption. Mime is built using standard, low-cost optoelectronic components and promises to be an inexpensive technology that can either be a peripheral component or be embedded within the HMD unit. We demonstrate the utility of the Mime sensor for HMD interaction with a variety of application scenarios, including 3D spatial input using close-range gestures, gaming, on-the-move interaction, and operation in cluttered environments and in broad daylight conditions.",
"title": ""
},
{
"docid": "5b5bfbb99011834ac3163961a1a1ff25",
"text": "The research investigated how word-specific gender stereotype information can be used during language comprehension. In a rating study, the gender stereotypes for 405 noun and noun compounds were assessed. From these norms, 32 words strongly stereotyped to refer mostly to males and 32 words strongly stereotyped to refer mostly to females were selected and used in a reading experiment. Comprehenders read pairs of sentences. The subject of the first sentence was a gender stereotyped word (e.g., executive or secretary). The subject of the second sentence was either the pronoun he or she. Reading time was significantly longer when gender of the pronoun mismatched the gender stereotype of the antecedent than when the genders of pronoun and antecedent matched. This gender mismatch effect occurred on the two regions immediately following the region containing the pronoun. The results indicated that word-specific gender stereotypes can influence coreference resolution of pronouns.",
"title": ""
},
{
"docid": "b11c04a5aacac0d369c636b1fad47570",
"text": "Draft of textbook chapter on neural machine translation. a comprehensive treatment of the topic, ranging from introduction to neural networks, computation graphs, description of the currently dominant attentional sequence-to-sequence model, recent refinements, alternative architectures and challenges. Written as chapter for the textbook Statistical Machine Translation. Used in the JHU Fall 2017 class on machine translation.",
"title": ""
},
{
"docid": "5a0e6e8f6f9e11efa1450ec655a52012",
"text": "This paper reviews and critiques the “opportunity discovery” approach to entrepreneurship and argues that entrepreneurship can be more thoroughly grounded, and more closely linked to more general problems of economic organization, by adopting the Cantillon-KnightMises understanding of entrepreneurship as judgment. I begin by distinguishing among occupational, structural, and functional approaches to entrepreneurship and distinguishing among two influential interpretations of the entrepreneurial function, discovery and judgment. I turn next to the contemporary literature on opportunity identification and argue that this literature misinterprets Kirzner’s instrumental use of the discovery metaphor and mistakenly makes “opportunities” the unit of analysis. I then describe an alternative approach in which investment is the unit of analysis and link this approach to Austrian capital theory. I close with some applications to organizational form and entrepreneurial teams. I thank Jay Barney, Nicolai Foss, Jeffrey Herbener, Joseph Mahoney, Mario Mondelli, Joseph Salerno, Sharon Alvarez (guest editor), two anonymous referees, and participants at the 2007 Washington University Conference on Opportunity Discovery and 2007 Academy of Management meetings for comments on previous versions.",
"title": ""
}
] | scidocsrr |
6ac2d3470e329368e2894162f61d34c1 | Android Mobile Phone Controlled Bluetooth Robot Using 8051 Microcontroller | [
{
"docid": "05e4cfafcef5ad060c1f10b9c6ad2bc0",
"text": "Mobile devices have been integrated into our everyday life. Consequently, home automation and security are becoming increasingly prominent features on mobile devices. In this paper, we have developed a security system that interfaces with an Android mobile device. The mobile device and security system communicate via Bluetooth because a short-range-only communications system was desired. The mobile application can be loaded onto any compatible device, and once loaded, interface with the security system. Commands to lock, unlock, or check the status of the door to which the security system is installed can be sent quickly from the mobile device via a simple, easy to use GUI. The security system then acts on these commands, taking the appropriate action and sending a confirmation back to the mobile device. The security system can also tell the user if the door is open. The door also incorporates a traditional lock and key interface in case the user loses the mobile device.",
"title": ""
}
] | [
{
"docid": "1b5450c2f21cab5117275b787413b3ad",
"text": "The security and privacy of the data transmitted is an important aspect of the exchange of information on the Internet network. Cryptography and Steganography are two of the most commonly used digital data security techniques. In this research, we proposed the combination of the cryptographic method with Data Encryption Standard (DES) algorithm and the steganographic method with Discrete Cosine Transform (DCT) to develop a digital data security application. The application can be used to secure document data in Word, Excel, Powerpoint or PDF format. Data encrypted with DES algorithm and further hidden in image cover using DCT algorithm. The results showed that the quality of the image that has been inserted (stego-image) is still in a good category with an average PSNR value of 46.9 dB. Also, the experiment results show that the average computational time of 0.75 millisecond/byte, an average size increase of 4.79 times and a success rate of 58%. This research can help solve the problem of data and information security that will be sent through a public network like the internet.",
"title": ""
},
{
"docid": "2698718d069ca73399eb28472a1bb686",
"text": "Process mining is a research discipline that aims to discover, monitor and improve real processing using event logs. In this paper we describe a novel approach that (i) identifies partial process models by exploiting sequential pattern mining and (ii) uses the additional information about the activities matching a partial process model to train nested prediction models from event logs. Models can be used to predict the next activity and completion time of a new (running) process instance. We compare our approach with a model based on Transition Systems implemented in the ProM5 Suite and show that the attributes in the event log can improve the accuracy of the model without decreasing performances. The experimental results show how our algorithm improves of a large margin ProM5 in predicting the completion time of a process, while it presents competitive results for next activity prediction.",
"title": ""
},
{
"docid": "c2e7425f719dd51eec0d8e180577269e",
"text": "Most important way of communication among humans is language and primary medium used for the said is speech. The speech recognizers make use of a parametric form of a signal to obtain the most important distinguishable features of speech signal for recognition purpose. In this paper, Linear Prediction Cepstral Coefficient (LPCC), Mel Frequency Cepstral Coefficient (MFCC) and Bark frequency Cepstral coefficient (BFCC) feature extraction techniques for recognition of Hindi Isolated, Paired and Hybrid words have been studied and the corresponding recognition rates are compared. Artifical Neural Network is used as back end processor. The experimental results show that the better recognition rate is obtained for MFCC as compared to LPCC and BFCC for all the three types of words.",
"title": ""
},
{
"docid": "33be5718d8a60f36e5faaa0cc4f0019f",
"text": "Most of our daily activities are now moving online in the big data era, with more than 25 billion devices already connected to the Internet, to possibly over a trillion in a decade. However, big data also bears a connotation of “big brother” when personal information (such as sales transactions) is being ubiquitously collected, stored, and circulated around the Internet, often without the data owner's knowledge. Consequently, a new paradigm known as online privacy or Internet privacy is becoming a major concern regarding the privacy of personal and sensitive data.",
"title": ""
},
{
"docid": "14e92e2c9cd31db526e084669d15903c",
"text": "This paper presents three building blocks for enabling the efficient and safe design of persistent data stores for emerging non-volatile memory technologies. Taking the fullest advantage of the low latency and high bandwidths of emerging memories such as phase change memory (PCM), spin torque, and memristor necessitates a serious look at placing these persistent storage technologies on the main memory bus. Doing so, however, introduces critical challenges of not sacrificing the data reliability and consistency that users demand from storage. This paper introduces techniques for (1) robust wear-aware memory allocation, (2) preventing of erroneous writes, and (3) consistency-preserving updates that are cache-efficient. We show through our evaluation that these techniques are efficiently implementable and effective by demonstrating a B+-tree implementation modified to make full use of our toolkit.",
"title": ""
},
{
"docid": "1cbd13de915d2a4cedd736345ebb2134",
"text": "This paper deals with the design and implementation of a nonlinear control algorithm for the attitude tracking of a four-rotor helicopter known as quadrotor. This algorithm is based on the second order sliding mode technique known as Super-Twisting Algorithm (STA) which is able to ensure robustness with respect to bounded external disturbances. In order to show the effectiveness of the proposed controller, experimental tests were carried out on a real quadrotor. The obtained results show the good performance of the proposed controller in terms of stabilization, tracking and robustness with respect to external disturbances.",
"title": ""
},
{
"docid": "93810dab9ff258d6e11edaffa1e4a0ff",
"text": "Ishaq, O. 2016. Image Analysis and Deep Learning for Applications in Microscopy. Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology 1371. 76 pp. Uppsala: Acta Universitatis Upsaliensis. ISBN 978-91-554-9567-1. Quantitative microscopy deals with the extraction of quantitative measurements from samples observed under a microscope. Recent developments in microscopy systems, sample preparation and handling techniques have enabled high throughput biological experiments resulting in large amounts of image data, at biological scales ranging from subcellular structures such as fluorescently tagged nucleic acid sequences to whole organisms such as zebrafish embryos. Consequently, methods and algorithms for automated quantitative analysis of these images have become increasingly important. These methods range from traditional image analysis techniques to use of deep learning architectures. Many biomedical microscopy assays result in fluorescent spots. Robust detection and precise localization of these spots are two important, albeit sometimes overlapping, areas for application of quantitative image analysis. We demonstrate the use of popular deep learning architectures for spot detection and compare them against more traditional parametric model-based approaches. Moreover, we quantify the effect of pre-training and change in the size of training sets on detection performance. Thereafter, we determine the potential of training deep networks on synthetic and semi-synthetic datasets and their comparison with networks trained on manually annotated real data. In addition, we present a two-alternative forced-choice based tool for assisting in manual annotation of real image data. On a spot localization track, we parallelize a popular compressed sensing based localization method and evaluate its performance in conjunction with different optimizers, noise conditions and spot densities. We investigate its sensitivity to different point spread function estimates. Zebrafish is an important model organism, attractive for whole-organism image-based assays for drug discovery campaigns. The effect of drug-induced neuronal damage may be expressed in the form of zebrafish shape deformation. First, we present an automated method for accurate quantification of tail deformations in multi-fish micro-plate wells using image analysis techniques such as illumination correction, segmentation, generation of branch-free skeletons of partial tail-segments and their fusion to generate complete tails. Later, we demonstrate the use of a deep learning-based pipeline for classifying micro-plate wells as either drug-affected or negative controls, resulting in competitive performance, and compare the performance from deep learning against that from traditional image analysis approaches.",
"title": ""
},
{
"docid": "a05eb1631da751562fd25913b578032a",
"text": "In this paper, we examine the intergenerational gaming practices of four generations of console gamers, from ages 3 to 83 and, in particular, the roles that gamers of different generations take on when playing together in groups. Our data highlight the extent to which existing gaming technologies support interactions within collocated intergenerational groups, and our analysis reveals a more generationally flexible suite of roles in these computer-mediated interactions than have been documented by previous studies of more traditional collocated, intergenerational interactions. Finally, we offer implications for game designers who wish to make console games more accessible to intergenerational groups.",
"title": ""
},
{
"docid": "31c62f403e6d7f06ff2ab028894346ff",
"text": "Automated text summarization is important to for humans to better manage the massive information explosion. Several machine learning approaches could be successfully used to handle the problem. This paper reports the results of our study to compare the performance between neural networks and support vector machines for text summarization. Both models have the ability to discover non-linear data and are effective model when dealing with large datasets.",
"title": ""
},
{
"docid": "e0211c2c024b1eb427a8d06f3421e0ba",
"text": "Within the past ten years, methods for automating the process of monitoring the behaviour of cattle have become increasingly important. Within the UK, there has been a steady decline in the number of milk producers and increased commercial pressures have forced increasing consolidation within dairy farming. As a result the average farm size has grown from around 90 to 160 cows. A direct consequence of these trends is that the farmers have less time to observe their herd and are increasingly reliant on technology to undertake this function, most readily underlined with the growth in the use of oestrus or ‘heat’ detection collars to assist in the optimisation of fertility. There is also a desire to derive additional information for collars that have to date been utilised solely to indicate the onset of heat The paper reports on the analysis of signatures obtained from an accelerometer based collar (Silent Herdsman) to identify both eating and rumination signatures, identified through a combination of frequency and statistical analysis. A range of post processing methods have been evaluated in order to determine the most appropriate for integration within a low power processor on the collar. Trials have been carried out using a rumination sensing halter to provide verification data. Analysis of this data over a period of several days, on a minute by minute basis has shown that it is possible to recover eating and rumination with sensitivity and positive predictive value greater than 85%.",
"title": ""
},
{
"docid": "971a0e51042e949214fd75ab6203e36a",
"text": "This paper presents an automatic recognition method for color text characters extracted from scene images, which is robust to strong distortions, complex background, low resolution and non uniform lightning. Based on a specific architecture of convolutional neural networks, the proposed system automatically learns how to recognize characters without making any assumptions, without applying any preprocessing or post-processing and without using tunable parameters. For this purpose, we use a training set of scene text images extracted from the ICDAR 2003 public training database. The proposed method is compared to recent character recognition techniques for scene images based on the ICDAR 2003 public samples dataset in order to contribute to the state-of-the-art method comparison efforts initiated in ICDAR 2003. Experimental results show an encouraging average recognition rate of 84.53%, ranging from 93.47% for clear images to 67.86% for seriously distorted images.",
"title": ""
},
{
"docid": "348f9c689c579cf07085b6e263c53ff5",
"text": "Over recent years, interest has been growing in Bitcoin, an innovation which has the potential to play an important role in e-commerce and beyond. The aim of our paper is to provide a comprehensive empirical study of the payment and investment features of Bitcoin and their implications for the conduct of ecommerce. Since network externality theory suggests that the value of a network and its take-up are interlinked, we investigate both adoption and price formation. We discover that Bitcoin returns are driven primarily by its popularity, the sentiment expressed in newspaper reports on the cryptocurrency, and total number of transactions. The paper also reports on the first global survey of merchants who have adopted this technology and model the share of sales paid for with this alternative currency, using both ordinary and Tobit regressions. Our analysis examines how country, customer and company-specific characteristics interact with the proportion of sales attributed to Bitcoin. We find that company features, use of other payment methods, customers’ knowledge about Bitcoin, as well as the size of both the official and unofficial economy are significant determinants. The results presented allow a better understanding of the practical and theoretical ramifications of this innovation.",
"title": ""
},
{
"docid": "4e685637bb976716b335ac2f52f03782",
"text": "Breast Cancer is becoming a leading cause of death among women in the whole world; meanwhile, it is confirmed that the early detection and accurate diagnosis of this disease can ensure a long survival of the patients. This paper work presents a disease status prediction employing a hybrid methodology to forecast the changes and its consequence that is crucial for lethal infections. To alarm the severity of the diseases, our strategy consists of two main parts: 1. Information Treatment and Option Extraction, and 2. Decision Tree-Support Vector Machine (DT-SVM) Hybrid Model for predictions. We analyse the breast Cancer data available from the Wisconsin dataset from UCI machine learning with the aim of developing accurate prediction models for breast cancer using data mining techniques. In this experiment, we compare three classifications techniques in Weka software and comparison results show that DTSVM has higher prediction accuracy than Instance-based learning (IBL), Sequential Minimal Optimization (SMO) and Naïve based classifiers. Index Terms breast cancer; classification; Decision TreeSupport Vector Machine, Naïve Bayes, Instance-based learning, Sequential Minimal Optimization, and weka;",
"title": ""
},
{
"docid": "27447d05f1e13e487a741fabc9059fa6",
"text": "Online communication media are being used increasingly for attempts to persuade message receivers. This paper presents a theoretical model that predicts outcomes of online persuasion based on the structure of primary and secondary goals message receivers hold toward the communication.",
"title": ""
},
{
"docid": "eb3a07c2295ba09c819c7a998b2fb337",
"text": "Recent advances have demonstrated the potential of network MIMO (netMIMO), which combines a practical number of distributed antennas as a virtual netMIMO AP (nAP) to improve spatial multiplexing of an WLAN. Existing solutions, however, either simply cluster nearby antennas as static nAPs, or dynamically cluster antennas on a per-packet basis so as to maximize the sum rate of the scheduled clients. To strike the balance between the above two extremes, in this paper, we present the design, implementation and evaluation of FlexNEMO, a practical two-phase netMIMO clustering system. Unlike previous per-packet clustering approaches, FlexNEMO only clusters antennas when client distribution and traffic pattern change, as a result being more practical to be implemented. A medium access control protocol is then designed to allow the clients at the center of nAPs to have a higher probability to gain access opportunities, but still ensure long-term fairness among clients. By combining on-demand clustering and priority-based access control, FlexNEMO not only improves antenna utilization, but also optimizes the channel condition for every individual client. We evaluated our design via both testbed experiments on USRPs and trace-driven emulations. The results demonstrate that FlexNEMO can deliver 94.7% and 93.7% throughput gains over static antenna clustering in a 4-antenna testbed and 16-antenna emulation, respectively.",
"title": ""
},
{
"docid": "6fec53c8c10c2e7114a1464b2b8e3024",
"text": "This paper provides generalized analysis of active filters used as electromagnetic interference (EMI) filters and active-power filters. Insertion loss and impedance increase of various types of active-filter topologies are described with applicable requirements and limitations as well as the rationale for selecting active-filter topology according to different applications.",
"title": ""
},
{
"docid": "e30cedcb4cb99c4c3b2743c5359cf823",
"text": "This paper presents a 116nW wake-up radio complete with crystal reference, interference compensation, and baseband processing, such that a selectable 31-bit code is required to toggle a wake-up signal. The front-end operates over a broad frequency range, tuned by an off-chip band-select filter and matching network, and is demonstrated in the 402-405MHz MICS band and the 915MHz and 2.4GHz ISM bands with sensitivities of -45.5dBm, -43.4dBm, and -43.2dBm, respectively. Additionally, the baseband processor implements automatic threshold feedback to detect the presence of interferers and dynamically adjust the receiver's sensitivity, mitigating the jamming problem inherent to previous energy-detection wake-up radios. The wake-up radio has a raw OOK chip-rate of 12.5kbps, an active area of 0.35mm2 and operates using a 1.2V supply for the crystal reference and RF demodulation, and a 0.5V supply for subthreshold baseband processing.",
"title": ""
},
{
"docid": "6c2ab35deb9bb61e23e95b6510134459",
"text": "ENSURING THAT ATHLETES FUNCTION OPTIMALLY THROUGHOUT TRAINING IS AN IMPORTANT FOCUS FOR THE STRENGTH AND CONDITIONING COACH. SLEEP IS AN INFLUENTIAL FACTOR THAT AFFECTS THE QUALITY OF TRAINING, GIVEN ITS IMPLICATIONS ON THE RECOVERY PROCESS. INTENSE TRAINING MAY PREDISPOSE ATHLETES TO RISK FACTORS SURROUNDING DISTURBED SLEEP PATTERNS. THESE MAY BE DUE TO INHERENT PHYSICAL EXERTION, COMMITMENT TO EXTENSIVE TRAINING SCHEDULES, THE EFFECTS OF TRAVEL, DOMESTIC OR INTERNATIONAL, AND THE PRESSURES THAT COMPETITION EVOKES. EDUCATING ATHLETES ON THE IMPLICATIONS OF SLEEP SHOULD BE IMPLEMENTED BY STRENGTH AND CONDITIONING COACHES TO OPTIMIZE ATHLETE RECOVERY, PROMOTE CONSISTENT SLEEP ROUTINES, AND SLEEP LENGTH.",
"title": ""
},
{
"docid": "c3e4ef9e9fd5b6301cb0a07ced5c02fc",
"text": "The classification problem of assigning several observations into different disjoint groups plays an important role in business decision making and many other areas. Developing more accurate and widely applicable classification models has significant implications in these areas. It is the reason that despite of the numerous classification models available, the research for improving the effectiveness of these models has never stopped. Combining several models or using hybrid models has become a common practice in order to overcome the deficiencies of single models and can be an effective way of improving upon their predictive performance, especially when the models in combination are quite different. In this paper, a novel hybridization of artificial neural networks (ANNs) is proposed using multiple linear regression models in order to yield more general and more accurate model than traditional artificial neural networks for solving classification problems. Empirical results indicate that the proposed hybrid model exhibits effectively improved classification accuracy in comparison with traditional artificial neural networks and also some other classification models such as linear discriminant analysis (LDA), quadratic discriminant analysis (QDA), K-nearest neighbor (KNN), and support vector machines (SVMs) using benchmark and real-world application data sets. These data sets vary in the number of classes (two versus multiple) and the source of the data (synthetic versus real-world). Therefore, it can be applied as an appropriate alternate approach for solving classification problems, specifically when higher forecasting",
"title": ""
},
{
"docid": "ef8a61d3ff3aad461c57fe893e0b5bb6",
"text": "In this paper, we propose an underwater wireless sensor network (UWSN) named SOUNET where sensor nodes form and maintain a tree-topological network for data gathering in a self-organized manner. After network topology discovery via packet flooding, the sensor nodes consistently update their parent node to ensure the best connectivity by referring to the timevarying neighbor tables. Such a persistent and self-adaptive method leads to high network connectivity without any centralized control, even when sensor nodes are added or unexpectedly lost. Furthermore, malfunctions that frequently happen in self-organized networks such as node isolation and closed loop are resolved in a simple way. Simulation results show that SOUNET outperforms other conventional schemes in terms of network connectivity, packet delivery ratio (PDR), and energy consumption throughout the network. In addition, we performed an experiment at the Gyeongcheon Lake in Korea using commercial underwater modems to verify that SOUNET works well in a real environment.",
"title": ""
}
] | scidocsrr |
cab4c0c365885946dba5525892dc8d76 | Data-Driven Sparse Structure Selection for Deep Neural Networks | [
{
"docid": "065ca3deb8cb266f741feb67e404acb5",
"text": "Recent research on deep convolutional neural networks (CNNs) has focused primarily on improving accuracy. For a given accuracy level, it is typically possible to identify multiple CNN architectures that achieve that accuracy level. With equivalent accuracy, smaller CNN architectures offer at least three advantages: (1) Smaller CNNs require less communication across servers during distributed training. (2) Smaller CNNs require less bandwidth to export a new model from the cloud to an autonomous car. (3) Smaller CNNs are more feasible to deploy on FPGAs and other hardware with limited memory. To provide all of these advantages, we propose a small CNN architecture called SqueezeNet. SqueezeNet achieves AlexNet-level accuracy on ImageNet with 50x fewer parameters. Additionally, with model compression techniques, we are able to compress SqueezeNet to less than 0.5MB (510× smaller than AlexNet). The SqueezeNet architecture is available for download here: https://github.com/DeepScale/SqueezeNet",
"title": ""
},
{
"docid": "9800cb574743679b4517818c9653ada5",
"text": "This paper aims to accelerate the test-time computation of deep convolutional neural networks (CNNs). Unlike existing methods that are designed for approximating linear filters or linear responses, our method takes the nonlinear units into account. We minimize the reconstruction error of the nonlinear responses, subject to a low-rank constraint which helps to reduce the complexity of filters. We develop an effective solution to this constrained nonlinear optimization problem. An algorithm is also presented for reducing the accumulated error when multiple layers are approximated. A whole-model speedup ratio of 4× is demonstrated on a large network trained for ImageNet, while the top-5 error rate is only increased by 0.9%. Our accelerated model has a comparably fast speed as the “AlexNet” [11], but is 4.7% more accurate.",
"title": ""
},
{
"docid": "26dac00bc328dc9c8065ff105d1f8233",
"text": "Recently, convolutional neural networks (CNN) have demonstrated impressive performance in various computer vision tasks. However, high performance hardware is typically indispensable for the application of CNN models due to the high computation complexity, which prohibits their further extensions. In this paper, we propose an efficient framework, namely Quantized CNN, to simultaneously speed-up the computation and reduce the storage and memory overhead of CNN models. Both filter kernels in convolutional layers and weighting matrices in fully-connected layers are quantized, aiming at minimizing the estimation error of each layer's response. Extensive experiments on the ILSVRC-12 benchmark demonstrate 4 ~ 6× speed-up and 15 ~ 20× compression with merely one percentage loss of classification accuracy. With our quantized CNN model, even mobile devices can accurately classify images within one second.",
"title": ""
}
] | [
{
"docid": "d3782b8325847e28d3e304243fc72bcf",
"text": "Activity Theory (AT) is increasingly employed as a lens to guide data analysis in information systems (IS) studies. The theory is also applied to assess and evaluate information systems and technologies (IS/IT) in organisations. Even though its popularity continues to increase in both business and academic domains, there is no formal or assessment guide through which the theory can be applied, which makes it sometimes difficult or complicated. The challenge is significant and critical in that when applied, it influences and shapes the results of the phenomena being studied. This is a problem as results of studies cannot or should not be misconstrued or misrepresented. This study was undertaken to examine how the use of AT in IS studies can be made easy. Based on the findings, a three phase approach was developed and proposed, to guide: (i) the selection of AT in an IS/IT study; (ii) use of elements for data analysis; and (iii) how the elements can be linked with AT components in the analysis of qualitative data. The approach therefore provides a formal guide that can be followed, to ease the selection and application of AT in IS/IT studies as well as assessment of IS/IT artefacts in an organisation. The approach can be useful to researchers for data analysis and interpretation of results. Also, the guidelines can be employed by educators for teaching and learning in the areas of research.",
"title": ""
},
{
"docid": "88af2cee31243eef4e46e357b053b3ae",
"text": "Domestic induction heating (IH) is currently the technology of choice in modern domestic applications due to its advantages regarding fast heating time, efficiency, and improved control. New design trends pursue the implementation of new cost-effective topologies with higher efficiency levels. In order to achieve this aim, a direct ac-ac boost resonant converter is proposed in this paper. The main features of this proposal are the improved efficiency, reduced component count, and proper output power control. A detailed analytical model leading to closed-form expressions of the main magnitudes is presented, and a converter design procedure is proposed. In addition, an experimental prototype has been designed and built to prove the expected converter performance and the accurateness of the analytical model. The experimental results are in good agreement with the analytical ones and prove the feasibility of the proposed converter for the IH application.",
"title": ""
},
{
"docid": "b758c117dbf56c63e3909abd0f69e5a1",
"text": "We compared the utility of two executive-function brief screening tools, the Institute of Cognitive Neurology (INECO) Frontal Screening (IFS) and the Frontal Assessment Battery (FAB), in their ability to detect executive dysfunction in a group of behavioral variant frontotemporal dementia (bv-FTD, n = 25) and Alzheimer's disease (AD, n = 25) patients in the early stages of their disease and in comparison to a group of age-, gender-, and education-matched controls (n = 26). Relative to the FAB, the IFS showed (a) better capability to differentiate between types of dementia; (b) higher sensitivity and specificity for the detection of executive dysfunction; (c) stronger correlations with standard executive tasks. We conclude that while both tools are brief and specific for the detection of early executive dysfunction in dementia, the IFS is more sensitive and specific in differentiating bvFTD from AD, and its use in everyday clinical practice can contribute to the differential diagnosis between types of dementia.",
"title": ""
},
{
"docid": "506244f457f824f09c246f8134643cd7",
"text": "This paper presents the Entity-Duet Neural Ranking Model (EDRM), which introduces knowledge graphs to neural search systems. EDRM represents queries and documents by their words and entity annotations. The semantics from knowledge graphs are integrated in the distributed representations of their entities, while the ranking is conducted by interaction-based neural ranking networks. The two components are learned end-to-end, making EDRM a natural combination of entityoriented search and neural information retrieval. Our experiments on a commercial search log demonstrate the effectiveness of EDRM. Our analyses reveal that knowledge graph semantics significantly improve the generalization ability of neural ranking models.",
"title": ""
},
{
"docid": "6f95d8bcaefcc99209279dadb1beb0a6",
"text": "Public cloud software marketplaces already offer users a wealth of choice in operating systems, database management systems, financial software, and virtual networking, all deployable and configurable at the click of a button. Unfortunately, this level of customization has not extended to emerging hypervisor-level services, partly because traditional virtual machines (VMs) are fully controlled by only one hypervisor at a time. Currently, a VM in a cloud platform cannot concurrently use hypervisorlevel services from multiple third-parties in a compartmentalized manner. We propose the notion of a multihypervisor VM, which is an unmodified guest that can simultaneously use services from multiple coresident, but isolated, hypervisors. We present a new virtualization architecture, called Span virtualization, that leverages nesting to allow multiple hypervisors to concurrently control a guest’s memory, virtual CPU, and I/O resources. Our prototype of Span virtualization on the KVM/QEMU platform enables a guest to use services such as introspection, network monitoring, guest mirroring, and hypervisor refresh, with performance comparable to traditional nested VMs.",
"title": ""
},
{
"docid": "e2b83d57ff66a445677507855921f65a",
"text": "Increasing interest in end users' reactions to health information technology (IT) has elevated the importance of theories that predict and explain health IT acceptance and use. This paper reviews the application of one such theory, the Technology Acceptance Model (TAM), to health care. We reviewed 16 data sets analyzed in over 20 studies of clinicians using health IT for patient care. Studies differed greatly in samples and settings, health ITs studied, research models, relationships tested, and construct operationalization. Certain TAM relationships were consistently found to be significant, whereas others were inconsistent. Several key relationships were infrequently assessed. Findings show that TAM predicts a substantial portion of the use or acceptance of health IT, but that the theory may benefit from several additions and modifications. Aside from improved study quality, standardization, and theoretically motivated additions to the model, an important future direction for TAM is to adapt the model specifically to the health care context, using beliefs elicitation methods.",
"title": ""
},
{
"docid": "fee8c874c5cbe5c8d8029b15c58ed282",
"text": "Many distributed machine learning (ML) systems exhibit high communication overhead when dealing with big data sets. Our investigations showed that popular distributed ML systems could spend about an order of magnitude more time on network communication than computation to train ML models containing millions of parameters. Such high communication overhead is mainly caused by two operations: pulling parameters and pushing gradients. In this paper, we propose an approach called Timed Dataflow (TDF) to deal with this problem via reducing network traffic using three techniques: a timed parameter storage system, a hybrid parameter filter and a hybrid gradient filter. In particular, the timed parameter storage technique and the hybrid parameter filter enable servers to discard unchanged parameters during the pull operation, and the hybrid gradient filter allows servers to drop gradients selectively during the push operation. Therefore, TDF could reduce the network traffic and communication time significantly. Extensive performance evaluations in a real testbed showed that TDF could reduce up to 77% and 79% of network traffic for the pull and push operations, respectively. As a result, TDF could speed up model training by a factor of up to 4 without sacrificing much accuracy for some popular ML models, compared to systems not using TDF.",
"title": ""
},
{
"docid": "b34098216357cfd10af2c5dbe30fc32c",
"text": "Multicast video streaming over multirate wireless LANs imposes strong demands on video codecs and the underlying network. It is not sufficient that only the video codec or only the underlying protocols adapt to changes in the wireless link quality. Research efforts should be applied in both and in a synchronized way. Cross layer design is a new paradigm that addresses this challenge by optimizing communication network architectures across traditional layer boundaries. This paper presents cross-layer architecture for adaptive video multicast streaming over multirate wireless LANs where layer-specific information is passed in both directions, top-down and bottom-up. The authors jointly consider three layers of the protocol stack: the application, data link and physical layers. The authors analyze the performance of the proposed architecture and extensively evaluate it via simulations. The results show that the real-time video quality of the overall system can be greatly improved by cross-layer signaling.",
"title": ""
},
{
"docid": "a286f9f594ef563ba082fb454eddc8bc",
"text": "The visual inspection of Mura defects is still a challenging task in the quality control of panel displays because of the intrinsically nonuniform brightness and blurry contours of these defects. The current methods cannot detect all Mura defect types simultaneously, especially small defects. In this paper, we introduce an accurate Mura defect visual inspection (AMVI) method for the fast simultaneous inspection of various Mura defect types. The method consists of two parts: an outlier-prejudging-based image background construction (OPBC) algorithm is proposed to quickly reduce the influence of image backgrounds with uneven brightness and to coarsely estimate the candidate regions of Mura defects. Then, a novel region-gradient-based level set (RGLS) algorithm is applied only to these candidate regions to quickly and accurately segment the contours of the Mura defects. To demonstrate the performance of AMVI, several experiments are conducted to compare AMVI with other popular visual inspection methods are conducted. The experimental results show that AMVI tends to achieve better inspection performance and can quickly and accurately inspect a greater number of Mura defect types, especially for small and large Mura defects with uneven backlight. Note to Practitioners—The traditional Mura visual inspection method can address only medium-sized Mura defects, such as region Mura, cluster Mura, and vertical-band Mura, and is not suitable for small Mura defects, for example, spot Mura. The proposed accurate Mura defect visual inspection (AMVI) method can accurately and simultaneously inspect not only medium-sized Mura defects but also small and large Mura defects. The proposed outlier-prejudging-based image background construction (OPBC) algorithm of the AMVI method is employed to improve the Mura true detection rate, while the proposed region-gradient-based level set (RGLS) algorithm is used to reduce the Mura false detection rate. Moreover, this method can be applied to online vision inspection: OPBC can be implemented in parallel processing units, while RGLS is applied only to the candidate regions of the inspected image. In addition, AMVI can be extended to other low-contrast defect vision inspection tasks, such as the inspection of glass, steel strips, and ceramic tiles.",
"title": ""
},
{
"docid": "4f7105f279701ab2356ba63d2d47844a",
"text": "Water, aqueous methanol, and aqueous ethanol extracts of freeze-dried leaves of Moringa oleifera Lam. from different agroclimatic regions were examined for radical scavenging capacities and antioxidant activities. All leaf extracts were capable of scavenging peroxyl and superoxyl radicals. Similar scavenging activities for different solvent extracts of each collection were found for the stable 1,1-diphenyl 2-picrylhydrazyl (DPPH(*)) radical. Among the three different moringa samples, both methanol and ethanol extracts of Indian origins showed the highest antioxidant activities, 65.1 and 66.8%, respectively, in the beta-carotene-linoleic acid system. Nonetheless, increasing concentration of all the extracts had significantly (P < 0.05) increased reducing power, which may in part be responsible for their antioxidant activity. The major bioactive compounds of phenolics were found to be flavonoid groups such as quercetin and kaempferol. On the basis of the results obtained, moringa leaves are found to be a potential source of natural antioxidants due to their marked antioxidant activity. This is the first report on the antioxidant properties of the extracts from freeze-dried moringa leaves. Overall, both methanol (80%) and ethanol (70%) were found to be the best solvents for the extraction of antioxidant compounds from moringa leaves.",
"title": ""
},
{
"docid": "93a9df00671b032986148106d7e90f70",
"text": "Vulnerabilities in applications and their widespread exploitation through successful attacks are common these days. Testing applications for preventing vulnerabilities is an important step to address this issue. In recent years, a number of security testing approaches have been proposed. However, there is no comparative study of these work that might help security practitioners select an appropriate approach for their needs. Moreover, there is no comparison with respect to automation capabilities of these approaches. In this work, we identify seven criteria to analyze program security testing work. These are vulnerability coverage, source of test cases, test generation method, level of testing, granularity of test cases, testing automation, and target applications. We compare and contrast prominent security testing approaches available in the literature based on these criteria. In particular, we focus on work that address four most common but dangerous vulnerabilities namely buffer overflow, SQL injection, format string bug, and cross site scripting. Moreover, we investigate automation features available in these work across a security testing process. We believe that our findings will provide practical information for security practitioners in choosing the most appropriate tools.",
"title": ""
},
{
"docid": "4b999743e8032c8ef1b0a5f63888e832",
"text": "In this paper we describe a novel approach to autonomous dirt road following. The algorithm is able to recognize highly curved roads in cluttered color images quite often appearing in offroad scenarios. To cope with large curvatures we apply gaze control and model the road using two different clothoid segments. A Particle Filter incorporating edge and color intensity information is used to simultaneously detect and track the road farther away from the ego vehicle. In addition the particles are used to generate static road segment estimations in a given look ahead distance. These estimations are predicted with respect to ego motion and fused utilizing Kalman filter techniques to generate a smooth local clothoid segment for lateral control of the vehicle.",
"title": ""
},
{
"docid": "a94f066ec5db089da7fd19ac30fe6ee3",
"text": "Information Centric Networking (ICN) is a new networking paradigm in which the ne twork provides users with content instead of communicatio n channels between hosts. Software Defined Networking (SDN) is an approach that promises to enable the co ntinuous evolution of networking architectures. In this paper we propose and discuss solutions to support ICN by using SDN concepts. We focus on an ICN framework called CONET, which groun ds its roots in the CCN/NDN architecture and can interwork with its implementation (CCNx). Altho ugh some details of our solution have been specifically designed for the CONET architecture, i ts general ideas and concepts are applicable to a c lass of recent ICN proposals, which follow the basic mod e of operation of CCN/NDN. We approach the problem in two complementary ways. First we discuss a general and long term solution based on SDN concepts without taking into account specific limit ations of SDN standards and equipment. Then we focus on an experiment to support ICN functionality over a large scale SDN testbed based on OpenFlow, developed in the context of the OFELIA Eu ropean research project. The current OFELIA testbed is based on OpenFlow 1.0 equipment from a v ariety of vendors, therefore we had to design the experiment taking into account the features that ar e currently available on off-the-shelf OpenFlow equipment.",
"title": ""
},
{
"docid": "38f6aaf5844ddb6e4ed0665559b7f813",
"text": "A novel dual-broadband multiple-input-multiple-output (MIMO) antenna system is developed. The MIMO antenna system consists of two dual-broadband antenna elements, each of which comprises two opened loops: an outer loop and an inner loop. The opened outer loop acts as a half-wave dipole and is excited by electromagnetic coupling from the inner loop, leading to a broadband performance for the lower band. The opened inner loop serves as two monopoles. A combination of the two monopoles and the higher modes from the outer loop results in a broadband performance for the upper band. The bandwidths (return loss >;10 dB) achieved for the dual-broadband antenna element are 1.5-2.8 GHz (~ 60%) for the lower band and 4.7-8.5 GHz (~ 58\\%) for the upper band. Two U-shaped slots are introduced to reduce the coupling between the two dual-broadband antenna elements. The isolation achieved is higher than 15 dB in the lower band and 20 dB in the upper band, leading to an envelope correlation coefficient of less than 0.01. The dual-broadband MIMO antenna system has a compact volume of 50×17×0.8 mm3, suitable for GSM/UMTS/LTE and WLAN communication handsets.",
"title": ""
},
{
"docid": "e5a3119470420024b99df2d6eb14b966",
"text": "Why should wait for some days to get or receive the rules of play game design fundamentals book that you order? Why should you take it if you can get the faster one? You can find the same book that you order right here. This is it the book that you can receive directly after purchasing. This rules of play game design fundamentals is well known book in the world, of course many people will try to own it. Why don't you become the first? Still confused with the way?",
"title": ""
},
{
"docid": "c97ae655163eba517971a4c2b63e9f4e",
"text": "Among the many studies focusing on the effect of learner and instructional variables on learning outcomes, few studies have investigated the effect of these variables and their mediating mechanisms influencing students’ learning within a blended learning environment. This study examined the influence of instructional and learner variables on learning outcomes for a blended instruction course offered for undergraduate students. Data analysis indicated that age, prior experiences with distance learning opportunities, preference in delivery format, and average study time are those learner antecedents differentiating learning outcomes among groups of college students. From a regression analysis, the influence of learner, instructional, and motivational variables on learning outcomes found to be consolidated around one variable in learning application.",
"title": ""
},
{
"docid": "5ed9fde132f44ff2f2354b5d9f5b14ab",
"text": "An issue in microfabrication of the fluidic channels in glass/poly (dimethyl siloxane) (PDMS) is the absence of a well-defined study of the bonding strength between the surfaces making up these channels. Although most of the research papers mention the use of oxygen plasma for developing chemical (siloxane) bonds between the participating surfaces, yet they only define a certain set of parameters, tailored to a specific setup. An important requirement of all the microfluidics/biosensors industry is the development of a general regime, which defines a systematic method of gauging the bond strength between the participating surfaces in advance by correlation to a common parameter. This enhances the reliability of the devices and also gives a structured approach to its future large-scale manufacturing. In this paper, we explore the possibility of the existence of a common scale, which can be used to gauge bond strength between various surfaces. We find that the changes in wettability of surfaces owing to various levels of plasma exposure can be a useful parameter to gauge the bond strength. We obtained a good correlation between contact angle of deionized water (a direct measure of wettability) on the PDMS and glass surfaces based on various dosages or oxygen plasma treatment. The exposure was done first in an inductively coupled high-density (ICP) plasma system and then in plasma enhanced chemical vapor deposition (PECVD) system. This was followed by the measurement of bond strength by use or the standardized blister test.",
"title": ""
},
{
"docid": "e867c7bc20f5b46fd861bbf5277c78e1",
"text": "Energy efficiency has gradually become a compulsory need in mobile computing as the processing requirements for smartphones have increased exponentially. Moreover, the current demand is stretching beyond the extents of modern battery technology. In this sense, we introduce a novel collaboration solution for mobile devices based on a contextual search entitled Hybrid Contextual Cloud for Ubiquitous Platforms comprising of Smartphones (HYCCUPS). HYCCUPS takes advantage of the pervasive nature of smartphones and of current wireless communication technologies as to offer offloading execution of mobile applications in an opportunistic on-the-fly hybrid computing cloud. We design an adaptive contextual search algorithm for schedulling mobile code execution in smartphone communities based on predicting the availability and mobility of devices in the near vicinity. We emulate the HYCCUPS framework based on real user traces and we prove that it improves battery health, maximizes power save, minimizes overall execution time of mobile applications and it preserves or even enhances user experience.",
"title": ""
},
{
"docid": "16b5c5d176f2c9292d9c9238769bab31",
"text": "We abstract out the core search problem of active learning schemes, to better understand the extent to which adaptive labeling can improve sample complexity. We give various upper and lower bounds on the number of labels which need to be queried, and we prove that a popular greedy active learning rule is approximately as good as any other strategy for minimizing this number of labels.",
"title": ""
},
{
"docid": "280d9caa58ec97e5b0866d90b22dd35a",
"text": "Term structures of default probabilities are omnipresent in credit risk modeling: time-dynamic credit portfolio models, default times, and multi-year pricing models, they all need the time evolution of default probabilities as a basic model input. Although people tend to believe that from an economic point of view the Markov property as underlying model assumption is kind of questionable it seems to be common market practice to model PD term structures via Markov chain techniques. In this paper we illustrate that the Markov assumption carries us quite far if we allow for nonhomogeneous time behaviour of the Markov chain generating the PD term structures. As a ‘proof of concept’ we calibrate a nonhomogeneous continuous-time Markov chain (NHCTMC) to observed one-year rating migrations and multi-year default frequencies, hereby achieving convincing approximation quality. 1 Markov Chains in Credit Risk Modeling The probability of default (PD) for a client is a fundamental risk parameter in credit risk management. It is common practice to assign to every rating grade in a bank’s masterscale a one-year PD in line with regulatory requirements; see [1]. Table 1 shows an example for default frequencies assigned to rating grades from Standard and Poor’s (S&P). D AAA 0.00% AA 0.01% A 0.04% BBB 0.29% BB 1.28% B 6.24% CCC 32.35% Table 1: One-year default frequencies (D) assigned to S&P ratings; see [17], Table 9. Moreover, credit risk modeling concepts like dependent default times, multi-year credit pricing, and multi-horizon economic capital require more than just one-year PDs. For multi-year credit risk modeling, banks need a whole term structure (p R )t≥0 of (cumulative) PDs for every rating grade R; see, e.g., [2] for an introduction to PD term structures and [3] for their application to structured credit products. Every bank has its own (proprietary) way to calibrate PD term structures to bank-internal and external data. A look into the literature reveals that for the generation of PD term structures various Markov chain approaches, most often based on homogeneous chains, dominate current market practice. A landmarking paper in this direction is the work by Jarrow, Lando, and Turnbull [7]. Further research has been done by various authors, see, e.g., Kadam [8], Lando [10], Sarfaraz et al. [12], Schuermann and Jafry [14, 15], Trueck and Oezturkmen [18], just to mention a few examples. A new approach via Markov mixtures has been presented recently by Frydman and Schuermann [5]. In Markov chain theory (see [11]) one distinguishes between discrete-time and continuous-time chains. For instance, a discrete-time chain can be specified by a one-year migration or transition 1In the literature, PD term structures are sometimes called credit curves. 2A Markov chain is called homogeneous if transition probabilities do not depend on time.",
"title": ""
}
] | scidocsrr |
c822b341f266abe617affdf50abb121d | Dual Iterative Hard Thresholding: From Non-convex Sparse Minimization to Non-smooth Concave Maximization | [
{
"docid": "e43e5723ad4c2362b2a899bf4b8af0cb",
"text": "The Hard Thresholding Pursuit (HTP) is a class of truncated gradient descent methods for finding sparse solutions of l0-constrained loss minimization problems. The HTP-style methods have been shown to have strong approximation guarantee and impressive numerical performance in high dimensional statistical learning applications. However, the current theoretical treatment of these methods has traditionally been restricted to the analysis of parameter estimation consistency. It remains an open problem to analyze the support recovery performance (a.k.a., sparsistency) of this type of methods for recovering the global minimizer of the original NP-hard problem. In this paper, we bridge this gap by showing, for the first time, that exact recovery of the global sparse minimizer is possible for HTP-style methods under restricted strong condition number bounding conditions. We further show that HTP-style methods are able to recover the support of certain relaxed sparse solutions without assuming bounded restricted strong condition number. Numerical results on simulated data confirms our theoretical predictions.",
"title": ""
},
{
"docid": "1548b8de344be4a6dddff04d833a633b",
"text": "We derive a novel norm that corresponds to the tightest convex relaxation of sparsity combined with an `2 penalty. We show that this new k-support norm provides a tighter relaxation than the elastic net and can thus be advantageous in in sparse prediction problems. We also bound the looseness of the elastic net, thus shedding new light on it and providing justification for its use.",
"title": ""
},
{
"docid": "6696d9092ff2fd93619d7eee6487f867",
"text": "We propose an accelerated stochastic block coordinate descent algorithm for nonconvex optimization under sparsity constraint in the high dimensional regime. The core of our algorithm is leveraging both stochastic partial gradient and full partial gradient restricted to each coordinate block to accelerate the convergence. We prove that the algorithm converges to the unknown true parameter at a linear rate, up to the statistical error of the underlying model. Experiments on both synthetic and real datasets backup our theory.",
"title": ""
}
] | [
{
"docid": "4d2be7aac363b77c6abd083947bc28c7",
"text": "Scene parsing is challenging for unrestricted open vocabulary and diverse scenes. In this paper, we exploit the capability of global context information by different-region-based context aggregation through our pyramid pooling module together with the proposed pyramid scene parsing network (PSPNet). Our global prior representation is effective to produce good quality results on the scene parsing task, while PSPNet provides a superior framework for pixel-level prediction. The proposed approach achieves state-of-the-art performance on various datasets. It came first in ImageNet scene parsing challenge 2016, PASCAL VOC 2012 benchmark and Cityscapes benchmark. A single PSPNet yields the new record of mIoU accuracy 85.4% on PASCAL VOC 2012 and accuracy 80.2% on Cityscapes.",
"title": ""
},
{
"docid": "abc75d5b44323133d2b1ffef57a920f3",
"text": "With the increasing adoption of mobile 4G LTE networks, video streaming as the major contributor of 4G LTE data traffic, has become extremely hot. However, the battery life has become the bottleneck when mobile users are using online video services. In this paper, we deploy a real mobile system for power measurement and profiling of online video streaming in 4G LTE networks. Based on some designed experiments with different configurations, we measure the power consumption for online video streaming, offline video playing, and mobile background. A RRC state study is taken to understand how RRC states impact power consumption. Then, we profile the power consumption of video streaming and show the results with different impact factors. According to our experimental statistics, the power saving room for online video streaming in 4G LTE networks can be up to 69%.",
"title": ""
},
{
"docid": "b84971bc1f2d2ebf43815d33cea86c8c",
"text": "The container-inhabiting mosquito simulation model (CIMSiM) is a weather-driven, dynamic life table simulation model of Aedes aegypti (L.) and similar nondiapausing Aedes mosquitoes that inhabit artificial and natural containers. This paper presents a validation of CIMSiM simulating Ae. aegypti using several independent series of data that were not used in model development. Validation data sets include laboratory work designed to elucidate the role of diet on fecundity and rates of larval development and survival. Comparisons are made with four field studies conducted in Bangkok, Thailand, on seasonal changes in population dynamics and with a field study in New Orleans, LA, on larval habitat. Finally, predicted ovipositional activity of Ae. aegypti in seven cities in the southeastern United States for the period 1981-1985 is compared with a data set developed by the U.S. Public Health Service. On the basis of these comparisons, we believe that, for stated design goals, CIMSiM adequately simulates the population dynamics of Ae. aegypti in response to specific information on weather and immature habitat. We anticipate that it will be useful in simulation studies concerning the development and optimization of control strategies and that, with further field validation, can provide entomological inputs for a dengue virus transmission model.",
"title": ""
},
{
"docid": "46d3009e8fd4071c932e50a0c50b8f41",
"text": "Background\nE-health technology applications are essential tools of modern information technology that improve quality of healthcare delivery in hospitals of both developed and developing countries. However, despite its positive benefits, studies indicate that the rate of the e-health adoption in some developing countries is either low or underutilized. This is due in part, to barriers such as resistance from healthcare professionals, poor infrastructure, and low technical expertise among others.\n\n\nObjective\nThe aim of this study is to investigate, identify and analyze the underlying factors that affect healthcare professionals decision to adopt and use e-health technology applications in developing countries, with particular reference to hospitals in Nigeria.\n\n\nMethods\nThe study used a cross sectional approach in the form of a close-ended questionnaire to collect quantitative data from a sample of 465 healthcare professionals randomly selected from 15 hospitals in Nigeria. We used the modified Technology Acceptance Model (TAM) as the dependent variable and external factors as independent variables. The collected data was then analyzed using SPSS statistical analysis such as frequency test, reliability analysis, and correlation coefficient analysis.\n\n\nResults\nThe results obtained, which correspond with findings from other researches published, indicate that perceived usefulness, belief, willingness, as well as attitude of healthcare professionals have significant influence on their intention to adopt and use the e-health technology applications. Other strategic factors identified include low literacy level and experience in using the e-health technology applications, lack of motivation, poor organizational and management policies.\n\n\nConclusion\nThe study contributes to the literature by pinpointing significant areas where findings can positively affect, or be found useful by, healthcare policy decision makers in Nigeria and other developing countries. This can help them understand their areas of priorities and weaknesses when planning for e-health technology adoption and implementation.",
"title": ""
},
{
"docid": "0ea6d4a02a4013a0f9d5aa7d27b5a674",
"text": "Recently, there has been growing interest in social network analysis. Graph models for social network analysis are usually assumed to be a deterministic graph with fixed weights for its edges or nodes. As activities of users in online social networks are changed with time, however, this assumption is too restrictive because of uncertainty, unpredictability and the time-varying nature of such real networks. The existing network measures and network sampling algorithms for complex social networks are designed basically for deterministic binary graphs with fixed weights. This results in loss of much of the information about the behavior of the network contained in its time-varying edge weights of network, such that is not an appropriate measure or sample for unveiling the important natural properties of the original network embedded in the varying edge weights. In this paper, we suggest that using stochastic graphs, in which weights associated with the edges are random variables, can be a suitable model for complex social network. Once the network model is chosen to be stochastic graphs, every aspect of the network such as path, clique, spanning tree, network measures and sampling algorithms should be treated stochastically. In particular, the network measures should be reformulated and new network sampling algorithms must be designed to reflect the stochastic nature of the network. In this paper, we first define some network measures for stochastic graphs, and then we propose four sampling algorithms based on learning automata for stochastic graphs. In order to study the performance of the proposed sampling algorithms, several experiments are conducted on real and synthetic stochastic graphs. The performances of these algorithms are studied in terms of Kolmogorov-Smirnov D statistics, relative error, Kendall’s rank correlation coefficient and relative cost.",
"title": ""
},
{
"docid": "b084482c7dcffc70e307f60cb9bd3409",
"text": "The evolution of the endoscopic endonasal transsphenoidal technique, which was initially reserved only for sellar lesions through the sphenoid sinus cavity, has lead in the last decades to a progressive possibility to access the skull base from the nose. This route allows midline access and visibility to the suprasellar, retrosellar and parasellar space while obviating brain retraction, and makes possible to treat transsphenoidally a variety of relatively small midline skull base and parasellar lesions traditionally approached transcranially. We report our current knowledge of the endoscopic anatomy of the midline skull base as seen from the endonasal perspective, in order to describe the surgical path and structures whose knowledge is useful during the operation. Besides, we describe the step-by-step surgical technique to access the different compartments, the \"dangerous landmarks\" to avoid in order to minimize the risks of complications and how to manage them, and our paradigm and techniques for dural and bony reconstruction. Furthermore, we report a brief description of the useful instruments and tools for the extended endoscopic approaches. Between January 2004 and April 2006 we performed 33 extended endonasal approaches for lesions arising from or involving the sellar region and the surrounding areas. The most representative pathologies of this series were the ten cranioparvngiomas, the six giant adenomas and the five meningiomas; we also used this procedure in three cases of chordomas, three of Rathke's cleft cysts and three of meningo-encephaloceles, one case of optic nerve glioma, one olfactory groove neuroendocrine tumor and one case of fibro-osseous dysplasia. Tumor removal, as assessed by post-operative MRI, revealed complete removal of the lesion in 2/6 pituitary adenomas, 7/10 craniopharyngiomas, 4/5 meningiomas, 3/3 Rathke's cleft cyst, 3/3 meningo-encephalocele. Surgical complications have been observed in 3 patients, two with a craniopharyngioma, one with a clival meningioma and one with a recurrent giant pituitary macroadenoma involving the entire left cavernous sinus, who developed a CSF leak and a second operation was necessary in order to review the cranial base reconstruction and seal the leak. One of them developed a bacterial meningitis, which resolved after a cycle of intravenous antibiotic therapy with no permanent neurological deficits. One patient with an intra-suprasellar non-functioning adenoma presented with a generalized epileptic seizure a few hours after the surgical procedure, due to the intraoperative massive CSF loss and consequent presence of intracranial air. We registered one surgical mortality. In three cases of craniopharyngioma and in one case of meningioma a new permanent diabetes insipidus was observed. One patient developed a sphenoid sinus mycosis, cured with antimycotic therapy. Epistaxis and airway difficulties were never observed. It is difficult todav to define the boundaries and the future limits of the extended approaches because the work is still in progress. Such extended endoscopic approaches, although at a first glance might be considered something that everyone can do, require an advanced and specialized training.",
"title": ""
},
{
"docid": "3611d022aee93b9cbcc961bb7cbdd3ff",
"text": "Due to the popularity of Deep Neural Network (DNN) models, we have witnessed extreme-scale DNN models with the continued increase of the scale in terms of depth and width. However, the extremely high memory requirements for them make it difficult to run the training processes on single many-core architectures such as a Graphic Processing Unit (GPU), which compels researchers to use model parallelism over multiple GPUs to make it work. However, model parallelism always brings very heavy additional overhead. Therefore, running an extreme-scale model in a single GPU is urgently required. There still exist several challenges to reduce the memory footprint for extreme-scale deep learning. To address this tough problem, we first identify the memory usage characteristics for deep and wide convolutional networks, and demonstrate the opportunities for memory reuse at both the intra-layer and inter-layer levels. We then present Layrub, a runtime data placement strategy that orchestrates the execution of the training process. It achieves layer-centric reuse to reduce memory consumption for extreme-scale deep learning that could not previously be run on a single GPU. Experiments show that, compared to the original Caffe, Layrub can cut down the memory usage rate by an average of 58.2% and by up to 98.9%, at the moderate cost of 24.1% higher training execution time on average. Results also show that Layrub outperforms some popular deep learning systems such as GeePS, vDNN, MXNet, and Tensorflow. More importantly, Layrub can tackle extreme-scale deep learning tasks. For example, it makes an extra-deep ResNet with 1,517 layers that can be trained successfully in one GPU with 12GB memory, while other existing deep learning systems cannot.",
"title": ""
},
{
"docid": "c399a885345466505cfbaf8c175533b7",
"text": "Science is going through two rapidly changing phenomena: one is the increasing capabilities of the computers and software tools from terabytes to petabytes and beyond, and the other is the advancement in high-throughput molecular biology producing piles of data related to genomes, transcriptomes, proteomes, metabolomes, interactomes, and so on. Biology has become a data intensive science and as a consequence biology and computer science have become complementary to each other bridged by other branches of science such as statistics, mathematics, physics, and chemistry. The combination of versatile knowledge has caused the advent of big-data biology, network biology, and other new branches of biology. Network biology for instance facilitates the system-level understanding of the cell or cellular components and subprocesses. It is often also referred to as systems biology. The purpose of this field is to understand organisms or cells as a whole at various levels of functions and mechanisms. Systems biology is now facing the challenges of analyzing big molecular biological data and huge biological networks. This review gives an overview of the progress in big-data biology, and data handling and also introduces some applications of networks and multivariate analysis in systems biology.",
"title": ""
},
{
"docid": "8e7088af6940cf3c2baa9f6261b402be",
"text": "Empathy is an integral part of human social life, as people care about and for others who experience adversity. However, a specific “pathogenic” form of empathy, marked by automatic contagion of negative emotions, can lead to stress and burnout. This is particularly detrimental for individuals in caregiving professions who experience empathic states more frequently, because it can result in illness and high costs for health systems. Automatically recognizing pathogenic empathy from text is potentially valuable to identify at-risk individuals and monitor burnout risk in caregiving populations. We build a model to predict this type of empathy from social media language on a data set we collected of users’ Facebook posts and their answers to a new questionnaire measuring empathy. We obtain promising results in identifying individuals’ empathetic states from their social media (Pearson r = 0.252,",
"title": ""
},
{
"docid": "974f5d138d2a85d81b5dd64f13311721",
"text": "We present a new constraint solver over Boolean variables, available as library(clpb) in SWI-Prolog. Our solver distinguishes itself from other available CLP(B) solvers by several unique features: First, it is written entirely in Prolog and is hence portable to different Prolog implementations. Second, it is the first freely available BDDbased CLP(B) solver. Third, we show that new interface predicates allow us to solve new types of problems with CLP(B) constraints. We also use our implementation experience to contrast features and state necessary requirements of attributed variable interfaces to optimally support CLP(B) constraints in different Prolog systems. Finally, we also present some performance results and comparisons with SICStus Prolog.",
"title": ""
},
{
"docid": "3a32fe66af2e99f3601aae71dc9b64c2",
"text": "Low-power wide-area networking (LPWAN) technologies are capable of supporting a large number of Internet of Things (IoT) use cases. While several LPWAN technologies exist, Long Range (LoRa) and its network architecture LoRaWAN, is currently the most adopted technology. LoRa provides a range of physical layer communication settings, such as bandwidth, spreading factor, coding rate, and transmission frequency. These settings impact throughput, reliability, and communication range. As IoT use cases result in varying communication patterns, it is essential to analyze how LoRa's different communication settings impact on real IoT use cases. In this paper, we analyze the impact of LoRa's communication settings on four IoT use cases, e.g. smart metering, smart parking, smart street lighting, and vehicle fleet tracking. Our results demonstrate that the setting corresponding to the fastest data rate achieves up to 380% higher packet delivery ratio and uses 0.004 times the energy compared to other evaluated settings, while being suitable to support the IoT use cases presented here. However, the setting covers a smaller communication area compared to the slow data rate settings. Moreover, we modified the Aloha-based channel access mechanism used by LoRaWAN and our results demonstrate that the modified channel access positively impacts the performance of the different communication settings.",
"title": ""
},
{
"docid": "7beeea42e8f5d0f21ea418aa7f433ab9",
"text": "This application note describes principles and uses for continuous ST segment monitoring. It also provides a detailed description of the ST Analysis algorithm implemented in the multi-lead ST/AR (ST and Arrhythmia) algorithm, and an assessment of the ST analysis algorithm's performance.",
"title": ""
},
{
"docid": "793edca657c68ade4d2391c23f585c41",
"text": "In the linear bandit problem a learning agent chooses an arm at each round and receives a stochastic reward. The expected value of this stochastic reward is an unknown linear function of the arm choice. As is standard in bandit problems, a learning agent seeks to maximize the cumulative reward over an n round horizon. The stochastic bandit problem can be seen as a special case of the linear bandit problem when the set of available arms at each round is the standard basis ei for the Euclidean space R, i.e. the vector ei is a vector with all 0s except for a 1 in the ith coordinate. As a result each arm is independent of the others and the reward associated with each arm depends only on a single parameter as is the case in stochastic bandits. The underlying algorithmic approach to solve this problem uses the optimism in the face of uncertainty (OFU) principle. The OFU principle solves the exploration-exploitation tradeoff in the linear bandit problem by maintaining a confidence set for the vector of coefficients of the linear function that governs rewards. In each round the algorithm chooses an estimate of the coefficients of the linear function from the confidence set and then takes an action so that the predicted reward is maximized. The problem reduces to constructing confidence sets for the vector of coefficients of the linear function based on the action-reward pairs observed in the past time steps. The linear bandit problem was first studied by Auer et al. (2002) [1] under the name of linear reinforcement learning. Since the introduction of the problem, several works have improved the analysis and explored variants of the problem. The most influential works include Dani et al. (2008) [2], Rusmevichientong et al. (2010) [3], and Abbasi et al. (2011) [4]. In each of these works the set of available arms remains constant, but the set is only restricted to being a bounded subset of a finite-dimensional vector space. Variants of the problem formulation have also been widely applied to recommendation systems following the work of Li et al. (2010) [5] within the context of web advertisement. An important property of this problem is that the arms are not independent because future arm choices depend on the confidence sets constructed from past choices. In the literature, several works including [5] have failed to recognize this property leading to faulty analysis. This fine detail requires special care which we explore in depth in Section 2.",
"title": ""
},
{
"docid": "b8b4e582fbcc23a5a72cdaee1edade32",
"text": "In recent years, research into the mining of user check-in behavior for point-of-interest (POI) recommendations has attracted a lot of attention. Existing studies on this topic mainly treat such recommendations in a traditional manner—that is, they treat POIs as items and check-ins as ratings. However, users usually visit a place for reasons other than to simply say that they have visited. In this article, we propose an approach referred to as Urban POI-Walk (UPOI-Walk), which takes into account a user's social-triggered intentions (SI), preference-triggered intentions (PreI), and popularity-triggered intentions (PopI), to estimate the probability of a user checking-in to a POI. The core idea of UPOI-Walk involves building a HITS-based random walk on the normalized check-in network, thus supporting the prediction of POI properties related to each user's preferences. To achieve this goal, we define several user--POI graphs to capture the key properties of the check-in behavior motivated by user intentions. In our UPOI-Walk approach, we propose a new kind of random walk model—Dynamic HITS-based Random Walk—which comprehensively considers the relevance between POIs and users from different aspects. On the basis of similitude, we make an online recommendation as to the POI the user intends to visit. To the best of our knowledge, this is the first work on urban POI recommendations that considers user check-in behavior motivated by SI, PreI, and PopI in location-based social network data. Through comprehensive experimental evaluations on two real datasets, the proposed UPOI-Walk is shown to deliver excellent performance.",
"title": ""
},
{
"docid": "1302963869cdcb958a331838786c51de",
"text": "Introduction: Benefits from mental health early interventions may not be sustained over time, and longer-term intervention programs may be required to maintain early clinical gains. However, due to the high intensity of face-to-face early intervention treatments, this may not be feasible. Adjunctive internet-based interventions specifically designed for youth may provide a cost-effective and engaging alternative to prevent loss of intervention benefits. However, until now online interventions have relied on human moderators to deliver therapeutic content. More sophisticated models responsive to user data are critical to inform tailored online therapy. Thus, integration of user experience with a sophisticated and cutting-edge technology to deliver content is necessary to redefine online interventions in youth mental health. This paper discusses the development of the moderated online social therapy (MOST) web application, which provides an interactive social media-based platform for recovery in mental health. We provide an overview of the system's main features and discus our current work regarding the incorporation of advanced computational and artificial intelligence methods to enhance user engagement and improve the discovery and delivery of therapy content. Methods: Our case study is the ongoing Horyzons site (5-year randomized controlled trial for youth recovering from early psychosis), which is powered by MOST. We outline the motivation underlying the project and the web application's foundational features and interface. We discuss system innovations, including the incorporation of pertinent usage patterns as well as identifying certain limitations of the system. This leads to our current motivations and focus on using computational and artificial intelligence methods to enhance user engagement, and to further improve the system with novel mechanisms for the delivery of therapy content to users. In particular, we cover our usage of natural language analysis and chatbot technologies as strategies to tailor interventions and scale up the system. Conclusions: To date, the innovative MOST system has demonstrated viability in a series of clinical research trials. Given the data-driven opportunities afforded by the software system, observed usage patterns, and the aim to deploy it on a greater scale, an important next step in its evolution is the incorporation of advanced and automated content delivery mechanisms.",
"title": ""
},
{
"docid": "bedf1cc302c4ca05dc8371c29d396169",
"text": "We propose Mixcoin, a protocol to facilitate anonymous payments using the Bitcoin currency system. We build on the emergent phenomenon of currency mixes, adding an accountability mechanism to expose theft. Unlike other proposals to improve anonymity in Bitcoin, our scheme can be deployed immediately with no changes to Bitcoin itself. We demonstrate that incentives of mixes and clients can be aligned to ensure that rational mixes will not steal from clients. We contrast mixing for financial anonymity with better-studied communication mixes, demonstrating important and subtle new attacks.",
"title": ""
},
{
"docid": "b3212385bb7e4650833814e108ea2591",
"text": "Credit scoring has been widely investigated in the area of finance, in general, and banking sectors, in particular. Recently, genetic programming (GP) has attracted attention in both academic and empirical fields, especially for credit problems. The primary aim of this paper is to investigate the ability of GP, which was proposed as an extension of genetic algorithms and was inspired by the Darwinian evolution theory, in the analysis of credit scoring models in Egyptian public sector banks. The secondary aim is to compare GP with probit analysis (PA), a successful alternative to logistic regression, and weight of evidence (WOE) measure, the later a neglected technique in published research. Two evaluation criteria are used in this paper, namely, average correct classification (ACC) rate criterion and estimated misclassification cost (EMC) criterion with different misclassification cost (MC) ratios, in order to evaluate the capabilities of the credit scoring models. Results so far revealed that GP has the highest ACC rate and the lowest EMC. However, surprisingly, there is a clear rule for the WOE measure under EMC with higher MC ratios. In addition, an analysis of the dataset using Kohonen maps is undertaken to provide additional visual insights into cluster groupings. 2009 Elsevier Ltd. All rights reserved.",
"title": ""
},
{
"docid": "d8ec0c507217500a97c1664c33b2fe72",
"text": "To realize ideal force control of robots that interact with a human, a very precise actuating system with zero impedance is desired. For such applications, a rotary series elastic actuator (RSEA) has been introduced recently. This paper presents the design of RSEA and the associated control algorithms. To generate joint torque as desired, a torsional spring is installed between a motor and a human joint, and the motor is controlled to produce a proper spring deflection for torque generation. When the desired torque is zero, the motor must follow the human joint motion, which requires that the friction and the inertia of the motor be compensated. The human joint and the body part impose the load on the RSEA. They interact with uncertain environments and their physical properties vary with time. In this paper, the disturbance observer (DOB) method is applied to make the RSEA precisely generate the desired torque under such time-varying conditions. Based on the nominal model preserved by the DOB, feedback and feedforward controllers are optimally designed for the desired performance, i.e., the RSEA: (1) exhibits very low impedance and (2) generates the desired torque precisely while interacting with a human. The effectiveness of the proposed design is verified by experiments.",
"title": ""
},
{
"docid": "7a417c3fe0a93656f5628463d9c425e7",
"text": "Given a finite range space Σ = (X, R), with N = |X| + |R|, we present two simple algorithms, based on the multiplicative-weight method, for computing a small-size hitting set or set cover of Σ. The first algorithm is a simpler variant of the Brönnimann-Goodrich algorithm but more efficient to implement, and the second algorithm can be viewed as solving a two-player zero-sum game. These algorithms, in conjunction with some standard geometric data structures, lead to near-linear algorithms for computing a small-size hitting set or set cover for a number of geometric range spaces. For example, they lead to O(N polylog(N)) expected-time randomized O(1)-approximation algorithms for both hitting set and set cover if X is a set of points and ℜ a set of disks in R2.",
"title": ""
}
] | scidocsrr |
c61892af028821cb937dc665b87d87da | Voice activity detection based on multiple statistical models | [
{
"docid": "65d60131b1ceba50399ceffa52de7e8a",
"text": "Cox, Matthew L. Miller, and Jeffrey A. Bloom. San Diego, CA: Academic Press, 2002, 576 pp. $69.96 (hardbound). A key ingredient to copyright protection, digital watermarking provides a solution to the illegal copying of material. It also has broader uses in recording and electronic transaction tracking. This book explains “the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.” [book notes] The authors are extensively experienced in digital watermarking technologies. Cox recently joined the NEC Research Institute after a five-year stint at AT&T Bell Labs. Miller’s interest began at AT&T Bell Labs in 1979. He also is employed at NEC. Bloom is a researcher in digital watermarking at the Sarnoff Corporation. His acquaintance with the field began at Signafy, Inc. and continued through his employment at NEC Research Institute. The book features the following: Review of the underlying principles of watermarking relevant for image, video, and audio; Discussion of a wide variety of applications, theoretical principles, detection and embedding concepts, and key properties; Examination of copyright protection and other applications; Presentation of a series of detailed examples that illustrate watermarking concepts and practices; Appendix, in print and on the Web, containing the source code for the examples; Comprehensive glossary of terms. “The authors provide a comprehensive overview of digital watermarking, rife with detailed examples and grounded within strong theoretical framework. Digital Watermarking will serve as a valuable introduction as well as a useful reference for those engaged in the field.”—Walter Bender, Director, M.I.T. Media Lab",
"title": ""
}
] | [
{
"docid": "c3d996f92a724d2b4ec7398a0312859d",
"text": "A central problem in swarm robotics is to design a controller that will allow the member robots of the swarm to collectively perform a given task. Of particular interest in massively distributed applications are reactive controllers with severely limited computational and sensory abilities. In this article, we give the results of the first computational complexity analysis of the reactive swarm design problem. Our core results are derived relative to a generalization of what is arguably the simplest possible type of reactive controller, the so-called computation-free controller proposed by Gauci et al., which operates in grid-based environments in a noncontinuous manner. We show that the design of a generalized computation-free swarm for an arbitrary given task in an arbitrary given environment is not polynomial-time solvable either in general or by the most desirable types of approximation algorithms (including evolutionary algorithms with high probabilities of producing correct solutions) but is solvable in effectively polynomial time relative to several types of restrictions on swarms, environments, and tasks. All of our results hold for the design of several more complex types of generalized computation-free swarms. Moreover, all of our intractability and inapproximability results hold for the design of any type of reactive swarm (including those based on the popular feed-forward neural network and Brooks-style subsumption controllers) operating in grid-based environments in a noncontinuous manner whose member robots satisfy two simple conditions. As such, our results give the first theoretical survey of the types of efficient exact and approximate solution algorithms that are and are not possible for designing several types of reactive swarms.",
"title": ""
},
{
"docid": "d041b33794a14d07b68b907d38f29181",
"text": "This work presents a scalable data access layer, called PyEHR, designed to support the implementation of data management systems for secondary use of structured heterogeneous biomedical and clinical data. PyEHR adopts the openEHR's formalisms to guarantee the decoupling of data descriptions from implementation details and exploits structure indexing to accelerate searches. Data persistence is guaranteed by a driver layer with a common driver interface. Interfaces for two NoSQL Database Management Systems are already implemented: MongoDB and Elasticsearch. We evaluated the scalability of PyEHR experimentally through two types of tests, called \"Constant Load\" and \"Constant Number of Records\", with queries of increasing complexity on synthetic datasets of ten million records each, containing very complex openEHR archetype structures, distributed on up to ten computing nodes.",
"title": ""
},
{
"docid": "bddec3337cfbc17412b042b58e1cdfeb",
"text": "Business organisations are constantly looking for ways to gain an advantage over their competitors (Beyleveld & Schurink, 2005; Castaneda & Toulson, 2013). Historically, their focus was on producing as much as possible without considering exact demand (Turner & Chung, 2005). Recently, businesses have embarked upon finding more efficient ways to deal with large turnovers (Umble, Haft & Umble, 2003). One way of achieving this is by employing an Enterprise Resource Planning (ERP) system. An ERP system is a mandatory, integrated, customised, packaged software-based system that handles most of the system requirements in all business operational functions such as finance, human resources, manufacturing, sales and marketing (Wua, Onga & Hsub, 2008). Although expectations from ERP systems are high, these systems have not always led to significant organisational enhancement (Soh, Kien & Tay-Yap, 2000) and most ERP projects turn out to be over budget, not on time and unsuccessful (Abugabah & Sanzogni, 2010; Hong & Kim, 2002; Kumar, Maheshwari & Kumar, 2003).",
"title": ""
},
{
"docid": "94a2cd3e147d48fac77a2063a82a5981",
"text": "Multiview learning has shown promising potential in many applications. However, most techniques are focused on either view consistency, or view diversity. In this paper, we introduce a novel multiview boosting algorithm, called Boost.SH, that computes weak classifiers independently of each view but uses a shared weight distribution to propagate information among the multiple views to ensure consistency. To encourage diversity, we introduce randomized Boost.SH and show its convergence to the greedy Boost.SH solution in the sense of minimizing regret using the framework of adversarial multiarmed bandits. We also introduce a variant of Boost.SH that combines decisions from multiple experts for recommending views for classification. We propose an expert strategy for multiview learning based on inverse variance, which explores both consistency and diversity. Experiments on biometric recognition, document categorization, multilingual text, and yeast genomic multiview data sets demonstrate the advantage of Boost.SH (85%) compared with other boosting algorithms like AdaBoost (82%) using concatenated views and substantially better than a multiview kernel learning algorithm (74%).",
"title": ""
},
{
"docid": "5e8bec98eb2edd9acdf2ee5ba713c647",
"text": "In this paper we present a sensor-based table tennis stroke detection and classification system. We attached inertial sensors to table tennis rackets and collected data of 8 different basic stroke types from 10 amateur and professional players. Firstly, single strokes were detected by a event detection algorithm. Secondly, features were computed and used as input for stroke type classification. Multiple classifiers were compared regarding classification rates and computational effort. The overall sensitivity of the stroke detection was 95.7% and the best classifier reached a classification rate of 96.7%. Therefore, our presented approach is able to detect table tennis strokes in time-series data and to classify each stroke into correct stroke type categories. The system has the potential to be implemented as an embedded real-time application for other racket sports, to analyze training exercises and competitions, to present match statistics or to support the athletes' training progress. To our knowledge, this is the first paper that addresses a wearable support system for table tennis, and our future work aims at using the presented results to build a complete match analysis system for this sport.",
"title": ""
},
{
"docid": "e808606994c3fd8eea1b78e8a3e55b8c",
"text": "We describe a Japanese-English patent parallel corpus created from the Japanese and US patent data provided for the NTCIR-6 patent retrieval task. The corpus contains about 2 million sentence pairs that were aligned automatically. This is the largest Japanese-English parallel corpus, which will be available to the public after the 7th NTCIR workshop meeting. We estimated that about 97% of the sentence pairs were correct alignments and about 90% of the alignments were adequate translations whose English sentences reflected almost perfectly the contents of the corresponding Japanese sentences.",
"title": ""
},
{
"docid": "9ed9d31cfbcdc0692af2b9fb2bd50f8f",
"text": "This paper presents results of our experiments using the Ubuntu Dialog Corpus – the largest publicly available multi-turn dialog corpus. First, we use an in-house implementation of previously reported models to do an independent evaluation using the same data. Second, we evaluate the performances of various LSTMs, Bi-LSTMs and CNNs on the dataset. Third, we create an ensemble by averaging predictions of multiple models. The ensemble further improves the performance and it achieves a state-of-the-art result for this dataset. Finally, we discuss our future plans using this corpus.",
"title": ""
},
{
"docid": "23e5520226bc76f67d0a1e9ef98a4bb2",
"text": "This report analyzes the modelling of default intensities and probabilities in single-firm reduced-form models, and reviews the three main approaches to incorporating default dependencies within the framework of reduced models. The first approach, the conditionally independent defaults (CID), introduces credit risk dependence between firms through the dependence of the firms’ intensity processes on a common set of state variables. Contagion models extend the CID approach to account for the empirical observation of default clustering. There exist periods in which the firms’ credit risk is increased and in which the majority of the defaults take place. Finally, default dependencies can also be accounted for using copula functions. The copula approach takes as given the marginal default probabilities of the different firms and plugs them into a copula function, which provides the model with the default dependence structure. After a description of copulas, we present two different approaches of using copula functions in intensity models, and discuss the issues of the choice and calibration of the copula function. ∗This report is a revised version of the Master’s Thesis presented in partial fulfillment of the 2002-2003 MSc in Financial Mathematics at King’s College London. I thank my supervisor Lane P. Hughston and everyone at the Financial Mathematics Group at King’s College, particularly Giulia Iori and Mihail Zervos. Financial support by Banco de España is gratefully acknowledged. Any errors are the exclusive responsibility of the author. CEMFI, Casado del Alisal 5, 28014 Madrid, Spain. Email: elizalde@cemfi.es.",
"title": ""
},
{
"docid": "dde4e45fd477808d40b3b06599d361ff",
"text": "In this paper, we present the basic features of the flight control of the SkySails towing kite system. After introducing the coordinate definitions and the basic system dynamics, we introduce a novel model used for controller design and justify its main dynamics with results from system identification based on numerous sea trials. We then present the controller design, which we successfully use for operational flights for several years. Finally, we explain the generation of dynamical flight patterns.",
"title": ""
},
{
"docid": "f00f90e140a534d2e6621f914aeedf38",
"text": "This paper presents the development and hardware implementation of an autonomous battery maintenance mechatronic system that significantly extends the operational time of battery powered small-scaled unmanned aerial vehicles (UAVs). A simultaneous change and charge approach is used to overcome the significant downtime experienced by existing charge-only approaches. The automated system quickly swaps a depleted battery of a UAV with a replenished one while simultaneously recharging several other batteries. This results in a battery maintenance system with low UAV downtime, arbitrarily extensible operation time, and a compact footprint. Hence, the system can enable multi-agent UAV missions that require persistent presence. This capability is illustrated by developing and testing in flight a centralized autonomous planning and learning algorithm that incorporates a probabilistic health model dependent on vehicle battery health that is updated during the mission, and replans to improve the performance based on the improved model. Flight test results are presented for a 3-h-long persistent mission with three UAVs that each has an endurance of 8-10 min on a single battery charge (more than 100 battery swaps).",
"title": ""
},
{
"docid": "a74fc2476ec43b07eccfe2be1c9ef2cb",
"text": "In this paper, a broadband high efficiency Class-AB balanced power amplifier (PA) is presented. The proposed PA offers a high efficiency of > 43% for a band of 400 MHz to 1.4 GHz. The broadband matching circuits were realized with microstrip-radial-stubs (MRS) on low loss Rogers 5880 substrate with 0.78 mm thickness and 2.2 dielectric constant. The input and output matching is better than −13 dB throughout the band. The PA delivers maximum output power of 41.5 dBm with a flat gain of 11.4–13.5 dB. Due to high gain, stability, efficiency, and broadband, the proposed PA is thus suitable for recent and upcoming wireless communication systems.",
"title": ""
},
{
"docid": "0fbfef6397501afb4de31d8836b71108",
"text": "Information extraction (IE) from text has largely focused on relations between individual entities, such as who has won which award. However, some facts are never fully mentioned, and no IE method has perfect recall. Thus, it is beneficial to also tap contents about the cardinalities of these relations, for example, how many awards someone has won. We introduce this novel problem of extracting cardinalities and discusses the specific challenges that set it apart from standard IE. We present a distant supervision method using conditional random fields. A preliminary evaluation results in precision between 3% and 55%, depending on the difficulty of relations.",
"title": ""
},
{
"docid": "47d278d37dfd3ab6c0b64dd94eb2de6c",
"text": "We present a novel approach for multi-object tracking which considers object detection and spacetime trajectory estimation as a coupled optimization problem. It is formulated in a hypothesis selection framework and builds upon a state-of-the-art pedestrian detector. At each time instant, it searches for the globally optimal set of spacetime trajectories which provides the best explanation for the current image and for all evidence collected so far, while satisfying the constraints that no two objects may occupy the same physical space, nor explain the same image pixels at any point in time. Successful trajectory hypotheses are fed back to guide object detection in future frames. The optimization procedure is kept efficient through incremental computation and conservative hypothesis pruning. The resulting approach can initialize automatically and track a large and varying number of persons over long periods and through complex scenes with clutter, occlusions, and large-scale background changes. Also, the global optimization framework allows our system to recover from mismatches and temporarily lost tracks. We demonstrate the feasibility of the proposed approach on several challenging video sequences.",
"title": ""
},
{
"docid": "8973bdabc6f716865ce55cc7475e2b91",
"text": "Branchio-oculo-facial syndrome (BOFS) is a rare, autosomal dominant disorder. It is characterized by distinct craniofacial abnormalities including abnormal location of the ears, aplastic cervical skin lesions, malformed auricles, conductive hearing loss, ocular abnormalities, and cleft lip and palate. Herein, we describe a case of BOFS with persistent aplasia cutis of the neck in a 5-year-old girl.",
"title": ""
},
{
"docid": "8fb6794fbcad3ba69a0fd7fea7a5628d",
"text": "Ajay Kalra • Mengze Shi • Kannan Srinivasan Graduate School of Industrial Administration, Carnegie Mellon University, Pittsburgh, Pennsylvania 15213 Rotman School of Management, University of Toronto, Toronto, Ontario, Canada M5S 3G4 Graduate School of Industrial Administration, Carnegie Mellon University, Pittsburgh, Pennsylvania 15213 kalra@andrew.cmu.edu • mshi@rotman.utoronto.ca • kannans@andrew.cmu.edu",
"title": ""
},
{
"docid": "09baf9c55e7ae35bdcf88742ecdc01d5",
"text": "This paper presents the experimental evaluation of a Bluetooth-based positioning system. The method has been implemented in a Bluetooth-capable handheld device. Empirical tests of the developed considered positioning system have been realized in different indoor scenarios. The range estimation of the positioning system is based on an approximation of the relation between the RSSI (Radio Signal Strength Indicator) and the associated distance between sender and receiver. The actual location estimation is carried out by using the triangulation method. The implementation of the positioning system in a PDA (Personal Digital Assistant) has been realized by using the Software Microsoft eMbedded Visual C++ Version 3.0.",
"title": ""
},
{
"docid": "5d2ab1a4f28aa9286a3ef19c2c822af1",
"text": "Stray current control is essential in direct current (DC) mass transit systems where the rail insulation is not of sufficient quality to prevent a corrosion risk to the rails, supporting and third-party infrastructure. This paper details the principles behind the need for stray current control and examines the relationship between the stray current collection system design and its efficiency. The use of floating return rails is shown to provide a reduction in stray current level in comparison to a grounded system, significantly reducing the corrosion level of the traction system running rails. An increase in conductivity of the stray current collection system or a reduction in the soil resistivity surrounding the traction system is shown to decrease the corrosion risk to the supporting and third party infrastructure.",
"title": ""
},
{
"docid": "28f6751a043201fd8313944b4f79101f",
"text": "FLLL 2 Preface This is a printed collection of the contents of the lecture \" Genetic Algorithms: Theory and Applications \" which I gave first in the winter semester 1999/2000 at the Johannes Kepler University in Linz. The reader should be aware that this manuscript is subject to further reconsideration and improvement. Corrections, complaints, and suggestions are cordially welcome. The sources were manifold: Chapters 1 and 2 were written originally for these lecture notes. All examples were implemented from scratch. The third chapter is a distillation of the books of Goldberg [13] and Hoffmann [15] and a handwritten manuscript of the preceding lecture on genetic algorithms which was given by Andreas Stöckl in 1993 at the Johannes Kepler University. Chapters 4, 5, and 7 contain recent adaptations of previously published material from my own master thesis and a series of lectures which was given by Francisco Herrera and myself at the Second Summer School on Advanced Control at the Slovak Technical University, Bratislava, in summer 1997 [4]. Chapter 6 was written originally, however, strongly influenced by A. Geyer-Schulz's works and H. Hörner's paper on his C++ GP kernel [18]. I would like to thank all the students attending the first GA lecture in Winter 1999/2000, for remaining loyal throughout the whole term and for contributing much to these lecture notes with their vivid, interesting, and stimulating questions, objections, and discussions. Last but not least, I want to express my sincere gratitude to Sabine Lumpi and Susanne Saminger for support in organizational matters, and Pe-ter Bauer for proofreading .",
"title": ""
},
{
"docid": "3bd927d30caf4aac1303b3115688949a",
"text": "Eryptosis, the suicidal death of erythrocytes, is characterised by cell shrinkage, membrane blebbing and cell membrane phospholipid scrambling with phosphatidylserine exposure at the cell surface. Phosphatidylserine-exposing erythrocytes are recognised by macrophages, which engulf and degrade the affected cells. Reported triggers of eryptosis include osmotic shock, oxidative stress, energy depletion, ceramide, prostaglandin E(2), platelet activating factor, hemolysin, listeriolysin, paclitaxel, chlorpromazine, cyclosporine, methylglyoxal, amyloid peptides, anandamide, Bay-5884, curcumin, valinomycin, aluminium, mercury, lead and copper. Diseases associated with accelerated eryptosis include sepsis, malaria, sickle-cell anemia, beta-thalassemia, glucose-6-phosphate dehydrogenase (G6PD)-deficiency, phosphate depletion, iron deficiency, hemolytic uremic syndrome and Wilsons disease. Eryptosis may be inhibited by erythropoietin, adenosine, catecholamines, nitric oxide (NO) and activation of G-kinase. Most triggers of eryptosis except oxidative stress are effective without activation of caspases. Their signalling involves formation of prostaglandin E(2) with subsequent activation of cation channels and Ca2+ entry and/or release of platelet activating factor (PAF) with subsequent activation of sphingomyelinase and formation of ceramide. Ca2+ and ceramide stimulate scrambling of the cell membrane. Ca2+ further activates Ca2+-sensitive K+ channels leading to cellular KCl loss and cell shrinkage and stimulates the protease calpain resulting in degradation of the cytoskeleton. Eryptosis allows defective erythrocytes to escape hemolysis. On the other hand, excessive eryptosis favours the development of anemia. Thus, a delicate balance between proeryptotic and antieryptotic mechanisms is required to maintain an adequate number of circulating erythrocytes and yet avoid noneryptotic death of injured erythrocytes.",
"title": ""
},
{
"docid": "bfee1553c6207909abc9820e741d6e01",
"text": "Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic technique that integrates data encryption with access control for ensuring data security in IoT systems. However, the efficiency problem of CP-ABE is still a bottleneck limiting its development and application. A widespread consensus is that the computation overhead of bilinear pairing is excessive in the practical application of ABE, especially for the devices or the processors with limited computational resources and power supply. In this paper, we proposed a novel pairing-free data access control scheme based on CP-ABE using elliptic curve cryptography, abbreviated PF-CP-ABE. We replace complicated bilinear pairing with simple scalar multiplication on elliptic curves, thereby reducing the overall computation overhead. And we designed a new way of key distribution that it can directly revoke a user or an attribute without updating other users’ keys during the attribute revocation phase. Besides, our scheme use linear secret sharing scheme access structure to enhance the expressiveness of the access policy. The security and performance analysis show that our scheme significantly improved the overall efficiency as well as ensured the security.",
"title": ""
}
] | scidocsrr |
d1fed528c5a08bb4995f74ffe1391fa8 | Structure and function of auditory cortex: music and speech | [
{
"docid": "a411780d406e8b720303d18cd6c9df68",
"text": "Functional organization of the lateral temporal cortex in humans is not well understood. We recorded blood oxygenation signals from the temporal lobes of normal volunteers using functional magnetic resonance imaging during stimulation with unstructured noise, frequency-modulated (FM) tones, reversed speech, pseudowords and words. For all conditions, subjects performed a material-nonspecific detection response when a train of stimuli began or ceased. Dorsal areas surrounding Heschl's gyrus bilaterally, particularly the planum temporale and dorsolateral superior temporal gyrus, were more strongly activated by FM tones than by noise, suggesting a role in processing simple temporally encoded auditory information. Distinct from these dorsolateral areas, regions centered in the superior temporal sulcus bilaterally were more activated by speech stimuli than by FM tones. Identical results were obtained in this region using words, pseudowords and reversed speech, suggesting that the speech-tones activation difference is due to acoustic rather than linguistic factors. In contrast, previous comparisons between word and nonword speech sounds showed left-lateralized activation differences in more ventral temporal and temporoparietal regions that are likely involved in processing lexical-semantic or syntactic information associated with words. The results indicate functional subdivision of the human lateral temporal cortex and provide a preliminary framework for understanding the cortical processing of speech sounds.",
"title": ""
}
] | [
{
"docid": "a24b4546eb2da7ce6ce70f45cd16e07d",
"text": "This paper examines the state of the art in mobile clinical and health-related apps. A 2012 estimate puts the number of health-related apps at no fewer than 40,000, as healthcare professionals and consumers continue to express concerns about the quality of many apps, calling for some form of app regulatory control or certification to be put in place. We describe the range of apps on offer as of 2013, and then present a brief survey of evaluation studies of medical and health-related apps that have been conducted to date, covering a range of clinical disciplines and topics. Our survey includes studies that highlighted risks, negative issues and worrying deficiencies in existing apps. We discuss the concept of 'apps as a medical device' and the relevant regulatory controls that apply in USA and Europe, offering examples of apps that have been formally approved using these mechanisms. We describe the online Health Apps Library run by the National Health Service in England and the calls for a vetted medical and health app store. We discuss the ingredients for successful apps beyond the rather narrow definition of 'apps as a medical device'. These ingredients cover app content quality, usability, the need to match apps to consumers' general and health literacy levels, device connectivity standards (for apps that connect to glucometers, blood pressure monitors, etc.), as well as app security and user privacy. 'Happtique Health App Certification Program' (HACP), a voluntary app certification scheme, successfully captures most of these desiderata, but is solely focused on apps targeting the US market. HACP, while very welcome, is in ways reminiscent of the early days of the Web, when many \"similar\" quality benchmarking tools and codes of conduct for information publishers were proposed to appraise and rate online medical and health information. It is probably impossible to rate and police every app on offer today, much like in those early days of the Web, when people quickly realised the same regarding informational Web pages. The best first line of defence was, is, and will always be to educate consumers regarding the potentially harmful content of (some) apps.",
"title": ""
},
{
"docid": "6d1f374686b98106ab4221066607721b",
"text": "How does one instigate a scientific revolution, or more modestly, a shift of scientific paradigm? This must have been on the minds of the organizers of the two conferences \"The Economy as an Evolving Complex System, I and II\" and the research program in economics at the Santa Fe Institute documented in the present volume and its predecessor of ten years ago.(1) Their strategy might be reconstructed as follows. First, the stranglehold of neoclassical economics on the Anglo-Saxon academic community since World War II is at least partly due to the ascendancy of mathematical rigor as the touchstone of serious economic theorizing. Thus if one could beat the prevailing paradigm at its own game one would immediately have a better footing in the community than the heretics, mostly from the left or one of the variousìnstitu-tional' camps, who had been sniping at it from the sidelines all the while but were never above the suspicion of not being mathematically up to comprehending it in the first place. Second, one could enlist both prominent representatives and path-breaking methods from the natural sciences to legitimize the introduction of (to economists) fresh and in some ways disturbing approaches to the subject. This was particularly the tack taken in 1987, where roughly equal numbers of scientists and economists were brought together in an extensive brain storming session. Physics has always been the role model for other aspiring`hard' sciences, and physicists seem to have succeeded in institutional-izing a `permanent revolution' in their own methodology , i.e., they are relatively less dogmatic and willing to be more eclectic in the interests of getting results. The fact that, with the exception of a brief chapter by Philip Anderson in the present volume, physicists as representatives of their discipline are no longer present, presumably indicates that their services can now be dispensed with in this enterprise.(2) Finally, one should sponsor research of the highest caliber, always laudable in itself, and make judicious use of key personalities. Care should also be taken that the work is of a form and style which, rather than explicitly provoking the profession, makes it appear as if it were the natural generalization of previous mainstream research and thus reasonably amenable to inclusion in the canon. This while tacitly encouraging and profiting from a wave of publicity in the popular media , a difficult line to tread if one does not want to appear …",
"title": ""
},
{
"docid": "e0c71e449f4c155a993ae04ece4bc822",
"text": "This paper shows how one can directly apply natural language processing (NLP) methods to classification problems in cheminformatics. Connection between these seemingly separate fields is shown by considering standard textual representation of compound, SMILES. The problem of activity prediction against a target protein is considered, which is a crucial part of computer aided drug design process. Conducted experiments show that this way one can not only outrank state of the art results of hand crafted representations but also gets direct structural insights into the way decisions are made.",
"title": ""
},
{
"docid": "f4b6f3b281a420999b60b38c245113a6",
"text": "There is growing interest in using intranasal oxytocin (OT) to treat social dysfunction in schizophrenia and bipolar disorders (i.e., psychotic disorders). While OT treatment results have been mixed, emerging evidence suggests that OT system dysfunction may also play a role in the etiology of metabolic syndrome (MetS), which appears in one-third of individuals with psychotic disorders and associated with increased mortality. Here we examine the evidence for a potential role of the OT system in the shared risk for MetS and psychotic disorders, and its prospects for ameliorating MetS. Using several studies to demonstrate the overlapping neurobiological profiles of metabolic risk factors and psychiatric symptoms, we show that OT system dysfunction may be one common mechanism underlying MetS and psychotic disorders. Given the critical need to better understand metabolic dysregulation in these disorders, future OT trials assessing behavioural and cognitive outcomes should additionally include metabolic risk factor parameters.",
"title": ""
},
{
"docid": "8612b5e8f00fd8469ba87f1514b69fd0",
"text": "Online gaming is one of the most profitable businesses on the Internet. Among various threats to continuous player subscriptions, network lags are particularly notorious. It is widely known that frequent and long lags frustrate game players, but whether the players actually take action and leave a game is unclear. Motivated to answer this question, we apply survival analysis to a 1, 356-million-packet trace from a sizeable MMORPG, called ShenZhou Online. We find that both network delay and network loss significantly affect a player’s willingness to continue a game. For ShenZhou Online, the degrees of player “intolerance” of minimum RTT, RTT jitter, client loss rate, and server loss rate are in the proportion of 1:2:11:6. This indicates that 1) while many network games provide “ping time,” i.e., the RTT, to players to facilitate server selection, it would be more useful to provide information about delay jitters; and 2) players are much less tolerant of network loss than delay. This is due to the game designer’s decision to transfer data in TCP, where packet loss not only results in additional packet delays due to in-order delivery and retransmission, but also a lower sending rate.",
"title": ""
},
{
"docid": "63663dbc320556f7de09b5060f3815a6",
"text": "There has been a long history of applying AI technologies to address software engineering problems especially on tool automation. On the other hand, given the increasing importance and popularity of AI software, recent research efforts have been on exploring software engineering solutions to improve the productivity of developing AI software and the dependability of AI software. The emerging field of intelligent software engineering is to focus on two aspects: (1) instilling intelligence in solutions for software engineering problems; (2) providing software engineering solutions for intelligent software. This extended abstract shares perspectives on these two aspects of intelligent software engineering.",
"title": ""
},
{
"docid": "ddc56e9f2cbe9c086089870ccec7e510",
"text": "Serotonin is an ancient monoamine neurotransmitter, biochemically derived from tryptophan. It is most abundant in the gastrointestinal tract, but is also present throughout the rest of the body of animals and can even be found in plants and fungi. Serotonin is especially famous for its contributions to feelings of well-being and happiness. More specifically it is involved in learning and memory processes and is hence crucial for certain behaviors throughout the animal kingdom. This brief review will focus on the metabolism, biological role and mode-of-action of serotonin in insects. First, some general aspects of biosynthesis and break-down of serotonin in insects will be discussed, followed by an overview of the functions of serotonin, serotonin receptors and their pharmacology. Throughout this review comparisons are made with the vertebrate serotonergic system. Last but not least, possible applications of pharmacological adjustments of serotonin signaling in insects are discussed.",
"title": ""
},
{
"docid": "83aa2a89f8ecae6a84134a2736a5bb22",
"text": "The activity of dozens of simultaneously recorded neurons can be used to control the movement of a robotic arm or a cursor on a computer screen. This motor neural prosthetic technology has spurred an increased interest in the algorithms by which motor intention can be inferred. The simplest of these algorithms is the population vector algorithm (PVA), where the activity of each cell is used to weight a vector pointing in that neuron's preferred direction. Off-line, it is possible to show that more complicated algorithms, such as the optimal linear estimator (OLE), can yield substantial improvements in the accuracy of reconstructed hand movements over the PVA. We call this open-loop performance. In contrast, this performance difference may not be present in closed-loop, on-line control. The obvious difference between open and closed-loop control is the ability to adapt to the specifics of the decoder in use at the time. In order to predict performance gains that an algorithm may yield in closed-loop control, it is necessary to build a model that captures aspects of this adaptation process. Here we present a framework for modeling the closed-loop performance of the PVA and the OLE. Using both simulations and experiments, we show that (1) the performance gain with certain decoders can be far less extreme than predicted by off-line results, (2) that subjects are able to compensate for certain types of bias in decoders, and (3) that care must be taken to ensure that estimation error does not degrade the performance of theoretically optimal decoders.",
"title": ""
},
{
"docid": "7d8884a7f6137068f8ede464cf63da5b",
"text": "Object detection and localization is a crucial step for inspection and manipulation tasks in robotic and industrial applications. We present an object detection and localization scheme for 3D objects that combines intensity and depth data. A novel multimodal, scale- and rotation-invariant feature is used to simultaneously describe the object's silhouette and surface appearance. The object's position is determined by matching scene and model features via a Hough-like local voting scheme. The proposed method is quantitatively and qualitatively evaluated on a large number of real sequences, proving that it is generic and highly robust to occlusions and clutter. Comparisons with state of the art methods demonstrate comparable results and higher robustness with respect to occlusions.",
"title": ""
},
{
"docid": "850becfa308ce7e93fea77673db8ab50",
"text": "Controlled generation of text is of high practical use. Recent efforts have made impressive progress in generating or editing sentences with given textual attributes (e.g., sentiment). This work studies a new practical setting of text content manipulation. Given a structured record, such as (PLAYER: Lebron, POINTS: 20, ASSISTS: 10), and a reference sentence, such as Kobe easily dropped 30 points, we aim to generate a sentence that accurately describes the full content in the record, with the same writing style (e.g., wording, transitions) of the reference. The problem is unsupervised due to lack of parallel data in practice, and is challenging to minimally yet effectively manipulate the text (by rewriting/adding/deleting text portions) to ensure fidelity to the structured content. We derive a dataset from a basketball game report corpus as our testbed, and develop a neural method with unsupervised competing objectives and explicit content coverage constraints. Automatic and human evaluations show superiority of our approach over competitive methods including a strong rule-based baseline and prior approaches designed for style transfer.",
"title": ""
},
{
"docid": "7e127a6f25e932a67f333679b0d99567",
"text": "This paper presents a novel manipulator for human-robot interaction that has low mass and inertia without losing stiffness and payload performance. A lightweight tension amplifying mechanism that increases the joint stiffness in quadratic order is proposed. High stiffness is essential for precise and rapid manipulation, and low mass and inertia are important factors for safety due to low stored kinetic energy. The proposed tension amplifying mechanism was applied to a 1-DOF elbow joint and then extended to a 3-DOF wrist joint. The developed manipulator was analyzed in terms of inertia, stiffness, and strength properties. Its moving part weighs 3.37 kg, and its inertia is 0.57 kg·m2, which is similar to that of a human arm. The stiffness of the developed elbow joint is 1440Nm/rad, which is comparable to that of the joints with rigid components in industrial manipulators. A detailed description of the design is provided, and thorough analysis verifies the performance of the proposed mechanism.",
"title": ""
},
{
"docid": "ff1ed09b9952f9d0b67d6f6bb1cd507a",
"text": "Microblogging websites have emerged to the center of information production and diffusion, on which people can get useful information from other users’ microblog posts. In the era of Big Data, we are overwhelmed by the large amount of microblog posts. To make good use of these informative data, an effective search tool is required specialized for microblog posts. However, it is not trivial to do microblog search due to the following reasons: 1) microblog posts are noisy and time-sensitive rendering general information retrieval models ineffective. 2) Conventional IR models are not designed to consider microblog-specific features. In this paper, we propose to utilize learning to rank model for microblog search. We combine content-based, microblog-specific and temporal features into learning to rank models, which are found to model microblog posts effectively. To study the performance of learning to rank models, we evaluate our models using tweet data set provided by TERC 2011 and TREC 2012 microblogs track with the comparison of three stateof-the-art information retrieval baselines, vector space model, language model, BM25 model. Extensive experimental studies demonstrate the effectiveness of learning to rank models and the usefulness to integrate microblog-specific and temporal information for microblog search task.",
"title": ""
},
{
"docid": "d4a96cc393a3f1ca3bca94a57e07941e",
"text": "With the increasing number of scientific publications, research paper recommendation has become increasingly important for scientists. Most researchers rely on keyword-based search or following citations in other papers, in order to find relevant research articles. And usually they spend a lot of time without getting satisfactory results. This study aims to propose a personalized research paper recommendation system, that facilitate this task by recommending papers based on users' explicit and implicit feedback. The users will be allowed to explicitly specify the papers of interest. In addition, user activities (e.g., viewing abstracts or full-texts) will be analyzed in order to enhance users' profiles. Most of the current research paper recommendation and information retrieval systems use the classical bag-of-words methods, which don't consider the context of the words and the semantic similarity between the articles. This study will use Recurrent Neural Networks (RNNs) to discover continuous and latent semantic features of the papers, in order to improve the recommendation quality. The proposed approach utilizes PubMed so far, since it is frequently used by physicians and scientists, but it can easily incorporate other datasets in the future.",
"title": ""
},
{
"docid": "188c55ef248f7021a66c1f2e05c2fc98",
"text": "The objective of the proposed study is to explore the performance of credit scoring using a two-stage hybrid modeling procedure with artificial neural networks and multivariate adaptive regression splines (MARS). The rationale under the analyses is firstly to use MARS in building the credit scoring model, the obtained significant variables are then served as the input nodes of the neural networks model. To demonstrate the effectiveness and feasibility of the proposed modeling procedure, credit scoring tasks are performed on one bank housing loan dataset using cross-validation approach. As the results reveal, the proposed hybrid approach outperforms the results using discriminant analysis, logistic regression, artificial neural networks and MARS and hence provides an alternative in handling credit scoring tasks. q 2005 Elsevier Ltd. All rights reserved.",
"title": ""
},
{
"docid": "70b6abe2cb82eead9235612c1a1998d7",
"text": "PURPOSE\nThe aim of the study was to investigate white blood cell counts and neutrophil to lymphocyte ratio (NLR) as markers of systemic inflammation in the diagnosis of localized testicular cancer as a malignancy with initially low volume.\n\n\nMATERIALS AND METHODS\nThirty-six patients with localized testicular cancer with a mean age of 34.22±14.89 years and 36 healthy controls with a mean age of 26.67±2.89 years were enrolled in the study. White blood cell counts and NLR were calculated from complete blood cell counts.\n\n\nRESULTS\nWhite blood cell counts and NLR were statistically significantly higher in patients with testicular cancer compared with the control group (p<0.0001 for all).\n\n\nCONCLUSIONS\nBoth white blood cell counts and NLR can be used as a simple test in the diagnosis of testicular cancer besides the well-known accurate serum tumor markers as AFP (alpha fetoprotein), hCG (human chorionic gonadotropin) and LDH (lactate dehydrogenase).",
"title": ""
},
{
"docid": "655413f10d0b99afd15d54d500c9ffb6",
"text": "Herbal medicine (phytomedicine) uses remedies possessing significant pharmacological activity and, consequently, potential adverse effects and drug interactions. The explosion in sales of herbal therapies has brought many products to the marketplace that do not conform to the standards of safety and efficacy that physicians and patients expect. Unfortunately, few surgeons question patients regarding their use of herbal medicines, and 70% of patients do not reveal their use of herbal medicines to their physicians and pharmacists. All surgeons should question patients about the use of the following common herbal remedies, which may increase the risk of bleeding during surgical procedures: feverfew, garlic, ginger, ginkgo, and Asian ginseng. Physicians should exercise caution in prescribing retinoids or advising skin resurfacing in patients using St John's wort, which poses a risk of photosensitivity reaction. Several herbal medicines, such as aloe vera gel, contain pharmacologically active ingredients that may aid in wound healing. Practitioners who wish to recommend herbal medicines to patients should counsel them that products labeled as supplements have not been evaluated by the US Food and Drug Administration and that no guarantee of product quality can be made.",
"title": ""
},
{
"docid": "5c45aa22bb7182259f75260c879f81d6",
"text": "This paper presents an approach to parsing the Manhattan structure of an indoor scene from a single RGBD frame. The problem of recovering the floor plan is recast as an optimal labeling problem which can be solved efficiently using Dynamic Programming.",
"title": ""
},
{
"docid": "0bba0afb68f80afad03d0ba3d1ce9c89",
"text": "The Luneburg lens is an aberration-free lens that focuses light from all directions equally well. We fabricated and tested a Luneburg lens in silicon photonics. Such fully-integrated lenses may become the building blocks of compact Fourier optics on chips. Furthermore, our fabrication technique is sufficiently versatile for making perfect imaging devices on silicon platforms.",
"title": ""
},
{
"docid": "89ed5dc0feb110eb3abc102c4e50acaf",
"text": "Automatic object detection in infrared images is a vital task for many military defense systems. The high detection rate and low false detection rate of this phase directly affect the performance of the following algorithms in the system as well as the general performance of the system. In this work, a fast and robust algorithm is proposed for detection of small and high intensity objects in infrared scenes. Top-hat transformation and mean filter was used to increase the visibility of the objects, and a two-layer thresholding algorithm was introduced to calculate the object sizes more accurately. Finally, small objects extracted by using post processing methods.",
"title": ""
}
] | scidocsrr |
a581bf7dccc5aeda806e48bddd7d5bc4 | Mixed Membership Stochastic Blockmodels | [
{
"docid": "b8f23ec8e704ee1cf9dbe6063a384b09",
"text": "The Dirichlet distribution and its compound variant, the Dirichlet-multinomial, are two of the most basic models for proportional data, such as the mix of vocabulary words in a text document. Yet the maximum-likelihood estimate of these distributions is not available in closed-form. This paper describes simple and efficient iterative schemes for obtaining parameter estimates in these models. In each case, a fixed-point iteration and a Newton-Raphson (or generalized Newton-Raphson) iteration is provided. 1 The Dirichlet distribution The Dirichlet distribution is a model of how proportions vary. Let p denote a random vector whose elements sum to 1, so that pk represents the proportion of item k. Under the Dirichlet model with parameter vector α, the probability density at p is p(p) ∼ D(α1, ..., αK) = Γ( ∑ k αk) ∏ k Γ(αk) ∏ k pk k (1) where pk > 0 (2)",
"title": ""
}
] | [
{
"docid": "51165fba0bc57e99069caca5796398c7",
"text": "Reinforcement learning has achieved several successes in sequential decision problems. However, these methods require a large number of training iterations in complex environments. A standard paradigm to tackle this challenge is to extend reinforcement learning to handle function approximation with deep learning. Lack of interpretability and impossibility to introduce background knowledge limits their usability in many safety-critical real-world scenarios. In this paper, we study how to combine reinforcement learning and external knowledge. We derive a rule-based variant version of the Sarsa(λ) algorithm, which we call Sarsarb(λ), that augments data with complex knowledge and exploits similarities among states. We apply our method to a trading task from the Stock Market Environment. We show that the resulting algorithm leads to much better performance but also improves training speed compared to the Deep Qlearning (DQN) algorithm and the Deep Deterministic Policy Gradients (DDPG) algorithm.",
"title": ""
},
{
"docid": "339aa2d53be2cf1215caa142ad5c58d2",
"text": "A true random number generator (TRNG) is an important component in cryptographic systems. Designing a fast and secure TRNG in an FPGA is a challenging task. In this paper we analyze the TRNG designed by Sunar et al. based on XOR of the outputs of many oscillator rings. We propose an enhanced TRNG that does not require post-processing to pass statistical tests and with better randomness characteristics on the output. We have shown by experiment that the frequencies of the equal length oscillator rings in the TRNG are not identical but different due to the placement of the inverters in the FPGA. We have implemented our proposed TRNG in an Altera Cyclone II FPGA. Our implementation has passed the NIST and DIEHARD statistical tests with a throughput of 100 Mbps and with a usage of less than 100 logic elements in the FPGA.",
"title": ""
},
{
"docid": "a1bf728c54cec3f621a54ed23a623300",
"text": "Machine learning algorithms are now common in the state-ofthe-art spoken language understanding models. But to reach good performance they must be trained on a potentially large amount of data which are not available for a variety of tasks and languages of interest. In this work, we present a novel zero-shot learning method, based on word embeddings, allowing to derive a full semantic parser for spoken language understanding. No annotated in-context data are needed, the ontological description of the target domain and generic word embedding features (learned from freely available general domain data) suffice to derive the model. Two versions are studied with respect to how the model parameters and decoding step are handled, including an extension of the proposed approach in the context of conditional random fields. We show that this model, with very little supervision, can reach instantly performance comparable to those obtained by either state-of-the-art carefully handcrafted rule-based or trained statistical models for extraction of dialog acts on the Dialog State Tracking test datasets (DSTC2 and 3).",
"title": ""
},
{
"docid": "1d1651943403ba91927553d24627f5f0",
"text": "BACKGROUND\nObesity is a growing epidemic in the United States, with waistlines expanding (overweight) for almost 66% of the population (National Health and Nutrition Examination Survey 1999-2004). The attitude of society, which includes healthcare providers, toward people of size has traditionally been negative, regardless of their own gender, age, experience, and occupation. The purpose of the present study was to determine whether bariatric sensitivity training could improve nursing attitudes and beliefs toward adult obese patients and whether nurses' own body mass index (BMI) affected their attitude and belief scores.\n\n\nMETHODS\nAn on-line survey was conducted of nursing attitudes and beliefs regarding adult obese patients. The responses were compared between 1 hospital that offered bariatric sensitivity training and 1 that did not. The primary study measures were 2 scales that have been validated to assess weight bias: Attitudes Toward Obese Persons (ATOP) and Beliefs Against Obese Persons (BAOP). The primary outcome measures were the scores derived from the ATOP and BAOP scales.\n\n\nRESULTS\nData were obtained from 332 on-line surveys, to which 266 nurses responded with complete data, 145 from hospital 1 (intervention) and 121 from hospital 2 (control). The mean ATOP scores for hospital 1 were modestly greater than those for hospital 2 (18.0 versus 16.1, P = .03). However, no differences were found between the 2 hospitals for the mean BAOP scores (67.1 versus 67.1, P = .86). No statistically significant differences were found between the 2 hospitals among the BMI groups for either ATOP or BAOP. Within each hospital, no statistically significant trend was found among the BMI groups for either ATOP or BAOP. The association of BMI with the overall ATOP (r = .13, P = .04) and BOAP (r = .12, P = .05) scores was very weak, although marginally significant. The association of the overall ATOP score with the BAOP score was weak, although significant (r = .26, P < .001).\n\n\nCONCLUSION\nAnnual bariatric sensitivity training might improve nursing attitudes toward obese patients, but it does not improve nursing beliefs, regardless of the respondent's BMI.",
"title": ""
},
{
"docid": "fc2a45aa3ec8e4d27b9fc1a86d24b86d",
"text": "Information and Communication Technologies (ICT) rapidly migrate towards the Future Internet (FI) era, which is characterized, among others, by powerful and complex network infrastructures and innovative applications, services and content. An application area that attracts immense research interest is transportation. In particular, traffic congestions, emergencies and accidents reveal inefficiencies in transportation infrastructures, which can be overcome through the exploitation of ICT findings, in designing systems that are targeted at traffic / emergency management, namely Intelligent Transportation Systems (ITS). This paper considers the potential connection of vehicles to form vehicular networks that communicate with each other at an IP-based level, exchange information either directly or indirectly (e.g. through social networking applications and web communities) and contribute to a more efficient and green future world of transportation. In particular, the paper presents the basic research areas that are associated with the concept of Internet of Vehicles (IoV) and outlines the fundamental research challenges that arise there from.",
"title": ""
},
{
"docid": "fa68493c999a154dfc8638aa27255e93",
"text": "We develop a kernel density estimation method for estimating the density of points on a network and implement the method in the GIS environment. This method could be applied to, for instance, finding 'hot spots' of traffic accidents, street crimes or leakages in gas and oil pipe lines. We first show that the application of the ordinary two-dimensional kernel method to density estimation on a network produces biased estimates. Second, we formulate a 'natural' extension of the univariate kernel method to density estimation on a network, and prove that its estimator is biased; in particular, it overestimates the densities around nodes. Third, we formulate an unbiased discontinuous kernel function on a network, and fourth, an unbiased continuous kernel function on a network. Fifth, we develop computational methods for these kernels and derive their computational complexity. We also develop a plug-in tool for operating these methods in the GIS environment. Sixth, an application of the proposed methods to the density estimation of bag-snatches on streets is illustrated. Lastly, we summarize the major results and describe some suggestions for the practical use of the proposed methods.",
"title": ""
},
{
"docid": "1d0241833add973cc7cf6117735b7a1a",
"text": "This paper describes the conception and the construction of a low cost spin coating machine incorporating inexpensive electronic components and open-source technology based on Arduino platform. We present and discuss the details of the electrical, mechanical and control parts. This system will coat thin film in a micro level thickness and the microcontroller ATM 328 circuit controls and adjusts the spinning speed. We prepare thin films with good uniformity for various thicknesses by this spin coating system. The thickness and uniformity of deposited films were verified by determining electronic absorption spectra. We show that thin film thickness depends on the spin speed in the range of 2000–3500 rpm. We compare the results obtained on TiO2 layers deposited by our developed system to those grown by using a standard commercial spin coating systems.",
"title": ""
},
{
"docid": "6213ab7cc5e580d826f7e8fc3fbc72e3",
"text": "Non-orthogonal multiple access (NoMA) as an efficient way of radio resource sharing can root back to the network information theory. For generations of wireless communication systems design, orthogonal multiple access (OMA) schemes in time, frequency, or code domain have been the main choices due to the limited processing capability in the transceiver hardware, as well as the modest traffic demands in both latency and connectivity. However, for the next generation radio systems, given its vision to connect everything and the much evolved hardware capability, NoMA has been identified as a promising technology to help achieve all the targets in system capacity, user connectivity, and service latency. This article will provide a systematic overview of the state-of-the-art design of the NoMA transmission based on a unified transceiver design framework, the related standardization progress, and some promising use cases in future cellular networks, based on which the interested researchers can get a quick start in this area.",
"title": ""
},
{
"docid": "2810574ed772d8bc6cdd8e038185ec23",
"text": "The rapid growth of digital image collections has prompted the need for development of software tools that facilitate efficient searching and retrieval of images from large image databases. Towards this goal, we propose a content-based image retrieval scheme for retrieval of images via their color, texture, and shape features. Using three specialized histograms (i.e. color, wavelet, and edge histograms), we show that a more accurate representation of the underlying distribution of the image features improves the retrieval quality. Furthermore, in an attempt to better represent the user’s information needs, our system provides an interactive search mechanism through the user interface. Users searching through the database can select the visual features and adjust the associated weights according to the aspects they wish to emphasize. The proposed histogram-based scheme has been thoroughly evaluated using two general-purpose image datasets consisting of 1000 and 3000 images, respectively. Experimental results show that this scheme not only improves the effectiveness of the CBIR system, but also improves the efficiency of the overall process.",
"title": ""
},
{
"docid": "f4be6b2bf1cd462ec758fe37b098eef1",
"text": "Recent work has established an empirically successful framework for adapting learning rates for stochastic gradient descent (SGD). This effectively removes all needs for tuning, while automatically reducing learning rates over time on stationary problems, and permitting learning rates to grow appropriately in nonstationary tasks. Here, we extend the idea in three directions, addressing proper minibatch parallelization, including reweighted updates for sparse or orthogonal gradients, improving robustness on non-smooth loss functions, in the process replacing the diagonal Hessian estimation procedure that may not always be available by a robust finite-difference approximation. The final algorithm integrates all these components, has linear complexity and is hyper-parameter free.",
"title": ""
},
{
"docid": "507353e988950736e35f78185d320ce4",
"text": "Traceability is an important concern in projects that span different engineering domains. Traceability can also be mandated, exploited and managed across the engineering lifecycle, and may involve defining connections between heterogeneous models. As a result, traceability can be considered to be multi-domain. This thesis introduces the concept and challenges of multi-domain traceability and explains how it can be used to support typical traceability scenarios. It proposes a model-based approach to develop a traceability solution which effectively operates across multiple engineering domains. The approach introduced a collection of tasks and structures which address the identified challenges for a traceability solution in multi-domain projects. The proposed approach demonstrates that modelling principles and MDE techniques can help to address current challenges and consequently improve the effectiveness of a multi-domain traceability solution. A prototype of the required tooling to support the approach is implemented with EMF and atop Epsilon; it consists of an implementation of the proposed structures (models) and model management operations to support traceability. Moreover, the approach is illustrated in the context of two safety-critical projects where multi-domain traceability is required to underpin certification arguments.",
"title": ""
},
{
"docid": "49af355cfc9e13234a2a3b115f225c1b",
"text": "Tattoos play an important role in many religions. Tattoos have been used for thousands of years as important tools in ritual and tradition. Judaism, Christianity, and Islam have been hostile to the use of tattoos, but many religions, in particular Buddhism and Hinduism, make extensive use of them. This article examines their use as tools for protection and devotion.",
"title": ""
},
{
"docid": "869b991ffd62a00f993e5154af1fd8cb",
"text": "Recently mobile communication systems such as 3GPP LTE, IEEE802.16e have been growing interest in the femto-cell systems for increase of data rates and enhanced call quality. In a femto-cell system, frequent handover among femto-cells may happen. Also, the probability of handover failure may increase during the frequent handover. In this paper, we propose a load-balanced handover with adaptive hysteresis in a femto-cell system considering channel allocation status of target base station. The simulation results show that the proposed schemes reduce the ping-pong rate and improve the MS's handover-related performance in terms of handover failure probability compared with the conventional handover method in a femto-cell system.",
"title": ""
},
{
"docid": "8df1395775e139c281512e4e4c1920d9",
"text": "Over the past 20 years, breakthrough discoveries of chromatin-modifying enzymes and associated mechanisms that alter chromatin in response to physiological or pathological signals have transformed our knowledge of epigenetics from a collection of curious biological phenomena to a functionally dissected research field. Here, we provide a personal perspective on the development of epigenetics, from its historical origins to what we define as 'the modern era of epigenetic research'. We primarily highlight key molecular mechanisms of and conceptual advances in epigenetic control that have changed our understanding of normal and perturbed development.",
"title": ""
},
{
"docid": "c4f6ccec24ff18ba839a83119b125f04",
"text": "The growing rehabilitation and consumer movement toward independent community living for disabled adults has placed new demands on the health care delivery system. ProgTams must be developed for the disabled adult that provide direct training in adaptive community skills, such as banking, budgeting, consumer advocacy, personal health care, and attendant management. An Independent Living Skills Training Program that uses a psychoeducational model is described. To date, 17 multiply handicapped adults, whose average length of institutionalization was I 1.9 years, have participated in the program. Of these 17, 58.8% returned to community living and 23.5% are waiting for openings m accessible housing units.",
"title": ""
},
{
"docid": "177c52ba3d4e80274b3d90229fcce535",
"text": "We address the problem of classifying sparsely labeled networks, where labeled nodes in the network are extremely scarce. Existing algorithms, such as collective classification, have been shown to be effective for jointly deriving labels of related nodes, by exploiting class label dependencies among neighboring nodes. However, when the underlying network is sparsely labeled, most nodes have too few or even no connections to labeled nodes. This makes it very difficult to leverage supervised knowledge from labeled nodes to accurately estimate label dependencies, thereby largely degrading the classification accuracy. In this paper, we propose a novel discriminative matrix factorization (DMF) based algorithm that effectively learns a latent network representation by exploiting topological paths between labeled and unlabeled nodes, in addition to nodes' content information. The main idea is to use matrix factorization to obtain a compact representation of the network that fully encodes nodes' content information and network structure, and unleash discriminative power inferred from labeled nodes to directly benefit collective classification. To achieve this, we formulate a new matrix factorization objective function that integrates network representation learning with an empirical loss minimization for classifying node labels. An efficient optimization algorithm based on conjugate gradient methods is proposed to solve the new objective function. Experimental results on real-world networks show that DMF yields superior performance gain over the state-of-the-art baselines on sparsely labeled networks.",
"title": ""
},
{
"docid": "5d3a0b1dfdbffbd4465ad7a9bb2f6878",
"text": "The Cancer Genome Atlas (TCGA) is a public funded project that aims to catalogue and discover major cancer-causing genomic alterations to create a comprehensive \"atlas\" of cancer genomic profiles. So far, TCGA researchers have analysed large cohorts of over 30 human tumours through large-scale genome sequencing and integrated multi-dimensional analyses. Studies of individual cancer types, as well as comprehensive pan-cancer analyses have extended current knowledge of tumorigenesis. A major goal of the project was to provide publicly available datasets to help improve diagnostic methods, treatment standards, and finally to prevent cancer. This review discusses the current status of TCGA Research Network structure, purpose, and achievements.",
"title": ""
},
{
"docid": "ccc3cf21c4c97f9c56915b4d1e804966",
"text": "In this paper we present a prototype of a Microwave Imaging (MI) system for breast cancer detection. Our system is based on low-cost off-the-shelf microwave components, custom-made antennas, and a small form-factor processing system with an embedded Field-Programmable Gate Array (FPGA) for accelerating the execution of the imaging algorithm. We show that our system can compete with a vector network analyzer in terms of accuracy, and it is more than 20x faster than a high-performance server at image reconstruction.",
"title": ""
},
{
"docid": "c0d722d72955dd1ec6df3cc24289979f",
"text": "Citing classic psychological research and a smattering of recent studies, Kassin, Dror, and Kukucka (2013) proposed the operation of a forensic confirmation bias, whereby preexisting expectations guide the evaluation of forensic evidence in a self-verifying manner. In a series of studies, we tested the hypothesis that knowing that a defendant had confessed would taint people's evaluations of handwriting evidence relative to those not so informed. In Study 1, participants who read a case summary in which the defendant had previously confessed were more likely to erroneously conclude that handwriting samples from the defendant and perpetrator were authored by the same person, and were more likely to judge the defendant guilty, compared with those in a no-confession control group. Study 2 replicated and extended these findings using a within-subjects design in which participants rated the same samples both before and after reading a case summary. These findings underscore recent critiques of the forensic sciences as subject to bias, and suggest the value of insulating forensic examiners from contextual information.",
"title": ""
},
{
"docid": "813238ec00d6ee78ff9a584a152377f6",
"text": "Exercise-induced muscle injury in humans frequently occurs after unaccustomed exercise, particularly if the exercise involves a large amount of eccentric (muscle lengthening) contractions. Direct measures of exercise-induced muscle damage include cellular and subcellular disturbances, particularly Z-line streaming. Several indirectly assessed markers of muscle damage after exercise include increases in T2 signal intensity via magnetic resonance imaging techniques, prolonged decreases in force production measured during both voluntary and electrically stimulated contractions (particularly at low stimulation frequencies), increases in inflammatory markers both within the injured muscle and in the blood, increased appearance of muscle proteins in the blood, and muscular soreness. Although the exact mechanisms to explain these changes have not been delineated, the initial injury is ascribed to mechanical disruption of the fiber, and subsequent damage is linked to inflammatory processes and to changes in excitation-contraction coupling within the muscle. Performance of one bout of eccentric exercise induces an adaptation such that the muscle is less vulnerable to a subsequent bout of eccentric exercise. Although several theories have been proposed to explain this \"repeated bout effect,\" including altered motor unit recruitment, an increase in sarcomeres in series, a blunted inflammatory response, and a reduction in stress-susceptible fibers, there is no general agreement as to its cause. In addition, there is controversy concerning the presence of sex differences in the response of muscle to damage-inducing exercise. In contrast to the animal literature, which clearly shows that females experience less damage than males, research using human studies suggests that there is either no difference between men and women or that women are more prone to exercise-induced muscle damage than are men.",
"title": ""
}
] | scidocsrr |
8f514b69680f77c0cd9f0ab33a16e225 | Sparse Non-negative Matrix Factorization (SNMF) based color unmixing for breast histopathological image analysis | [
{
"docid": "882f2fa1782d530bbc2cbccdd5a194bd",
"text": "Shape prior plays an important role in accurate and robust liver segmentation. However, liver shapes have complex variations and accurate modeling of liver shapes is challenging. Using large-scale training data can improve the accuracy but it limits the computational efficiency. In order to obtain accurate liver shape priors without sacrificing the efficiency when dealing with large-scale training data, we investigate effective and scalable shape prior modeling method that is more applicable in clinical liver surgical planning system. We employed the Sparse Shape Composition (SSC) to represent liver shapes by an optimized sparse combination of shapes in the repository, without any assumptions on parametric distributions of liver shapes. To leverage large-scale training data and improve the computational efficiency of SSC, we also introduced a homotopy-based method to quickly solve the L1-norm optimization problem in SSC. This method takes advantage of the sparsity of shape modeling, and solves the original optimization problem in SSC by continuously transforming it into a series of simplified problems whose solution is fast to compute. When new training shapes arrive gradually, the homotopy strategy updates the optimal solution on the fly and avoids re-computing it from scratch. Experiments showed that SSC had a high accuracy and efficiency in dealing with complex liver shape variations, excluding gross errors and preserving local details on the input liver shape. The homotopy-based SSC had a high computational efficiency, and its runtime increased very slowly when repository's capacity and vertex number rose to a large degree. When repository's capacity was 10,000, with 2000 vertices on each shape, homotopy method cost merely about 11.29 s to solve the optimization problem in SSC, nearly 2000 times faster than interior point method. The dice similarity coefficient (DSC), average symmetric surface distance (ASD), and maximum symmetric surface distance measurement was 94.31 ± 3.04%, 1.12 ± 0.69 mm and 3.65 ± 1.40 mm respectively.",
"title": ""
},
{
"docid": "1de10e40580ba019045baaa485f8e729",
"text": "Automated labeling of anatomical structures in medical images is very important in many neuroscience studies. Recently, patch-based labeling has been widely investigated to alleviate the possible mis-alignment when registering atlases to the target image. However, the weights used for label fusion from the registered atlases are generally computed independently and thus lack the capability of preventing the ambiguous atlas patches from contributing to the label fusion. More critically, these weights are often calculated based only on the simple patch similarity, thus not necessarily providing optimal solution for label fusion. To address these limitations, we propose a generative probability model to describe the procedure of label fusion in a multi-atlas scenario, for the goal of labeling each point in the target image by the best representative atlas patches that also have the largest labeling unanimity in labeling the underlying point correctly. Specifically, sparsity constraint is imposed upon label fusion weights, in order to select a small number of atlas patches that best represent the underlying target patch, thus reducing the risks of including the misleading atlas patches. The labeling unanimity among atlas patches is achieved by exploring their dependencies, where we model these dependencies as the joint probability of each pair of atlas patches in correctly predicting the labels, by analyzing the correlation of their morphological error patterns and also the labeling consensus among atlases. The patch dependencies will be further recursively updated based on the latest labeling results to correct the possible labeling errors, which falls to the Expectation Maximization (EM) framework. To demonstrate the labeling performance, we have comprehensively evaluated our patch-based labeling method on the whole brain parcellation and hippocampus segmentation. Promising labeling results have been achieved with comparison to the conventional patch-based labeling method, indicating the potential application of the proposed method in the future clinical studies.",
"title": ""
}
] | [
{
"docid": "4c410bb0390cc4611da4df489c89fca0",
"text": "In this work, we propose a generalized product of experts (gPoE) framework for combining the predictions of multiple probabilistic models. We identify four desirable properties that are important for scalability, expressiveness and robustness, when learning and inferring with a combination of multiple models. Through analysis and experiments, we show that gPoE of Gaussian processes (GP) have these qualities, while no other existing combination schemes satisfy all of them at the same time. The resulting GP-gPoE is highly scalable as individual GP experts can be independently learned in parallel; very expressive as the way experts are combined depends on the input rather than fixed; the combined prediction is still a valid probabilistic model with natural interpretation; and finally robust to unreliable predictions from individual experts.",
"title": ""
},
{
"docid": "fb9c0650f5ac820eef3df65b7de1ff12",
"text": "Since 2013, a number of studies have enhanced the literature and have guided clinicians on viable treatment interventions outside of pharmacotherapy and surgery. Thirty-three randomized controlled trials and one large observational study on exercise and physiotherapy were published in this period. Four randomized controlled trials focused on dance interventions, eight on treatment of cognition and behavior, two on occupational therapy, and two on speech and language therapy (the latter two specifically addressed dysphagia). Three randomized controlled trials focused on multidisciplinary care models, one study on telemedicine, and four studies on alternative interventions, including music therapy and mindfulness. These studies attest to the marked interest in these therapeutic approaches and the increasing evidence base that places nonpharmacological treatments firmly within the integrated repertoire of treatment options in Parkinson's disease.",
"title": ""
},
{
"docid": "605e478250d1c49107071e47a9cb00df",
"text": "In line with the increasing use of sensors and health application, there are huge efforts on processing of collected data to extract valuable information such as accelerometer data. This study will propose activity recognition model aim to detect the activities by employing ensemble of classifiers techniques using the Wireless Sensor Data Mining (WISDM). The model will recognize six activities namely walking, jogging, upstairs, downstairs, sitting, and standing. Many experiments are conducted to determine the best classifier combination for activity recognition. An improvement is observed in the performance when the classifiers are combined than when used individually. An ensemble model is built using AdaBoost in combination with decision tree algorithm C4.5. The model effectively enhances the performance with an accuracy level of 94.04 %. Keywords—Activity Recognition; Sensors; Smart phones; accelerometer data; Data mining; Ensemble",
"title": ""
},
{
"docid": "63e58ac7e6f3b4a463e8f8182fee9be5",
"text": "In this work, we propose “global style tokens” (GSTs), a bank of embeddings that are jointly trained within Tacotron, a state-of-the-art end-toend speech synthesis system. The embeddings are trained with no explicit labels, yet learn to model a large range of acoustic expressiveness. GSTs lead to a rich set of significant results. The soft interpretable “labels” they generate can be used to control synthesis in novel ways, such as varying speed and speaking style – independently of the text content. They can also be used for style transfer, replicating the speaking style of a single audio clip across an entire long-form text corpus. When trained on noisy, unlabeled found data, GSTs learn to factorize noise and speaker identity, providing a path towards highly scalable but robust speech synthesis.",
"title": ""
},
{
"docid": "3cdbc153caaafcea54228b0c847aa536",
"text": "BACKGROUND\nAlthough the use of filling agents for soft-tissue augmentation has increased worldwide, most consensus statements do not distinguish between ethnic populations. There are, however, significant differences between Caucasian and Asian faces, reflecting not only cultural disparities, but also distinctive treatment goals. Unlike aesthetic patients in the West, who usually seek to improve the signs of aging, Asian patients are younger and request a broader range of indications.\n\n\nMETHODS\nMembers of the Asia-Pacific Consensus group-comprising specialists from the fields of dermatology, plastic surgery, anatomy, and clinical epidemiology-convened to develop consensus recommendations for Asians based on their own experience using cohesive polydensified matrix, hyaluronic acid, and calcium hydroxylapatite fillers.\n\n\nRESULTS\nThe Asian face demonstrates differences in facial structure and cosmetic ideals. Improving the forward projection of the \"T zone\" (i.e., forehead, nose, cheeks, and chin) forms the basis of a safe and effective panfacial approach to the Asian face. Successful augmentation may be achieved with both (1) high- and low-viscosity cohesive polydensified matrix/hyaluronic acid and (2) calcium hydroxylapatite for most indications, although some constraints apply.\n\n\nCONCLUSION\nThe Asia-Pacific Consensus recommendations are the first developed specifically for the use of fillers in Asian populations.\n\n\nCLINCIAL QUESTION/LEVEL OF EVIDENCE\nTherapeutic, V.",
"title": ""
},
{
"docid": "a0e243a0edd585303a84fda47b1ae1e1",
"text": "Generative Adversarial Networks (GANs) have shown great promise recently in image generation. Training GANs for language generation has proven to be more difficult, because of the non-differentiable nature of generating text with recurrent neural networks. Consequently, past work has either resorted to pre-training with maximum-likelihood or used convolutional networks for generation. In this work, we show that recurrent neural networks can be trained to generate text with GANs from scratch using curriculum learning, by slowly teaching the model to generate sequences of increasing and variable length. We empirically show that our approach vastly improves the quality of generated sequences compared to a convolutional baseline. 1",
"title": ""
},
{
"docid": "45bd038dd94d388f945c041e7c04b725",
"text": "Entomophagy is widespread among nonhuman primates and is common among many human communities. However, the extent and patterns of entomophagy vary substantially both in humans and nonhuman primates. Here we synthesize the literature to examine why humans and other primates eat insects and what accounts for the variation in the extent to which they do so. Variation in the availability of insects is clearly important, but less understood is the role of nutrients in entomophagy. We apply a multidimensional analytical approach, the right-angled mixture triangle, to published data on the macronutrient compositions of insects to address this. Results showed that insects eaten by humans spanned a wide range of protein-to-fat ratios but were generally nutrient dense, whereas insects with high protein-to-fat ratios were eaten by nonhuman primates. Although suggestive, our survey exposes a need for additional, standardized, data.",
"title": ""
},
{
"docid": "939cd6055f850b8fdb6ba869d375cf25",
"text": "...although PPP lessons are often supplemented with skills lessons, most students taught mainly through conventional approaches such as PPP leave school unable to communicate effectively in English (Stern, 1983). This situation has prompted many ELT professionals to take note of... second language acquisition (SLA) studies... and turn towards holistic approaches where meaning is central and where opportunities for language use abound. Task-based learning is one such approach...",
"title": ""
},
{
"docid": "e623ce85fdeead09fa746e9ae793806e",
"text": "In this paper, we aim to construct a deep neural network which embeds high dimensional symmetric positive definite (SPD) matrices into a more discriminative low dimensional SPD manifold. To this end, we develop two types of basic layers: a 2D fully connected layer which reduces the dimensionality of the SPD matrices, and a symmetrically clean layer which achieves non-linear mapping. Specifically, we extend the classical fully connected layer such that it is suitable for SPD matrices, and we further show that SPD matrices with symmetric pair elements setting zero operations are still symmetric positive definite. Finally, we complete the construction of the deep neural network for SPD manifold learning by stacking the two layers. Experiments on several face datasets demonstrate the effectiveness of the proposed method. Introduction Symmetric positive definite (SPD) matrices have shown powerful representation abilities of encoding image and video information. In computer vision community, the SPD matrix representation has been widely employed in many applications, such as face recognition (Pang, Yuan, and Li 2008; Huang et al. 2015; Wu et al. 2015; Li et al. 2015), object recognition (Tuzel, Porikli, and Meer 2006; Jayasumana et al. 2013; Harandi, Salzmann, and Hartley 2014; Yin et al. 2016), action recognition (Harandi et al. 2016), and visual tracking (Wu et al. 2015). The SPD matrices form a Riemannian manifold, where the Euclidean distance is no longer a suitable metric. Previous works on analyzing the SPD manifold mainly fall into two categories: the local approximation method and the kernel method, as shown in Figure 1(a). The local approximation method (Tuzel, Porikli, and Meer 2006; Sivalingam et al. 2009; Tosato et al. 2010; Carreira et al. 2012; Vemulapalli and Jacobs 2015) locally flattens the manifold and approximates the SPD matrix by a point of the tangent space. The kernel method (Harandi et al. 2012; Wang et al. 2012; Jayasumana et al. 2013; Li et al. 2013; Quang, San Biagio, and Murino 2014; Yin et al. 2016) embeds the manifold into a higher dimensional Reproducing Kernel Hilbert Space (RKHS) via kernel functions. On new ∗corresponding author Copyright c © 2017, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. SPD Manifold Tangent Space",
"title": ""
},
{
"docid": "90e5fc05d96e84668816eb70a06ab709",
"text": "This paper introduces a cooperative parallel metaheuristic for solving the capacitated vehicle routing problem. The proposed metaheuristic consists of multiple parallel tabu search threads that cooperate by asynchronously exchanging best found solutions through a common solution pool. The solutions sent to the pool are clustered according to their similarities. The search history information identified from the solution clusters is applied to guide the intensification or diversification of the tabu search threads. Computational experiments on two sets of large scale benchmarks from the literature demonstrate that the suggested metaheuristic is highly competitive, providing new best solutions to ten of those well-studied instances.",
"title": ""
},
{
"docid": "8ec018e0fc4ca7220387854bdd034a58",
"text": "Despite the overwhelming success of deep learning in various speech processing tasks, the problem of separating simultaneous speakers in a mixture remains challenging. Two major difficulties in such systems are the arbitrary source permutation and unknown number of sources in the mixture. We propose a novel deep learning framework for single channel speech separation by creating attractor points in high dimensional embedding space of the acoustic signals which pull together the time-frequency bins corresponding to each source. Attractor points in this study are created by finding the centroids of the sources in the embedding space, which are subsequently used to determine the similarity of each bin in the mixture to each source. The network is then trained to minimize the reconstruction error of each source by optimizing the embeddings. The proposed model is different from prior works in that it implements an end-to-end training, and it does not depend on the number of sources in the mixture. Two strategies are explored in the test time, K-means and fixed attractor points, where the latter requires no post-processing and can be implemented in real-time. We evaluated our system on Wall Street Journal dataset and show 5.49% improvement over the previous state-of-the-art methods.",
"title": ""
},
{
"docid": "a45109840baf74c61b5b6b8f34ac81d5",
"text": "Decision-making groups can potentially benefit from pooling members' information, particularly when members individually have partial and biased information but collectively can compose an unbiased characterization of the decision alternatives. The proposed biased sampling model of group discussion, however, suggests that group members often fail to effectively pool their information because discussion tends to be dominated by (a) information that members hold in common before discussion and (b) information that supports members' existent preferences. In a political caucus simulation, group members individually read candidate descriptions that contained partial information biased against the most favorable candidate and then discussed the candidates as a group. Even though groups could have produced unbiased composites of the candidates through discussion, they decided in favor of the candidate initially preferred by a plurality rather than the most favorable candidate. Group members' preand postdiscussion recall of candidate attributes indicated that discussion tended to perpetuate, not to correct, members' distorted pictures of the candidates.",
"title": ""
},
{
"docid": "a33d982b4dde7c22ffc3c26214b35966",
"text": "Background: In most cases, bug resolution is a collaborative activity among developers in software development where each developer contributes his or her ideas on how to resolve the bug. Although only one developer is recorded as the actual fixer for the bug, the contribution of the developers who participated in the collaboration cannot be neglected.\n Aims: This paper proposes a new approach, called DRETOM (Developer REcommendation based on TOpic Models), to recommending developers for bug resolution in collaborative behavior.\n Method: The proposed approach models developers' interest in and expertise on bug resolving activities based on topic models that are built from their historical bug resolving records. Given a new bug report, DRETOM recommends a ranked list of developers who are potential to participate in and contribute to resolving the new bug according to these developers' interest in and expertise on resolving it.\n Results: Experimental results on Eclipse JDT and Mozilla Firefox projects show that DRETOM can achieve high recall up to 82% and 50% with top 5 and top 7 recommendations respectively.\n Conclusion: Developers' interest in bug resolving activities should be taken into consideration. On condition that the parameter θ of DRETOM is set properly with trials, the proposed approach is practically useful in terms of recall.",
"title": ""
},
{
"docid": "b63077105e140546a7485167339fdf62",
"text": "Deep multi-layer perceptron neural networks are used in many state-of-the-art systems for machine perception (e.g., speech-to-text, image classification, and object detection). Once a network is trained to do a specific task, e.g., finegrained bird classification, it cannot easily be trained to do new tasks, e.g., incrementally learning to recognize additional bird species or learning an entirely different task such as finegrained flower recognition. When new tasks are added, deep neural networks are prone to catastrophically forgetting previously learned information. Catastrophic forgetting has hindered the use of neural networks in deployed applications that require lifelong learning. There have been multiple attempts to develop schemes that mitigate catastrophic forgetting, but these methods have yet to be compared and the kinds of tests used to evaluate individual methods vary greatly. In this paper, we compare multiple mechanisms designed to mitigate catastrophic forgetting in neural networks. Experiments showed that the mechanism(s) that are critical for optimal performance vary based on the incremental training paradigm and type of data being used.",
"title": ""
},
{
"docid": "e6d79e4a616c4913b605bc3c2a6f8776",
"text": "In this paper an alternative approach to solve uncertain Stochastic Differential Equation (SDE) is proposed. This uncertainty occurs due to the involved parameters in system and these are considered as Triangular Fuzzy Numbers (TFN). Here the proposed fuzzy arithmetic in [2] is used as a tool to handle Fuzzy Stochastic Differential Equation (FSDE). In particular, a system of Ito stochastic differential equations is analysed with fuzzy parameters. Further exact and Euler Maruyama approximation methods with fuzzy values are demonstrated and solved some standard SDE.",
"title": ""
},
{
"docid": "32e01378d68ae1610f538e60edf24d9a",
"text": "Generating texts from structured data (e.g., a table) is important for various natural language processing tasks such as question answering and dialog systems. In recent studies, researchers use neural language models and encoder-decoder frameworks for table-to-text generation. However, these neural network-based approaches typically do not model the order of content during text generation. When a human writes a summary based on a given table, he or she would probably consider the content order before wording. In this paper, we propose an order-planning text generation model, where order information is explicitly captured by link-based attention. Then a self-adaptive gate combines the link-based attention with traditional content-based attention. We conducted experiments on the WIKIBIO dataset and achieve higher performance than previous methods in terms of BLEU, ROUGE, and NIST scores; we also performed ablation tests to analyze each component of our model.",
"title": ""
},
{
"docid": "228b94be5c79161343376360cd35db6f",
"text": "Linked Data is proclaimed as the Semantic Web done right. The Semantic Web is an incomplete dream so far, but a homogeneous revolutionary platform as a network of Blockchains could be the solution to this not optimal reality. This research paper introduces some initial hints and ideas about how a futuristic Internet that might be composed and powered by Blockchains networks would be constructed and designed to interconnect data and meaning, thus allow reasoning. An industrial application where Blockchain and Linked Data fits perfectly as a Supply Chain management system is also researched.",
"title": ""
},
{
"docid": "43cdcbfaca6c69cdb8652761f7e8b140",
"text": "Aggregation of local features is a well-studied approach for image as well as 3D model retrieval (3DMR). A carefully designed local 3D geometric feature is able to describe detailed local geometry of 3D model, often with invariance to geometric transformations that include 3D rotation of local 3D regions. For efficient 3DMR, these local features are aggregated into a feature per 3D model. A recent alternative, end-toend 3D Deep Convolutional Neural Network (3D-DCNN) [7][33], has achieved accuracy superior to the abovementioned aggregation-of-local-features approach. However, current 3D-DCNN based methods have weaknesses; they lack invariance against 3D rotation, and they often miss detailed geometrical features due to their quantization of shapes into coarse voxels in applying 3D-DCNN. In this paper, we propose a novel deep neural network for 3DMR called Deep Local feature Aggregation Network (DLAN) that combines extraction of rotation-invariant 3D local features and their aggregation in a single deep architecture. The DLAN describes local 3D regions of a 3D model by using a set of 3D geometric features invariant to local rotation. The DLAN then aggregates the set of features into a (global) rotation-invariant and compact feature per 3D model. Experimental evaluation shows that the DLAN outperforms the existing deep learning-based 3DMR algorithms.",
"title": ""
},
{
"docid": "cc5b1a8100e8d4d7be5dfb80c4866aab",
"text": "A fundamental characteristic of multicellular organisms is the specialization of functional cell types through the process of differentiation. These specialized cell types not only characterize the normal functioning of different organs and tissues, they can also be used as cellular biomarkers of a variety of different disease states and therapeutic/vaccine responses. In order to serve as a reference for cell type representation, the Cell Ontology has been developed to provide a standard nomenclature of defined cell types for comparative analysis and biomarker discovery. Historically, these cell types have been defined based on unique cellular shapes and structures, anatomic locations, and marker protein expression. However, we are now experiencing a revolution in cellular characterization resulting from the application of new high-throughput, high-content cytometry and sequencing technologies. The resulting explosion in the number of distinct cell types being identified is challenging the current paradigm for cell type definition in the Cell Ontology. In this paper, we provide examples of state-of-the-art cellular biomarker characterization using high-content cytometry and single cell RNA sequencing, and present strategies for standardized cell type representations based on the data outputs from these cutting-edge technologies, including “context annotations” in the form of standardized experiment metadata about the specimen source analyzed and marker genes that serve as the most useful features in machine learning-based cell type classification models. We also propose a statistical strategy for comparing new experiment data to these standardized cell type representations. The advent of high-throughput/high-content single cell technologies is leading to an explosion in the number of distinct cell types being identified. It will be critical for the bioinformatics community to develop and adopt data standard conventions that will be compatible with these new technologies and support the data representation needs of the research community. The proposals enumerated here will serve as a useful starting point to address these challenges.",
"title": ""
},
{
"docid": "199079ff97d1a48819f8185c2ef23472",
"text": "Identifying domain-dependent opinion words is a key problem in opinion mining and has been studied by several researchers. However, existing work has been focused on adjectives and to some extent verbs. Limited work has been done on nouns and noun phrases. In our work, we used the feature-based opinion mining model, and we found that in some domains nouns and noun phrases that indicate product features may also imply opinions. In many such cases, these nouns are not subjective but objective. Their involved sentences are also objective sentences and imply positive or negative opinions. Identifying such nouns and noun phrases and their polarities is very challenging but critical for effective opinion mining in these domains. To the best of our knowledge, this problem has not been studied in the literature. This paper proposes a method to deal with the problem. Experimental results based on real-life datasets show promising results.",
"title": ""
}
] | scidocsrr |
1d1c7ed520b543c6c4fd71f0e3776c9d | Teachers' pedagogical beliefs and their use of digital media in classrooms: Sharpening the focus of the 'will, skill, tool' model and integrating teachers' constructivist orientations | [
{
"docid": "48dd3e8e071e7dd580ea42b528ee9427",
"text": "Information systems (IS) implementation is costly and has a relatively low success rate. Since the seventies, IS research has contributed to a better understanding of this process and its outcomes. The early efforts concentrated on the identification of factors that facilitated IS use. This produced a long list of items that proved to be of little practical value. It became obvious that, for practical reasons, the factors had to be grouped into a model in a way that would facilitate analysis of IS use. In 1985, Fred Davis suggested the technology acceptance model (TAM). It examines the mediating role of perceived ease of use and perceived usefulness in their relation between systems characteristics (external variables) and the probability of system use (an indicator of system success). More recently, Davis proposed a new version of his model: TAM2. It includes subjective norms, and was tested with longitudinal research designs. Overall the two explain about 40% of system’s use. Analysis of empirical research using TAM shows that results are not totally consistent or clear. This suggests that significant factors are not included in the models. We conclude that TAM is a useful model, but has to be integrated into a broader one which would include variables related to both human and social change processes, and to the adoption of the innovation model. # 2002 Elsevier Science B.V. All rights reserved.",
"title": ""
},
{
"docid": "c17e6363762e0e9683b51c0704d43fa7",
"text": "Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org/about/terms.html. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use.",
"title": ""
}
] | [
{
"docid": "ff0644de5cd474dbd858c96bb4c76fd9",
"text": "With the growth of the Internet of Things, many insecure embedded devices are entering into our homes and businesses. Some of these web-connected devices lack even basic security protections such as secure password authentication. As a result, thousands of IoT devices have already been infected with malware and enlisted into malicious botnets and many more are left vulnerable to exploitation. In this paper we analyze the practical security level of 16 popular IoT devices from high-end and low-end manufacturers. We present several low-cost black-box techniques for reverse engineering these devices, including software and fault injection based techniques for bypassing password protection. We use these techniques to recover device rmware and passwords. We also discover several common design aws which lead to previously unknown vulnerabilities. We demonstrate the e ectiveness of our approach by modifying a laboratory version of the Mirai botnet to automatically include these devices. We also discuss how to improve the security of IoT devices without signi cantly increasing their cost.",
"title": ""
},
{
"docid": "6aed31a677c2fca976c91c67abd1e7b1",
"text": "Facebook is the most popular Social Network Site (SNS) among college students. Despite the popularity and extensive use of Facebook by students, its use has not made significant inroads into classroom usage. In this study, we seek to examine why this is the case and whether it would be worthwhile for faculty to invest the time to integrate Facebook into their teaching. To this end, we decided to undertake a study with a sample of 214 undergraduate students at the University of Huelva (Spain). We applied the structural equation model specifically designed by Mazman and Usluel (2010) to identify the factors that may motivate these students to adopt and use social network tools, specifically Facebook, for educational purposes. According to our results, Social Influence is the most important factor in predicting the adoption of Facebook; students are influenced to adopt it to establish or maintain contact with other people with whom they share interests. Regarding the purposes of Facebook usage, Social Relations is perceived as the most important factor among all of the purposes collected. Our findings also revealed that the educational use of Facebook is explained directly by its purposes of usage and indirectly by its adoption. 2013 Elsevier Ltd. All rights reserved.",
"title": ""
},
{
"docid": "e2459b9991cfda1e81119e27927140c5",
"text": "This research demo describes the implementation of a mobile AR-supported educational course application, AR Circuit, which is designed to promote the effectiveness of remote collaborative learning for physics. The application employs the TCP/IP protocol enabling multiplayer functionality in a mobile AR environment. One phone acts as the server and the other acts as the client. The server phone will capture the video frames, process the video frame, and send the current frame and the markers transformation matrices to the client phone.",
"title": ""
},
{
"docid": "e79a335fb5dc6e2169484f8ac4130b35",
"text": "We obtained expressions for TE and TM modes of the planar hyperbolic secant (HS) waveguide. We found waveguide parameters for which the fundamental mode has minimal width. By FDTD-simulation we show propagation of TE-modes and periodical reconstruction of non-modal fields in bounded HS-waveguides. We show that truncated HS-waveguide focuses plane wave into spot with diameter 0.132 of wavelength.",
"title": ""
},
{
"docid": "b15b88a31cc1762618ca976bdf895d57",
"text": "How can we build agents that keep learning from experience, quickly and efficiently, after their initial training? Here we take inspiration from the main mechanism of learning in biological brains: synaptic plasticity, carefully tuned by evolution to produce efficient lifelong learning. We show that plasticity, just like connection weights, can be optimized by gradient descent in large (millions of parameters) recurrent networks with Hebbian plastic connections. First, recurrent plastic networks with more than two million parameters can be trained to memorize and reconstruct sets of novel, high-dimensional (1,000+ pixels) natural images not seen during training. Crucially, traditional non-plastic recurrent networks fail to solve this task. Furthermore, trained plastic networks can also solve generic meta-learning tasks such as the Omniglot task, with competitive results and little parameter overhead. Finally, in reinforcement learning settings, plastic networks outperform a non-plastic equivalent in a maze exploration task. We conclude that differentiable plasticity may provide a powerful novel approach to the learning-to-learn problem.",
"title": ""
},
{
"docid": "4dbbcaf264cc9beda8644fa926932d2e",
"text": "It is relatively stress-free to write about computer games as nothing too much has been said yet, and almost anything goes. The situation is pretty much the same when it comes to writing about games and gaming in general. The sad fact with alarming cumulative consequences is that they are undertheorized; there are Huizinga, Caillois and Ehrmann of course, and libraries full of board game studies,in addition to game theory and bits and pieces of philosophy—most notably those of Wittgenstein— but they won’t get us very far with computer games. So if there already is or soon will be a legitimate field for computer game studies, this field is also very open to intrusions and colonisations from the already organized scholarly tribes. Resisting and beating them is the goal of our first survival game in this paper, as what these emerging studies need is independence, or at least relative independence.",
"title": ""
},
{
"docid": "85856deb5bf7cafef8f68ad13414d4b1",
"text": "human health and safety, serving as an early-warning system for hazardous environmental conditions, such as poor air and water quality (e.g., Glasgow et al. 2004, Normander et al. 2008), and natural disasters, such as fires (e.g., Hefeeda and Bagheri 2009), floods (e.g., Young 2002), and earthquakes (e.g., Hart and Martinez 2006). Collectively, these changes in the technological landscape are altering the way that environmental conditions are monitored, creating a platform for new scientific discoveries (Porter et al. 2009). Although sensor networks can provide many benefits, they are susceptible to malfunctions that can result in lost or poor-quality data. Some level of sensor failure is inevitable; however, steps can be taken to minimize the risk of loss and to improve the overall quality of the data. In the ecological community, it has become common practice to post streaming sensor data online with limited or no quality control. That is, these data are often delivered to end users in a raw form, without any checks or evaluations having been performed. In such cases, the data are typically released provisionally with the understanding that they could change in the future. However, when provisional data are made publically available before they have been comprehensively checked, there is the potential for erroneous or misleading results. Streaming sensor networks have advanced ecological research by providing enormous quantities of data at fine temporal and spatial resolutions in near real time (Szewczyk et al. 2004, Porter et al. 2005, Collins et al. 2006). The advent of wireless technologies has enabled connections with sensors in remote locations, making it possible to transmit data instantaneously using communication devices such as cellular phones, radios, and local area networks. Advancements in cyberinfrastructure have improved data storage capacity, processing speed, and communication bandwidth, making it possible to deliver to end users the most current observations from sensors (e.g., within minutes after their collection). Recent technological developments have resulted in a new generation of in situ sensors that provide continuous data streams on the physical, chemical, optical, acoustical, and biological properties of ecosystems. These new types of sensors provide a window into natural patterns not obtainable with discrete measurements (Benson et al. 2010). Techniques for rapidly processing and interpreting digital data, such as webcam images in investigations of tree phenology (Richardson et al. 2009) and acoustic data in wildlife research (Szewczyk et al. 2004), have also enhanced our understanding of ecological processes. Access to near-real-time data has become important for",
"title": ""
},
{
"docid": "c429bf418a4ecbd56c7b2ab6f4ca3cd6",
"text": "The Internet exhibits a gigantic measure of helpful data which is generally designed for its users, which makes it hard to extract applicable information from different sources. Accordingly, the accessibility of strong, adaptable Information Extraction framework that consequently concentrate structured data such as, entities, relationships between entities, and attributes from unstructured or semi-structured sources. But somewhere during extraction of information may lead to the loss of its meaning, which is absolutely not feasible. Semantic Web adds solution to this problem. It is about providing meaning to the data and allow the machine to understand and recognize these augmented data more accurately. The proposed system is about extracting information from research data of IT domain like journals of IEEE, Springer, etc., which aid researchers and the organizations to get the data of journals in an optimized manner so the time and hard work of surfing and reading the entire journal's papers or articles reduces. Also the accuracy of the system is taken care of using RDF, the data extracted has a specific declarative semantics so that the meaning of the research papers or articles during extraction remains unchanged. In addition, the same approach shall be applied on multiple documents, so that time factor can get saved.",
"title": ""
},
{
"docid": "bf5cedb076c779157e1c1fbd4df0adc9",
"text": "Generating novel graph structures that optimize given objectives while obeying some given underlying rules is fundamental for chemistry, biology and social science research. This is especially important in the task of molecular graph generation, whose goal is to discover novel molecules with desired properties such as drug-likeness and synthetic accessibility, while obeying physical laws such as chemical valency. However, designing models to find molecules that optimize desired properties while incorporating highly complex and non-differentiable rules remains to be a challenging task. Here we propose Graph Convolutional Policy Network (GCPN), a general graph convolutional network based model for goaldirected graph generation through reinforcement learning. The model is trained to optimize domain-specific rewards and adversarial loss through policy gradient, and acts in an environment that incorporates domain-specific rules. Experimental results show that GCPN can achieve 61% improvement on chemical property optimization over state-of-the-art baselines while resembling known molecules, and achieve 184% improvement on the constrained property optimization task.",
"title": ""
},
{
"docid": "a6a7770857964e96f98bd4021d38f59f",
"text": "During human evolutionary history, there were \"trade-offs\" between expending time and energy on child-rearing and mating, so both men and women evolved conditional mating strategies guided by cues signaling the circumstances. Many short-term matings might be successful for some men; others might try to find and keep a single mate, investing their effort in rearing her offspring. Recent evidence suggests that men with features signaling genetic benefits to offspring should be preferred by women as short-term mates, but there are trade-offs between a mate's genetic fitness and his willingness to help in child-rearing. It is these circumstances and the cues that signal them that underlie the variation in short- and long-term mating strategies between and within the sexes.",
"title": ""
},
{
"docid": "aafae4864d274540d0f80842970c7eac",
"text": "Fraud is increasing with the extensive use of internet and the increase of online transactions. More advanced solutions are desired to protect financial service companies and credit card holders from constantly evolving online fraud attacks. The main objective of this paper is to construct an efficient fraud detection system which is adaptive to the behavior changes by combining classification and clustering techniques. This is a two stage fraud detection system which compares the incoming transaction against the transaction history to identify the anomaly using BOAT algorithm in the first stage. In second stage to reduce the false alarm rate suspected anomalies are checked with the fraud history database and make sure that the detected anomalies are due to fraudulent transaction or any short term change in spending profile. In this work BOAT supports incremental update of transactional database and it handles maximum fraud coverage with high speed and less cost. Proposed model is evaluated on both synthetically generated and real life data and shows very good accuracy in detecting fraud transaction.",
"title": ""
},
{
"docid": "a19c27371c6bf366fddabc2fd3f277b7",
"text": "Simultaneous sparse coding (SSC) or nonlocal image representation has shown great potential in various low-level vision tasks, leading to several state-of-the-art image restoration techniques, including BM3D and LSSC. However, it still lacks a physically plausible explanation about why SSC is a better model than conventional sparse coding for the class of natural images. Meanwhile, the problem of sparsity optimization, especially when tangled with dictionary learning, is computationally difficult to solve. In this paper, we take a low-rank approach toward SSC and provide a conceptually simple interpretation from a bilateral variance estimation perspective, namely that singular-value decomposition of similar packed patches can be viewed as pooling both local and nonlocal information for estimating signal variances. Such perspective inspires us to develop a new class of image restoration algorithms called spatially adaptive iterative singular-value thresholding (SAIST). For noise data, SAIST generalizes the celebrated BayesShrink from local to nonlocal models; for incomplete data, SAIST extends previous deterministic annealing-based solution to sparsity optimization through incorporating the idea of dictionary learning. In addition to conceptual simplicity and computational efficiency, SAIST has achieved highly competent (often better) objective performance compared to several state-of-the-art methods in image denoising and completion experiments. Our subjective quality results compare favorably with those obtained by existing techniques, especially at high noise levels and with a large amount of missing data.",
"title": ""
},
{
"docid": "1831e2a5a75fc85299588323d68947b2",
"text": "The Transaction Processing Performance Council (TPC) is completing development of TPC-DS, a new generation industry standard decision support benchmark. The TPC-DS benchmark, first introduced in the “The Making of TPC-DS” [9] paper at the 32 International Conference on Very Large Data Bases (VLDB), has now entered the TPC’s “Formal Review” phase for new benchmarks; companies and researchers alike can now download the draft benchmark specification and tools for evaluation. The first paper [9] gave an overview of the TPC-DS data model, workload model, and execution rules. This paper details the characteristics of different phases of the workload, namely: database load, query workload and data maintenance; and also their impact to the benchmark’s performance metric. As with prior TPC benchmarks, this workload will be widely used by vendors to demonstrate their capabilities to support complex decision support systems, by customers as a key factor in purchasing servers and software, and by the database community for research and development of optimization techniques.",
"title": ""
},
{
"docid": "797166b4c68bcdc7a8860462117e2051",
"text": "In this paper we propose a novel feature descriptor Extended Co-occurrence HOG (ECoHOG) and integrate it with dense point trajectories demonstrating its usefulness in fine grained activity recognition. This feature is inspired by original Co-occurrence HOG (CoHOG) that is based on histograms of occurrences of pairs of image gradients in the image. Instead relying only on pure histograms we introduce a sum of gradient magnitudes of co-occurring pairs of image gradients in the image. This results in giving the importance to the object boundaries and straightening the difference between the moving foreground and static background. We also couple ECoHOG with dense point trajectories extracted using optical flow from video sequences and demonstrate that they are extremely well suited for fine grained activity recognition. Using our feature we outperform state of the art methods in this task and provide extensive quantitative evaluation.",
"title": ""
},
{
"docid": "6a1ade9670c8ee161209d54901318692",
"text": "The motion of a plane can be described by a homography. We study how to parameterize homographies to maximize plane estimation performance. We compare the usual 3 × 3 matrix parameterization with a parameterization that combines 4 fixed points in one of the images with 4 variable points in the other image. We empirically show that this 4pt parameterization is far superior. We also compare both parameterizations with a variety of direct parameterizations. In the case of unknown relative orientation, we compare with a direct parameterization of the plane equation, and the rotation and translation of the camera(s). We show that the direct parameteri-zation is both less accurate and far less robust than the 4-point parameterization. We explain the poor performance using a measure of independence of the Jacobian images. In the fully calibrated setting, the direct parameterization just consists of 3 parameters of the plane equation. We show that this parameterization is far more robust than the 4-point parameterization, but only approximately as accurate. In the case of a moving stereo rig we find that the direct parameterization of plane equation, camera rotation and translation performs very well, both in terms of accuracy and robustness. This is in contrast to the corresponding direct parameterization in the case of unknown relative orientation. Finally, we illustrate the use of plane estimation in 2 automotive applications.",
"title": ""
},
{
"docid": "90dc36628f9262157ea8722d82830852",
"text": "Inexpensive fixed wing UAV are increasingly useful in remote sensing operations. They are a cheaper alternative to manned vehicles, and are ideally suited for dangerous or monotonous missions that would be inadvisable for a human pilot. Groups of UAV are of special interest for their abilities to coordinate simultaneous coverage of large areas, or cooperate to achieve goals such as mapping. Cooperation and coordination in UAV groups also allows increasingly large numbers of aircraft to be operated by a single user. Specific applications under consideration for groups of cooperating UAV are border patrol, search and rescue, surveillance, communications relaying, and mapping of hostile territory. The capabilities of small UAV continue to grow with advances in wireless communications and computing power. Accordingly, research topics in cooperative UAV control include efficient computer vision for real-time navigation and networked computing and communication strategies for distributed control, as well as traditional aircraft-related topics such as collision avoidance and formation flight. Emerging results in cooperative UAV control are presented via discussion of these topics, including particular requirements, challenges, and some promising strategies relating to each area. Case studies from a variety of programs highlight specific solutions and recent results, ranging from pure simulation to control of multiple UAV. This wide range of case studies serves as an overview of current problems of Interest, and does not present every relevant result.",
"title": ""
},
{
"docid": "0f10bb2afc1797fad603d8c571058ecb",
"text": "This paper presents findings from the All Wales Hate Crime Project. Most hate crime research has focused on discrete victim types in isolation. For the first time, internationally, this paper examines the psychological and physical impacts of hate crime across seven victim types drawing on quantitative and qualitative data. It contributes to the hate crime debate in two significant ways: (1) it provides the first look at the problem in Wales and (2) it provides the first multi-victim-type analysis of hate crime, showing that impacts are not homogenous across victim groups. The paper provides empirical credibility to the impacts felt by hate crime victims on the margins who have routinely struggled to gain support.",
"title": ""
},
{
"docid": "a4dea5e491657e1ba042219401ebcf39",
"text": "Beam scanning arrays typically suffer from scan loss; an increasing degradation in gain as the beam is scanned from broadside toward the horizon in any given scan plane. Here, a metasurface is presented that reduces the effects of scan loss for a leaky-wave antenna (LWA). The metasurface is simple, being composed of an ultrathin sheet of subwavelength split-ring resonators. The leaky-wave structure is balanced, scanning from the forward region, through broadside, and into the backward region, and designed to scan in the magnetic plane. The metasurface is effectively invisible at broadside, where balanced LWAs are most sensitive to external loading. It is shown that the introduction of the metasurface results in increased directivity, and hence, gain, as the beam is scanned off broadside, having an increasing effect as the beam is scanned to the horizon. Simulations show that the metasurface improves the effective aperture distribution at higher scan angles, resulting in a more directive main beam, while having a negligible impact on cross-polarization gain. Experimental validation results show that the scan range of the antenna is increased from $-39 {^{\\circ }} \\leq \\theta \\leq +32 {^{\\circ }}$ to $-64 {^{\\circ }} \\leq \\theta \\leq +70 {^{\\circ }}$ , when loaded with the metasurface, demonstrating a flattened gain profile over a 135° range centered about broadside. Moreover, this scan range occurs over a frequency band spanning from 9 to 15.5 GHz, demonstrating a relative bandwidth of 53% for the metasurface.",
"title": ""
},
{
"docid": "16b5c5d176f2c9292d9c9238769bab31",
"text": "We abstract out the core search problem of active learning schemes, to better understand the extent to which adaptive labeling can improve sample complexity. We give various upper and lower bounds on the number of labels which need to be queried, and we prove that a popular greedy active learning rule is approximately as good as any other strategy for minimizing this number of labels.",
"title": ""
},
{
"docid": "2a4201c5789a546edf8944acbcf99546",
"text": "Relation extraction models based on deep learning have been attracting a lot of attention recently. Little research is carried out to reduce their need of labeled training data. In this work, we propose an unsupervised pre-training method based on the sequence-to-sequence model for deep relation extraction models. The pre-trained models need only half or even less training data to achieve equivalent performance as the same models without pre-training.",
"title": ""
}
] | scidocsrr |
7edbbbbf7f0eba93ba2c8dbc8920c710 | That's What Friends Are For: Inferring Location in Online Social Media Platforms Based on Social Relationships | [
{
"docid": "a48501fc0bde8917624185981741f0e3",
"text": "We use a sample of publicly available data on Twitter to study networks of mostly weak asymmetric ties. We show that a substantial share of ties lie within the same metropolitan region. As we examine ties between regional clusters, we find that distance, national borders and the difference in languages all affect the pattern of ties. However, Twitter connections show the more substantial correlation with the network of airline flights, highlighting the importance of looking not just at distance but at pre-existing ties between places.",
"title": ""
}
] | [
{
"docid": "c5ee2a4e38dfa27bc9d77edcd062612f",
"text": "We perform transaction-level analyses of entrusted loans – the largest component of shadow banking in China. There are two types – affiliated and non-affiliated. The latter involve a much higher interest rate than the former and official bank loan rates, and largely flow into the real estate industry. Both involve firms with privileged access to cheap capital to channel funds to less privileged firms and increase when credit is tight. The pricing of entrusted loans, especially that of non-affiliated loans, incorporates fundamental and informational risks. Stock market reactions suggest that both affiliated and non-affiliated loans are fairly-compensated investments.",
"title": ""
},
{
"docid": "c08bbd6acd494d36afc60f9612fee0bb",
"text": "Guided wave imaging has shown great potential for structural health monitoring applications by providing a way to visualize and characterize structural damage. For successful implementation of delay-and-sum and other elliptical imaging algorithms employing guided ultrasonic waves, some degree of mode purity is required because echoes from undesired modes cause imaging artifacts that obscure damage. But it is also desirable to utilize multiple modes because different modes may exhibit increased sensitivity to different types and orientations of defects. The well-known modetuning effect can be employed to use the same PZT transducers for generating and receiving multiple modes by exciting the transducers with narrowband tone bursts at different frequencies. However, this process is inconvenient and timeconsuming, particularly if extensive signal averaging is required to achieve a satisfactory signal-to-noise ratio. In addition, both acquisition time and data storage requirements may be prohibitive if signals from many narrowband tone burst excitations are measured. In this paper, we utilize a chirp excitation to excite PZT transducers over a broad frequency range to acquire multi-modal data with a single transmission, which can significantly reduce both the measurement time and the quantity of data. Each received signal from a chirp excitation is post-processed to obtain multiple signals corresponding to different narrowband frequency ranges. Narrowband signals with the best mode purity and echo shape are selected and then used to generate multiple images of damage in a target structure. The efficacy of the proposed technique is demonstrated experimentally using an aluminum plate instrumented with a spatially distributed array of piezoelectric sensors and with simulated damage.",
"title": ""
},
{
"docid": "5b3ca1cc607d2e8f0394371f30d9e83a",
"text": "We present a machine learning algorithm that takes as input a 2D RGB image and synthesizes a 4D RGBD light field (color and depth of the scene in each ray direction). For training, we introduce the largest public light field dataset, consisting of over 3300 plenoptic camera light fields of scenes containing flowers and plants. Our synthesis pipeline consists of a convolutional neural network (CNN) that estimates scene geometry, a stage that renders a Lambertian light field using that geometry, and a second CNN that predicts occluded rays and non-Lambertian effects. Our algorithm builds on recent view synthesis methods, but is unique in predicting RGBD for each light field ray and improving unsupervised single image depth estimation by enforcing consistency of ray depths that should intersect the same scene point.",
"title": ""
},
{
"docid": "29e1a872da2b6432b30d4620a9cd692b",
"text": "Fibromyalgia and depression might represent two manifestations of affective spectrum disorder. They share similar pathophysiology and are largely targeted by the same drugs with dual action on serotoninergic and noradrenergic systems. Here, we review evidence for genetic and environmental factors that predispose, precipitate, and perpetuate fibromyalgia and depression and include laboratory findings on the role of depression in fibromyalgia. Further, we comment on several aspects of fibromyalgia which support the development of reactive depression, substantially more so than in other chronic pain syndromes. However, while sharing many features with depression, fibromyalgia is associated with somatic comorbidities and absolutely defined by fluctuating spontaneous widespread pain. Fibromyalgia may, therefore, be more appropriately grouped together with other functional pain disorders, while psychologically distressed subgroups grouped additionally or solely with affective spectrum disorders.",
"title": ""
},
{
"docid": "881de4b66bdba0a45caaa48a13b33388",
"text": "This paper describes a Di e-Hellman based encryption scheme, DHAES. The scheme is as e cient as ElGamal encryption, but has stronger security properties. Furthermore, these security properties are proven to hold under appropriate assumptions on the underlying primitive. We show that DHAES has not only the \\basic\" property of secure encryption (namely privacy under a chosen-plaintext attack) but also achieves privacy under both non-adaptive and adaptive chosenciphertext attacks. (And hence it also achieves non-malleability.) DHAES is built in a generic way from lower-level primitives: a symmetric encryption scheme, a message authentication code, group operations in an arbitrary group, and a cryptographic hash function. In particular, the underlying group may be an elliptic-curve group or the multiplicative group of integers modulo a prime number. The proofs of security are based on appropriate assumptions about the hardness of the Di e-Hellman problem and the assumption that the underlying symmetric primitives are secure. The assumptions are all standard in the sense that no random oracles are involved. We suggest that DHAES provides an attractive starting point for developing public-key encryption standards based on the Di e-Hellman assumption.",
"title": ""
},
{
"docid": "bffa6ec262531b92d86a8f4c7725cb22",
"text": "Vehicular Ad-Hoc Networks (VANETs) enable communication among vehicles as well as between vehicles and roadside infrastructures. Currently available software tools for VANET research still lack the ability to asses the usability of vehicular applications. In this article, we present <u>Tra</u>ffic <u>C</u>ontrol <u>I</u>nterface (TraCI) a technique for interlinking road traffic and network simulators. It permits us to control the behavior of vehicles during simulation runtime, and consequently to better understand the influence of VANET applications on traffic patterns.\n In contrast to the existing approaches, i.e., generating mobility traces that are fed to a network simulator as static input files, the online coupling allows the adaptation of drivers' behavior during simulation runtime. This technique is not limited to a special traffic simulator or to a special network simulator. We introduce a general framework for controlling the mobility which is adaptable towards other research areas.\n We describe the basic concept, design decisions and the message format of this open-source architecture. Additionally, we provide implementations for non-commercial traffic and network simulators namely SUMO and ns2, respectively. This coupling enables for the first time systematic evaluations of VANET applications in realistic settings.",
"title": ""
},
{
"docid": "b96a3320940344dea37f5deccf0e16b2",
"text": "This paper proposes a modulated hysteretic current control (MHCC) technique to improve the transient response of a DC-DC boost converter, which suffers from low bandwidth due to the existence of the right-half-plane (RHP) zero. The MHCC technique can automatically adjust the on-time value to rapidly increase the inductor current, as well as to shorten the transient response time. In addition, based on the characteristic of the RHP zero, the compensation poles and zero are deliberately adjusted to achieve fast transient response in case of load transient condition and adequate phase margin in steady state. Experimental results show the improvement of transient recovery time over 7.2 times in the load transient response compared with the conventional boost converter design when the load current changes from light to heavy or vice versa. The power consumption overhead is merely 1%.",
"title": ""
},
{
"docid": "0d6960b2817f98924f7de3b7d7774912",
"text": "Visual textures have played a key role in image understanding because they convey important semantics of images, and because texture representations that pool local image descriptors in an orderless manner have had a tremendous impact in diverse applications. In this paper we make several contributions to texture understanding. First, instead of focusing on texture instance and material category recognition, we propose a human-interpretable vocabulary of texture attributes to describe common texture patterns, complemented by a new describable texture dataset for benchmarking. Second, we look at the problem of recognizing materials and texture attributes in realistic imaging conditions, including when textures appear in clutter, developing corresponding benchmarks on top of the recently proposed OpenSurfaces dataset. Third, we revisit classic texture represenations, including bag-of-visual-words and the Fisher vectors, in the context of deep learning and show that these have excellent efficiency and generalization properties if the convolutional layers of a deep model are used as filter banks. We obtain in this manner state-of-the-art performance in numerous datasets well beyond textures, an efficient method to apply deep features to image regions, as well as benefit in transferring features from one domain to another.",
"title": ""
},
{
"docid": "3dc4384744f2f85983bc58b0a8a241c6",
"text": "OBJECTIVE\nTo define a map of interradicular spaces where miniscrew can be likely placed at a level covered by attached gingiva, and to assess if a correlation between crowding and availability of space exists.\n\n\nMETHODS\nPanoramic radiographs and digital models of 40 patients were selected according to the inclusion criteria. Interradicular spaces were measured on panoramic radiographs, while tooth size-arch length discrepancy was assessed on digital models. Statistical analysis was performed to evaluate if interradicular spaces are influenced by the presence of crowding.\n\n\nRESULTS\nIn the mandible, the most convenient sites for miniscrew insertion were in the spaces comprised between second molars and first premolars; in the maxilla, between first molars and second premolars as well as between canines and lateral incisors and between the two central incisors. The interradicular spaces between the maxillary canines and lateral incisors, and between mandibular first and second premolars revealed to be influenced by the presence of dental crowding.\n\n\nCONCLUSIONS\nThe average interradicular sites map hereby proposed can be used as a general guide for miniscrew insertion at the very beginning of orthodontic treatment planning. Then, the clinician should consider the amount of crowding: if this is large, the actual interradicular space in some areas might be significantly different from what reported on average. Individualized radiographs for every patient are still recommended.",
"title": ""
},
{
"docid": "4eb37f87312ce521c30858f6a97edd59",
"text": "We propose an automatic framework for quality assessment of a photograph as well as analysis of its aesthetic attributes. In contrast to the previous methods that rely on manually designed features to account for photo aesthetics, our method automatically extracts such features using a pretrained deep convolutional neural network (DCNN). To make the DCNN-extracted features more suited to our target tasks of photo quality assessment and aesthetic attribute analysis, we propose a novel feature encoding scheme, which supports vector machines-driven sparse restricted Boltzmann machines, which enhances sparseness of features and discrimination between target classes. Experimental results show that our method outperforms the current state-of-the-art methods in automatic photo quality assessment, and gives aesthetic attribute ratings that can be used for photo editing. We demonstrate that our feature encoding scheme can also be applied to general object classification task to achieve performance gains.",
"title": ""
},
{
"docid": "ca22cd618b9f118b47f5de69c4cb20fa",
"text": "Endoscopy is used for inspection of the inner surface of organs such as the colon. During endoscopic inspection of the colon or colonoscopy, a tiny video camera generates a video signal, which is displayed on a monitor for interpretation in real-time by physicians. In practice, these images are not typically captured, which may be attributed by lack of fully automated tools for capturing, analysis of important contents, and quick and easy retrieval of these contents. This paper presents the description and evaluation results of our novel software that uses new metrics based on image color and motion over time to automatically record all images of an individual endoscopic procedure into a single digitized video file. The software automatically discards out-patient video frames between different endoscopic procedures. We validated our software system on 2464 h of live video (over 265 million frames) from endoscopy units where colonoscopy and upper endoscopy were performed. Our previous classification method achieved a frame-based sensitivity of 100.00%, but only a specificity of 89.22%. Our new method achieved a frame-based sensitivity and specificity of 99.90% and 99.97%, a significant improvement. Our system is robust for day-to-day use in medical practice.",
"title": ""
},
{
"docid": "e083b5fdf76bab5cdc8fcafc77db23f7",
"text": "Working under a model of privacy in which data remains private even from the statistician, we study the tradeoff between privacy guarantees and the risk of the resulting statistical estimators. We develop private versions of classical information-theoretic bounds, in particular those due to Le Cam, Fano, and Assouad. These inequalities allow for a precise characterization of statistical rates under local privacy constraints and the development of provably (minimax) optimal estimation procedures. We provide a treatment of several canonical families of problems: mean estimation and median estimation, multinomial probability estimation, and nonparametric density estimation. For all of these families, we provide lower and upper bounds that match up to constant factors, and exhibit new (optimal) privacy-preserving mechanisms and computationally efficient estimators that achieve the bounds. Additionally, we present a variety of experimental results for estimation problems involving sensitive data, including salaries, censored blog posts and articles, and drug abuse; these experiments demonstrate the importance of deriving optimal procedures.",
"title": ""
},
{
"docid": "5a4d42c1f3361bee4f3db29d1ca203f7",
"text": "In this paper we present a joint content selection and compression model for single-document summarization. The model operates over a phrase-based representation of the source document which we obtain by merging information from PCFG parse trees and dependency graphs. Using an integer linear programming formulation, the model learns to select and combine phrases subject to length, coverage and grammar constraints. We evaluate the approach on the task of generating “story highlights”—a small number of brief, self-contained sentences that allow readers to quickly gather information on news stories. Experimental results show that the model’s output is comparable to human-written highlights in terms of both grammaticality and content.",
"title": ""
},
{
"docid": "97957590d7bec130bac3cf0f0e29cf9a",
"text": "Understanding user acceptance of the Internet, especially the intentions to use Internet commerce and mobile commerce, is important in explaining the fact that these commerce have been growing at an exponential rate in recent years. This paper studies factors of new technology to better understand and manage the electronic commerce activities. The theoretical model proposed in this paper is intended to clarify the factors as they are related to the technology acceptance model. More specifically, the relationship among trust and other factors are hypothesized. Using the technology acceptance model, this research reveals the importance of the hedonic factor. The result of this research implies that the ways of stimulating and facilitating customers' participation in mobile commerce should be differentiated from those in Internet commerce",
"title": ""
},
{
"docid": "c6d69e1e382e5ca8d84f0a477f838485",
"text": "Multivariable regression models are powerful tools that are used frequently in studies of clinical outcomes. These models can use a mixture of categorical and continuous variables and can handle partially observed (censored) responses. However, uncritical application of modelling techniques can result in models that poorly fit the dataset at hand, or, even more likely, inaccurately predict outcomes on new subjects. One must know how to measure qualities of a model's fit in order to avoid poorly fitted or overfitted models. Measurement of predictive accuracy can be difficult for survival time data in the presence of censoring. We discuss an easily interpretable index of predictive discrimination as well as methods for assessing calibration of predicted survival probabilities. Both types of predictive accuracy should be unbiasedly validated using bootstrapping or cross-validation, before using predictions in a new data series. We discuss some of the hazards of poorly fitted and overfitted regression models and present one modelling strategy that avoids many of the problems discussed. The methods described are applicable to all regression models, but are particularly needed for binary, ordinal, and time-to-event outcomes. Methods are illustrated with a survival analysis in prostate cancer using Cox regression.",
"title": ""
},
{
"docid": "e4c1342b2405cc7401e1f929c6c41011",
"text": "This paper introduces a protocol for the measuremen t of shoulder movement that uses a motion analysis ba sed technique and the proposed standards of the Interna tional Society of Biomechanics. The protocol demonstrates e ff ctive dynamic tracking of shoulder movements in 3D, inclu ding the movement of the thorax relative to the global coord inate system, the humerus relative to the thorax, the scapula rel ative to the thorax, the sternoclavicular joint, the acromioclavicular joint and the glenohumeral joint. This measurement protocol mu st be further tested for accuracy and repeatability using motion and imaging data from existing methods developed prior to the ISB recommendations. It is proposed to apply the valid ated model to assess pathological shoulder movement and function with the aim of developing a valuable clinical diagnostic tool t o aid surgeons in identifying optimum treatment strategies. Keywords-shoulder complex; measurement technique; motion analysis; ISB recommendations.",
"title": ""
},
{
"docid": "2d2522804c95a4a28f64358151f457ea",
"text": "On the battlefields of the future, multitudes of intelligent things will be communicating, acting, and collaborating with one another and with human warfighters. This will demand major advances in science and technology. With the growth of the Internet of Things (IoT), it's clear that industry and military IoT applications need to operate at a very large scale. Here we learn about the Internet of Battle Things (IoBT) and the unique set of challenges the military faces while under threat from adversaries.",
"title": ""
},
{
"docid": "d7527aeeb5f26f23930b8d674beb0a13",
"text": "A three-part investigation was conducted to explore the meaning of color preferences. Phase 1 used a Q-sort technique to assess intra-individual stability of preferences over 5 wk. Phase 2 used principal components analysis to discern the manner in which preferences were being made. Phase 3 used canonical correlation to evaluate a hypothesized relationship between color preferences and personality, with five scales of the Personality Research Form serving as the criterion measure. Munsell standard papers, a standard light source, and a color vision test were among control devices applied. There were marked differences in stability of color preferences. Sex differences in intra-individual stability were also apparent among the 90 subjects. An interaction of hue and lightness appeared to underlie such judgments when saturation was kept constant. An unexpected breakdown in control pointed toward the possibly powerful effect of surface finish upon color preference. No relationship to five manifest needs were found. It was concluded that the beginning steps had been undertaken toward psychometric development of a reliable technique for the measurement of color preference.",
"title": ""
},
{
"docid": "3b2a3fc20a03d829e4c019fbdbc0f2ae",
"text": "First cars equipped with 24 GHz short range radar (SRR) systems in combination with 77 GHz long range radar (LRR) system enter the market in autumn 2005 enabling new safety and comfort functions. In Europe the 24 GHz ultra wideband (UWB) frequency band is temporally allowed only till end of June 2013 with a limitation of the car pare penetration of 7%. From middle of 2013 new cars have to be equipped with SRR sensors which operate in the frequency band of 79 GHz (77 GHz to 81 GHz). The development of the 79 GHz SRR technology within the German government (BMBF) funded project KOKON is described",
"title": ""
},
{
"docid": "30155768fd0b1b0950510487840defba",
"text": "Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures. In this setting, a tenant temporarily uses a piece of virtually dedicated software, platform, or infrastructure. To fully benefit from the cloud, tenants are seeking to build controlled and secure collaboration with each other. In this paper, we propose a Multi-Tenant Role-Based Access Control (MT-RBAC) model family which aims to provide fine-grained authorization in collaborative cloud environments by building trust relations among tenants. With an established trust relation in MT-RBAC, the trustee can precisely authorize cross-tenant accesses to the truster's resources consistent with constraints over the trust relation and other components designated by the truster. The users in the trustee may restrictively inherit permissions from the truster so that multi-tenant collaboration is securely enabled. Using SUN's XACML library, we prototype MT-RBAC models on a novel Authorization as a Service (AaaS) platform with the Joyent commercial cloud system. The performance and scalability metrics are evaluated with respect to an open source cloud storage system. The results show that our prototype incurs only 0.016 second authorization delay for end users on average and is scalable in cloud environments.",
"title": ""
}
] | scidocsrr |
af6b29a103dba800f2fec5f4f879c16a | Most liked, fewest friends: patterns of enterprise social media use | [
{
"docid": "d489bd0fbf14fdad30b5a59190c86078",
"text": "This research investigates two competing hypotheses from the literature: 1) the Social Enhancement (‘‘Rich Get Richer’’) hypothesis that those more popular offline augment their popularity by increasing it on Facebook , and 2) the ‘‘Social Compensation’’ (‘‘Poor Get Richer’’) hypothesis that users attempt to increase their Facebook popularity to compensate for inadequate offline popularity. Participants (n= 614) at a large, urban university in the Midwestern United States completed an online survey. Results are that a subset of users, those more extroverted and with higher self-esteem, support the Social Enhancement hypothesis, being more popular both offline and on Facebook . Another subset of users, those less popular offline, support the Social Compensation hypotheses because they are more introverted, have lower self-esteem and strive more to look popular on Facebook . Semantic network analysis of open-ended responses reveals that these two user subsets also have different meanings for offline and online popularity. Furthermore, regression explains nearly twice the variance in offline popularity as in Facebook popularity, indicating the latter is not as socially grounded or defined as offline popularity.",
"title": ""
}
] | [
{
"docid": "f3471acc1405bbd9546cc8ec42267053",
"text": "The authors examined the association between semen quality and caffeine intake among 2,554 young Danish men recruited when they were examined to determine their fitness for military service in 2001-2005. The men delivered a semen sample and answered a questionnaire including information about caffeine intake from various sources, from which total caffeine intake was calculated. Moderate caffeine and cola intakes (101-800 mg/day and < or =14 0.5-L bottles of cola/week) compared with low intake (< or =100 mg/day, no cola intake) were not associated with semen quality. High cola (>14 0.5-L bottles/week) and/or caffeine (>800 mg/day) intake was associated with reduced sperm concentration and total sperm count, although only significant for cola. High-intake cola drinkers had an adjusted sperm concentration and total sperm count of 40 mill/mL (95% confidence interval (CI): 32, 51) and 121 mill (95% CI: 92, 160), respectively, compared with 56 mill/mL (95% CI: 50, 64) and 181 mill (95% CI: 156, 210) in non-cola-drinkers, which could not be attributed to the caffeine they consumed because it was <140 mg/day. Therefore, the authors cannot exclude the possibility of a threshold above which cola, and possibly caffeine, negatively affects semen quality. Alternatively, the less healthy lifestyle of these men may explain these findings.",
"title": ""
},
{
"docid": "f68b11af8958117f75fc82c40c51c395",
"text": "Uncertainty accompanies our life processes and covers almost all fields of scientific studies. Two general categories of uncertainty, namely, aleatory uncertainty and epistemic uncertainty, exist in the world. While aleatory uncertainty refers to the inherent randomness in nature, derived from natural variability of the physical world (e.g., random show of a flipped coin), epistemic uncertainty origins from human's lack of knowledge of the physical world, as well as ability of measuring and modeling the physical world (e.g., computation of the distance between two cities). Different kinds of uncertainty call for different handling methods. Aggarwal, Yu, Sarma, and Zhang et al. have made good surveys on uncertain database management based on the probability theory. This paper reviews multidisciplinary uncertainty processing activities in diverse fields. Beyond the dominant probability theory and fuzzy theory, we also review information-gap theory and recently derived uncertainty theory. Practices of these uncertainty handling theories in the domains of economics, engineering, ecology, and information sciences are also described. It is our hope that this study could provide insights to the database community on how uncertainty is managed in other disciplines, and further challenge and inspire database researchers to develop more advanced data management techniques and tools to cope with a variety of uncertainty issues in the real world.",
"title": ""
},
{
"docid": "d8e1410ec6573bd1fa09091e123f53be",
"text": "In the last years the protection and safeguarding of cultural heritage has become a key issue of European cultural policy and this applies not only to tangible artefacts (monuments, sites, etc.), but also to intangible cultural expressions (singing, dancing, etc.). The i-Treasures project focuses on some Intangible Cultural Heritages (ICH) and investigates whether and to what extent new technology can play a role in the preservation and dissemination of these expressions. To this aim, the project will develop a system, based on cutting edge technology and sensors, that digitally captures the performances of living human treasures, analyses the digital information to semantically index the performances and their constituting elements, and builds an educational platform on top of the semantically indexed content. The main purpose of this paper is to describe how the user requirements of this system were defined. The requirements definition process was based on a participatory approach, where ICH experts, performers and users were actively involved through surveys and interviews, and extensively collaborated in the complex tasks of identifying specificities of rare traditional know-how, discovering existing teaching and learning practices and finally identifying the most cutting edge technologies able to support innovative teaching and learning approaches to ICH.",
"title": ""
},
{
"docid": "b7189c1b1dc625fb60a526d81c0d0a89",
"text": "This paper presents a development of an anthropomorphic robot hand, `KITECH Hand' that has 4 full-actuated fingers. Most robot hands have small size simultaneously many joints as compared with robot manipulators. Components of actuator, gear, and sensors used for building robots are not small and are expensive, and those make it difficult to build a small sized robot hand. Differently from conventional development of robot hands, KITECH hand adopts a RC servo module that is cheap, easily obtainable, and easy to handle. The RC servo module that have been already used for several small sized humanoid can be new solution of building small sized robot hand with many joints. The feasibility of KITECH hand in object manipulation is shown through various experimental results. It is verified that the modified RC servo module is one of effective solutions in the development of a robot hand.",
"title": ""
},
{
"docid": "3b2376110b0e6949379697b7ba6730b5",
"text": "............................................................................................................................... i Acknowledgments............................................................................................................... ii Table of",
"title": ""
},
{
"docid": "40fbee18e4b0eca3f2b9ad69119fec5d",
"text": "Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sites, are occurring with increasing frequency and are causing considerable harm to victims. In this paper we describe the design and evaluation of an embedded training email system that teaches people about phishing during their normal use of email. We conducted lab experiments contrasting the effectiveness of standard security notices about phishing with two embedded training designs we developed. We found that embedded training works better than the current practice of sending security notices. We also derived sound design principles for embedded training systems.",
"title": ""
},
{
"docid": "75642d6a79f6b9bb8b02f6d8ded6a370",
"text": "Spectral indices as a selection tool in plant breeding could improve genetic gains for different important traits. The objectives of this study were to assess the potential of using spectral reflectance indices (SRI) to estimate genetic variation for in-season biomass production, leaf chlorophyll, and canopy temperature (CT) in wheat (Triticum aestivum L.) under irrigated conditions. Three field experiments, GHIST (15 CIMMYT globally adapted historic genotypes), RILs1 (25 recombinant inbred lines [RILs]), and RILs2 (36 RILs) were conducted under irrigated conditions at the CIMMYT research station in northwest Mexico in three different years. Five SRI were evaluated to differentiate genotypes for biomass production. In general, genotypic variation for all the indices was significant. Near infrared radiation (NIR)–based indices gave the highest levels of associationwith biomass production and the higher associations were observed at heading and grainfilling, rather than at booting. Overall, NIR-based indices were more consistent and differentiated biomass more effectively compared to the other indices. Indices based on ratio of reflection spectra correlatedwith SPADchlorophyll values, and the associationwas stronger at the generative growth stages. These SRI also successfully differentiated the SPAD values at the genotypic level. The NIR-based indices showed a strong and significant association with CT at the heading and grainfilling stages. These results demonstrate the potential of using SRI as a breeding tool to select for increased genetic gains in biomass and chlorophyll content, plus for cooler canopies. SIGNIFICANT PROGRESS in grain yield of spring wheat under irrigated conditions has been made through the classical breeding approach (Slafer et al., 1994), even though the genetic basis of yield improvement in wheat is not well established (Reynolds et al., 1999). Several authors have reported that progress in grain yield is mainly attributed to better partitioning of photosynthetic products (Waddington et al., 1986; Calderini et al., 1995; Sayre et al., 1997). The systematic increase in the partitioning of assimilates (harvest index) has a theoretical upper limit of approximately 60% (Austin et al., 1980). Further yield increases in wheat through improvement in harvest index will be limited without a further increase in total crop biomass (Austin et al., 1980; Slafer and Andrade, 1991; Reynolds et al., 1999). Though until relatively recently biomass was not commonly associated with yield gains, increases in biomass of spring wheat have been reported (Waddington et al., 1986; Sayre et al., 1997) and more recently in association with yield increases (Singh et al., 1998; Reynolds et al., 2005; Shearman et al., 2005). Thus, a breeding approach is needed that will select genotypes with higher biomass capacity, while maintaining the high partitioning rate of photosynthetic products. Direct estimation of biomass is a timeand laborintensive undertaking. Moreover, destructive in-season sampling involves large sampling errors (Whan et al., 1991) and reduces the final area for estimation of grain yield and final biomass. Regan et al. (1992) demonstrated a method to select superior genotypes of spring wheat for early vigor under rainfed conditions using a destructive sampling technique, but such sampling is impossible for breeding programs where a large number of genotypes are being screened for various desirable traits. Spectral reflectance indices are a potentially rapid technique that could assess biomass at the genotypic level without destructive sampling (Elliott and Regan, 1993; Smith et al., 1993; Bellairs et al., 1996; Peñuelas et al., 1997). Canopy light reflectance properties based mainly on the absorption of light at a specific wavelength are associated with specific plant characteristics. The spectral reflectance in the visible (VIS) wavelengths (400–700 nm) depends on the absorption of light by leaf chlorophyll and associated pigments such as carotenoid and anthocyanins. The reflectance of the VIS wavelengths is relatively low because of the high absorption of light energy by these pigments. In contrast, the reflectance of theNIR wavelengths (700–1300 nm) is high, since it is not absorbed by plant pigments and is scattered by plant tissue at different levels in the canopy, such that much of it is reflected back rather than being absorbed by the soil (Knipling, 1970). Spectral reflectance indices were developed on the basis of simple mathematical formula, such as ratios or differences between the reflectance at given wavelengths (Araus et al., 2001). Simple ratio (SR 5 NIR/VIS) and the normalized difference vegetation M.A. Babar, A.R. Klatt, and W.R. Raun, Department of Plant and Soil Sciences, 368 Ag. Hall, Oklahoma State University, Stillwater, OK 74078, USA; M.P. Reynolds, International Maize and Wheat Improvement Center (CIMMYT), Km. 45, Carretera Mexico, El Batan, Texcoco, Mexico; M. van Ginkel, Department of Primary Industries (DPI), Private Bag 260, Horsham, Victoria, Postcode: 3401, DX Number: 216515, Australia; M.L. Stone, Department of Biosystems and Agricultural Engineering, Oklahoma State University, Stillwater, OK 74078, USA. This research was partially funded by the Oklahoma Wheat Research Foundation (OWRF), Oklahoma Wheat Commission, and CIMMYT (International Maize and Wheat Improvement Center), Mexico. Received 11 Mar. 2005. *Corresponding author (mreynolds@cgiar.org). Published in Crop Sci. 46:1046–1057 (2006). Crop Breeding & Genetics doi:10.2135/cropsci2005.0211 a Crop Science Society of America 677 S. Segoe Rd., Madison, WI 53711 USA Abbreviations: CT, canopy temperature; CTD, canopy temperature depression; GHIST, global historic; NDVI, normalized difference vegetation index; NIR, near infrared radiation; NWI-1, normalized water index-1; NWI-2, normalized water index-2; PSSRa, pigment specific simple ratio-chlorophyll a; RARSa, ratio analysis of reflectance spectra-chlorophyll a; RARSb, ratio analysis of reflectance spectra-chlorophyll b; RARSc, ratio analysis of reflectance spectracarotenoids; RILs, recombinant inbred lines; SR, simple ratio; SRI, spectral reflectance indices; WI, water index. R e p ro d u c e d fr o m C ro p S c ie n c e . P u b lis h e d b y C ro p S c ie n c e S o c ie ty o f A m e ri c a . A ll c o p y ri g h ts re s e rv e d . 1046 Published online March 27, 2006",
"title": ""
},
{
"docid": "d725c63647485fd77412f16e1f6485f2",
"text": "The ongoing discussions about a „digital revolution― and ―disruptive competitive advantages‖ have led to the creation of such a business vision as ―Industry 4.0‖. Yet, the term and even more its actual impact on businesses is still unclear.This paper addresses this gap and explores more specifically, the consequences and potentials of Industry 4.0 for the procurement, supply and distribution management functions. A blend of literature-based deductions and results from a qualitative study are used to explore the phenomenon.The findings indicate that technologies of Industry 4.0 legitimate the next level of maturity in procurement (Procurement &Supply Management 4.0). Empirical findings support these conceptual considerations, revealing the ambitious expectations.The sample comprises seven industries and the employed method is qualitative (telephone and face-to-face interviews). The empirical findings are only a basis for further quantitative investigation , however, they support the necessity and existence of the maturity level. The findings also reveal skepticism due to high investment costs but also very high expectations. As recent studies about digitalization are rather rare in the context of single company functions, this research work contributes to the understanding of digitalization and supply management.",
"title": ""
},
{
"docid": "bf57a5fcf6db7a9b26090bd9a4b65784",
"text": "Plate osteosynthesis is still recognized as the treatment of choice for most articular fractures, many metaphyseal fractures, and certain diaphyseal fractures such as in the forearm. Since the 1960s, both the techniques and implants used for internal fixation with plates have evolved to provide for improved healing. Most recently, plating methods have focused on the principles of 'biological fixation'. These methods attempt to preserve the blood supply to improve the rate of fracture healing, decrease the need for bone grafting, and decrease the incidence of infection and re-fracture. The purpose of this article is to provide a brief overview of the history of plate osteosynthesis as it relates to the development of the latest minimally invasive surgical techniques.",
"title": ""
},
{
"docid": "a9709367bc84ececd98f65ed7359f6b0",
"text": "Though many tools are available to help programmers working on change tasks, and several studies have been conducted to understand how programmers comprehend systems, little is known about the specific kinds of questions programmers ask when evolving a code base. To fill this gap we conducted two qualitative studies of programmers performing change tasks to medium to large sized programs. One study involved newcomers working on assigned change tasks to a medium-sized code base. The other study involved industrial programmers working on their own change tasks on code with which they had experience. The focus of our analysis has been on what information a programmer needs to know about a code base while performing a change task and also on howthey go about discovering that information. Based on this analysis we catalog and categorize 44 different kinds of questions asked by our participants. We also describe important context for how those questions were answered by our participants, including their use of tools.",
"title": ""
},
{
"docid": "fc55bae802e8b82f79bbb381f7bcf30b",
"text": "In order to improve the efficiency of Apriori algorithm for mining frequent item sets, MH-Apriori algorithm was designed for big data to address the poor efficiency problem. MH-Apriori takes advantages of MapReduce and HBase together to optimize Apriori algorithm. Compared with the improved Apriori algorithm simply based on MapReduce framework, timestamp of HBase is utilized in this algorithm to avoid generating a large number of key/value pairs. It saves the pattern matching time and scans the database only once. Also, to obtain transaction marks automatically, transaction mark column is added to set list for computing support numbers. MH-Apriori was executed on Hadoop platform. The experimental results show that MH-Apriori has higher efficiency and scalability.",
"title": ""
},
{
"docid": "565efa7a51438990b3d8da6222dca407",
"text": "The collection of huge amount of tracking data made possible by the widespread use of GPS devices, enabled the analysis of such data for several applications domains, ranging from traffic management to advertisement and social studies. However, the raw positioning data, as it is detected by GPS devices, lacks of semantic information since this data does not natively provide any additional contextual information like the places that people visited or the activities performed. Traditionally, this information is collected by hand filled questionnaire where a limited number of users are asked to annotate their tracks with the activities they have done. With the purpose of getting large amount of semantically rich trajectories, we propose an algorithm for automatically annotating raw trajectories with the activities performed by the users. To do this, we analyse the stops points trying to infer the Point Of Interest (POI) the user has visited. Based on the category of the POI and a probability measure based on the gravity law, we infer the activity performed. We experimented and evaluated the method in a real case study of car trajectories, manually annotated by users with their activities. Experimental results are encouraging and will drive our future works.",
"title": ""
},
{
"docid": "310aa0a02f8fc8b7b6d31c987a12a576",
"text": "We describe a novel markerless camera tracking approach and user interaction methodology for augmented reality (AR) on unprepared tabletop environments. We propose a real-time system architecture that combines two types of feature tracking. Distinctive image features of the scene are detected and tracked frame-to-frame by computing optical flow. In order to achieve real-time performance, multiple operations are processed in a synchronized multi-threaded manner: capturing a video frame, tracking features using optical flow, detecting distinctive invariant features, and rendering an output frame. We also introduce user interaction methodology for establishing a global coordinate system and for placing virtual objects in the AR environment by tracking a user's outstretched hand and estimating a camera pose relative to it. We evaluate the speed and accuracy of our hybrid feature tracking approach, and demonstrate a proof-of-concept application for enabling AR in unprepared tabletop environments, using bare hands for interaction.",
"title": ""
},
{
"docid": "eb5f2e4a1b01a67516089bbfecc0ab8a",
"text": "With the fast development of digital systems and concomitant information technologies, there is certainly an incipient spirit in the extensive overall economy to put together digital Customer Relationship Management (CRM) systems. This slanting is further more palpable in the telecommunications industry, in which businesses turn out to be increasingly digitalized. Customer churn prediction is a foremost aspect of a contemporary telecom CRM system. Churn prediction model leads the customer relationship management to retain the customers who will be possible to give up. Currently scenario, a lot of outfit and monitored classifiers and data mining techniques are employed to model the churn prediction in telecom. Within this paper, Kernelized Extreme Learning Machine (KELM) algorithm is proposed to categorize customer churn patterns in telecom industry. The primary strategy of proposed work is organized the data from telecommunication mobile customer’s dataset. The data preparation is conducted by using preprocessing with Expectation Maximization (EM) clustering algorithm. After that, customer churn behavior is examined by using Naive Bayes Classifier (NBC) in accordance with the four conditions like customer dissatisfaction (H1), switching costs (H2), service usage (H3) and customer status (H4). The attributes originate from call details and customer profiles which is enhanced the precision of customer churn prediction in the telecom industry. The attributes are measured using BAT algorithm and KELM algorithm used for churn prediction. The experimental results prove that proposed model is better than AdaBoost and Hybrid Support Vector Machine (HSVM) models in terms of the performance of ROC, sensitivity, specificity, accuracy and processing time.",
"title": ""
},
{
"docid": "5d1fbf1b9f0529652af8d28383ce9a34",
"text": "Automatic License Plate Recognition (ALPR) is one of the most prominent tools in intelligent transportation system applications. In ALPR algorithm implementation, License Plate Detection (LPD) is a critical stage. Despite many state-of-the-art researches, some parameters such as low/high illumination, type of camera, or a different style of License Plate (LP) causes LPD step is still a challenging problem. In this paper, we propose a new style-free method based on the cross power spectrum. Our method has three steps; designing adaptive binarized filter, filtering using cross power spectrum and verification. Experimental results show that the recognition accuracy of the proposed approach is 98% among 2241 Iranian cars images including two styles of the LP. In addition, the process of the plate detection takes 44 milliseconds, which is suitable for real-time processing.",
"title": ""
},
{
"docid": "11c7fba6fcbf36cc1187c1cfd07c91f9",
"text": "We describe a real-time bidding algorithm for performance-based display ad allocation. A central issue in performance display advertising is matching campaigns to ad impressions, which can be formulated as a constrained optimization problem that maximizes revenue subject to constraints such as budget limits and inventory availability. The current practice is to solve the optimization problem offline at a tractable level of impression granularity (e.g., the page level), and to serve ads online based on the precomputed static delivery scheme. Although this offline approach takes a global view to achieve optimality, it fails to scale to ad allocation at the individual impression level. Therefore, we propose a real-time bidding algorithm that enables fine-grained impression valuation (e.g., targeting users with real-time conversion data), and adjusts value-based bids according to real-time constraint snapshots (e.g., budget consumption levels). Theoretically, we show that under a linear programming (LP) primal-dual formulation, the simple real-time bidding algorithm is indeed an online solver to the original primal problem by taking the optimal solution to the dual problem as input. In other words, the online algorithm guarantees the offline optimality given the same level of knowledge an offline optimization would have. Empirically, we develop and experiment with two real-time bid adjustment approaches to adapting to the non-stationary nature of the marketplace: one adjusts bids against real-time constraint satisfaction levels using control-theoretic methods, and the other adjusts bids also based on the statistically modeled historical bidding landscape. Finally, we show experimental results with real-world ad delivery data that support our theoretical conclusions.",
"title": ""
},
{
"docid": "5158b5da8a561799402cb1ef3baa3390",
"text": "We study the segmental recurrent neural network for end-to-end acoustic modelling. This model connects the segmental conditional random field (CRF) with a recurrent neural network (RNN) used for feature extraction. Compared to most previous CRF-based acoustic models, it does not rely on an external system to provide features or segmentation boundaries. Instead, this model marginalises out all the possible segmentations, and features are extracted from the RNN trained together with the segmental CRF. In essence, this model is self-contained and can be trained end-to-end. In this paper, we discuss practical training and decoding issues as well as the method to speed up the training in the context of speech recognition. We performed experiments on the TIMIT dataset. We achieved 17.3% phone error rate (PER) from the first-pass decoding — the best reported result using CRFs, despite the fact that we only used a zeroth-order CRF and without using any language model.",
"title": ""
},
{
"docid": "c04065ff9cbeba50c0d70e30ab2e8b53",
"text": "A linear model is suggested for the influence of covariates on the intensity function. This approach is less vulnerable than the Cox model to problems of inconsistency when covariates are deleted or the precision of covariate measurements is changed. A method of non-parametric estimation of regression functions is presented. This results in plots that may give information on the change over time in the influence of covariates. A test method and two goodness of fit plots are also given. The approach is illustrated by simulation as well as by data from a clinical trial of treatment of carcinoma of the oropharynx.",
"title": ""
},
{
"docid": "8e071cfeaf33444e9f85f6bfcb8fa51b",
"text": "BACKGROUND\nLutein is a carotenoid that may play a role in eye health. Human milk typically contains higher concentrations of lutein than infant formula. Preliminary data suggest there are differences in serum lutein concentrations between breastfed and formula-fed infants.\n\n\nAIM OF THE STUDY\nTo measure the serum lutein concentrations among infants fed human milk or formulas with and without added lutein.\n\n\nMETHODS\nA prospective, double-masked trial was conducted in healthy term formula-fed infants (n = 26) randomized between 9 and 16 days of age to study formulas containing 20 (unfortified), 45, 120, and 225 mcg/l of lutein. A breastfed reference group was studied (n = 14) and milk samples were collected from their mothers. Primary outcome was serum lutein concentration at week 12.\n\n\nRESULTS\nGeometric mean lutein concentration of human milk was 21.1 mcg/l (95% CI 14.9-30.0). At week 12, the human milk group had a sixfold higher geometric mean serum lutein (69.3 mcg/l; 95% CI 40.3-119) than the unfortified formula group (11.3 mcg/l; 95% CI 8.1-15.8). Mean serum lutein increased from baseline in each formula group except the unfortified group. Linear regression equation indicated breastfed infants had a greater increase in serum lutein (slope 3.7; P < 0.001) per unit increase in milk lutein than formula-fed infants (slope 0.9; P < 0.001).\n\n\nCONCLUSIONS\nBreastfed infants have higher mean serum lutein concentrations than infants who consume formula unfortified with lutein. These data suggest approximately 4 times more lutein is needed in infant formula than in human milk to achieve similar serum lutein concentrations among breastfed and formula fed infants.",
"title": ""
}
] | scidocsrr |
9f99b2d000704a31a907efa3bb26ff3e | Deep Spatial Pyramid Match Kernel for Scene Classification | [
{
"docid": "5116079b69aeb1858177429fabd10f80",
"text": "Deep convolutional neural networks (CNN) have shown their promise as a universal representation for recognition. However, global CNN activations at present lack geometric invariance, which limits their robustness for tasks such as classification and matching of highly variable scenes. To improve the invariance of CNN activations without degrading their discriminative power, this paper presents a simple but effective scheme called multi-scale orderless pooling (or MOP-CNN for short). This approach works by extracting CNN activations for local patches at multiple scales, followed by orderless VLAD pooling of these activations at each scale level and concatenating the result. This feature representation decisively outperforms global CNN activations and achieves state-of-the-art performance for scene classification on such challenging benchmarks as SUN397, MIT Indoor Scenes, and ILSVRC2012, as well as for instance-level retrieval on the Holidays dataset.",
"title": ""
},
{
"docid": "66a1a943580cdd300f9579e80f258a2e",
"text": "The rise of multi-million-item dataset initiatives has enabled data-hungry machine learning algorithms to reach near-human semantic classification performance at tasks such as visual object and scene recognition. Here we describe the Places Database, a repository of 10 million scene photographs, labeled with scene semantic categories, comprising a large and diverse list of the types of environments encountered in the world. Using the state-of-the-art Convolutional Neural Networks (CNNs), we provide scene classification CNNs (Places-CNNs) as baselines, that significantly outperform the previous approaches. Visualization of the CNNs trained on Places shows that object detectors emerge as an intermediate representation of scene classification. With its high-coverage and high-diversity of exemplars, the Places Database along with the Places-CNNs offer a novel resource to guide future progress on scene recognition problems.",
"title": ""
}
] | [
{
"docid": "a5ac7aa3606ebb683d4d9de5dcd89856",
"text": "Advanced persistent threats (APTs) pose a significant risk to nearly every infrastructure. Due to the sophistication of these attacks, they are able to bypass existing security systems and largely infiltrate the target network. The prevention and detection of APT campaigns is also challenging, because of the fact that the attackers constantly change and evolve their advanced techniques and methods to stay undetected. In this paper we analyze 22 different APT reports and give an overview of the used techniques and methods. The analysis is focused on the three main phases of APT campaigns that allow to identify the relevant characteristics of such attacks. For each phase we describe the most commonly used techniques and methods. Through this analysis we could reveal different relevant characteristics of APT campaigns, for example that the usage of 0-day exploit is not common for APT attacks. Furthermore, the analysis shows that the dumping of credentials is a relevant step in the lateral movement phase for most APT campaigns. Based on the identified characteristics, we also propose concrete prevention and detection approaches that make it possible to identify crucial malicious activities that are performed during APT campaigns.",
"title": ""
},
{
"docid": "ba3315636b720625e7b285b26d8d371a",
"text": "Sharing of physical infrastructure using virtualization presents an opportunity to improve the overall resource utilization. It is extremely important for a Software as a Service (SaaS) provider to understand the characteristics of the business application workload in order to size and place the virtual machine (VM) containing the application. A typical business application has a multi-tier architecture and the application workload is often predictable. Using the knowledge of the application architecture and statistical analysis of the workload, one can obtain an appropriate capacity and a good placement strategy for the corresponding VM. In this paper we propose a tool iCirrus-WoP that determines VM capacity and VM collocation possibilities for a given set of application workloads. We perform an empirical analysis of the approach on a set of business application workloads obtained from geographically distributed data centers. The iCirrus-WoP tool determines the fixed reserved capacity and a shared capacity of a VM which it can share with another collocated VM. Based on the workload variation, the tool determines if the VM should be statically allocated or needs a dynamic placement. To determine the collocation possibility, iCirrus-WoP performs a peak utilization analysis of the workloads. The empirical analysis reveals the possibility of collocating applications running in different time-zones. The VM capacity that the tool recommends, show a possibility of improving the overall utilization of the infrastructure by more than 70% if they are appropriately collocated.",
"title": ""
},
{
"docid": "7f988f0bed497857eac00dd8781a2158",
"text": "BACKGROUND/PURPOSE\nHigh-intensity focused ultrasound (HIFU) has been used for skin tightening. However, there is a rising concern of irreversible adverse effects. Our aim was to evaluate the depth of thermal injury zone after HIFU energy passes through different condition.\n\n\nMATERIALS AND METHODS\nTo analyze the consistency of the HIFU device, phantom tests were performed. Simulations were performed on ex vivo porcine tissues to estimate the area of the thermal coagulation point (TCP) according to the applied energy and skin condition. The experiment was designed in three orientations: normal direction (from epidermis to fascia), reverse direction (from fascia to epidermis), and normal direction without epidermis.\n\n\nRESULTS\nThe TCP was larger and wider depending on the applied fluence and handpieces (HPs). When we measured TCP in different directions, the measured area in the normal direction was more superficially located than that in the reverse direction. The depth of the TCP in the porcine skin without epidermis was detected at 130% deeper than in skin with an intact epidermis.\n\n\nCONCLUSION\nThe affected area by HIFU is dependent on the skin condition and the characteristics of the HP and applied fluence. Considerations of these factors may be the key to minimize the unwanted adverse effects.",
"title": ""
},
{
"docid": "db0cac6172c63eb5b91b2e29d037cc63",
"text": "In this article, we address open challenges in large-scale classification, focusing on how to effectively leverage the dependency structures (hierarchical or graphical) among class labels, and how to make the inference scalable in jointly optimizing all model parameters. We propose two main approaches, namely the hierarchical Bayesian inference framework and the recursive regularization scheme. The key idea in both approaches is to reinforce the similarity among parameter across the nodes in a hierarchy or network based on the proximity and connectivity of the nodes. For scalability, we develop hierarchical variational inference algorithms and fast dual coordinate descent training procedures with parallelization. In our experiments for classification problems with hundreds of thousands of classes and millions of training instances with terabytes of parameters, the proposed methods show consistent and statistically significant improvements over other competing approaches, and the best results on multiple benchmark datasets for large-scale classification.",
"title": ""
},
{
"docid": "07f7a4fe69f6c4a1180cc3ca444a363a",
"text": "With the popularization of IoT (Internet of Things) devices and the continuous development of machine learning algorithms, learning-based IoT malicious traffic detection technologies have gradually matured. However, learning-based IoT traffic detection models are usually very vulnerable to adversarial samples. There is a great need for an automated testing framework to help security analysts to detect errors in learning-based IoT traffic detection systems. At present, most methods for generating adversarial samples require training parameters of known models and are only applicable to image data. To address the challenge, we propose a testing framework for learning-based IoT traffic detection systems, TLTD. By introducing genetic algorithms and some technical improvements, TLTD can generate adversarial samples for IoT traffic detection systems and can perform a black-box test on the systems.",
"title": ""
},
{
"docid": "b7d49cc96fcfe45f33398fa10cda08d8",
"text": "Twitter has proven itself a rich and varied source of language data for linguistic analysis. For Twitter is more than a popular new channel for social interaction in language; in many ways it constitutes a whole new genre of text, as users adapt to its new limitations (140 character messages) and to its novel conventions such as retweeting and hash-tagging. But Twitter presents an opportunity of another kind to computationally-minded researchers of language, a generative opportunity to study how algorithmic systems might exploit linguistic tropes to compose novel, concise and re-tweetable texts of their own. This paper evaluates one such system, a Twitterbot named @MetaphorMagnet that packages its own metaphors and ironic observations as pithy tweets. Moreover, we use @MetaphorMagnet, and the idea of Twitterbots more generally, to explore the relationship of linguistic containers to their contents, to understand the extent to which human readers fill these containers with their own meanings, to see meaning in the outputs of generative systems where none was ever intended. We evaluate this placebo effect by asking human raters to judge the comprehensibility, novelty and aptness of texts tweeted by simple and sophisticated Twitterbots. Tropes: Containers of Meaning A mismatch between a container and its contents can often tell us much more than the content itself, as when a person places the ashes of a deceased relative in a coffee can, or sends a brutal death threat in a Hallmark greeting card. The communicative effectiveness of mismatched containers is just one more reason to be skeptical of the Conduit metaphor (Reddy, 1979) – which views linguistic constructs as containers of propositional content to be faithfully shuttled between speaker and hearer – as a realistic model of human communication. Language involves more than the faithful transmission of logical propositions between information-hungry agents, and more effective communication – of attitude, expectation and creative intent – can often be achieved by abusing our linguistic containers of meaning than by treating them with the sincerity that the Conduit metaphor assumes. Consider the case of verbal irony, in which a speaker deliberately chooses containers that are pragmatically illsuited to the conveyance of their contents. For instance, the advertising container “If you only see one [X] this year, make it this one” assumes that [X] denotes a category of event – such as “romantic comedy” or “movie about superheroes” – with a surfeit of available members for a listener to choose from. When [X] is bound to the phrase “comedy about Anne Frank” or “musical about Nazis”, the container proves too hollow for its content, and the reader is signaled to the presence of playful irony. Though such a film may well be one-of-a-kind, the illfitting container suggests there are good reasons for this singularity that do not speak to X’s quality as an artistic event. Yet if carefully chosen, an apparently inappropriate container can communicate a great deal about a speaker’s relationship to the content conveyed within, and as much again about the speaker’s relationship to their audience. As more practical limitations are placed on the form of linguistic containers, the more incentive one has to exploit or abuse containers for creative ends. Consider the use of Twitter as a communicative medium: writers are limited to micro-texts of no more than 140 characters to convey both their meaning and their attitude to this meaning. So each micro-text, or tweet, becomes more than a container of propositional content: each is a brick in a larger edifice that comprises the writer’s online personae and textual aesthetic. Many Twitter users employ irony and metaphor to build this aesthetic and thus build up a loyal audience of followers for their world view. Yet Twitter challenges many of our assumptions about irony and metaphor. Such devices must be carefully modulated if an audience is to perceive a speaker’s meaning in the playful (mis)match of a linguistic container to its contents. Failure to do so can have serious repercussions when one is communicating to thousands of followers at once, with tweets that demand concision and leave little room for nuance. It is thus not unusual for even creative tweets to come packaged with an explicit tag such as #irony, #sarcasm or #metaphor. Metaphor and irony are much-analysed phenomena in social media, but this paper takes a generative approach, to consider the production rather than the analysis of creative linguistic phenomena in the context of a fullyautonomous computational agent – a Twitterbot – that crafts its own metaphorical and ironical tweets from its own knowledge-base of common-sense facts and beliefs. How might such a system exhibit a sense of irony that human users will find worthy of attention, and how might this system craft interesting metaphoric insights from a knowledge-base of everyday facts that are as banal as they are uncontentious? We shall explore the variety of linguistic containers at the disposal of this agent – a real computational system named @MetaphorMagnet – to better understand how such containers can be playfully exploited to convey ironic, witty or thought-provoking views on the world. With @MetaphorMagnet we aim to show that interesting messages are not crafted from interesting contents, or at least not necessarily so. Rather, effective tweets emerge from an appropriate if nonobvious combination of familiar linguistic containers with unsurprising factual fillers. In support of this view, we shall present an empirical analysis of the assessment of @MetaphorMagnet’s uncurated outputs by human judges. Just as one can often guess the contents of a physical container by its shape, one can often guess the meaning of a linguistic container by its form. We become habituated to familiar containers, and just as we might imagine our own uses for a physical container, we often pour our own meanings into suggestive textual forms. For in language, meaning follows form, and readers will generously infer the presence of meaning in texts that are well-formed and seemingly the product of an intelligent entity, even if this entity is not intelligent and any meaning is not intentional. Remarkably, Twitter shows that we willingly extend this generosity of interpretation to the outputs of bots that we know to be unthinking users of wholly aleatoric methods. Twitterbots exploit this placebo effect – wherein a wellformed linguistic container is presumed to convey a wellfounded semantic content – by serving up linguistic forms that readers tacitly fill with their own meanings. We aim to empirically demonstrate here that readers do more than willingly suspend their disbelief, and that a well-packaged linguistic form can seduce readers into seeing what it not there: a comprehensible meaning, or at least an intent to be meaningful. We do this by evaluating two metaphorgenerating bots side-by-side: a rational, knowledge-based Twitterbot named @MetaphorMagnet vs. an aleatoric and largely knowledge-free bot named @MetaphorMinute. Digital Surrealists: La Règle Du Jeu Most Twitterbots are simple, rule-based systems that use stochastic methods to explore a loosely-defined space of texual forms. Such bots are high-concept, low-complexity text-production mechanisms that transplant the aleatoric techniques of the surrealist poets – from André Breton to William Burroughs and Brion Gysin – into the realms of digital content, social networking and online publishing. Each embodies a language game with its own generative rules, or what Breton called “la règle du jeu.” Yet Breton, Burroughs and Gysin viewed the use of aleatorical rules as merely the first stage of a two-stage creation process: at this first stage, random recombinant methods are used to confect candidate texts in ways that, though unguided by meaning, are also free of the baleful influence of cliché; at the second stage, these candidates are carefully filtered by a human, to select those that are novel and interesting. Most bots implement the first stage and ignore the second, pushing the task of critiquing and filtering candidate texts onto the humans who read and selectively re-tweet them. Nonetheless, some bots achieve surprising effects with the simplest language tools. Consider @Pentametron, a bot that generates accidental poetry by re-tweeting pairs of random tweets of ten syllables apiece (for an iambic pentameter reading) if each ends on a rhyming syllable. When the meaning of each tweet in a couplet coheres with the other, as in “Pathetic people are everywhere” |“Your web-site sucks, @RyanAir”, the sum of tweets produces an emergent meaning that is richer and more resonant than that of either tweet alone. Trending social events such as the Oscars or the Super Bowl are especially conducive to just this kind of synchronicity, as in this fortuitous pairing: “So far the @SuperBowl commercials blow.” | “Not even gonna watch the halftime show.” In contrast, a bot named @MetaphorMinute wears its aleatoric methods on its sleeve, for its tweets – such as “a haiku is a tonsil: peachblow yet snail-paced” – are not so much random metaphors as random metaphor-shaped texts. Using a strategy that stresses quantity over quality, this bot instantiates that standard linguistic container for metaphors – the copula frame “X is a Y” – with mostly random word choices every two minutes. Interestingly, its tweets are as likely to provoke a sense of mystification and ersatz profundity as they are total incomprehension. Yet bots such as @Pentametron and @MetaphorMinute do not generate their texts from the semantic-level up; rather, they manipulate texts at the word-level, and thus lack any sense of the meaning of a tweet, or any rationale for why one tweet might be better – which is to say, more interesting, more apt or more re-tweetable – than others. The Full-FACE poetry generator of Colton ",
"title": ""
},
{
"docid": "c3615c7f39674feea5b84db6d91899ce",
"text": "We describe the successful application of a modified gene-trap approach, the secretory trap, to systematically analyze the functions in vivo of large numbers of genes encoding secreted and membrane proteins. Secretory-trap insertions in embryonic stem cells can be transmitted to the germ line of mice with high efficiency and effectively mutate the target gene. Of 60 insertions analyzed in mice, one-third cause recessive lethal phenotypes affecting various stages of embryonic and postnatal development. Thus, secretory-trap mutagenesis can be used for a genome-wide functional analysis of cell signaling pathways that are critical for normal mammalian development and physiology.",
"title": ""
},
{
"docid": "616ffe5c6cbb6a32a14042d52bd410d3",
"text": "In the demo, we demonstrate a mobile food recognition system with Fisher Vector and liner one-vs-rest SVMs which enable us to record our food habits easily. In the experiments with 100 kinds of food categories, we have achieved the 79.2% classification rate for the top 5 category candidates when the ground-truth bounding boxes are given. The prototype system is open to the public as an Android-based smart-",
"title": ""
},
{
"docid": "c049c79253bd9575774c60b459af4505",
"text": "Ginkgo has been a mainstay of traditional Chinese medicine for more than 5000 years. Perhaps the ancient Taoist Monks had some vision of the future of Ginkgo as a brain and memory tonic when they planted it ceremonially in places of honor in their monasteries. They felt that this two lobed, fan-shaped leaf (biloba) represented the two phases of Yin and Yang in Taoist Philosophy. Ginkgo was planted to portray wisdom, centeredness and a meditative state.",
"title": ""
},
{
"docid": "c317f7a7aff3be8fac194dd01e1989b7",
"text": "We propose a content-aware stereoscopic image display adaptation method which simultaneously resizes a binocular image to the target resolution and adapts its depth to the comfort zone of the display while preserving the perceived shapes of prominent objects. This method does not require depth information or dense correspondences. Given the specification of the target display and a sparse set of correspondences, our method efficiently deforms the input stereoscopic images for display adaptation by solving a least-squares energy minimization problem. This can be used to adjust stereoscopic images to fit displays with different real estates, aspect ratios and comfort zones. In addition, with slight modifications to the energy function, our method allows users to interactively adjust the sizes, locations and depths of the selected objects, giving users aesthetic control for depth perception. User studies show that the method is effective at editing depth and reducing occurrences of diplopia and distortions.",
"title": ""
},
{
"docid": "fd385e4d9f4b654e6db45f341af5c862",
"text": "One of the key principles in agile development is that the team should use continuous feedback cycles to maintain awareness both about the product, the process and the involved people. In healthy agile environments, people see a lot of value in the collection of metrics and in their collaborative analysis to support a continuous improvement process. In pseudo agile environments, metrics are often perceived as a threat and they make people uncomfortable. In theses conditions, they can do more harm than good. In this paper, we argue that the acceptance of a data-driven continuous improvement process is heavily influenced by the nature of the channels through which the metrics are published. We argue for the need to go beyond typical dashboards and propose additional engagement channels. We discuss the notions of awareness and story telling and illustrate them with various experiments conducted with agile teams.",
"title": ""
},
{
"docid": "a3887b3cf223b6a22bff21b66fbc2d45",
"text": "As interfaces progress beyond wearables and into intrinsic human augmentation, the human body has become an increasingly important topic in the field of HCI. Wearables already act as a new layer of functionality located on the body that leads us to rethink the convergence between technology and fashion, not just in terms of the ability to wear, but also in how devices interact with us. Already, several options for wearable technology have emerged in the form of clothing and accessories. However, by applying sensors and other computing devices directly onto the body surface, wearables could also be designed as skin interfaces. In this paper, we review the wearability factors impacting wearables as clothes and accessories in order to discuss them in the context of skin interfaces. We classify these wearability factors in terms of body aspects (location, body movements and body characteristics) and device aspects (weight, attachment methods, accessibility, interaction, aesthetics, conductors, insulation, device care, connection, communication, battery life). We discuss these factors in the context of two different example skin interfaces: a rigid board embedded into special effects makeup and skin-mounted soft materials connected to devices.",
"title": ""
},
{
"docid": "30202ffb86a7c6d47a369870b5811309",
"text": "This paper presents a novel technique for implementing Clothoidal real-time paths for mobile robots. As first step, rational Bezier curves are obtained as approximation of the Fresnel integrals. By rescaling, rotating and translating the previously computed RBC, an on-line Clothoidal path is obtained. In this process, coefficients, weights and control points are kept invariant. This on-line approach guarantees that an RBC has the same behavior as the original Clothoid using a low curve order. The resulting Clothoidal path allows any two arbitrary poses to be joined in a plane. RBCs working as Clothoids are also used to search for the shortest bounded-curvature path with a significant computational cost reduction. In addition to this, the proposed technique is tested on a real mobile robot for trajectory generation and kinematic control. To the authors' knowledge, the present approach is the first technique which allows real-time Clothoidal path computation.",
"title": ""
},
{
"docid": "84cbc3773d0572439a9ff6a5ab661d62",
"text": "Parallel I/O library performance can vary greatly in response to user-tunable parameter values such as aggregator count, file count, and aggregation strategy. Unfortunately, manual selection of these values is time consuming and dependent on characteristics of the target machine, the underlying file system, and the dataset itself. Some characteristics, such as the amount of memory per core, can also impose hard constraints on the range of viable parameter values. In this work we address these problems by using machine learning techniques to model the performance of the PIDX parallel I/O library and select appropriate tunable parameter values. We characterize both the network and I/O phases of PIDX on a Cray XE6 as well as an IBM Blue Gene/P system. We use the results of this study to develop a machine learning model for parameter space exploration and performance prediction.",
"title": ""
},
{
"docid": "60c36aa871aaa3a13ac3b51dbb12b668",
"text": "We propose a novel approach for multi-view object detection in 3D scenes reconstructed from RGB-D sensor. We utilize shape based representation using local shape context descriptors along with the voting strategy which is supported by unsupervised object proposals generated from 3D point cloud data. Our algorithm starts with a single-view object detection where object proposals generated in 3D space are combined with object specific hypotheses generated by the voting strategy. To tackle the multi-view setting, the data association between multiple views enabled view registration and 3D object proposals. The evidence from multiple views is combined in simple bayesian setting. The approach is evaluated on the Washington RGB-D scenes datasets [1], [2] containing several classes of objects in a table top setting. We evaluated our approach against the other state-of-the-art methods and demonstrated superior performance on the same dataset.",
"title": ""
},
{
"docid": "7a0f84c68b55496377accbbdd63a866d",
"text": "DNA lesions, constantly produced by endogenous and exogenous sources, activate the DNA damage response (DDR), which involves detection, signaling and repair of the damage. Autophagy, a lysosome-dependent degradation pathway that is activated by stressful situations such as starvation and oxidative stress, regulates cell fate after DNA damage and also has a pivotal role in the maintenance of nuclear and mitochondrial genomic integrity. Here, we review important evidence regarding the role played by autophagy in preventing genomic instability and tumorigenesis, as well as in micronuclei degradation. Several pathways governing autophagy activation after DNA injury and the influence of autophagy upon the processing of genomic lesions are also discussed herein. In this line, the mechanisms by which several proteins participate in both DDR and autophagy, and the importance of this crosstalk in cancer and neurodegeneration will be presented in an integrated fashion. At last, we present a hypothetical model of the role played by autophagy in dictating cell fate after genotoxic stress.",
"title": ""
},
{
"docid": "4ba0e0e1a00bb95d464b6bb38e2c1176",
"text": "An important application for use with multimedia databases is a browsing aid, which allows a user to quickly and efficiently preview selections from either a database or from the results of a database query. Methods for facilitating browsing, though, are necessarily media dependent. We present one such method that produces short, representative samples (or “audio thumbnails”) of selections of popular music. This method attempts to identify the chorus or refrain of a song by identifying repeated sections of the audio waveform. A reduced spectral representation of the selection based on a chroma transformation of the spectrum is used to find repeating patterns. This representation encodes harmonic relationships in a signal and thus is ideal for popular music, which is often characterized by prominent harmonic progressions. The method is evaluated over a sizable database of popular music and found to perform well, with most of the errors resulting from songs that do not meet our structural assumptions.",
"title": ""
},
{
"docid": "6da8710bf2429d2d0f5a66fb58918737",
"text": "T he great promise of surveys in which people report their own level of life satisfaction is that such surveys might provide a straightforward and easily collected measure of individual or national well-being that aggregates over the various components of well-being, such as economic status, health, family circumstances, and even human and political rights. Layard (2005) argues forcefully such measures do indeed achieve this end, providing measures of individual and aggregate happiness that should be the only gauges used to evaluate policy and progress. Such a position is in sharp contrast to the more widely accepted view, associated with Sen (1999), which is that human well-being depends on a range of functions and capabilities that enable people to lead a good life, each of which needs to be directly and objectively measured and which cannot, in general, be aggregated into a single summary measure. Which of life’s circumstances are important for life satisfaction, and which—if any—have permanent as opposed to merely transitory effects, has been the subject of lively debate. For economists, who usually assume that higher incomes represent a gain to the satisfaction of individuals, the role of income is of particular interest. It is often argued that income is both relatively unimportant and relatively transitory compared with family circumstances, unemployment, or health (for example, Easterlin, 2003). Comparing results from a given country over time, Easterlin (1974, 1995) famously noted that average national happiness does not increase over long spans of time, in spite of large increases in per capita income. These",
"title": ""
},
{
"docid": "8bb52979f6f00cac42a860323a853728",
"text": "This paper proposes to go beyond the state-of-the-art deep convolutional neural network (CNN) by incorporating the information from object detection, focusing on dealing with fine-grained image classification. Unfortunately, CNN suffers from over-fiting when it is trained on existing finegrained image classification benchmarks, which typically only consist of less than a few tens of thousands training images. Therefore, we first construct a large-scale finegrained car recognition dataset that consists of 333 car classes with more than 150 thousand training images. With this large-scale dataset, we are able to build a strong baseline for CNN with top-1 classification accuracy of 81.6%. One major challenge in fine-grained image classification is that many classes are very similar to each other while having large within-class variation. One contributing factor to the within-class variation is cluttered image backgroun d. However, the existing CNN training takes uniform window sampling over the image, acting as blind on the location of the object of interest. In contrast, this paper proposes an object-centric sampling(OCS) scheme that samples image windows based on the object location information. The challenge in using the location information lies in how to design powerful object detector and how to handle the imperfectness of detection results. To that end, we design a saliency-aware object detection approach specific for the setting of fine-grained image classification, and the uncertainty of detection results are naturally handled in our OCS scheme. Our framework is demonstrated to be very effective, improving top-1 accuracy to 89.3% (from 81.6%) on the large-scale fine-grained car classification dataset.",
"title": ""
}
] | scidocsrr |
255658b6d0b767c989cb50d2bd0b6bd9 | Single Image Super-resolution Using Deformable Patches | [
{
"docid": "7cb6582bf81aea75818eef2637c95c79",
"text": "Although multi-frame super resolution has been extensively studied in past decades, super resolving real-world video sequences still remains challenging. In existing systems, either the motion models are oversimplified, or important factors such as blur kernel and noise level are assumed to be known. Such models cannot deal with the scene and imaging conditions that vary from one sequence to another. In this paper, we propose a Bayesian approach to adaptive video super resolution via simultaneously estimating underlying motion, blur kernel and noise level while reconstructing the original high-res frames. As a result, our system not only produces very promising super resolution results that outperform the state of the art, but also adapts to a variety of noise levels and blur kernels. Theoretical analysis of the relationship between blur kernel, noise level and frequency-wise reconstruction rate is also provided, consistent with our experimental results.",
"title": ""
},
{
"docid": "d4c7493c755a3fde5da02e3f3c873d92",
"text": "Edge-directed image super resolution (SR) focuses on ways to remove edge artifacts in upsampled images. Under large magnification, however, textured regions become blurred and appear homogenous, resulting in a super-resolution image that looks unnatural. Alternatively, learning-based SR approaches use a large database of exemplar images for “hallucinating” detail. The quality of the upsampled image, especially about edges, is dependent on the suitability of the training images. This paper aims to combine the benefits of edge-directed SR with those of learning-based SR. In particular, we propose an approach to extend edge-directed super-resolution to include detail from an image/texture example provided by the user (e.g., from the Internet). A significant benefit of our approach is that only a single exemplar image is required to supply the missing detail – strong edges are obtained in the SR image even if they are not present in the example image due to the combination of the edge-directed approach. In addition, we can achieve quality results at very large magnification, which is often problematic for both edge-directed and learning-based approaches.",
"title": ""
},
{
"docid": "b5453d9e4385d5a5ff77997ad7e3f4f0",
"text": "We propose a new measure, the method noise, to evaluate and compare the performance of digital image denoising methods. We first compute and analyze this method noise for a wide class of denoising algorithms, namely the local smoothing filters. Second, we propose a new algorithm, the nonlocal means (NL-means), based on a nonlocal averaging of all pixels in the image. Finally, we present some experiments comparing the NL-means algorithm and the local smoothing filters.",
"title": ""
}
] | [
{
"docid": "60120375949f36157d73748af5c3231a",
"text": "This paper describes REVIEW, a new retinal vessel reference dataset. This dataset includes 16 images with 193 vessel segments, demonstrating a variety of pathologies and vessel types. The vessel edges are marked by three observers using a special drawing tool. The paper also describes the algorithm used to process these segments to produce vessel profiles, against which vessel width measurement algorithms can be assessed. Recommendations are given for use of the dataset in performance assessment. REVIEW can be downloaded from http://ReviewDB.lincoln.ac.uk.",
"title": ""
},
{
"docid": "660bc85f84d37a98e78a34ccf1c8b1ab",
"text": "In this paper, we evaluate the performance and experience differences between direct touch and mouse input on horizontal and vertical surfaces using a simple application and several validated scales. We find that, not only are both speed and accuracy improved when using the multi-touch display over a mouse, but that participants were happier and more engaged. They also felt more competent, in control, related to other people, and immersed. Surprisingly, these results cannot be explained by the intuitiveness of the controller, and the benefits of touch did not come at the expense of perceived workload. Our work shows the added value of considering experience in addition to traditional measures of performance, and demonstrates an effective and efficient method for gathering experience during inter-action with surface applications. We conclude by discussing how an understanding of this experience can help in designing touch applications.",
"title": ""
},
{
"docid": "a32a359ad54d69466d267cad6e182ae9",
"text": "The Sign System for Indonesian Language (SIBI) is a rather complex sign language. It has four components that distinguish the meaning of the sign language and it follows the syntax and the grammar of the Indonesian language. This paper proposes a model for recognizing the SIBI words by using Microsoft Kinect as the input sensor. This model is a part of automatic translation from SIBI to text. The features for each word are extracted from skeleton and color-depth data produced by Kinect. Skeleton data features indicate the angle between human joints and Cartesian axes. Color images are transformed to gray-scale and their features are extracted by using Discrete Cosine Transform (DCT) with Cross Correlation (CC) operation. The image's depth features are extracted by running MATLAB regionprops function to get its region properties. The Generalized Learning Vector Quantization (GLVQ) and Random Forest (RF) training algorithm from WEKA data mining tools are used as the classifier of the model. Several experiments with different scenarios have shown that the highest accuracy (96,67%) is obtained by using 30 frames for skeleton combined with 20 frames for region properties image classified by Random Forest.",
"title": ""
},
{
"docid": "a212a2969c0c72894dcde880bbf29fa7",
"text": "Machine learning is useful for building robust learning models, and it is based on a set of features that identify a state of an object. Unfortunately, some data sets may contain a large number of features making, in some cases, the learning process time consuming and the generalization capability of machine learning poor. To make a data set easy to learn and understand, it is typically recommended to remove the most irrelevant features from the set. However, choosing what data should be kept or eliminated may be performed by complex selection algorithms, and optimal feature selection may require an exhaustive search of all possible subsets of features which is computationally expensive. This paper proposes a simple method to perform feature selection using artificial neural networks. It is shown experimentally that genetic algorithms in combination with artificial neural networks can easily be used to extract those features that are required to produce a desired result. Experimental results show that very few hidden neurons are required for feature selection as artificial neural networks are only used to assess the quality of an individual, which is a chosen subset of features.",
"title": ""
},
{
"docid": "4b354edbd555b6072ae04fb9befc48eb",
"text": "We present a generative method for the creation of geometrically complex andmaterially heterogeneous objects. By combining generative design and additive manufacturing, we demonstrate a unique formfinding approach and method for multi-material 3D printing. The method offers a fast, automated and controllable way to explore an expressive set of symmetrical, complex and colored objects, which makes it a useful tool for design exploration andprototyping.Wedescribe a recursive grammar for the generation of solid boundary surfacemodels suitable for a variety of design domains.We demonstrate the generation and digital fabrication ofwatertight 2-manifold polygonalmeshes, with feature-aligned topology that can be produced on a wide variety of 3D printers, as well as post-processed with traditional 3D modeling tools. To date, objects with intricate spatial patterns and complex heterogeneous material compositions generated by this method can only be produced through 3D printing. © 2016 Elsevier Ltd. All rights reserved.",
"title": ""
},
{
"docid": "c174b7f1f6267ec75b1a9cac4bcaf2f7",
"text": "Issue tracking systems such as Bugzilla, Mantis and JIRA are Process Aware Information Systems to support business process of issue (defect and feature enhancement) reporting and resolution. The process of issue reporting to resolution consists of several steps or activities performed by various roles (bug reporter, bug triager, bug fixer, developers, and quality assurance manager) within the software maintenance team. Project teams define a workflow or a business process (design time process model and guidelines) to streamline and structure the issue management activities. However, the runtime process (reality) may not conform to the design time model and can have imperfections or inefficiencies. We apply business process mining tools and techniques to analyze the event log data (bug report history) generated by an issue tracking system with the objective of discovering runtime process maps, inefficiencies and inconsistencies. We conduct a case-study on data extracted from Bugzilla issue tracking system of the popular open-source Firefox browser project. We present and implement a process mining framework, Nirikshan, consisting of various steps: data extraction, data transformation, process discovery, performance analysis and conformance checking. We conduct a series of process mining experiments to study self-loops, back-and-forth, issue reopen, unique traces, event frequency, activity frequency, bottlenecks and present an algorithm and metrics to compute the degree of conformance between the design time and the runtime process.",
"title": ""
},
{
"docid": "8ea0ac6401d648e359fc06efa59658e6",
"text": "Different neural networks have exhibited excellent performance on various speech processing tasks, and they usually have specific advantages and disadvantages. We propose to use a recently developed deep learning model, recurrent convolutional neural network (RCNN), for speech processing, which inherits some merits of recurrent neural network (RNN) and convolutional neural network (CNN). The core module can be viewed as a convolutional layer embedded with an RNN, which enables the model to capture both temporal and frequency dependance in the spectrogram of the speech in an efficient way. The model is tested on speech corpus TIMIT for phoneme recognition and IEMOCAP for emotion recognition. Experimental results show that the model is competitive with previous methods in terms of accuracy and efficiency.",
"title": ""
},
{
"docid": "03356f32b78ae68603a59c23e8f4a01c",
"text": "1. Introduction The problem of estimating the dimensionality of a model occurs in various forms in applied statistics. There is estimating the number of factor in factor analysis, estimating the degree of a polynomial describing the data, selecting the variables to be introduced in a multiple regression equation, estimating the order of an AR or MA time series model, and so on. In factor analysis this problem was traditionally solved by eyeballing residual eigen-values, or by applying some other kind of heuristic procedure. When maximum likelihood factor analysis became computationally feasible the likelihoods for diierent dimensionalities could be compared. Most statisticians were aware of the fact that comparison of successive chi squares was not optimal in any well deened decision theoretic sense. With the advent of the electronic computer the forward and backward stepwise selection procedures in multiple regression also became quite popular, but again there were plenty of examples around showing that the procedures were not optimal and could easily lead one astray. When even more computational power became available one could solve the best subset selection problem for up to 20 or 30 variables, but choosing an appropriate criterion on the basis of which to compare the many models remains a problem. But exactly because of these advances in computation, nding a solution of the problem became more and more urgent. In the linear regression situation the C p criterion of Mallows (1973), which had already been around much longer, and the PRESS criterion of Allen (1971) were suggested. Although they seemed to work quite well, they were too limited in scope. The structural covariance models of Joreskog and others, and the log linear models of Goodman and others, made search over a much more complicated set of models necessary, and the model choice problems in those contexts could not be attacked by inherently linear methods. Three major closely related developments occurred around 1974. Akaike (1973) introduced the information criterion for model selection, generalizing his earlier work on time series analysis and factor analysis. Stone (1974) reintroduced and systematized cross",
"title": ""
},
{
"docid": "5179662c841302180848dc566a114f10",
"text": "Hyperspectral image (HSI) unmixing has attracted increasing research interests in recent decades. The major difficulty of it lies in that the endmembers and the associated abundances need to be separated from highly mixed observation data with few a priori information. Recently, sparsity-constrained nonnegative matrix factorization (NMF) algorithms have been proved effective for hyperspectral unmixing (HU) since they can sufficiently utilize the sparsity property of HSIs. In order to improve the performance of NMF-based unmixing approaches, spectral and spatial constrains have been added into the unmixing model, but spectral-spatial joint structure is required to be more accurately estimated. To exploit the property that similar pixels within a small spatial neighborhood have higher possibility to share similar abundances, hypergraph structure is employed to capture the similarity relationship among the spatial nearby pixels. In the construction of a hypergraph, each pixel is taken as a vertex of the hypergraph, and each vertex with its k nearest spatial neighboring pixels form a hyperedge. Using the hypergraph, the pixels with similar abundances can be accurately found, which enables the unmixing algorithm to obtain promising results. Experiments on synthetic data and real HSIs are conducted to investigate the performance of the proposed algorithm. The superiority of the proposed algorithm is demonstrated by comparing it with some state-of-the-art methods.",
"title": ""
},
{
"docid": "5cc7f7aae87d95ea38c2e5a0421e0050",
"text": "Scrum is a structured framework to support complex product development. However, Scrum methodology faces a challenge of managing large teams. To address this challenge, in this paper we propose a solution called Scrum of Scrums. In Scrum of Scrums, we divide the Scrum team into teams of the right size, and then organize them hierarchically into a Scrum of Scrums. The main goals of the proposed solution are to optimize communication between teams in Scrum of Scrums; to make the system work after integration of all parts; to reduce the dependencies between the parts of system; and to prevent the duplication of parts in the system. [Qurashi SA, Qureshi MRJ. Scrum of Scrums Solution for Large Size Teams Using Scrum Methodology. Life Sci J 2014;11(8):443-449]. (ISSN:1097-8135). http://www.lifesciencesite.com. 58",
"title": ""
},
{
"docid": "db9f6e58adc2a3ce423eed3223d88b19",
"text": "The self-organizing map (SOM) is an excellent tool in exploratory phase of data mining. It projects input space on prototypes of a low-dimensional regular grid that can be effectively utilized to visualize and explore properties of the data. When the number of SOM units is large, to facilitate quantitative analysis of the map and the data, similar units need to be grouped, i.e., clustered. In this paper, different approaches to clustering of the SOM are considered. In particular, the use of hierarchical agglomerative clustering and partitive clustering using k-means are investigated. The two-stage procedure--first using SOM to produce the prototypes that are then clustered in the second stage--is found to perform well when compared with direct clustering of the data and to reduce the computation time.",
"title": ""
},
{
"docid": "5adaee6e03fdd73ebed40804b9cad326",
"text": "Quantum circuits exhibit several features of large-scale distributed systems. They have a concise design formalism but behavior that is challenging to represent let alone predict. Issues of scalability—both in the yet-to-be-engineered quantum hardware and in classical simulators—are paramount. They require sparse representations for efficient modeling. Whereas simulators represent both the system’s current state and its operations directly, emulators manipulate the images of system states under a mapping to a different formalism. We describe three such formalisms for quantum circuits. The first two extend the polynomial construction of Dawson et al. [1] to (i) work for any set of quantum gates obeying a certain “balance” condition and (ii) produce a single polynomial over any sufficiently structured field or ring. The third appears novel and employs only simple Boolean formulas, optionally limited to a form we call “parity-of-AND” equations. Especially the third can combine with off-the-shelf state-of-the-art third-party software, namely model counters and #SAT solvers, that we show capable of vast improvements in the emulation time in natural instances. We have programmed all three constructions to proof-of-concept level and report some preliminary tests and applications. These include algebraic analysis of special quantum circuits and the possibility of a new classical attack on the factoring problem. Preliminary comparisons are made with the libquantum simulator[2–4]. 1 A Brief But Full QC Introduction A quantum circuit is a compact representation of a computational system. It consists of some number m of qubits represented by lines resembling a musical staff, and some number s of gates arrayed like musical notes and chords. Here is an example created using the popular visual simulator [5]: Fig. 1. A five-qubit quantum circuit that computes a Fourier transform on the first four qubits. The circuit C operates on m = 5 qubits. The input is the binary string x = 10010. The first n = 4 qubits see most of the action and hold the nominal input x0 = 1001 of length n = 4, while the fifth qubit is an ancilla initialized to 0 whose purpose here is to hold the nominal output bit. The circuit has thirteen gates. Six of them have a single control represented by a black dot; they activate if and only if the control receives a 1 signal. The last gate has two controls and a target represented by the parity symbol ⊕ rather than a labeled box. Called a Toffoli gate, it will set the output bit if and only if both controls receive a 1 signal. The two gates before it merely swap the qubits 2 and 3 and 1 and 4, respectively. They have no effect on the output and are included here only to say that the first twelve gates combine to compute the quantum Fourier transform QFT4. This is just the ordinary discrete Fourier transform F16 on 2 4 = 16 coordinates. The actual output C(x) of the circuit is a quantum state Z that belongs to the complex vector space C. Nine of its entries in the standard basis are shown in Figure 1; seven more were cropped from the screenshot. Sixteen of the components are absent, meaning Z has 0 in the corresponding coordinates. Despite the diversity of the nine complex entries ZL shown, each has magnitude |ZL| = 0.0625. In general, |ZL| represents the probability that a measurement—of all qubits—will yield the binary string z ∈ { 0, 1 } corresponding to the coordinate L under the standard ordered enumeration of { 0, 1 }. Here we are interested in those z whose final entry z5 is a 1. Two of them are shown; two others (11101 and 11111) are possible and also have probability 1 16 each, making a total of 1 4 probability for getting z5 = 1. Owing to the “cylindrical” nature of the set B of strings ending in 1, a measurement of just the fifth qubit yields 1 with probability 1 4 . Where does the probability come from? The physical answer is that it is an indelible aspect of nature as expressed by quantum mechanics. For our purposes the computational answer is that it comes from the four gates labeled H, for Hadamard gate. Each supplies one bit of nondeterminism, giving four bits in all, which govern the sixteen possible outcomes of this particular example. It is a mistake to think that the probabilities must be equally spread out and must be multiples of 1/2 where h is the number of Hadamard gates. Appending just one more Hadamard gate at the right end of the third qubit line creates nonzero probabilities as low as 0.0183058 . . . and as high as 0.106694 . . . , each appearing for four outcomes of 24 nonzero possibilities. This happens because the component values follow wave equations that can amplify some values while reducing or zeroing the amplitude of others via interference. Indeed, the goal of quantum computing is to marshal most of the amplitude onto a small set of desired outcomes, so that measurements— that is to say, quantum sampling—will reveal one of them with high probability. All of this indicates the burgeoning complexity of quantum systems. Our original circuit has 5 qubits, 4 nondeterministic gates, and 9 other gates, yet there are 2 = 32 components of the vectors representing states, 32 basic inputs and outputs, and 2 = 16 branchings to consider. Adding the fifth Hadamard gate creates a new fork in every path through the system, giving 32 branchings. The whole circuit C defines a 32× 32 matrix UC in which the I-th row encodes the quantum state ΦI resulting from computation on the standard basis vector x = eI . The matrix is unitary, meaning that UC multiplied by its conjugate transpose U∗ C gives the 32× 32 identity matrix. Indeed, UC is the product of thirteen simpler matrices U` representing the respective gates (` = 1, . . . , s with s = 13). Here each gate engages only a subset of the qubits of arity r < m, so that U` decomposes into its 2 r × 2 unitary gate matrix and the identity action (represented by the 2× 2 identity matrix I) on the other m− r lines. Here are some single-qubit gate matrices: H = 1 √ 2 [ 1 1 1 −1 ]",
"title": ""
},
{
"docid": "f17b3a6c31daeee0ae0a8ebc7a14e16c",
"text": "In full-duplex (FD) radios, phase noise leads to random phase mismatch between the self-interference (SI) and the reconstructed cancellation signal, resulting in possible performance degradation during SI cancellation. To explicitly analyze its impacts on the digital SI cancellation, an orthogonal frequency division multiplexing (OFDM)-modulated FD radio is considered with phase noises at both the transmitter and receiver. The closed-form expressions for both the digital cancellation capability and its limit for the large interference-to-noise ratio (INR) case are derived in terms of the power of the common phase error, INR, desired signal-to-noise ratio (SNR), channel estimation error and transmission delay. Based on the obtained digital cancellation capability, the achievable rate region of a two-way FD OFDM system with phase noise is characterized. Then, with a limited SI cancellation capability, the maximum outer bound of the rate region is proved to exist for sufficiently large transmission power. Furthermore, a minimum transmission power is obtained to achieve $\\beta$ -portion of the cancellation capability limit and to ensure that the outer bound of the rate region is close to its maximum.",
"title": ""
},
{
"docid": "a86bc0970dba249e1e53f9edbad3de43",
"text": "Periodic inspection of a hanger rope is needed for the effective maintenance of suspension bridge. However, it is dangerous for human workers to access the hanger rope and not easy to check the exact state of the hanger rope. In this work we have developed a wheel-based robot that can approach the hanger rope instead of the human worker and carry the inspection device which is able to examine the inside status of the hanger rope. Meanwhile, a wheel-based cable climbing robot may be badly affected by the vibration that is generated while the robot moves on the bumpy surface of the hanger rope. The caterpillar is able to safely drive with the wide contact face on the rough terrain. Accordingly, we developed the caterpillar that can be combined with the developed cable climbing robot. In this paper, the caterpillar is introduced and its performance is compared with the wheel-based cable climbing robot.",
"title": ""
},
{
"docid": "12ba0cd3db135168b48e062cca1d1d32",
"text": "We consider the problem of localizing a novel image in a large 3D model, given that the gravitational vector is known. In principle, this is just an instance of camera pose estimation, but the scale of the problem introduces some interesting challenges. Most importantly, it makes the correspondence problem very difficult so there will often be a significant number of outliers to handle. To tackle this problem, we use recent theoretical as well as technical advances. Many modern cameras and phones have gravitational sensors that allow us to reduce the search space. Further, there are new techniques to efficiently and reliably deal with extreme rates of outliers. We extend these methods to camera pose estimation by using accurate approximations and fast polynomial solvers. Experimental results are given demonstrating that it is possible to reliably estimate the camera pose despite cases with more than 99 percent outlier correspondences in city-scale models with several millions of 3D points.",
"title": ""
},
{
"docid": "1277b7b45f5a54eec80eb8ab47ee3fbb",
"text": "Latent variable models, and probabilistic graphical models more generally, provide a declarative language for specifying prior knowledge and structural relationships in complex datasets. They have a long and rich history in natural language processing, having contributed to fundamental advances such as statistical alignment for translation (Brown et al., 1993), topic modeling (Blei et al., 2003), unsupervised part-of-speech tagging (Brown et al., 1992), and grammar induction (Klein and Manning, 2004), among others. Deep learning, broadly construed, is a toolbox for learning rich representations (i.e., features) of data through numerical optimization. Deep learning is the current dominant paradigm in natural language processing, and some of the major successes include language modeling (Bengio et al., 2003; Mikolov et al., 2010; Zaremba et al., 2014), machine translation (Sutskever et al., 2014; Cho et al., 2014; Bahdanau et al., 2015; Vaswani et al., 2017), and natural language understanding tasks such as question answering and natural language inference.",
"title": ""
},
{
"docid": "c8ebf32413410a5d91defbb19a73b6f3",
"text": "BACKGROUND\nAudit and feedback is widely used as a strategy to improve professional practice either on its own or as a component of multifaceted quality improvement interventions. This is based on the belief that healthcare professionals are prompted to modify their practice when given performance feedback showing that their clinical practice is inconsistent with a desirable target. Despite its prevalence as a quality improvement strategy, there remains uncertainty regarding both the effectiveness of audit and feedback in improving healthcare practice and the characteristics of audit and feedback that lead to greater impact.\n\n\nOBJECTIVES\nTo assess the effects of audit and feedback on the practice of healthcare professionals and patient outcomes and to examine factors that may explain variation in the effectiveness of audit and feedback.\n\n\nSEARCH METHODS\nWe searched the Cochrane Central Register of Controlled Trials (CENTRAL) 2010, Issue 4, part of The Cochrane Library. www.thecochranelibrary.com, including the Cochrane Effective Practice and Organisation of Care (EPOC) Group Specialised Register (searched 10 December 2010); MEDLINE, Ovid (1950 to November Week 3 2010) (searched 09 December 2010); EMBASE, Ovid (1980 to 2010 Week 48) (searched 09 December 2010); CINAHL, Ebsco (1981 to present) (searched 10 December 2010); Science Citation Index and Social Sciences Citation Index, ISI Web of Science (1975 to present) (searched 12-15 September 2011).\n\n\nSELECTION CRITERIA\nRandomised trials of audit and feedback (defined as a summary of clinical performance over a specified period of time) that reported objectively measured health professional practice or patient outcomes. In the case of multifaceted interventions, only trials in which audit and feedback was considered the core, essential aspect of at least one intervention arm were included.\n\n\nDATA COLLECTION AND ANALYSIS\nAll data were abstracted by two independent review authors. For the primary outcome(s) in each study, we calculated the median absolute risk difference (RD) (adjusted for baseline performance) of compliance with desired practice compliance for dichotomous outcomes and the median percent change relative to the control group for continuous outcomes. Across studies the median effect size was weighted by number of health professionals involved in each study. We investigated the following factors as possible explanations for the variation in the effectiveness of interventions across comparisons: format of feedback, source of feedback, frequency of feedback, instructions for improvement, direction of change required, baseline performance, profession of recipient, and risk of bias within the trial itself. We also conducted exploratory analyses to assess the role of context and the targeted clinical behaviour. Quantitative (meta-regression), visual, and qualitative analyses were undertaken to examine variation in effect size related to these factors.\n\n\nMAIN RESULTS\nWe included and analysed 140 studies for this review. In the main analyses, a total of 108 comparisons from 70 studies compared any intervention in which audit and feedback was a core, essential component to usual care and evaluated effects on professional practice. After excluding studies at high risk of bias, there were 82 comparisons from 49 studies featuring dichotomous outcomes, and the weighted median adjusted RD was a 4.3% (interquartile range (IQR) 0.5% to 16%) absolute increase in healthcare professionals' compliance with desired practice. Across 26 comparisons from 21 studies with continuous outcomes, the weighted median adjusted percent change relative to control was 1.3% (IQR = 1.3% to 28.9%). For patient outcomes, the weighted median RD was -0.4% (IQR -1.3% to 1.6%) for 12 comparisons from six studies reporting dichotomous outcomes and the weighted median percentage change was 17% (IQR 1.5% to 17%) for eight comparisons from five studies reporting continuous outcomes. Multivariable meta-regression indicated that feedback may be more effective when baseline performance is low, the source is a supervisor or colleague, it is provided more than once, it is delivered in both verbal and written formats, and when it includes both explicit targets and an action plan. In addition, the effect size varied based on the clinical behaviour targeted by the intervention.\n\n\nAUTHORS' CONCLUSIONS\nAudit and feedback generally leads to small but potentially important improvements in professional practice. The effectiveness of audit and feedback seems to depend on baseline performance and how the feedback is provided. Future studies of audit and feedback should directly compare different ways of providing feedback.",
"title": ""
},
{
"docid": "8222f8eae81c954e8e923cbd883f8322",
"text": "Work stealing is a promising approach to constructing multithreaded program runtimes of parallel programming languages. This paper presents HERMES, an energy-efficient work-stealing language runtime. The key insight is that threads in a work-stealing environment -- thieves and victims - have varying impacts on the overall program running time, and a coordination of their execution \"tempo\" can lead to energy efficiency with minimal performance loss. The centerpiece of HERMES is two complementary algorithms to coordinate thread tempo: the workpath-sensitive algorithm determines tempo for each thread based on thief-victim relationships on the execution path, whereas the workload-sensitive algorithm selects appropriate tempo based on the size of work-stealing deques. We construct HERMES on top of Intel Cilk Plus's runtime, and implement tempo adjustment through standard Dynamic Voltage and Frequency Scaling (DVFS). Benchmarks running on HERMES demonstrate an average of 11-12% energy savings with an average of 3-4% performance loss through meter-based measurements over commercial CPUs.",
"title": ""
},
{
"docid": "0c832dde1c268ec32e7fca64158abb31",
"text": "For many years, the clinical laboratory's focus on analytical quality has resulted in an error rate of 4-5 sigma, which surpasses most other areas in healthcare. However, greater appreciation of the prevalence of errors in the pre- and post-analytical phases and their potential for patient harm has led to increasing requirements for laboratories to take greater responsibility for activities outside their immediate control. Accreditation bodies such as the Joint Commission International (JCI) and the College of American Pathologists (CAP) now require clear and effective procedures for patient/sample identification and communication of critical results. There are a variety of free on-line resources available to aid in managing the extra-analytical phase and the recent publication of quality indicators and proposed performance levels by the International Federation of Clinical Chemistry and Laboratory Medicine (IFCC) working group on laboratory errors and patient safety provides particularly useful benchmarking data. Managing the extra-laboratory phase of the total testing cycle is the next challenge for laboratory medicine. By building on its existing quality management expertise, quantitative scientific background and familiarity with information technology, the clinical laboratory is well suited to play a greater role in reducing errors and improving patient safety outside the confines of the laboratory.",
"title": ""
},
{
"docid": "3e63c8a5499966f30bd3e6b73494ff82",
"text": "Events can be understood in terms of their temporal structure. The authors first draw on several bodies of research to construct an analysis of how people use event structure in perception, understanding, planning, and action. Philosophy provides a grounding for the basic units of events and actions. Perceptual psychology provides an analogy to object perception: Like objects, events belong to categories, and, like objects, events have parts. These relationships generate 2 hierarchical organizations for events: taxonomies and partonomies. Event partonomies have been studied by looking at how people segment activity as it happens. Structured representations of events can relate partonomy to goal relationships and causal structure; such representations have been shown to drive narrative comprehension, memory, and planning. Computational models provide insight into how mental representations might be organized and transformed. These different approaches to event structure converge on an explanation of how multiple sources of information interact in event perception and conception.",
"title": ""
}
] | scidocsrr |
d2cc53cd9546575f84cc65a5b7924894 | Approximate Newton Methods for Policy Search in Markov Decision Processes | [
{
"docid": "768336582eb1aece4454ec461f3840d2",
"text": "This paper presents an Iterative Linear Quadratic Regulator (ILQR) me thod for locally-optimal feedback control of nonlinear dynamical systems. The method is applied to a musculo-s ke etal arm model with 10 state dimensions and 6 controls, and is used to compute energy-optimal reach ing movements. Numerical comparisons with three existing methods demonstrate that the new method converge s substantially faster and finds slightly better solutions.",
"title": ""
}
] | [
{
"docid": "43c3d477fdadea837f74897facf496e4",
"text": "Aerial robots provide valuable support in several high-risk scenarios thanks to their capability to quickly fly to locations dangerous or even inaccessible to humans. In order to fully benefit from these features, aerial robots should be easy to transport and rapid to deploy. With this aim, this paper focuses on the development of a novel pocket sized quadrotor with foldable arms. The quadrotor can be packaged for transportation by folding its arms around the main frame. Before flight, the quadrotor's arms self-deploy in 0.3 seconds thanks to the torque generated by the propellers. The paper describes the design strategies used for developing lightweight, stiff and self-deployable foldable arms for miniature quadrotors. The arms are manufactured according to an origami technique with a foldable multi-layer material. A prototype of the quadrotor is presented as a proof of concept and performance of the system is assessed.",
"title": ""
},
{
"docid": "e9ce26c20369103f1f3549e921702cbf",
"text": "Vehicle navigation is one of the most important applications in the era of navigation which is mostly used by drivers. Therefore the efficiency of the maps given to the drivers has a great importance in the navigation system. In this paper we proposed a very efficient system which uses the GPS and earth maps to help the driver in navigation by robust display of the current position of the vehicle on a displayed map. The main aim of this project is designing a system which is capable of continuous monitoring of path of the vehicle on PC with Google Earth Application. Here the important issue is displaying the map on several various scales which are adopted by the users. The heart elements in the implementation of this project are GPS, GSM and MCU. The GPS-GSM integrated structure is designed to track the vehicles by using Google earth application. The micro controller is used to receive data from GPS and to transfer the latitude and longitude to the PC to map by using the VB.Net language and this map is generated using Google Earth information.",
"title": ""
},
{
"docid": "03ca6037bf249d93a9eae8bee5ae8b11",
"text": "The integration of strong encryption into operating systems is creating challenges for forensic examiners, potentially preventing us from recovering any digital evidence from a computer. Because strong encryption cannot be circumvented without a key or passphrase, forensic examiners may not be able to access data after a computer is shut down, and must decide whether to perform a live forensic acquisition. In addition, with encryption becoming integrated into the operating system, in some cases, virtualization is the most effective approach to performing a forensic examination of a system with FDE. This paper presents the evolution of full disk encryption (FDE) and its impact on digital forensics. Furthermore, by demonstrating how full disk encryption has been dealt with in past investigations, this paper provides forensics examiners with practical techniques for recovering evidence that would otherwise be inaccessible.",
"title": ""
},
{
"docid": "44bbc67f44f4f516db97b317ae16a22a",
"text": "Although the number of occupational therapists working in mental health has dwindled, the number of people who need our services has not. In our tendency to cling to a medical model of service provision, we have allowed the scope and content of our services to be limited to what has been supported within this model. A social model that stresses functional adaptation within the community, exemplified in psychosocial rehabilitation, offers a promising alternative. A strongly proactive stance is needed if occupational therapists are to participate fully. Occupational therapy can survive without mental health specialists, but a large and deserving population could ultimately be deprived of a valuable service.",
"title": ""
},
{
"docid": "dc269ab8dccad6c8be533508d1b73de2",
"text": "In this paper the main problems and the available solutions are addressed for the generation of 3D models from terrestrial images. Close range photogrammetry has dealt for many years with manual or automatic image measurements for precise 3D modelling. Nowadays 3D scanners are also becoming a standard source for input data in many application areas, but image-based modelling still remains the most complete, economical, portable, flexible and widely used approach. In this paper the full pipeline is presented for 3D modelling from terrestrial image data, considering the different approaches and analysing all the steps involved.",
"title": ""
},
{
"docid": "c9aa03ce1656afdff95d426d9d4f5644",
"text": "One fundamental problem of the convolutional neural network (CNN) is catastrophic forgetting, which occurs when new object classes and data are added while the original dataset is not available any more. Training the network only using the new dataset deteriorates the performance with respect to the old dataset. To overcome this problem, we propose an expanded network architecture, called the ExpandNet, to enhance the CNN incremental learning capability. Our solution keeps filters of the original networks on one hand, yet adds additional filters to the convolutional layers as well as the fully connected layers on the other hand. The proposed new architecture does not need any information of the original dataset, and it is trained using the new dataset only. Extensive evaluations based on the CIFAR −10 and the CIFAR −100 datasets show that the proposed method has a slower forgetting rate as compared to several existing incremental learning networks.",
"title": ""
},
{
"docid": "395dcc7c09562f358c07af9c999fbdc7",
"text": "Protecting source code against reverse engineering and theft is an important problem. The goal is to carry out computations using confidential algorithms on an untrusted party while ensuring confidentiality of algorithms. This problem has been addressed for Boolean circuits known as ‘circuit privacy’. Circuits corresponding to real-world programs are impractical. Well-known obfuscation techniques are highly practicable, but provide only limited security, e.g., no piracy protection. In this work, we modify source code yielding programs with adjustable performance and security guarantees ranging from indistinguishability obfuscators to (non-secure) ordinary obfuscation. The idea is to artificially generate ‘misleading’ statements. Their results are combined with the outcome of a confidential statement using encrypted selector variables. Thus, an attacker must ‘guess’ the encrypted selector variables to disguise the confidential source code. We evaluated our method using more than ten programmers as well as pattern mining across open source code repositories to gain insights of (micro-)coding patterns that are relevant for generating misleading statements. The evaluation reveals that our approach is effective in that it successfully preserves source code confidentiality.",
"title": ""
},
{
"docid": "316e771f85676bdf85dfce1e4ea3eaa8",
"text": "Stream processing is important for continuously transforming and analyzing the deluge of data that has revolutionized our world. Given the diversity of application domains, streaming applications must be both easy to write and performant. Both goals can be accomplished by high-level programming languages. Dedicated language syntax helps express stream programs clearly and concisely, whereas the compiler and runtime system of the language help optimize runtime performance. This paper describes the language runtime for the IBM Streams Processing Language (SPL) used to program the distributed IBM Streams platform. It gives a system overview and explains several language-based optimizations implemented in the SPL runtime: fusion, thread placement, fission, and transport optimizations.",
"title": ""
},
{
"docid": "9b02cd39293b2f2fb74de14ea3cdd67b",
"text": "Convolutional Neural Networks (CNNs) have been widely used in computer vision tasks, such as face recognition, and have achieved state-of-the-art results due to their ability to learn discriminative deep features. Conventionally, CNNs have been trained with Softmax as supervision signal to penalize the classification loss. In order to further enhance discriminative capability of deep features, we introduced a joint supervision signal, Git loss, which leverages on Softmax and Center loss functions. The aim of our loss function is to minimizes the intra-class variances as well as maximizes the interclass distances. Such minimization and maximization of deep features are considered ideal for face recognition task. Results obtained on two popular face recognition benchmarks datasets show that our proposed loss function achieves maximum separability between deep face features of different identities and achieves state-of-the-art accuracy on two major face recognition benchmark datasets: Labeled Faces in the Wild (LFW) and YouTube Faces (YTF).",
"title": ""
},
{
"docid": "9625b24acc9c0de66c65b0ae843b7dad",
"text": "SenticNet is currently one of the most comprehensive freely available semantic resources for opinion mining. However, it only provides numerical polarity scores, while more detailed sentiment-related information for its concepts is often desirable. Another important resource for opinion mining and sentiment analysis is WordNet-Affect, which in turn lacks quantitative information. We report a work on automatically merging these two resources by assigning emotion labels to more than 2700 concepts.",
"title": ""
},
{
"docid": "b89099e9b01a83368a1ebdb2f4394eba",
"text": "Orangutans (Pongo pygmaeus and Pongo abelii) are semisolitary apes and, among the great apes, the most distantly related to humans. Raters assessed 152 orangutans on 48 personality descriptors; 140 of these orangutans were also rated on a subjective well-being questionnaire. Principal-components analysis yielded 5 reliable personality factors: Extraversion, Dominance, Neuroticism, Agreeableness, and Intellect. The authors found no factor analogous to human Conscientiousness. Among the orangutans rated on all 48 personality descriptors and the subjective well-being questionnaire, Extraversion, Agreeableness, and low Neuroticism were related to subjective well-being. These findings suggest that analogues of human, chimpanzee, and orangutan personality domains existed in a common ape ancestor.",
"title": ""
},
{
"docid": "7fed5f87d8f009dfd8f1b0143cdb3291",
"text": "There is no doubt that controlled and pulsatile drug delivery system is an important challenge in medicine over the conventional drug delivery system in case of therapeutic efficacy. However, the conventional drug delivery systems often offer a limited by their inability to drug delivery which consists of systemic toxicity, narrow therapeutic window, complex dosing schedule for long term treatment etc. Therefore, there has been a search for the drug delivery system that exhibit broad enhancing activity for more drugs with less complication. More recently, some elegant study has noted that, a new type of micro-electrochemical system or MEMS-based drug delivery systems called microchip has been improved to overcome the problems related to conventional drug delivery. Moreover, micro-fabrication technology has enabled to develop the implantable controlled released microchip devices with improved drug administration and patient compliance. In this article, we have presented an overview of the investigations on the feasibility and application of microchip as an advanced drug delivery system. Commercial manufacturing materials and methods, related other research works and current advancement of the microchips for controlled drug delivery have also been summarized.",
"title": ""
},
{
"docid": "ebc1e12f85c6b03de14b1170f450d3f8",
"text": "Mobility disability is becoming prevalent in the obese older population (> or = 60 years of age). We included a total of 13 cross-sectional and 15 longitudinal studies based on actual physical assessments of mobility in the obese older population in this review. We systematically examined existing evidence of which adiposity estimate best predicted mobility disability. Cross-sectional studies (82-4000 participants) showed poorer lower extremity mobility with increasing obesity severity in both men and women. All longitudinal studies (1-22 years) except for one, reported relationships between adiposity and declining mobility. While different physical tests made interpretation challenging, a consistent finding was that walking, stair climbing and chair rise ability were compromised with obesity, especially if the body mass index (BMI) exceeded 35 kg m(-2). More studies found that obese women were at an increased risk for mobility impairment than men. Existing evidence suggests that BMI and waist circumference are emerging as the more consistent predictors of the onset or worsening of mobility disability. Limited interventional evidence shows that weight loss is related with increased mobility and lower extremity function. Additional longitudinal studies are warranted that address overall body composition fat and muscle mass or change on future disability.",
"title": ""
},
{
"docid": "38b5917f30f33c55d3af42022dcb28d7",
"text": "We present a new algorithm that significantly improves the efficiency of exploration for deep Q-learning agents in dialogue systems. Our agents explore via Thompson sampling, drawing Monte Carlo samples from a Bayes-by-Backprop neural network. Our algorithm learns much faster than common exploration strategies such as -greedy, Boltzmann, bootstrapping, and intrinsic-reward-based ones. Additionally, we show that spiking the replay buffer with experiences from just a few successful episodes can make Q-learning feasible when it might otherwise fail.",
"title": ""
},
{
"docid": "ef14d26a613cec20b7ea36e24c197da1",
"text": "In this paper, we propose a new approach to discover informative contents from a set of tabular documents (or Web pages) of a Web site. Our system, InfoDiscoverer, first partitions a page into several content blocks according to HTML tag <TABLE> in a Web page. Based on the occurrence of the features (terms) in the set of pages, it calculates entropy value of each feature. According to the entropy value of each feature in a content block, the entropy value of the block is defined. By analyzing the information measure, we propose a method to dynamically select the entropy-threshold that partitions blocks into either informative or redundant. Informative content blocks are distinguished parts of the page, whereas redundant content blocks are common parts. Based on the answer set generated from 13 manually tagged news Web sites with a total of 26,518 Web pages, experiments show that both recall and precision rates are greater than 0.956. That is, using the approach, informative blocks (news articles) of these sites can be automatically separated from semantically redundant contents such as advertisements, banners, navigation panels, news categories, etc. By adopting InfoDiscoverer as the preprocessor of information retrieval and extraction applications, the retrieval and extracting precision will be increased, and the indexing size and extracting complexity will also be reduced.",
"title": ""
},
{
"docid": "72ec56d2f4ee2fc257a8c8dd5484aee1",
"text": "Attack graphs model possible paths that a potential attacker can use to intrude into a target network. They can be used in determining both proactive and reactive security measures. Attack graph generation is a process that includes vulnerability information processing, collecting network topology and application information, determining reachability conditions among network hosts, and applying the core graph building algorithm. This article introduces a classification scheme for a systematical study of the methods applied in each phase of the attack graph generation process, including the usage of attack graphs for network security. The related works in the literature are stated based on the proposed classification scheme and contributive ideas about potential challenges and open issues for attack graph generation and usage are provided. © 2016 Elsevier Ltd. All rights reserved.",
"title": ""
},
{
"docid": "5041be83f936b04d306cc5b289a2e57a",
"text": "People believe that weather conditions influence their everyday work life, but to date, little is known about how weather affects individual productivity. Contrary to conventional wisdom, we predict and find that bad weather increases individual productivity and that it does so by eliminating potential cognitive distractions resulting from good weather. When the weather is bad, individuals appear to focus more on their work than on alternate outdoor activities. We investigate the proposed relationship between worse weather and higher productivity through 4 studies: (a) field data on employees' productivity from a bank in Japan, (b) 2 studies from an online labor market in the United States, and (c) a laboratory experiment. Our findings suggest that worker productivity is higher on bad-, rather than good-, weather days and that cognitive distractions associated with good weather may explain the relationship. We discuss the theoretical and practical implications of our research.",
"title": ""
},
{
"docid": "8e4bcddbb8b5de8efb3ab0a32c82ca98",
"text": "Cloud Computing is considered as one of the emerging arenas of computer science in recent times. It is providing excellent facilities to business entrepreneurs by flexible infrastructure. Although, cloud computing is facilitating the Information Technology industry, the research and development in this arena is yet to be satisfactory. Our contribution in this paper is an advanced survey focusing on cloud computing concept and most advanced research issues. This paper provides a better understanding of the cloud computing and identifies important research issues in this burgeoning area of computer science.",
"title": ""
},
{
"docid": "23d7eb4d414e4323c44121040c3b2295",
"text": "BACKGROUND\nThe use of clinical decision support systems to facilitate the practice of evidence-based medicine promises to substantially improve health care quality.\n\n\nOBJECTIVE\nTo describe, on the basis of the proceedings of the Evidence and Decision Support track at the 2000 AMIA Spring Symposium, the research and policy challenges for capturing research and practice-based evidence in machine-interpretable repositories, and to present recommendations for accelerating the development and adoption of clinical decision support systems for evidence-based medicine.\n\n\nRESULTS\nThe recommendations fall into five broad areas--capture literature-based and practice-based evidence in machine--interpretable knowledge bases; develop maintainable technical and methodological foundations for computer-based decision support; evaluate the clinical effects and costs of clinical decision support systems and the ways clinical decision support systems affect and are affected by professional and organizational practices; identify and disseminate best practices for work flow-sensitive implementations of clinical decision support systems; and establish public policies that provide incentives for implementing clinical decision support systems to improve health care quality.\n\n\nCONCLUSIONS\nAlthough the promise of clinical decision support system-facilitated evidence-based medicine is strong, substantial work remains to be done to realize the potential benefits.",
"title": ""
},
{
"docid": "5de21491d88aa81f820619abd71032e5",
"text": "This paper presents a tunable bandpass filter (BPF) for cognitive radio applications. The proposed two-pole BPF is implemented using lumped elements and the frequency tuning is realized by PIN diodes. Due to the L-C parallel circuit J-inverter, constant absolute bandwidth is achieved. 4 PIN diodes in each resonator and the capacitor bank are used to cover the desired frequency tuning range from 480MHz to 687MHz with 20MHz bandwidth. The circuit is theoretically analyzed, and the complete design process is described. The fabricated filter shows wide tuning range of 42.5% with insertion loss varying from 2.7dB to 3.8dB and good linearity. The 1-dB bandwidth of the filter is kept 20±1MHz.",
"title": ""
}
] | scidocsrr |
aeda9eaa4612e415ab71fee3c89a3959 | Object Tracking Pose Estimation Object Detection Action Recognition / / / / Autonomous Navigation 3 D Reconstruction Crowd | [
{
"docid": "79d6aa27e761b25348481ffed15a8bd9",
"text": "Correlation filter (CF) based trackers have recently gained a lot of popularity due to their impressive performance on benchmark datasets, while maintaining high frame rates. A significant amount of recent research focuses on the incorporation of stronger features for a richer representation of the tracking target. However, this only helps to discriminate the target from background within a small neighborhood. In this paper, we present a framework that allows the explicit incorporation of global context within CF trackers. We reformulate the original optimization problem and provide a closed form solution for single and multi-dimensional features in the primal and dual domain. Extensive experiments demonstrate that this framework significantly improves the performance of many CF trackers with only a modest impact on frame rate.",
"title": ""
}
] | [
{
"docid": "f11db33a0eb2ab985189866e2a57c7e2",
"text": "Age estimation based on the human face remains a significant problem in computer vision and pattern recognition. In order to estimate an accurate age or age group of a facial image, most of the existing algorithms require a huge face data set attached with age labels. This imposes a constraint on the utilization of the immensely unlabeled or weakly labeled training data, e.g., the huge amount of human photos in the social networks. These images may provide no age label, but it is easy to derive the age difference for an image pair of the same person. To improve the age estimation accuracy, we propose a novel learning scheme to take advantage of these weakly labeled data through the deep convolutional neural networks. For each image pair, Kullback–Leibler divergence is employed to embed the age difference information. The entropy loss and the cross entropy loss are adaptively applied on each image to make the distribution exhibit a single peak value. The combination of these losses is designed to drive the neural network to understand the age gradually from only the age difference information. We also contribute a data set, including more than 100 000 face images attached with their taken dates. Each image is both labeled with the timestamp and people identity. Experimental results on two aging face databases show the advantages of the proposed age difference learning system, and the state-of-the-art performance is gained.",
"title": ""
},
{
"docid": "99c0aca4e244fab49344723b95a913d7",
"text": "The functional identity of centromeres arises from a set of specific nucleoprotein particle subunits of the centromeric chromatin fibre. These include CENP-A and histone H3 nucleosomes and a novel nucleosome-like complex of CENPs -T, -W, -S and -X. Fluorescence cross-correlation spectroscopy and Förster resonance energy transfer (FRET) revealed that human CENP-S and -X exist principally in complex in soluble form and retain proximity when assembled at centromeres. Conditional labelling experiments show that they both assemble de novo during S phase and G2, increasing approximately three- to fourfold in abundance at centromeres. Fluorescence recovery after photobleaching (FRAP) measurements documented steady-state exchange between soluble and assembled pools, with CENP-X exchanging approximately 10 times faster than CENP-S (t1/2 ∼ 10 min versus 120 min). CENP-S binding to sites of DNA damage was quite distinct, with a FRAP half-time of approximately 160 s. Fluorescent two-hybrid analysis identified CENP-T as a uniquely strong CENP-S binding protein and this association was confirmed by FRET, revealing a centromere-bound complex containing CENP-S, CENP-X and CENP-T in proximity to histone H3 but not CENP-A. We propose that deposition of the CENP-T/W/S/X particle reveals a kinetochore-specific chromatin assembly pathway that functions to switch centromeric chromatin to a mitosis-competent state after DNA replication. Centromeres shuttle between CENP-A-rich, replication-competent and H3-CENP-T/W/S/X-rich mitosis-competent compositions in the cell cycle.",
"title": ""
},
{
"docid": "c446a98b6fd9fca75bb9255c6c3aadc7",
"text": "This paper describes the development of a video/game art project being produced by media artist Bill Viola in collaboration with a team from the USC Game Innovation Lab, which uses a combination of both video and game technologies to explore the universal experience of an individual's journey towards enlightenment. Here, we discuss both the creative and technical approaches to achieving the project's goals of evoking in the player the sense of undertaking a spiritual journey.",
"title": ""
},
{
"docid": "8655f49c0fe74d0a13bb312846f2c7df",
"text": "In this paper, we propose a novel two-stream framework based on combinational deep neural networks. The framework is mainly composed of two components: one is a parallel two-stream encoding component which learns video encoding from multiple sources using 3D convolutional neural networks and the other is a long-short-term-memory (LSTM)-based decoding language model which transfers the input encoded video representations to text descriptions. The merits of our proposed model are: 1) It extracts both temporal and spatial features by exploring the usage of 3D convolutional networks on both raw RGB frames and motion history images. 2) Our model can dynamically tune the weights of different feature channels since the network is trained end-to-end from learning combinational encoding of multiple features to LSTM-based language model. Our model is evaluated on three public video description datasets: one YouTube clips dataset (Microsoft Video Description Corpus) and two large movie description datasets (MPII Corpus and Montreal Video Annotation Dataset) and achieves comparable or better performance than the state-of-the-art approaches in video caption generation.",
"title": ""
},
{
"docid": "89eb311b9d901118dd89fa42e50fef2a",
"text": "Many studies have been conducted so far to build systems for recommending fashion items and outfits. Although they achieve good performances in their respective tasks, most of them cannot explain their judgments to the users, which compromises their usefulness. Toward explainable fashion recommendation, this study proposes a system that is able not only to provide a goodness score for an outfit but also to explain the score by providing reason behind it. For this purpose, we propose a method for quantifying how influential each feature of each item is to the score. Using this influence value, we can identify which item and what feature make the outfit good or bad. We represent the image of each item with a combination of human-interpretable features, and thereby the identification of the most influential item-feature pair gives useful explanation of the output score. To evaluate the performance of this approach, we design an experiment that can be performed without human annotation; we replace a single item-feature pair in an outfit so that the score will decrease, and then we test if the proposed method can detect the replaced item correctly using the above influence values. The experimental results show that the proposed method can accurately detect bad items in outfits lowering their scores.",
"title": ""
},
{
"docid": "e724d4405f50fd74a2184187dcc52401",
"text": "This paper presents security of Internet of things. In the Internet of Things vision, every physical object has a virtual component that can produce and consume services Such extreme interconnection will bring unprecedented convenience and economy, but it will also require novel approaches to ensure its safe and ethical use. The Internet and its users are already under continual attack, and a growing economy-replete with business models that undermine the Internet's ethical use-is fully focused on exploiting the current version's foundational weaknesses.",
"title": ""
},
{
"docid": "4b3576e6451fa78886ce440e55b04979",
"text": "In this paper, we model the document revision detection problem as a minimum cost branching problem that relies on computing document distances. Furthermore, we propose two new document distance measures, word vector-based Dynamic Time Warping (wDTW) and word vector-based Tree Edit Distance (wTED). Our revision detection system is designed for a large scale corpus and implemented in Apache Spark. We demonstrate that our system can more precisely detect revisions than state-of-the-art methods by utilizing the Wikipedia revision dumps 1 and simulated data sets.",
"title": ""
},
{
"docid": "ca5f251364ddf21e4cecf25cda5b575d",
"text": "This paper discusses \"bioink\", bioprintable materials used in three dimensional (3D) bioprinting processes, where cells and other biologics are deposited in a spatially controlled pattern to fabricate living tissues and organs. It presents the first comprehensive review of existing bioink types including hydrogels, cell aggregates, microcarriers and decellularized matrix components used in extrusion-, droplet- and laser-based bioprinting processes. A detailed comparison of these bioink materials is conducted in terms of supporting bioprinting modalities and bioprintability, cell viability and proliferation, biomimicry, resolution, affordability, scalability, practicality, mechanical and structural integrity, bioprinting and post-bioprinting maturation times, tissue fusion and formation post-implantation, degradation characteristics, commercial availability, immune-compatibility, and application areas. The paper then discusses current limitations of bioink materials and presents the future prospects to the reader.",
"title": ""
},
{
"docid": "7c98d4c1ab375526c426f8156650cb22",
"text": "Online privacy remains an ongoing source of debate in society. Sensitive to this, many web platforms are offering users greater, more granular control over how and when their information is revealed. However, recent research suggests that information control mechanisms of this sort are not necessarily of economic benefit to the parties involved. We examine the use of these mechanisms and their economic consequences, leveraging data from one of the world's largest global crowdfunding platforms, where contributors can conceal their identity or contribution amounts from public display. We find that information hiding is more likely when contributors are under greater scrutiny or exhibiting “undesirable” behavior. We also identify an anchoring effect from prior contributions, which is eliminated when earlier contributors conceal their amounts. Subsequent analyses indicate that a nuanced approach to the design and provision of information control mechanisms, such as varying default settings based on contribution amounts, can help promote larger contributions.",
"title": ""
},
{
"docid": "d401630481d725ae3d853b126710da31",
"text": "Combinatory Category Grammar (CCG) supertagging is a task to assign lexical categories to each word in a sentence. Almost all previous methods use fixed context window sizes to encode input tokens. However, it is obvious that different tags usually rely on different context window sizes. This motivates us to build a supertagger with a dynamic window approach, which can be treated as an attention mechanism on the local contexts. We find that applying dropout on the dynamic filters is superior to the regular dropout on word embeddings. We use this approach to demonstrate the state-ofthe-art CCG supertagging performance on the standard test set. Introduction Combinatory Category Grammar (CCG) provides a connection between syntax and semantics of natural language. The syntax can be specified by derivations of the lexicon based on the combinatory rules, and the semantics can be recovered from a set of predicate-argument relations. CCG provides an elegant solution for a wide range of semantic analysis, such as semantic parsing (Zettlemoyer and Collins 2007; Kwiatkowski et al. 2010; 2011; Artzi, Lee, and Zettlemoyer 2015), semantic representations (Bos et al. 2004; Bos 2005; 2008; Lewis and Steedman 2013), and semantic compositions, all of which heavily depend on the supertagging and parsing performance. All these motivate us to build a more accurate CCG supertagger. CCG supertagging is the task to predict the lexical categories for each word in a sentence. Existing algorithms on CCG supertagging range from point estimation (Clark and Curran 2007; Lewis and Steedman 2014) to sequential estimation (Xu, Auli, and Clark 2015; Lewis, Lee, and Zettlemoyer 2016; Vaswani et al. 2016), which predict the most probable supertag of the current word according to the context in a fixed size window. This fixed size window assumption is too strong to generalize. We argue this from two perspectives. One perspective comes from the inputs. For a particular word, the number of its categories may vary from 1 to 130 in CCGBank 02-21 (Hockenmaier and Steedman 2007). We ∗Corresponding author. Copyright c © 2017, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. on a warm autumn day ...",
"title": ""
},
{
"docid": "048081246f39fc80273d08493c770016",
"text": "Skin detection is used in many applications, such as face recognition, hand tracking, and human-computer interaction. There are many skin color detection algorithms that are used to extract human skin color regions that are based on the thresholding technique since it is simple and fast for computation. The efficiency of each color space depends on its robustness to the change in lighting and the ability to distinguish skin color pixels in images that have a complex background. For more accurate skin detection, we are proposing a new threshold based on RGB and YUV color spaces. The proposed approach starts by converting the RGB color space to the YUV color model. Then it separates the Y channel, which represents the intensity of the color model from the U and V channels to eliminate the effects of luminance. After that the threshold values are selected based on the testing of the boundary of skin colors with the help of the color histogram. Finally, the threshold was applied to the input image to extract skin parts. The detected skin regions were quantitatively compared to the actual skin parts in the input images to measure the accuracy and to compare the results of our threshold to the results of other’s thresholds to prove the efficiency of our approach. The results of the experiment show that the proposed threshold is more robust in terms of dealing with the complex background and light conditions than others. Keyword: Skin segmentation; Thresholding technique; Skin detection; Color space",
"title": ""
},
{
"docid": "5b675ea7554dc8bf1707ecb4c4055de7",
"text": "Researchers have highlighted that the main factors that contribute to IT service failure are the people, process and technology. However, relatively few empirical studies examine to what degree these factors contribute to service disruptions in the public sector organizations. This study explores the IT service management (ITSM) at eight (8) Front-end Agencies, four (4) Ministries and six (6) Departments in Malaysian public service to identify the level of contribution of each factor to the public IT service disruptions. This study was undertaken using questionnaires via stratified sampling. The empirical results reveal that human action, decision, management, error and failure are the major causes to the IT service disruptions followed by an improper process or procedures and technology failure. In addition, we can conclude that human is an important factor and need to give more attention by the management since human is the creator, who uses, manages and maintains the technology and process to enable the delivery of services as specified in the objectives, vision and mission of the organization. Although the literature states that human failure was due to knowledge, skill, attitude and behavior of an individual and the organization environment, but no literature was found studies on what characteristics of human and environmental organizations that make up the resilience service delivery and the creation of an organization that is resilient. Future research on what characteristics on human and organization environmental that contribute to organizational and business resilience is suggested at the end of the paper. However, this paper only covers literature that discussed in depth the type of human failure and the cause of failure. Nevertheless, it is believed that the findings provide a valuable understanding of the current situation in this research field.",
"title": ""
},
{
"docid": "5bf4a17592eca1881a93cd4930f4187d",
"text": "The problem of automatically generating a computer program from some specification has been studied since the early days of AI. Recently, two competing approaches for automatic program learning have received significant attention: (1) neural program synthesis, where a neural network is conditioned on input/output (I/O) examples and learns to generate a program, and (2) neural program induction, where a neural network generates new outputs directly using a latent program representation. Here, for the first time, we directly compare both approaches on a large-scale, real-world learning task and we additionally contrast to rule-based program synthesis, which uses hand-crafted semantics to guide the program generation. Our neural models use a modified attention RNN to allow encoding of variable-sized sets of I/O pairs, which achieve 92% accuracy on a real-world test set, compared to the 34% accuracy of the previous best neural synthesis approach. The synthesis model also outperforms a comparable induction model on this task, but we more importantly demonstrate that the strength of each approach is highly dependent on the evaluation metric and end-user application. Finally, we show that we can train our neural models to remain very robust to the type of noise expected in real-world data (e.g., typos), while a highly-engineered rule-based system fails entirely.",
"title": ""
},
{
"docid": "05edf6dc5d4b9726773f56dafc620619",
"text": "Software systems running continuously for a long time tend to show degrading performance and an increasing failure occurrence rate, due to error conditions that accrue over time and eventually lead the system to failure. This phenomenon is usually referred to as \\textit{Software Aging}. Several long-running mission and safety critical applications have been reported to experience catastrophic aging-related failures. Software aging sources (i.e., aging-related bugs) may be hidden in several layers of a complex software system, ranging from the Operating System (OS) to the user application level. This paper presents a software aging analysis at the Operating System level, investigating software aging sources inside the Linux kernel. Linux is increasingly being employed in critical scenarios; this analysis intends to shed light on its behaviour from the aging perspective. The study is based on an experimental campaign designed to investigate the kernel internal behaviour over long running executions. By means of a kernel tracing tool specifically developed for this study, we collected relevant parameters of several kernel subsystems. Statistical analysis of collected data allowed us to confirm the presence of aging sources in Linux and to relate the observed aging dynamics to the monitored subsystems behaviour. The analysis output allowed us to infer potential sources of aging in the kernel subsystems.",
"title": ""
},
{
"docid": "38cf4762ce867ff39a3e0f892758ddfd",
"text": "Quality control of food inventories in the warehouse is complex as well as challenging due to the fact that food can easily deteriorate. Currently, this difficult storage problem is managed mostly by using a human dependent quality assurance and decision making process. This has however, occasionally led to unimaginative, arduous and inconsistent decisions due to the injection of subjective human intervention into the process. Therefore, it could be said that current practice is not powerful enough to support high-quality inventory management. In this paper, the development of an integrative prototype decision support system, namely, Intelligent Food Quality Assurance System (IFQAS) is described which will assist the process by automating the human based decision making process in the quality control of food storage. The system, which is composed of a Case-based Reasoning (CBR) engine and a Fuzzy rule-based Reasoning (FBR) engine, starts with the receipt of incoming food inventory. With the CBR engine, certain quality assurance operations can be suggested based on the attributes of the food received. Further of this, the FBR engine can make suggestions on the optimal storage conditions of inventory by systematically evaluating the food conditions when the food is receiving. With the assistance of the system, a holistic monitoring in quality control of the receiving operations and the storage conditions of the food in the warehouse can be performed. It provides consistent and systematic Quality Assurance Guidelines for quality control which leads to improvement in the level of customer satisfaction and minimization of the defective rate. 2011 Elsevier Ltd. All rights reserved.",
"title": ""
},
{
"docid": "12b15731e6ad4798cca1d04c4217e0e0",
"text": "Bed surface particle size patchiness may play a central role in bedload and morphologic response to changes in sediment supply in gravel-bed rivers. Here we test a 1-D model (from Parker ebook) of bedload transport, surface grain size, and channel profile with two previously published flume studies that documented bed surface response, and specifically patch development, to reduced sediment supply. The model over predicts slope changes and under predicts average bed surface grain size changes because it does not account for patch dynamics. Field studies reported here using painted rocks as tracers show that fine patches and coarse patches may initiate transport at the same stage, but that much greater transport occurs in the finer patches. A theory for patch development should include grain interactions (similar size grains stopping each other, fine ones mobilizing coarse particles), effects of boundary shear stress divergence, and sorting due to cross-stream sloping bed surfaces.",
"title": ""
},
{
"docid": "bd5784e7f8565382dae997d6930cc3b1",
"text": "Multivariate time series (MTS) data are widely used in a very broad range of fields, including medicine, finance, multimedia and engineering. In this paper a new approach for MTS classification, using a parametric derivative dynamic time warping distance, is proposed. Our approach combines two distances: the DTW distance between MTS and the DTW distance between derivatives of MTS. The new distance is used in classification with the nearest neighbor rule. Experimental results performed on 18 data sets demonstrate the effectiveness of the proposed approach for MTS classification. 2014 Elsevier Ltd. All rights reserved.",
"title": ""
},
{
"docid": "c70b485a1ba4c7bb1e3b5ab273cc9156",
"text": "Evidence has amassed from both animal intracranial recordings and human electrophysiology that neural oscillatory mechanisms play a critical role in a number of cognitive functions such as learning, memory, feature binding and sensory gating. The wide availability of high-density electrical and magnetic recordings (64-256 channels) over the past two decades has allowed for renewed efforts in the characterization and localization of these rhythms. A variety of cognitive effects that are associated with specific brain oscillations have been reported, which range in spectral, temporal, and spatial characteristics depending on the context. Our laboratory has focused on investigating the role of alpha-band oscillatory activity (8-14 Hz) as a potential attentional suppression mechanism, and this particular oscillatory attention mechanism will be the focus of the current review. We discuss findings in the context of intersensory selective attention as well as intrasensory spatial and feature-based attention in the visual, auditory, and tactile domains. The weight of evidence suggests that alpha-band oscillations can be actively invoked within cortical regions across multiple sensory systems, particularly when these regions are involved in processing irrelevant or distracting information. That is, a central role for alpha seems to be as an attentional suppression mechanism when objects or features need to be specifically ignored or selected against.",
"title": ""
},
{
"docid": "d1b6007cfb2f8d6227817ab482758bc5",
"text": "Patient Health Monitoring is the one of the field that is rapidly growing very fast nowadays with the advancement of technologies many researchers have come with differentdesigns for patient health monitoring systems as per the technological development. With the widespread of internet, Internet of things is among of the emerged field recently in which many have been able to incorporate it into different applications. In this paper we introduce the system called Iot based patient health monitoring system using LabVIEW and Wireless Sensor Network (WSN).The system will be able to take patients physiological parameters and transmit it wirelessly via Xbees, displays the sensor data onLabVIEW and publish on webserver to enable other health care givers from far distance to visualize, control and monitor continuously via internet connectivity.",
"title": ""
},
{
"docid": "88c1ab7e817118ee01fb28bf32ed2e23",
"text": "Field experiment was conducted on fodder maize to explore the potential of integrated use of chemical, organic and biofertilizers for improving maize growth, beneficial microflora in the rhizosphere and the economic returns. The treatments were designed to make comparison of NPK fertilizer with different combinations of half dose of NP with organic and biofertilizers viz. biological potassium fertilizer (BPF), Biopower, effective microorganisms (EM) and green force compost (GFC). Data reflected maximum crop growth in terms of plant height, leaf area and fresh biomass with the treatment of full NPK; and it was followed by BPF+full NP. The highest uptake of NPK nutrients by crop was recorded as: N under half NP+Biopower; P in BPF+full NP; and K from full NPK. The rhizosphere microflora enumeration revealed that Biopower+EM applied along with half dose of GFC soil conditioner (SC) or NP fertilizer gave the highest count of N-fixing bacteria (Azotobacter, Azospirillum, Azoarcus andZoogloea). Regarding the P-solubilizing bacteria,Bacillus was having maximum population with Biopower+BPF+half NP, andPseudomonas under Biopower+EM+half NP treatment. It was concluded that integration of half dose of NP fertilizer with Biopower+BPF / EM can give similar crop yield as with full rate of NP fertilizer; and through reduced use of fertilizers the production cost is minimized and the net return maximized. However, the integration of half dose of NP fertilizer with biofertilizers and compost did not give maize fodder growth and yield comparable to that from full dose of NPK fertilizers.",
"title": ""
}
] | scidocsrr |
c2b7219ee487c08205e9b6424260e0ec | T-Linkage: A Continuous Relaxation of J-Linkage for Multi-model Fitting | [
{
"docid": "4eaee8e140ccf216eba2eb60eb41d736",
"text": "In this paper, we study the problem of segmenting tracked feature point trajectories of multiple moving objects in an image sequence. Using the affine camera model, this problem can be cast as the problem of segmenting samples drawn from multiple linear subspaces. In practice, due to limitations of the tracker, occlusions, and the presence of nonrigid objects in the scene, the obtained motion trajectories may contain grossly mistracked features, missing entries, or corrupted entries. In this paper, we develop a robust subspace separation scheme that deals with these practical issues in a unified mathematical framework. Our methods draw strong connections between lossy compression, rank minimization, and sparse representation. We test our methods extensively on the Hopkins155 motion segmentation database and other motion sequences with outliers and missing data. We compare the performance of our methods to state-of-the-art motion segmentation methods based on expectation-maximization and spectral clustering. For data without outliers or missing information, the results of our methods are on par with the state-of-the-art results and, in many cases, exceed them. In addition, our methods give surprisingly good performance in the presence of the three types of pathological trajectories mentioned above. All code and results are publicly available at http://perception.csl.uiuc.edu/coding/motion/.",
"title": ""
}
] | [
{
"docid": "452285eb334f8b4ecc17592e53d7080e",
"text": "Fathers are taking on more childcare and household responsibilities than they used to and many non-profit and government organizations have pushed for changes in policies to support fathers. Despite this effort, little research has explored how fathers go online related to their roles as fathers. Drawing on an interview study with 37 fathers, we find that they use social media to document and archive fatherhood, learn how to be a father, and access social support. They also go online to support diverse family needs, such as single fathers' use of Reddit instead of Facebook, fathers raised by single mothers' search for role models online, and stay-at-home fathers' use of father blogs. However, fathers are constrained by privacy concerns and perceptions of judgment relating to sharing content online about their children. Drawing on theories of fatherhood, we present theoretical and design ideas for designing online spaces to better support fathers and fatherhood. We conclude with a call for a research agenda to support fathers online.",
"title": ""
},
{
"docid": "1e3e52f584863903625a07aabd1517d3",
"text": "Most existing methods of semantic segmentation still suffer from two aspects of challenges: intra-class inconsistency and inter-class indistinction. To tackle these two problems, we propose a Discriminative Feature Network (DFN), which contains two sub-networks: Smooth Network and Border Network. Specifically, to handle the intra-class inconsistency problem, we specially design a Smooth Network with Channel Attention Block and global average pooling to select the more discriminative features. Furthermore, we propose a Border Network to make the bilateral features of boundary distinguishable with deep semantic boundary supervision. Based on our proposed DFN, we achieve state-of-the-art performance 86.2% mean IOU on PASCAL VOC 2012 and 80.3% mean IOU on Cityscapes dataset.",
"title": ""
},
{
"docid": "3fb39e30092858b84291a85a719f97f0",
"text": "A spherical wrist of the serial type is said to be isotropic if it can attain a posture whereby the singular values of its Jacobian matrix are all identical and nonzero. What isotropy brings about is robustness to manufacturing, assembly, and measurement errors, thereby guaranteeing a maximum orientation accuracy. In this paper we investigate the existence of redundant isotropic architectures, which should add to the dexterity of the wrist under design by virtue of its extra degree of freedom. The problem formulation leads to a system of eight quadratic equations with eight unknowns. The Bezout number of this system is thus 2 = 256, its BKK bound being 192. However, the actual number of solutions is shown to be 32. We list all solutions of the foregoing algebraic problem. All these solutions are real, but distinct solutions do not necessarily lead to distinct manipulators. Upon discarding those algebraic solutions that yield no new wrists, we end up with exactly eight distinct architectures, the eight corresponding manipulators being displayed at their isotropic posture.",
"title": ""
},
{
"docid": "4ed1c4f2fb1922acc9ee781eb1f9524e",
"text": "Across HCI and social computing platforms, mobile applications that support citizen science, empowering non-experts to explore, collect, and share data have emerged. While many of these efforts have been successful, it remains difficult to create citizen science applications without extensive programming expertise. To address this concern, we present Sensr, an authoring environment that enables people without programming skills to build mobile data collection and management tools for citizen science. We demonstrate how Sensr allows people without technical skills to create mobile applications. Findings from our case study demonstrate that our system successfully overcomes technical constraints and provides a simple way to create mobile data collection tools.",
"title": ""
},
{
"docid": "c91ce9eb908d5a0fccc980f306ec0931",
"text": "Text Mining has become an important research area. Text Mining is the discovery by computer of new, previously unknown information, by automatically extracting information from different written resources. In this paper, a Survey of Text Mining techniques and applications have been s presented.",
"title": ""
},
{
"docid": "7de050ef4260ad858a620f9aa773b5a7",
"text": "We present DBToaster, a novel query compilation framework for producing high performance compiled query executors that incrementally and continuously answer standing aggregate queries using in-memory views. DBToaster targets applications that require efficient main-memory processing of standing queries (views) fed by high-volume data streams, recursively compiling view maintenance (VM) queries into simple C++ functions for evaluating database updates (deltas). While today’s VM algorithms consider the impact of single deltas on view queries to produce maintenance queries, we recursively consider deltas of maintenance queries and compile to thoroughly transform queries into code. Recursive compilation successively elides certain scans and joins, and eliminates significant query plan interpreter overheads. In this demonstration, we walk through our compilation algorithm, and show the significant performance advantages of our compiled executors over other query processors. We are able to demonstrate 1-3 orders of magnitude improvements in processing times for a financial application and a data warehouse loading application, both implemented across a wide range of database systems, including PostgreSQL, HSQLDB, a commercial DBMS ’A’, the Stanford STREAM engine, and a commercial stream processor ’B’.",
"title": ""
},
{
"docid": "e1efeca0d73be6b09f5cf80437809bdb",
"text": "Deep convolutional neural networks have been shown to be vulnerable to arbitrary geometric transformations. However, there is no systematic method to measure the invariance properties of deep networks to such transformations. We propose ManiFool as a simple yet scalable algorithm to measure the invariance of deep networks. In particular, our algorithm measures the robustness of deep networks to geometric transformations in a worst-case regime as they can be problematic for sensitive applications. Our extensive experimental results show that ManiFool can be used to measure the invariance of fairly complex networks on high dimensional datasets and these values can be used for analyzing the reasons for it. Furthermore, we build on ManiFool to propose a new adversarial training scheme and we show its effectiveness on improving the invariance properties of deep neural networks.1",
"title": ""
},
{
"docid": "bdbd3d65c79e4f22d2e85ac4137ee67a",
"text": "With the advances in new-generation information technologies, especially big data and digital twin, smart manufacturing is becoming the focus of global manufacturing transformation and upgrading. Intelligence comes from data. Integrated analysis for the manufacturing big data is beneficial to all aspects of manufacturing. Besides, the digital twin paves a way for the cyber-physical integration of manufacturing, which is an important bottleneck to achieve smart manufacturing. In this paper, the big data and digital twin in manufacturing are reviewed, including their concept as well as their applications in product design, production planning, manufacturing, and predictive maintenance. On this basis, the similarities and differences between big data and digital twin are compared from the general and data perspectives. Since the big data and digital twin can be complementary, how they can be integrated to promote smart manufacturing are discussed.",
"title": ""
},
{
"docid": "1eab5897252dae2313210c666c3dce8c",
"text": "Bone marrow angiogenesis plays an important role in the pathogenesis and progression in multiple myeloma. Recent studies have shown that proteasome inhibitor bortezomib (Velcade, formerly PS-341) can overcome conventional drug resistance in vitro and in vivo; however, its antiangiogenic activity in the bone marrow milieu has not yet been defined. In the present study, we examined the effects of bortezomib on the angiogenic phenotype of multiple myeloma patient-derived endothelial cells (MMEC). At clinically achievable concentrations, bortezomib inhibited the proliferation of MMECs and human umbilical vein endothelial cells in a dose-dependent and time-dependent manner. In functional assays of angiogenesis, including chemotaxis, adhesion to fibronectin, capillary formation on Matrigel, and chick embryo chorioallantoic membrane assay, bortezomib induced a dose-dependent inhibition of angiogenesis. Importantly, binding of MM.1S cells to MMECs triggered multiple myeloma cell proliferation, which was also abrogated by bortezomib in a dose-dependent fashion. Bortezomib triggered a dose-dependent inhibition of vascular endothelial growth factor (VEGF) and interleukin-6 (IL-6) secretion by the MMECs, and reverse transcriptase-PCR confirmed drug-related down-regulation of VEGF, IL-6, insulin-like growth factor-I, Angiopoietin 1 (Ang1), and Ang2 transcription. These data, therefore, delineate the mechanisms of the antiangiogenic effects of bortezomib on multiple myeloma cells in the bone marrow milieu.",
"title": ""
},
{
"docid": "374d058c8986dd2ace4d99ecc60cbcc6",
"text": "Subscapularis (SSC) lesions are often underdiagnosed in the clinical routine. This study establishes and compares the diagnostic values of various clinical signs and diagnostic tests for lesions of the SSC tendon. Fifty consecutive patients who were scheduled for an arthroscopic subacromial or rotator cuff procedure were clinically evaluated using the lift-off test (LOT), the internal rotation lag sign (IRLS), the modified belly-press test (BPT) and the belly-off sign (BOS) preoperatively. A modified classification system according to Fox et al. (Type I–IV) was used to classify the SSC lesion during diagnostic arthroscopy. SSC tendon tears occured with a prevalence of 30% (15 of 50). Five type I, six type II, three type IIIa and one type IIIb tears according to the modified classification system were found. Fifteen percent of the SSC tears were not predicted preoperatively by using all of the tests. In six cases (12%), the LOT and the IRLS could not be performed due to a painful restricted range of motion. The modified BPT and the BOS showed the greatest sensitivity (88 and 87%) followed by the IRLS (71%) and the LOT (40%). The BOS had the greatest specificity (91%) followed by the LOT (79%), mod. BPT (68%) and IRLS (45%). The BOS had the highest overall accuracy (90%). With the BOS and the modified BPT in particular, upper SSC lesions (type I and II) could be diagnosed preoperatively. A detailed physical exam using the currently available SSC tests allows diagnosing SSC lesions in the majority of cases preoperatively. However, some tears could not be predicted by preoperative assessment using all the tests.",
"title": ""
},
{
"docid": "1223a45c3a2cebe4ce2e94d4468be946",
"text": "In this paper, we present an overview of energy storage in renewable energy systems. In fact, energy storage is a dominant factor. It can reduce power fluctuations, enhances the system flexibility, and enables the storage and dispatching of the electricity generated by variable renewable energy sources such as wind and solar. Different storage technologies are used in electric power systems. They can be chemical, electrochemical, mechanical, electromagnetic or thermal. Energy storage facility is comprised of a storage medium, a power conversion system and a balance of plant. In this work, an application to photovoltaic and wind electric power systems is made. The results obtained under Matlab/Simulink are presented.",
"title": ""
},
{
"docid": "122ed18a623510052664996c7ef4b4bb",
"text": "A number of sensor applications in recent years collect data which can be directly associated with human interactions. Some examples of such applications include GPS applications on mobile devices, accelerometers, or location sensors designed to track human and vehicular traffic. Such data lends itself to a variety of rich applications in which one can use the sensor data in order to model the underlying relationships and interactions. This requires the development of trajectory mining techniques, which can mine the GPS data for interesting social patterns. It also leads to a number of challenges, since such data may often be private, and it is important to be able to perform the mining process without violating the privacy of the users. Given the open nature of the information contributed by users in social sensing applications, this also leads to issues of trust in making inferences from the underlying data. In this chapter, we provide a broad survey of the work in this important and rapidly emerging field. We also discuss the key problems which arise in the context of this important field and the corresponding",
"title": ""
},
{
"docid": "47a484d75b1635139f899d2e1875d8f4",
"text": "This work presents the concept and methodology as well as the architecture and physical implementation of an integrated node for smart-city applications. The presented integrated node lies on active RFID technology whereas the use case illustrated, with results from a small-scale verification of the presented node, refers to common-type waste-bins. The sensing units deployed for the use case are ultrasonic sensors that provide ranging information which is translated to fill-level estimations; however the use of a versatile active RFID tag within the node is able to afford multiple sensors for a variety of smart-city applications. The most important benefits of the presented node are power minimization, utilization of low-cost components and accurate fill-level estimation with a tiny data-load fingerprint, regarding the specific use case on waste-bins, whereas the node has to be deployed on public means of transportation or similar standard route vehicles within an urban or suburban context.",
"title": ""
},
{
"docid": "81a1504505fa4630af771ccf6ed8404d",
"text": "A method for the simultaneous co-registration and georeferencing of multiple 3D pointclouds and associated intensity information is proposed. It is a generalization of the 3D surface matching problem. The simultaneous co-registration provides for a strict solution to the problem, as opposed to sequential pairwise registration. The problem is formulated as the Least Squares matching of overlapping 3D surfaces. The parameters of 3D transformations of multiple surfaces are simultaneously estimated, using the Generalized GaussMarkoff model, minimizing the sum of squares of the Euclidean distances among the surfaces. An observation equation is written for each surface-to-surface correspondence. Each overlapping surface pair contributes a group of observation equations to the design matrix. The parameters are introduced into the system as stochastic variables, as a second type of (fictitious) observations. This extension allows to control the estimated parameters. Intensity information is introduced into the system in the form of quasisurfaces as the third type of observations. Reference points, defining an external (object) coordinate system, which are imaged in additional intensity images, or can be located in the pointcloud, serve as the fourth type of observations. They transform the whole block of “models” to a unique reference system. Furthermore, the given coordinate values of the control points are treated as observations. This gives the fifth type of observations. The total system is solved by applying the Least Squares technique, provided that sufficiently good initial values for the transformation parameters are given. This method can be applied to data sets generated from aerial as well as terrestrial laser scanning or other pointcloud generating methods. * Corresponding author. www.photogrammetry.ethz.ch",
"title": ""
},
{
"docid": "12818095167dbf85d5d717121f00f533",
"text": "Sarmento, H, Figueiredo, A, Lago-Peñas, C, Milanovic, Z, Barbosa, A, Tadeu, P, and Bradley, PS. Influence of tactical and situational variables on offensive sequences during elite football matches. J Strength Cond Res 32(8): 2331-2339, 2018-This study examined the influence of tactical and situational variables on offensive sequences during elite football matches. A sample of 68 games and 1,694 offensive sequences from the Spanish La Liga, Italian Serie A, German Bundesliga, English Premier League, and Champions League were analyzed using χ and logistic regression analyses. Results revealed that counterattacks (odds ratio [OR] = 1.44; 95% confidence interval [CI]: 1.13-1.83; p < 0.01) and fast attacks (OR = 1.43; 95% CI: 1.11-1.85; p < 0.01) increased the success of an offensive sequence by 40% compared with positional attacks. The chance of an offensive sequence ending effectively in games from the Spanish, Italian, and English Leagues were higher than that in the Champions League. Offensive sequences that started in the preoffensive or offensive zones were more successful than those started in the defensive zones. An increase of 1 second in the offensive sequence duration and an extra pass resulted in a decrease of 2% (OR = 0.98; 95% CI: 0.98-0.99; p < 0.001) and 7% (OR = 0.93; 95% CI: 0.91-0.96; p < 0.001), respectively, in the probability of its success. These findings could assist coaches in designing specific training situations that improve the effectiveness of the offensive process.",
"title": ""
},
{
"docid": "70ef6e69e811e3c66f1e73b3ad8c97b3",
"text": "The turnstile junction exhibits very low cross-polarization leakage and is suitable for low-noise millimeter-wave receivers. For use in a cryogenic receiver, it is best if the orthomode transducer (OMT) is implemented in waveguide, contains no additional assembly features, and may be directly machined. However, machined OMTs are prone to sharp signal drop-outs that are costly to overall performance since they show up directly as spikes in receiver noise. We explore the various factors contributing to this degradation and discuss how the current design mitigates each cause. Final performance is demonstrated at cryogenic temperatures.",
"title": ""
},
{
"docid": "3b6e3884a9d3b09d221d06f3dea20683",
"text": "Convolutional neural networks (CNNs) work well on large datasets. But labelled data is hard to collect, and in some applications larger amounts of data are not available. The problem then is how to use CNNs with small data – as CNNs overfit quickly. We present an efficient Bayesian CNN, offering better robustness to over-fitting on small data than traditional approaches. This is by placing a probability distribution over the CNN’s kernels. We approximate our model’s intractable posterior with Bernoulli variational distributions, requiring no additional model parameters. On the theoretical side, we cast dropout network training as approximate inference in Bayesian neural networks. This allows us to implement our model using existing tools in deep learning with no increase in time complexity, while highlighting a negative result in the field. We show a considerable improvement in classification accuracy compared to standard techniques and improve on published state-of-theart results for CIFAR-10.",
"title": ""
},
{
"docid": "6d3e19c44f7af5023ef991b722b078c5",
"text": "Volatile substances are commonly misused with easy-to-obtain commercial products, such as glue, shoe polish, nail polish remover, butane lighter fluid, gasoline and computer duster spray. This report describes a case of sudden death of a 29-year-old woman after presumably inhaling gas cartridge butane from a plastic bag. Autopsy, pathological and toxicological analyses were performed in order to determine the cause of death. Pulmonary edema was observed pathologically, and the toxicological study revealed 2.1μL/mL of butane from the blood. The causes of death from inhalation of volatile substances have been explained by four mechanisms; cardiac arrhythmia, anoxia, respiratory depression, and vagal inhibition. In this case, the cause of death was determined to be asphyxia from anoxia. Additionally, we have gathered fatal butane inhalation cases with quantitative analyses of butane concentrations, and reviewed other reports describing volatile substance abuse worldwide.",
"title": ""
},
{
"docid": "c02d98d1cbda4447498c7d3e1993bae2",
"text": "We present MILABOT: a deep reinforcement learning chatbot developed by the Montreal Institute for Learning Algorithms (MILA) for the Amazon Alexa Prize competition. MILABOT is capable of conversing with humans on popular small talk topics through both speech and text. The system consists of an ensemble of natural language generation and retrieval models, including neural network and template-based models. By applying reinforcement learning to crowdsourced data and real-world user interactions, the system has been trained to select an appropriate response from the models in its ensemble. The system has been evaluated through A/B testing with realworld users, where it performed significantly better than other systems. The results highlight the potential of coupling ensemble systems with deep reinforcement learning as a fruitful path for developing real-world, open-domain conversational agents.",
"title": ""
},
{
"docid": "46ac5e994ca0bf0c3ea5dd110810b682",
"text": "The Geosciences and Geography are not just yet another application area for semantic technologies. The vast heterogeneity of the involved disciplines ranging from the natural sciences to the social sciences introduces new challenges in terms of interoperability. Moreover, the inherent spatial and temporal information components also require distinct semantic approaches. For these reasons, geospatial semantics, geo-ontologies, and semantic interoperability have been active research areas over the last 20 years. The geospatial semantics community has been among the early adopters of the Semantic Web, contributing methods, ontologies, use cases, and datasets. Today, geographic information is a crucial part of many central hubs on the Linked Data Web. In this editorial, we outline the research field of geospatial semantics, highlight major research directions and trends, and glance at future challenges. We hope that this text will be valuable for geoscientists interested in semantics research as well as knowledge engineers interested in spatiotemporal data. Introduction and Motivation While the Web has changed with the advent of the Social Web from mostly authoritative content towards increasing amounts of user generated information, it is essentially still about linked documents. These documents provide structure and context for the described data and easy their interpretation. In contrast, the evolving Data Web is about linking data, not documents. Such datasets are not bound to a specific document but can be easily combined and used outside of their original creation context. With a growth rate of millions of new facts encoded as RDF-triples per month, the Linked Data cloud allows users to answer complex queries spanning multiple, heterogeneous data sources from different scientific domains. However, this uncoupling of data from its creation context makes the interpretation of data challenging. Thus, research on semantic interoperability and ontologies is crucial to ensure consistency and meaningful results. Space and time are fundamental ordering principles to structure such data and provide an implicit context for their interpretation. Hence, it is not surprising that many linked datasets either contain spatiotemporal identifiers themselves or link out to such datasets, making them central hubs of the Linked Data cloud. Prominent examples include Geonames.org as well as the Linked Geo Data project, which provides a RDF serialization of Points Of Interest from Open Street Map [103]. Besides such Voluntary Geographic Information (VGI), governments 1570-0844/12/$27.50 c © 2012 – IOS Press and the authors. All rights reserved",
"title": ""
}
] | scidocsrr |
914d66c51630092e0ec3babd3a9a99d2 | Improving network security monitoring for industrial control systems | [
{
"docid": "77302cf6a07ee1b6ffa27f8c12ab6ecf",
"text": "The increasing interconnectivity of SCADA (Supervisory Control and Data Acquisition) networks has exposed them to a wide range of network security problems. This paper provides an overview of all the crucial research issues that are involved in strengthening the cyber security of SCADA networks. The paper describes the general architecture of SCADA networks and the properties of some of the commonly used SCADA communication protocols. The general security threats and vulnerabilities in these networks are discussed followed by a survey of the research challenges facing SCADA networks. The paper discusses the ongoing work in several SCADA security areas such as improving access control, firewalls and intrusion detection systems, SCADA protocol analyses, cryptography and key management, device and operating system security. Many trade and research organizations are involved in trying to standardize SCADA security technologies. The paper concludes with an overview of these standardization efforts. a 2006 Elsevier Ltd. All rights reserved. Modern industrial facilities, such as oil refineries, chemical factories, electric power generation plants, and manufacturing facilities are large, distributed complexes. Plant operators must continuously monitor and control many different sections of the plant to ensure its proper operation. The development of networking technology has made this remote command and control feasible. The earliest control networks were simple point-to-point networks connecting a monitoring or command device to a remote sensor or actuator. These have since evolved into complex networks that support communication between a central control unit and multiple remote units on a common communication bus. The nodes on these networks are usually special purpose embedded computing devices such as sensors, actuators, and PLCs. These industrial command and control networks are commonly called SCADA (Supervisory Control and Data Acquisition) networks. In today’s competitive markets, it is essential for industries to modernize their digital SCADA networks to reduce costs and increase efficiency. Many of the current SCADA networks * Corresponding author. E-mail addresses: vmi5e@virginia.edu (V.M. Igure), sal4t@virginia 0167-4048/$ – see front matter a 2006 Elsevier Ltd. All rights reserve doi:10.1016/j.cose.2006.03.001 are also connected to the company’s corporate network and to the Internet. This improved connectivity can help to optimize manufacturing and distribution processes, but it also exposes the safety-critical industrial network to the myriad security problems of the Internet. If processes are monitored and controlled by devices connected over the SCADA network then a malicious attack over the SCADA network has the potential to cause significant damage to the plant. Apart from causing physical and economic loss to the company, an attack against a SCADA network might also adversely affect the environment and endanger public safety. Therefore, security of SCADA networks has become a prime concern. 1. SCADA network architecture A SCADA network provides an interconnection for field devices on the plant floor. These field devices, such as sensors and actuators, are monitored and controlled over the SCADA network by either a PC or a Programmable Logic Controller .edu (S.A. Laughter), rdw@virginia.edu (R.D. Williams). d. c o m p u t e r s & s e c u r i t y 2 5 ( 2 0 0 6 ) 4 9 8 – 5 0 6 499 (PLC). In many cases, the plants also have a dedicated control center to screen the entire plant. The control center is usually located in a separate physical part of the factory and typically has advanced computation and communication facilities. Modern control centers have data servers, Human–Machine Interface (HMI) stations and other servers to aid the operators in the overall management of the factory network. This SCADA network is usually connected to the outside corporate network and/or the Internet through specialized gateways (Sauter and Schwaiger, 2002; Schwaiger and Treytl, 2003). The gateways provide the interface between IP-based networks on the outside and the fieldbus protocol-based SCADA networks on the factory floor. The gateway provides the protocol conversion mechanisms to enable communication between the two different networks. It also provides cache mechanisms for data objects that are exchanged between the networks in order to improve the gateway performance (Sauter and Schwaiger, 2002). A typical example of SCADA network is shown in Fig. 1. Apart from performance considerations, the design requirements for a SCADA network are also shaped by the operating conditions of the network (Decotignie, 1996). These conditions influence the topology of the network and the network protocol. The resulting SCADA networks have certain unique characteristics. For example, most of the terminal devices in fieldbus networks are special purpose embedded computing systems with limited computing capability and functionality. Unlike highly populated corporate office networks, many utility industry applications of SCADA networks, such as electric power distribution, are usually sparse, yet geographically extensive. Similarly, the physical conditions of a factory floor are vastly different from that of a corporate office environment. Both the large utility and factory floor networks are often subjected to wide variations in temperature, electro-magnetic radiation, and even simple accumulation of large quantities of dust. All of these conditions increase the noise on the network and also reduce the lifetime of the wires. The specifications for the physical layer of the network must be able to withstand such harsh conditions and manage the noise on the network. Typical communications on a SCADA network include control messages exchanged between master and slave devices. A master device is one which can control the operation of another device. A PC or a PLC is an example of a master device. A slave device is usually a simple sensor or actuator which can send messages to the command device and carry out actions at the command of a master device. However, the network protocol should also provide features for communication between fieldbus devices that want to communicate as peers. To accommodate these requirements, protocols such as PROFIBUS have a hybrid communication model, which includes a peer-to-peer communication model between master devices and a client–server communication model between masters and slaves. The communication between devices can also be asymmetric (Carlson, 2002; Risley et al., 2003). For example, messages sent from the slave to the master are typically much larger than the messages sent from the master to the slave. Some devices may also communicate only through alarms and status messages. Since many devices share a common bus, the protocol must have features for assigning priorities to messages. This helps distinguish between critical and non-critical messages. For example, an alarm message about a possible safety violation should take precedence over a regular data update message. SCADA network protocols must also provide some degree of delivery assurance and stability. Many factory processes require realtime communication between field devices. The network protocol should have features that not only ensure that the Fig. 1 – Typical SCADA network architecture. c o m p u t e r s & s e c u r i t y 2 5 ( 2 0 0 6 ) 4 9 8 – 5 0 6 500 critical messages are delivered but that they are delivered within the time constraints.",
"title": ""
},
{
"docid": "11ed7e0742ddb579efe6e1da258b0d3c",
"text": "Supervisory Control and Data Acquisition(SCADA) systems are deeply ingrained in the fabric of critical infrastructure sectors. These computerized real-time process control systems, over geographically dispersed continuous distribution operations, are increasingly subject to serious damage and disruption by cyber means due to their standardization and connectivity to other networks. However, SCADA systems generally have little protection from the escalating cyber threats. In order to understand the potential danger and to protect SCADA systems, in this paper, we highlight their difference from standard IT systems and present a set of security property goals. Furthermore, we focus on systematically identifying and classifying likely cyber attacks including cyber-induced cyber-physical attack son SCADA systems. Determined by the impact on control performance of SCADA systems, the attack categorization criteria highlights commonalities and important features of such attacks that define unique challenges posed to securing SCADA systems versus traditional Information Technology(IT) systems.",
"title": ""
},
{
"docid": "9f5024623c1366b4e3c997bcfb909707",
"text": "We needed data to help ourselves and our clients to decide when to expend the extra effort to use a real-time extension such as Xenomai; when it is sufficient to use mainline Linux with the PREEMPT RT patches applied; and when unpatched mainline Linux is sufficient. To gather this data, we set out to compare the performance of three kernels: a baseline Linux kernel; the same kernel with the PREEMPT RT patches; and the same kernel with the Xenomai patches. Xenomai is a set of patches to Linux that integrates real-time capabilities from the hardware interrupt level on up. The PREEMPT RT patches make sections of the Linux kernel preemptible that are ordinarily blocking. We measure the timing for performing two tasks. The first task is to toggle a General Purpose IO (GPIO) output at a fixed period. The second task is to respond to a changing input GPIO pin by causing an output GPIO pin’s value to follow it. For this task, rather than polling, we rely on an interrupt to notify us when the GPIO input changes. For each task, we have four distinct experiments: a Linux user-space process with real-time priority; a Linux kernel module; a Xenomai user-space process; and a Xenomai kernel module. The Linux experiments are run on both a stock Linux kernel and a PREEMPT RT-patched Linux kernel. The Xenomai experiments are run on a Xenomai-patched Linux kernel. To provide an objective metric, all timing measurements are taken with an external piece of hardware, running a small C program on bare metal. This paper documents our results. In particular, we begin with a detailed description of the set of tools we developed to test the kernel configurations. We then present details of a a specific hardware test platform, the BeagleBoard C4, an OMAP3 (Arm architecture) system, and the specific kernel configurations we built to test on that platform. We provide extensive numerical results from testing the BeagleBoard. For instance, the approximate highest external-stimulus frequency for which at least 95% of the time the latency does not exceed 1/2 the period is 31kHz. This frequency is achieved with a kernel module on stock Linux; the best that can be achieved with a userspace module is 8.4kHz, using a Xenomai userspace process. If the latency must not exceed 1/2 the frequency 100% of the time, then Xenomai is the best option for both kernelspace and userspace; a Xenomai kernel module can run at 13.5kHz, while a userspace process can hit 5.9kHz. In addition to the numerical results, we discuss the qualitative difficulties we experienced in trying to test these configurations on the BeagleBoard. Finally, we offer our recommendations for deciding when to use stock Linux vs. PREEMPT RTpatched Linux vs. Xenomai for real-time applications.",
"title": ""
}
] | [
{
"docid": "e603b32746560887bdd6dbcfdc2e1c28",
"text": "A systematic review of self-report family assessment measures was conducted with reference to their psychometric properties, clinical utility and theoretical underpinnings. Eight instruments were reviewed: The McMaster Family Assessment Device (FAD); Circumplex Model Family Adaptability and Cohesion Evaluation Scales (FACES); Beavers Systems Model Self-Report Family Inventory (SFI); Family Assessment Measure III (FAM III); Family Environment Scale (FES); Family Relations Scale (FRS); and Systemic Therapy Inventory of Change (STIC); and the Systemic Clinical Outcome Routine Evaluation (SCORE). Results indicated that five family assessment measures are suitable for clinical use (FAD, FACES-IV, SFI, FAM III, SCORE), two are not (FES, FRS), and one is a new system currently under-going validation (STIC).",
"title": ""
},
{
"docid": "7f8ca7d8d2978bfc08ab259fba60148e",
"text": "Over the last few years, much online volunteered geographic information (VGI) has emerged and has been increasingly analyzed to understand places and cities, as well as human mobility and activity. However, there are concerns about the quality and usability of such VGI. In this study, we demonstrate a complete process that comprises the collection, unification, classification and validation of a type of VGI—online point-of-interest (POI) data—and develop methods to utilize such POI data to estimate disaggregated land use (i.e., employment size by category) at a very high spatial resolution (census block level) using part of the Boston metropolitan area as an example. With recent advances in activity-based land use, transportation, and environment (LUTE) models, such disaggregated land use data become important to allow LUTE models to analyze and simulate a person’s choices of work location and activity destinations and to understand policy impacts on future cities. These data can also be used as alternatives to explore economic activities at the local level, especially as government-published census-based disaggregated employment data have become less available in the recent decade. Our new approach provides opportunities for cities to estimate land use at high resolution with low cost by utilizing VGI while ensuring its quality with a certain accuracy threshold. The automatic classification of POI can also be utilized for other types of analyses on cities. 2014 Elsevier Ltd. All rights reserved.",
"title": ""
},
{
"docid": "9377e5de9d7a440aa5e73db10aa630f4",
"text": ". Micro-finance programmes targeting women became a major plank of donor poverty alleviation and gender strategies in the 1990s. Increasing evidence of the centrality of gender equality to poverty reduction and women’s higher credit repayment rates led to a general consensus on the desirability of targeting women. Not only ‘reaching’ but also ‘empowering’ women became the second official goal of the Micro-credit Summit Campaign.",
"title": ""
},
{
"docid": "3ba9e91a4d2ff8cb1fe479f5dddc86c1",
"text": "Researchers have shown that program analyses that drive software development and maintenance tools supporting search, traceability and other tasks can benefit from leveraging the natural language information found in identifiers and comments. Accurate natural language information depends on correctly splitting the identifiers into their component words and abbreviations. While conventions such as camel-casing can ease this task, conventions are not well-defined in certain situations and may be modified to improve readability, thus making automatic splitting more challenging. This paper describes an empirical study of state-of-the-art identifier splitting techniques and the construction of a publicly available oracle to evaluate identifier splitting algorithms. In addition to comparing current approaches, the results help to guide future development and evaluation of improved identifier splitting approaches.",
"title": ""
},
{
"docid": "6247c827c6fdbc976b900e69a9eb275c",
"text": "Despite the fact that commercial computer systems have been in existence for almost three decades, many systems in the process of being implemented may be classed as failures. One of the factors frequently cited as important to successful system development is involving users in the design and implementation process. This paper reports the results of a field study, conducted on data from forty-two systems, that investigates the role of user involvement and factors affecting the employment of user involvement on the success of system development. Path analysis was used to investigate both the direct effects of the contingent variables on system success and the effect of user involvement as a mediating variable between the contingent variables and system success. The results show that high system complexity and constraints on the resources available for system development are associated with less successful systems.",
"title": ""
},
{
"docid": "93fcbdfe59015b67955246927d67a620",
"text": "The Emotion Recognition in the Wild (EmotiW) Challenge has been held for three years. Previous winner teams primarily focus on designing specific deep neural networks or fusing diverse hand-crafted and deep convolutional features. They all neglect to explore the significance of the latent relations among changing features resulted from facial muscle motions. In this paper, we study this recognition challenge from the perspective of analyzing the relations among expression-specific facial features in an explicit manner. Our method has three key components. First, we propose a pair-wise learning strategy to automatically seek a set of facial image patches which are important for discriminating two particular emotion categories. We found these learnt local patches are in part consistent with the locations of expression-specific Action Units (AUs), thus the features extracted from such kind of facial patches are named AU-aware facial features. Second, in each pair-wise task, we use an undirected graph structure, which takes learnt facial patches as individual vertices, to encode feature relations between any two learnt facial patches. Finally, a robust emotion representation is constructed by concatenating all task-specific graph-structured facial feature relations sequentially. Extensive experiments on the EmotiW 2015 Challenge testify the efficacy of the proposed approach. Without using additional data, our final submissions achieved competitive results on both sub-challenges including the image based static facial expression recognition (we got 55.38% recognition accuracy outperforming the baseline 39.13% with a margin of 16.25%) and the audio-video based emotion recognition (we got 53.80% recognition accuracy outperforming the baseline 39.33% and the 2014 winner team's final result 50.37% with the margins of 14.47% and 3.43%, respectively).",
"title": ""
},
{
"docid": "e5ec3cf10b6664642db6a27d7c76987c",
"text": "We present a protocol for payments across payment systems. It enables secure transfers between ledgers and allows anyone with accounts on two ledgers to create a connection between them. Ledger-provided escrow removes the need to trust these connectors. Connections can be composed to enable payments between any ledgers, creating a global graph of liquidity or Interledger. Unlike previous approaches, this protocol requires no global coordinating system or blockchain. Transfers are escrowed in series from the sender to the recipient and executed using one of two modes. In the Atomic mode, transfers are coordinated using an ad-hoc group of notaries selected by the participants. In the Universal mode, there is no external coordination. Instead, bounded execution windows, participant incentives and a “reverse” execution order enable secure payments between parties without shared trust in any system or institution.",
"title": ""
},
{
"docid": "da287113f7cdcb8abb709f1611c8d457",
"text": "The paper describes a completely new topology for a low-speed, high-torque permanent brushless magnet machine. Despite being naturally air-cooled, it has a significantly higher torque density than a liquid-cooled transverse-flux machine, whilst its power factor is similar to that of a conventional permanent magnet brushless machine. The high torque capability and low loss density are achieved by combining the actions of a speed reducing magnetic gear and a high speed PM brushless machine within a highly integrated magnetic circuit. In this way, the magnetic limit of the machine is reached before its thermal limit. The principle of operation of such a dasiapseudopsila direct-drive machine is described, and measured results from a prototype machine are presented.",
"title": ""
},
{
"docid": "f114e788557e8d734bd2a04a5b789208",
"text": "Adaptive content delivery is the state of the art in real-time multimedia streaming. Leading streaming approaches, e.g., MPEG-DASH and Apple HTTP Live Streaming (HLS), have been developed for classical IP-based networks, providing effective streaming by means of pure client-based control and adaptation. However, the research activities of the Future Internet community adopt a new course that is different from today's host-based communication model. So-called information-centric networks are of considerable interest and are advertised as enablers for intelligent networks, where effective content delivery is to be provided as an inherent network feature. This paper investigates the performance gap between pure client-driven adaptation and the theoretical optimum in the promising Future Internet architecture named data networking (NDN). The theoretical optimum is derived by modeling multimedia streaming in NDN as a fractional multi-commodity flow problem and by extending it taking caching into account. We investigate the multimedia streaming performance under different forwarding strategies, exposing the interplay of forwarding strategies and adaptation mechanisms. Furthermore, we examine the influence of network inherent caching on the streaming performance by varying the caching polices and the cache sizes.",
"title": ""
},
{
"docid": "48518bad41b1b422f698a1f09997960f",
"text": "Knowledge graph is powerful tool for knowledge based engineering. In this paper, a vertical knowledge graph is proposed for the non-traditional machining. Firstly, the definition and classification of the knowledge graph are proposed. Then, the construct flow and key techniques are discussed in details for the construction of vertical knowledge graph. Finally, a vertical knowledge graph of EDM (electrical discharge matching) is proposed as a case study to illustrate the feasibility of this method.",
"title": ""
},
{
"docid": "2710a25b3cf3caf5ebd5fb9f08c9e5e3",
"text": "Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org/page/info/about/policies/terms.jsp. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use.",
"title": ""
},
{
"docid": "defc7f4420ad99d410fa18c24b46ab24",
"text": "To determine a reference range of fetal transverse cerebellar diameter in Brazilian population. This was a retrospective cross-sectional study with 3772 normal singleton pregnancies between 18 and 24 weeks of pregnancy. The transverse cerebellar diameter was measured on the axial plane of the fetal head at the level of the lateral ventricles, including the thalamus, cavum septum pellucidum, and third ventricle. To assess the correlation between transverse cerebellar diameter and gestational age, polynomial equations were calculated, with adjustments by the determination coefficient (R2). The mean of fetal transverse cerebellar diameter ranged from 18.49 ± 1.24 mm at 18 weeks to 25.86 ± 1.66 mm at 24 weeks of pregnancy. We observed a good correlation between transverse cerebellar diameter and gestational age, which was best represented by a linear equation: transverse cerebellar diameter: -6.21 + 1.307*gestational age (R2 = 0.707). We determined a reference range of fetal transverse cerebellar diameter for the second trimester of pregnancy in Brazilian population.",
"title": ""
},
{
"docid": "0b41e6fde6fb9a1f685ceec59fc5abc9",
"text": "Reflector antennas are widely used on satellites to communicate with ground stations. They simultaneously transmit and receive RF signals using separate downlink and uplink frequency bands. These antennas require compact and high-performance feed assemblies with small size, low mass, low passive intermodulation (PIM) products [1], low insertion loss, high power handling, and low cross-polar levels. The feeds must also be insensitive to large thermal variations, and must survive the launch environment. In order to achieve these desirable features without prototyping and/or bench tuning, Custom Microwave Inc. (CMI) has combined integrated RF design, precision CAD, and a precision manufacturing technique known as electroforming to closely integrate the various components of a feed or feed network, thereby achieving small size while maintaining high RF performance [2]. In addition to close integration, electroforming eliminates split joints and minimizes flanges by allowing several components to be realized in a single piece, making it the ideal manufacturing technique for ultra-low passive-intermodulation applications. This paper describes the use of precision design CAD tools along with electroforming to realize high-performance feed assemblies for various communication frequency bands for fixed satellite, broadcast satellite, and broadband satellite services.",
"title": ""
},
{
"docid": "878bdefc419be3da8d9e18111d26a74f",
"text": "PURPOSE\nTo estimate prevalence and chronicity of insomnia and the impact of chronic insomnia on health and functioning of adolescents.\n\n\nMETHODS\nData were collected from 4175 youths 11-17 at baseline and 3134 a year later sampled from managed care groups in a large metropolitan area. Insomnia was assessed by youth-reported DSM-IV symptom criteria. Outcomes are three measures of somatic health, three measures of mental health, two measures of substance use, three measures of interpersonal problems, and three of daily activities.\n\n\nRESULTS\nOver one-fourth reported one or more symptoms of insomnia at baseline and about 5% met diagnostic criteria for insomnia. Almost 46% of those who reported one or more symptoms of insomnia in Wave 1 continued to be cases at Wave 2 and 24% met DSM-IV symptom criteria for chronic insomnia (cases in Wave 1 were also cases in Wave 2). Multivariate analyses found chronic insomnia increased subsequent risk for somatic health problems, interpersonal problems, psychological problems, and daily activities. Significant odds (p < .05) ranged from 1.6 to 5.6 for poor outcomes. These results are the first reported on chronic insomnia among youths, and corroborate, using prospective data, previous findings on correlates of disturbed sleep based on cross-sectional studies.\n\n\nCONCLUSIONS\nInsomnia is both common and chronic among adolescents. The data indicate that the burden of insomnia is comparable to that of other psychiatric disorders such as mood, anxiety, disruptive, and substance use disorders. Chronic insomnia severely impacts future health and functioning of youths. Those with chronic insomnia are more likely to seek medical care. These data suggest primary care settings might provide a venue for screening and early intervention for adolescent insomnia.",
"title": ""
},
{
"docid": "df3c5a848c66dbd5e804242a93cdb998",
"text": "Handwritten character recognition has been one of the most fascinating research among the various researches in field of image processing. In Handwritten character recognition method the input is scanned from images, documents and real time devices like tablets, tabloids, digitizers etc. which are then interpreted into digital text. There are basically two approaches - Online Handwritten recognition which takes the input at run time and Offline Handwritten Recognition which works on scanned images. In this paper we have discussed the architecture, the steps involved, and the various proposed methodologies of offline and online character recognition along with their comparison and few applications.",
"title": ""
},
{
"docid": "a87ed525f9732e66e6c172867ef8b189",
"text": "We examine corporate financial and investment decisions made by female executives compared with male executives. Male executives undertake more acquisitions and issue debt more often than female executives. Further, acquisitions made by firms with male executives have announcement returns approximately 2% lower than those made by female executive firms, and debt issues also have lower announcement returns for firms with male executives. Female executives place wider bounds on earnings estimates and are more likely to exercise stock options early. This evidence suggests men exhibit relative overconfidence in significant corporate decision making compared with women. & 2013 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "87447383afe36c38a5f0a7066614336e",
"text": "The current study examined whether self-compassion, the tendency to treat oneself kindly during distress and disappointments, would attenuate the positive relationship between body mass index (BMI) and eating disorder pathology, and the negative relationship between BMI and body image flexibility. One-hundred and fifty-three female undergraduate students completed measures of self-compassion, self-esteem, eating disorder pathology, and body image flexibility, which refers to one's acceptance of negative body image experiences. Controlling for self-esteem, hierarchical regressions revealed that self-compassion moderated the relationships between BMI and the criteria. Specifically, the positive relationship between BMI and eating disorder pathology and the negative relationship between BMI and body image flexibility were weaker the higher women's levels of self-compassion. Among young women, self-compassion may help to protect against the greater eating disturbances that coincide with a higher BMI, and may facilitate the positive body image experiences that tend to be lower the higher one's BMI.",
"title": ""
},
{
"docid": "7da294f96055210548a1b9f33204c234",
"text": "ARGUS is a multi-agent visitor identification system distributed over several workstations. Human faces are extracted from security camera images by a neuralnetwork-based face detector, and identified as frequent visitors by ARENA, a memory-based face recognition system. ARGUS then uses a messaging system to notify hosts that their guests have arrived. An interface agent enables users to submit feedback, which is immediately incorporated by ARENA to improve its face recognition performance. The ARGUS components were rapidly developed using JGram, an agent framework that is also detailed in this paper. JGram automatically converts high-level agent specifications into Java source code, and assembles complex tasks by composing individual agent services into a JGram pipeline. ARGUS has been operating successfully in an outdoor environment for several months.",
"title": ""
},
{
"docid": "badb04b676d3dab31024e8033fc8aec4",
"text": "Review was undertaken from February 1969 to January 1998 at the State forensic science center (Forensic Science) in Adelaide, South Australia, of all cases of murder-suicide involving children <16 years of age. A total of 13 separate cases were identified involving 30 victims, all of whom were related to the perpetrators. There were 7 male and 6 female perpetrators (age range, 23-41 years; average, 31 years) consisting of 6 mothers, 6 father/husbands, and 1 uncle/son-in-law. The 30 victims consisted of 11 daughters, 11 sons, 1 niece, 1 mother-in-law, and 6 wives of the assailants. The 23 children were aged from 10 months to 15 years (average, 6.0 years). The 6 mothers murdered 9 children and no spouses, with 3 child survivors. The 6 fathers murdered 13 children and 6 wives, with 1 child survivor. This study has demonstrated a higher percentage of female perpetrators than other studies of murder-suicide. The methods of homicide and suicide used were generally less violent among the female perpetrators compared with male perpetrators. Fathers killed not only their children but also their wives, whereas mothers murdered only their children. These results suggest differences between murder-suicides that involve children and adult-only cases, and between cases in which the mother rather than the father is the perpetrator.",
"title": ""
},
{
"docid": "7ce79a08969af50c1712f0e291dd026c",
"text": "Collaborative filtering (CF) is valuable in e-commerce, and for direct recommendations for music, movies, news etc. But today's systems have several disadvantages, including privacy risks. As we move toward ubiquitous computing, there is a great potential for individuals to share all kinds of information about places and things to do, see and buy, but the privacy risks are severe. In this paper we describe a new method for collaborative filtering which protects the privacy of individual data. The method is based on a probabilistic factor analysis model. Privacy protection is provided by a peer-to-peer protocol which is described elsewhere, but outlined in this paper. The factor analysis approach handles missing data without requiring default values for them. We give several experiments that suggest that this is most accurate method for CF to date. The new algorithm has other advantages in speed and storage over previous algorithms. Finally, we suggest applications of the approach to other kinds of statistical analyses of survey or questionaire data.",
"title": ""
}
] | scidocsrr |
855e7b7c66ccc2d20ae56c055b034585 | Enhancing Light Fields through Ray-Space Stitching | [
{
"docid": "112f10eb825a484850561afa7c23e71f",
"text": "We describe an image based rendering approach that generalizes many current image based rendering algorithms, including light field rendering and view-dependent texture mapping. In particular, it allows for lumigraph-style rendering from a set of input cameras in arbitrary configurations (i.e., not restricted to a plane or to any specific manifold). In the case of regular and planar input camera positions, our algorithm reduces to a typical lumigraph approach. When presented with fewer cameras and good approximate geometry, our algorithm behaves like view-dependent texture mapping. The algorithm achieves this flexibility because it is designed to meet a set of specific goals that we describe. We demonstrate this flexibility with a variety of examples.",
"title": ""
}
] | [
{
"docid": "2e0a8498613410fd5827e30b7b4daade",
"text": "Linux containers in the commercial world are changing the landscape for application development and deployments. Container technologies are also making inroads into HPC environments, as exemplified by NERSC’s Shifter and LBL’s Singularity. While the first generation of HPC containers offers some of the same benefits as the existing open container frameworks, like CoreOS or Docker, they do not address the cloud/commercial feature sets such as virtualized networks, full isolation, and orchestration. This paper will explore the use of containers in the HPC environment and summarize our study to determine how best to use these technologies in the HPC environment at scale. KeywordsShifter; HPC; Cray; container; virtualization; Docker; CoreOS",
"title": ""
},
{
"docid": "64cbc5ec72c81bd44e992076de5edc56",
"text": "The goal of compressed sensing is to estimate a vector from an underdetermined system of noisy linear measurements, by making use of prior knowledge on the structure of vectors in the relevant domain. For almost all results in this literature, the structure is represented by sparsity in a well-chosen basis. We show how to achieve guarantees similar to standard compressed sensing but without employing sparsity at all. Instead, we suppose that vectors lie near the range of a generative model G : R → R. Our main theorem is that, if G is L-Lipschitz, then roughly O(k logL) random Gaussian measurements suffice for an `2/`2 recovery guarantee. We demonstrate our results using generative models from published variational autoencoder and generative adversarial networks. Our method can use 5-10x fewer measurements than Lasso for the same accuracy.",
"title": ""
},
{
"docid": "89e11f208c3c96e2b55b00ffbf7da59b",
"text": "In data mining, regression analysis is a computational tool that predicts continuous output variables from a number of independent input variables, by approximating their complex inner relationship. A large number of methods have been successfully proposed, based on various methodologies, including linear regression, support vector regression, neural network, piece-wise regression etc. In terms of piece-wise regression, the existing methods in literature are usually restricted to problems of very small scale, due to their inherent non-linear nature. In this work, a more efficient piece-wise regression method is introduced based on a novel integer linear programming formulation. The proposed method partitions one input variable into multiple mutually exclusive segments, and fits one multivariate linear regression function per segment to minimise the total absolute error. Assuming both the single partition feature and the number of regions are known, the mixed integer linear model is proposed to simultaneously determine the locations of multiple break-points and regression coefficients for each segment. Furthermore, an efficient heuristic procedure is presented to identify the key partition feature and final number of break-points. 7 real world problems covering several application domains have been used to demon∗Corresponding author: Tel.: +442076792563; Fax.: +442073882348 Email addresses: lingjian.yang.10@ucl.ac.uk (Lingjian Yang), s.liu@ucl.ac.uk (Songsong Liu), sophia.tsoka@kcl.ac.uk (Sophia Tsoka), l.papageorgiou@ucl.ac.uk (Lazaros G. Papageorgiou) Preprint submitted to Journal of Expert Systems with Applications August 12, 2015 Accepted Manuscript of a publised work apears its final form in Expert Systems with Applications. To access the final edited and published work see http://dx.doi.org/10.1016/j.eswa.2015.08.034. Open Access under CC-BY-NC-ND user license (http://creativecommons.org/licenses/by-nc-nd/4.0/).",
"title": ""
},
{
"docid": "a1b3616da2faad8093c44fb7dfce6974",
"text": "In this paper, a multiobjective optimization approach for designing a Manipulator Robot by simultaneously considering the mechanism, the controller and the servo drive subsystems is proposed. The integrated design problem is considered as a nonlinear multiobjective dynamic optimization problem, which relates the structural parameters, the robot controller and the selection of the ratio gear-motor from an industry catalog. A three dof manipulator robot and its controller are designed, where the performance design objectives are tracking error, manipulability measure and energy consumption.",
"title": ""
},
{
"docid": "d4cdea26217e90002a3c4522124872a2",
"text": "Recently, several methods for single image super-resolution(SISR) based on deep neural networks have obtained high performance with regard to reconstruction accuracy and computational performance. This paper details the methodology and results of the New Trends in Image Restoration and Enhancement (NTIRE) challenge. The task of this challenge is to restore rich details (high frequencies) in a high resolution image for a single low resolution input image based on a set of prior examples with low and corresponding high resolution images. The challenge has two tracks. We present a super-resolution (SR) method, which uses three losses assigned with different weights to be regarded as optimization target. Meanwhile, the residual blocks are also used for obtaining significant improvement in the evaluation. The final model consists of 9 weight layers with four residual blocks and reconstructs the low resolution image with three color channels simultaneously, which shows better performance on these two tracks and benchmark datasets.",
"title": ""
},
{
"docid": "fa02851220984f9c77f95e8a3f8e6929",
"text": "Consumers are increasingly navigating across sales channels to maximize the value of their purchase. The existing retail practices of pricing channels independently at the one end, and matching channel and competitor prices at the other, are unable to achieve the desired profitable coordination required between channels. As part of a joint partnership agreement with IBM Commerce, we engaged with three major retailers over two years, and developed advanced omnichannel pricing (OCP) solutions that are used by several retail chains today. We develop an omnichannel framework to model location-specific cross-channel demand interactions. An integrated OCP optimization formulation profitably coordinates prices for non-perishable products across channels and store locations, while satisfying a variety of business rules, and taking into account the impact of competition, and sales goals. We present the OCP formulations with and without assortment effects. The resultant non-linear models are non-convex and NP-hard, and practically efficient optimization approaches are prescribed, along with computational results using real-world data. An OCP implementation for a large retail chain projected a 7% profit lift. IBM Commerce deployed proprietary versions of these models into production in 2014.",
"title": ""
},
{
"docid": "db5f7ec4e2e58b00f5e43395d986ca39",
"text": "There is an urgent need in aquaculture to develop microbial control strategies, since disease outbreaks are recognized as important constraints to aquaculture production and trade and since the development of antibiotic resistance has become a matter of growing concern. One of the alternatives to antimicrobials in disease control could be the use of probiotic bacteria as microbial control agents. This review describes the state of the art of probiotic research in the culture of fish, crustaceans, mollusks, and live food, with an evaluation of the results obtained so far. A new definition of probiotics, also applicable to aquatic environments, is proposed, and a detailed description is given of their possible modes of action, i.e., production of compounds that are inhibitory toward pathogens, competition with harmful microorganisms for nutrients and energy, competition with deleterious species for adhesion sites, enhancement of the immune response of the animal, improvement of water quality, and interaction with phytoplankton. A rationale is proposed for the multistep and multidisciplinary process required for the development of effective and safe probiotics for commercial application in aquaculture. Finally, directions for further research are discussed.",
"title": ""
},
{
"docid": "d0c8a1faccfa3f0469e6590cc26097c8",
"text": "This paper introduces an automatic method for editing a portrait photo so that the subject appears to be wearing makeup in the style of another person in a reference photo. Our unsupervised learning approach relies on a new framework of cycle-consistent generative adversarial networks. Different from the image domain transfer problem, our style transfer problem involves two asymmetric functions: a forward function encodes example-based style transfer, whereas a backward function removes the style. We construct two coupled networks to implement these functions - one that transfers makeup style and a second that can remove makeup - such that the output of their successive application to an input photo will match the input. The learned style network can then quickly apply an arbitrary makeup style to an arbitrary photo. We demonstrate the effectiveness on a broad range of portraits and styles.",
"title": ""
},
{
"docid": "1072728cf72fe02d3e1f3c45bfc877b5",
"text": "The annihilating filter-based low-rank Hanel matrix approach (ALOHA) is one of the state-of-the-art compressed sensing approaches that directly interpolates the missing k-space data using low-rank Hankel matrix completion. Inspired by the recent mathematical discovery that links deep neural networks to Hankel matrix decomposition using data-driven framelet basis, here we propose a fully data-driven deep learning algorithm for k-space interpolation. Our network can be also easily applied to non-Cartesian k-space trajectories by simply adding an additional re-gridding layer. Extensive numerical experiments show that the proposed deep learning method significantly outperforms the existing image-domain deep learning approaches.",
"title": ""
},
{
"docid": "9a1665cff530d93c84598e7df947099f",
"text": "The algorithmic Markov condition states that the most likely causal direction between two random variables X and Y can be identified as the direction with the lowest Kolmogorov complexity. This notion is very powerful as it can detect any causal dependency that can be explained by a physical process. However, due to the halting problem, it is also not computable. In this paper we propose an computable instantiation that provably maintains the key aspects of the ideal. We propose to approximate Kolmogorov complexity via the Minimum Description Length (MDL) principle, using a score that is mini-max optimal with regard to the model class under consideration. This means that even in an adversarial setting, the score degrades gracefully, and we are still maximally able to detect dependencies between the marginal and the conditional distribution. As a proof of concept, we propose CISC, a linear-time algorithm for causal inference by stochastic complexity, for pairs of univariate discrete variables. Experiments show that CISC is highly accurate on synthetic, benchmark, as well as real-world data, outperforming the state of the art by a margin, and scales extremely well with regard to sample and domain sizes.",
"title": ""
},
{
"docid": "60d807b2bbd3106a0e359c66805b403a",
"text": "The existing word representation methods mostly limit their information source to word co-occurrence statistics. In this paper, we introduce ngrams into four representation methods: SGNS, GloVe, PPMI matrix, and its SVD factorization. Comprehensive experiments are conducted on word analogy and similarity tasks. The results show that improved word representations are learned from ngram cooccurrence statistics. We also demonstrate that the trained ngram representations are useful in many aspects such as finding antonyms and collocations. Besides, a novel approach of building co-occurrence matrix is proposed to alleviate the hardware burdens brought by ngrams.",
"title": ""
},
{
"docid": "d1c34dda56e06cdae9d23c2e1cec41d2",
"text": "The detection of loop closure is of essential importance in visual simultaneous localization and mapping systems. It can reduce the accumulating drift of localization algorithms if the loops are checked correctly. Traditional loop closure detection approaches take advantage of Bag-of-Words model, which clusters the feature descriptors as words and measures the similarity between the observations in the word space. However, the features are usually designed artificially and may not be suitable for data from new-coming sensors. In this paper a novel loop closure detection approach is proposed that learns features from raw data using deep neural networks instead of common visual features. We discuss the details of the method of training neural networks. Experiments on an open dataset are also demonstrated to evaluate the performance of the proposed method. It can be seen that the neural network is feasible to solve this problem.",
"title": ""
},
{
"docid": "b18261d40726ad4b4c950f86ad19293a",
"text": "The role mining problem has received considerable attention recently. Among the many solutions proposed, the Boolean matrix decomposition (BMD) formulation has stood out, which essentially discovers roles by decomposing the binary matrix representing user-to-permission assignment (UPA) into two matrices-user-to-role assignment (UA) and permission-to-role assignment (PA). However, supporting certain embedded constraints, such as separation of duty (SoD) and exceptions, is critical to the role mining process. Otherwise, the mined roles may not capture the inherent constraints of the access control policies of the organization. None of the previously proposed role mining solutions, including BMD, take into account these underlying constraints while mining. In this paper, we extend the BMD so that it reflects such embedded constraints by proposing to allow negative permissions in roles or negative role assignments for users. Specifically, by allowing negative permissions in roles, we are often able to use less roles to reconstruct the same given user-permission assignments. Moreover, from the resultant roles we can discover underlying constraints such as separation of duty constraints. This feature is not supported by any existing role mining approaches. Hence, we call the role mining problem with negative authorizations the constraint-aware role mining problem (CRM). We also explore other interesting variants of the CRM, which may occur in real situations. To enable CRM and its variants, we propose a novel approach, extended Boolean matrix decomposition (EBMD), which addresses the ineffectiveness of BMD in its ability of capturing underlying constraints. We analyze the computational complexity for each of CRM variants and present heuristics for problems that are proven to be NP-hard.",
"title": ""
},
{
"docid": "93a283324fed31e4ecf81d62acae583a",
"text": "The success of the state-of-the-art deblurring methods mainly depends on the restoration of sharp edges in a coarse-to-fine kernel estimation process. In this paper, we propose to learn a deep convolutional neural network for extracting sharp edges from blurred images. Motivated by the success of the existing filtering-based deblurring methods, the proposed model consists of two stages: suppressing extraneous details and enhancing sharp edges. We show that the two-stage model simplifies the learning process and effectively restores sharp edges. Facilitated by the learned sharp edges, the proposed deblurring algorithm does not require any coarse-to-fine strategy or edge selection, thereby significantly simplifying kernel estimation and reducing computation load. Extensive experimental results on challenging blurry images demonstrate that the proposed algorithm performs favorably against the state-of-the-art methods on both synthetic and real-world images in terms of visual quality and run-time.",
"title": ""
},
{
"docid": "fecfd19eaf90b735cf00e727fca768b8",
"text": "Real-time detection of irregularities in visual data is very invaluable and useful in many prospective applications including surveillance, patient monitoring systems, etc. With the surge of deep learning methods in the recent years, researchers have tried a wide spectrum of methods for different applications. However, for the case of irregularity or anomaly detection in videos, training an end-to-end model is still an open challenge, since often irregularity is not well-defined and there are not enough irregular samples to use during training. In this paper, inspired by the success of generative adversarial networks (GANs) for training deep models in unsupervised or self-supervised settings, we propose an end-to-end deep network for detection and fine localization of irregularities in videos (and images). Our proposed architecture is composed of two networks, which are trained in competing with each other while collaborating to find the irregularity. One network works as a pixel-level irregularity Inpainter, and the other works as a patch-level Detector. After an adversarial self-supervised training, in which I tries to fool D into accepting its inpainted output as regular (normal), the two networks collaborate to detect and fine-segment the irregularity in any given testing video. Our results on three different datasets show that our method can outperform the state-of-the-art and fine-segment the irregularity. 1",
"title": ""
},
{
"docid": "6f045c9f48ce87f6b425ac6c5f5d5e9d",
"text": "In the modern web, the browser has emerged as the vehicle of choice, which users are to trust, customize, and use, to access a wealth of information and online services. However, recent studies show that the browser can also be used to invisibly fingerprint the user: a practice that may have serious privacy and security implications.\n In this paper, we report on the design, implementation and deployment of FPDetective, a framework for the detection and analysis of web-based fingerprinters. Instead of relying on information about known fingerprinters or third-party-tracking blacklists, FPDetective focuses on the detection of the fingerprinting itself. By applying our framework with a focus on font detection practices, we were able to conduct a large scale analysis of the million most popular websites of the Internet, and discovered that the adoption of fingerprinting is much higher than previous studies had estimated. Moreover, we analyze two countermeasures that have been proposed to defend against fingerprinting and find weaknesses in them that might be exploited to bypass their protection. Finally, based on our findings, we discuss the current understanding of fingerprinting and how it is related to Personally Identifiable Information, showing that there needs to be a change in the way users, companies and legislators engage with fingerprinting.",
"title": ""
},
{
"docid": "8c22705dd96190f865ded843918881c5",
"text": "Now a days its a challenge to improve development of plant in respect of its growth and to reduce costs which leads to an innovative idea of using an automated irrigation system which will further help in better management of water and human resources. An automated irrigation system have been developed using sensors technology with Arduino to efficiently utilize water for irrigation purpose. The system has soil moisture sensor inserted into the soil of the plants and a water level sensor placed in a water container from where water will be pumped to plants for irrigation. An algorithm has been build out with threshold values of soil moisture sensor to control the water quantity in soil and also a water level sensor has been implemented to measure the water level in tank. This project requires Arduino board having inbuilt ATMega328 microcontroller. This project is need of the hour to convert manual irrigation into an automated irrigation which with the help of soil moisture sensor will detect dankness content of soil leading to turn ON/OFF of pumping motor. Human efforts can be reduced using this technique and increase saving of water by efficiently irrigating the plants. The design has been made with better resource management and low power consumption. This project brings into play a micro-controller which is of 8051 family, this programmable micro-controller collects the input signals converted into values of moisture in the soil via soil moisture sensors. As the microcontroller starts obtaining the signals, it creates an output that forces a relay for running the water pumping motor. An LCD screen is also linked to the micro-controller to show moisture conditions of the soil and water pump. The water level sensor is used to detect the level of tank so that tank contains efficient water to transfer into crops.",
"title": ""
},
{
"docid": "d00f7e5085d5aa9d8ac38f2abc7b5237",
"text": "Data-driven machine learning, in particular deep learning, is improving state-ofthe-art in many healthcare prediction tasks. A current standard protocol is to collect patient data to build, evaluate, and deploy machine learning algorithms for specific age groups (say source domain), which, if not properly trained, can perform poorly on data from other age groups (target domains). In this paper, we address the question of whether it is possible to adapt machine learning models built for one age group to also perform well on other age groups. Additionally, healthcare time series data is also challenging in that it is usually longitudinal and episodic with the potential of having complex temporal relationships. We address these problems with our proposed adversarially trained Variational Adversarial Deep Domain Adaptation (VADDA) model built atop a variational recurrent neural network, which has been shown to be capable of capturing complex temporal latent relationships. We assume and empirically justify that patient data from different age groups can be treated as being similar but different enough to be classified as coming from different domains, requiring the use of domain-adaptive approaches. Through experiments on the MIMIC-III dataset we demonstrate that our model outperforms current state-of-the-art domain adaptation approaches, being (as far as we know) the first to accomplish this for healthcare time-series data.",
"title": ""
},
{
"docid": "ed6aec69b76444f877343277865e2fd0",
"text": "Abstract Context: In the context of exploring the art, science and engineering of programming, the question of which programming languages should be taught first has been fiercely debated since computer science teaching started in universities. Failure to grasp programming readily almost certainly implies failure to progress in computer science. Inquiry:What first programming languages are being taught? There have been regular national-scale surveys in Australia and New Zealand, with the only US survey reporting on a small subset of universities. This the first such national survey of universities in the UK. Approach: We report the results of the first survey of introductory programming courses (N = 80) taught at UK universities as part of their first year computer science (or related) degree programmes, conducted in the first half of 2016. We report on student numbers, programming paradigm, programming languages and environment/tools used, as well as the underpinning rationale for these choices. Knowledge: The results in this first UK survey indicate a dominance of Java at a time when universities are still generally teaching students who are new to programming (and computer science), despite the fact that Python is perceived, by the same respondents, to be both easier to teach as well as to learn. Grounding: We compare the results of this survey with a related survey conducted since 2010 (as well as earlier surveys from 2001 and 2003) in Australia and New Zealand. Importance: This survey provides a starting point for valuable pedagogic baseline data for the analysis of the art, science and engineering of programming, in the context of substantial computer science curriculum reform in UK schools, as well as increasing scrutiny of teaching excellence and graduate employability for UK universities.",
"title": ""
},
{
"docid": "9f5998ebc2457c330c29a10772d8ee87",
"text": "Fuzzy hashing is a known technique that has been adopted to speed up malware analysis processes. However, Hashing has not been fully implemented for malware detection because it can easily be evaded by applying a simple obfuscation technique such as packing. This challenge has limited the usage of hashing to triaging of the samples based on the percentage of similarity between the known and unknown. In this paper, we explore the different ways fuzzy hashing can be used to detect similarities in a file by investigating particular hashes of interest. Each hashing method produces independent but related interesting results which are presented herein. We further investigate combination techniques that can be used to improve the detection rates in hashing methods. Two such evidence combination theory based methods are applied in this work in order propose a novel way of combining the results achieved from different hashing algorithms. This study focuses on file and section Ssdeep hashing, PeHash and Imphash techniques to calculate the similarity of the Portable Executable files. Our results show that the detection rates are improved when evidence combination techniques are used.",
"title": ""
}
] | scidocsrr |
8d9da81f98e18bce52718dd7a259c99b | A Statistical Semantic Parser that Integrates Syntax and Semantics | [
{
"docid": "e9250f1b7c471c522d8a311a18f5c07b",
"text": "In this paper, we explored a learning approach which combines di erent learning methods in inductive logic programming (ILP) to allow a learner to produce more expressive hypotheses than that of each individual learner. Such a learning approach may be useful when the performance of the task depends on solving a large amount of classication problems and each has its own characteristics which may or may not t a particular learning method. The task of semantic parser acquisition in two di erent domains was attempted and preliminary results demonstrated that such an approach is promising.",
"title": ""
}
] | [
{
"docid": "6c53d0939d81e9bbe9a2262733d22c56",
"text": "This paper investigates the effect of the inlet configuration on cooling for an air-cooled axial-flux permanent-magnet (AFPM) machine. Temperature rises in the stator were measured and compared with results predicted using computational fluid dynamic (CFD) methods linked to a detailed machine loss characterization. It is found that an improved inlet design can significantly reduce the stator temperature rises. Comparison between the validated CFD model results and the values obtained from heat transfer correlations addresses the suitability of those correlations proposed specifically for AFPM machines.",
"title": ""
},
{
"docid": "d6f52736d78a5b860bdb364f64e4523c",
"text": "Deep convolutional neural networks (CNN) have recently been shown to generate promising results for aesthetics assessment. However, the performance of these deep CNN methods is often compromised by the constraint that the neural network only takes the fixed-size input. To accommodate this requirement, input images need to be transformed via cropping, warping, or padding, which often alter image composition, reduce image resolution, or cause image distortion. Thus the aesthetics of the original images is impaired because of potential loss of fine grained details and holistic image layout. However, such fine grained details and holistic image layout is critical for evaluating an images aesthetics. In this paper, we present an Adaptive Layout-Aware Multi-Patch Convolutional Neural Network (A-Lamp CNN) architecture for photo aesthetic assessment. This novel scheme is able to accept arbitrary sized images, and learn from both fined grained details and holistic image layout simultaneously. To enable training on these hybrid inputs, we extend the method by developing a dedicated double-subnet neural network structure, i.e. a Multi-Patch subnet and a Layout-Aware subnet. We further construct an aggregation layer to effectively combine the hybrid features from these two subnets. Extensive experiments on the large-scale aesthetics assessment benchmark (AVA) demonstrate significant performance improvement over the state-of-the-art in photo aesthetic assessment.",
"title": ""
},
{
"docid": "f56d1e55b09d9951e7db793b1deceec7",
"text": "Laryngeal tuberculosis (TB) was a common manifestation of TB in the early twentieth century, but now represents only 1% of all cases. Most modern case series of laryngeal TB originate outside the USA. We report a case of laryngeal TB from our institution and review other US cases published between 1970 and 2012. One hundred twenty-seven cases were identified. The mean patient age was 49 y and 28% were female. The mean duration of symptoms was 19 weeks. Dysphonia and weight loss were the most common manifestations, seen in 96% and 47% of cases, respectively. These symptoms were usually attributed to malignancy initially. Most cases involved the vocal cords. Eighty-six percent of cases had underlying pulmonary involvement. Mortality was 3%. In the USA, laryngeal TB is rarely suspected and often confused with malignancy. This infection should be considered in patients with unexplained dysphonia and weight loss.",
"title": ""
},
{
"docid": "194cab3122ed24c4e543c3fc8557b0fa",
"text": "There is a huge advancement in Computer networking in the past decade. But with the advancement, the threats to the computer networks are also increased. Today one of the biggest threats to the computer networks is the Distributed Denial of Service (DDoS) flooding attack. This paper emphasizes the application layer DDoS flooding attacks because these (layer seven) attacks are growing rapidly and becoming more severe problem. Many researchers used machine-learning techniques for intrusion detection, but some shows poor detection and some methods take more training time. From a survey, it is found that Naïve Bayes (NB) algorithm provides faster learning/training speed than other machine learning algorithms. Also it has more accuracy in classification and detection of attack. So we are proposing a network intrusion detection system (IDS) which uses a machine learning approach with the help of NB algorithm.",
"title": ""
},
{
"docid": "05366166b02ebd29abeb2dcf67710981",
"text": "Wireless access to the Internet via PDAs (personal digital assistants) provides Web type services in the mobile world. What we are lacking are design guidelines for such PDA services. For Web publishing, however, there are many resources to look for guidelines. The guidelines can be classified according to which aspect of the Web media they are related: software/hardware, content and its organization, or aesthetics and layout. In order to be applicable to PDA services, these guidelines have to be modified. In this paper we analyze the main characteristics of PDAs and their influence to the guidelines.",
"title": ""
},
{
"docid": "28b23fc65a17b2b29e4e2a6b78ab401b",
"text": "In 1980, the N400 event-related potential was described in association with semantic anomalies within sentences. When, in 1992, a second waveform, the P600, was reported in association with syntactic anomalies and ambiguities, the story appeared to be complete: the brain respected a distinction between semantic and syntactic representation and processes. Subsequent studies showed that the P600 to syntactic anomalies and ambiguities was modulated by lexical and discourse factors. Most surprisingly, more than a decade after the P600 was first described, a series of studies reported that semantic verb-argument violations, in the absence of any violations or ambiguities of syntax can evoke robust P600 effects and no N400 effects. These observations have raised fundamental questions about the relationship between semantic and syntactic processing in the brain. This paper provides a comprehensive review of the recent studies that have demonstrated P600s to semantic violations in light of several proposed triggers: semantic-thematic attraction, semantic associative relationships, animacy and semantic-thematic violations, plausibility, task, and context. I then discuss these findings in relation to a unifying theory that attempts to bring some of these factors together and to link the P600 produced by semantic verb-argument violations with the P600 evoked by unambiguous syntactic violations and syntactic ambiguities. I suggest that normal language comprehension proceeds along at least two competing neural processing streams: a semantic memory-based mechanism, and a combinatorial mechanism (or mechanisms) that assigns structure to a sentence primarily on the basis of morphosyntactic rules, but also on the basis of certain semantic-thematic constraints. I suggest that conflicts between the different representations that are output by these distinct but interactive streams lead to a continued combinatorial analysis that is reflected by the P600 effect. I discuss some of the implications of this non-syntactocentric, dynamic model of language processing for understanding individual differences, language processing disorders and the neuroanatomical circuitry engaged during language comprehension. Finally, I suggest that that these two processing streams may generalize beyond the language system to real-world visual event comprehension.",
"title": ""
},
{
"docid": "cb5f866f2977c7c0d66d75bea1094375",
"text": "A single-switch nonisolated dc/dc converter for a stand-alone photovoltaic (PV)-battery-powered pump system is proposed in this paper. The converter is formed by combining a buck converter with a buck-boost converter. This integration also resulted in reduced repeated power processing, hence improving the conversion efficiency. With only a single transistor, the converter is able to perform three tasks simultaneously, namely, maximum-power-point tracking (MPPT), battery charging, and driving the pump at constant flow rate. To achieve these control objectives, the two inductors operate in different modes such that variable switching frequency control and duty cycle control can be used to manage MPPT and output voltage regulation, respectively. The battery in the converter provides a more steady dc-link voltage as compared to that of a conventional single-stage converter and hence mitigates the high voltage stress problem. Experimental results of a 14-W laboratory prototype converter with a maximum efficiency of 92% confirmed the performance of the proposed converter when used in a PV-battery pump system.",
"title": ""
},
{
"docid": "fe241c6506319713d52ace5a2a40af70",
"text": "Capacitive micromachined ultrasonic transducers (CMUTs) bring the fabrication technology of standard integrated circuits into the field of ultrasound medical imaging. This unique property, combined with the inherent advantages of CMUTs in terms of increased bandwidth and suitability for new imaging modalities and high frequency applications, have indicated these devices as new generation arrays for acoustic imaging. The advances in microfabrication have made possible to fabricate, in few years, silicon-based electrostatic transducers competing in performance with the piezoelectric transducers. This paper summarizes the fabrication, design, modeling, and characterization of 1D CMUT linear arrays for medical imaging, established in our laboratories during the past 3 years. Although the viability of our CMUT technology for applications in diagnostic echographic imaging is demonstrated, the whole process from silicon die to final probe is not fully mature yet for successful practical applications. q 2005 Elsevier Ltd. All rights reserved.",
"title": ""
},
{
"docid": "5cc3ce9628b871d57f086268ae1510e0",
"text": "Unprecedented high volumes of data are becoming available with the growth of the advanced metering infrastructure. These are expected to benefit planning and operation of the future power system, and to help the customers transition from a passive to an active role. In this paper, we explore for the first time in the smart grid context the benefits of using Deep Reinforcement Learning, a hybrid type of methods that combines Reinforcement Learning with Deep Learning, to perform on-line optimization of schedules for building energy management systems. The learning procedure was explored using two methods, Deep Q-learning and Deep Policy Gradient, both of them being extended to perform multiple actions simultaneously. The proposed approach was validated on the large-scale Pecan Street Inc. database. This highly-dimensional database includes information about photovoltaic power generation, electric vehicles as well as buildings appliances. Moreover, these on-line energy scheduling strategies could be used to provide realtime feedback to consumers to encourage more efficient use of electricity.",
"title": ""
},
{
"docid": "a731cfd1e36344d6e4a21f92415b6b4f",
"text": "The pleasure principle (PP) may be a verifiable fundamental law of the living matter in the universe, and this law might then be used for forecasting human self-evolution. I do not pretend to “prove” PP, but argue that it must be regarded as a scientific hypothesis. Accordingly, I formulate verifiable and falsifiable postulates of PP. Their confirmation would allow the construction of a new scientific discipline, hedodynamics, that would be able to forecast the future development of human civilization and even the probable structure and psychology of other rational beings within the universe. I suggest basic hedodynamical scenarios for human (posthuman) civilization and argue that the discovery of the neural correlate of pleasure would provide more detailed forecasts. In particular, I demonstrate how the studies of pleasure mechanisms might predict the degree of aggression in future societies. I conclude that PP may become a scientific basis for fundamental, not phenomenological (based on extrapolations), future forecasting on large timescales.",
"title": ""
},
{
"docid": "f87ca97864fe5326b08264b0b127d12c",
"text": "In recent years, the computer science education community has shown strong commitment to broadening participation in computing in K-12 classrooms. Educational research highlights the critical role of professional development in supporting teachers to attract and effectively teach underrepresented students in computing. In this paper we present the Exploring Computer Science (ECS) professional development model and the research on which it is based. We also present findings about the impact of ECS professional development on teachers' practice. As computing education initiatives become increasingly concerned with scaling up from a regional to a nationwide presence, it is important to consider how the essential components of effective professional development can drive this reform.",
"title": ""
},
{
"docid": "25305e33949beff196ff6c0946d1807b",
"text": "Clinical and preclinical studies have gathered substantial evidence that stress response alterations play a major role in the development of major depression, panic disorder and posttraumatic stress disorder. The stress response, the hypothalamic pituitary adrenocortical (HPA) system and its modulation by CRH, corticosteroids and their receptors as well as the role of natriuretic peptides and neuroactive steroids are described. Examplarily, we review the role of the HPA system in major depression, panic disorder and posttraumatic stress disorder as well as its possible relevance for treatment. Impaired glucocorticoid receptor function in major depression is associated with an excessive release of neurohormones, like CRH to which a number of signs and symptoms characteristic of depression can be ascribed. In panic disorder, a role of central CRH in panic attacks has been suggested. Atrial natriuretic peptide (ANP) is causally involved in sodium lactate-induced panic attacks. Furthermore, preclinical and clinical data on its anxiolytic activity suggest that non-peptidergic ANP receptor ligands may be of potential use in the treatment of anxiety disorders. Recent data further suggest a role of 3alpha-reduced neuroactive steroids in major depression, panic attacks and panic disorder. Posttraumatic stress disorder is characterized by a peripheral hyporesponsive HPA-system and elevated CRH concentrations in CSF. This dissociation is probably related to an increased risk for this disorder. Antidepressants are effective both in depression and anxiety disorders and have major effects on the HPA-system, especially on glucocorticoid and mineralocorticoid receptors. Normalization of HPA-system abnormalities is a strong predictor of the clinical course, at least in major depression and panic disorder. CRH-R1 or glucorticoid receptor antagonists and ANP receptor agonists are currently being studied and may provide future treatment options more closely related to the pathophysiology of the disorders.",
"title": ""
},
{
"docid": "23c71e8893fceed8c13bf2fc64452bc2",
"text": "Variable stiffness actuators (VSAs) are complex mechatronic devices that are developed to build passively compliant, robust, and dexterous robots. Numerous different hardware designs have been developed in the past two decades to address various demands on their functionality. This review paper gives a guide to the design process from the analysis of the desired tasks identifying the relevant attributes and their influence on the selection of different components such as motors, sensors, and springs. The influence on the performance of different principles to generate the passive compliance and the variation of the stiffness are investigated. Furthermore, the design contradictions during the engineering process are explained in order to find the best suiting solution for the given purpose. With this in mind, the topics of output power, potential energy capacity, stiffness range, efficiency, and accuracy are discussed. Finally, the dependencies of control, models, sensor setup, and sensor quality are addressed.",
"title": ""
},
{
"docid": "ea49d288ffefd549f77519c90de51fbc",
"text": "Text line detection is a prerequisite procedure of mathematical formula recognition, however, many incorrectly segmented text lines are often produced due to the two-dimensional structures of mathematics when using existing segmentation methods such as Projection Profiles Cutting or white space analysis. In consequence, mathematical formula recognition is adversely affected by these incorrectly detected text lines, with errors propagating through further processes. Aimed at mathematical formula recognition, we propose a text line detection method to produce reliable line segmentation. Based on the results produced by PPC, a learning based merging strategy is presented to combine incorrectly split text lines. In the merging strategy, the features of layout and text for a text line and those between successive lines are utilised to detect the incorrectly split text lines. Experimental results show that the proposed approach obtains good performance in detecting text lines from mathematical documents. Furthermore, the error rate in mathematical formula identification is reduced significantly through adopting the proposed text line detection method.",
"title": ""
},
{
"docid": "748abc573febb27f9b9eae92ec68fff7",
"text": "In this paper we develop a computational model of adaptation and spatial vision for realistic tone reproduction. The model is based on a multiscale representation of pattern, luminance, and color processing in the human visual system. We incorporate the model into a tone reproduction operator that maps the vast ranges of radiances found in real and synthetic scenes into the small fixed ranges available on conventional display devices such as CRT’s and printers. The model allows the operator to address the two major problems in realistic tone reproduction: wide absolute range and high dynamic range scenes can be displayed; and the displayed images match our perceptions of the scenes at both threshold and suprathreshold levels to the degree possible given a particular display device. Although in this paper we apply our visual model to the tone reproduction problem, the model is general and can be usefully applied to image quality metrics, image compression methods, and perceptually-based image synthesis algorithms. CR Categories: I.3.0 [Computer Graphics]: General;",
"title": ""
},
{
"docid": "8d56697ff01bba1023ee7a43da0d589a",
"text": "Autism spectrum disorder (ASD) is a neurodevelopmental disability with atypical traits in behavioral and physiological responses. These atypical traits in individuals with ASD may be too subtle and subjective to measure visually using tedious methods of scoring. Alternatively, the use of intrusive sensors in the measurement of psychophysical responses in individuals with ASD may likely cause inhibition and bias. This paper proposes a novel experimental protocol for non-intrusive sensing and analysis of facial expression, visual scanning, and eye-hand coordination to investigate behavioral markers for ASD. An institutional review board approved pilot study is conducted to collect the response data from two groups of subjects (ASD and control) while they engage in the tasks of visualization, recognition, and manipulation. For the first time in the ASD literature, the facial action coding system is used to classify spontaneous facial responses. Statistical analyses reveal significantly (p <0.01) higher prevalence of smile expression for the group with ASD with the eye-gaze significantly averted (p<0.05) from viewing the face in the visual stimuli. This uncontrolled manifestation of smile without proper visual engagement suggests impairment in reciprocal social communication, e.g., social smile. The group with ASD also reveals poor correlation in eye-gaze and hand movement data suggesting deficits in motor coordination while performing a dynamic manipulation task. The simultaneous sensing and analysis of multimodal response data may provide useful quantitative insights into ASD to facilitate early detection of symptoms for effective intervention planning.",
"title": ""
},
{
"docid": "d4e5cff61b1b3a9afe1bfe4d2255fc97",
"text": "For a large class of piecewise expanding C1,1 maps of the interval we prove the Lasota-Yorke inequality with a constant smaller than the previously known 2/ inf |τ ′|. Consequently, the stability results of Keller-Liverani [7] apply to this class and in particular to maps with periodic turning points. One of the applications is the stability of acim’s for a class of W-shaped maps. Another application is an affirmative answer to a conjecture of Eslami-Misiurewicz [2] regarding acim-stability of a family of unimodal maps.",
"title": ""
},
{
"docid": "be1b9731df45408571e75d1add5dfe9c",
"text": "We investigate a new commonsense inference task: given an event described in a short free-form text (“X drinks coffee in the morning”), a system reasons about the likely intents (“X wants to stay awake”) and reactions (“X feels alert”) of the event’s participants. To support this study, we construct a new crowdsourced corpus of 25,000 event phrases covering a diverse range of everyday events and situations. We report baseline performance on this task, demonstrating that neural encoder-decoder models can successfully compose embedding representations of previously unseen events and reason about the likely intents and reactions of the event participants. In addition, we demonstrate how commonsense inference on people’s intents and reactions can help unveil the implicit gender inequality prevalent in modern movie scripts.",
"title": ""
},
{
"docid": "362bd9e95f9b0304fa95a647a8a7ee45",
"text": "Cluster labelling is a technique which provides useful information about the cluster to the end users. In this paper, we propose a novel approach which is the follow-up of our previous work. Our earlier approach generates clusters of web documents by using a modified apriori approach which is more efficient and faster than the traditional apriori approach. To label the clusters, the propose approach used an effective feature selection technique which selects the top features of a cluster. Rather than labelling the cluster with ‘bag of words’, a concept driven mechanism has been developed which uses the Wikipedia that takes the top features of a cluster as input to generate the possible candidate labels. Mutual information (MI) score technique has been used for ranking the candidate labels and then the topmost candidates are considered as potential labels of a cluster. Experimental results on two benchmark datasets demonstrate the efficiency of our approach.",
"title": ""
}
] | scidocsrr |
e172eed8c141dcdc945a39004f82a07f | Oracle Quantum Computing | [
{
"docid": "a49b2152082aa23f9b90d298064b9733",
"text": "The number of steps required to compute a function depends, in general, on the type of computer that is used, on the choice of computer program, and on the input-output code. Nevertheless, the results obtained in this paper are so general as to be nearly independent of these considerations.\nA function is exhibited that requires an enormous number of steps to be computed, yet has a “nearly quickest” program: Any other program for this function, no matter how ingeniously designed it may be, takes practically as many steps as this nearly quickest program.\nA different function is exhibited with the property that no matter how fast a program may be for computing this function another program exists for computing the function very much faster.",
"title": ""
}
] | [
{
"docid": "c35b5da1da795857baf4ee1ce7dbfac5",
"text": "The art of finding software vulnerabilities has been covered extensively in the literature and there is a huge body of work on this topic. In contrast, the intentional insertion of exploitable, security-critical bugs has received little (public) attention yet. Wanting more bugs seems to be counterproductive at first sight, but the comprehensive evaluation of bug-finding techniques suffers from a lack of ground truth and the scarcity of bugs.\n In this paper, we propose EvilCoder, a system to automatically find potentially vulnerable source code locations and modify the source code to be actually vulnerable. More specifically, we leverage automated program analysis techniques to find sensitive sinks which match typical bug patterns (e.g., a sensitive API function with a preceding sanity check), and try to find data-flow connections to user-controlled sources. We then transform the source code such that exploitation becomes possible, for example by removing or modifying input sanitization or other types of security checks. Our tool is designed to randomly pick vulnerable locations and possible modifications, such that it can generate numerous different vulnerabilities on the same software corpus. We evaluated our tool on several open-source projects such as for example libpng and vsftpd, where we found between 22 and 158 unique connected source-sink pairs per project. This translates to hundreds of potentially vulnerable data-flow paths and hundreds of bugs we can insert. We hope to support future bug-finding techniques by supplying freshly generated, bug-ridden test corpora so that such techniques can (finally) be evaluated and compared in a comprehensive and statistically meaningful way.",
"title": ""
},
{
"docid": "d9b0af2dccf5615f829d22b4a1d99ba1",
"text": "It is a premise of this research that prevention of near-term terrorist attacks requires an understanding of current terrorist organizations to include their composition, the actors involved, and how they operate to achieve their objectives. To aid in this understanding, operations research, sociological, and behavioral theory relevant to the study of social networks are applied, thereby providing theoretical foundations for new and useful methodologies to analyze non-cooperative organizations. Such organizations are defined as those trying to hide their structures or are unwilling to provide information regarding their operations; examples include criminal networks, secret societies, and, most importantly, clandestine terrorist organizations. Techniques leveraging information regarding multiple dimensions of interpersonal relationships, inferring from them the strengths of interpersonal ties, are explored. Hence, a layered network construct is offered that provides new analytic opportunities and insights generally unaccounted for in traditional social network analysis. These offer decision makers improved courses of action designed to impute influence upon an adversarial network, thereby achieving a desired influence, perception, or outcome to one or more actors within the target network. In addition, this knowledge can also be used to identify key individuals, relationships, and organizational practices. Subsequently, such analysis may lead to the identification of weaknesses that can be exploited in an endeavor to either eliminate the network as a whole, cause it to become operationally ineffective, or influence it to directly or indirectly support National Security Strategy. In today’s world, proficiency in this aspect of warfare is a necessary condition to ensure United States National Security, as well as to promote and maintain global stability. Quantitative methods serving as the basis for, and discriminator between, courses of action seeking a path towards peace are a principal output of this research.",
"title": ""
},
{
"docid": "33bb513236db3f2f1f36a836191204bb",
"text": "In this paper, we present Vertexica, a graph analytics tools on top of a relational database, which is user friendly and yet highly ecient. Instead of constraining programmers to SQL, Vertexica offers a popular vertex-centric query interface, which is more natural for analysts to express many graph queries. e programmers simply provide their vertex-compute functions and Vertexica takes care of eciently executing them in the standard SQL engine. e advantage of using Vertexica is its ability to leverage the relational features and enable much more sophisticated graph analysis. ese include expressing graph algorithms which are dicult in vertexcentric but straightforward in SQL and the ability to compose endto-end data processing pipelines, including preand postprocessing of graphs as well as combining multiple algorithms for deeper insights. Vertexica has a graphical user interface and we outline several demonstration scenarios including, interactive graph analysis, complex graph analysis, and continuous and time series analysis.",
"title": ""
},
{
"docid": "54df0e1a435d673053f9264a4c58e602",
"text": "Next location prediction anticipates a person’s movement based on the history of previous sojourns. It is useful for proactive actions taken to assist the person in an ubiquitous environment. This paper evaluates next location prediction methods: dynamic Bayesian network, multi-layer perceptron, Elman net, Markov predictor, and state predictor. For the Markov and state predictor we use additionally an optimization, the confidence counter. The criterions for the comparison are the prediction accuracy, the quantity of useful predictions, the stability, the learning, the relearning, the memory and computing costs, the modelling costs, the expandability, and the ability to predict the time of entering the next location. For evaluation we use the same benchmarks containing movement sequences of real persons within an office building.",
"title": ""
},
{
"docid": "4a1de61e9e74aa43a4e0bf195250ef72",
"text": "We present in this paper a system for converting PDF legacy documents into structured XML format. This conversion system first extracts the different streams contained in PDF files (text, bitmap and vectorial images) and then applies different components in order to express in XML the logically structured documents. Some of these components are traditional in Document Analysis, other more specific to PDF. We also present a graphical user interface in order to check, correct and validate the analysis of the components. We eventually report on two real user cases where this system was applied on.",
"title": ""
},
{
"docid": "49e7ac480b41045f69af59635476b28a",
"text": "Crowd sensing harnesses the power of the crowd by mobilizing a large number of users carrying various mobile and networked devices to collect data with the intrinsic multi-modal and large-volume features. With traditional methods, it is highly challenging to analyze the vast data volume generated by crowd sensing. In the era of big data, although several individual-oriented approaches are proposed to analyze human behavior based on big data, the common features of individual activity have not been fully investigated. In this article, we design a novel community- centric framework for community activity prediction based on big data analysis. Specifically, we propose an approach to extract community activity patterns by analyzing the big data collected from both the physical world and virtual social space. The proposed approach consists of community detection based on singular value decomposition and clustering, and community activity modeling based on tensors. The proposed approach is evaluated with a case study where a real dataset collected over a 15-month period is analyzed.",
"title": ""
},
{
"docid": "1c74034a07f6312001310b86e5b5162c",
"text": "We describe a general offset-canceling architecture for analog multiplication using chopper stabilization. Chopping is used to modulate the offset away from the output signal where it can be easily filtered out, providing continuous offset reduction which is insensitive to drift. Both square wave chopping and chopping with orthogonal spreading codes are tested and shown to reduce the offset down to the microvolt level. In addition, we apply the nested chopping technique to an analog multiplier which employs two levels of chopping to reduce the offset even further. We discuss the limits on the performance of the various chopping methods in detail, and present a detailed analysis of the residual offset due to charge injection spikes. An illustrative CMOS prototype in a 0.18 mum process is presented which achieves a worst-case offset of 1.5 muV. This is the lowest measured offset reported in the DC analog multiplier literature by a margin of two orders of magnitude. The prototype multiplier is also tested with AC inputs as a squarer, variable gain amplifier, and direct-conversion mixer, demonstrating that chopper stabilization is effective for both DC and AC multiplication. The AC measurements show that chopping removes not only offset, but also 1/f noise and second-order harmonic distortion.",
"title": ""
},
{
"docid": "7e557091d8cfe6209b1eda3b664ab551",
"text": "With the increasing penetration of mobile phones, problematic use of mobile phone (PUMP) deserves attention. In this study, using a path model we examined the relationship between depression and PUMP, with motivations as mediators. Findings suggest that depressed people may rely on mobile phone to alleviate their negative feelings and spend more time on communication activities via mobile phone, which in turn can deteriorate into PUMP. However, face-to-face communication with others played a moderating role, weakening the link between use of mobile phone for communication activities and dete-",
"title": ""
},
{
"docid": "cebe11867c14e02454dfe55c8e33f932",
"text": "Johan Farkas, Jannick Schou & Christina Neumayer Abstract This research analyses cloaked Facebook pages that are created to spread political propaganda by cloaking a user profile and imitating the identity of a political opponent in order to spark hateful and aggressive reactions. This inquiry is pursued through a multi-sited ethnographic case study of Danish Facebook pages disguised as radical Islamist pages, which provoked racist and anti-Muslim reactions as well as negative sentiments toward refugees, and immigrants in Denmark in general. Drawing on Jessie Daniels’ critical insights into cloaked websites, this research furthermore analyses the epistemological, methodological, and conceptual challenges of online propaganda. It enhances our understanding of disinformation and propaganda in an increasingly interactive social media environment and contributes to a critical inquiry into social media and subversive politics.",
"title": ""
},
{
"docid": "605125a6801bd9aa190f177ee4f0cb1f",
"text": "One of the challenges in bio-computing is to enable the efficient use and inter-operation of a wide variety of rapidly-evolving computational methods to simulate, analyze, and understand the complex properties and interactions of molecular systems. In our laboratory we investigates several areas, including protein-ligand docking, protein-protein docking, and complex molecular assemblies. Over the years we have developed a number of computational tools such as molecular surfaces, phenomenological potentials, various docking and visualization programs which we use in conjunction with programs developed by others. The number of programs available to compute molecular properties and/or simulate molecular interactions (e.g., molecular dynamics, conformational analysis, quantum mechanics, distance geometry, docking methods, ab-initio methods) is large and growing rapidly. Moreover, these programs come in many flavors and variations, using different force fields, search techniques, algorithmic details (e.g., continuous space vs. discrete, Cartesian vs. torsional). Each variation presents its own characteristic set of advantages and limitations. These programs also tend to evolve rapidly and are usually not written as components, making it hard to get them to work together.",
"title": ""
},
{
"docid": "4b7a885d463022a1792d99ff0c76be72",
"text": "Emerging applications in sensor systems and network-wide IP traffic analysis present many technical challenges. They need distributed monitoring and continuous tracking of events. They have severe resource constraints not only at each site in terms of per-update processing time and archival space for highspeed streams of observations, but also crucially, communication constraints for collaborating on the monitoring task. These elements have been addressed in a series of recent works. A fundamental issue that arises is that one cannot make the \"uniqueness\" assumption on observed events which is present in previous works, since widescale monitoring invariably encounters the same events at different points. For example, within the network of an Internet Service Provider packets of the same flow will be observed in different routers; similarly, the same individual will be observed by multiple mobile sensors in monitoring wild animals. Aggregates of interest on such distributed environments must be resilient to duplicate observations. We study such duplicate-resilient aggregates that measure the extent of the duplication―how many unique observations are there, how many observations are unique―as well as standard holistic aggregates such as quantiles and heavy hitters over the unique items. We present accuracy guaranteed, highly communication-efficient algorithms for these aggregates that work within the time and space constraints of high speed streams. We also present results of a detailed experimental study on both real-life and synthetic data.",
"title": ""
},
{
"docid": "bf19f897047ba130afd7742a9847e08c",
"text": "Neural Machine Translation (NMT) has been shown to be more effective in translation tasks compared to the Phrase-Based Statistical Machine Translation (PBMT). However, NMT systems are limited in translating low-resource languages (LRL), due to the fact that neural methods require a large amount of parallel data to learn effective mappings between languages. In this work we show how so-called multilingual NMT can help to tackle the challenges associated with LRL translation. Multilingual NMT forces words and subwords representation in a shared semantic space across multiple languages. This allows the model to utilize a positive parameter transfer between different languages, without changing the standard attentionbased encoder-decoder architecture and training modality. We run preliminary experiments with three languages (English, Italian, Romanian) covering six translation directions and show that for all available directions the multilingual approach, i.e. just one system covering all directions is comparable or even outperforms the single bilingual systems. Finally, our approach achieve competitive results also for language pairs not seen at training time using a pivoting (x-step) translation. Italiano. La traduzione automatica con reti neurali (neural machine translation, NMT) ha dimostrato di essere più efficace in molti compiti di traduzione rispetto a quella basata su frasi (phrase-based machine translation, PBMT). Tuttavia, i sistemi NMT sono limitati nel tradurre lingue con basse risorse (LRL). Questo è dovuto al fatto che i metodi di deep learning richiedono grandi quantit di dati per imparare una mappa efficace tra le due lingue. In questo lavoro mostriamo come un modello NMT multilingua può aiutare ad affrontare i problemi legati alla traduzione di LRL. La NMT multilingua costringe la rappresentrazione delle parole e dei segmenti di parole in uno spazio semantico condiviso tra multiple lingue. Questo consente al modello di usare un trasferimento di parametri positivo tra le lingue coinvolte, senza cambiare l’architettura NMT encoder-decoder basata sull’attention e il modo di addestramento. Abbiamo eseguito esperimenti preliminari con tre lingue (inglese, italiano e rumeno), coprendo sei direzioni di traduzione e mostriamo che per tutte le direzioni disponibili l’approccio multilingua, cioè un solo sistema che copre tutte le direzioni è confrontabile o persino migliore dei singolo sistemi bilingue. Inoltre, il nostro approccio ottiene risultati competitivi anche per coppie di lingue non viste durante il trainig, facendo uso di traduzioni con pivot.",
"title": ""
},
{
"docid": "d52ba071c7790478235e364fc1cfab83",
"text": "We study parameter inference in large-scale latent variable models. We first propose a unified treatment of online inference for latent variable models from a non-canonical exponential family, and draw explicit links between several previously proposed frequentist or Bayesian methods. We then propose a novel inference method for the frequentist estimation of parameters, that adapts MCMC methods to online inference of latent variable models with the proper use of local Gibbs sampling. Then, for latent Dirichlet allocation,we provide an extensive set of experiments and comparisons with existing work, where our new approach outperforms all previously proposed methods. This work is currently under review for JMLR [1] (submitted on July, 27 2016).",
"title": ""
},
{
"docid": "ac0b4babbe59570c801ae3efbb6dcbe3",
"text": "In recent years, RNA has attracted widespread attention as a unique biomaterial with distinct biophysical properties for designing sophisticated architectures in the nanometer scale. RNA is much more versatile in structure and function with higher thermodynamic stability compared to its nucleic acid counterpart DNA. Larger RNA molecules can be viewed as a modular structure built from a combination of many 'Lego' building blocks connected via different linker sequences. By exploiting the diversity of RNA motifs and flexibility of structure, varieties of RNA architectures can be fabricated with precise control of shape, size, and stoichiometry. Many structural motifs have been discovered and characterized over the years and the crystal structures of many of these motifs are available for nanoparticle construction. For example, using the flexibility and versatility of RNA structure, RNA triangles, squares, pentagons, and hexagons can be constructed from phi29 pRNA three-way-junction (3WJ) building block. This review will focus on 2D RNA triangles, squares, and hexamers; 3D and 4D structures built from basic RNA building blocks; and their prospective applications in vivo as imaging or therapeutic agents via specific delivery and targeting. Methods for intracellular cloning and expression of RNA molecules and the in vivo assembly of RNA nanoparticles will also be reviewed. WIREs RNA 2018, 9:e1452. doi: 10.1002/wrna.1452 This article is categorized under: RNA Methods > RNA Nanotechnology RNA Structure and Dynamics > RNA Structure, Dynamics and Chemistry RNA in Disease and Development > RNA in Disease Regulatory RNAs/RNAi/Riboswitches > Regulatory RNAs.",
"title": ""
},
{
"docid": "d083e8ebddf43bcd8f1efd05aa708658",
"text": "Even a casual reading of the extensive literature on student development in higher education can create confusion and perplexity. One finds not only that the problems being studied are highly diverse but also that investigators who claim to be studying the same problem frequently do not look at the same variables or employ the same methodologies. And even when they are investigating the same variables, different investigators may use completely different terms to describe and discuss these variables. My own interest in articulating a theory of student development is partly practical—I would like to bring some order into the chaos of the literature—and partly self-protective. I and increasingly bewildered by the muddle of f indings that have emerged from my own research in student development, research that I have been engaged in for more than 20 years. The theory of student involvement that I describe in this article appeals to me for several reasons. First, it is simple: I have not needed to draw a maze consisting of dozens of boxes interconnected by two-headed arrows to explain the basic elements of the theory to others. Second, the theory can explain most of the empirical knowledge about environmental influences on student development that researchers have gained over the years. Third, it is capable of embracing principles from such widely divergent sources as psychoanalysis and classical learning theory. Finally, this theory of student involvement can be used both by researchers to guide their investigation of student development—and by college administrators and",
"title": ""
},
{
"docid": "91c4a5de9dd41c5dec87a1475e8218fd",
"text": "We present a general theory and corresponding declarative model for the embodied grounding and natural language based analytical summarisation of dynamic visuo-spatial imagery. The declarative model —ecompassing spatiolinguistic abstractions, image schemas, and a spatio-temporal feature based language generator— is modularly implemented within Constraint Logic Programming (CLP). The implemented model is such that primitives of the theory, e.g., pertaining to space and motion, image schemata, are available as first-class objects with deep semantics suited for inference and query. We demonstrate the model with select examples broadly motivated by areas such as film, design, geography, smart environments where analytical natural language based externalisations of the moving image are central from the viewpoint of human interaction, evidence-based qualitative analysis, and sensemaking.",
"title": ""
},
{
"docid": "9c118c312d8118e9a71fa0d17fa42b51",
"text": "The Standards of Care (SOC) for the Health of Transsexual, Transgender, and Gender Nonconforming People is a publication of the World Professional Association for Transgender Health (WPATH). The overall goal of the SOC is to provide clinical guidance for health professionals to assist transsexual, transgender, and gender nonconforming people with safe and effective pathways to achieving lasting personal comfort with their gendered selves, in order to maximize their overall health, psychological well-being, and self-fulfillment. This assistance may include primary care, gynecologic and urologic care, reproductive options, voice and communication therapy, mental health services (e.g., assessment, counseling, psychotherapy), and hormonal and surgical treatments. The SOC are based on the best available science and expert professional consensus. Because most of the research and experience in this field comes from a North American and Western European perspective, adaptations of the SOC to other parts of the world are necessary. The SOC articulate standards of care while acknowledging the role of making informed choices and the value of harm reduction approaches. In addition, this version of the SOC recognizes that treatment for gender dysphoria i.e., discomfort or distress that is caused by a discrepancy between persons gender identity and that persons sex assigned at birth (and the associated gender role and/or primary and secondary sex characteristics) has become more individualized. Some individuals who present for care will have made significant self-directed progress towards gender role changes or other resolutions regarding their gender identity or gender dysphoria. Other individuals will require more intensive services. Health professionals can use the SOC to help patients consider the full range of health services open to them, in accordance with their clinical needs and goals for gender expression.",
"title": ""
},
{
"docid": "d6681899902b990f82b775927cde9277",
"text": "Facial expression provides an important behavioral measure for studies of emotion, cognitive processes, and social interaction. Facial expression recognition has recently become a promising research area. Its applications include human-computer interfaces, human emotion analysis, and medical care and cure. In this paper, we investigate various feature representation and expression classification schemes to recognize seven different facial expressions, such as happy, neutral, angry, disgust, sad, fear and surprise, in the JAFFE database. Experimental results show that the method of combining 2D-LDA (Linear Discriminant Analysis) and SVM (Support Vector Machine) outperforms others. The recognition rate of this method is 95.71% by using leave-one-out strategy and 94.13% by using cross-validation strategy. It takes only 0.0357 second to process one image of size 256 × 256.",
"title": ""
},
{
"docid": "b75c7e5c8badea76dc21c05901e32423",
"text": "The need for autonomous navigation has increased in recent years due to the adoption of unmanned aerial vehicles (UAVs) and Micro UAVs (MAVs) for task, such as search and rescue, terrain mapping, and other missions, albeit by different means. MAVs have been less successful at fulfilling these missions as they are unable to carry complex sensors and camera systems for computer vision which larger UAVs routinely use. Monocular vision has been used previously to provide vision capabilities for MAVs. Although, monocular vision has had less success at obstacle detection and avoidance compared to stereo vision and is more computationally expensive. The more expensive computations have there for posed a problem in the past for on board closed MAV systems for autonomous navigation using monocular vision. However, with embedded GPUs recently gaining traction for small yet powerful parallel computations in small form factors show promise for fully closed MAV systems. This paper discusses the future of autonomous navigation with an embedded GPU, NVIDIA’s Jetson TX1 board, and AR.Drone 2.0 MAV drone using a novel obstacle detection algorithm implementing goodFeaturesToTrack, Lucas-Kanade Optical Flow, image segmentation, and size expansion.",
"title": ""
},
{
"docid": "5e194b5c1b14b423e955880de810eaba",
"text": "A human body detection algorithm based on the combination of moving information with shape information is proposed in the paper. Firstly, Eigen-object computed from three frames in the initial video sequences is used to detect the moving object. Secondly, the shape information of human body is used to classify human and other object. Furthermore, the occlusion between two objects during a short time is processed by using continues multiple frames. The advantages of the algorithm are accurately moving object detection, and the detection result doesn't effect by body pose. Moreover, as the shadow of moving object has been eliminated.",
"title": ""
}
] | scidocsrr |
b9a0ae6d41b1a9488ec56cf104a0337a | Learning Spatially Regularized Correlation Filters for Visual Tracking | [
{
"docid": "f25dfc98473b09744d237d85d9aec0b5",
"text": "Object tracking has been one of the most important and active research areas in the field of computer vision. A large number of tracking algorithms have been proposed in recent years with demonstrated success. However, the set of sequences used for evaluation is often not sufficient or is sometimes biased for certain types of algorithms. Many datasets do not have common ground-truth object positions or extents, and this makes comparisons among the reported quantitative results difficult. In addition, the initial conditions or parameters of the evaluated tracking algorithms are not the same, and thus, the quantitative results reported in literature are incomparable or sometimes contradictory. To address these issues, we carry out an extensive evaluation of the state-of-the-art online object-tracking algorithms with various evaluation criteria to understand how these methods perform within the same framework. In this work, we first construct a large dataset with ground-truth object positions and extents for tracking and introduce the sequence attributes for the performance analysis. Second, we integrate most of the publicly available trackers into one code library with uniform input and output formats to facilitate large-scale performance evaluation. Third, we extensively evaluate the performance of 31 algorithms on 100 sequences with different initialization settings. By analyzing the quantitative results, we identify effective approaches for robust tracking and provide potential future research directions in this field.",
"title": ""
}
] | [
{
"docid": "1afc103a3878d859ec15929433f49077",
"text": "Large-scale deep neural networks (DNNs) are both compute and memory intensive. As the size of DNNs continues to grow, it is critical to improve the energy efficiency and performance while maintaining accuracy. For DNNs, the model size is an important factor affecting performance, scalability and energy efficiency. Weight pruning achieves good compression ratios but suffers from three drawbacks: 1) the irregular network structure after pruning, which affects performance and throughput; 2) the increased training complexity; and 3) the lack of rigirous guarantee of compression ratio and inference accuracy.\n To overcome these limitations, this paper proposes CirCNN, a principled approach to represent weights and process neural networks using block-circulant matrices. CirCNN utilizes the Fast Fourier Transform (FFT)-based fast multiplication, simultaneously reducing the computational complexity (both in inference and training) from O(n2) to O(n log n) and the storage complexity from O(n2) to O(n), with negligible accuracy loss. Compared to other approaches, CirCNN is distinct due to its mathematical rigor: the DNNs based on CirCNN can converge to the same \"effectiveness\" as DNNs without compression. We propose the CirCNN architecture, a universal DNN inference engine that can be implemented in various hardware/software platforms with configurable network architecture (e.g., layer type, size, scales, etc.). In CirCNN architecture: 1) Due to the recursive property, FFT can be used as the key computing kernel, which ensures universal and small-footprint implementations. 2) The compressed but regular network structure avoids the pitfalls of the network pruning and facilitates high performance and throughput with highly pipelined and parallel design. To demonstrate the performance and energy efficiency, we test CirCNN in FPGA, ASIC and embedded processors. Our results show that CirCNN architecture achieves very high energy efficiency and performance with a small hardware footprint. Based on the FPGA implementation and ASIC synthesis results, CirCNN achieves 6 - 102X energy efficiency improvements compared with the best state-of-the-art results.",
"title": ""
},
{
"docid": "09e19f24675cb22638df3f82d07686ac",
"text": "This letter discusses a miniature low profile ultrawideband (UWB) spiral. The antenna is miniaturized using a combination of dielectric and inductive loading. In addition, a ferrite coated ground plane is adopted in place of the traditional metallic ground plane for profile reduction. Using full-wave simulations and measurements, it is shown that the miniaturized spiral can achieve similar performance to a traditional planar spiral twice its size.",
"title": ""
},
{
"docid": "47df1bd26f99313cfcf82430cb98d442",
"text": "To manage supply chain efficiently, e-business organizations need to understand their sales effectively. Previous research has shown that product review plays an important role in influencing sales performance, especially review volume and rating. However, limited attention has been paid to understand how other factors moderate the effect of product review on online sales. This study aims to confirm the importance of review volume and rating on improving sales performance, and further examine the moderating roles of product category, answered questions, discount and review usefulness in such relationships. By analyzing 2939 records of data extracted from Amazon.com using a big data architecture, it is found that review volume and rating have stronger influence on sales rank for search product than for experience product. Also, review usefulness significantly moderates the effects of review volume and rating on product sales rank. In addition, the relationship between review volume and sales rank is significantly moderated by both answered questions and discount. However, answered questions and discount do not have significant moderation effect on the relationship between review rating and sales rank. The findings expand previous literature by confirming important interactions between customer review features and other factors, and the findings provide practical guidelines to manage e-businesses. This study also explains a big data architecture and illustrates the use of big data technologies in testing theoretical",
"title": ""
},
{
"docid": "32a597647795a7333b82827b55c209c9",
"text": "This study investigates the relationship between the extent to which employees have opportunities to voice dissatisfaction and voluntary turnover in 111 short-term, general care hospitals. Results show that, whether or not a union is present, high numbers of mechanisms for employee voice are associated with high retention rates. Implications for theory and research as well as management practice are discussed.",
"title": ""
},
{
"docid": "677b0bc4a8bf55b69062fe790332e107",
"text": "ive Sentence Summarization with Attentive Deep Recurrent Neural Networks Alex Alifimoff aja2015@cs.stanford.edu Author’s note: I liberally use plural pronouns. Most of my projects are group projects so it is now naturally my writing style. Sadly, I was the only one who worked on this project.",
"title": ""
},
{
"docid": "2a60c90b8f36645b3370d12f673b1c62",
"text": "This paper proposes a general approach of 3D reconstruction, a major problem arising in computer vision and virtual reality, based on a combination of Pseudo-Linearization and Errors-in-Variables model. The proposed approach concerns a bunch of corrupted measurements under nonlinear constraints, and optimizes the estimation by taking errors into account. Furthermore, we set a synthetic projective model and adopt a standard deviation-expectation criterion to evaluate the performance or our method applied in 3D reconstruction. Also, some test images are picked from an image database to give this method a chance to demonstrate its performance in our experiments. Finally, as a successful application, this method is used in a calibration-free augmented reality system.",
"title": ""
},
{
"docid": "e8478d17694b39bd252175139a5ca14d",
"text": "Building a computationally creative system is a challenging undertaking. While such systems are beginning to proliferate, and a good number of them have been reasonably well-documented, it may seem, especially to newcomers to the field, that each system is a bespoke design that bears little chance of revealing any general knowledge about CC system building. This paper seeks to dispel this concern by presenting an abstract CC system description, or, in other words a practical, general approach for constructing CC systems.",
"title": ""
},
{
"docid": "3d47cbee5b76ea68a12f6e026fbc2abf",
"text": "This paper presents the first realtime 3D eye gaze capture method that simultaneously captures the coordinated movement of 3D eye gaze, head poses and facial expression deformation using a single RGB camera. Our key idea is to complement a realtime 3D facial performance capture system with an efficient 3D eye gaze tracker. We start the process by automatically detecting important 2D facial features for each frame. The detected facial features are then used to reconstruct 3D head poses and large-scale facial deformation using multi-linear expression deformation models. Next, we introduce a novel user-independent classification method for extracting iris and pupil pixels in each frame. We formulate the 3D eye gaze tracker in the Maximum A Posterior (MAP) framework, which sequentially infers the most probable state of 3D eye gaze at each frame. The eye gaze tracker could fail when eye blinking occurs. We further introduce an efficient eye close detector to improve the robustness and accuracy of the eye gaze tracker. We have tested our system on both live video streams and the Internet videos, demonstrating its accuracy and robustness under a variety of uncontrolled lighting conditions and overcoming significant differences of races, genders, shapes, poses and expressions across individuals.",
"title": ""
},
{
"docid": "c1f095252c6c64af9ceeb33e78318b82",
"text": "Augmented reality (AR) is a technology in which a user's view of the real world is enhanced or augmented with additional information generated from a computer model. To have a working AR system, the see-through display system must be calibrated so that the graphics are properly rendered. The optical see-through systems present an additional challenge because, unlike the video see-through systems, we do not have direct access to the image data to be used in various calibration procedures. This paper reports on a calibration method we developed for optical see-through headmounted displays. We first introduce a method for calibrating monocular optical seethrough displays (that is, a display for one eye only) and then extend it to stereo optical see-through displays in which the displays for both eyes are calibrated in a single procedure. The method integrates the measurements for the camera and a six-degrees-offreedom tracker that is attached to the camera to do the calibration. We have used both an off-the-shelf magnetic tracker as well as a vision-based infrared tracker we have built. In the monocular case, the calibration is based on the alignment of image points with a single 3D point in the world coordinate system from various viewpoints. In this method, the user interaction to perform the calibration is extremely easy compared to prior methods, and there is no requirement for keeping the head immobile while performing the calibration. In the stereo calibration case, the user aligns a stereoscopically fused 2D marker, which is perceived in depth, with a single target point in the world whose coordinates are known. As in the monocular case, there is no requirement that the user keep his or her head fixed.",
"title": ""
},
{
"docid": "a64600e570e7465124fe763c4658ddb5",
"text": "There are several applications in VLSI technology that require high-speed shortest-path computations. The shortest path is a path between two nodes (or points) in a graph such that the sum of the weights of its constituent edges is minimum. Floyd-Warshall algorithm provides fastest computation of shortest path between all pair of nodes present in the graph. With rapid advances in VLSI technology, Field Programmable Gate Arrays (FPGAs) are receiving the attention of the Parallel and High Performance Computing community. This paper gives implementation outcome of Floyd-Warshall algorithm to solve the all pairs shortest-paths problem for directed graph in Verilog.",
"title": ""
},
{
"docid": "c59652c2166aefb00469517cd270dea2",
"text": "Intrusion detection systems have traditionally been based on the characterization of an attack and the tracking of the activity on the system to see if it matches that characterization. Recently, new intrusion detection systems based on data mining are making their appearance in the field. This paper describes the design and experiences with the ADAM (Audit Data Analysis and Mining) system, which we use as a testbed to study how useful data mining techniques can be in intrusion detection.",
"title": ""
},
{
"docid": "36484e10b0644f01e8adbb3268c20561",
"text": "Label propagation is a powerful and flexible semi-supervised learning technique on graphs. Neural networks, on the other hand, have proven track records in many supervised learning tasks. In this work, we propose a training framework with a graph-regularised objective, namely Neural Graph Machines, that can combine the power of neural networks and label propagation. This work generalises previous literature on graph-augmented training of neural networks, enabling it to be applied to multiple neural architectures (Feed-forward NNs, CNNs and LSTM RNNs) and a wide range of graphs. The new objective allows the neural networks to harness both labeled and unlabeled data by: (a)~allowing the network to train using labeled data as in the supervised setting, (b)~biasing the network to learn similar hidden representations for neighboring nodes on a graph, in the same vein as label propagation. Such architectures with the proposed objective can be trained efficiently using stochastic gradient descent and scaled to large graphs, with a runtime that is linear in the number of edges. The proposed joint training approach convincingly outperforms many existing methods on a wide range of tasks (multi-label classification on social graphs, news categorization, document classification and semantic intent classification), with multiple forms of graph inputs (including graphs with and without node-level features) and using different types of neural networks.",
"title": ""
},
{
"docid": "acca339b2437da35ca75aecd411c7b86",
"text": "form to demonstrate potential theoretical causes for qualitatively assessed real-world phenomena? Alternatively, can they be used to create wellparameterized empirical simulations appropriate for scenario and policy analysis? How can these models be empirically parameterized, verified, and validated? What are some remaining challenges and open questions in this research area? By providing answers to these questions, we hope to offer guidance to researchers considering the utility of this new modeling approach. We also hope to spark a healthy debate among researchers as to the potential advantages, limitations, andmajor research challenges ofMAS/LUCC modeling.AsMASmodeling studies are beingundertaken by geographers in other research fields—including transportation, integrated assessment, recreation, and resource management—many of the issues raised in this articlemay be relevant for other applications as well. The remainder of this article sequentially addresses the questions outlined above. Approaches to Modeling Land-Use/Cover Change This section examines myriad LUCC modeling approaches and offers MAS as a means of complementing other techniques. We briefly discuss the strengths and weaknesses of seven broad, partly overlapping categories of models: mathematical equation-based, system dynamics, statistical, expert system, evolutionary, cellular, and hybrid. This review is not exhaustive and only serves to highlight ways in which present techniques are complemented by MAS/LUCC models that combine cellular and agent-based models. More comprehensive overviews of LUCCmodeling techniques focus on tropical deforestation (Lambin 1994; Kaimowitz and Angelsen 1998), economic models of land use (Plantinga 1999), ecological landscapes (Baker 1989), urban and regional community planning (U.S. EPA 2000), and LUCC dynamics (Briassoulis 2000; Agarwal et al. 2002; Veldkamp and Lambin 2001; Verburg et al. forthcoming). Equation-Based Models Most models are mathematical in some way, but some are especially so, in that they rely on equations that seek a static or equilibrium solution. The most common mathematical models are sets of equations based on theories of population growth and diffusion that specify cumulative LUCC over time (Sklar and Costanza 1991). More complex models, often grounded in economic theory, employ simultaneous joint equations (Kaimowitz and Angelsen 1998). One variant of such models is based on linear programming (Weinberg, Kling, and Wilen 1993; Howitt 1995), potentially linked to GIS information on land parcels (Chuvieco 1993; Longley, Higgs, and Martin 1994; Cromley and Hanink 1999). A major drawback of such models is that a numerical or analytical solution to the system of equations must be obtained, limiting the level of complexity that may practically be built into such models. Simulation models that combine mathematical equationswith other data structures are considered below.",
"title": ""
},
{
"docid": "956e8e1b1408263d7841832e7f0a0885",
"text": "High quality user experience (UX) has become a central competitive factor of product development in mature consumer markets. Although the term UX is widely used, the methods and tools for evaluating UX are still inadequate. This SIG session collects information and experiences about UX evaluation methods used in both academia and industry, discusses the pros and cons of each method, and ideates on how to improve the methods.",
"title": ""
},
{
"docid": "6200d3c4435ae34e912fc8d2f92e904b",
"text": "The problem of cross-modal retrieval, e.g., using a text query to search for images and vice-versa, is considered in this paper. A novel model involving correspondence autoencoder (Corr-AE) is proposed here for solving this problem. The model is constructed by correlating hidden representations of two uni-modal autoencoders. A novel optimal objective, which minimizes a linear combination of representation learning errors for each modality and correlation learning error between hidden representations of two modalities, is used to train the model as a whole. Minimization of correlation learning error forces the model to learn hidden representations with only common information in different modalities, while minimization of representation learning error makes hidden representations are good enough to reconstruct input of each modality. A parameter $\\alpha$ is used to balance the representation learning error and the correlation learning error. Based on two different multi-modal autoencoders, Corr-AE is extended to other two correspondence models, here we called Corr-Cross-AE and Corr-Full-AE. The proposed models are evaluated on three publicly available data sets from real scenes. We demonstrate that the three correspondence autoencoders perform significantly better than three canonical correlation analysis based models and two popular multi-modal deep models on cross-modal retrieval tasks.",
"title": ""
},
{
"docid": "097311a79871cb45051f6f3cf1b89f84",
"text": "Recommender systems typically leverage two types of signals to effectively recommend items to users: user activities and content matching between user and item profiles, and recommendation models in literature are usually categorized into collaborative filtering models, content-based models and hybrid models. In practice, when rich profiles about users and items are available, and user activities are sparse (cold-start), effective content matching signals become much more important in the relevance of the recommendation. The de-facto method to measure similarity between two pieces of text is computing the cosine similarity of the two bags of words, and each word is weighted by TF (term frequency within the document) × IDF (inverted document frequency of the word within the corpus). In general sense, TF can represent any local weighting scheme of the word within each document, and IDF can represent any global weighting scheme of the word across the corpus. In this paper, we focus on the latter, i.e., optimizing the global term weights, for a particular recommendation domain by leveraging supervised approaches. The intuition is that some frequent words (lower IDF, e.g. “database”) can be essential and predictive for relevant recommendation, while some rare words (higher IDF, e.g. the name of a small company) could have less predictive power. Given plenty of observed activities between users and items as training data, we should be able to learn better domain-specific global term weights, which can further improve the relevance of recommendation. We propose a unified method that can simultaneously learn the weights of multiple content matching signals, as well as global term weights for specific recommendation tasks. Our method is efficient to handle large-scale training data ∗This work was conducted during an internship at LinkedIn. Copyright is held by the International World Wide Web Conference Committee (IW3C2). IW3C2 reserves the right to provide a hyperlink to the author’s site if the Material is used in electronic media. WWW 2016, April 11–15, 2016, Montréal, Québec, Canada. ACM 978-1-4503-4143-1/16/04. http://dx.doi.org/10.1145/2872427.2883069 . generated by production recommender systems. And experiments on LinkedIn job recommendation data justify the effectiveness of our approach.",
"title": ""
},
{
"docid": "8372f42c70b3790757f4f1d5535cebc1",
"text": "WiFi positioning system has been studying in many fields since the past. Recently, a lot of mobile companies are competing for smartphones. Accordingly, this paper proposes an indoor WiFi positioning system using Android-based smartphones.",
"title": ""
},
{
"docid": "3c27569524cba921edd79555ffc57c01",
"text": "Two low-profile hybrid antennas are presented. One of the structures provides linearly polarized (LP) wave and the other one produces circularly polarized (CP) radiated field. half-mode substrate integrated waveguide (HMSIW) technique is used to make a semi-circular cavity for reducing the antenna size. Using proximity effect, TM010 mode of a rectangular patch is excited by the HMSIW cavity. An inset microstrip line is used to excite the structure which leads to capability of planar circuit integration. The effects of the HMSIW cavity-backed antenna with and without patches are investigated. The simulated results show that adding the patch increases bandwidth and improves antenna gain. Both proposed hybrid antennas are made on a single-layer substrate using printed circuit board (PCB) process. Two prototypes of the proposed antennas are designed, simulated and fabricated. It is shown that broadband impedance bandwidth of 10% and maximum gain of 7.5 dBi is obtained for the LP antenna. In the case of CP antenna, axial ratio (AR) bandwidth is at least 1% with maximum gain of 6.8 dBi. The proposed hybrid antennas are low profile and offer attractive features such as high gain, low cross polarization level and high front-to-back ratio.",
"title": ""
},
{
"docid": "998fe25641f4f6dc6649b02226c5e86a",
"text": "We present the malicious administrator problem, in which one or more network administrators attempt to damage routing, forwarding, or network availability by misconfiguring controllers. While this threat vector has been acknowledged in previous work, most solutions have focused on enforcing specific policies for forwarding rules. We present a definition of this problem and a controller design called Fleet that makes a first step towards addressing this problem. We present two protocols that can be used with the Fleet controller, and argue that its lower layer deployed on top of switches eliminates many problems of using multiple controllers in SDNs. We then present a prototype simulation and show that as long as a majority of non-malicious administrators exists, we can usually recover from link failures within several seconds (a time dominated by failure detection speed and inter-administrator latency).",
"title": ""
},
{
"docid": "cee9b099f6ea087376b56067620e1c64",
"text": "This paper presents a set of techniques for predicting aggressive comments in social media. In a time when cyberbullying has, unfortunately, made its entrance into society and Internet, it becomes necessary to find ways for preventing and overcoming this phenomenon. One of these concerns the use of machine learning techniques for automatically detecting cases of cyberbullying; a primary task within this cyberbullying detection consists of aggressive text detection. We concretely explore different computational techniques for carrying out this task, either as a classification or as a regression problem, and our results suggest that a key feature is the identification of profane words.",
"title": ""
}
] | scidocsrr |
73a537f621468311eabaa37761cef16e | Self-Organizing Scheme Based on NFV and SDN Architecture for Future Heterogeneous Networks | [
{
"docid": "4d66a85651a78bfd4f7aba290c21f9a7",
"text": "Mobile carrier networks follow an architecture where network elements and their interfaces are defined in detail through standardization, but provide limited ways to develop new network features once deployed. In recent years we have witnessed rapid growth in over-the-top mobile applications and a 10-fold increase in subscriber traffic while ground-breaking network innovation took a back seat. We argue that carrier networks can benefit from advances in computer science and pertinent technology trends by incorporating a new way of thinking in their current toolbox. This article introduces a blueprint for implementing current as well as future network architectures based on a software-defined networking approach. Our architecture enables operators to capitalize on a flow-based forwarding model and fosters a rich environment for innovation inside the mobile network. In this article, we validate this concept in our wireless network research laboratory, demonstrate the programmability and flexibility of the architecture, and provide implementation and experimentation details.",
"title": ""
}
] | [
{
"docid": "f452650f3b003e6cd35d0303823e9277",
"text": "With the cloud storage services, users can easily form a group and share data with each other. Given the fact that the cloud is not trustable, users need to compute signatures for blocks of the shared data to allow public integrity auditing. Once a user is revoked from the group, the blocks that were previously signed by this revoked user must be re-signed by an existing user, which may result in heavy communication and computation cost for the user. Proxy re-signatures can be used here to allow the cloud to do the re-signing work on behalf of the group. However, a malicious cloud is able to use the re-signing keys to arbitrarily convert signatures from one user to another deliberately. Moreover, collusions between revoked users and a malicious cloud will disclose the secret values of the existing users. In this paper, we propose a novel public auditing scheme for the integrity of shared data with efficient and collusion-resistant user revocation utilizing the concept of Shamir secret sharing. Besides, our scheme also supports secure and efficient public auditing due to our improved polynomial-based authentication tags. The numerical analysis and experimental results demonstrate that our proposed scheme is provably secure and highly efficient.",
"title": ""
},
{
"docid": "6a4638a12c87b470a93e0d373a242868",
"text": "Unfortunately, few of today’s classrooms focus on helping students develop as creative thinkers. Even students who perform well in school are often unprepared for the challenges that they encounter after graduation, in their work lives as well as their personal lives. Many students learn to solve specific types of problems, but they are unable to adapt and improvise in response to the unexpected situations that inevitably arise in today’s fast-changing world.",
"title": ""
},
{
"docid": "9648c6cbdd7a04c595b7ba3310f32980",
"text": "Increase in identity frauds, crimes, security there is growing need of fingerprint technology in civilian and law enforcement applications. Partial fingerprints are of great interest which are either found at crime scenes or resulted from improper scanning. These fingerprints are poor in quality and the number of features present depends on size of fingerprint. Due to the lack of features such as core and delta, general fingerprint matching algorithms do not perform well for partial fingerprint matching. By using combination of level1 and level 2 features accuracy of partial matching cannot be increased. Therefore, we utilize extended features in combination with other feature set. Efficacious fusion methods for coalesce of different modality systems perform better for these types of prints. In this paper, we propose a method for partial fingerprint matching using score level fusion of minutiae based radon transform and pores based LBP extraction. To deal with broken ridges and fragmentary information, radon transform is used to get local information around minutiae. Finally, we evaluate the performance by comparing Equal Error Rate (ERR) of proposed method and existing method and proposed method reduces the error rate to 1.84%.",
"title": ""
},
{
"docid": "23aa04378f4eed573d1290c6bb9d3670",
"text": "The ability to compare systems from the same domain is of central importance for their introduction into complex applications. In the domains of named entity recognition and entity linking, the large number of systems and their orthogonal evaluation w.r.t. measures and datasets has led to an unclear landscape regarding the abilities and weaknesses of the different approaches. We present GERBIL—an improved platform for repeatable, storable and citable semantic annotation experiments— and its extension since being release. GERBIL has narrowed this evaluation gap by generating concise, archivable, humanand machine-readable experiments, analytics and diagnostics. The rationale behind our framework is to provide developers, end users and researchers with easy-to-use interfaces that allow for the agile, fine-grained and uniform evaluation of annotation tools on multiple datasets. By these means, we aim to ensure that both tool developers and end users can derive meaningful insights into the extension, integration and use of annotation applications. In particular, GERBIL provides comparable results to tool developers, simplifying the discovery of strengths and weaknesses of their implementations with respect to the state-of-the-art. With the permanent experiment URIs provided by our framework, we ensure the reproducibility and archiving of evaluation results. Moreover, the framework generates data in a machine-processable format, allowing for the efficient querying and postprocessing of evaluation results. Additionally, the tool diagnostics provided by GERBIL provide insights into the areas where tools need further refinement, thus allowing developers to create an informed agenda for extensions and end users to detect the right tools for their purposes. Finally, we implemented additional types of experiments including entity typing. GERBIL aims to become a focal point for the state-of-the-art, driving the research agenda of the community by presenting comparable objective evaluation results. Furthermore, we tackle the central problem of the evaluation of entity linking, i.e., we answer the question of how an evaluation algorithm can compare two URIs to each other without being bound to a specific knowledge base. Our approach to this problem opens a way to address the deprecation of URIs of existing gold standards for named entity recognition and entity linking, a feature which is currently not supported by the state-of-the-art. We derived the importance of this feature from usage and dataset requirements collected from the GERBIL user community, which has already carried out more than 24.000 single evaluations using our framework. Through the resulting updates, GERBIL now supports 8 tasks, 46 datasets and 20 systems.",
"title": ""
},
{
"docid": "f3b4a9b49a34d56c32589cee14e6b900",
"text": "The paper reports on mobile robot motion estimation based on matching points from successive two-dimensional (2D) laser scans. This ego-motion approach is well suited to unstructured and dynamic environments because it directly uses raw laser points rather than extracted features. We have analyzed the application of two methods that are very different in essence: (i) A 2D version of iterative closest point (ICP), which is widely used for surface registration; (ii) a genetic algorithm (GA), which is a novel approach for this kind of problem. Their performance in terms of real-time applicability and accuracy has been compared in outdoor experiments with nonstop motion under diverse realistic navigation conditions. Based on this analysis, we propose a hybrid GA-ICP algorithm that combines the best characteristics of these pure methods. The experiments have been carried out with the tracked mobile robot Auriga-alpha and an on-board 2D laser scanner. _____________________________________________________________________________________ This document is a PREPRINT. The published version of the article is available in: Journal of Field Robotics, 23: 21–34. doi: 10.1002/rob.20104; http://dx.doi.org/10.1002/rob.20104.",
"title": ""
},
{
"docid": "15657f493da77021df3406868e6949ff",
"text": "Brushless dc motors controlled by Hall-effect sensors are used in variety of applications, wherein the Hall sensors should be placed 120 electrical degrees apart. This is difficult to achieve in practice especially in low-precision motors, which leads to unsymmetrical operation of the inverter/motor phases. To mitigate this phenomenon, an approach of filtering the Hall-sensor signals has been recently proposed. This letter extends the previous work and presents a very efficient digital implementation of such filters that can be easily included into various brushless dc motor-drive systems for restoring their operation in steady state and transients.",
"title": ""
},
{
"docid": "41b83a85c1c633785766e3f464cbd7a6",
"text": "Distributed systems are easier to build than ever with the emergence of new, data-centric abstractions for storing and computing over massive datasets. However, similar abstractions do not exist for storing and accessing meta-data. To fill this gap, Tango provides developers with the abstraction of a replicated, in-memory data structure (such as a map or a tree) backed by a shared log. Tango objects are easy to build and use, replicating state via simple append and read operations on the shared log instead of complex distributed protocols; in the process, they obtain properties such as linearizability, persistence and high availability from the shared log. Tango also leverages the shared log to enable fast transactions across different objects, allowing applications to partition state across machines and scale to the limits of the underlying log without sacrificing consistency.",
"title": ""
},
{
"docid": "fe31348bce3e6e698e26aceb8e99b2d8",
"text": "Web-based enterprises process events generated by millions of users interacting with their websites. Rich statistical data distilled from combining such interactions in near real-time generates enormous business value. In this paper, we describe the architecture of Photon, a geographically distributed system for joining multiple continuously flowing streams of data in real-time with high scalability and low latency, where the streams may be unordered or delayed. The system fully tolerates infrastructure degradation and datacenter-level outages without any manual intervention. Photon guarantees that there will be no duplicates in the joined output (at-most-once semantics) at any point in time, that most joinable events will be present in the output in real-time (near-exact semantics), and exactly-once semantics eventually.\n Photon is deployed within Google Advertising System to join data streams such as web search queries and user clicks on advertisements. It produces joined logs that are used to derive key business metrics, including billing for advertisers. Our production deployment processes millions of events per minute at peak with an average end-to-end latency of less than 10 seconds. We also present challenges and solutions in maintaining large persistent state across geographically distant locations, and highlight the design principles that emerged from our experience.",
"title": ""
},
{
"docid": "e76a9cef74788905d3d8f5659c2bfca2",
"text": "In this paper, we present a novel configuration for realizing monolithic substrate integrated waveguide (SIW)-based phased antenna arrays using Ferrite low-temperature cofired ceramic (LTCC) technology. Unlike the current common schemes for realizing SIW phased arrays that rely on surface-mount component (p-i-n diodes, etc.) for controlling the phase of the individual antenna elements, here the phase is tuned by biasing of the ferrite filling of the SIW. This approach eliminates the need for mounting of any additional RF components and enables seamless monolithic integration of phase shifters and antennas in SIW technology. As a proof of concept, a two-element slotted SIW-based phased array is designed, fabricated, and measured. The prototype exhibits a gain of 4.9 dBi at 13.2 GHz and a maximum E-plane beam-scanning of ±28° using external windings for biasing the phase shifters. Moreover, the array can achieve a maximum beam-scanning of ±19° when biased with small windings that are embedded in the package. This demonstration marks the first time a fully monolithic SIW-based phased array is realized in Ferrite LTCC technology and paves the way for future larger size implementations.",
"title": ""
},
{
"docid": "a820e52486283ae0b1dd5c1ce07daa34",
"text": "The striatal dopaminergic system has been implicated in reinforcement learning (RL), motor performance, and incentive motivation. Various computational models have been proposed to account for each of these effects individually, but a formal analysis of their interactions is lacking. Here we present a novel algorithmic model expanding the classical actor-critic architecture to include fundamental interactive properties of neural circuit models, incorporating both incentive and learning effects into a single theoretical framework. The standard actor is replaced by a dual opponent actor system representing distinct striatal populations, which come to differentially specialize in discriminating positive and negative action values. Dopamine modulates the degree to which each actor component contributes to both learning and choice discriminations. In contrast to standard frameworks, this model simultaneously captures documented effects of dopamine on both learning and choice incentive-and their interactions-across a variety of studies, including probabilistic RL, effort-based choice, and motor skill learning.",
"title": ""
},
{
"docid": "2f045a9bfabe7adb71085ac29be39990",
"text": "Changes in functional connectivity across mental states can provide richer information about human cognition than simpler univariate approaches. Here, we applied a graph theoretical approach to analyze such changes in the lower alpha (8-10 Hz) band of EEG data from 26 subjects undergoing a mentally-demanding test of sustained attention: the Psychomotor Vigilance Test. Behavior and connectivity maps were compared between the first and last 5 min of the task. Reaction times were significantly slower in the final minutes of the task, showing a clear time-on-task effect. A significant increase was observed in weighted characteristic path length, a measure of the efficiency of information transfer within the cortical network. This increase was correlated with reaction time change. Functional connectivity patterns were also estimated on the cortical surface via source localization of cortical activities in 26 predefined regions of interest. Increased characteristic path length was revealed, providing further support for the presence of a reshaped global topology in cortical connectivity networks under fatigue state. Additional analysis showed an asymmetrical pattern of connectivity (right>left) in fronto-parietal regions associated with sustained attention, supporting the right-lateralization of this function. Interestingly, in the fatigue state, significance decreases were observed in left, but not right fronto-parietal connectivity. Our results indicate that functional network organization can change over relatively short time scales with mental fatigue, and that decreased connectivity has a meaningful relationship with individual difference in behavior and performance.",
"title": ""
},
{
"docid": "ed13193df5db458d0673ccee69700bc0",
"text": "Interest in meat fatty acid composition stems mainly from the need to find ways to produce healthier meat, i.e. with a higher ratio of polyunsaturated (PUFA) to saturated fatty acids and a more favourable balance between n-6 and n-3 PUFA. In pigs, the drive has been to increase n-3 PUFA in meat and this can be achieved by feeding sources such as linseed in the diet. Only when concentrations of α-linolenic acid (18:3) approach 3% of neutral lipids or phospholipids are there any adverse effects on meat quality, defined in terms of shelf life (lipid and myoglobin oxidation) and flavour. Ruminant meats are a relatively good source of n-3 PUFA due to the presence of 18:3 in grass. Further increases can be achieved with animals fed grain-based diets by including whole linseed or linseed oil, especially if this is \"protected\" from rumen biohydrogenation. Long-chain (C20-C22) n-3 PUFA are synthesised from 18:3 in the animal although docosahexaenoic acid (DHA, 22:6) is not increased when diets are supplemented with 18:3. DHA can be increased by feeding sources such as fish oil although too-high levels cause adverse flavour and colour changes. Grass-fed beef and lamb have naturally high levels of 18:3 and long chain n-3 PUFA. These impact on flavour to produce a 'grass fed' taste in which other components of grass are also involved. Grazing also provides antioxidants including vitamin E which maintain PUFA levels in meat and prevent quality deterioration during processing and display. In pork, beef and lamb the melting point of lipid and the firmness/hardness of carcass fat is closely related to the concentration of stearic acid (18:0).",
"title": ""
},
{
"docid": "bf19f897047ba130afd7742a9847e08c",
"text": "Neural Machine Translation (NMT) has been shown to be more effective in translation tasks compared to the Phrase-Based Statistical Machine Translation (PBMT). However, NMT systems are limited in translating low-resource languages (LRL), due to the fact that neural methods require a large amount of parallel data to learn effective mappings between languages. In this work we show how so-called multilingual NMT can help to tackle the challenges associated with LRL translation. Multilingual NMT forces words and subwords representation in a shared semantic space across multiple languages. This allows the model to utilize a positive parameter transfer between different languages, without changing the standard attentionbased encoder-decoder architecture and training modality. We run preliminary experiments with three languages (English, Italian, Romanian) covering six translation directions and show that for all available directions the multilingual approach, i.e. just one system covering all directions is comparable or even outperforms the single bilingual systems. Finally, our approach achieve competitive results also for language pairs not seen at training time using a pivoting (x-step) translation. Italiano. La traduzione automatica con reti neurali (neural machine translation, NMT) ha dimostrato di essere più efficace in molti compiti di traduzione rispetto a quella basata su frasi (phrase-based machine translation, PBMT). Tuttavia, i sistemi NMT sono limitati nel tradurre lingue con basse risorse (LRL). Questo è dovuto al fatto che i metodi di deep learning richiedono grandi quantit di dati per imparare una mappa efficace tra le due lingue. In questo lavoro mostriamo come un modello NMT multilingua può aiutare ad affrontare i problemi legati alla traduzione di LRL. La NMT multilingua costringe la rappresentrazione delle parole e dei segmenti di parole in uno spazio semantico condiviso tra multiple lingue. Questo consente al modello di usare un trasferimento di parametri positivo tra le lingue coinvolte, senza cambiare l’architettura NMT encoder-decoder basata sull’attention e il modo di addestramento. Abbiamo eseguito esperimenti preliminari con tre lingue (inglese, italiano e rumeno), coprendo sei direzioni di traduzione e mostriamo che per tutte le direzioni disponibili l’approccio multilingua, cioè un solo sistema che copre tutte le direzioni è confrontabile o persino migliore dei singolo sistemi bilingue. Inoltre, il nostro approccio ottiene risultati competitivi anche per coppie di lingue non viste durante il trainig, facendo uso di traduzioni con pivot.",
"title": ""
},
{
"docid": "43d5236bd9e2afc2882b662e4626bfce",
"text": "Mindfulness meditation (or simply mindfulness) is an ancient method of attention training. Arguably, developed originally by the Buddha, it has been practiced by Buddhists over 2,500 years as part of their spiritual training. The popularity in mindfulness has soared recently following its adaptation as Mindfulness-Based Stress Management by Jon Kabat-Zinn (1995). Mindfulness is often compared to hypnosis but not all assertions are accurate. This article, as a primer, delineates similarities and dissimilarities between mindfulness and hypnosis in terms of 12 specific facets, including putative neuroscientific findings. It also provides a case example that illustrates clinical integration of the two methods.",
"title": ""
},
{
"docid": "9058505c04c1dc7c33603fd8347312a0",
"text": "Fear appeals are a polarizing issue, with proponents confident in their efficacy and opponents confident that they backfire. We present the results of a comprehensive meta-analysis investigating fear appeals' effectiveness for influencing attitudes, intentions, and behaviors. We tested predictions from a large number of theories, the majority of which have never been tested meta-analytically until now. Studies were included if they contained a treatment group exposed to a fear appeal, a valid comparison group, a manipulation of depicted fear, a measure of attitudes, intentions, or behaviors concerning the targeted risk or recommended solution, and adequate statistics to calculate effect sizes. The meta-analysis included 127 articles (9% unpublished) yielding 248 independent samples (NTotal = 27,372) collected from diverse populations. Results showed a positive effect of fear appeals on attitudes, intentions, and behaviors, with the average effect on a composite index being random-effects d = 0.29. Moderation analyses based on prominent fear appeal theories showed that the effectiveness of fear appeals increased when the message included efficacy statements, depicted high susceptibility and severity, recommended one-time only (vs. repeated) behaviors, and targeted audiences that included a larger percentage of female message recipients. Overall, we conclude that (a) fear appeals are effective at positively influencing attitude, intentions, and behaviors; (b) there are very few circumstances under which they are not effective; and (c) there are no identified circumstances under which they backfire and lead to undesirable outcomes.",
"title": ""
},
{
"docid": "e5ecbd3728e93badd4cfbf5eef6957f9",
"text": "Live-cell imaging has opened an exciting window into the role cellular heterogeneity plays in dynamic, living systems. A major critical challenge for this class of experiments is the problem of image segmentation, or determining which parts of a microscope image correspond to which individual cells. Current approaches require many hours of manual curation and depend on approaches that are difficult to share between labs. They are also unable to robustly segment the cytoplasms of mammalian cells. Here, we show that deep convolutional neural networks, a supervised machine learning method, can solve this challenge for multiple cell types across the domains of life. We demonstrate that this approach can robustly segment fluorescent images of cell nuclei as well as phase images of the cytoplasms of individual bacterial and mammalian cells from phase contrast images without the need for a fluorescent cytoplasmic marker. These networks also enable the simultaneous segmentation and identification of different mammalian cell types grown in co-culture. A quantitative comparison with prior methods demonstrates that convolutional neural networks have improved accuracy and lead to a significant reduction in curation time. We relay our experience in designing and optimizing deep convolutional neural networks for this task and outline several design rules that we found led to robust performance. We conclude that deep convolutional neural networks are an accurate method that require less curation time, are generalizable to a multiplicity of cell types, from bacteria to mammalian cells, and expand live-cell imaging capabilities to include multi-cell type systems.",
"title": ""
},
{
"docid": "c91cbf47f1c506b4d512adc752fff039",
"text": "OBJECTIVE\nSodium benzoate, a common additive in popular beverages, has recently been linked to ADHD. This research examined the relationship between sodium benzoate-rich beverage ingestion and symptoms related to ADHD in college students.\n\n\nMETHOD\nCollege students (N = 475) completed an anonymous survey in class in fall 2010. The survey assessed recent intake of a noninclusive list of sodium benzoate-rich beverages and ADHD-related symptoms using a validated screener.\n\n\nRESULTS\nSodium benzoate-rich beverage intake was significantly associated with ADHD-related symptoms (p = .001), and significance was retained after controlling for covariates. Students scoring ≥4 on the screener (scores that may be consistent with ADHD; n = 67) reported higher intakes (34.9 ± 4.4 servings/month) than the remainder of the sample (16.7 ± 1.1 servings/month).\n\n\nCONCLUSION\nThese data suggest that a high intake of sodium benzoate-rich beverages may contribute to ADHD-related symptoms in college students and warrants further investigation.",
"title": ""
},
{
"docid": "1d1caa539215e7051c25a9f28da48651",
"text": "Physiological changes occur in pregnancy to nurture the developing foetus and prepare the mother for labour and delivery. Some of these changes influence normal biochemical values while others may mimic symptoms of medical disease. It is important to differentiate between normal physiological changes and disease pathology. This review highlights the important changes that take place during normal pregnancy.",
"title": ""
},
{
"docid": "9b71c5bd7314e793757776c6e54f03bb",
"text": "This paper evaluates the application of Bronfenbrenner’s bioecological theory as it is represented in empirical work on families and their relationships. We describe the ‘‘mature’’ form of bioecological theory of the mid-1990s and beyond, with its focus on proximal processes at the center of the Process-Person-Context-Time model. We then examine 25 papers published since 2001, all explicitly described as being based on Bronfenbrenner’s theory, and show that all but 4 rely on outmoded versions of the theory, resulting in conceptual confusion and inadequate testing of the theory.",
"title": ""
}
] | scidocsrr |
191acb49442f6505c839606b130fa5ff | A simulation as a service cloud middleware | [
{
"docid": "e740e5ff2989ce414836c422c45570a9",
"text": "Many organizations desired to operate their businesses, works and services in a mobile (i.e. just in time and anywhere), dynamic, and knowledge-oriented fashion. Activities like e-learning, environmental learning, remote inspection, health-care, home security and safety mechanisms etc. requires a special infrastructure that might provide continuous, secured, reliable and mobile data with proper information/ knowledge management system in context to their confined environment and its users. An indefinite number of sensor networks for numerous healthcare applications has been designed and implemented but they all lacking extensibility, fault-tolerance, mobility, reliability and openness. Thus, an open, flexible and rearrangeable infrastructure is proposed for healthcare monitoring applications. Where physical sensors are virtualized as virtual sensors on cloud computing by this infrastructure and virtual sensors are provisioned automatically to end users whenever they required. In this paper we reviewed some approaches to hasten the service creations in field of healthcare and other applications with Cloud-Sensor architecture. This architecture provides services to end users without being worried about its implementation details. The architecture allows the service requesters to use the virtual sensors by themselves or they may create other new services by extending virtual sensors.",
"title": ""
},
{
"docid": "9380bb09ffc970499931f063008c935f",
"text": "Cloud computing and virtualization technology have revolutionized general-purpose computing applications in the past decade. The cloud paradigm offers advantages through reduction of operation costs, server consolidation, flexible system configuration and elastic resource provisioning. However, despite the success of cloud computing for general-purpose computing, existing cloud computing and virtualization technology face tremendous challenges in supporting emerging soft real-time applications such as online video streaming, cloud-based gaming, and telecommunication management. These applications demand real-time performance in open, shared and virtualized computing environments. This paper identifies the technical challenges in supporting real-time applications in the cloud, surveys recent advancement in real-time virtualization and cloud computing technology, and offers research directions to enable cloud-based real-time applications in the future. 2014 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "7f06370a81e7749970cd0359c5b5f993",
"text": "The use of virtualization technologies in high performance computing (HPC) environments has traditionally been avoided due to their inherent performance overhead. However, with the rise of container-based virtualization implementations, such as Linux VServer, OpenVZ and Linux Containers (LXC), it is possible to obtain a very low overhead leading to near-native performance. In this work, we conducted a number of experiments in order to perform an in-depth performance evaluation of container-based virtualization for HPC. We also evaluated the trade-off between performance and isolation in container-based virtualization systems and compared them with Xen, which is a representative of the traditional hypervisor-based virtualization systems used today.",
"title": ""
}
] | [
{
"docid": "234fcc911f6d94b6bbb0af237ad5f34f",
"text": "Contamination of samples with DNA is still a major problem in microbiology laboratories, despite the wide acceptance of PCR and other amplification techniques for the detection of frequently low amounts of target DNA. This review focuses on the implications of contamination in the diagnosis and research of infectious diseases, possible sources of contaminants, strategies for prevention and destruction, and quality control. Contamination of samples in diagnostic PCR can have far-reaching consequences for patients, as illustrated by several examples in this review. Furthermore, it appears that the (sometimes very unexpected) sources of contaminants are diverse (including water, reagents, disposables, sample carry over, and amplicon), and contaminants can also be introduced by unrelated activities in neighboring laboratories. Therefore, lack of communication between researchers using the same laboratory space can be considered a risk factor. Only a very limited number of multicenter quality control studies have been published so far, but these showed false-positive rates of 9–57%. The overall conclusion is that although nucleic acid amplification assays are basically useful both in research and in the clinic, their accuracy depends on awareness of risk factors and the proper use of procedures for the prevention of nucleic acid contamination. The discussion of prevention and destruction strategies included in this review may serve as a guide to help improve laboratory practices and reduce the number of false-positive amplification results.",
"title": ""
},
{
"docid": "cff3b4f6db26e66893a9db95fb068ef1",
"text": "In this paper, we consider the task of text categorization as a graph classification problem. By representing textual documents as graph-of-words instead of historical n-gram bag-of-words, we extract more discriminative features that correspond to long-distance n-grams through frequent subgraph mining. Moreover, by capitalizing on the concept of k-core, we reduce the graph representation to its densest part – its main core – speeding up the feature extraction step for little to no cost in prediction performances. Experiments on four standard text classification datasets show statistically significant higher accuracy and macro-averaged F1-score compared to baseline approaches.",
"title": ""
},
{
"docid": "417100b3384ec637b47846134bc6d1fd",
"text": "The electronic way of learning and communicating with students offers a lot of advantages that can be achieved through different solutions. Among them, the most popular approach is the use of a learning management system. Teachers and students do not have the possibility to use all of the available learning system tools and modules. Even for modules that are used it is necessary to find the most effective method of approach for any given situation. Therefore, in this paper we make a usability evaluation of standard modules in Moodle, one of the leading open source learning management systems. With this research, we obtain significant results and informationpsilas for administrators, teachers and students on how to improve effective usage of this system.",
"title": ""
},
{
"docid": "48317f6959b4a681e0ff001c7ce3e7ee",
"text": "We introduce the challenge of using machine learning effectively in space applications and motivate the domain for future researchers. Machine learning can be used to enable greater autonomy to improve the duration, reliability, cost-effectiveness, and science return of space missions. In addition to the challenges provided by the nature of space itself, the requirements of a space mission severely limit the use of many current machine learning approaches, and we encourage researchers to explore new ways to address these challenges.",
"title": ""
},
{
"docid": "6746032bbd302a8c873ac437fc79b3fe",
"text": "This article examines the development of profitor revenue-sharing contracts in the motion picture industry. Contrary to much popular belief, such contracts have been in use since the start of the studio era. However, early contracts differed from those seen today. The evolution of the current contract is traced, and evidence regarding the increased use of sharing contracts after 1948 is examined. I examine competing theories of the economic function served by these contracts. I suggest that it is unlikely that these contracts are the result of a standard principal-agent problem.",
"title": ""
},
{
"docid": "defb837e866948e5e092ab64476d33b5",
"text": "Recent multicoil polarised pads called Double D pads (DDP) and Bipolar Pads (BPP) show excellent promise when used in lumped charging due to having single sided fields and high native Q factors. However, improvements to field leakage are desired to enable higher power transfer while keeping the leakage flux within ICNIRP levels. This paper proposes a method to reduce the leakage flux which a lumped inductive power transfer (IPT) system exhibits by modifying the ferrite structure of its pads. The DDP and BPP pads ferrite structures are both modified by extending them past the ends of the coils in each pad with the intention of attracting only magnetic flux generated by the primary pad not coupled onto the secondary pad. Simulated improved ferrite structures are validated through practical measurements.",
"title": ""
},
{
"docid": "4b057d86825e346291d675e0c1285fad",
"text": "We describe theclipmap, a dynamic texture representation that efficiently caches textures of arbitrarily large size in a finite amount of physical memory for rendering at real-time rates. Further, we describe a software system for managing clipmaps that supports integration into demanding real-time applications. We show the scale and robustness of this integrated hardware/software architecture by reviewing an application virtualizing a 170 gigabyte texture at 60 Hertz. Finally, we suggest ways that other rendering systems may exploit the concepts underlying clipmaps to solve related problems. CR",
"title": ""
},
{
"docid": "6be97ac80738519792c02b033563efa7",
"text": "Title of Document: SPIN: LEXICAL SEMANTICS, TRANSITIVITY, AND THE IDENTIFICATION OF IMPLICIT SENTIMENT Stephan Charles Greene Doctor of Philosophy, 2007 Directed By: Professor Philip Resnik, Department of Linguistics and Institute for Advanced Computer Studies Current interest in automatic sentiment analysis i motivated by a variety of information requirements. The vast majority of work in sentiment analysis has been specifically targeted at detecting subjective state ments and mining opinions. This dissertation focuses on a different but related pro blem that to date has received relatively little attention in NLP research: detect ing implicit sentiment , or spin, in text. This text classification task is distinguished from ther sentiment analysis work in that there is no assumption that the documents to b e classified with respect to sentiment are necessarily overt expressions of opin ion. They rather are documents that might reveal a perspective . This dissertation describes a novel approach to t e identification of implicit sentiment, motivated by ideas drawn from the literature on lexical semantics and argument structure, supported and refined through psycholinguistic experimentation. A relationship pr edictive of sentiment is established for components of meaning that are thou g t to be drivers of verbal argument selection and linking and to be arbiters o f what is foregrounded or backgrounded in discourse. In computational experim nts employing targeted lexical selection for verbs and nouns, a set of features re flective of these components of meaning is extracted for the terms. As observable p roxies for the underlying semantic components, these features are exploited using mach ine learning methods for text classification with respect to perspective. After i nitial experimentation with manually selected lexical resources, the method is generaliz d to require no manual selection or hand tuning of any kind. The robustness of this lin gu stically motivated method is demonstrated by successfully applying it to three d istinct text domains under a number of different experimental conditions, obtain ing the best classification accuracies yet reported for several sentiment class ification tasks. A novel graph-based classifier combination method is introduced which f urther improves classification accuracy by integrating statistical classifiers wit h models of inter-document relationships. SPIN: LEXICAL SEMANTICS, TRANSITIVITY, AND THE IDENTIFICATION OF IMPLICIT SENTIMENT",
"title": ""
},
{
"docid": "0df2ca944dcdf79369ef5a7424bf3ffe",
"text": "This article first presents two theories representing distinct approaches to the field of stress research: Selye's theory of `systemic stress' based in physiology and psychobiology, and the `psychological stress' model developed by Lazarus. In the second part, the concept of coping is described. Coping theories may be classified according to two independent parameters: traitoriented versus state-oriented, and microanalytic versus macroanalytic approaches. The multitude of theoretical conceptions is based on the macroanalytic, trait-oriented approach. Examples of this approach that are presented in this article are `repression–sensitization,' `monitoringblunting,' and the `model of coping modes.' The article closes with a brief outline of future perspectives in stress and coping research.",
"title": ""
},
{
"docid": "6ce2991a68c7d4d6467ff2007badbaf0",
"text": "This paper investigates acoustic models for automatic speech recognition (ASR) using deep neural networks (DNNs) whose input is taken directly from windowed speech waveforms (WSW). After demonstrating the ability of these networks to automatically acquire internal representations that are similar to mel-scale filter-banks, an investigation into efficient DNN architectures for exploiting WSW features is performed. First, a modified bottleneck DNN architecture is investigated to capture dynamic spectrum information that is not well represented in the time domain signal. Second,the redundancies inherent in WSW based DNNs are considered. The performance of acoustic models defined over WSW features is compared to that obtained from acoustic models defined over mel frequency spectrum coefficient (MFSC) features on the Wall Street Journal (WSJ) speech corpus. It is shown that using WSW features results in a 3.0 percent increase in WER relative to that resulting from MFSC features on the WSJ corpus. However, when combined with MFSC features, a reduction in WER of 4.1 percent is obtained with respect to the best evaluated MFSC based DNN acoustic model.",
"title": ""
},
{
"docid": "e91310da7635df27b5c4056388cc6e52",
"text": "This paper presents a new metric for automated registration of multi-modal sensor data. The metric is based on the alignment of the orientation of gradients formed from the two candidate sensors. Data registration is performed by estimating the sensors’ extrinsic parameters that minimises the misalignment of the gradients. The metric can operate in a large range of applications working on both 2D and 3D sensor outputs and is suitable for both (i) single scan data registration and (ii) multi-sensor platform calibration using multiple scans. Unlike traditional calibration methods, it does not require markers or other registration aids to be placed in the scene. The effectiveness of the new method is demonstrated with experimental results on a variety of camera-lidar and camera-camera calibration problems. The novel metric is validated through comparisons with state of the art methods. Our approach is shown to give high quality registrations under all tested conditions. C © 2014 Wiley Periodicals, Inc.",
"title": ""
},
{
"docid": "35b286999957396e1f5cab6e2370ed88",
"text": "Text summarization condenses a text to a shorter version while retaining the important informations. Abstractive summarization is a recent development that generates new phrases, rather than simply copying or rephrasing sentences within the original text. Recently neural sequence-to-sequence models have achieved good results in the field of abstractive summarization, which opens new possibilities and applications for industrial purposes. However, most practitioners observe that these models still use large parts of the original text in the output summaries, making them often similar to extractive frameworks. To address this drawback, we first introduce a new metric to measure how much of a summary is extracted from the input text. Secondly, we present a novel method, that relies on a diversity factor in computing the neural network loss, to improve the diversity of the summaries generated by any neural abstractive model implementing beam search. Finally, we show that this method not only makes the system less extractive, but also improves the overall rouge score of state-of-the-art methods by at least 2 points.",
"title": ""
},
{
"docid": "1d60437cbd2cec5058957af291ca7cde",
"text": "e behavior of users in certain services could be a clue that can be used to infer their preferences and may be used to make recommendations for other services they have never used. However, the cross-domain relationships between items and user consumption paerns are not simple, especially when there are few or no common users and items across domains. To address this problem, we propose a content-based cross-domain recommendation method for cold-start users that does not require userand itemoverlap. We formulate recommendation as extreme multi-class classication where labels (items) corresponding to the users are predicted. With this formulation, the problem is reduced to a domain adaptation seing, in which a classier trained in the source domain is adapted to the target domain. For this, we construct a neural network that combines an architecture for domain adaptation, Domain Separation Network, with a denoising autoencoder for item representation. We assess the performance of our approach in experiments on a pair of data sets collected from movie and news services of Yahoo! JAPAN and show that our approach outperforms several baseline methods including a cross-domain collaborative ltering method.",
"title": ""
},
{
"docid": "a89c53f4fbe47e7a5e49193f0786cd6d",
"text": "Although hundreds of studies have documented the association between family poverty and children's health, achievement, and behavior, few measure the effects of the timing, depth, and duration of poverty on children, and many fail to adjust for other family characteristics (for example, female headship, mother's age, and schooling) that may account for much of the observed correlation between poverty and child outcomes. This article focuses on a recent set of studies that explore the relationship between poverty and child outcomes in depth. By and large, this research supports the conclusion that family income has selective but, in some instances, quite substantial effects on child and adolescent well-being. Family income appears to be more strongly related to children's ability and achievement than to their emotional outcomes. Children who live in extreme poverty or who live below the poverty line for multiple years appear, all other things being equal, to suffer the worst outcomes. The timing of poverty also seems to be important for certain child outcomes. Children who experience poverty during their preschool and early school years have lower rates of school completion than children and adolescents who experience poverty only in later years. Although more research is needed on the significance of the timing of poverty on child outcomes, findings to date suggest that interventions during early childhood may be most important in reducing poverty's impact on children.",
"title": ""
},
{
"docid": "5e75a46c36e663791db0f8b45f685cb6",
"text": "This study provides one of very few experimental investigations into the impact of a musical soundtrack on the video gaming experience. Participants were randomly assigned to one of three experimental conditions: game-with-music, game-without-music, or music-only. After playing each of three segments of The Lord of the Rings: The Two Towers (Electronic Arts, 2002)--or, in the music-only condition, listening to the musical score that accompanies the scene--subjects responded on 21 verbal scales. Results revealed that some, but not all, of the verbal scales exhibited a statistically significant difference due to the presence of a musical score. In addition, both gender and age level were shown to be significant factors for some, but not all, of the verbal scales. Details of the specific ways in which music affects the gaming experience are provided in the body of the paper.",
"title": ""
},
{
"docid": "8a293b95b931f4f72fe644fdfe30564a",
"text": "Today, the concept of brain connectivity plays a central role in the neuroscience. While functional connectivity is defined as the temporal coherence between the activities of different brain areas, the effective connectivity is defined as the simplest brain circuit that would produce the same temporal relationship as observed experimentally between cortical sites. The most used method to estimate effective connectivity in neuroscience is the structural equation modeling (SEM), typically used on data related to the brain hemodynamic behavior. However, the use of hemodynamic measures limits the temporal resolution on which the brain process can be followed. The present research proposes the use of the SEM approach on the cortical waveforms estimated from the high-resolution EEG data, which exhibits a good spatial resolution and a higher temporal resolution than hemodynamic measures. We performed a simulation study, in which different main factors were systematically manipulated in the generation of test signals, and the errors in the estimated connectivity were evaluated by the analysis of variance (ANOVA). Such factors were the signal-to-noise ratio and the duration of the simulated cortical activity. Since SEM technique is based on the use of a model formulated on the basis of anatomical and physiological constraints, different experimental conditions were analyzed, in order to evaluate the effect of errors made in the a priori model formulation on its performances. The feasibility of the proposed approach has been shown in a human study using high-resolution EEG recordings related to finger tapping movements.",
"title": ""
},
{
"docid": "3476246809afe4e6b7cef9bbbed1926e",
"text": "The aim of this study was to investigate the efficacy of a proposed new implant mediated drug delivery system (IMDDS) in rabbits. The drug delivery system is applied through a modified titanium implant that is configured to be implanted into bone. The implant is hollow and has multiple microholes that can continuously deliver therapeutic agents into the systematic body. To examine the efficacy and feasibility of the IMDDS, we investigated the pharmacokinetic behavior of dexamethasone in plasma after a single dose was delivered via the modified implant placed in the rabbit tibia. After measuring the plasma concentration, the areas under the curve showed that the IMDDS provided a sustained release for a relatively long period. The result suggests that the IMDDS can deliver a sustained release of certain drug components with a high bioavailability. Accordingly, the IMDDS may provide the basis for a novel approach to treating patients with chronic diseases.",
"title": ""
},
{
"docid": "bd21815804115f2c413265660a78c203",
"text": "Outsourcing, internationalization, and complexity characterize today's aerospace supply chains, making aircraft manufacturers structurally dependent on each other. Despite several complexity-related supply chain issues reported in the literature, aerospace supply chain structure has not been studied due to a lack of empirical data and suitable analytical toolsets for studying system structure. In this paper, we assemble a large-scale empirical data set on the supply network of Airbus and apply the new science of networks to analyze how the industry is structured. Our results show that the system under study is a network, formed by communities connected by hub firms. Hub firms also tend to connect to each other, providing cohesiveness, yet making the network vulnerable to disruptions in them. We also show how network science can be used to identify firms that are operationally critical and that are key to disseminating information.",
"title": ""
},
{
"docid": "dc207fb8426f468dde2cb1d804b33539",
"text": "This paper presents a webcam-based spherical coordinate conversion system using OpenCL massive parallel computing for panorama video image stitching. With multi-core architecture and its high-bandwidth data transmission rate of memory accesses, modern programmable GPU makes it possible to process multiple video images in parallel for real-time interaction. To get a panorama view of 360 degrees, we use OpenCL to stitch multiple webcam video images into a panorama image and texture mapped it to a spherical object to compose a virtual reality immersive environment. The experimental results show that when we use NVIDIA 9600GT to process eight 640×480 images, OpenCL can achieve ninety times speedups.",
"title": ""
},
{
"docid": "161c79eeb01624c497446cb2c51f3893",
"text": "In this article, results of a German nationwide survey (KFN schools survey 2007/2008) are presented. The controlled sample of 44,610 male and female ninth-graders was carried out in 2007 and 2008 by the Criminological Research Institute of Lower Saxony (KFN). According to a newly developed screening instrument (KFN-CSAS-II), which was presented to every third juvenile participant (N = 15,168), 3% of the male and 0.3% of the female students are diagnosed as dependent on video games. The data indicate a clear dividing line between extensive gaming and video game dependency (VGD) as a clinically relevant phenomenon. VGD is accompanied by increased levels of psychological and social stress in the form of lower school achievement, increased truancy, reduced sleep time, limited leisure activities, and increased thoughts of committing suicide. In addition, it becomes evident that personal risk factors are crucial for VGD. The findings indicate the necessity of additional research as well as the respective measures in the field of health care policies.",
"title": ""
}
] | scidocsrr |
80d5a1ee4c177058910ee7a708fe8dc3 | Camera Model Identification Based on the Heteroscedastic Noise Model | [
{
"docid": "8055b2c65d5774000fe4fa81ff83efb7",
"text": "Changes in measured image irradiance have many physical causes and are the primary cue for several visual processes, such as edge detection and shape from shading. Using physical models for charged-coupled device ( C C D ) video cameras and material reflectance, we quantify the variation in digitized pixel values that is due to sensor noise and scene variation. This analysis forms the basis of algorithms for camera characterization and calibration and for scene description. Specifically, algorithms are developed for estimating the parameters of camera noise and for calibrating a camera to remove the effects of fixed pattern nonuniformity and spatial variation in dark current. While these techniques have many potential uses, we describe in particular how they can be used to estimate a measure of scene variation. This measure is independent of image irradiance and can be used to identify a surface from a single sensor band over a range of situations. Experimental results confirm that the models presented in this paper are useful for modeling the different sources of variation in real images obtained from video cameras. Index T e m s C C D cameras, computer vision, camera calibration, noise estimation, reflectance variation, sensor modeling.",
"title": ""
}
] | [
{
"docid": "783c347d3d4f5a191508f005b362164b",
"text": "Workspace awareness is knowledge about others’ interaction with a shared workspace. Groupware systems provide only limited information about other participants, often compromising workspace awareness. This paper describes a usability study of several widgets designed to help maintain awareness in a groupware workspace. These widgets include a miniature view, a radar view, a multiuser scrollbar, a glance function, and a “what you see is what I do” view. The study examined the widgets’ information content, how easily people could interpret them, and whether they were useful or distracting. Observations, questionnaires, and interviews indicate that the miniature and radar displays are useful and valuable for tasks involving spatial manipulation of artifacts.",
"title": ""
},
{
"docid": "331391539cd5a226e9389f96f815fa0d",
"text": "Understanding protein function from amino acid sequence is a fundamental problem in biology. In this project, we explore how well we can represent biological function through examination of raw sequence alone. Using a large corpus of protein sequences and their annotated protein families, we learn dense vector representations for amino acid sequences using the co-occurrence statistics of short fragments. Then, using this representation, we experiment with several neural network architectures to train classifiers for protein family identification. We show good performance for a multi-class prediction problem with 589 protein family classes.",
"title": ""
},
{
"docid": "b94e096ea1bc990bd7c72aab988dd5ff",
"text": "The paper describes the design and implementation of an independent, third party contract monitoring service called Contract Compliance Checker (CCC). The CCC is provided with the specification of the contract in force, and is capable of observing and logging the relevant business-to-business (B2B) interaction events, in order to determine whether the actions of the business partners are consistent with the contract. A contract specification language called EROP (for Events, Rights, Obligations and Prohibitions) for the CCC has been developed based on business rules, that provides constructs to specify what rights, obligation and prohibitions become active and inactive after the occurrence of events related to the execution of business operations. The system has been designed to work with B2B industry standards such as ebXML and RosettaNet.",
"title": ""
},
{
"docid": "9b917dde9a9f9dcf8ed74fd0bb3a07cf",
"text": "We describe an ELECTRONIC SPEAKING GLOVE, designed to facilitate an easy communication through synthesized speech for the benefit of speechless patients. Generally, a speechless person communicates through sign language which is not understood by the majority of people. This final year project is designed to solve this problem. Gestures of fingers of a user of this glove will be converted into synthesized speech to convey an audible message to others, for example in a critical communication with doctors. The glove is internally equipped with multiple flex sensors that are made up of “bend-sensitive resistance elements”. For each specific gesture, internal flex sensors produce a proportional change in resistance of various elements. The processing of this information sends a unique set of signals to the AVR (Advance Virtual RISC) microcontroller which is preprogrammed to speak desired sentences.",
"title": ""
},
{
"docid": "7f8ee14d2d185798c3864178bd450f3d",
"text": "In this paper, a new sensing device that can simultaneously monitor traffic congestion and urban flash floods is presented. This sensing device is based on the combination of passive infrared sensors (PIRs) and ultrasonic rangefinder, and is used for real-time vehicle detection, classification, and speed estimation in the context of wireless sensor networks. This framework relies on dynamic Bayesian Networks to fuse heterogeneous data both spatially and temporally for vehicle detection. To estimate the speed of the incoming vehicles, we first use cross correlation and wavelet transform-based methods to estimate the time delay between the signals of different sensors. We then propose a calibration and self-correction model based on Bayesian Networks to make a joint inference by all sensors about the speed and the length of the detected vehicle. Furthermore, we use the measurements of the ultrasonic and the PIR sensors to perform vehicle classification. Validation data (using an experimental dual infrared and ultrasonic traffic sensor) show a 99% accuracy in vehicle detection, a mean error of 5 kph in vehicle speed estimation, a mean error of 0.7m in vehicle length estimation, and a high accuracy in vehicle classification. Finally, we discuss the computational performance of the algorithm, and show that this framework can be implemented on low-power computational devices within a wireless sensor network setting. Such decentralized processing greatly improves the energy consumption of the system and minimizes bandwidth usage.",
"title": ""
},
{
"docid": "3ed0e387f8e6a8246b493afbb07a9312",
"text": "Van den Ende-Gupta Syndrome (VDEGS) is an autosomal recessive disorder characterized by blepharophimosis, distinctive nose, hypoplastic maxilla, and skeletal abnormalities. Using homozygosity mapping in four VDEGS patients from three consanguineous families, Anastacio et al. [Anastacio et al. (2010); Am J Hum Genet 87:553-559] identified homozygous mutations in SCARF2, located at 22q11.2. Bedeschi et al. [2010] described a VDEGS patient with sclerocornea and cataracts with compound heterozygosity for the common 22q11.2 microdeletion and a hemizygous SCARF2 mutation. Because sclerocornea had been described in DiGeorge-velo-cardio-facial syndrome but not in VDEGS, they suggested that the ocular abnormalities were caused by the 22q11.2 microdeletion. We report on a 23-year-old male who presented with bilateral sclerocornea and the VDGEGS phenotype who was subsequently found to be homozygous for a 17 bp deletion in exon 4 of SCARF2. The occurrence of bilateral sclerocornea in our patient together with that of Bedeschi et al., suggests that the full VDEGS phenotype may include sclerocornea resulting from homozygosity or compound heterozygosity for loss of function variants in SCARF2.",
"title": ""
},
{
"docid": "b9546d8f52b19ba99bb9c8f4dc62f2bd",
"text": "One of the main unresolved problems that arise during the data mining process is treating data that contains temporal information. In this case, a complete understanding of the entire phenomenon requires that the data should be viewed as a sequence of events. Temporal sequences appear in a vast range of domains, from engineering, to medicine and finance, and the ability to model and extract information from them is crucial for the advance of the information society. This paper provides a survey on the most significant techniques developed in the past ten years to deal with temporal sequences.",
"title": ""
},
{
"docid": "2085662af2d74d31756674bac9e6a2a7",
"text": "Deep Learning (DL) algorithms have become the de facto choice for data analysis. Several DL implementations – primarily limited to a single compute node – such as Caffe, TensorFlow, Theano and Torch have become readily available. Distributed DL implementations capable of execution on large scale systems are becoming important to address the computational needs of large data produced by scientific simulations and experiments. Yet, the adoption of distributed DL implementations faces significant impediments: 1) most implementations require DL analysts to modify their code significantly – which is a showstopper, 2) several distributed DL implementations are geared towards cloud computing systems – which is inadequate for execution on massively parallel systems such as supercomputers. This work addresses each of these problems. We provide a distributed memory DL implementation by incorporating required changes in the TensorFlow runtime itself. This dramatically reduces the entry barrier for using a distributed TensorFlow implementation. We use Message Passing Interface (MPI) – which provides performance portability, especially since MPI specific changes are abstracted from users. Lastly – and arguably most importantly – we make our implementation available for broader use, under the umbrella of Machine Learning Toolkit for Extreme Scale (MaTEx) at http://hpc.pnl.gov/matex. We refer to our implementation as MaTEx-TensorFlow.",
"title": ""
},
{
"docid": "8840e9e1e304a07724dd6e6779cfc9c4",
"text": "Clustering has become an increasingly important task in modern application domains such as marketing and purchasing assistance, multimedia, molecular biology as well as many others. In most of these areas, the data are originally collected at different sites. In order to extract information from these data, they are merged at a central site and then clustered. In this paper, we propose a different approach. We cluster the data locally and extract suitable representatives from these clusters. These representatives are sent to a global server site where we restore the complete clustering based on the local representatives. This approach is very efficient, because the local clustering can be carried out quickly and independently from each other. Furthermore, we have low transmission cost, as the number of transmitted representatives is much smaller than the cardinality of the complete data set. Based on this small number of representatives, the global clustering can be done very efficiently. For both the local and the global clustering, we use a density based clustering algorithm. The combination of both the local and the global clustering forms our new DBDC (Density Based Distributed Clustering) algorithm. Furthermore, we discuss the complex problem of finding a suitable quality measure for evaluating distributed clusterings. We introduce two quality criteria which are compared to each other and which allow us to evaluate the quality of our DBDC algorithm. In our experimental evaluation, we will show that we do not have to sacrifice clustering quality in order to gain an efficiency advantage when using our distributed clustering approach.",
"title": ""
},
{
"docid": "17fcb38734d6525f2f0fa3ee6c313b43",
"text": "The increasing generation and collection of personal data h as created a complex ecosystem, often collaborative but som etimes combative, around companies and individuals engaging in th e use of these data. We propose that the interactions between these agents warrants a new topic of study: Human-Data Inter action (HDI). In this paper we discuss how HDI sits at the intersection of various disciplines, including computer s cience, statistics, sociology, psychology and behavioura l economics. We expose the challenges that HDI raises, organised into thr ee core themes of legibility, agency and negotiability, and we present the HDI agenda to open up a dialogue amongst interest ed parties in the personal and big data ecosystems.",
"title": ""
},
{
"docid": "72108944c9dfbb4a50da07aea41d22f5",
"text": "This study examined the perception of drug abuse amongst Nigerian undergraduates living off-campus. Students were surveyed at the Lagos State University, Ojo, allowing for a diverse sample that included a large percentage of the students from different faculties and departments. The undergraduate students were surveyed with a structured self-reporting anonymous questionnaire modified and adapted from the WHO student drug survey proforma. Of the 1000 students surveyed, a total of 807 responded to the questionnaire resulting in 80.7% response rate. Majority (77.9%) of the students were aged 19-30 years and unmarried. Six hundred and ninety eight (86.5%) claimed they were aware of drug abuse, but contrarily they demonstrated poor knowledge and awareness. Marijuana, 298 (45.7%) was the most common drug of abuse seen by most of the students. They were unable to identify very well the predisposing factors to drug use and the attending risks. Two hundred and sixty six (33.0%) students were currently taking one or more drugs of abuse. Coffee (43.1%) was the most commonly used drug, followed by alcohol (25.8%) and marijuana (7.4%). Despite chronic use of these drugs (5 years and above), addiction is not a common finding. The study also revealed the poor attitudes of the undergraduates to drug addicts even after rehabilitation. It was therefore concluded that the awareness, knowledge, practices and attitudes of Nigerian undergraduates towards drug abuse is very poor. Considerably more research is needed to develop effective prevention strategy that combines school-based interventions with those affecting the family, social institutions and the larger community.",
"title": ""
},
{
"docid": "1f700c0c55b050db7c760f0c10eab947",
"text": "Cathy O’Neil’s Weapons of Math Destruction is a timely reminder of the power and perils of predictive algorithms and model-driven decision processes. The book deals in some depth with eight case studies of the abuses she associates with WMDs: “weapons of math destruction.” The cases include the havoc wrought by value-added models used to evaluate teacher performance and by the college ranking system introduced by U.S. News and World Report; the collateral damage of online advertising and models devised to track and monetize “eyeballs”; the abuses associated with the recidivism models used in judicial decisions; the inequities perpetrated by the use of personality tests in hiring decisions; the burdens placed on low-wage workers by algorithm-driven attempts to maximize labor efficiency; the injustices written into models that evaluate creditworthiness; the inequities produced by insurance companies’ risk models; and the potential assault on the democratic process by the use of big data in political campaigns. As this summary suggests, O’Neil had plenty of examples to choose from when she wrote the book, but since the publication of Weapons of Math Destruction, two more problems associated with model-driven decision procedures have surfaced, making O’Neil’s work even more essential reading. The first—the role played by fake news, much of it circulated on Facebook, in the 2016 election—has led to congressional investigations. The second—the failure of algorithm-governed oversight to recognize and delete gruesome posts on the Facebook Live streaming service—has caused CEO Mark Zuckerberg to announce the addition of 3,000 human screeners to the Facebook staff. While O’Neil’s book may seem too polemical to some readers and too cautious to others, it speaks forcefully to the cultural moment we share. O’Neil weaves the story of her own credentials and work experience into her analysis, because, as she explains, her training as a mathematician and her experience in finance shaped the way she now understands the world. O’Neil earned a PhD in mathematics from Harvard; taught at Barnard College, where her research area was algebraic number theory; and worked for the hedge fund D. E. Shaw, which uses mathematical analysis to guide investment decisions. When the financial crisis of 2008 revealed that even the most sophisticated models were incapable of anticipating risks associated with “black swans”—events whose rarity make them nearly impossible to predict—O’Neil left the world of corporate finance to join the RiskMetrics Group, where she helped market risk models to financial institutions eager to rehabilitate their image. Ultimately, she became disillusioned with the financial industry’s refusal to take seriously the limitations of risk management models and left RiskMetrics. She rebranded herself a “data scientist” and took a job at Intent Media, where she helped design algorithms that would make big data useful for all kinds of applications. All the while, as O’Neil describes it, she “worried about the separation between technical models and real people, and about the moral repercussions of that separation” (page 48). O’Neil eventually left Intent Media to devote her energies to inWeapons of Math Destruction",
"title": ""
},
{
"docid": "d950407cfcbc5457b299e05c8352107e",
"text": "Pedicle screw instrumentation in AIS has advantages of rigid fixation, improved deformity correction and a shorter fusion, but needs an exacting technique. The author has been using the K-wire method with intraoperative single PA and lateral radiographs, because it is safe, accurate and fast. Pedicle screws are inserted in every segment on the correction side (thoracic concave) and every 2–3 on the supportive side (thoracic convex). After an over-bent rod is inserted on the corrective side, the rod is rotated 90° counterclockwise. This maneuver corrects the coronal and sagittal curves. Then the vertebra is derotated by direct vertebral rotation (DVR) correcting the rotational deformity. The direction of DVR should be opposite to that of the vertebral rotation. A rigid rod has to be used to prevent the rod from straightening out during the rod derotation and DVR. The ideal classification of AIS should address all curve patterns, predicts accurate fusion extent and have good inter/intraobserver reliability. The Suk classification matches the ideal classification is simple and memorable, and has only four structural curve patterns; single thoracic, double thoracic, double major and thoracolumbar/lumbar. Each curve has two types, A and B. When using pedicle screws in thoracic AIS, curves are usually fused from upper neutral to lower neutral vertebra. Identification of the end vertebra and the neutral vertebra is important in deciding the fusion levels and the direction of DVR. In lumbar AIS, fusion is performed from upper neutral vertebra to L3 or L4 depending on its curve types. Rod derotation and DVR using pedicle screw instrumentation give true three dimensional deformity correction in the treatment of AIS. Suk classification with these methods predicts exact fusion extent and is easy to understand and remember.",
"title": ""
},
{
"docid": "feb672a16dd86db24e8d3700cf507bf9",
"text": "In this paper we propose an efficient method to calculate a highquality depth map from a single raw image captured by a light field or plenoptic camera. The proposed model combines the main idea of Active Wavefront Sampling (AWS) with the light field technique, i.e. we extract so-called sub-aperture images out of the raw image of a plenoptic camera, in such a way that the virtual view points are arranged on circles around a fixed center view. By tracking an imaged scene point over a sequence of sub-aperture images corresponding to a common circle, one can observe a virtual rotation of the scene point on the image plane. Our model is able to measure a dense field of these rotations, which are inversely related to the scene depth.",
"title": ""
},
{
"docid": "8996068836559be2b253cd04aeaa285b",
"text": "We present AutonoVi-Sim, a novel high-fidelity simulation platform for autonomous driving data generation and driving strategy testing. AutonoVi-Sim is a collection of high-level extensible modules which allows the rapid development and testing of vehicle configurations and facilitates construction of complex traffic scenarios. Autonovi-Sim supports multiple vehicles with unique steering or acceleration limits, as well as unique tire parameters and dynamics profiles. Engineers can specify the specific vehicle sensor systems and vary time of day and weather conditions to generate robust data and gain insight into how conditions affect the performance of a particular algorithm. In addition, AutonoVi-Sim supports navigation for non-vehicle traffic participants such as cyclists and pedestrians, allowing engineers to specify routes for these actors, or to create scripted scenarios which place the vehicle in dangerous reactive situations. Autonovi-Sim facilitates training of deep-learning algorithms by enabling data export from the vehicle's sensors, including camera data, LIDAR, relative positions of traffic participants, and detection and classification results. Thus, AutonoVi-Sim allows for the rapid prototyping, development and testing of autonomous driving algorithms under varying vehicle, road, traffic, and weather conditions. In this paper, we detail the simulator and provide specific performance and data benchmarks.",
"title": ""
},
{
"docid": "cf0d0d6895a5e5fbe1eb72e82b4d8b4b",
"text": "PURPOSE\nThe purpose of this study was twofold: (a) to determine the prevalence of compassion satisfaction, compassion fatigue, and burnout in emergency department nurses throughout the United States and (b) to examine which demographic and work-related components affect the development of compassion satisfaction, compassion fatigue, and burnout in this nursing specialty.\n\n\nDESIGN AND METHODS\nThis was a nonexperimental, descriptive, and predictive study using a self-administered survey. Survey packets including a demographic questionnaire and the Professional Quality of Life Scale version 5 (ProQOL 5) were mailed to 1,000 selected emergency nurses throughout the United States. The ProQOL 5 scale was used to measure the prevalence of compassion satisfaction, compassion fatigue, and burnout among emergency department nurses. Multiple regression using stepwise solution was employed to determine which variables of demographics and work-related characteristics predicted the prevalence of compassion satisfaction, compassion fatigue, and burnout. The α level was set at .05 for statistical significance.\n\n\nFINDINGS\nThe results revealed overall low to average levels of compassion fatigue and burnout and generally average to high levels of compassion satisfaction among this group of emergency department nurses. The low level of manager support was a significant predictor of higher levels of burnout and compassion fatigue among emergency department nurses, while a high level of manager support contributed to a higher level of compassion satisfaction.\n\n\nCONCLUSIONS\nThe results may serve to help distinguish elements in emergency department nurses' work and life that are related to compassion satisfaction and may identify factors associated with higher levels of compassion fatigue and burnout.\n\n\nCLINICAL RELEVANCE\nImproving recognition and awareness of compassion satisfaction, compassion fatigue, and burnout among emergency department nurses may prevent emotional exhaustion and help identify interventions that will help nurses remain empathetic and compassionate professionals.",
"title": ""
},
{
"docid": "75c5d060d99058585292a77a94e75dba",
"text": "In this paper, the recent progress of synaptic electronics is reviewed. The basics of biological synaptic plasticity and learning are described. The material properties and electrical switching characteristics of a variety of synaptic devices are discussed, with a focus on the use of synaptic devices for neuromorphic or brain-inspired computing. Performance metrics desirable for large-scale implementations of synaptic devices are illustrated. A review of recent work on targeted computing applications with synaptic devices is presented.",
"title": ""
},
{
"docid": "c32a719ac619e7a48adf12fd6a534e7c",
"text": "Using smart devices and apps in clinical trials has great potential: this versatile technology is ubiquitously available, broadly accepted, user friendly and it offers integrated sensors for primary data acquisition and data sending features to allow for a hassle free communication with the study sites. This new approach promises to increase efficiency and to lower costs. This article deals with the ethical and legal demands of using this technology in clinical trials with respect to regulation, informed consent, data protection and liability.",
"title": ""
},
{
"docid": "66fce3b6c516a4fa4281d19d6055b338",
"text": "This paper presents the mechatronic design and experimental validation of a novel powered knee-ankle orthosis for testing torque-driven rehabilitation control strategies. The modular actuator of the orthosis is designed with a torque dense motor and a custom low-ratio transmission (24:1) to provide mechanical transparency to the user, allowing them to actively contribute to their joint kinematics during gait training. The 4.88 kg orthosis utilizes frameless components and light materials, such as aluminum alloy and carbon fiber, to reduce its mass. A human subject experiment demonstrates accurate torque control with high output torque during stance and low backdrive torque during swing at fast walking speeds. This work shows that backdrivability, precise torque control, high torque output, and light weight can be achieved in a powered orthosis without the high cost and complexity of variable transmissions, clutches, and/or series elastic components.",
"title": ""
},
{
"docid": "7997cc6aafd50c7ec559270ff69e5d66",
"text": "Cloud computing adoption and diffusion are threatened by unresolved security issues that affect both the cloud provider and the cloud user. In this paper, we show how virtualization can increase the security of cloud computing, by protecting both the integrity of guest virtual machines and the cloud infrastructure components. In particular, we propose a novel architecture, Advanced Cloud Protection System (ACPS), aimed at guaranteeing increased security to cloud resources. ACPS can be deployed on several cloud solutions and can effectively monitor the integrity of guest and infrastructure components while remaining fully transparent to virtual machines and to cloud users. ACPS can locally react to security breaches as well as notify a further security management layer of such events. A prototype of our ACPS proposal is fully implemented on two current open source solutions: Eucalyptus and OpenECP. The prototype is tested against effectiveness and performance. In particular: (a) effectiveness is shown testing our prototype against attacks known in the literature; (b) performance evaluation of the ACPS prototype is carried out under different types of workload. Results show that our proposal is resilient against attacks and that the introduced overhead is small when compared to the provided",
"title": ""
}
] | scidocsrr |
f9535352b316cfc03772935e7a0af264 | Tour the world: Building a web-scale landmark recognition engine | [
{
"docid": "368a3dd36283257c5573a7e1ab94e930",
"text": "This paper develops the multidimensional binary search tree (or <italic>k</italic>-d tree, where <italic>k</italic> is the dimensionality of the search space) as a data structure for storage of information to be retrieved by associative searches. The <italic>k</italic>-d tree is defined and examples are given. It is shown to be quite efficient in its storage requirements. A significant advantage of this structure is that a single data structure can handle many types of queries very efficiently. Various utility algorithms are developed; their proven average running times in an <italic>n</italic> record file are: insertion, <italic>O</italic>(log <italic>n</italic>); deletion of the root, <italic>O</italic>(<italic>n</italic><supscrpt>(<italic>k</italic>-1)/<italic>k</italic></supscrpt>); deletion of a random node, <italic>O</italic>(log <italic>n</italic>); and optimization (guarantees logarithmic performance of searches), <italic>O</italic>(<italic>n</italic> log <italic>n</italic>). Search algorithms are given for partial match queries with <italic>t</italic> keys specified [proven maximum running time of <italic>O</italic>(<italic>n</italic><supscrpt>(<italic>k</italic>-<italic>t</italic>)/<italic>k</italic></supscrpt>)] and for nearest neighbor queries [empirically observed average running time of <italic>O</italic>(log <italic>n</italic>).] These performances far surpass the best currently known algorithms for these tasks. An algorithm is presented to handle any general intersection query. The main focus of this paper is theoretical. It is felt, however, that <italic>k</italic>-d trees could be quite useful in many applications, and examples of potential uses are given.",
"title": ""
}
] | [
{
"docid": "2e0b2bc23117bbe8d41f400761410638",
"text": "Free radicals and other reactive species (RS) are thought to play an important role in many human diseases. Establishing their precise role requires the ability to measure them and the oxidative damage that they cause. This article first reviews what is meant by the terms free radical, RS, antioxidant, oxidative damage and oxidative stress. It then critically examines methods used to trap RS, including spin trapping and aromatic hydroxylation, with a particular emphasis on those methods applicable to human studies. Methods used to measure oxidative damage to DNA, lipids and proteins and methods used to detect RS in cell culture, especially the various fluorescent \"probes\" of RS, are also critically reviewed. The emphasis throughout is on the caution that is needed in applying these methods in view of possible errors and artifacts in interpreting the results.",
"title": ""
},
{
"docid": "5387c752db7b4335a125df91372099b3",
"text": "We examine how people’s different uses of the Internet predict their later scores on a standard measure of depression, and how their existing social resources moderate these effects. In a longitudinal US survey conducted in 2001 and 2002, almost all respondents reported using the Internet for information, and entertainment and escape; these uses of the Internet had no impact on changes in respondents’ level of depression. Almost all respondents also used the Internet for communicating with friends and family, and they showed lower depression scores six months later. Only about 20 percent of this sample reported using the Internet to meet new people and talk in online groups. Doing so changed their depression scores depending on their initial levels of social support. Those having high or medium levels of social support showed higher depression scores; those with low levels of social support did not experience these increases in depression. Our results suggest that individual differences in social resources and people’s choices of how they use the Internet may account for the different outcomes reported in the literature.",
"title": ""
},
{
"docid": "41dfc6647b8937b161c00a1372e986c2",
"text": "Deep unsupervised learning in stochastic recurrent neural networks with many layers of hidden units is a recent breakthrough in neural computation research. These networks build a hierarchy of progressively more complex distributed representations of the sensory data by fitting a hierarchical generative model. In this article we discuss the theoretical foundations of this approach and we review key issues related to training, testing and analysis of deep networks for modeling language and cognitive processing. The classic letter and word perception problem of McClelland and Rumelhart (1981) is used as a tutorial example to illustrate how structured and abstract representations may emerge from deep generative learning. We argue that the focus on deep architectures and generative (rather than discriminative) learning represents a crucial step forward for the connectionist modeling enterprise, because it offers a more plausible model of cortical learning as well as a way to bridge the gap between emergentist connectionist models and structured Bayesian models of cognition.",
"title": ""
},
{
"docid": "a1b7f74caf4daea70c06dbb04646b769",
"text": "Estimating the 6-DoF pose of a camera from a single image relative to a pre-computed 3D point-set is an important task for many computer vision applications. Perspective-n-Point (PnP) solvers are routinely used for camera pose estimation, provided that a good quality set of 2D-3D feature correspondences are known beforehand. However, finding optimal correspondences between 2D key-points and a 3D point-set is non-trivial, especially when only geometric (position) information is known. Existing approaches to the simultaneous pose and correspondence problem use local optimisation, and are therefore unlikely to find the optimal solution without a good pose initialisation, or introduce restrictive assumptions. Since a large proportion of outliers are common for this problem, we instead propose a globally-optimal inlier set cardinality maximisation approach which jointly estimates optimal camera pose and optimal correspondences. Our approach employs branch-and-bound to search the 6D space of camera poses, guaranteeing global optimality without requiring a pose prior. The geometry of SE(3) is used to find novel upper and lower bounds for the number of inliers and local optimisation is integrated to accelerate convergence. The evaluation empirically suppons the optimality proof and shows that the method performs much more robustly than existing approaches, including on a large-scale outdoor data-set.",
"title": ""
},
{
"docid": "9c562763cac968ce38359635d1826ff9",
"text": "This paper proposes a novel multi-layered gesture recognition method with Kinect. We explore the essential linguistic characters of gestures: the components concurrent character and the sequential organization character, in a multi-layered framework, which extracts features from both the segmented semantic units and the whole gesture sequence and then sequentially classifies the motion, location and shape components. In the first layer, an improved principle motion is applied to model the motion component. In the second layer, a particle-based descriptor and a weighted dynamic time warping are proposed for the location component classification. In the last layer, the spatial path warping is further proposed to classify the shape component represented by unclosed shape context. The proposed method can obtain relatively high performance for one-shot learning gesture recognition on the ChaLearn Gesture Dataset comprising more than 50, 000 gesture sequences recorded with Kinect.",
"title": ""
},
{
"docid": "fc6e5b83900d87fd5d6eec6d84d47939",
"text": "In this letter, we propose a low complexity linear precoding scheme for downlink multiuser MIMO precoding systems where there is no limit on the number of multiple antennas employed at both the base station and the users. In the proposed algorithm, we can achieve the precoder in two steps. In the first step, we balance the multiuser interference (MUI) and noise by carrying out a novel channel extension approach. In the second step, we further optimize the system performance assuming parallel SU MIMO channels. Simulation results show that the proposed algorithm can achieve elaborate performance while offering lower computational complexity.",
"title": ""
},
{
"docid": "d50b6e7c130080eba98bf4437c333f16",
"text": "In this paper we provide a brief review of how out-of-sample methods can be used to construct tests that evaluate a time-series model's ability to predict. We focus on the role that parameter estimation plays in constructing asymptotically valid tests of predictive ability. We illustrate why forecasts and forecast errors that depend upon estimated parameters may have statistical properties that differ from those of their population counterparts. We explain how to conduct asymptotic inference, taking due account of dependence on estimated parameters.",
"title": ""
},
{
"docid": "84ce7f45282ac6f17d57ddd6898d8695",
"text": "OBJECTIVE\nThe purpose of this case series was to retrospectively examine records of cases with uterine rupture in pregnancies following myomectomy and to describe the clinical features and pregnancy outcomes.\n\n\nMETHODS\nThis study was conducted as a multicenter case series. The patient databases at 7 tertiary hospitals were queried. Records of patients with a diagnosis of uterine rupture in the pregnancy following myomectomy between January 2012 and December 2014 were retrospectively collected. The uterine rupture cases enrolled in this study were defined as follows: through-and-through uterine rupture or tear of the uterine muscle and serosa, occurrence from 24+0 to 41+6 weeks' gestation, singleton pregnancy, and previous laparoscopic myomectomy (LSM) or laparotomic myomectomy (LTM) status.\n\n\nRESULTS\nFourteen pregnant women experienced uterine rupture during their pregnancy after LSM or LTM. Preterm delivery of less than 34 weeks' gestation occurred in 5 cases, while intrauterine fetal death occurred in 3, and 3 cases had fetal distress. Of the 14 uterine rupture cases, none occurred during labor. All mothers survived and had no sequelae, unlike the perinatal outcomes, although they were receiving blood transfusion or treatment for uterine artery embolization because of uterine atony or massive hemorrhage.\n\n\nCONCLUSION\nIn women of childbearing age who are scheduled to undergo LTM or LSM, the potential risk of uterine rupture on subsequent pregnancy should be explained before surgery. Pregnancy in women after myomectomy should be carefully observed, and they should be adequately counseled during this period.",
"title": ""
},
{
"docid": "8b70670fa152dbd5185e80136983ff12",
"text": "This letter proposes a novel converter topology that interfaces three power ports: a source, a bidirectional storage port, and an isolated load port. The proposed converter is based on a modified version of the isolated half-bridge converter topology that utilizes three basic modes of operation within a constant-frequency switching cycle to provide two independent control variables. This allows tight control over two of the converter ports, while the third port provides the power balance in the system. The switching sequence ensures a clamping path for the energy of the leakage inductance of the transformer at all times. This energy is further utilized to achieve zero-voltage switching for all primary switches for a wide range of source and load conditions. Basic steady-state analysis of the proposed converter is included, together with a suggested structure for feedback control. Key experimental results are presented that validate the converter operation and confirm its ability to achieve tight independent control over two power processing paths. This topology promises significant savings in component count and losses for power-harvesting systems. The proposed topology and control is particularly relevant to battery-backed power systems sourced by solar or fuel cells",
"title": ""
},
{
"docid": "339aa2d53be2cf1215caa142ad5c58d2",
"text": "A true random number generator (TRNG) is an important component in cryptographic systems. Designing a fast and secure TRNG in an FPGA is a challenging task. In this paper we analyze the TRNG designed by Sunar et al. based on XOR of the outputs of many oscillator rings. We propose an enhanced TRNG that does not require post-processing to pass statistical tests and with better randomness characteristics on the output. We have shown by experiment that the frequencies of the equal length oscillator rings in the TRNG are not identical but different due to the placement of the inverters in the FPGA. We have implemented our proposed TRNG in an Altera Cyclone II FPGA. Our implementation has passed the NIST and DIEHARD statistical tests with a throughput of 100 Mbps and with a usage of less than 100 logic elements in the FPGA.",
"title": ""
},
{
"docid": "dcf24411ffed0d5bf2709e005f6db753",
"text": "Dynamic Causal Modelling (DCM) is an approach first introduced for the analysis of functional magnetic resonance imaging (fMRI) to quantify effective connectivity between brain areas. Recently, this framework has been extended and established in the magneto/encephalography (M/EEG) domain. DCM for M/EEG entails the inversion a full spatiotemporal model of evoked responses, over multiple conditions. This model rests on a biophysical and neurobiological generative model for electrophysiological data. A generative model is a prescription of how data are generated. The inversion of a DCM provides conditional densities on the model parameters and, indeed on the model itself. These densities enable one to answer key questions about the underlying system. A DCM comprises two parts; one part describes the dynamics within and among neuronal sources, and the second describes how source dynamics generate data in the sensors, using the lead-field. The parameters of this spatiotemporal model are estimated using a single (iterative) Bayesian procedure. In this paper, we will motivate and describe the current DCM framework. Two examples show how the approach can be applied to M/EEG experiments.",
"title": ""
},
{
"docid": "225e7b608d06d218144853b900d40fd1",
"text": "Deep neural networks require a large amount of labeled training data during supervised learning. However, collecting and labeling so much data might be infeasible in many cases. In this paper, we introduce a deep transfer learning scheme, called selective joint fine-tuning, for improving the performance of deep learning tasks with insufficient training data. In this scheme, a target learning task with insufficient training data is carried out simultaneously with another source learning task with abundant training data. However, the source learning task does not use all existing training data. Our core idea is to identify and use a subset of training images from the original source learning task whose low-level characteristics are similar to those from the target learning task, and jointly fine-tune shared convolutional layers for both tasks. Specifically, we compute descriptors from linear or nonlinear filter bank responses on training images from both tasks, and use such descriptors to search for a desired subset of training samples for the source learning task. Experiments demonstrate that our deep transfer learning scheme achieves state-of-the-art performance on multiple visual classification tasks with insufficient training data for deep learning. Such tasks include Caltech 256, MIT Indoor 67, and fine-grained classification problems (Oxford Flowers 102 and Stanford Dogs 120). In comparison to fine-tuning without a source domain, the proposed method can improve the classification accuracy by 2% - 10% using a single model. Codes and models are available at https://github.com/ZYYSzj/Selective-Joint-Fine-tuning.",
"title": ""
},
{
"docid": "fc8976f3cf91f104b1ebed1698f152b8",
"text": "In this paper we address the problem of predicting SPARQL query performance. We use machine learning techniques to learn SPARQL query performance from previously executed queries. Traditional approaches for estimating SPARQL query cost are based on statistics about the underlying data. However, in many use-cases involving querying Linked Data, statistics about the underlying data are often missing. Our approach does not require any statistics about the underlying RDF data, which makes it ideal for the Linked Data scenario. We show how to model SPARQL queries as feature vectors, and use k-nearest neighbors regression and Support Vector Machine with the nu-SVR kernel to accurately predict SPARQL query execution time.",
"title": ""
},
{
"docid": "0406af2f32a077be7eb2c3e1db8715bd",
"text": "The task of Named Entity Linking is to link entity mentions in the document to their correct entries in a knowledge base and to cluster NIL mentions. Ambiguous, misspelled, and incomplete entity mention names are the main challenges in the linking process. We propose a novel approach that combines two state-of-the-art models — for entity disambiguation and for paraphrase detection — to overcome these challenges. We consider name variations as paraphrases of the same entity mention and adopt a paraphrase model for this task. Our approach utilizes a graph-based disambiguation model based on Personalized Page Rank, and then refines and clusters its output using the paraphrase similarity between entity mention strings. It achieves a competitive performance of 80.5% in B+F clustering score on diagnostic TAC EDL 2014 data.",
"title": ""
},
{
"docid": "8348a89e74707b8e42beb7589e2603b2",
"text": "Skin-lightening agents such as kojic acid, arbutin, ellagic acid, lucinol and 5,5′-dipropylbiphenyl-2,2′-diol are used in ‘anti-ageing’ cosmetics. Cases of allergic contact dermatitis caused by these skin-lightening agents have been reported (1, 2). Vitamin C and its derivatives have also been used in cosmetics as skin-lightening agents for a long time. Vitamin C in topical agents is poorly absorbed through the skin, and is easily oxidized after percutaneous absorption. Recently, ascorbic acid derivatives have been developed with enhanced properties. The ascorbic acid derivative 3-o-ethyl-l-ascorbic acid (CAS no. 86404-048, molecular weight 204.18; Fig. 1), also known as vitamin C ethyl, is chemically stable and is more easily absorbed through the skin than the other vitamin C derivatives. Moreover, 3-o-ethyl-l-ascorbic acid has skinlightening properties. Here, we report a case of allergic contact dermatitis caused by a skin-lightening lotion containing 3-o-ethyl-l-ascorbic acid.",
"title": ""
},
{
"docid": "d52f8428afcef8b7f612f78dd0bf0841",
"text": "We address the problem of activity detection in continuous, untrimmed video streams. This is a difficult task that requires extracting meaningful spatio-temporal features to capture activities, accurately localizing the start and end times of each activity. We introduce a new model, Region Convolutional 3D Network (R-C3D), which encodes the video streams using a three-dimensional fully convolutional network, then generates candidate temporal regions containing activities, and finally classifies selected regions into specific activities. Computation is saved due to the sharing of convolutional features between the proposal and the classification pipelines. The entire model is trained end-to-end with jointly optimized localization and classification losses. R-C3D is faster than existing methods (569 frames per second on a single Titan X Maxwell GPU) and achieves state-of-the-art results on THUMOS’14. We further demonstrate that our model is a general activity detection framework that does not rely on assumptions about particular dataset properties by evaluating our approach on ActivityNet and Charades. Our code is available at http://ai.bu.edu/r-c3d/",
"title": ""
},
{
"docid": "7ebbb9ebc94c72997895b4141de6f67a",
"text": "Purpose – The purpose of this paper is to highlight the potential role that the so-called “toxic triangle” (Padilla et al., 2007) can play in undermining the processes around effectiveness. It is the interaction between leaders, organisational members, and the environmental context in which those interactions occur that has the potential to generate dysfunctional behaviours and processes. The paper seeks to set out a set of issues that would seem to be worthy of further consideration within the Journal and which deal with the relationships between organisational effectiveness and the threats from insiders. Design/methodology/approach – The paper adopts a systems approach to the threats from insiders and the manner in which it impacts on organisation effectiveness. The ultimate goal of the paper is to stimulate further debate and discussion around the issues. Findings – The paper adds to the discussions around effectiveness by highlighting how senior managers can create the conditions in which failure can occur through the erosion of controls, poor decision making, and the creation of a culture that has the potential to generate failure. Within this setting, insiders can serve to trigger a series of failures by their actions and for which the controls in place are either ineffective or have been by-passed as a result of insider knowledge. Research limitations/implications – The issues raised in this paper need to be tested empirically as a means of providing a clear evidence base in support of their relationships with the generation of organisational ineffectiveness. Practical implications – The paper aims to raise awareness and stimulate thinking by practising managers around the role that the “toxic triangle” of issues can play in creating the conditions by which organisations can incubate the potential for crisis. Originality/value – The paper seeks to bring together a disparate body of published work within the context of “organisational effectiveness” and sets out a series of dark characteristics that organisations need to consider if they are to avoid failure. The paper argues the case that effectiveness can be a fragile construct and that the mechanisms that generate failure also need to be actively considered when discussing what effectiveness means in practice.",
"title": ""
},
{
"docid": "971692db73441f7c68a0cc32927ae0b2",
"text": "This letter presents a new lattice-form complex adaptive IIR notch filter to estimate and track the frequency of a complex sinusoid signal. The IIR filter is a cascade of a direct-form all-pole prefilter and an adaptive lattice-form all-zero filter. A complex domain exponentially weighted recursive least square algorithm is adopted instead of the widely used least mean square algorithm to increase the convergence rate. The convergence property of this algorithm is investigated, and an expression for the steady-state asymptotic bias is derived. Analysis results indicate that the frequency estimate for a single complex sinusoid is unbiased. Simulation results demonstrate that the proposed method achieves faster convergence and better tracking performance than all traditional algorithms.",
"title": ""
},
{
"docid": "f005ebceeac067ffae197fee603ed8c7",
"text": "The extended Kalman filter (EKF) is one of the most widely used methods for state estimation with communication and aerospace applications based on its apparent simplicity and tractability (Shi et al., 2002; Bolognani et al., 2003; Wu et al., 2004). However, for an EKF to guarantee satisfactory performance, the system model should be known exactly. Unknown external disturbances may result in the inaccuracy of the state estimate, even cause divergence. This difficulty has been recognized in the literature (Reif & Unbehauen, 1999; Reif et al., 2000), and several schemes have been developed to overcome it. A traditional approach to improve the performance of the filter is the 'covariance setting' technique, where a positive definite estimation error covariance matrix is chosen by the filter designer (Einicke et al., 2003; Bolognani et al., 2003). As it is difficult to manually tune the covariance matrix for dynamic system, adaptive extended Kalman filter (AEKF) approaches for online estimation of the covariance matrix have been adopted (Kim & ILTIS, 2004; Yu et al., 2005; Ahn & Won, 2006). However, only in some special cases, the optimal estimation of the covariance matrix can be obtained. And inaccurate approximation of the covariance matrix may blur the state estimate. Recently, the robust H∞ filter has received considerable attention (Theodor et al., 1994; Shen & Deng, 1999; Zhang et al., 2005; Tseng & Chen, 2001). The robust filters take different forms depending on what kind of disturbances are accounted for, while the general performance criterion of the filters is to guarantee a bounded energy gain from the worst possible disturbance to the estimation error. Although the robust extended Kalman filter (REKF) has been deeply investigated (Einicke & White, 1999; Reif et al., 1999; Seo et al., 2006), how to prescribe the level of disturbances attenuation is still an open problem. In general, the selection of the attenuation level can be seen as a tradeoff between the optimality and the robustness. In other words, the robustness of the REKF is obtained at the expense of optimality. This chapter reviews the adaptive robust extended Kalman filter (AREKF), an effective algorithm which will remain stable in the presence of unknown disturbances, and yield accurate estimates in the absence of disturbances (Xiong et al., 2008). The key idea of the AREKF is to design the estimator based on the stability analysis, and determine whether the error covariance matrix should be reset according to the magnitude of the innovation. O pe n A cc es s D at ab as e w w w .in te ch w eb .o rg",
"title": ""
},
{
"docid": "a5391753b4ac2b7cab9f58f28348ab8d",
"text": "We present a temporal map of key processes that occur during decision making, which consists of three stages: 1) formation of preferences among options, 2) selection and execution of an action, and 3) experience or evaluation of an outcome. This framework can be used to integrate findings of traditional choice psychology, neuropsychology, brain lesion studies, and functional neuroimaging. Decision making is distributed across various brain centers, which are differentially active across these stages of decision making. This approach can be used to follow developmental trajectories of the different stages of decision making and to identify unique deficits associated with distinct psychiatric disorders.",
"title": ""
}
] | scidocsrr |
e712a6a8962386e24801f52412fdce61 | Quantifying the relation between performance and success in soccer | [
{
"docid": "b88ceafe9998671820291773be77cabc",
"text": "The aim of this study was to propose a set of network methods to measure the specific properties of a team. These metrics were organised at macro-analysis levels. The interactions between teammates were collected and then processed following the analysis levels herein announced. Overall, 577 offensive plays were analysed from five matches. The network density showed an ambiguous relationship among the team, mainly during the 2nd half. The mean values of density for all matches were 0.48 in the 1st half, 0.32 in the 2nd half and 0.34 for the whole match. The heterogeneity coefficient for the overall matches rounded to 0.47 and it was also observed that this increased in all matches in the 2nd half. The centralisation values showed that there was no 'star topology'. The results suggest that each node (i.e., each player) had nearly the same connectivity, mainly in the 1st half. Nevertheless, the values increased in the 2nd half, showing a decreasing participation of all players at the same level. Briefly, these metrics showed that it is possible to identify how players connect with each other and the kind and strength of the connections between them. In summary, it may be concluded that network metrics can be a powerful tool to help coaches understand team's specific properties and support decision-making to improve the sports training process based on match analysis.",
"title": ""
},
{
"docid": "6325188ee21b6baf65dbce6855c19bc2",
"text": "A knowledgeable observer of a game of football (soccer) can make a subjective evaluation of the quality of passes made between players during the game, such as rating them as Good, OK, or Bad. In this article, we consider the problem of producing an automated system to make the same evaluation of passes and present a model to solve this problem.\n Recently, many professional football leagues have installed object tracking systems in their stadiums that generate high-resolution and high-frequency spatiotemporal trajectories of the players and the ball. Beginning with the thesis that much of the information required to make the pass ratings is available in the trajectory signal, we further postulated that using complex data structures derived from computational geometry would enable domain football knowledge to be included in the model by computing metric variables in a principled and efficient manner. We designed a model that computes a vector of predictor variables for each pass made and uses machine learning techniques to determine a classification function that can accurately rate passes based only on the predictor variable vector.\n Experimental results show that the learned classification functions can rate passes with 90.2% accuracy. The agreement between the classifier ratings and the ratings made by a human observer is comparable to the agreement between the ratings made by human observers, and suggests that significantly higher accuracy is unlikely to be achieved. Furthermore, we show that the predictor variables computed using methods from computational geometry are among the most important to the learned classifiers.",
"title": ""
}
] | [
{
"docid": "c6e14529a55b0e6da44dd0966896421a",
"text": "Context-based pairing solutions increase the usability of IoT device pairing by eliminating any human involvement in the pairing process. This is possible by utilizing on-board sensors (with same sensing modalities) to capture a common physical context (e.g., ambient sound via each device's microphone). However, in a smart home scenario, it is impractical to assume that all devices will share a common sensing modality. For example, a motion detector is only equipped with an infrared sensor while Amazon Echo only has microphones. In this paper, we develop a new context-based pairing mechanism called Perceptio that uses time as the common factor across differing sensor types. By focusing on the event timing, rather than the specific event sensor data, Perceptio creates event fingerprints that can be matched across a variety of IoT devices. We propose Perceptio based on the idea that devices co-located within a physically secure boundary (e.g., single family house) can observe more events in common over time, as opposed to devices outside. Devices make use of the observed contextual information to provide entropy for Perceptio's pairing protocol. We design and implement Perceptio, and evaluate its effectiveness as an autonomous secure pairing solution. Our implementation demonstrates the ability to sufficiently distinguish between legitimate devices (placed within the boundary) and attacker devices (placed outside) by imposing a threshold on fingerprint similarity. Perceptio demonstrates an average fingerprint similarity of 94.9% between legitimate devices while even a hypothetical impossibly well-performing attacker yields only 68.9% between itself and a valid device.",
"title": ""
},
{
"docid": "b269bb721ca2a75fd6291295493b7af8",
"text": "This publication contains reprint articles for which IEEE does not hold copyright. Full text is not available on IEEE Xplore for these articles.",
"title": ""
},
{
"docid": "581f8909adca17194df618cc951749cd",
"text": "In this paper the problem of emotion recognition using physiological signals is presented. Firstly the problems with acquisition of physiological signals related to specific human emotions are described. It is not a trivial problem to elicit real emotions and to choose stimuli that always, and for all people, elicit the same emotion. Also different kinds of physiological signals for emotion recognition are considered. A set of the most helpful biosignals is chosen. An experiment is described that was performed in order to verify the possibility of eliciting real emotions using specially prepared multimedia presentations, as well as finding physiological signals that are most correlated with human emotions. The experiment was useful for detecting and identifying many problems and helping to find their solutions. The results of this research can be used for creation of affect-aware applications, for instance video games, that will be able to react to user's emotions.",
"title": ""
},
{
"docid": "2603c07864b92c6723b40c83d3c216b9",
"text": "Background: A study was undertaken to record exacerbations and health resource use in patients with COPD during 6 months of treatment with tiotropium, salmeterol, or matching placebos. Methods: Patients with COPD were enrolled in two 6-month randomised, placebo controlled, double blind, double dummy studies of tiotropium 18 μg once daily via HandiHaler or salmeterol 50 μg twice daily via a metered dose inhaler. The two trials were combined for analysis of heath outcomes consisting of exacerbations, health resource use, dyspnoea (assessed by the transitional dyspnoea index, TDI), health related quality of life (assessed by St George’s Respiratory Questionnaire, SGRQ), and spirometry. Results: 1207 patients participated in the study (tiotropium 402, salmeterol 405, placebo 400). Compared with placebo, tiotropium but not salmeterol was associated with a significant delay in the time to onset of the first exacerbation. Fewer COPD exacerbations/patient year occurred in the tiotropium group (1.07) than in the placebo group (1.49, p<0.05); the salmeterol group (1.23 events/year) did not differ from placebo. The tiotropium group had 0.10 hospital admissions per patient year for COPD exacerbations compared with 0.17 for salmeterol and 0.15 for placebo (not statistically different). For all causes (respiratory and non-respiratory) tiotropium, but not salmeterol, was associated with fewer hospital admissions while both groups had fewer days in hospital than the placebo group. The number of days during which patients were unable to perform their usual daily activities was lowest in the tiotropium group (tiotropium 8.3 (0.8), salmeterol 11.1 (0.8), placebo 10.9 (0.8), p<0.05). SGRQ total score improved by 4.2 (0.7), 2.8 (0.7) and 1.5 (0.7) units during the 6 month trial for the tiotropium, salmeterol and placebo groups, respectively (p<0.01 tiotropium v placebo). Compared with placebo, TDI focal score improved in both the tiotropium group (1.1 (0.3) units, p<0.001) and the salmeterol group (0.7 (0.3) units, p<0.05). Evaluation of morning pre-dose FEV1, peak FEV1 and mean FEV1 (0–3 hours) showed that tiotropium was superior to salmeterol while both active drugs were more effective than placebo. Conclusions: Exacerbations of COPD and health resource usage were positively affected by daily treatment with tiotropium. With the exception of the number of hospital days associated with all causes, salmeterol twice daily resulted in no significant changes compared with placebo. Tiotropium also improved health related quality of life, dyspnoea, and lung function in patients with COPD.",
"title": ""
},
{
"docid": "155e53e97c23498a557f848ef52da2a7",
"text": "We propose a simultaneous extraction method for 12 organs from non-contrast three-dimensional abdominal CT images. The proposed method uses an abdominal cavity standardization process and atlas guided segmentation incorporating parameter estimation with the EM algorithm to deal with the large fluctuations in the feature distribution parameters between subjects. Segmentation is then performed using multiple level sets, which minimize the energy function that considers the hierarchy and exclusiveness between organs as well as uniformity of grey values in organs. To assess the performance of the proposed method, ten non-contrast 3D CT volumes were used. The accuracy of the feature distribution parameter estimation was slightly improved using the proposed EM method, resulting in better performance of the segmentation process. Nine organs out of twelve were statistically improved compared with the results without the proposed parameter estimation process. The proposed multiple level sets also boosted the performance of the segmentation by 7.2 points on average compared with the atlas guided segmentation. Nine out of twelve organs were confirmed to be statistically improved compared with the atlas guided method. The proposed method was statistically proved to have better performance in the segmentation of 3D CT volumes.",
"title": ""
},
{
"docid": "5ea45a4376e228b3eacebb8dd8e290d2",
"text": "The sharing economy has quickly become a very prominent subject of research in the broader computing literature and the in human--computer interaction (HCI) literature more specifically. When other computing research areas have experienced similarly rapid growth (e.g. human computation, eco-feedback technology), early stage literature reviews have proved useful and influential by identifying trends and gaps in the literature of interest and by providing key directions for short- and long-term future work. In this paper, we seek to provide the same benefits with respect to computing research on the sharing economy. Specifically, following the suggested approach of prior computing literature reviews, we conducted a systematic review of sharing economy articles published in the Association for Computing Machinery Digital Library to investigate the state of sharing economy research in computing. We performed this review with two simultaneous foci: a broad focus toward the computing literature more generally and a narrow focus specifically on HCI literature. We collected a total of 112 sharing economy articles published between 2008 and 2017 and through our analysis of these papers, we make two core contributions: (1) an understanding of the computing community's contributions to our knowledge about the sharing economy, and specifically the role of the HCI community in these contributions (i.e.what has been done) and (2) a discussion of under-explored and unexplored aspects of the sharing economy that can serve as a partial research agenda moving forward (i.e.what is next to do).",
"title": ""
},
{
"docid": "8d40b29088a331578e502abb2148ea8c",
"text": "Governments are increasingly realizing the importance of utilizing Information and Communication Technologies (ICT) as a tool to better address user’s/citizen’s needs. As citizen’s expectations grow, governments need to deliver services of high quality level to motivate more users to utilize these available e-services. In spite of this, governments still fall short in their service quality level offered to citizens/users. Thus understanding and measuring service quality factors become crucial as the number of services offered is increasing while not realizing what citizens/users really look for when they utilize these services. The study presents an extensive literature review on approaches used to evaluate e-government services throughout a phase of time. The study also suggested those quality/factors indicators government’s need to invest in of high priority in order to meet current and future citizen’s expectations of service quality.",
"title": ""
},
{
"docid": "00946bbfab7cd0ab0d51875b944bca66",
"text": "We introduce RelNet: a new model for relational reasoning. RelNet is a memory augmented neural network which models entities as abstract memory slots and is equipped with an additional relational memory which models relations between all memory pairs. The model thus builds an abstract knowledge graph on the entities and relations present in a document which can then be used to answer questions about the document. It is trained end-to-end: only supervision to the model is in the form of correct answers to the questions. We test the model on the 20 bAbI question-answering tasks with 10k examples per task and find that it solves all the tasks with a mean error of 0.3%, achieving 0% error on 11 of the 20 tasks.",
"title": ""
},
{
"docid": "56e1778df9d5b6fa36cbf4caae710e67",
"text": "The Levenberg-Marquardt method is a standard technique used to solve nonlinear least squares problems. Least squares problems arise when fitting a parameterized function to a set of measured data points by minimizing the sum of the squares of the errors between the data points and the function. Nonlinear least squares problems arise when the function is not linear in the parameters. Nonlinear least squares methods involve an iterative improvement to parameter values in order to reduce the sum of the squares of the errors between the function and the measured data points. The Levenberg-Marquardt curve-fitting method is actually a combination of two minimization methods: the gradient descent method and the Gauss-Newton method. In the gradient descent method, the sum of the squared errors is reduced by updating the parameters in the direction of the greatest reduction of the least squares objective. In the Gauss-Newton method, the sum of the squared errors is reduced by assuming the least squares function is locally quadratic, and finding the minimum of the quadratic. The Levenberg-Marquardt method acts more like a gradient-descent method when the parameters are far from their optimal value, and acts more like the Gauss-Newton method when the parameters are close to their optimal value. This document describes these methods and illustrates the use of software to solve nonlinear least squares curve-fitting problems.",
"title": ""
},
{
"docid": "735cc7f7b067175705cb605affd7f06e",
"text": "This paper presents a design, simulation, implementation and measurement of a novel microstrip meander patch antenna for the application of sensor networks. The dimension of the microstrip chip antenna is 15 mm times 15 mm times 2 mm. The meander-type radiating patch is constructed on the upper layer of the 2 mm height substrate with 0.0 5 mm height metallic conduct lines. Because of using the very high relative permittivity substrate ( epsivr=90), the proposed antenna achieves 315 MHz band operations.",
"title": ""
},
{
"docid": "43b76baccb237dd36dddfac5854414b8",
"text": "PISCES is a public server for culling sets of protein sequences from the Protein Data Bank (PDB) by sequence identity and structural quality criteria. PISCES can provide lists culled from the entire PDB or from lists of PDB entries or chains provided by the user. The sequence identities are obtained from PSI-BLAST alignments with position-specific substitution matrices derived from the non-redundant protein sequence database. PISCES therefore provides better lists than servers that use BLAST, which is unable to identify many relationships below 40% sequence identity and often overestimates sequence identity by aligning only well-conserved fragments. PDB sequences are updated weekly. PISCES can also cull non-PDB sequences provided by the user as a list of GenBank identifiers, a FASTA format file, or BLAST/PSI-BLAST output.",
"title": ""
},
{
"docid": "a692778b7f619de5ad4bc3b2d627c265",
"text": "Many students are being left behind by an educational system that some people believe is in crisis. Improving educational outcomes will require efforts on many fronts, but a central premise of this monograph is that one part of a solution involves helping students to better regulate their learning through the use of effective learning techniques. Fortunately, cognitive and educational psychologists have been developing and evaluating easy-to-use learning techniques that could help students achieve their learning goals. In this monograph, we discuss 10 learning techniques in detail and offer recommendations about their relative utility. We selected techniques that were expected to be relatively easy to use and hence could be adopted by many students. Also, some techniques (e.g., highlighting and rereading) were selected because students report relying heavily on them, which makes it especially important to examine how well they work. The techniques include elaborative interrogation, self-explanation, summarization, highlighting (or underlining), the keyword mnemonic, imagery use for text learning, rereading, practice testing, distributed practice, and interleaved practice. To offer recommendations about the relative utility of these techniques, we evaluated whether their benefits generalize across four categories of variables: learning conditions, student characteristics, materials, and criterion tasks. Learning conditions include aspects of the learning environment in which the technique is implemented, such as whether a student studies alone or with a group. Student characteristics include variables such as age, ability, and level of prior knowledge. Materials vary from simple concepts to mathematical problems to complicated science texts. Criterion tasks include different outcome measures that are relevant to student achievement, such as those tapping memory, problem solving, and comprehension. We attempted to provide thorough reviews for each technique, so this monograph is rather lengthy. However, we also wrote the monograph in a modular fashion, so it is easy to use. In particular, each review is divided into the following sections: General description of the technique and why it should work How general are the effects of this technique? 2a. Learning conditions 2b. Student characteristics 2c. Materials 2d. Criterion tasks Effects in representative educational contexts Issues for implementation Overall assessment The review for each technique can be read independently of the others, and particular variables of interest can be easily compared across techniques. To foreshadow our final recommendations, the techniques vary widely with respect to their generalizability and promise for improving student learning. Practice testing and distributed practice received high utility assessments because they benefit learners of different ages and abilities and have been shown to boost students' performance across many criterion tasks and even in educational contexts. Elaborative interrogation, self-explanation, and interleaved practice received moderate utility assessments. The benefits of these techniques do generalize across some variables, yet despite their promise, they fell short of a high utility assessment because the evidence for their efficacy is limited. For instance, elaborative interrogation and self-explanation have not been adequately evaluated in educational contexts, and the benefits of interleaving have just begun to be systematically explored, so the ultimate effectiveness of these techniques is currently unknown. Nevertheless, the techniques that received moderate-utility ratings show enough promise for us to recommend their use in appropriate situations, which we describe in detail within the review of each technique. Five techniques received a low utility assessment: summarization, highlighting, the keyword mnemonic, imagery use for text learning, and rereading. These techniques were rated as low utility for numerous reasons. Summarization and imagery use for text learning have been shown to help some students on some criterion tasks, yet the conditions under which these techniques produce benefits are limited, and much research is still needed to fully explore their overall effectiveness. The keyword mnemonic is difficult to implement in some contexts, and it appears to benefit students for a limited number of materials and for short retention intervals. Most students report rereading and highlighting, yet these techniques do not consistently boost students' performance, so other techniques should be used in their place (e.g., practice testing instead of rereading). Our hope is that this monograph will foster improvements in student learning, not only by showcasing which learning techniques are likely to have the most generalizable effects but also by encouraging researchers to continue investigating the most promising techniques. Accordingly, in our closing remarks, we discuss some issues for how these techniques could be implemented by teachers and students, and we highlight directions for future research.",
"title": ""
},
{
"docid": "7a12529d179d9ca6b94dbac57c54059f",
"text": "A novel design of a hand functions task training robotic system was developed for the stroke rehabilitation. It detects the intention of hand opening or hand closing from the stroke person using the electromyography (EMG) signals measured from the hemiplegic side. This training system consists of an embedded controller and a robotic hand module. Each hand robot has 5 individual finger assemblies capable to drive 2 degrees of freedom (DOFs) of each finger at the same time. Powered by the linear actuator, the finger assembly achieves 55 degree range of motion (ROM) at the metacarpophalangeal (MCP) joint and 65 degree range of motion (ROM) at the proximal interphalangeal (PIP) joint. Each finger assembly can also be adjusted to fit for different finger length. With this task training system, stroke subject can open and close their impaired hand using their own intention to carry out some of the daily living tasks.",
"title": ""
},
{
"docid": "ea277c160544fb54bef69e2a4fa85233",
"text": "This paper proposes approaches to measure linkography in protocol studies of designing. It outlines the ideas behind using clustering and Shannon’s entropy as measures of designing behaviour. Hypothetical cases are used to illustrate the methods. The paper concludes that these methods may form the basis of a new tool to assess designer behaviour in terms of chunking of design ideas and the opportunities for idea development.",
"title": ""
},
{
"docid": "a5df1d285a359c493d53d1a3bf9920c2",
"text": "In this paper, we have reported a new failure phenomenon of read-disturb in MLC NAND flash memory caused by boosting hot-carrier injection effect. 1) The read-disturb failure occurred on unselected WL (WLn+1) after the adjacent selected WL (WLn) was performed with more than 1K read cycles. 2) The read-disturb failure of WLn+1 depends on WLn cell’s Vth and its applied voltage. 3) The mechanism of this kind of failure can be explained by hot carrier injection that is generated by discharging from boosting voltage in unselected cell area (Drain of WLn) to ground (Source of WLn). Experiment A NAND Flash memory was fabricated based on 70nm technology. In order to investigate the mechanisms of readdisturb, 3 different read voltages and 4 different cell data states (S0, S1, S2 and S3) were applied on the selected WL with SGS/SGD rising time shift scheme [1]. Fig. 1 and Fig. 2 show the operation condition and waveform for readdisturb evaluation. In the evaluation, the selected WLn was performed with more than 100K read cycles. Result And Discussion Fig. 3 shows the measured results of WL2 Vth shift (i.e. read-disturb failure) during WL1 read-didturb cycles with different WL1 voltages (VWL1) and cell data states (S0~S3). From these data, a serious WL2 Vth shift can be observed in VWL1=0.5V and VWL1=1.8V after 1K read cycles. In Fig. 3(a), the magnitude of Vth shift with WL1=S2 state is larger than that with WL1=S3 state. However, obviously WL2 Vth shift can be found only when WL1 is at S3 state in Fig. 3(b). In Fig. 3(c), WL2 Vth is unchanged while VWL1 is set to 3.6V. To precisely analyze the phenomenon, further TCAD simulation and analysis were carried out to clarify the mechanism of the read-disturb failure. Based on simulation results of Fig. 4, the channel potential difference between selected WLn (e.g. WL1) and unselected WLn+1 (e.g. WL2) is related to cell data states (S0~S3) and the read voltage of the selected WL (VWL1). Fig. 4(a) exhibits that the selected WL1 channel was tuned off and the channel potential of unselected WL2~31 was boosted to high level when the WL1 cell data state is S2 or S3. Therefore, a sufficient potential difference appears between WLn and WLn+1 and provides a high transverse electric field. When VWL1 is increased to 1.8V as Fig. 4(b), a high programming cell state (S3) is required to support the potential boosting of unselected WL2~31. In addition, from Fig. 4(c) and the case of WL1=S2 in Fig. 4(b), we can find that the potential difference were depressed since the WL1 channel is turned on by high WL1 voltage. Therefore, the potential difference can be reduced by sharing effect. These simulation results are well corresponding with read disturb results of Fig. 3. Electron current density is another factor to cause the Vth shift of WLn+1. From Fig. 3(a), the current density of WL1=S2 should higher than that of WL=S3 since its Vth is lower. Consequently, the probability of impact ionization can be increased due to the high current density in case of WL1=S2. According to the model, we can clearly explain the phenomenon of serious WL2 Vth shift occurs in the condition of WL 1=S2 rather than WL1=S3. Fig. 5 shows the schematic diagram of the mechanism of Boosting Hot-carrier Injection in MLC NAND flash memories. The transverse E-field can be enhanced by the channel potential difference and consequently make a high probability of impact ionization. As a result, electron-hole pairs will be generated, and then electrons will inject into the adjacent cell (WL2) since the higher vertical field of VWL2. Thus, the Vth of adjacent cell will be changed after 1K cycles with the continual injecting of the hot electrons. Table 1 shows the measured result of cell array Vth shift for WL1 to WL4 after the read-disturb cycles on WL1 or WL2. From the data, it concretely indicates that the WLn read cycles could only causes WLn+1 Vth shift even if WLn+1 did not apply the read cycles. The result is consistent with measured data and also supports that the read-disturb on adjacent cell results from boosting hotcarrier injection. Conclusion A new read-disturb failure mechanism caused by boosting hot-carrier injection effect in MLC NAND flash memory has been reported and clarified. Simulation and measured data describe that the electrostatic potential difference between reading cell and the adjacent cell plays a significant role to enhance hot-carrier injection effect. Reference [1] Ken Takeuchi, “A 56nm CMOS 99mm2 8Gb Multilevel NAND Flash Memory with 10MB/s Program Throughput ,” ISSCC, 2006. 978-1-4244-3761-0/09/$25.00 ©2009 IEEE R ead D isturbance Test R esult W L0 W L1 W L2 W L3 W L4 W L1= S0 Pass Pass Pass Pass Pass W L1= S1 Pass Pass Pass Pass Pass W L1= S2 Pass Pass Fail Pass Pass W L1= S3 Pass Pass Fail Pass Pass W L1= S0 Pass Pass Pass Pass Pass W L1= S1 Pass Pass Pass Pass Pass W L1= S2 Pass Pass Pass Pass Pass W L1= S3 Pass Pass Fail Pass Pass W L1= S0 Pass Pass Pass Pass Pass W L1= S1 Pass Pass Pass Pass Pass W L1= S2 Pass Pass Pass Pass Pass W L1= S3 Pass Pass Pass Pass Pass W L2= S0 Pass Pass Pass Pass Pass W L2= S1 Pass Pass Pass Pass Pass W L2= S2 Pass Pass Pass Fail Pass W L2= S3 Pass Pass Pass Fail Pass W L1 Read= 0.5V (C ase 1 ) W L1 Read= 1.8V (C ase 2 ) W L1 Read= 3.6V (C ase 3 )",
"title": ""
},
{
"docid": "ee0d11cbd2e723aff16af1c2f02bbc2b",
"text": "This study simplifies the complicated metric distance method [L.S. Chen, C.H. Cheng, Selecting IS personnel using ranking fuzzy number by metric distance method, Eur. J. Operational Res. 160 (3) 2005 803–820], and proposes an algorithm to modify Chen’s Fuzzy TOPSIS (Technique for Order Preference by Similarity to Ideal Solution) [C.T. Chen, Extensions of the TOPSIS for group decision-making under fuzzy environment, Fuzzy Sets Syst., 114 (2000) 1–9]. From experimental verification, Chen directly assigned the fuzzy numbers 1̃ and 0̃ as fuzzy positive ideal solution (PIS) and negative ideal solution (NIS). Chen’s method sometimes violates the basic concepts of traditional TOPSIS. This study thus proposes fuzzy hierarchical TOPSIS, which not only is well suited for evaluating fuzziness and uncertainty problems, but also can provide more objective and accurate criterion weights, while simultaneously avoiding the problem of Chen’s Fuzzy TOPSIS. For application and verification, this study presents a numerical example and build a practical supplier selection problem to verify our proposed method and compare it with other methods. 2008 Elsevier B.V. All rights reserved. * Corresponding author. Tel.: +886 5 5342601x5312; fax: +886 5 531 2077. E-mail addresses: jwwang@mail.nhu.edu.tw (J.-W. Wang), chcheng@yuntech.edu.tw (C.-H. Cheng), lendlice@ms12.url.com.tw (K.-C. Huang).",
"title": ""
},
{
"docid": "2ecdf4a4d7d21ca30f3204506a91c22c",
"text": "Because of the transition from analog to digital technologies, content owners are seeking technologies for the protection of copyrighted multimedia content. Encryption and watermarking are two major tools that can be used to prevent unauthorized consumption and duplication. In this paper, we generalize an idea in a recent paper that embeds a binary pattern in the form of a binary image in the LL and HH bands at the second level of Discrete Wavelet Transform (DWT) decomposition. Our generalization includes all four bands (LL, HL, LH, and HH), and a comparison of embedding a watermark at first and second level decompositions. We tested the proposed algorithm against fifteen attacks. Embedding the watermark in lower frequencies is robust to a group of attacks, and embedding the watermark in higher frequencies is robust to another set of attacks. Only for rewatermarking and collusion attacks, the watermarks extracted from all four bands are identical. Our experiments indicate that first level decomposition appear advantageous for two reasons: The area for watermark embedding is maximized, and the extracted watermarks are more textured with better visual quality.",
"title": ""
},
{
"docid": "89cc39369eeb6c12a12c61e210c437e3",
"text": "Multimodal learning with deep Boltzmann machines (DBMs) is an generative approach to fuse multimodal inputs, and can learn the shared representation via Contrastive Divergence (CD) for classification and information retrieval tasks. However, it is a 2-fan DBM model, and cannot effectively handle multiple prediction tasks. Moreover, this model cannot recover the hidden representations well by sampling from the conditional distribution when more than one modalities are missing. In this paper, we propose a Kfan deep structure model, which can handle the multi-input and muti-output learning problems effectively. In particular, the deep structure has K-branch for different inputs where each branch can be composed of a multi-layer deep model, and a shared representation is learned in an discriminative manner to tackle multimodal tasks. Given the deep structure, we propose two objective functions to handle two multi-input and multi-output tasks: joint visual restoration and labeling, and the multi-view multi-calss object recognition tasks. To estimate the model parameters, we initialize the deep model parameters with CD to maximize the joint distribution, and then we use backpropagation to update the model according to specific objective function. The experimental results demonstrate that the model can effectively leverages multi-source information and predict multiple tasks well over competitive baselines.",
"title": ""
},
{
"docid": "d4ea4a718837db4ecdfd64896661af77",
"text": "Laboratory studies have documented that women often respond less favorably to competition than men. Conditional on performance, men are often more eager to compete, and the performance of men tends to respond more positively to an increase in competition. This means that few women enter and win competitions. We review studies that examine the robustness of these differences as well the factors that may give rise to them. Both laboratory and field studies largely confirm these initial findings, showing that gender differences in competitiveness tend to result from differences in overconfidence and in attitudes toward competition. Gender differences in risk aversion, however, seem to play a smaller and less robust role. We conclude by asking what could and should be done to encourage qualified males and females to compete. 601 A nn u. R ev . E co n. 2 01 1. 3: 60 163 0. D ow nl oa de d fr om w w w .a nn ua lre vi ew s.o rg by $ {i nd iv id ua lU se r.d is pl ay N am e} o n 08 /1 6/ 11 . F or p er so na l u se o nl y.",
"title": ""
},
{
"docid": "c7d901f63f0d7ca0b23d5b8f23d92f7d",
"text": "We propose a novel approach to automatic spoken language identification (LID) based on vector space modeling (VSM). It is assumed that the overall sound characteristics of all spoken languages can be covered by a universal collection of acoustic units, which can be characterized by the acoustic segment models (ASMs). A spoken utterance is then decoded into a sequence of ASM units. The ASM framework furthers the idea of language-independent phone models for LID by introducing an unsupervised learning procedure to circumvent the need for phonetic transcription. Analogous to representing a text document as a term vector, we convert a spoken utterance into a feature vector with its attributes representing the co-occurrence statistics of the acoustic units. As such, we can build a vector space classifier for LID. The proposed VSM approach leads to a discriminative classifier backend, which is demonstrated to give superior performance over likelihood-based n-gram language modeling (LM) backend for long utterances. We evaluated the proposed VSM framework on 1996 and 2003 NIST Language Recognition Evaluation (LRE) databases, achieving an equal error rate (EER) of 2.75% and 4.02% in the 1996 and 2003 LRE 30-s tasks, respectively, which represents one of the best results reported on these popular tasks",
"title": ""
}
] | scidocsrr |
ae3dbdad428b7cd12dadceef2f3ef261 | Linguistic Reflections of Student Engagement in Massive Open Online Courses | [
{
"docid": "a7eff25c60f759f15b41c85ac5e3624f",
"text": "Connectivist massive open online courses (cMOOCs) represent an important new pedagogical approach ideally suited to the network age. However, little is known about how the learning experience afforded by cMOOCs is suited to learners with different skills, motivations, and dispositions. In this study, semi-structured interviews were conducted with 29 participants on the Change11 cMOOC. These accounts were analyzed to determine patterns of engagement and factors affecting engagement in the course. Three distinct types of engagement were recognized – active participation, passive participation, and lurking. In addition, a number of key factors that mediated engagement were identified including confidence, prior experience, and motivation. This study adds to the overall understanding of learning in cMOOCs and provides additional empirical data to a nascent research field. The findings provide an insight into how the learning experience afforded by cMOOCs suits the diverse range of learners that may coexist within a cMOOC. These insights can be used by designers of future cMOOCs to tailor the learning experience to suit the diverse range of learners that may choose to learn in this way.",
"title": ""
},
{
"docid": "2fbc75f848a0a3ae8228b5c6cbe76ec4",
"text": "The authors summarize 35 years of empirical research on goal-setting theory. They describe the core findings of the theory, the mechanisms by which goals operate, moderators of goal effects, the relation of goals and satisfaction, and the role of goals as mediators of incentives. The external validity and practical significance of goal-setting theory are explained, and new directions in goal-setting research are discussed. The relationships of goal setting to other theories are described as are the theory's limitations.",
"title": ""
}
] | [
{
"docid": "4dca240e5073db9f09e6fdc3b022a29a",
"text": "We describe an evolutionary approach to the control problem of bipedal walking. Using a full rigid-body simulation of a biped, it was possible to evolve recurrent neural networks that controlled stable straight-line walking on a planar surface. No proprioceptive information was necessary to achieve this task. Furthermore, simple sensory input to locate a sound source was integrated to achieve directional walking. To our knowledge, this is the first work that demonstrates the application of evolutionary optimization to three-dimensional physically simulated biped locomotion.",
"title": ""
},
{
"docid": "cf0b49aabe042b93be0c382ad69e4093",
"text": "This paper shows a technique to enhance the resolution of a frequency modulated continuous wave (FMCW) radar system. The range resolution of an FMCW radar system is limited by the bandwidth of the transmitted signal. By using high resolution methods such as the Matrix Pencil Method (MPM) it is possible to enhance the resolution. In this paper a new method to obtain a better resolution for FMCW radar systems is used. This new method is based on the MPM and is enhanced to require less computing power. To evaluate this new technique, simulations and measurements are used. The result shows that this new method is able to improve the performance of FMCW radar systems.",
"title": ""
},
{
"docid": "a5b147f5b3da39fed9ed11026f5974a2",
"text": "The aperture coupled patch geometry has been extended to dual polarization by several authors. In Tsao et al. (1988) a cross-shaped slot is fed by a balanced feed network which allows for a high degree of isolation. However, the balanced feed calls for an air-bridge which complicates both the design process and the manufacture. An alleviation to this problem is to separate the two channels onto two different substrate layers separated by the ground plane. In this case the disadvantage is increased cost. Another solution with a single layer feed is presented in Brachat and Baracco (1995) where one channel feeds a single slot centered under the patch whereas the other channel feeds two separate slots placed near the edges of the patch. Our experience is that with this geometry it is hard to achieve a well-matched broadband design since the slots near the edge of the patch present very low coupling. All the above geometries maintain symmetry with respect to the two principal planes if we ignore the small spurious coupling from feed lines in the vicinity of the aperture. We propose to reduce the symmetry to only one principal plane which turns out to be sufficient for high isolation and low cross-polarization. The advantage is that only one layer of feed network is needed, with no air-bridges required. In addition the aperture position is centered under the patch. An important application for dual polarized antennas is base station antennas. We have therefore designed and measured an element for the PCS band (1.85-1.99 GHz).",
"title": ""
},
{
"docid": "db7a4ab8d233119806e7edf2a34fffd1",
"text": "Recent research has shown that the performance of search personalization depends on the richness of user profiles which normally represent the user’s topical interests. In this paper, we propose a new embedding approach to learning user profiles, where users are embedded on a topical interest space. We then directly utilize the user profiles for search personalization. Experiments on query logs from a major commercial web search engine demonstrate that our embedding approach improves the performance of the search engine and also achieves better search performance than other strong baselines.",
"title": ""
},
{
"docid": "d9a87325efbd29520c37ec46531c6062",
"text": "Predicting the risk of potential diseases from Electronic Health Records (EHR) has attracted considerable attention in recent years, especially with the development of deep learning techniques. Compared with traditional machine learning models, deep learning based approaches achieve superior performance on risk prediction task. However, none of existing work explicitly takes prior medical knowledge (such as the relationships between diseases and corresponding risk factors) into account. In medical domain, knowledge is usually represented by discrete and arbitrary rules. Thus, how to integrate such medical rules into existing risk prediction models to improve the performance is a challenge. To tackle this challenge, we propose a novel and general framework called PRIME for risk prediction task, which can successfully incorporate discrete prior medical knowledge into all of the state-of-the-art predictive models using posterior regularization technique. Different from traditional posterior regularization, we do not need to manually set a bound for each piece of prior medical knowledge when modeling desired distribution of the target disease on patients. Moreover, the proposed PRIME can automatically learn the importance of different prior knowledge with a log-linear model.Experimental results on three real medical datasets demonstrate the effectiveness of the proposed framework for the task of risk prediction",
"title": ""
},
{
"docid": "719c1b6ad0d945b68b34abceb1ed8e3b",
"text": "This editorial provides a behavioral science view on gamification and health behavior change, describes its principles and mechanisms, and reviews some of the evidence for its efficacy. Furthermore, this editorial explores the relation between gamification and behavior change frameworks used in the health sciences and shows how gamification principles are closely related to principles that have been proven to work in health behavior change technology. Finally, this editorial provides criteria that can be used to assess when gamification provides a potentially promising framework for digital health interventions.",
"title": ""
},
{
"docid": "927f2c68d709c7418ad76fd9d81b18c4",
"text": "With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes critically important. We present a probabilistic approach to alert correlation, extending ideas from multisensor data fusion. Features used for alert correlation are based on alert content that anticipates evolving IETF standards. The probabilistic approach provides a unified mathematical framework for correlating alerts that match closely but not perfectly, where the minimum degree of match required to fuse alerts is controlled by a single configurable parameter. Only features in common are considered in the fusion algorithm. For each feature we define an appropriate similarity function. The overall similarity is weighted by a specifiable expectation of similarity. In addition, a minimum similarity may be specified for some or all features. Features in this set must match at least as well as the minimum similarity specification in order to combine alerts, regardless of the goodness of match on the feature set as a whole. Our approach correlates attacks over time, correlates reports from heterogeneous sensors, and correlates multiple attack steps.",
"title": ""
},
{
"docid": "121f2bfd854b79a14e8171d875ba951f",
"text": "Arising from many applications at the intersection of decision-making and machine learning, Marginal Maximum A Posteriori (Marginal MAP) problems unify the two main classes of inference, namely maximization (optimization) and marginal inference (counting), and are believed to have higher complexity than both of them. We propose XOR_MMAP, a novel approach to solve the Marginal MAP problem, which represents the intractable counting subproblem with queries to NP oracles, subject to additional parity constraints. XOR_MMAP provides a constant factor approximation to the Marginal MAP problem, by encoding it as a single optimization in a polynomial size of the original problem. We evaluate our approach in several machine learning and decision-making applications, and show that our approach outperforms several state-of-the-art Marginal MAP solvers.",
"title": ""
},
{
"docid": "3bae971fce094c3ff6c34595bac60ef2",
"text": "In this work, we present a 3D 128Gb 2bit/cell vertical-NAND (V-NAND) Flash product. The use of barrier-engineered materials and gate all-around structure in the 3D V-NAND cell exhibits advantages over 1xnm planar NAND, such as small Vth shift due to small cell coupling and narrow natural Vth distribution. Also, a negative counter-pulse scheme realizes a tightly programmed cell distribution. In order to reduce the effect of a large WL coupling, a glitch-canceling discharge scheme and a pre-offset control scheme is implemented. Furthermore, an external high-voltage supply scheme along with the proper protection scheme for a high-voltage failure is used to achieve low power consumption. The chip accomplishes 50MB/s write throughput with 3K endurance for typical embedded applications. Also, extended endurance of 35K is achieved with 36MB/s of write throughput for data center and enterprise SSD applications. And 2nd generation of 3D V-NAND opens up a whole new world at SSD endurance, density and battery life for portables.",
"title": ""
},
{
"docid": "7a4bb28ae7c175a018b278653e32c3a1",
"text": "Additive manufacturing (AM) alias 3D printing translates computer-aided design (CAD) virtual 3D models into physical objects. By digital slicing of CAD, 3D scan, or tomography data, AM builds objects layer by layer without the need for molds or machining. AM enables decentralized fabrication of customized objects on demand by exploiting digital information storage and retrieval via the Internet. The ongoing transition from rapid prototyping to rapid manufacturing prompts new challenges for mechanical engineers and materials scientists alike. Because polymers are by far the most utilized class of materials for AM, this Review focuses on polymer processing and the development of polymers and advanced polymer systems specifically for AM. AM techniques covered include vat photopolymerization (stereolithography), powder bed fusion (SLS), material and binder jetting (inkjet and aerosol 3D printing), sheet lamination (LOM), extrusion (FDM, 3D dispensing, 3D fiber deposition, and 3D plotting), and 3D bioprinting. The range of polymers used in AM encompasses thermoplastics, thermosets, elastomers, hydrogels, functional polymers, polymer blends, composites, and biological systems. Aspects of polymer design, additives, and processing parameters as they relate to enhancing build speed and improving accuracy, functionality, surface finish, stability, mechanical properties, and porosity are addressed. Selected applications demonstrate how polymer-based AM is being exploited in lightweight engineering, architecture, food processing, optics, energy technology, dentistry, drug delivery, and personalized medicine. Unparalleled by metals and ceramics, polymer-based AM plays a key role in the emerging AM of advanced multifunctional and multimaterial systems including living biological systems as well as life-like synthetic systems.",
"title": ""
},
{
"docid": "f2a1e5d8e99977c53de9f2a82576db69",
"text": "During the last years, several masking schemes for AES have been proposed to secure hardware implementations against DPA attacks. In order to investigate the effectiveness of these countermeasures in practice, we have designed and manufactured an ASIC. The chip features an unmasked and two masked AES-128 encryption engines that can be attacked independently. In addition to conventional DPA attacks on the output of registers, we have also mounted attacks on the output of logic gates. Based on simulations and physical measurements we show that the unmasked and masked implementations leak side-channel information due to glitches at the output of logic gates. It turns out that masking the AES S-Boxes does not prevent DPA attacks, if glitches occur in the circuit.",
"title": ""
},
{
"docid": "d6d07f50778ba3d99f00938b69fe0081",
"text": "The use of metal casing is attractive to achieve robustness of modern slim tablet devices. The metal casing includes the metal back cover and the metal frame around the edges thereof. For such metal-casing tablet devices, the frame antenna that uses a part of the metal frame as an antenna's radiator is promising to achieve wide bandwidths for mobile communications. In this paper, the frame antenna based on the simple half-loop antenna structure to cover the long-term evolution 746-960 and 1710-2690 MHz bands is presented. The half-loop structure for the frame antenna is easy for manufacturing and increases the robustness of the metal casing. The dual-wideband operation of the half-loop frame antenna is obtained by using an elevated feed network supported by a thin feed substrate. The measured antenna efficiencies are, respectively, 45%-69% and 60%-83% in the low and high bands. By selecting different feed circuits, the antenna's low band can also be shifted from 746-960 MHz to lower frequencies such as 698-840 MHz, with the antenna's high-band coverage very slightly varied. The working principle of the antenna with the elevated feed network is discussed. The antenna is also fabricated and tested, and experimental results are presented.",
"title": ""
},
{
"docid": "f2fed9066ac945ae517aef8ec5bb5c61",
"text": "BACKGROUND\nThe aging of society is a global trend, and care of older adults with dementia is an urgent challenge. As dementia progresses, patients exhibit negative emotions, memory disorders, sleep disorders, and agitated behavior. Agitated behavior is one of the most difficult problems for family caregivers and healthcare providers to handle when caring for older adults with dementia.\n\n\nPURPOSE\nThe aim of this study was to investigate the effectiveness of white noise in improving agitated behavior, mental status, and activities of daily living in older adults with dementia.\n\n\nMETHODS\nAn experimental research design was used to study elderly participants two times (pretest and posttest). Six dementia care centers in central and southern Taiwan were targeted to recruit participants. There were 63 participants: 28 were in the experimental group, and 35 were in the comparison group. Experimental group participants received 20 minutes of white noise consisting of ocean, rain, wind, and running water sounds between 4 and 5 P.M. daily over a period of 4 weeks. The comparison group received routine care. Questionnaires were completed, and observations of agitated behaviors were collected before and after the intervention.\n\n\nRESULTS\nAgitated behavior in the experimental group improved significantly between pretest and posttest. Furthermore, posttest scores on the Mini-Mental Status Examination and Barthel Index were slightly better for this group than at pretest. However, the experimental group registered no significant difference in mental status or activities of daily living at posttest. For the comparison group, agitated behavior was unchanged between pretest and posttest.\n\n\nCONCLUSIONS\nThe results of this study support white noise as a simple, convenient, and noninvasive intervention that improves agitated behavior in older adults with dementia. These results may provide a reference for related healthcare providers, educators, and administrators who care for older adults with dementia.",
"title": ""
},
{
"docid": "e3d0a58ddcffabb26d5e059d3ae6b370",
"text": "HCI ( Human Computer Interaction ) studies the ways humans use digital or computational machines, systems or infrastructures. The study of the barriers encountered when users interact with the various interfaces is critical to improving their use, as well as their experience. Access and information processing is carried out today from multiple devices (computers, tablets, phones... ) which is essential to maintain a multichannel consistency. This complexity increases with environments in which we do not have much experience as users, where interaction with the machine is a challenge even in phases of research: virtual reality environments, augmented reality, or viewing and handling of large amounts of data, where the simplicity and ease of use are critical.",
"title": ""
},
{
"docid": "e8c9067f13c9a57be46823425deb783b",
"text": "In order to utilize the tremendous computing power of graphics hardware and to automatically adapt to the fast and frequent changes in its architecture and performance characteristics, this paper implements an automatic tuning system to generate high-performance matrix-multiplication implementation on graphics hardware. The automatic tuning system uses a parameterized code generator to generate multiple versions of matrix multiplication, whose performances are empirically evaluated by actual execution on the target platform. An ad-hoc search engine is employed to search over the implementation space for the version that yields the best performance. In contrast to similar systems on CPUs, which utilize cache blocking, register tiling, instruction scheduling tuning strategies, this paper identifies and exploits several tuning strategies that are unique for graphics hardware. These tuning strategies include optimizing for multiple-render-targets, SIMD instructions with data packing, overcoming limitations on instruction count and dynamic branch instruction. The generated implementations have comparable performance with expert manually tuned version in spite of the significant overhead incurred due to the use of the high-level BrookGPU language.",
"title": ""
},
{
"docid": "01f8616cafa72c473e33f149faff044a",
"text": "We show that the e-commerce domain can provide all the right ingredients for successful data mining and claim that it is a killer domain for data mining. We describe an integrated architecture, based on our experience at Blue Martini Software, for supporting this integration. The architecture can dramatically reduce the pre-processing, cleaning, and data understanding effort often documented to take 80% of the time in knowledge discovery projects. We emphasize the need for data collection at the application server layer (not the web server) in order to support logging of data and metadata that is essential to the discovery process. We describe the data transformation bridges required from the transaction processing systems and customer event streams (e.g., clickstreams) to the data warehouse. We detail the mining workbench, which needs to provide multiple views of the data through reporting, data mining algorithms, visualization, and OLAP. We conclude with a set of challenges.",
"title": ""
},
{
"docid": "fe41de4091692d1af643bf144ac1dcaa",
"text": "Introduction. This research addresses a primary issue that involves motivating academics to share knowledge. Adapting the theory of reasoned action, this study examines the role of motivation that consists of intrinsic motivators (commitment; enjoyment in helping others) and extrinsic motivators (reputation; organizational rewards) to determine and explain the behaviour of Malaysian academics in sharing knowledge. Method. A self-administered questionnaire was distributed using a non-probability sampling technique. A total of 373 completed responses were collected with a total response rate of 38.2%. Analysis. The partial least squares analysis was used to analyse the data. Results. The results indicated that all five of the hypotheses were supported. Analysis of data from the five higher learning institutions in Malaysia found that commitment and enjoyment in helping others (i.e., intrinsic motivators) and reputation and organizational rewards (i.e., extrinsic motivators) have a positive and significant relationship with attitude towards knowledge-sharing. In addition, the findings revealed that intrinsic motivators are more influential than extrinsic motivators. This suggests that academics are influenced more by intrinsic motivators than by extrinsic motivators. Conclusions. The findings provided an indication of the determinants in enhancing knowledgesharing intention among academics in higher education institutions through extrinsic and intrinsic motivators.",
"title": ""
},
{
"docid": "2da67ed8951caf3388ca952465d61b37",
"text": "As a significant supplier of labour migrants, Southeast Asia presents itself as an important site for the study of children in transnational families who are growing up separated from at least one migrant parent and sometimes cared for by 'other mothers'. Through the often-neglected voices of left-behind children, we investigate the impact of parental migration and the resulting reconfiguration of care arrangements on the subjective well-being of migrants' children in two Southeast Asian countries, Indonesia and the Philippines. We theorise the child's position in the transnational family nexus through the framework of the 'care triangle', representing interactions between three subject groups- 'left-behind' children, non-migrant parents/other carers; and migrant parent(s). Using both quantitative (from 1010 households) and qualitative (from 32 children) data from a study of child health and migrant parents in Southeast Asia, we examine relationships within the caring spaces both of home and of transnational spaces. The interrogation of different dimensions of care reveals the importance of contact with parents (both migrant and nonmigrant) to subjective child well-being, and the diversity of experiences and intimacies among children in the two study countries.",
"title": ""
},
{
"docid": "db0b55cd4064799b9d7c52c6f3da6aac",
"text": "Motion blur from camera shake is a major problem in videos captured by hand-held devices. Unlike single-image deblurring, video-based approaches can take advantage of the abundant information that exists across neighboring frames. As a result the best performing methods rely on aligning nearby frames. However, aligning images is a computationally expensive and fragile procedure, and methods that aggregate information must therefore be able to identify which regions have been accurately aligned and which have not, a task which requires high level scene understanding. In this work, we introduce a deep learning solution to video deblurring, where a CNN is trained end-toend to learn how to accumulate information across frames. To train this network, we collected a dataset of real videos recorded with a high framerate camera, which we use to generate synthetic motion blur for supervision. We show that the features learned from this dataset extend to deblurring motion blur that arises due to camera shake in a wide range of videos, and compare the quality of results to a number of other baselines.",
"title": ""
},
{
"docid": "4c21f108d05132ce00fe6d028c17c7ab",
"text": "In this work, a new predictive phase-locked loop (PLL) for encoderless control of a permanent-magnet synchronous generator (PMSG) in a variable-speed wind energy conversion system (WECS) is presented. The idea of the predictive PLL is derived from the direct-model predictive control (DMPC) principle. The predictive PLL uses a limited (discretized) number of rotor-angles for predicting/estimating the back-electromotive-force (BEMF) of the PMSG. subsequently, that predicted angle, which optimizes a pre-defined quality function, is chosen to become the best rotor-angle/position. Accordingly, the fixed gain proportional integral (FGPI) regulator that is normally used in PLLs is eliminated. The performance of the predictive PLL is validated experimentally and compared with that of the traditional one under various operating scenarios and under variations of the PMSG parameters.",
"title": ""
}
] | scidocsrr |
a5160ff64513790519e1bd40a563860f | A V-band waveguide to microstrip inline transition | [
{
"docid": "fcdb662faf1bba425967381f8111be7a",
"text": "This paper reports a W-band solid-state power amplifier with an output power of 5.2W at 95 GHz and greater than 3 watts over the 94 to 98.5 GHz band. These SOA results were achieved by combining 12 GaN MMICs in a low-loss radial-line combiner network. The 12-way combiner demonstrates an overall combining efficiency of 87.5%, and excluding combiner conductor losses (0.3 dB), exhibits a combining efficiency of 93.7% at 95GHz. The size of the 12-way amplifier/combiner is only 2.39″ dia. × 1.5″ length. This work represents the first application of the radial-line combiner configuration to applications at W-band frequencies, and establishes new levels of performance for solid-state power amplifiers operating at these frequencies.",
"title": ""
}
] | [
{
"docid": "65508d1dcd73f38469400b16c0fe8b34",
"text": "Understanding the performance of distributed systems requires correlation of thousands of interactions between numerous components — a task best left to a computer. Today’s systems provide voluminous traces from each component but do not synthesise the data into concise models of system performance. We argue that online performance modelling should be a ubiquitous operating system service and outline several uses including performance debugging, capacity planning, system tuning and anomaly detection. We describe the Magpie modelling service which collates detailed traces from multiple machines in an e-commerce site, extracts request-specific audit trails, and constructs probabilistic models of request behaviour. A feasibility study evaluates the approach using an offline demonstrator. Results show that the approach is promising, but that there are many challenges to building a truly ubiquitious, online modelling infrastructure.",
"title": ""
},
{
"docid": "374b3e207a868c388f0b814c457f6871",
"text": "BACKGROUND\nQuadriceps strengthening exercises are part of the treatment of patellofemoral pain (PFP), but the heavy resistance exercises may aggravate knee pain. Blood flow restriction (BFR) training may provide a low-load quadriceps strengthening method to treat PFP.\n\n\nMETHODS\nSeventy-nine participants were randomly allocated to a standardised quadriceps strengthening (standard) or low-load BFR. Both groups performed 8 weeks of leg press and leg extension, the standard group at 70% of 1 repetition maximum (1RM) and the BFR group at 30% of 1RM. Interventions were compared using repeated-measures analysis of variance for Kujala Patellofemoral Score, Visual Analogue Scale for 'worst pain' and 'pain with daily activity', isometric knee extensor torque (Newton metre) and quadriceps muscle thickness (cm). Subgroup analyses were performed on those participants with painful resisted knee extension at 60°.\n\n\nRESULTS\nSixty-nine participants (87%) completed the study (standard, n=34; BFR, n=35). The BFR group had a 93% greater reduction in pain with activities of daily living (p=0.02) than the standard group. Participants with painful resisted knee extension (n=39) had greater increases in knee extensor torque with BFR than standard (p<0.01). No between-group differences were found for change in Kujala Patellofemoral Score (p=0.31), worst pain (p=0.24), knee extensor torque (p=0.07) or quadriceps thickness (p=0.2). No difference was found between interventions at 6 months.\n\n\nCONCLUSION\nCompared with standard quadriceps strengthening, low load with BFR produced greater reduction in pain with daily living at 8 weeks in people with PFP. Improvements were similar between groups in worst pain and Kujala score. The subgroup with painful resisted knee extension had larger improvements in quadriceps strength from BFR.\n\n\nTRIAL REGISTRATION NUMBER\n12614001164684.",
"title": ""
},
{
"docid": "5f8a5ea87859bf80cb630b0f3734d4cb",
"text": "Existing Natural Language Generation (nlg) systems are weak AI systems and exhibit limited capabilities when language generation tasks demand higher levels of creativity, originality and brevity. Eective solutions or, at least evaluations of modern nlg paradigms for such creative tasks have been elusive, unfortunately. is paper introduces and addresses the task of coherent story generation from independent descriptions, describing a scene or an event. Towards this, we explore along two popular text-generation paradigms – (1) Statistical Machine Translation (smt), posing story generation as a translation problem and (2) Deep Learning, posing story generation as a sequence to sequence learning problem. In SMT, we chose two popular methods such as phrase based SMT (pb-SMT) and syntax based SMT (syntax-SMT) to ‘translate’ the incoherent input text into stories. We then implement a deep recurrent neural network (rnn) architecture that encodes sequence of variable length input descriptions to corresponding latent representations and decodes them to produce well formed comprehensive story like summaries. e ecacy of the suggested approaches is demonstrated on a publicly available dataset with the help of popular machine translation and summarization evaluation metrics. We believe, a system like ours has dierent interesting applicationsfor example, creating news articles from phrases of event information.",
"title": ""
},
{
"docid": "3e39d234094d935ff6776dc663ad6513",
"text": "Smartphones now offer the promise of collecting behavioral data unobtrusively, in situ, as it unfolds in the course of daily life. Data can be collected from the onboard sensors and other phone logs embedded in today's off-the-shelf smartphone devices. These data permit fine-grained, continuous collection of people's social interactions (e.g., speaking rates in conversation, size of social groups, calls, and text messages), daily activities (e.g., physical activity and sleep), and mobility patterns (e.g., frequency and duration of time spent at various locations). In this article, we have drawn on the lessons from the first wave of smartphone-sensing research to highlight areas of opportunity for psychological research, present practical considerations for designing smartphone studies, and discuss the ongoing methodological and ethical challenges associated with research in this domain. It is our hope that these practical guidelines will facilitate the use of smartphones as a behavioral observation tool in psychological science.",
"title": ""
},
{
"docid": "66782c46d59dd9ef225e9f3ea0b47cfe",
"text": "Intraoperative vital signals convey a wealth of complex temporal information that can provide significant insights into a patient's physiological status during the surgery, as well as outcomes after the surgery. Our study involves the use of a deep recurrent neural network architecture to predict patient's outcomes after the surgery, as well as to predict the immediate changes in the intraoperative signals during the surgery. More specifically, we will use a Long Short-Term Memory (LSTM) model which is a gated deep recurrent neural network architecture. We have performed two experiments on a large intraoperative dataset of 12,036 surgeries containing information on 7 intraoperative signals including body temperature, respiratory rate, heart rate, diastolic blood pressure, systolic blood pressure, fraction of inspired O2 and end-tidal CO2. We first evaluated the capability of LSTM in predicting the immediate changes in intraoperative signals, and then we evaluated its performance on predicting each patient's length of stay outcome. Our experiments show the effectiveness of LSTM with promising results on both tasks compared to the traditional models.",
"title": ""
},
{
"docid": "dd7940191f4b2d63e063bc27a0dcb787",
"text": "The Distributed Interactive Virtual Environment (DIVE) is a heterogeneous distributed VR system based on UNIX and Internet networking protocols. Each participating process has a copy of a replicated database and changes are propagated to the other processes with reliable multicast protocols. DIVE provides a dynamic virtual environment whew applications and users can enter and leave the environment on demand. Several user-related abstractions have been introduced to ease the task of application and user interface construction.",
"title": ""
},
{
"docid": "328adffce36e79e5cdcdd3db75e2b35c",
"text": "Traditional link prediction techniques primarily focus on the effect of potential linkages on the local network neighborhood or the paths between nodes. In this paper, we study the problem of link prediction in networks where instances can simultaneously belong to multiple communities, engendering different types of collaborations. Links in these networks arise from heterogeneous causes, limiting the performance of predictors that treat all links homogeneously. To solve this problem, we introduce a new link prediction framework, Link Prediction using Social Features (LPSF), which weights the network using a similarity function based on features extracted from patterns of prominent interactions across the network.",
"title": ""
},
{
"docid": "87fefee3cb35d188ad942ee7c8fad95f",
"text": "Financial frictions are a central element of most of the models that the literature on emerging markets crises has proposed for explaining the ‘Sudden Stop’ phenomenon. To date, few studies have aimed to examine the quantitative implications of these models and to integrate them with an equilibrium business cycle framework for emerging economies. This paper surveys these studies viewing them as ability-to-pay and willingness-to-pay variations of a framework that adds occasionally binding borrowing constraints to the small open economy real-business-cycle model. A common feature of the different models is that agents factor in the risk of future Sudden Stops in their optimal plans, so that equilibrium allocations and prices are distorted even when credit constraints do not bind. Sudden Stops are a property of the unique, flexible-price competitive equilibrium of these models that occurs in a particular region of the state space in which negative shocks make borrowing constraints bind. The resulting nonlinear effects imply that solving the models requires non-linear numerical methods, which are described in the survey. The results show that the models can yield relatively infrequent Sudden Stops with large current account reversals and deep recessions nested within smoother business cycles. Still, research in this area is at an early stage and this survey aims to stimulate further work. Cristina Arellano Enrique G. Mendoza Department of Economics Department of Economics Social Sciences Building University of Maryland Duke University College Park, MD 20742 Durham, NC 27708-0097 and NBER mendozae@econ.duke.edu",
"title": ""
},
{
"docid": "1bd4bb8c971687c829caa0fab65439ba",
"text": "The International Technology Roadmap for Semiconductors (ITRS) identifies production test data as an essential element in improving design and technology in the manufacturing process feedback loop. One of the observations made from the highvolume production test data is that dies that fail due to a systematic failure have a tendency to form certain unique patterns that manifest as defect clusters at the wafer level. Identifying and categorising such clusters is a crucial step towards manufacturing yield improvement and implementation of real-time statistical process control. Addressing the semiconductor industry’s needs, this research proposes an automatic defect cluster recognition system for semiconductor wafers that achieves up to 95% accuracy (depending on the product type).",
"title": ""
},
{
"docid": "573e6fe988a5d0ea376893c56e6cde26",
"text": "Various biologically inspired small scale robots are built with endoskeleton structures. Generally, endoskeletons consist of rotational joints and rigid links. For millimeter scale robots, endoskeletons should be scalable and easy to manufacture. Layers of composite materials and polymer film can be fabricated into small scale joints and link structures as seen in fig. 1. The structures are called SCM (Smart Composite Microstructures) [1]. These structures have many advantages in small scale robot structures in aspect of friction and manufacturing simplicity. We expand the structure with SMA spring actuator for actuation of small components. In this video, we show three robot prototypes using SCM. The first robot is a fully foldable robot using torsional spring type SMA actuator. As seen in fig. 2, three segments of plate structures can be folded into a compact cube shape. The Second robot is Omegabot: Inchworm inspired robot [3]. It crawls with two anchors gripping the ground alternatively by making its body into an omega shape. This simple locomotion is a suitable moving mechanism for small scale robots. The Omegabot produces motions of crawling, climbing, and steering with tethered power and control. The third robot is a flea inspired robot. The flea can jump more than 130 times of its body length with its body length just below 1mm. The flea uses a torque reversal mechanism which enables storing large amount of energy and releasing it with a small amount of force. This mechanism is simple and efficient, which makes it a good mechanism for small jumping robots. The current prototype of the flea inspired robot jumps 64cm high, which is about 30 times of the robot body length. The SCM enabled these novel small scale robots, and has a potential to enable various small scale robots.",
"title": ""
},
{
"docid": "b387d7b1f17cdbca1260ef25fe4448bc",
"text": "This paper derives the transfer function from error voltage to duty cycle, which captures the quasi-digital behavior of the closed-current loop for pulsewidth modulated (PWM) dc-dc converters operating in continuous-conduction mode (CCM) using peak current-mode (PCM) control, the current-loop gain, the transfer function from control voltage to duty cycle (closed-current loop transfer function), and presents experimental verification. The sample-and-hold effect, or quasi-digital (discrete) behavior in the current loop with constant-frequency PCM in PWM dc-dc converters is described in a manner consistent with the physical behavior of the circuit. Using control theory, a transfer function from the error voltage to the duty cycle that captures the quasi-digital behavior is derived. This transfer function has a pole that can be in either the left-half plane or right-half plane, and captures the sample-and-hold effect accurately, enabling the characterization of the current-loop gain and closed-current loop for PWM dc-dc converters with PCM. The theoretical and experimental response results were in excellent agreement, confirming the validity of the transfer functions derived. The closed-current loop characterization can be used for the design of a controller for the outer voltage loop.",
"title": ""
},
{
"docid": "7ef2f4a771aa0d1724127c97aa21e1ea",
"text": "This paper demonstrates the efficient use of Internet of Things for the traditional agriculture. It shows the use of Arduino and ESP8266 based monitored and controlled smart irrigation systems, which is also cost-effective and simple. It is beneficial for farmers to irrigate there land conveniently by the application of automatic irrigation system. This smart irrigation system has pH sensor, water flow sensor, temperature sensor and soil moisture sensor that measure respectively and based on these sensors arduino microcontroller drives the servo motor and pump. Arduino received the information and transmitted with ESP8266 Wi-Fi module wirelessly to the website through internet. This transmitted information is monitor and control by using IOT. This enables the remote control mechanism through a secure internet web connection to the user. A website has been prepared which present the actual time values and reference values of various factors needed by crops. Users can control water pumps and sprinklers through the website and keep an eye on the reference values which will help the farmer increase production with quality crops.",
"title": ""
},
{
"docid": "b9dcc111261fa97e2d36b9a536a5861d",
"text": "We present the first open-source tool for annotating morphosyntactic tense, mood and voice for English, French and German verbal complexes. The annotation is based on a set of language-specific rules, which are applied on dependency trees and leverage information about lemmas, morphological properties and POS-tags of the verbs. Our tool has an average accuracy of about 76%. The tense, mood and voice features are useful both as features in computational modeling and for corpuslinguistic research.",
"title": ""
},
{
"docid": "9e4b7e87229dfb02c2600350899049be",
"text": "This paper presents an efficient and reliable swarm intelligence-based approach, namely elitist-mutated particle swarm optimization EMPSO technique, to derive reservoir operation policies for multipurpose reservoir systems. Particle swarm optimizers are inherently distributed algorithms, in which the solution for a problem emerges from the interactions between many simple individuals called particles. In this study the standard particle swarm optimization PSO algorithm is further improved by incorporating a new strategic mechanism called elitist-mutation to improve its performance. The proposed approach is first tested on a hypothetical multireservoir system, used by earlier researchers. EMPSO showed promising results, when compared with other techniques. To show practical utility, EMPSO is then applied to a realistic case study, the Bhadra reservoir system in India, which serves multiple purposes, namely irrigation and hydropower generation. To handle multiple objectives of the problem, a weighted approach is adopted. The results obtained demonstrate that EMPSO is consistently performing better than the standard PSO and genetic algorithm techniques. It is seen that EMPSO is yielding better quality solutions with less number of function evaluations. DOI: 10.1061/ ASCE 0733-9496 2007 133:3 192 CE Database subject headings: Reservoir operation; Optimization; Irrigation; Hydroelectric power generation.",
"title": ""
},
{
"docid": "8e099249047cb4e1550f8ddb287bddca",
"text": "Several arguments can be found in business intelligence literature that the use of business intelligence systems can bring multiple benefits, for example, via faster and easier access to information, savings in information technology (‘IT’) and greater customer satisfaction all the way through to the improved competitiveness of enterprises. Yet, most of these benefits are often very difficult to measure because of their indirect and delayed effects on business success. On top of the difficulties in justifying investments in information technology (‘IT’), particularly business intelligence (‘BI’), business executives generally want to know whether the investment is worth the money and if it can be economically justified. In looking for an answer to this question, various methods of evaluating investments can be employed. We can use the classic return on investment (‘ROI’) calculation, cost-benefit analysis, the net present value (‘NPV’) method, the internal rate of return (‘IRR’) and others. However, it often appears in business practice that the use of these methods alone is inappropriate, insufficient or unfeasible for evaluating an investment in business intelligence systems. Therefore, for this purpose, more appropriate methods are those based mainly on a qualitative approach, such as case studies, empirical analyses, user satisfaction analyses, and others that can be employed independently or can help us complete the whole picture in conjunction with the previously mentioned methods. Since there is no universal approach to the evaluation of an investment in information technology and business intelligence, it is necessary to approach each case in a different way based on the specific circumstances and purpose of the evaluation. This paper presents a case study in which the evaluation of an investment in on-line analytical processing (‘OLAP’) technology in the company Melamin was made through an",
"title": ""
},
{
"docid": "895f53c40a115740f840992656b60794",
"text": "Melanoma is the deadliest form of skin cancer. While curable with early detection, only highly trained specialists are capable of accurately recognizing the disease. As expertise is in limited supply, automated systems capable of identifying disease could save lives, reduce unnecessary biopsies, and reduce costs. Toward this goal, we propose a system that combines recent developments in deep learning with established machine learning approaches, creating ensembles of methods that are capable of segmenting skin lesions, as well as analyzing the detected area and surrounding tissue for melanoma detection. The system is evaluated using the largest publicly available benchmark dataset of dermoscopic images, containing 900 training and 379 testing images. New state-of-the-art performance levels are demonstrated, leading to an improvement in the area under receiver operating characteristic curve of 7.5% (0.843 vs. 0.783), in average precision of 4% (0.649 vs. 0.624), and in specificity measured at the clinically relevant 95% sensitivity operating point 2.9 times higher than the previous state-of-the-art (36.8% specificity compared to 12.5%). Compared to the average of 8 expert dermatologists on a subset of 100 test images, the proposed system produces a higher accuracy (76% vs. 70.5%), and specificity (62% vs. 59%) evaluated at an equivalent sensitivity (82%).",
"title": ""
},
{
"docid": "4c27d20423dedd679b15485b341fb6d7",
"text": "Automatic mapping of buildings from remote sensing imagery is currently limited by insufficient detection accuracy. A recent technique that can largely promote the building detection accuracy is convolutional neural network, which is an important branch of deep learning and has substantially improved the state-of-the-art performance of image segmentation. A benchmark dataset bears significance in fair comparisons for further accelerating the development of building detection toward automatic mapping. However, several problems still remain in the current public datasets that address this task. First, although building detection is generally considered equivalent to extracting roof outlines, most datasets directly provide building footprints as ground truths for testing and evaluation; the challenges of these benchmarks are more complicated than roof segmentation, as relief displacement leads to varying degrees of misalignment between roof outlines and footprints. On the other hand, an image dataset should feature a large quantity and high spatial resolution to effectively train a high-performance deep learning model for accurate mapping of buildings. Unfortunately, the remote sensing community still lacks proper benchmark datasets that can simultaneously satisfy these requirements. In this paper, we present a new large-scale benchmark dataset termed Aerial Imagery for Roof Segmentation (AIRS). This dataset provides a wide coverage of aerial imagery with 7.5 cm resolution and contains over 220,000 buildings. The task posed for AIRS is defined as roof segmentation. We implement several state-of-the-art deep learning methods of semantic segmentation for performance evaluation and analysis of the proposed dataset. The results can serve as the baseline for future work.",
"title": ""
},
{
"docid": "0b4c57b93a0da45e6561a0a13a4e4005",
"text": "Scientific article recommendation problem deals with recommending similar scientific articles given a query article. It can be categorized as a content based similarity system. Recent advancements in representation learning methods have proven to be effective in modeling distributed representations in different modalities like images, languages, speech, networks etc. The distributed representations obtained using such techniques in turn can be used to calculate similarities. In this paper, we address the problem of scientific paper recommendation through a novel method which aims to combine multimodal distributed representations, which in this case are: 1. distributed representations of paper’s content, and 2. distributed representation of the graph constructed from the bibliographic network. Through experiments we demonstrate that our method outperforms the state-of-the-art distributed representation methods in text and graph, by 29.6% and 20.4%, both in terms of precision and mean-average-precision respectively.",
"title": ""
},
{
"docid": "42a6b6ac31383046cf11bcf16da3207e",
"text": "Epigenome-wide association studies represent one means of applying genome-wide assays to identify molecular events that could be associated with human phenotypes. The epigenome is especially intriguing as a target for study, as epigenetic regulatory processes are, by definition, heritable from parent to daughter cells and are found to have transcriptional regulatory properties. As such, the epigenome is an attractive candidate for mediating long-term responses to cellular stimuli, such as environmental effects modifying disease risk. Such epigenomic studies represent a broader category of disease -omics, which suffer from multiple problems in design and execution that severely limit their interpretability. Here we define many of the problems with current epigenomic studies and propose solutions that can be applied to allow this and other disease -omics studies to achieve their potential for generating valuable insights.",
"title": ""
}
] | scidocsrr |
c0159657811c724b694af1cb60a2c215 | How to increase and sustain positive emotion : The effects of expressing gratitude and visualizing best possible selves | [
{
"docid": "c03265e4a7d7cc14e6799c358a4af95a",
"text": "Three studies considered the consequences of writing, talking, and thinking about significant events. In Studies 1 and 2, students wrote, talked into a tape recorder, or thought privately about their worst (N = 96) or happiest experience (N = 111) for 15 min each during 3 consecutive days. In Study 3 (N = 112), students wrote or thought about their happiest day; half systematically analyzed, and half repetitively replayed this day. Well-being and health measures were administered before each study's manipulation and 4 weeks after. As predicted, in Study 1, participants who processed a negative experience through writing or talking reported improved life satisfaction and enhanced mental and physical health relative to those who thought about it. The reverse effect for life satisfaction was observed in Study 2, which focused on positive experiences. Study 3 examined possible mechanisms underlying these effects. Students who wrote about their happiest moments--especially when analyzing them--experienced reduced well-being and physical health relative to those who replayed these moments. Results are discussed in light of current understanding of the effects of processing life events.",
"title": ""
},
{
"docid": "f515695b3d404d29a12a5e8e58a91fc0",
"text": "One area of positive psychology analyzes subjective well-being (SWB), people's cognitive and affective evaluations of their lives. Progress has been made in understanding the components of SWB, the importance of adaptation and goals to feelings of well-being, the temperament underpinnings of SWB, and the cultural influences on well-being. Representative selection of respondents, naturalistic experience sampling measures, and other methodological refinements are now used to study SWB and could be used to produce national indicators of happiness.",
"title": ""
}
] | [
{
"docid": "88804f285f4d608b81a1cd741dbf2b7e",
"text": "Predicting ad click-through rates (CTR) is a massive-scale learning problem that is central to the multi-billion dollar online advertising industry. We present a selection of case studies and topics drawn from recent experiments in the setting of a deployed CTR prediction system. These include improvements in the context of traditional supervised learning based on an FTRL-Proximal online learning algorithm (which has excellent sparsity and convergence properties) and the use of per-coordinate learning rates.\n We also explore some of the challenges that arise in a real-world system that may appear at first to be outside the domain of traditional machine learning research. These include useful tricks for memory savings, methods for assessing and visualizing performance, practical methods for providing confidence estimates for predicted probabilities, calibration methods, and methods for automated management of features. Finally, we also detail several directions that did not turn out to be beneficial for us, despite promising results elsewhere in the literature. The goal of this paper is to highlight the close relationship between theoretical advances and practical engineering in this industrial setting, and to show the depth of challenges that appear when applying traditional machine learning methods in a complex dynamic system.",
"title": ""
},
{
"docid": "9256277615e0016992d007b29a2bcf21",
"text": "Three experiments explored how words are learned from hearing them across contexts. Adults watched 40-s videotaped vignettes of parents uttering target words (in sentences) to their infants. Videos were muted except for a beep or nonsense word inserted where each \"mystery word\" was uttered. Participants were to identify the word. Exp. 1 demonstrated that most (90%) of these natural learning instances are quite uninformative, whereas a small minority (7%) are highly informative, as indexed by participants' identification accuracy. Preschoolers showed similar information sensitivity in a shorter experimental version. Two further experiments explored how cross-situational information helps, by manipulating the serial ordering of highly informative vignettes in five contexts. Response patterns revealed a learning procedure in which only a single meaning is hypothesized and retained across learning instances, unless disconfirmed. Neither alternative hypothesized meanings nor details of past learning situations were retained. These findings challenge current models of cross-situational learning which assert that multiple meaning hypotheses are stored and cross-tabulated via statistical procedures. Learners appear to use a one-trial \"fast-mapping\" procedure, even under conditions of referential uncertainty.",
"title": ""
},
{
"docid": "7c27bfa849ba0bd49f9ddaec9beb19b5",
"text": "Very High Spatial Resolution (VHSR) large-scale SAR image databases are still an unresolved issue in the Remote Sensing field. In this work, we propose such a dataset and use it to explore patch-based classification in urban and periurban areas, considering 7 distinct semantic classes. In this context, we investigate the accuracy of large CNN classification models and pre-trained networks for SAR imaging systems. Furthermore, we propose a Generative Adversarial Network (GAN) for SAR image generation and test, whether the synthetic data can actually improve classification accuracy.",
"title": ""
},
{
"docid": "205a38ac9f2df57a33481d36576e7d54",
"text": "Business process improvement initiatives typically employ various process analysis techniques, including evidence-based analysis techniques such as process mining, to identify new ways to streamline current business processes. While plenty of process mining techniques have been proposed to extract insights about the way in which activities within processes are conducted, techniques to understand resource behaviour are limited. At the same time, an understanding of resources behaviour is critical to enable intelligent and effective resource management an important factor which can significantly impact overall process performance. The presence of detailed records kept by today’s organisations, including data about who, how, what, and when various activities were carried out by resources, open up the possibility for real behaviours of resources to be studied. This paper proposes an approach to analyse one aspect of resource behaviour: the manner in which a resource prioritises his/her work. The proposed approach has been formalised, implemented, and evaluated using a number of synthetic and real datasets. © 2017 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "c625221e79bdc508c7c772f5be0458a1",
"text": "Word embeddings that can capture semantic and syntactic information from contexts have been extensively used for various natural language processing tasks. However, existing methods for learning contextbased word embeddings typically fail to capture sufficient sentiment information. This may result in words with similar vector representations having an opposite sentiment polarity (e.g., good and bad), thus degrading sentiment analysis performance. Therefore, this study proposes a word vector refinement model that can be applied to any pre-trained word vectors (e.g., Word2vec and GloVe). The refinement model is based on adjusting the vector representations of words such that they can be closer to both semantically and sentimentally similar words and further away from sentimentally dissimilar words. Experimental results show that the proposed method can improve conventional word embeddings and outperform previously proposed sentiment embeddings for both binary and fine-grained classification on Stanford Sentiment Treebank (SST).",
"title": ""
},
{
"docid": "1e176f66a29b6bd3dfce649da1a4db9d",
"text": "In just a few years, crowdsourcing markets like Mechanical Turk have become the dominant mechanism for for building \"gold standard\" datasets in areas of computer science ranging from natural language processing to audio transcription. The assumption behind this sea change - an assumption that is central to the approaches taken in hundreds of research projects - is that crowdsourced markets can accurately replicate the judgments of the general population for knowledge-oriented tasks. Focusing on the important domain of semantic relatedness algorithms and leveraging Clark's theory of common ground as a framework, we demonstrate that this assumption can be highly problematic. Using 7,921 semantic relatedness judgements from 72 scholars and 39 crowdworkers, we show that crowdworkers on Mechanical Turk produce significantly different semantic relatedness gold standard judgements than people from other communities. We also show that algorithms that perform well against Mechanical Turk gold standard datasets do significantly worse when evaluated against other communities' gold standards. Our results call into question the broad use of Mechanical Turk for the development of gold standard datasets and demonstrate the importance of understanding these datasets from a human-centered point-of-view. More generally, our findings problematize the notion that a universal gold standard dataset exists for all knowledge tasks.",
"title": ""
},
{
"docid": "e3bb490de9489a0c02f023d25f0a94d7",
"text": "During the past two decades, self-efficacy has emerged as a highly effective predictor of students' motivation and learning. As a performance-based measure of perceived capability, self-efficacy differs conceptually and psychometrically from related motivational constructs, such as outcome expectations, self-concept, or locus of control. Researchers have succeeded in verifying its discriminant validity as well as convergent validity in predicting common motivational outcomes, such as students' activity choices, effort, persistence, and emotional reactions. Self-efficacy beliefs have been found to be sensitive to subtle changes in students' performance context, to interact with self-regulated learning processes, and to mediate students' academic achievement. Copyright 2000 Academic Press.",
"title": ""
},
{
"docid": "bef64076bf62d9e8fbb6fbaf5534fdc6",
"text": "This paper presents an application of PageRank, a random-walk model originally devised for ranking Web search results, to ranking WordNet synsets in terms of how strongly they possess a given semantic property. The semantic properties we use for exemplifying the approach are positivity and negativity, two properties of central importance in sentiment analysis. The idea derives from the observation that WordNet may be seen as a graph in which synsets are connected through the binary relation “a term belonging to synset sk occurs in the gloss of synset si”, and on the hypothesis that this relation may be viewed as a transmitter of such semantic properties. The data for this relation can be obtained from eXtended WordNet, a publicly available sensedisambiguated version of WordNet. We argue that this relation is structurally akin to the relation between hyperlinked Web pages, and thus lends itself to PageRank analysis. We report experimental results supporting our intuitions.",
"title": ""
},
{
"docid": "574838d3fecf8e8dfc4254b41d446ad2",
"text": "This paper proposes a new procedure to detect Glottal Closure and Opening Instants (GCIs and GOIs) directly from speech waveforms. The procedure is divided into two successive steps. First a mean-based signal is computed, and intervals where speech events are expected to occur are extracted from it. Secondly, at each interval a precise position of the speech event is assigned by locating a discontinuity in the Linear Prediction residual. The proposed method is compared to the DYPSA algorithm on the CMU ARCTIC database. A significant improvement as well as a better noise robustness are reported. Besides, results of GOI identification accuracy are promising for the glottal source characterization.",
"title": ""
},
{
"docid": "cee0d7bac437a3a98fa7aba31969341b",
"text": "Throughout history, the educational process used different educational technologies which did not significantly alter the manner of learning in the classroom. By implementing e-learning technology to the educational process, new and completely different innovative learning scenarios are made possible, including more active student involvement outside the traditional classroom. The quality of the realization of the educational objective in any learning environment depends primarily on the teacher who creates the educational process, mentors and acts as a moderator in the communication within the educational process, but also relies on the student who acquires the educational content. The traditional classroom learning and e-learning environment enable different manners of adopting educational content, and this paper reveals their key characteristics with the purpose of better use of e-learning technology in the educational process.",
"title": ""
},
{
"docid": "e0c87b957faf9c14ce96ed09f968e8ee",
"text": "It is well-known that the power factor of Vernier machines is small compared to permanent magnet machines. However, the power factor equations already derived show a huge deviation to the finite-element analysis (FEA) when used for Vernier machines with concentrated windings. Therefore, this paper develops an analytic model to calculate the power factor of Vernier machines with concentrated windings and different numbers of flux modulating poles (FMPs) and stator slots. The established model bases on the winding function theory in combination with a magnetic equivalent circuit. Consequently, equations for the q-inductance and for the no-load back-EMF of the machine are derived, thus allowing the calculation of the power factor. Thereby, the model considers stator leakage effects, as they are crucial for a good power factor estimation. Comparing the results of the Vernier machine to those of a pm machine explains the decreased power factor of Vernier machines. In addition, a FEA confirms the results of the derived model.",
"title": ""
},
{
"docid": "1d724b07c232098e2a5e5af2bb1e7c83",
"text": "[2] Brown SJ, McLean WH. One remarkable molecule: filaggrin. J Invest Dermatol 2012;132:751–62. [3] Sandilands A, Terron-Kwiatkowski A, Hull PR, O’Regan GM, Clayton TH, Watson RM, et al. Comprehensive analysis of the gene encoding filaggrin uncovers prevalent and rare mutations in ichthyosis vulgaris and atopic eczema. Nat Genet 2007;39:650–4. [4] Margolis DJ, Apter AJ, Gupta J, Hoffstad O, Papadopoulos M, Campbell LE, et al. The persistence of atopic dermatitis and Filaggrin mutations in a US longitudinal cohort. J Allergy Clin Immunol 2012;130(4):912–7. [5] Smith FJ, Irvine AD, Terron-Kwiatkowski A, Sandilands A, Campbell LE, Zhao Y, et al. Loss-of-function mutations in the gene encoding filaggrin cause ichthyosis vulgaris. Nat Genet 2006;38:337–42. [6] Paternoster L, Standl M, Chen CM, Ramasamy A, Bonnelykke K, Duijts L, et al. Meta-analysis of genome-wide association studies identifies three new risk Table 1 Reliability and validity comparisons for FLG null mutations as assayed by TaqMan and beadchip methods.",
"title": ""
},
{
"docid": "7843fb4bbf2e94a30c18b359076899ab",
"text": "In the area of magnetic resonance imaging (MRI), an extensive range of non-linear reconstruction algorithms has been proposed which can be used with general Fourier subsampling patterns. However, the design of these subsampling patterns has typically been considered in isolation from the reconstruction rule and the anatomy under consideration. In this paper, we propose a learning-based framework for optimizing MRI subsampling patterns for a specific reconstruction rule and anatomy, considering both the noiseless and noisy settings. Our learning algorithm has access to a representative set of training signals, and searches for a sampling pattern that performs well on average for the signals in this set. We present a novel parameter-free greedy mask selection method and show it to be effective for a variety of reconstruction rules and performance metrics. Moreover, we also support our numerical findings by providing a rigorous justification of our framework via statistical learning theory.",
"title": ""
},
{
"docid": "47199e959f3b10c6fa6b4b8c68434b94",
"text": "The everyday use of smartphones with high quality built-in cameras has lead to an increase in museum visitors' use of these devices to document and share their museum experiences. In this paper, we investigate how one particular photo sharing application, Instagram, is used to communicate visitors' experiences while visiting a museum of natural history. Based on an analysis of 222 instagrams created in the museum, as well as 14 interviews with the visitors who created them, we unpack the compositional resources and concerns contributing to the creation of instagrams in this particular context. By re-categorizing and re-configuring the museum environment, instagrammers work to construct their own narratives from their visits. These findings are then used to discuss what emerging multimedia practices imply for the visitors' engagement with and documentation of museum exhibits. Drawing upon these practices, we discuss the connection between online social media dialogue and the museum site.",
"title": ""
},
{
"docid": "4dc38ae50a2c806321020de4a140ed5f",
"text": "Transcranial direct current stimulation (tDCS) is a promising technology to enhance cognitive and physical performance. One of the major areas of interest is the enhancement of memory function in healthy individuals. The early arrival of tDCS on the market for lifestyle uses and cognitive enhancement purposes lead to the voicing of some important ethical concerns, especially because, to date, there are no official guidelines or evaluation procedures to tackle these issues. The aim of this article is to review ethical issues related to uses of tDCS for memory enhancement found in the ethics and neuroscience literature and to evaluate how realistic and scientifically well-founded these concerns are? In order to evaluate how plausible or speculative each issue is, we applied the methodological framework described by Racine et al. (2014) for \"informed and reflective\" speculation in bioethics. This framework could be succinctly presented as requiring: (1) the explicit acknowledgment of factual assumptions and identification of the value attributed to them; (2) the validation of these assumptions with interdisciplinary literature; and (3) the adoption of a broad perspective to support more comprehensive reflection on normative issues. We identified four major considerations associated with the development of tDCS for memory enhancement: safety, autonomy, justice and authenticity. In order to assess the seriousness and likelihood of harm related to each of these concerns, we analyzed the assumptions underlying the ethical issues, and the level of evidence for each of them. We identified seven distinct assumptions: prevalence, social acceptance, efficacy, ideological stance (bioconservative vs. libertarian), potential for misuse, long term side effects, and the delivery of complete and clear information. We conclude that ethical discussion about memory enhancement via tDCS sometimes involves undue speculation, and closer attention to scientific and social facts would bring a more nuanced analysis. At this time, the most realistic concerns are related to safety and violation of users' autonomy by a breach of informed consent, as potential immediate and long-term health risks to private users remain unknown or not well defined. Clear and complete information about these risks must be provided to research participants and consumers of tDCS products or related services. Broader public education initiatives and warnings would also be worthwhile to reach those who are constructing their own tDCS devices.",
"title": ""
},
{
"docid": "65e320e250cbeb8942bf00f335be4cbd",
"text": "In this paper, we propose a deep progressive reinforcement learning (DPRL) method for action recognition in skeleton-based videos, which aims to distil the most informative frames and discard ambiguous frames in sequences for recognizing actions. Since the choices of selecting representative frames are multitudinous for each video, we model the frame selection as a progressive process through deep reinforcement learning, during which we progressively adjust the chosen frames by taking two important factors into account: (1) the quality of the selected frames and (2) the relationship between the selected frames to the whole video. Moreover, considering the topology of human body inherently lies in a graph-based structure, where the vertices and edges represent the hinged joints and rigid bones respectively, we employ the graph-based convolutional neural network to capture the dependency between the joints for action recognition. Our approach achieves very competitive performance on three widely used benchmarks.",
"title": ""
},
{
"docid": "bbf987eef74d76cf2916ae3080a2b174",
"text": "The facial system plays an important role in human-robot interaction. EveR-4 H33 is a head system for an android face controlled by thirty-three motors. It consists of three layers: a mechanical layer, an inner cover layer and an outer cover layer. Motors are attached under the skin and some motors are correlated with each other. Some expressions cannot be shown by moving just one motor. In addition, moving just one motor can cause damage to other motors or the skin. To solve these problems, a facial muscle control method that controls motors in a correlated manner is required. We designed a facial muscle control method and applied it to EveR-4 H33. We develop the actress robot EveR-4A by applying the EveR-4 H33 to the 24 degrees of freedom upper body and mannequin legs. EveR-4A shows various facial expressions with lip synchronization using our facial muscle control method.",
"title": ""
},
{
"docid": "81190a4c576f86444a95e75654bddf29",
"text": "Enforcing a variety of security measures (such as intrusion detection systems, and so on) can provide a certain level of protection to computer networks. However, such security practices often fall short in face of zero-day attacks. Due to the information asymmetry between attackers and defenders, detecting zero-day attacks remains a challenge. Instead of targeting individual zero-day exploits, revealing them on an attack path is a substantially more feasible strategy. Such attack paths that go through one or more zero-day exploits are called zero-day attack paths. In this paper, we propose a probabilistic approach and implement a prototype system ZePro for zero-day attack path identification. In our approach, a zero-day attack path is essentially a graph. To capture the zero-day attack, a dependency graph named object instance graph is first built as a supergraph by analyzing system calls. To further reveal the zero-day attack paths hidden in the supergraph, our system builds a Bayesian network based upon the instance graph. By taking intrusion evidence as input, the Bayesian network is able to compute the probabilities of object instances being infected. Connecting the high-probability-instances through dependency relations forms a path, which is the zero-day attack path. The experiment results demonstrate the effectiveness of ZePro for zero-day attack path identification.",
"title": ""
},
{
"docid": "4b90fefa981e091ac6a5d2fd83e98b66",
"text": "This paper explores an analysis-aware data cleaning architecture for a large class of SPJ SQL queries. In particular, we propose QuERy, a novel framework for integrating entity resolution (ER) with query processing. The aim of QuERy is to correctly and efficiently answer complex queries issued on top of dirty data. The comprehensive empirical evaluation of the proposed solution demonstrates its significant advantage in terms of efficiency over the traditional techniques for the given problem settings.",
"title": ""
},
{
"docid": "3630c575bf7b5250930c7c54d8a1c6d0",
"text": "The RCSB Protein Data Bank (RCSB PDB, http://www.rcsb.org) provides access to 3D structures of biological macromolecules and is one of the leading resources in biology and biomedicine worldwide. Our efforts over the past 2 years focused on enabling a deeper understanding of structural biology and providing new structural views of biology that support both basic and applied research and education. Herein, we describe recently introduced data annotations including integration with external biological resources, such as gene and drug databases, new visualization tools and improved support for the mobile web. We also describe access to data files, web services and open access software components to enable software developers to more effectively mine the PDB archive and related annotations. Our efforts are aimed at expanding the role of 3D structure in understanding biology and medicine.",
"title": ""
}
] | scidocsrr |
1057b1673d4ac7b30c702bff9c449e9e | Malware Detection with Deep Neural Network Using Process Behavior | [
{
"docid": "4ca5fec568185d3699c711cc86104854",
"text": "Attackers often create systems that automatically rewrite and reorder their malware to avoid detection. Typical machine learning approaches, which learn a classifier based on a handcrafted feature vector, are not sufficiently robust to such reorderings. We propose a different approach, which, similar to natural language modeling, learns the language of malware spoken through the executed instructions and extracts robust, time domain features. Echo state networks (ESNs) and recurrent neural networks (RNNs) are used for the projection stage that extracts the features. These models are trained in an unsupervised fashion. A standard classifier uses these features to detect malicious files. We explore a few variants of ESNs and RNNs for the projection stage, including Max-Pooling and Half-Frame models which we propose. The best performing hybrid model uses an ESN for the recurrent model, Max-Pooling for non-linear sampling, and logistic regression for the final classification. Compared to the standard trigram of events model, it improves the true positive rate by 98.3% at a false positive rate of 0.1%.",
"title": ""
}
] | [
{
"docid": "45636bc97812ecfd949438c2e8ee9d52",
"text": "Single-image super-resolution is a fundamental task for vision applications to enhance the image quality with respect to spatial resolution. If the input image contains degraded pixels, the artifacts caused by the degradation could be amplified by superresolution methods. Image blur is a common degradation source. Images captured by moving or still cameras are inevitably affected by motion blur due to relative movements between sensors and objects. In this work, we focus on the super-resolution task with the presence of motion blur. We propose a deep gated fusion convolution neural network to generate a clear high-resolution frame from a single natural image with severe blur. By decomposing the feature extraction step into two task-independent streams, the dualbranch design can facilitate the training process by avoiding learning the mixed degradation all-in-one and thus enhance the final high-resolution prediction results. Extensive experiments demonstrate that our method generates sharper super-resolved images from low-resolution inputs with high computational efficiency.",
"title": ""
},
{
"docid": "d11c2dd512f680e79706f73d4cd3d0aa",
"text": "We describe the class of convexified convolutional neural networks (CCNNs), which capture the parameter sharing of convolutional neural networks in a convex manner. By representing the nonlinear convolutional filters as vectors in a reproducing kernel Hilbert space, the CNN parameters can be represented in terms of a lowrank matrix, and the rank constraint can be relaxed so as to obtain a convex optimization problem. For learning two-layer convolutional neural networks, we prove that the generalization error obtained by a convexified CNN converges to that of the best possible CNN. For learning deeper networks, we train CCNNs in a layerwise manner. Empirically, we find that CCNNs achieve competitive or better performance than CNNs trained by backpropagation, SVMs, fully-connected neural networks, stacked denoising auto-encoders, and other baseline methods.",
"title": ""
},
{
"docid": "096249a1b13cd994427eacddc8af3cf6",
"text": "Many factors influence the adoption of cloud computing. Organizations must systematically evaluate these factors before deciding to adopt cloud-based solutions. To assess the determinants that influence the adoption of cloud computing, we develop a research model based on the innovation characteristics from the diffusion of innovation (DOI) theory and the technology-organization-environment (TOE) framework. Data collected from 369 firms in Portugal are used to test the related hypotheses. The study also investigates the determinants of cloud-computing adoption in the manufacturing and services sectors. 2014 Elsevier B.V. All rights reserved. * Corresponding author. Tel.: +351 914 934 438. E-mail addresses: toliveira@isegi.unl.pt (T. Oliveira), mthomas@vcu.edu (M. Thomas), mariana.espadanal@gmail.com (M. Espadanal).",
"title": ""
},
{
"docid": "873a24a210aa57fc22895500530df2ba",
"text": "We describe the winning entry to the Amazon Picking Challenge. From the experience of building this system and competing in the Amazon Picking Challenge, we derive several conclusions: 1) We suggest to characterize robotic system building along four key aspects, each of them spanning a spectrum of solutions—modularity vs. integration, generality vs. assumptions, computation vs. embodiment, and planning vs. feedback. 2) To understand which region of each spectrum most adequately addresses which robotic problem, we must explore the full spectrum of possible approaches. To achieve this, our community should agree on key aspects that characterize the solution space of robotic systems. 3) For manipulation problems in unstructured environments, certain regions of each spectrum match the problem most adequately, and should be exploited further. This is supported by the fact that our solution deviated from the majority of the other challenge entries along each of the spectra.",
"title": ""
},
{
"docid": "7e51bffe62c16cdc517a7c1cbd4ac3fe",
"text": "Information is a perennially significant business asset in all organizations. Therefore, it must be protected as any other valuable asset. This is the objective of information security, and an information security program provides this kind of protection for a company’s information assets and for the company as a whole. One of the best ways to address information security problems in the corporate world is through a risk-based approach. In this paper, we present a taxonomy of security risk assessment drawn from 125 papers published from 1995 to May 2014. Organizations with different size may face problems in selecting suitable risk assessment methods that satisfy their needs. Although many risk-based approaches have been proposed, most of them are based on the old taxonomy, avoiding the need for considering and applying the important criteria in assessing risk raised by rapidly changing technologies and the attackers knowledge level. In this paper, we discuss the key features of risk assessment that should be included in an information security management system. We believe that our new risk assessment taxonomy helps organizations to not only understand the risk assessment better by comparing different new concepts but also select a suitable way to conduct the risk assessment properly. Moreover, this taxonomy will open up interesting avenues for future research in the growing field of security risk assessment.",
"title": ""
},
{
"docid": "82a4bac1745e2d5dd9e39c5a4bf5b3e9",
"text": "Meaning can be as important as usability in the design of technology.",
"title": ""
},
{
"docid": "c95e58c054855c60b16db4816c626ecb",
"text": "Markerless tracking of human pose is a hard yet relevant problem. In this paper, we derive an efficient filtering algorithm for tracking human pose using a stream of monocular depth images. The key idea is to combine an accurate generative model — which is achievable in this setting using programmable graphics hardware — with a discriminative model that provides data-driven evidence about body part locations. In each filter iteration, we apply a form of local model-based search that exploits the nature of the kinematic chain. As fast movements and occlusion can disrupt the local search, we utilize a set of discriminatively trained patch classifiers to detect body parts. We describe a novel algorithm for propagating this noisy evidence about body part locations up the kinematic chain using the un-scented transform. The resulting distribution of body configurations allows us to reinitialize the model-based search. We provide extensive experimental results on 28 real-world sequences using automatic ground-truth annotations from a commercial motion capture system.",
"title": ""
},
{
"docid": "90a9e56cc5a2f9c149dfb33d3446f095",
"text": "The author explores the viability of a comparative approach to personality research. A review of the diverse animal-personality literature suggests that (a) most research uses trait constructs, focuses on variation within (vs. across) species, and uses either behavioral codings or trait ratings; (b) ratings are generally reliable and show some validity (7 parameters that could influence reliability and 4 challenges to validation are discussed); and (c) some dimensions emerge across species, but summaries are hindered by a lack of standard descriptors. Arguments for and against cross-species comparisons are discussed, and research guidelines are suggested. Finally, a research agenda guided by evolutionary and ecological principles is proposed. It is concluded that animal studies provide unique opportunities to examine biological, genetic, and environmental bases of personality and to study personality change, personality-health links, and personality perception.",
"title": ""
},
{
"docid": "67d141b8e53e1398b6988e211d16719e",
"text": "the recent advancement of networking technology has enabled the streaming of video content over wired/wireless network to a great extent. Video streaming includes various types of video content, namely, IP television (IPTV), Video on demand (VOD), Peer-to-Peer (P2P) video sharing, Voice (and video) over IP (VoIP) etc. The consumption of the video contents has been increasing a lot these days and promises a huge potential for the network provider, content provider and device manufacturers. However, from the end user's perspective there is no universally accepted existing standard metric, which will ensure the quality of the application/utility to meet the user's desired experience. In order to fulfill this gap, a new metric, called Quality of Experience (QoE), has been proposed in numerous researches recently. Our aim in this paper is to research the evolution of the term QoE, find the influencing factors of QoE metric especially in video streaming and finally QoE modelling and methodologies in practice.",
"title": ""
},
{
"docid": "f393b6e00ef1e97f683a5dace33e40ff",
"text": "s on human factors in computing systems (pp. 815–828). ACM New York, NY, USA. Hudlicka, E. (1997). Summary of knowledge elicitation techniques for requirements analysis (Course material for human computer interaction). Worcester Polytechnic Institute. Kaptelinin, V., & Nardi, B. (2012). Affordances in HCI: Toward a mediated action perspective. In Proceedings of CHI '12 (pp. 967–976).",
"title": ""
},
{
"docid": "77ec1741e7a0876a0fe9fb85dd57f552",
"text": "Despite growing recognition that attention fluctuates from moment-to-moment during sustained performance, prevailing analysis strategies involve averaging data across multiple trials or time points, treating these fluctuations as noise. Here, using alternative approaches, we clarify the relationship between ongoing brain activity and performance fluctuations during sustained attention. We introduce a novel task (the gradual onset continuous performance task), along with innovative analysis procedures that probe the relationships between reaction time (RT) variability, attention lapses, and intrinsic brain activity. Our results highlight 2 attentional states-a stable, less error-prone state (\"in the zone\"), characterized by higher default mode network (DMN) activity but during which subjects are at risk of erring if DMN activity rises beyond intermediate levels, and a more effortful mode of processing (\"out of the zone\"), that is less optimal for sustained performance and relies on activity in dorsal attention network (DAN) regions. These findings motivate a new view of DMN and DAN functioning capable of integrating seemingly disparate reports of their role in goal-directed behavior. Further, they hold potential to reconcile conflicting theories of sustained attention, and represent an important step forward in linking intrinsic brain activity to behavioral phenomena.",
"title": ""
},
{
"docid": "229605eada4ca390d17c5ff168c6199a",
"text": "The sharing economy is a new online community that has important implications for offline behavior. This study evaluates whether engagement in the sharing economy is associated with an actor’s aversion to risk. Using a web-based survey and a field experiment, we apply an adaptation of Holt and Laury’s (2002) risk lottery game to a representative sample of sharing economy participants. We find that frequency of activity in the sharing economy predicts risk aversion, but only in interaction with satisfaction. While greater satisfaction with sharing economy websites is associated with a decrease in risk aversion, greater frequency of usage is associated with greater risk aversion. This analysis shows the limitations of a static perspective on how risk attitudes relate to participation in the sharing economy.",
"title": ""
},
{
"docid": "65a990303d1d6efd3aea5307e7db9248",
"text": "The presentation of news articles to meet research needs has traditionally been a document-centric process. Yet users often want to monitor developing news stories based on an event, rather than by examining an exhaustive list of retrieved documents. In this work, we illustrate a news retrieval system, eventNews, and an underlying algorithm which is event-centric. Through this system, news articles are clustered around a single news event or an event and its sub-events. The algorithm presented can leverage the creation of new Reuters stories and their compact labels as seed documents for the clustering process. The system is configured to generate top-level clusters for news events based on an editorially supplied topical label, known as a ‘slugline,’ and to generate sub-topic-focused clusters based on the algorithm. The system uses an agglomerative clustering algorithm to gather and structure documents into distinct result sets. Decisions on whether to merge related documents or clusters are made according to the similarity of evidence derived from two distinct sources, one, relying on a digital signature based on the unstructured text in the document, the other based on the presence of named entity tags that have been assigned to the document by a named entity tagger, in this case Thomson Reuters’ Calais engine. Copyright c © 2016 for the individual papers by the paper’s authors. Copying permitted for private and academic purposes. This volume is published and copyrighted by its editors. In: M. Martinez, U. Kruschwitz, G. Kazai, D. Corney, F. Hopfgartner, R. Campos and D. Albakour (eds.): Proceedings of the NewsIR’16 Workshop at ECIR, Padua, Italy, 20-March-2016, published at http://ceur-ws.org",
"title": ""
},
{
"docid": "5ed74b235edcbcb5aeb5b6b3680e2122",
"text": "Self-paced learning (SPL) mimics the cognitive mechanism o f humans and animals that gradually learns from easy to hard samples. One key issue in SPL is to obtain better weighting strategy that is determined by mini zer function. Existing methods usually pursue this by artificially designing th e explicit form of SPL regularizer. In this paper, we focus on the minimizer functi on, and study a group of new regularizer, named self-paced implicit regularizer th at is deduced from robust loss function. Based on the convex conjugacy theory, the min imizer function for self-paced implicit regularizer can be directly learned fr om the latent loss function, while the analytic form of the regularizer can be even known. A general framework (named SPL-IR) for SPL is developed accordingly. We dem onstrate that the learning procedure of SPL-IR is associated with latent robu st loss functions, thus can provide some theoretical inspirations for its working m echanism. We further analyze the relation between SPL-IR and half-quadratic opt imization. Finally, we implement SPL-IR to both supervised and unsupervised tasks , nd experimental results corroborate our ideas and demonstrate the correctn ess and effectiveness of implicit regularizers.",
"title": ""
},
{
"docid": "e141a1c5c221aa97db98534b339694cb",
"text": "Despite the tremendous popularity and great potential, the field of Enterprise Resource Planning (ERP) adoption and implementation is littered with remarkable failures. Though many contributing factors have been cited in the literature, we argue that the integrated nature of ERP systems, which generally requires an organization to adopt standardized business processes reflected in the design of the software, is a key factor contributing to these failures. We submit that the integration and standardization imposed by most ERP systems may not be suitable for all types of organizations and thus the ‘‘fit’’ between the characteristics of the adopting organization and the standardized business process designs embedded in the adopted ERP system affects the likelihood of implementation success or failure. In this paper, we use the structural contingency theory to identify a set of dimensions of organizational structure and ERP system characteristics that can be used to gauge the degree of fit, thus providing some insights into successful ERP implementations. Propositions are developed based on analyses regarding the success of ERP implementations in different types of organizations. These propositions also provide directions for future research that might lead to prescriptive guidelines for managers of organizations contemplating implementing ERP systems. r 2008 Elsevier Ltd. All rights reserved.",
"title": ""
},
{
"docid": "2cc55b2cf34d363de50b220a5ced5676",
"text": "We report an imaging scheme, termed aperture-scanning Fourier ptychography, for 3D refocusing and super-resolution macroscopic imaging. The reported scheme scans an aperture at the Fourier plane of an optical system and acquires the corresponding intensity images of the object. The acquired images are then synthesized in the frequency domain to recover a high-resolution complex sample wavefront; no phase information is needed in the recovery process. We demonstrate two applications of the reported scheme. In the first example, we use an aperture-scanning Fourier ptychography platform to recover the complex hologram of extended objects. The recovered hologram is then digitally propagated into different planes along the optical axis to examine the 3D structure of the object. We also demonstrate a reconstruction resolution better than the detector pixel limit (i.e., pixel super-resolution). In the second example, we develop a camera-scanning Fourier ptychography platform for super-resolution macroscopic imaging. By simply scanning the camera over different positions, we bypass the diffraction limit of the photographic lens and recover a super-resolution image of an object placed at the far field. This platform's maximum achievable resolution is ultimately determined by the camera's traveling range, not the aperture size of the lens. The FP scheme reported in this work may find applications in 3D object tracking, synthetic aperture imaging, remote sensing, and optical/electron/X-ray microscopy.",
"title": ""
},
{
"docid": "a4790fdc5f6469b45fa4a22a871f3501",
"text": "NSGA ( [5]) is a popular non-domination based genetic algorithm for multiobjective optimization. It is a very effective algorithm but has been generally criticized for its computational complexity, lack of elitism and for choosing the optimal parameter value for sharing parameter σshare. A modified version, NSGAII ( [3]) was developed, which has a better sorting algorithm , incorporates elitism and no sharing parameter needs to be chosen a priori. NSGA-II is discussed in detail in this.",
"title": ""
},
{
"docid": "790895861cb5bba78513d26c1eb30e4c",
"text": "This paper develops an integrated approach, combining quality function deployment (QFD), fuzzy set theory, and analytic hierarchy process (AHP) approach, to evaluate and select the optimal third-party logistics service providers (3PLs). In the approach, multiple evaluating criteria are derived from the requirements of company stakeholders using a series of house of quality (HOQ). The importance of evaluating criteria is prioritized with respect to the degree of achieving the stakeholder requirements using fuzzy AHP. Based on the ranked criteria, alternative 3PLs are evaluated and compared with each other using fuzzy AHP again to make an optimal selection. The effectiveness of proposed approach is demonstrated by applying it to a Hong Kong based enterprise that supplies hard disk components. The proposed integrated approach outperforms the existing approaches because the outsourcing strategy and 3PLs selection are derived from the corporate/business strategy.",
"title": ""
},
{
"docid": "c6347c06d84051023baaab39e418fb65",
"text": "This paper presents a complete approach to a successful utilization of a high-performance extreme learning machines (ELMs) Toolbox for Big Data. It summarizes recent advantages in algorithmic performance; gives a fresh view on the ELM solution in relation to the traditional linear algebraic performance; and reaps the latest software and hardware performance achievements. The results are applicable to a wide range of machine learning problems and thus provide a solid ground for tackling numerous Big Data challenges. The included toolbox is targeted at enabling the full potential of ELMs to the widest range of users.",
"title": ""
},
{
"docid": "db570f8ff8d714dc2964a9d9b7032bf4",
"text": "Pain related to the osseous thoracolumbar spine is common in the equine athlete, with minimal information available regarding soft tissue pathology. The aims of this study were to describe the anatomy of the equine SSL and ISL (supraspinous and interspinous ligaments) in detail and to assess the innervation of the ligaments and their myofascial attachments including the thoracolumbar fascia. Ten equine thoracolumbar spines (T15-L1) were dissected to define structure and anatomy of the SSL, ISL and adjacent myofascial attachments. Morphological evaluation included histology, electron microscopy and immunohistochemistry (S100 and Substance P) of the SSL, ISL, adjacent fascial attachments, connective tissue and musculature. The anatomical study demonstrated that the SSL and ISL tissues merge with the adjacent myofascia. The ISL has a crossing fibre arrangement consisting of four ligamentous layers with adipose tissue axially. A high proportion of single nerve fibres were detected in the SSL (mean = 2.08 fibres/mm2 ) and ISL (mean = 0.75 fibres/mm2 ), with the larger nerves located between the ligamentous and muscular tissue. The oblique crossing arrangement of the fibres of the ISL likely functions to resist distractive and rotational forces, therefore stabilizing the equine thoracolumbar spine. The dense sensory innervation within the SSL and ISL could explain the severe pain experienced by some horses with impinging dorsal spinous processes. Documentation of the nervous supply of the soft tissues associated with the dorsal spinous processes is a key step towards improving our understanding of equine back pain.",
"title": ""
}
] | scidocsrr |
7756fecd9ab8249bfdc7efa52631a32c | User behavior analysis in web log through comparative study of Eclat and Apriori | [
{
"docid": "55b405991dc250cd56be709d53166dca",
"text": "In Data Mining, the usefulness of association rules is strongly limited by the huge amount of delivered rules. To overcome this drawback, several methods were proposed in the literature such as item set concise representations, redundancy reduction, and post processing. However, being generally based on statistical information, most of these methods do not guarantee that the extracted rules are interesting for the user. Thus, it is crucial to help the decision-maker with an efficient post processing step in order to reduce the number of rules. This paper proposes a new interactive approach to prune and filter discovered rules. First, we propose to use ontologies in order to improve the integration of user knowledge in the post processing task. Second, we propose the Rule Schema formalism extending the specification language proposed by Liu et al. for user expectations. Furthermore, an interactive framework is designed to assist the user throughout the analyzing task. Applying our new approach over voluminous sets of rules, we were able, by integrating domain expert knowledge in the post processing step, to reduce the number of rules to several dozens or less. Moreover, the quality of the filtered rules was validated by the domain expert at various points in the interactive process. KeywordsClustering, classification, and association rules, interactive data exploration and discovery, knowledge management applications.",
"title": ""
}
] | [
{
"docid": "a2d06f6e3fbb7260346688acd02772c3",
"text": "Lane change is a crucial vehicle maneuver which needs coordination with surrounding vehicles. Automated lane changing functions built on rule-based models may perform well under pre-defined operating conditions, but they may be prone to failure when unexpected situations are encountered. In our study, we proposed a Reinforcement Learning based approach to train the vehicle agent to learn an automated lane change behavior such that it can intelligently make a lane change under diverse and even unforeseen scenarios. Particularly, we treated both state space and action space as continuous, and designed a Q-function approximator that has a closed-form greedy policy, which contributes to the computation efficiency of our deep Q-learning algorithm. Extensive simulations are conducted for training the algorithm, and the results illustrate that the Reinforcement Learning based vehicle agent is capable of learning a smooth and efficient driving policy for lane change maneuvers.",
"title": ""
},
{
"docid": "9be0134d63fbe6978d786280fb133793",
"text": "Yann Le Cun AT&T Bell Labs Holmdel NJ 07733 We introduce a new approach for on-line recognition of handwritten words written in unconstrained mixed style. The preprocessor performs a word-level normalization by fitting a model of the word structure using the EM algorithm. Words are then coded into low resolution \"annotated images\" where each pixel contains information about trajectory direction and curvature. The recognizer is a convolution network which can be spatially replicated. From the network output, a hidden Markov model produces word scores. The entire system is globally trained to minimize word-level errors.",
"title": ""
},
{
"docid": "e5bc5b3e4f2833bc8e49a360c050cd8a",
"text": "Research into workplace bullying has continued to grow and mature since emerging from Scandinavian investigations into school bullying in the late 1970s. Research communities now exist well beyond Scandinavia, including Europe, the UK, Australia, Asia and the USA. While the terms ‘harassment’ and ‘mobbing’ are often used to describe bullying behaviour, ‘workplace bullying’ tends to be the most consistently used term throughout the research community. In the past two decades especially, researchers have made considerable advances in developing conceptual clarity, frameworks and theoretical explanations that help explain and address this very complex, but often oversimplified and misunderstood, phenomenon. Indeed, as a phenomenon, workplace bullying is now better understood with reasonably consistent research findings in relation to its prevalence; its negative effects on targets, bystanders and organizational effectiveness; and some of its likely antecedents. However, as highlighted in this review, many challenges remain, particularly in relation to its theoretical foundations and efficacy of prevention and management strategies. Drawing on Affective Events Theory, this review advances understanding through the development of a new conceptual model and analysis of its interrelated components, which explain the dynamic and complex nature of workplace bullying and emphasize current and future debates. Gaps in the literature and future research directions are discussed, including the vexing problem of developing an agreed definition of workplace bullying among the research community, the emergence of cyberbullying, the importance of bystanders in addressing the phenomenon and the use of both formal and informal approaches to prevention and intervention.",
"title": ""
},
{
"docid": "92ca52ab5110eb3b7efb7c2e0a8aa527",
"text": "A new internal multiband mobile phone antenna formed by two printed monopole slots of different lengths cut at the edge of the system ground plane of the mobile phone is presented. The antenna can generate two wide bands centered at about 900 and 2100 MHz to cover the GSM850/GSM900/DCS/PCS/UMTS bands and the 2.4-GHz WLAN band. Further, the antenna has a simple planar structure and occupies a small area of only. It is also promising to bend the antenna into an L shape to reduce its volume occupied inside the mobile phone. Good radiation characteristics are obtained over the two wide operating bands.",
"title": ""
},
{
"docid": "b52a29cd426c5861dbb97aeb91efda4b",
"text": "In recent years, inexact computing has been increasingly regarded as one of the most promising approaches for slashing energy consumption in many applications that can tolerate a certain degree of inaccuracy. Driven by the principle of trading tolerable amounts of application accuracy in return for significant resource savings-the energy consumed, the (critical path) delay, and the (silicon) area-this approach has been limited to application-specified integrated circuits (ASICs) so far. These ASIC realizations have a narrow application scope and are often rigid in their tolerance to inaccuracy, as currently designed; the latter often determining the extent of resource savings we would achieve. In this paper, we propose to improve the application scope, error resilience and the energy savings of inexact computing by combining it with hardware neural networks. These neural networks are fast emerging as popular candidate accelerators for future heterogeneous multicore platforms and have flexible error resilience limits owing to their ability to be trained. Our results in 65-nm technology demonstrate that the proposed inexact neural network accelerator could achieve 1.78-2.67× savings in energy consumption (with corresponding delay and area savings being 1.23 and 1.46×, respectively) when compared to the existing baseline neural network implementation, at the cost of a small accuracy loss (mean squared error increases from 0.14 to 0.20 on average).",
"title": ""
},
{
"docid": "440e9d166e84712bfbd927e3e13d9476",
"text": "Uyghur text detection is crucial to a variety of real-world applications, while little researches put their attention on it. In this paper, we develop an effective and efficient region-based convolutional neural network for Uyghur text detection in complex background images. The characteristics of the network include: (1) Three region proposal networks are used to improve the recall, which simultaneously utilize feature maps from different convolutional layers. (2) The overall architecture of our network is in the form of fully convolutional network, and global average pooling is applied to replace the fully connected layers in the classification and bounding box regression layers. (3) To fully utilize the baseline information, Uyghur text lines are detected directly by the network in an end-to-end fashion. Experiment results on benchmark dataset show that our method achieves an F-measure of 0.83 and detection time of 0.6 s for each image in a single K20c GPU, which is much faster than the state-of-the-art methods while keeps competitive accuracy.",
"title": ""
},
{
"docid": "d9615510bb6cf2cb2d8089be402c193c",
"text": "Tagging plays an important role in many recent websites. Recommender systems can help to suggest a user the tags he might want to use for tagging a specific item. Factorization models based on the Tucker Decomposition (TD) model have been shown to provide high quality tag recommendations outperforming other approaches like PageRank, FolkRank, collaborative filtering, etc. The problem with TD models is the cubic core tensor resulting in a cubic runtime in the factorization dimension for prediction and learning.\n In this paper, we present the factorization model PITF (Pairwise Interaction Tensor Factorization) which is a special case of the TD model with linear runtime both for learning and prediction. PITF explicitly models the pairwise interactions between users, items and tags. The model is learned with an adaption of the Bayesian personalized ranking (BPR) criterion which originally has been introduced for item recommendation. Empirically, we show on real world datasets that this model outperforms TD largely in runtime and even can achieve better prediction quality. Besides our lab experiments, PITF has also won the ECML/PKDD Discovery Challenge 2009 for graph-based tag recommendation.",
"title": ""
},
{
"docid": "4bac03c1e5c5cad93595dd38954a8a94",
"text": "This paper addresses the problem of path prediction for multiple interacting agents in a scene, which is a crucial step for many autonomous platforms such as self-driving cars and social robots. We present SoPhie; an interpretable framework based on Generative Adversarial Network (GAN), which leverages two sources of information, the path history of all the agents in a scene, and the scene context information, using images of the scene. To predict a future path for an agent, both physical and social information must be leveraged. Previous work has not been successful to jointly model physical and social interactions. Our approach blends a social attention mechanism with a physical attention that helps the model to learn where to look in a large scene and extract the most salient parts of the image relevant to the path. Whereas, the social attention component aggregates information across the different agent interactions and extracts the most important trajectory information from the surrounding neighbors. SoPhie also takes advantage of GAN to generates more realistic samples and to capture the uncertain nature of the future paths by modeling its distribution. All these mechanisms enable our approach to predict socially and physically plausible paths for the agents and to achieve state-of-the-art performance on several different trajectory forecasting benchmarks.",
"title": ""
},
{
"docid": "e31901738e78728a7376457f7d1acd26",
"text": "Feature selection plays a critical role in biomedical data mining, driven by increasing feature dimensionality in target problems and growing interest in advanced but computationally expensive methodologies able to model complex associations. Specifically, there is a need for feature selection methods that are computationally efficient, yet sensitive to complex patterns of association, e.g. interactions, so that informative features are not mistakenly eliminated prior to downstream modeling. This paper focuses on Relief-based algorithms (RBAs), a unique family of filter-style feature selection algorithms that have gained appeal by striking an effective balance between these objectives while flexibly adapting to various data characteristics, e.g. classification vs. regression. First, this work broadly examines types of feature selection and defines RBAs within that context. Next, we introduce the original Relief algorithm and associated concepts, emphasizing the intuition behind how it works, how feature weights generated by the algorithm can be interpreted, and why it is sensitive to feature interactions without evaluating combinations of features. Lastly, we include an expansive review of RBA methodological research beyond Relief and its popular descendant, ReliefF. In particular, we characterize branches of RBA research, and provide comparative summaries of RBA algorithms including contributions, strategies, functionality, time complexity, adaptation to key data characteristics, and software availability.",
"title": ""
},
{
"docid": "1bc81463278f9efcd098c36dba8cafad",
"text": "T value of promotional marketing and word-of-mouth (WOM) is well recognized, but few studies have compared the effects of these two types of information in online settings. This research examines the effect of marketing efforts and online WOM on product sales by measuring the effects of online coupons, sponsored keyword search, and online reviews. It aims to understand the relationship between firms’ promotional marketing and WOM in the context of a third party review platform. Using a three-year panel data set from one of the biggest restaurant review websites in China, the study finds that both online promotional marketing and reviews have a significant impact on product sales, which suggests promotional marketing on third party review platforms is still an effective marketing tool. This research further explores the interaction effects between WOM and promotional marketing when these two types of information coexist. The results demonstrate a substitute relationship between the WOM volume and coupon offerings, but a complementary relationship between WOM volume and keyword advertising.",
"title": ""
},
{
"docid": "e74d1eb4f1d5c45989aff2cb0e79a83e",
"text": "Environmental audio tagging is a newly proposed task to predict the presence or absence of a specific audio event in a chunk. Deep neural network (DNN) based methods have been successfully adopted for predicting the audio tags in the domestic audio scene. In this paper, we propose to use a convolutional neural network (CNN) to extract robust features from mel-filter banks (MFBs), spectrograms or even raw waveforms for audio tagging. Gated recurrent unit (GRU) based recurrent neural networks (RNNs) are then cascaded to model the long-term temporal structure of the audio signal. To complement the input information, an auxiliary CNN is designed to learn on the spatial features of stereo recordings. We evaluate our proposed methods on Task 4 (audio tagging) of the Detection and Classification of Acoustic Scenes and Events 2016 (DCASE 2016) challenge. Compared with our recent DNN-based method, the proposed structure can reduce the equal error rate (EER) from 0.13 to 0.11 on the development set. The spatial features can further reduce the EER to 0.10. The performance of the end-to-end learning on raw waveforms is also comparable. Finally, on the evaluation set, we get the state-of-the-art performance with 0.12 EER while the performance of the best existing system is 0.15 EER.",
"title": ""
},
{
"docid": "20d02454fd850d8a7e05123a1769d44b",
"text": "We describe the extension and objective evaluation of a network of semantically related noun senses (or concepts) that has been automatically acquired by analyzing lexical cooccurrence in Wikipedia. The acquisition process makes no use of the metadata or links that have been manually built into the encyclopedia, and nouns in the network are automatically disambiguated to their corresponding noun senses without supervision. For this task, we use the noun sense inventory of WordNet 3.0. Thus, this work can be conceived of as augmenting the WordNet noun ontology with unweighted, undirected relatedto edges between synsets. Our network contains 208,832 such edges. We evaluate our network’s performance on a word sense disambiguation (WSD) task and show: a) the network is competitive with WordNet when used as a stand-alone knowledge source for two WSD algorithms; b) combining our network with WordNet achieves disambiguation results that exceed the performance of either resource individually; and c) our network outperforms a similar resource that has been automatically derived from semantic annotations in the Wikipedia corpus.",
"title": ""
},
{
"docid": "6c7261b5dec9c61d34d78056bce74d47",
"text": "The matching of tractor-implement system is very difficult task in India because variety of tractor models ranging from 10 to 45kW is prevalent here. To overcome the problem of matching tractor-implement system, a decision support system (DSS) was developed in Visual Basic 6.0 programming language for 2-wheel drive (2WD) tractors. The DSS provides intuitive user interfaces by linking databases such as tractor parameters, tire and implement specifications, soil and operating conditions to support the decision for selection of tractor-implement system. DSS was validated for three different implements (2×30cm moldboard plow; 9-23cm field cultivator and 7-7 offset disc harrow (1.6m)). DSS which calculates draft, drawbar power, slip, tractive efficiency, coefficient of rolling resistance, coefficient of net traction, PTO power required, power utilization efficiency, specific fuel consumption based etc. on input data, can be used effectively in matching of tractor-implement system of various makes and models commercially available in India.",
"title": ""
},
{
"docid": "971ec0f5c672c12b2ea58f9306053e6c",
"text": "The random forest algorithm (RF) has several hyperparameters that have to be set by the user, e.g., the number of observations drawn randomly for each tree and whether they are drawn with or without replacement, the number of variables drawn randomly for each split, the splitting rule, the minimum number of samples that a node must contain and the number of trees. In this paper, we first provide a literature review on the parameters’ influence on the prediction performance and on variable importance measures. It is well known that in most cases RF works reasonably well with the default values of the hyperparameters specified in software packages. Nevertheless, tuning the hyperparameters can improve the performance of RF. In the second part of this paper, after a brief overview of tuning strategies we demonstrate the application of one of the most established tuning strategies, model-based optimization (MBO). To make it easier to use, we provide the tuneRanger R package that tunes RF with MBO automatically. In a benchmark study on several datasets, we compare the prediction performance and runtime of tuneRanger with other tuning implementations in R and RF with default hyperparameters.",
"title": ""
},
{
"docid": "a48d3b21d1d1e3e7e069a46aa17df7ef",
"text": "The linear step-up multiple testing procedure controls the False Discovery Rate (FDR) at the desired level q for independent and positively dependent test statistics. When all null hypotheses are true, and the test statistics are independent and continuous, the bound is sharp. When some of the null hypotheses are not true, the procedure is conservative by a factor which is the proportion m0/m of the true null hypotheses among the hypotheses. We provide a new two-stage procedure in which the linear step-up procedure is used in stage one to estimate m0, providing a new level q′ which is used in the linear step-up procedure in the second stage. We prove that a general form of the two-stage procedure controls the FDR at the desired level q. This framework enables us to study analytically the properties of other procedures that exist in the literature. A simulation study is presented that shows that two-stage adaptive procedures improve in power over the original procedure, mainly because they provide tighter control of the FDR. We further study the performance of the current suggestions, some variations of the procedures, and previous suggestions, in the case where the test statistics are positively dependent, a case for which the original procedure controls",
"title": ""
},
{
"docid": "d9a23e088330f7564c14093b4ceabbec",
"text": "One of the most contested questions in the social sciences is whether people behave rationally. A large body of work assumes that individuals do in fact make rational economic, political, and social decisions. Yet hundreds of experiments suggest that this is not the case. Framing effects constitute one of the most stunning and influential demonstrations of irrationality. The effects not only challenge the foundational assumptions of much of the social sciences (e.g., the existence of coherent preferences or stable attitudes), but also lead many scholars to adopt alternative approaches (e.g., prospect theory). Surprisingly, virtually no work has sought to specify the political conditions under which framing effects occur. I fill this gap by offering a theory and experimental test. I show how contextual forces (e.g., elite competition, deliberation) and individual attributes (e.g., expertise) affect the success of framing. The results provide insight into when rationality assumptions apply and, also, have broad implications for political psychology and experimental methods.",
"title": ""
},
{
"docid": "0bd96a4b417b3482a6accac0f7f927ca",
"text": "“Little languages” such as configuration files or HTML documents are commonplace in computing. This paper divides the work of implementing a little language into four parts, and presents a framework which can be used to easily conquer the implementation of each. The pieces of the framework have the unusual property that they may be extended through normal object-oriented means, allowing features to be added to a little language simply by subclassing parts of its compiler.",
"title": ""
},
{
"docid": "4bcdc83f93bec38616eea1acec30d512",
"text": "Sentiment analysis deals with identifying and classifying opinions or sentiments expressed in source text. Social media is generating a vast amount of sentiment rich data in the form of tweets, status updates, blog posts etc. Sentiment analysis of this user generated data is very useful in knowing the opinion of the crowd. Twitter sentiment analysis is difficult compared to general sentiment analysis due to the presence of slang words and misspellings. The maximum limit of characters that are allowed in Twitter is 140. Knowledge base approach and Machine learning approach are the two strategies used for analyzing sentiments from the text. In this paper, we try to analyze the twitter posts about electronic products like mobiles, laptops etc using Machine Learning approach. By doing sentiment analysis in a specific domain, it is possible to identify the effect of domain information in sentiment classification. We present a new feature vector for classifying the tweets as positive, negative and extract peoples' opinion about products.",
"title": ""
},
{
"docid": "0999a01e947019409c75150f85058728",
"text": "We present a robot localization system using biologically inspired vision. Our system models two extensively studied human visual capabilities: (1) extracting the ldquogistrdquo of a scene to produce a coarse localization hypothesis and (2) refining it by locating salient landmark points in the scene. Gist is computed here as a holistic statistical signature of the image, thereby yielding abstract scene classification and layout. Saliency is computed as a measure of interest at every image location, which efficiently directs the time-consuming landmark-identification process toward the most likely candidate locations in the image. The gist features and salient regions are then further processed using a Monte Carlo localization algorithm to allow the robot to generate its position. We test the system in three different outdoor environments-building complex (38.4 m times 54.86 m area, 13 966 testing images), vegetation-filled park (82.3 m times 109.73 m area, 26 397 testing images), and open-field park (137.16 m times 178.31 m area, 34 711 testing images)-each with its own challenges. The system is able to localize, on average, within 0.98, 2.63, and 3.46 m, respectively, even with multiple kidnapped-robot instances.",
"title": ""
}
] | scidocsrr |
8627e2833f43092297a911400c8ece69 | Video-based Framework for Safer and Smarter Computer Aided Surgery | [
{
"docid": "3e66d3e2674bdaa00787259ac99c3f68",
"text": "Dempster-Shafer theory offers an alternative to traditional probabilistic theory for the mathematical representation of uncertainty. The significant innovation of this framework is that it allows for the allocation of a probability mass to sets or intervals. DempsterShafer theory does not require an assumption regarding the probability of the individual constituents of the set or interval. This is a potentially valuable tool for the evaluation of risk and reliability in engineering applications when it is not possible to obtain a precise measurement from experiments, or when knowledge is obtained from expert elicitation. An important aspect of this theory is the combination of evidence obtained from multiple sources and the modeling of conflict between them. This report surveys a number of possible combination rules for Dempster-Shafer structures and provides examples of the implementation of these rules for discrete and interval-valued data.",
"title": ""
}
] | [
{
"docid": "d09b4b59c30925bae0983c7e56c3386d",
"text": "We describe a system that automatically extracts 3D geometry of an indoor scene from a single 2D panorama. Our system recovers the spatial layout by finding the floor, walls, and ceiling; it also recovers shapes of typical indoor objects such as furniture. Using sampled perspective sub-views, we extract geometric cues (lines, vanishing points, orientation map, and surface normals) and semantic cues (saliency and object detection information). These cues are used for ground plane estimation and occlusion reasoning. The global spatial layout is inferred through a constraint graph on line segments and planar superpixels. The recovered layout is then used to guide shape estimation of the remaining objects using their normal information. Experiments on synthetic and real datasets show that our approach is state-of-the-art in both accuracy and efficiency. Our system can handle cluttered scenes with complex geometry that are challenging to existing techniques.",
"title": ""
},
{
"docid": "d4c8acbbee72b8a9e880e2bce6e2153a",
"text": "This paper presents a simple linear operator that accurately estimates the position and parameters of ellipse features. Based on the dual conic model, the operator avoids the intermediate stage of precisely extracting individual edge points by exploiting directly the raw gradient information in the neighborhood of an ellipse's boundary. Moreover, under the dual representation, the dual conic can easily be constrained to a dual ellipse when minimizing the algebraic distance. The new operator is assessed and compared to other estimation approaches in simulation as well as in real situation experiments and shows better accuracy than the best approaches, including those limited to the center position.",
"title": ""
},
{
"docid": "b19630c809608601948a7f16910396f7",
"text": "This paper presents a novel, smart and portable active knee rehabilitation orthotic device (AKROD) designed to train stroke patients to correct knee hyperextension during stance and stiff-legged gait (defined as reduced knee flexion during swing). The knee brace provides variable damping controlled in ways that foster motor recovery in stroke patients. A resistive, variable damper, electro-rheological fluid (ERF) based component is used to facilitate knee flexion during stance by providing resistance to knee buckling. Furthermore, the knee brace is used to assist in knee control during swing, i.e. to allow patients to achieve adequate knee flexion for toe clearance and adequate knee extension in preparation to heel strike. The detailed design of AKROD, the first prototype built, closed loop control results and initial human testing are presented here",
"title": ""
},
{
"docid": "a2f3b158f1ec7e6ecb68f5ddfeaf0502",
"text": "Facial landmark detection of face alignment has long been impeded by the problems of occlusion and pose variation. Instead of treating the detection task as a single and independent problem, we investigate the possibility of improving detection robustness through multitask learning. Specifically, we wish to optimize facial landmark detection together with heterogeneous but subtly correlated tasks, e.g. head pose estimation and facial attribute inference. This is non-trivial since different tasks have different learning difficulties and convergence rates. To address this problem, we formulate a novel tasks-constrained deep model, with task-wise early stopping to facilitate learning convergence. Extensive evaluations show that the proposed task-constrained learning (i) outperforms existing methods, especially in dealing with faces with severe occlusion and pose variation, and (ii) reduces model complexity drastically compared to the state-of-the-art method based on cascaded deep model [29]. In this technical report, we extend the method presented in our ECCV 2014 [39] paper to handle more landmark points (68 points instead of 5 major facial points) without either redesigning the deep model or involving significant increase in run time cost. This is made possible by transferring the learned 5-point model to the desired facial landmark configuration, through model fine-tuning with dense landmark annotations. Our new model achieves the state-of-the-art result on the 300-W benchmark dataset (mean error of 9.15% on the challenging IBUG subset).",
"title": ""
},
{
"docid": "ef1d28df2575c2c844ca2fa109893d92",
"text": "Measurement of the quantum-mechanical phase in quantum matter provides the most direct manifestation of the underlying abstract physics. We used resonant x-ray scattering to probe the relative phases of constituent atomic orbitals in an electronic wave function, which uncovers the unconventional Mott insulating state induced by relativistic spin-orbit coupling in the layered 5d transition metal oxide Sr2IrO4. A selection rule based on intra-atomic interference effects establishes a complex spin-orbital state represented by an effective total angular momentum = 1/2 quantum number, the phase of which can lead to a quantum topological state of matter.",
"title": ""
},
{
"docid": "758310a8bcfcdec01b11889617f5a2c7",
"text": "1 †This paper is an extended version of the ICSCA 2017 paper “Reference scope identification for citances by classification with text similarity measures” [55]. This work is supported by the Ministry of Science and Technology (MOST), Taiwan (Grant number: MOST 104-2221-E-178-001). *Corresponding author. Tel: +886 4 23226940728; fax: +886 4 23222621. On Identifying Cited Texts for Citances and Classifying Their Discourse Facets by Classification Techniques",
"title": ""
},
{
"docid": "49b7fa9ad8912c23a7e9e725307cf69c",
"text": "In recent years, with the development of social networks, sentiment analysis has become one of the most important research topics in the field of natural language processing. The deep neural network model combining attention mechanism has achieved remarkable success in the task of target-based sentiment analysis. In current research, however, the attention mechanism is more combined with LSTM networks, such neural network- based architectures generally rely on complex computation and only focus on the single target, thus it is difficult to effectively distinguish the different polarities of variant targets in the same sentence. To address this problem, we propose a deep neural network model combining convolutional neural network and regional long short-term memory (CNN-RLSTM) for the task of target-based sentiment analysis. The approach can reduce the training time of neural network model through a regional LSTM. At the same time, the CNN-RLSTM uses a sentence-level CNN to extract sentiment features of the whole sentence, and controls the transmission of information through different weight matrices, which can effectively infer the sentiment polarities of different targets in the same sentence. Finally, experimental results on multi-domain datasets of two languages from SemEval2016 and auto data show that, our approach yields better performance than SVM and several other neural network models.",
"title": ""
},
{
"docid": "6d41ec322f71c32195119807f35fde53",
"text": "Input current distortion in the vicinity of input voltage zero crossings of boost single-phase power factor corrected (PFC) ac-dc converters is studied in this paper. Previously known causes for the zero-crossing distortion are reviewed and are shown to be inadequate in explaining the observed input current distortion, especially under high ac line frequencies. A simple linear model is then presented which reveals two previously unknown causes for zero-crossing distortion, namely, the leading phase of the input current and the lack of critical damping in the current loop. Theoretical and practical limitations in reducing the phase lead and increasing the damping factor are discussed. A simple phase compensation technique to reduce the zero-crossing distortion is also presented. Numerical simulation and experimental results are presented to validate the theory.",
"title": ""
},
{
"docid": "84195c27330dad460b00494ead1654c8",
"text": "We present a unified framework for the computational implementation of syntactic, semantic, pragmatic and even \"stylistic\" constraints on anaphora. We build on our BUILDRS implementation of Discourse Representation (DR) Theory and Lexical Functional Grammar (LFG) discussed in Wada & Asher (1986). We develop and argue for a semantically based processing model for anaphora resolution that exploits a number of desirable features: (1) the partial semantics provided by the discourse representation structures (DRSs) of DR theory, (2) the use of syntactic and lexical features to filter out unacceptable potential anaphoric antecedents from the set of logically possible antecedents determined by the logical structure of the DRS, (3) the use of pragmatic or discourse constraints, noted by those working on focus, to impose a salience ordering on the set of grammatically acceptable potential antecedents. Only where there is a marked difference in the degree of salience among the possible antecedents does the salience ranking allow us to make predictions on preferred readings. In cases where the difference is extreme, we predict the discourse to be infelicitous if, because of other constraints, one of the markedly less salient antecedents must be linked with the pronoun. We also briefly consider the applications of our processing model to other definite noun phrases besides anaphoric pronouns.",
"title": ""
},
{
"docid": "9493fa9f3749088462c1af7b34d9cfc9",
"text": "Computer vision assisted diagnostic systems are gaining popularity in different healthcare applications. This paper presents a video analysis and pattern recognition framework for the automatic grading of vertical suspension tests on infants during the Hammersmith Infant Neurological Examination (HINE). The proposed vision-guided pipeline applies a color-based skin region segmentation procedure followed by the localization of body parts before feature extraction and classification. After constrained localization of lower body parts, a stick-diagram representation is used for extracting novel features that correspond to the motion dynamic characteristics of the infant's leg movements during HINE. This set of pose features generated from such a representation includes knee angles and distances between knees and hills. Finally, a time-series representation of the feature vector is used to train a Hidden Markov Model (HMM) for classifying the grades of the HINE tests into three predefined categories. Experiments are carried out by testing the proposed framework on a large number of vertical suspension test videos recorded at a Neuro-development clinic. The automatic grading results obtained from the proposed method matches the scores of experts at an accuracy of 74%.",
"title": ""
},
{
"docid": "05046c00903852a983bf194f4348799c",
"text": "This paper describes a temperature sensor realized in a 65nm CMOS process with a batch-calibrated inaccuracy of ±0.5°C (3s) and a trimmed inaccuracy of ±0.2°C (3s) from −70°C to 125°C. This represents a 10-fold improvement in accuracy compared to other deep-submicron temperature sensors [1,2], and is comparable with that of state-of-the-art sensors implemented in larger-feature-size processes [3,4]. The sensor draws 8.3µA from a 1.2V supply and occupies an area of 0.1mm2, which is 45 times less than that of sensors with comparable accuracy [3,4]. These advances are enabled by the use of NPN transistors as sensing elements, the use of dynamic techniques i.e. correlated double sampling (CDS) and dynamic element matching (DEM), and a single room-temperature trim.",
"title": ""
},
{
"docid": "563d5144c9e053bb4e3cf5a06b19f656",
"text": "After introductory remarks on the definition of marketing, the evolution of library and information services (LIS) marketing is explained. The authors then describe how marketing was applied to LIS over the years. Marketing is also related to other concepts used in the management of LIS. Finally the role of professional associations in diffusing marketing theory is portrayed and the importance of education addressed. The entry ends with a reflection on the future of marketing for LIS.",
"title": ""
},
{
"docid": "bd37aa47cf495c7ea327caf2247d28e4",
"text": "The purpose of this study is to identify the negative effects of social network sites such as Facebook among Asia Pacific University scholars. The researcher, distributed 152 surveys to students of the chosen university to examine and study the negative effects. Electronic communication is emotionally gratifying but how do such technological distraction impact on academic performance? Because of social media platform’s widespread adoption by university students, there is an interest in how Facebook is related to academic performance. This paper measure frequency of use, participation in activities and time spent preparing for class, in order to know if Facebook affects the performance of students. Moreover, the impact of social network site on academic performance also raised another major concern which is health. Today social network sites are running the future and carrier of students. Social network sites were only an electronic connection between users, but unfortunately it has become an addiction for students. This paper examines the relationship between social network sites and health threat. Lastly, the paper provides a comprehensive analysis of the law and privacy of Facebook. It shows how Facebook users socialize on the site, while they are not aware or misunderstand the risk involved and how their privacy suffers as a result.",
"title": ""
},
{
"docid": "b282d29318b44b56e5bfe07d28c00286",
"text": "Word2vec (Mikolov et al., 2013b) has proven to be successful in natural language processing by capturing the semantic relationships between different words. Built on top of single-word embeddings, paragraph vectors (Le and Mikolov, 2014) find fixed-length representations for pieces of text with arbitrary lengths, such as documents, paragraphs, and sentences. In this work, we propose a novel interpretation for neural-network-based paragraph vectors by developing an unsupervised generative model whose maximum likelihood solution corresponds to traditional paragraph vectors. This probabilistic formulation allows us to go beyond point estimates of parameters and to perform Bayesian posterior inference. We find that the entropy of paragraph vectors decreases with the length of documents, and that information about posterior uncertainty improves performance in supervised learning tasks such as sentiment analysis and paraphrase detection.",
"title": ""
},
{
"docid": "15102e561d9640ee39952e4ad62ef896",
"text": "OBJECTIVE\nTo define the relative position of the maxilla and mandible in fetuses with trisomy 18 at 11 + 0 to 13 + 6 weeks of gestation.\n\n\nMETHODS\nA three-dimensional (3D) volume of the fetal head was obtained before karyotyping at 11 + 0 to 13 + 6 weeks of gestation in 36 fetuses subsequently found to have trisomy 18, and 200 chromosomally normal fetuses. The frontomaxillary facial (FMF) angle and the mandibulomaxillary facial (MMF) angle were measured in a mid-sagittal view of the fetal face.\n\n\nRESULTS\nIn the chromosomally normal group both the FMF and MMF angles decreased significantly with crown-rump length (CRL). In the trisomy 18 fetuses the FMF angle was significantly greater and the angle was above the 95(th) centile of the normal range in 21 (58.3%) cases. In contrast, in trisomy 18 fetuses the MMF angle was significantly smaller than that in normal fetuses and the angle was below the 5(th) centile of the normal range in 12 (33.3%) cases.\n\n\nCONCLUSIONS\nTrisomy 18 at 11 + 0 to 13 + 6 weeks of gestation is associated with both mid-facial hypoplasia and micrognathia or retrognathia that can be documented by measurement of the FMF angle and MMF angle, respectively.",
"title": ""
},
{
"docid": "4e4bd38230dba0012227d8b40b01e867",
"text": "In this paper, we present a travel guidance system W2Go (Where to Go), which can automatically recognize and rank the landmarks for travellers. In this system, a novel Automatic Landmark Ranking (ALR) method is proposed by utilizing the tag and geo-tag information of photos in Flickr and user knowledge from Yahoo Travel Guide. ALR selects the popular tourist attractions (landmarks) based on not only the subjective opinion of the travel editors as is currently done on sites like WikiTravel and Yahoo Travel Guide, but also the ranking derived from popularity among tourists. Our approach utilizes geo-tag information to locate the positions of the tag-indicated places, and computes the probability of a tag being a landmark/site name. For potential landmarks, impact factors are calculated from the frequency of tags, user numbers in Flickr, and user knowledge in Yahoo Travel Guide. These tags are then ranked based on the impact factors. Several representative views for popular landmarks are generated from the crawled images with geo-tags to describe and present them in context of information derived from several relevant reference sources. The experimental comparisons to the other systems are conducted on eight famous cities over the world. User-based evaluation demonstrates the effectiveness of the proposed ALR method and the W2Go system.",
"title": ""
},
{
"docid": "4575b5c93aa86c150944597638402439",
"text": "Multilayer networks are networks where edges exist in multiple layers that encode different types or sources of interactions. As one of the most important problems in network science, discovering the underlying community structure in multilayer networks has received an increasing amount of attention in recent years. One of the challenging issues is to develop effective community structure quality functions for characterizing the structural or functional properties of the expected community structure. Although several quality functions have been developed for evaluating the detected community structure, little has been explored about how to explicitly bring our knowledge of the desired community structure into such quality functions, in particular for the multilayer networks. To address this issue, we propose the multilayer edge mixture model (MEMM), which is positioned as a general framework that enables us to design a quality function that reflects our knowledge about the desired community structure. The proposed model is based on a mixture of the edges, and the weights reflect their role in the detection process. By decomposing a community structure quality function into the form of MEMM, it becomes clear which type of community structure will be discovered by such quality function. Similarly, after such decomposition we can also modify the weights of the edges to find the desired community structure. In this paper, we apply the quality functions modified with the knowledge of MEMM to different multilayer benchmark networks as well as real-world multilayer networks and the detection results confirm the feasibility of MEMM.",
"title": ""
},
{
"docid": "a47d001dc8305885e42a44171c9a94b2",
"text": "Community detection in complex network has become a vital step to understand the structure and dynamics of networks in various fields. However, traditional node clustering and relatively new proposed link clustering methods have inherent drawbacks to discover overlapping communities. Node clustering is inadequate to capture the pervasive overlaps, while link clustering is often criticized due to the high computational cost and ambiguous definition of communities. So, overlapping community detection is still a formidable challenge. In this work, we propose a new overlapping community detection algorithm based on network decomposition, called NDOCD. Specifically, NDOCD iteratively splits the network by removing all links in derived link communities, which are identified by utilizing node clustering technique. The network decomposition contributes to reducing the computation time and noise link elimination conduces to improving the quality of obtained communities. Besides, we employ node clustering technique rather than link similarity measure to discover link communities, thus NDOCD avoids an ambiguous definition of community and becomes less time-consuming. We test our approach on both synthetic and real-world networks. Results demonstrate the superior performance of our approach both in computation time and accuracy compared to state-of-the-art algorithms.",
"title": ""
},
{
"docid": "558e6532f9a228c1ec41448a67214df2",
"text": "We consider the problem of shape recovery for real world scenes, where a variety of global illumination (inter-reflections, subsurface scattering, etc.) and illumination defocus effects are present. These effects introduce systematic and often significant errors in the recovered shape. We introduce a structured light technique called Micro Phase Shifting, which overcomes these problems. The key idea is to project sinusoidal patterns with frequencies limited to a narrow, high-frequency band. These patterns produce a set of images over which global illumination and defocus effects remain constant for each point in the scene. This enables high quality reconstructions of scenes which have traditionally been considered hard, using only a small number of images. We also derive theoretical lower bounds on the number of input images needed for phase shifting and show that Micro PS achieves the bound.",
"title": ""
},
{
"docid": "1b17fd5250b50a750931660ac0e130fe",
"text": "MOS varactors are used extensively as tunable elements in the tank circuits of RF voltage-controlled oscillators (VCOs) based on submicrometer CMOS technologies. MOS varactor topologies include conventionalD=S=B connected, inversion-mode (I-MOS), and accumulation-mode (A-MOS) structures. When incorporated into the VCO tank circuit, the large-signal swing of the VCO output oscillation modulates the varactor capacitance in time, resulting in a VCO tuning curve that deviates from the dc tuning curve of the particular varactor structure. This paper presents a detailed analysis of this large-signal effect. Simulated results are compared to measurements for an example 2.5-GHz complementary LC VCO using I-MOS varactors implemented in 0.35m CMOS technology.",
"title": ""
}
] | scidocsrr |
01a6c16b8117bcfc2d9e2eca4cbba9e3 | Predicting eye fixations using convolutional neural networks | [
{
"docid": "0cdf08bd9c2e63f0c9bb1dd7472a23a8",
"text": "Under natural viewing conditions, human observers shift their gaze to allocate processing resources to subsets of the visual input. Many computational models try to predict such voluntary eye and attentional shifts. Although the important role of high level stimulus properties (e.g., semantic information) in search stands undisputed, most models are based on low-level image properties. We here demonstrate that a combined model of face detection and low-level saliency significantly outperforms a low-level model in predicting locations humans fixate on, based on eye-movement recordings of humans observing photographs of natural scenes, most of which contained at least one person. Observers, even when not instructed to look for anything particular, fixate on a face with a probability of over 80% within their first two fixations; furthermore, they exhibit more similar scanpaths when faces are present. Remarkably, our model’s predictive performance in images that do not contain faces is not impaired, and is even improved in some cases by spurious face detector responses.",
"title": ""
}
] | [
{
"docid": "c96942b01c05fcfd10a2efcf2b1ca2de",
"text": "This review highlights the current advances in knowledge about the safety, efficacy, quality control, marketing and regulatory aspects of botanical medicines. Phytotherapeutic agents are standardized herbal preparations consisting of complex mixtures of one or more plants which contain as active ingredients plant parts or plant material in the crude or processed state. A marked growth in the worldwide phytotherapeutic market has occurred over the last 15 years. For the European and USA markets alone, this will reach about $7 billion and $5 billion per annum, respectively, in 1999, and has thus attracted the interest of most large pharmaceutical companies. Insufficient data exist for most plants to guarantee their quality, efficacy and safety. The idea that herbal drugs are safe and free from side effects is false. Plants contain hundreds of constituents and some of them are very toxic, such as the most cytotoxic anti-cancer plant-derived drugs, digitalis and the pyrrolizidine alkaloids, etc. However, the adverse effects of phytotherapeutic agents are less frequent compared with synthetic drugs, but well-controlled clinical trials have now confirmed that such effects really exist. Several regulatory models for herbal medicines are currently available including prescription drugs, over-the-counter substances, traditional medicines and dietary supplements. Harmonization and improvement in the processes of regulation is needed, and the general tendency is to perpetuate the German Commission E experience, which combines scientific studies and traditional knowledge (monographs). Finally, the trend in the domestication, production and biotechnological studies and genetic improvement of medicinal plants, instead of the use of plants harvested in the wild, will offer great advantages, since it will be possible to obtain uniform and high quality raw materials which are fundamental to the efficacy and safety of herbal drugs.",
"title": ""
},
{
"docid": "f6449c1e77e5310cd0cae5718ed9591f",
"text": "Individuals with strong self-regulated learning (SRL) skills, characterized by the ability to plan, manage and control their learning process, can learn faster and outperform those with weaker SRL skills. SRL is critical in learning environments that provide low levels of support and guidance, as is commonly the case in Massive Open Online Courses (MOOCs). Learners can be trained to engage in SRL and actively supported with prompts and activities. However, effective implementation of learner support systems in MOOCs requires an understanding of which SRL strategies are most effective and how these strategies manifest in online behavior. Moreover, identifying learner characteristics that are predictive of weaker SRL skills can advance efforts to provide targeted support without obtrusive survey instruments. We investigated SRL in a sample of 4,831 learners across six MOOCs based on individual records of overall course achievement, interactions with course content, and survey responses. We found that goal setting and strategic planning predicted attainment of personal course goals, while help seeking was associated with lower goal attainment. Learners with stronger SRL skills were more likely to revisit previously studied course materials, especially course assessments. Several learner characteristics, including demographics and motivation, predicted learners’ SRL skills. We discuss implications for theory and the development of learning environments that provide",
"title": ""
},
{
"docid": "0d41a6d4cf8c42ccf58bccd232a46543",
"text": "Novelty detection is the ident ification of new or unknown data or signal that a machine learning system is not aware of during training. In this paper we focus on neural network based approaches for novelty detection. Statistical approaches are covered in part-I paper.",
"title": ""
},
{
"docid": "43f3c28db4732ef07d04c3bda628ab66",
"text": "This research proposes a conceptual framework for achieving a secure Internet of Things (IoT) routing that will enforce confidentiality and integrity during the routing process in IoT networks. With billions of IoT devices likely to be interconnected globally, the big issue is how to secure the routing of data in the underlying networks from various forms of attacks. Users will not feel secure if they know their private data could easily be accessed and compromised by unauthorized individuals or machines over the network. It is within this context that we present the design of SecTrust, a lightweight secure trust-based routing framework to identify and isolate common routing attacks in IoT networks. The proposed framework is based on the successful interactions between the IoT sensor nodes, which effectively is a reflection of their trustworthy behavior.",
"title": ""
},
{
"docid": "a4a809852b08a7f0a83fc97fcd9b0b9d",
"text": "This paper proposes the use of hybrid Hidden Markov Model (HMM)/Artificial Neural Network (ANN) models for recognizing unconstrained offline handwritten texts. The structural part of the optical models has been modeled with Markov chains, and a Multilayer Perceptron is used to estimate the emission probabilities. This paper also presents new techniques to remove slope and slant from handwritten text and to normalize the size of text images with supervised learning methods. Slope correction and size normalization are achieved by classifying local extrema of text contours with Multilayer Perceptrons. Slant is also removed in a nonuniform way by using Artificial Neural Networks. Experiments have been conducted on offline handwritten text lines from the IAM database, and the recognition rates achieved, in comparison to the ones reported in the literature, are among the best for the same task.",
"title": ""
},
{
"docid": "f32cfe5e4f781f3ef0da302506f4d65a",
"text": "In this work, we estimate the deterioration of NLP processing given an estimate of the amount and nature of grammatical errors in a text. From a corpus of essays written by English-language learners, we extract ungrammatical sentences, controlling the number and types of errors in each sentence. We focus on six categories of errors that are commonly made by English-language learners, and consider sentences containing one or more of these errors. To evaluate the effect of grammatical errors, we measure the deterioration of ungrammatical dependency parses using the labeled F-score, an adaptation of the labeled attachment score. We find notable differences between the influence of individual error types on the dependency parse, as well as interactions between multiple errors.",
"title": ""
},
{
"docid": "9aab4a607de019226e9465981b82f9b8",
"text": "Color is frequently used to encode values in visualizations. For color encodings to be effective, the mapping between colors and values must preserve important differences in the data. However, most guidelines for effective color choice in visualization are based on either color perceptions measured using large, uniform fields in optimal viewing environments or on qualitative intuitions. These limitations may cause data misinterpretation in visualizations, which frequently use small, elongated marks. Our goal is to develop quantitative metrics to help people use color more effectively in visualizations. We present a series of crowdsourced studies measuring color difference perceptions for three common mark types: points, bars, and lines. Our results indicate that peoples' abilities to perceive color differences varies significantly across mark types. Probabilistic models constructed from the resulting data can provide objective guidance for designers, allowing them to anticipate viewer perceptions in order to inform effective encoding design.",
"title": ""
},
{
"docid": "c997e54b9bc82dcf0ec896710b744cd8",
"text": "The authors report a case of acute compartment syndrome in the thigh in a 19-year-old man with multiple injuries including fracture of the femoral diaphysis. Decompressive fasciotomy was performed emergently. Complete progressive closure of the wound without split-thickness skin grafting was achieved using a modified shoelace technique: sutures were run inside wide drains placed in contact with the muscles and were then tightened over the skin. These drains enlarged the contact area between sutures and muscles, preventing damage to muscles.",
"title": ""
},
{
"docid": "b56a6fe9c9d4b45e9d15054004fac918",
"text": "Code-switching refers to the phenomena of mixing of words or phrases from foreign languages while communicating in a native language by the multilingual speakers. Codeswitching is a global phenomenon and is widely accepted in multilingual communities. However, for training the language model (LM) for such tasks, a very limited code-switched textual resources are available as yet. In this work, we present an approach to reduce the perplexity (PPL) of Hindi-English code-switched data when tested over the LM trained on purely native Hindi data. For this purpose, we propose a novel textual feature which allows the LM to predict the code-switching instances. The proposed feature is referred to as code-switching factor (CS-factor). Also, we developed a tagger that facilitates the automatic tagging of the code-switching instances. This tagger is trained on a development data and assigns an equivalent class of foreign (English) words to each of the potential native (Hindi) words. For this study, the textual resource has been created by crawling the blogs from a couple of websites educating about the usage of the Internet. In the context of recognition of the code-switching data, the proposed technique is found to yield a substantial improvement in terms of PPL.",
"title": ""
},
{
"docid": "44f3a23a60195314e46c82cb959df224",
"text": "We present a novel online unsupervised method for face identity learning from video streams. The method exploits deep face descriptors together with a memory based learning mechanism that takes advantage of the temporal coherence of visual data. Specifically, we introduce a discriminative descriptor matching solution based on Reverse Nearest Neighbour and a forgetting strategy that detect redundant descriptors and discard them appropriately while time progresses. It is shown that the proposed learning procedure is asymptotically stable and can be effectively used in relevant applications like multiple face identification and tracking from unconstrained video streams. Experimental results show that the proposed method achieves comparable results in the task of multiple face tracking and better performance in face identification with offline approaches exploiting future information. Code will be publicly available.",
"title": ""
},
{
"docid": "7a8fb7b1383b7f7562dd319a6f43fcab",
"text": "An important problem that online work marketplaces face is grouping clients into clusters, so that in each cluster clients are similar with respect to their hiring criteria. Such a separation allows the marketplace to \"learn\" more accurately the hiring criteria in each cluster and recommend the right contractor to each client, for a successful collaboration. We propose a Maximum Likelihood definition of the \"optimal\" client clustering along with an efficient Expectation-Maximization clustering algorithm that can be applied in large marketplaces. Our results on the job hirings at oDesk over a seven-month period show that our client-clustering approach yields significant gains compared to \"learning\" the same hiring criteria for all clients. In addition, we analyze the clustering results to find interesting differences between the hiring criteria in the different groups of clients.",
"title": ""
},
{
"docid": "ca546e8061ca984a7ee57884ed05f340",
"text": "This paper is focused on the adaptive noise cancellation of speech signal using the least mean square (LMS) and normalized least mean square method (NLMS). Adaptive Noise Cancellation is an alternative way of cancelling noise present in a corrupted signal. In this technique, evaluation of distorted signal by additive noise or interference achieved with no a priori estimates of signal or noise. A comparative study is carried out using LMS and NLSM methods. Result shows that these methods has potential in noise cancellation and can be used for variety of applications.",
"title": ""
},
{
"docid": "840a8befafbf6fc43d19b890431f3953",
"text": "The prevalence of high hyperlipemia is increasing around the world. Our aims are to analyze the relationship of triglyceride (TG) and cholesterol (TC) with indexes of liver function and kidney function, and to develop a prediction model of TG, TC in overweight people. A total of 302 adult healthy subjects and 273 overweight subjects were enrolled in this study. The levels of fasting indexes of TG (fs-TG), TC (fs-TC), blood glucose, liver function, and kidney function were measured and analyzed by correlation analysis and multiple linear regression (MRL). The back propagation artificial neural network (BP-ANN) was applied to develop prediction models of fs-TG and fs-TC. The results showed there was significant difference in biochemical indexes between healthy people and overweight people. The correlation analysis showed fs-TG was related to weight, height, blood glucose, and indexes of liver and kidney function; while fs-TC was correlated with age, indexes of liver function (P < 0.01). The MRL analysis indicated regression equations of fs-TG and fs-TC both had statistic significant (P < 0.01) when included independent indexes. The BP-ANN model of fs-TG reached training goal at 59 epoch, while fs-TC model achieved high prediction accuracy after training 1000 epoch. In conclusions, there was high relationship of fs-TG and fs-TC with weight, height, age, blood glucose, indexes of liver function and kidney function. Based on related variables, the indexes of fs-TG and fs-TC can be predicted by BP-ANN models in overweight people.",
"title": ""
},
{
"docid": "5bb36646f4db3d2efad8e0ee828b3022",
"text": "PURPOSE\nWhile modern clinical CT scanners under normal circumstances produce high quality images, severe artifacts degrade the image quality and the diagnostic value if metal prostheses or other metal objects are present in the field of measurement. Standard methods for metal artifact reduction (MAR) replace those parts of the projection data that are affected by metal (the so-called metal trace or metal shadow) by interpolation. However, while sinogram interpolation methods efficiently remove metal artifacts, new artifacts are often introduced, as interpolation cannot completely recover the information from the metal trace. The purpose of this work is to introduce a generalized normalization technique for MAR, allowing for efficient reduction of metal artifacts while adding almost no new ones. The method presented is compared to a standard MAR method, as well as MAR using simple length normalization.\n\n\nMETHODS\nIn the first step, metal is segmented in the image domain by thresholding. A 3D forward projection identifies the metal trace in the original projections. Before interpolation, the projections are normalized based on a 3D forward projection of a prior image. This prior image is obtained, for example, by a multithreshold segmentation of the initial image. The original rawdata are divided by the projection data of the prior image and, after interpolation, denormalized again. Simulations and measurements are performed to compare normalized metal artifact reduction (NMAR) to standard MAR with linear interpolation and MAR based on simple length normalization.\n\n\nRESULTS\nPromising results for clinical spiral cone-beam data are presented in this work. Included are patients with hip prostheses, dental fillings, and spine fixation, which were scanned at pitch values ranging from 0.9 to 3.2. Image quality is improved considerably, particularly for metal implants within bone structures or in their proximity. The improvements are evaluated by comparing profiles through images and sinograms for the different methods and by inspecting ROIs. NMAR outperforms both other methods in all cases. It reduces metal artifacts to a minimum, even close to metal regions. Even for patients with dental fillings, which cause most severe artifacts, satisfactory results are obtained with NMAR. In contrast to other methods, NMAR prevents the usual blurring of structures close to metal implants if the metal artifacts are moderate.\n\n\nCONCLUSIONS\nNMAR clearly outperforms the other methods for both moderate and severe artifacts. The proposed method reliably reduces metal artifacts from simulated as well as from clinical CT data. Computationally efficient and inexpensive compared to iterative methods, NMAR can be used as an additional step in any conventional sinogram inpainting-based MAR method.",
"title": ""
},
{
"docid": "a87ab618f64c9b4f33d5102e1374f1e2",
"text": "Recent genome sequencing studies have shown that the somatic mutations that drive cancer development are distributed across a large number of genes. This mutational heterogeneity complicates efforts to distinguish functional mutations from sporadic, passenger mutations. Since cancer mutations are hypothesized to target a relatively small number of cellular signaling and regulatory pathways, a common practice is to assess whether known pathways are enriched for mutated genes. We introduce an alternative approach that examines mutated genes in the context of a genome-scale gene interaction network. We present a computationally efficient strategy for de novo identification of subnetworks in an interaction network that are mutated in a statistically significant number of patients. This framework includes two major components. First, we use a diffusion process on the interaction network to define a local neighborhood of \"influence\" for each mutated gene in the network. Second, we derive a two-stage multiple hypothesis test to bound the false discovery rate (FDR) associated with the identified subnetworks. We test these algorithms on a large human protein-protein interaction network using somatic mutation data from glioblastoma and lung adenocarcinoma samples. We successfully recover pathways that are known to be important in these cancers and also identify additional pathways that have been implicated in other cancers but not previously reported as mutated in these samples. We anticipate that our approach will find increasing use as cancer genome studies increase in size and scope.",
"title": ""
},
{
"docid": "a75919f4a4abcc0796ae6ba269cb91c1",
"text": "Interacting systems are prevalent in nature, from dynamical systems in physics to complex societal dynamics. The interplay of components can give rise to complex behavior, which can often be explained using a simple model of the system’s constituent parts. In this work, we introduce the neural relational inference (NRI) model: an unsupervised model that learns to infer interactions while simultaneously learning the dynamics purely from observational data. Our model takes the form of a variational auto-encoder, in which the latent code represents the underlying interaction graph and the reconstruction is based on graph neural networks. In experiments on simulated physical systems, we show that our NRI model can accurately recover ground-truth interactions in an unsupervised manner. We further demonstrate that we can find an interpretable structure and predict complex dynamics in real motion capture and sports tracking data.",
"title": ""
},
{
"docid": "368f904533e17beec78d347ee8ceabb1",
"text": "A brand community from a customer-experiential perspective is a fabric of relationships in which the customer is situated. Crucial relationships include those between the customer and the brand, between the customer and the firm, between the customer and the product in use, and among fellow customers. The authors delve ethnographically into a brand community and test key findings through quantitative methods. Conceptually, the study reveals insights that differ from prior research in four important ways: First, it expands the definition of a brand community to entities and relationships neglected by previous research. Second, it treats vital characteristics of brand communities, such as geotemporal concentrations and the richness of social context, as dynamic rather than static phenomena. Third, it demonstrates that marketers can strengthen brand communities by facilitating shared customer experiences in ways that alter those dynamic characteristics. Fourth, it yields a new and richer conceptualization of customer loyalty as integration in a brand community.",
"title": ""
},
{
"docid": "2a55dd98b47bd6b79b5e1d441d23c683",
"text": "This case study explores how a constructivist-based instructional design helped adult learners learn in an online learning environment. Two classes of adult learners pursuing professional development and registered in a webbased course were studied. The data consisted of course documents, submitted artefacts, surveys, interviews, in-class observations, and online observations. The study found that the majority of the learners were engaged in two facets of learning. On the one hand, the instructional activities requiring collaboration and interaction helped the learners support one another’s learning, from which most claimed to have benefited. On the other hand, the constructivistbased course assisted many learners to develop a sense of becoming more responsible, self-directed learners. Overall, the social constructivist style of instructional strategy seems promising to facilitate adult learning, which not only helps change learners’ perceptions of the online learning, but also assists them to learn in a more collaborative, authentic and responsible way. The study, however, also disclosed that in order to maintain high-quality learning, appropriate assessment plans and adequate facilitation must be particularly reinforced. A facilitation model is thus suggested. Introduction With the rising prevalence of the Internet, technological media for teaching and learning are becoming increasingly interactive, widely distributed and collaborative (Bonk, Hara, Dennen, Malikowski & Supplee, 2000; Chang, 2003). A collaborative, interactive, constructivist online learning environment, as opposed to a passive learning environment, is found to be better able to help students learn more actively and effectively (Murphy, Mahoney, Chen, Mendoza-Diaz & Yang, 2005). Online learning provides learners, especially adult learners, with an opportunity and flexibility for learning at Note: The research was sponsored by the National Science Council, NSC-95-2520-S-271-001. British Journal of Educational Technology Vol 41 No 5 2010 706–720 doi:10.1111/j.1467-8535.2009.00965.x © 2009 The Author. Journal compilation © 2009 Becta. Published by Blackwell Publishing, 9600 Garsington Road, Oxford OX4 2DQ, UK and 350 Main Street, Malden, MA 02148, USA. any time and in any place. As lifelong learning is considered both an economic and a social and individual interest (White, 2007), how to assist general adult learners to learn more practically and persistently through the online learning environment is of great interest. The purpose of this study is to explore whether and how nondegreepursuing adult learners benefit from engaging in a constructivist-based online course. This study first briefly reviews the notion of constructivist learning, and then the characteristics of adult learners and adult learning, followed by discussing online instructional strategies designed based on constructivist principles. Two online courses offered for adult learners are investigated to address the research questions. In addition to reporting the findings, a facilitation model for improving the constructivist-based online course geared towards adult learners is also provided at the end. The concept of constructivist learning Constructivist learning arose from Piagetian and Vygotskian perspectives (Palincsar, 1998), emphasising the impact of constructed knowledge on the individual’s active, reflective thinking. While Piaget focused more on individual cognitive constructivism, Vygotsky stressed that sociocultural systems have a major impact on an individual’s learning (Siegler, 1998). According to social constructivist theory, knowledge is socially situated and is constructed through reflection on one’s own thoughts and experiences, as well as other learners’ ideas. Dewey (1938) believed that individual development is dependent upon the existing social environmental context and argued that students should learn from the genuine world through continuous interaction with others. Lave and Wenger (1991) asserted that learning is socially situated with members’ active participation in their routine, patterned activities. A constructivist, dialogical instructional approach should focus on learning about ‘why’ and learning about ‘how’, rather than conducting learning itself (Scott, 2001). In the constructivist learning environment, students are encouraged to actively engage in learning: to discuss, argue, negotiate ideas, and to collaboratively solve problems; teachers design and provide the learning context and facilitate learning activities (Palincsar). Because of their rich life and employment experience, the social, situated nature of learning through practices appears particularly authentic and appropriate for adult learners. Adult learners and adult learning The success of adult learning greatly depends upon individuals’ maturation and experiences (Mezirow, 1991, 1997; Wang, Sierra & Folger, 2003) contended that the focus of adult learning is on assisting them to become independent thinkers, rather than passive knowledge receivers. However, like younger students, adult learners also need motivation to sustain their learning, particularly those less engaged working adults (Priest, 2000). To achieve this, the course curriculum must be tailored to individual adult’s learning needs, interests, abilities and experiences (Lindeman, 1926). Learners may learn more effectively when instructional activities are designed in accordance with their personal needs, characteristics and, most importantly, their life context (Knowles, 1990). Knowles (1986) proposed the concept of contract learning as the fundamental platform for organising individual adult learning. The idea of contract learning hinges on individual learners planning their own learning based on their Constructivist adult online learning 707 © 2009 The Author. Journal compilation © 2009 Becta. learning needs, prior experiences, interests, goals and self-competence. The progress of the learning contract is based upon the learners’ successfully comprehending what they have learned so far (Scott, 2001). When learners set up their own learning objectives and learning outcomes through the learning contract process, they will better understand their learning style and will have better access to the desired course content (Boyer, 2003). Instructional strategies for facilitating constructivist online learning To implement a constructivist-based online course, various instructional strategies have been implemented, such as requiring students to engage in collaborative, contextualised learning by simulating and assuming an authentic role that is real in the authentic society (Auyeung, 2004; Maor, 2003; Martens, Bastiaens & Kirschner, 2007); setting a collective goal and a shared vision to motivate students’ participation and contribution levels (Gilbert & Driscoll, 2002); and requiring students to be in charge of a discussion of their teamwork (Harmon & Jones, 2000). Some online facilitators required students to plan their own learning goals, set their learning pace, and develop the methodology to achieve the set goals (Boyer, 2003; Kochtanek & Hein, 2000). While learners are expected to assume more responsibility for their learning, the role of online facilitators is crucial (Kochtanek & Hein). A number of online educators suggest that the facilitation tasks include providing feedback to learners and a summary of or specific comments on the discussed issues at the end of class discussions (eg, Graham, Cagiltay, Lim, Craner & Duffy, 2001; Maor), and intervening and promoting students’ participation in the discussion when it becomes stagnant (eg, Auyeung, 2004; Maor). Encouraging students to provide timely responses and feedback to class members helps boost the students’ sense of participation and learning in online learning communities (Gilbert & Driscoll, 2002; Hill, Raven & Han, 2002; Wegerif, 1998), which further helps boost students’ achievement (Moller, Harvey, Downs & Godshalk, 2000). Some online facilitators reinforced students’ interaction and engagement by laying out clear assessment specifications and setting aside a high percentage of the grade to the class-level online discussion activity (Maor). To facilitate online discussion activities, Murphy et al (2005) proposed a constructivist model, which involves three levels of facilitation: (1) the instructor’s mentoring (guiding the learners to develop cognitive and metacognitive skills), (2) teaching assistants’ (TA) coaching (monitoring learners in developing task management skills), and (3) learner facilitators’ moderation (facilitating required learning activities). Salmon (2002) proposed a five-stage model to facilitate online teaching and learning, in which varied facilitation skills and instructional activities are recommended in different learning stages. The five stages are: (1) access and motivation (setting up the system, welcoming and encouraging), (2) socialisation (establishing cultural, social learning environments), (3) information exchange (facilitating, supporting use of course materials), (4) knowledge construction (conferencing, moderating process), and (5) development (helping achieve personal goals) stages. When designing social constructivist pedagogy for adult learners, Huang (2002) suggested that six instructional principles be considered: interactive learning (interacting with the instructor and peers, rather 708 British Journal of Educational Technology Vol 41 No 5 2010 © 2009 The Author. Journal compilation © 2009 Becta. than engaging in isolated learning), collaborative learning (engaging in collaborative knowledge construction, social negotiation, and reflection), facilitating learning (providing a safe, positive learning environment for sharing ideas and thoughts), authentic learning (connecting learning content to real-life experiences), student-centred learning (emphasising self-directed, experiential learning), and high-quality learning",
"title": ""
},
{
"docid": "9e865969535469357f2600985750d78e",
"text": "Patients with pathological laughter and crying (PLC) are subject to relatively uncontrollable episodes of laughter, crying or both. The episodes occur either without an apparent triggering stimulus or following a stimulus that would not have led the subject to laugh or cry prior to the onset of the condition. PLC is a disorder of emotional expression rather than a primary disturbance of feelings, and is thus distinct from mood disorders in which laughter and crying are associated with feelings of happiness or sadness. The traditional and currently accepted view is that PLC is due to the damage of pathways that arise in the motor areas of the cerebral cortex and descend to the brainstem to inhibit a putative centre for laughter and crying. In that view, the lesions 'disinhibit' or 'release' the laughter and crying centre. The neuroanatomical findings in a recently studied patient with PLC, along with new knowledge on the neurobiology of emotion and feeling, gave us an opportunity to revisit the traditional view and propose an alternative. Here we suggest that the critical PLC lesions occur in the cerebro-ponto-cerebellar pathways and that, as a consequence, the cerebellar structures that automatically adjust the execution of laughter or crying to the cognitive and situational context of a potential stimulus, operate on the basis of incomplete information about that context, resulting in inadequate and even chaotic behaviour.",
"title": ""
},
{
"docid": "32a0944d7722090860cf3868a50c4ba1",
"text": "This paper addresses a cost-effective, flexible solution of underground mine workers' safety. A module of MEMS based sensors are used for underground environment monitoring and automating progression of measurement data through digital wireless communication technique is proposed with high accuracy, smooth control and reliability. A microcontroller is used for collecting data and making decision, based on which the mine worker is informed through alarm as well as voice system. The voice system with both microphone and speaker, transforms into digital signal and effectively communicate wirelessly with the ground control centre computer. ZigBee, based on IEEE 802.15.4 standard is used for this short distance transmission between the hardware fitted with the mine worker and the ground control centre.",
"title": ""
}
] | scidocsrr |
445b8b02a94ce13049c6dc57d90c0234 | Modeling Non-Functional Requirements | [
{
"docid": "221cd488d735c194e07722b1d9b3ee2a",
"text": "HURTS HELPS HURTS HELPS Data Type [Target System] Implicit HELPS HURTS HURTS BREAKS ? Invocation [Target System] Pipe & HELPS BREAKS BREAKS HELPS Filter WHEN [Target condl System] condl: size of data in domain is huge Figure 13.4. A generic Correlation Catalogue, based on [Garlan93]. Figure 13.3 shows a method which decomposes the topic on process, including algorithms as used in [Garlan93]. Decomposition methods for processes are also described in [Nixon93, 94a, 97a], drawing on implementations of processes [Chung84, 88]. These two method definitions are unparameterized. A fuller catalogue would include parameterized definitions too. Operationalization methods, which organize knowledge about satisficing NFR softgoals, are embedded in architectural designs when selected. For example, an ImplicitFunctionlnvocationRegime (based on [Garlan93]' architecture 3) can be used to hide implementation details in order to make an architectural 358 NON-FUNCTIONAL REQUIREMENTS IN SOFTWARE ENGINEERING design more extensible, thus contributing to one of the softgoals in the above decomposition. Argumentation methods and templates are used to organize principles and guidelines for making design rationale for or against design decisions (Cf. [J. Lee91]).",
"title": ""
}
] | [
{
"docid": "42fb8651df19c1295cedd3d426089802",
"text": "Recent research has shown that mindfulness-based cognitive therapy (MBCT) could be a useful alternative approach to the treatment of health anxiety and deserves further investigation. In this paper, we outline the rationale for using MBCT in the treatment of this condition, namely its hypothesised impact on the underlying mechanisms which maintain health anxiety, such as rumination and avoidance, hypervigilance to body sensations and misinterpretation of such sensations. We also describe some of the adaptations which were made to the MBCT protocol for recurrent depression in this trial and discuss the rationale for these adaptations. We use a case example from the trial to illustrate how MBCT was implemented and outline the experience of one of the participants who took part in an 8-week MBCT course. Finally, we detail some of the more general experiences of participants and discuss the advantages and possible limitations of this approach for this population, as well as considering what might be useful avenues to explore in future research.",
"title": ""
},
{
"docid": "3b988fe1c91096f67461dc9fc7bb6fae",
"text": "The paper analyzes the test setup required by the International Electrotechnical Commission (IEC) 61000-4-4 to evaluate the immunity of electronic equipment to electrical fast transients (EFTs), and proposes an electrical model of the capacitive coupling clamp, which is employed to add disturbances to nominal signals. The study points out limits on accuracy of this model, and shows how it can be fruitfully employed to predict the interference waveform affecting nominal system signals through computer simulations.",
"title": ""
},
{
"docid": "460accc688fa58684ae1a00fd5d5ddfa",
"text": "3D computer animation often struggles to compete with the flexibility and expressiveness commonly found in traditional animation, particularly when rendered non-photorealistically. We present an animation tool that takes skeleton-driven 3D computer animations and generates expressive deformations to the character geometry. The technique is based upon the cartooning and animation concepts of 'lines of action' and 'lines of motion' and automatically infuses computer animations with some of the expressiveness displayed by traditional animation. Motion and pose-based expressive deformations are generated from the motion data and the character geometry is warped along each limb's individual line of motion. The effect of this subtle, yet significant, warping is twofold: geometric inter-frame consistency is increased which helps create visually smoother animated sequences, and the warped geometry provides a novel solution to the problem of implied motion in non-photorealistic still images.",
"title": ""
},
{
"docid": "d3c91b43a4ac5b50f2faa02811616e72",
"text": "BACKGROUND\nSleep disturbance is common among disaster survivors with posttraumatic stress symptoms but is rarely addressed as a primary therapeutic target. Sleep Dynamic Therapy (SDT), an integrated program of primarily evidence-based, nonpharmacologic sleep medicine therapies coupled with standard clinical sleep medicine instructions, was administered to a large group of fire evacuees to treat posttraumatic insomnia and nightmares and determine effects on posttraumatic stress severity.\n\n\nMETHOD\nThe trial was an uncontrolled, prospective pilot study of SDT for 66 adult men and women, 10 months after exposure to the Cerro Grande Fire. SDT was provided to the entire group in 6, weekly, 2-hour sessions. Primary and secondary outcomes included validated scales for insomnia, nightmares, posttraumatic stress, anxiety, and depression, assessed at 2 pretreatment baselines on average 8 weeks apart, weekly during treatment, posttreatment, and 12-week follow-up.\n\n\nRESULTS\nSixty-nine participants completed both pretreatment assessment, demonstrating small improvement in symptoms prior to starting SDT. Treatment and posttreatment assessments were completed by 66 participants, and 12-week follow-up was completed by 59 participants. From immediate pretreatment (second baseline) to posttreatment, all primary and secondary scales decreased significantly (all p values < .0001) with consistent medium-sized effects (Cohen's d = 0.29 to 1.09), and improvements were maintained at follow-up. Posttraumatic stress disorder subscales demonstrated similar changes: intrusion (d = 0.56), avoidance (d = 0.45), and arousal (d = 0.69). Fifty-three patients improved, 10 worsened, and 3 reported no change in posttraumatic stress.\n\n\nCONCLUSION\nIn an uncontrolled pilot study, chronic sleep symptoms in fire disaster evacuees were treated with SDT, which was associated with substantive and stable improvements in sleep disturbance, posttraumatic stress, anxiety, and depression 12 weeks after initiating treatment.",
"title": ""
},
{
"docid": "bb0b9b679444291bceecd68153f6f480",
"text": "Path planning is one of the most significant and challenging subjects in robot control field. In this paper, a path planning method based on an improved shuffled frog leaping algorithm is proposed. In the proposed approach, a novel updating mechanism based on the median strategy is used to avoid local optimal solution problem in the general shuffled frog leaping algorithm. Furthermore, the fitness function is modified to make the path generated by the shuffled frog leaping algorithm smoother. In each iteration, the globally best frog is obtained and its position is used to lead the movement of the robot. Finally, some simulation experiments are carried out. The experimental results show the feasibility and effectiveness of the proposed algorithm in path planning for mobile robots.",
"title": ""
},
{
"docid": "123f5d93d0b7c483a50d73ba04762550",
"text": "Chemistry and biology are intimately connected sciences yet the chemistry-biology interface remains problematic and central issues regarding the very essence of living systems remain unresolved. In this essay we build on a kinetic theory of replicating systems that encompasses the idea that there are two distinct kinds of stability in nature-thermodynamic stability, associated with \"regular\" chemical systems, and dynamic kinetic stability, associated with replicating systems. That fundamental distinction is utilized to bridge between chemistry and biology by demonstrating that within the parallel world of replicating systems there is a second law analogue to the second law of thermodynamics, and that Darwinian theory may, through scientific reductionism, be related to that second law analogue. Possible implications of these ideas to the origin of life problem and the relationship between chemical emergence and biological evolution are discussed.",
"title": ""
},
{
"docid": "01683120a2199b55d8f4aaca27098a47",
"text": "As the microblogging service (such as Weibo) is becoming popular, spam becomes a serious problem of affecting the credibility and readability of Online Social Networks. Most existing studies took use of a set of features to identify spam, but without the consideration of the overlap and dependency among different features. In this study, we investigate the problem of spam detection by analyzing real spam dataset collections of Weibo and propose a novel hybrid model of spammer detection, called SDHM, which utilizing significant features, i.e. user behavior information, online social network attributes and text content characteristics, in an organic way. Experiments on real Weibo dataset demonstrate the power of the proposed hybrid model and the promising performance.",
"title": ""
},
{
"docid": "d9888d448df6329e9a9b4fb5c1385ee3",
"text": "Designing and developing a comfortable and convenient EEG system for daily usage that can provide reliable and robust EEG signal, encompasses a number of challenges. Among them, the most ambitious is the reduction of artifacts due to body movements. This paper studies the effect of head movement artifacts on the EEG signal and on the dry electrode-tissue impedance (ETI), monitored continuously using the imec's wireless EEG headset. We have shown that motion artifacts have huge impact on the EEG spectral content in the frequency range lower than 20Hz. Coherence and spectral analysis revealed that ETI is not capable of describing disturbances at very low frequencies (below 2Hz). Therefore, we devised a motion artifact reduction (MAR) method that uses a combination of a band-pass filtering and multi-channel adaptive filtering (AF), suitable for real-time MAR. This method was capable of substantially reducing artifacts produced by head movements.",
"title": ""
},
{
"docid": "39bfd705fb71e9ba4a503246408c6820",
"text": "We develop a theoretical model to describe and explain variation in corporate governance among advanced capitalist economies, identifying the social relations and institutional arrangements that shape who controls corporations, what interests corporations serve, and the allocation of rights and responsibilities among corporate stakeholders. Our “actor-centered” institutional approach explains firm-level corporate governance practices in terms of institutional factors that shape how actors’ interests are defined (“socially constructed”) and represented. Our model has strong implications for studying issues of international convergence.",
"title": ""
},
{
"docid": "e2c4f9cfce1db6282fe3a23fd5d6f3a4",
"text": "In semi-structured case-oriented business processes, the sequence of process steps is determined by case workers based on available document content associated with a case. Transitions between process execution steps are therefore case specific and depend on independent judgment of case workers. In this paper, we propose an instance-specific probabilistic process model (PPM) whose transition probabilities are customized to the semi-structured business process instance it represents. An instance-specific PPM serves as a powerful representation to predict the likelihood of different outcomes. We also show that certain instance-specific PPMs can be transformed into a Markov chain under some non-restrictive assumptions. For instance-specific PPMs that contain parallel execution of tasks, we provide an algorithm to map them to an extended space Markov chain. This way existing Markov techniques can be leveraged to make predictions about the likelihood of executing future tasks. Predictions provided by our technique could generate early alerts for case workers about the likelihood of important or undesired outcomes in an executing case instance. We have implemented and validated our approach on a simulated automobile insurance claims handling semi-structured business process. Results indicate that an instance-specific PPM provides more accurate predictions than other methods such as conditional probability. We also show that as more document data become available, the prediction accuracy of an instance-specific PPM increases.",
"title": ""
},
{
"docid": "fc509e8f8c0076ad80df5ff6ee6b6f1e",
"text": "The purposes of this study are to construct an instrument to evaluate service quality of mobile value-added services and have a further discussion of the relationships among service quality, perceived value, customer satisfaction, and post-purchase intention. Structural equation modeling and multiple regression analysis were used to analyze the data collected from college and graduate students of fifteen major universities in Taiwan. The main findings are as follows: (1) service quality positively influences both perceived value and customer satisfaction; (2) perceived value positively influences on both customer satisfaction and post-purchase intention; (3) customer satisfaction positively influences post-purchase intention; (4) service quality has an indirect positive influence on post-purchase intention through customer satisfaction or perceived value; (5) among the dimensions of service quality, “customer service and system reliability” is most influential on perceived value and customer satisfaction, and the influence of “content quality” ranks second; (6) the proposed model is proven with the effectiveness in explaining the relationships among service quality, perceived value, customer satisfaction, and post-purchase intention in mobile added-value services.",
"title": ""
},
{
"docid": "450a0ffcd35400f586e766d68b75cc98",
"text": "While there has been a success in 2D human pose estimation with convolutional neural networks (CNNs), 3D human pose estimation has not been thoroughly studied. In this paper, we tackle the 3D human pose estimation task with end-to-end learning using CNNs. Relative 3D positions between one joint and the other joints are learned via CNNs. The proposed method improves the performance of CNN with two novel ideas. First, we added 2D pose information to estimate a 3D pose from an image by concatenating 2D pose estimation result with the features from an image. Second, we have found that more accurate 3D poses are obtained by combining information on relative positions with respect to multiple joints, instead of just one root joint. Experimental results show that the proposed method achieves comparable performance to the state-of-the-art methods on Human 3.6m dataset.",
"title": ""
},
{
"docid": "81384d801ba37feaca150eca5621afbb",
"text": "Next-generation sequencing technologies have had a dramatic impact in the field of genomic research through the provision of a low cost, high-throughput alternative to traditional capillary sequencers. These new sequencing methods have surpassed their original scope and now provide a range of utility-based applications, which allow for a more comprehensive analysis of the structure and content of microbial genomes than was previously possible. With the commercialization of a third generation of sequencing technologies imminent, we discuss the applications of current next-generation sequencing methods and explore their impact on and contribution to microbial genome research.",
"title": ""
},
{
"docid": "e2a605f5c22592bd5ca828d4893984be",
"text": "Deep neural networks are complex and opaque. As they enter application in a variety of important and safety critical domains, users seek methods to explain their output predictions. We develop an approach to explaining deep neural networks by constructing causal models on salient concepts contained in a CNN. We develop methods to extract salient concepts throughout a target network by using autoencoders trained to extract humanunderstandable representations of network activations. We then build a bayesian causal model using these extracted concepts as variables in order to explain image classification. Finally, we use this causal model to identify and visualize features with significant causal influence on final classification.",
"title": ""
},
{
"docid": "1d949b64320fce803048b981ae32ce38",
"text": "In the field of voice therapy, perceptual evaluation is widely used by expert listeners as a way to evaluate pathological and normal voice quality. This approach is understandably subjective as it is subject to listeners’ bias which high interand intra-listeners variability can be found. As such, research on automatic assessment of pathological voices using a combination of subjective and objective analyses emerged. The present study aimed to develop a complementary automatic assessment system for voice quality based on the well-known GRBAS scale by using a battery of multidimensional acoustical measures through Deep Neural Networks. A total of 44 dimensionality parameters including Mel-frequency Cepstral Coefficients, Smoothed Cepstral Peak Prominence and Long-Term Average Spectrum was adopted. In addition, the state-of-the-art automatic assessment system based on Modulation Spectrum (MS) features and GMM classifiers was used as comparison system. The classification results using the proposed method revealed a moderate correlation with subjective GRBAS scores of dysphonic severity, and yielded a better performance than MS-GMM system, with the best accuracy around 81.53%. The findings indicate that such assessment system can be used as an appropriate evaluation tool in determining the presence and severity of voice disorders.",
"title": ""
},
{
"docid": "ac1cf73b0f59279d02611239781af7c1",
"text": "This paper presents V3, an unsupervised system for aspect-based Sentiment Analysis when evaluated on the SemEval 2014 Task 4. V3 focuses on generating a list of aspect terms for a new domain using a collection of raw texts from the domain. We also implement a very basic approach to classify the aspect terms into categories and assign polarities to them.",
"title": ""
},
{
"docid": "b43bcd460924f0b5a7366f23bf0d8fe7",
"text": "Historically, it has been difficult to define paraphilias in a consistent manner or distinguish paraphilias from non-paraphilic or normophilic sexual interests (see Blanchard, 2009a; Moser & Kleinplatz, 2005). As part of the American Psychiatric Association’s (APA) process of revising the Diagnostic and Statistical Manual of Mental Disorders (DSM), Blanchard (2010a), the chair of the DSM-5 Paraphilias subworkgroup (PSWG), has proposed a new paraphilia definition: ‘‘A paraphilia is any powerful and persistent sexual interest other than sexual interest in copulatory or precopulatory behavior with phenotypicallynormal, consentingadulthumanpartners’’ (p. 367). Blanchard (2009a) acknowledges that his paraphilia ‘‘definition is not watertight’’and it already has attracted serious criticism (see Haeberle, 2010; Hinderliter, 2010; Singy, 2010). The current analysis will critique three components of Blanchard’s proposed definition (sexual interest in copulatory or precopulatory behavior, phenotypically normal, and consenting adult human partners) to determine if the definition is internally consistent andreliably distinguishes individualswith a paraphilia from individuals with normophilia. Blanchard (2009a) believes his definition ‘‘is better than no real definition,’’but that remains to be seen. According to Blanchard (2009a), the current DSM paraphilia definition (APA, 2000) is a definition by concatenation (a list of things that are paraphilias), but he believes a definition by exclusion (everything that is not normophilic) is preferable. The change is not substantive as normophilia (formerly a definitionofexclusion)nowbecomesadefinitionofconcatenation (a list of acceptable activities). Nevertheless, it seems odd to define a paraphilia on the basis of what it is not, rather than by the commonalities among the different paraphilias. Most definitions are statements of what things are, not what things are excluded or lists of things to be included. Blanchard (2009a) purposefully left ‘‘intact the distinction betweennormativeandnon-normativesexualbehavior,’’implying that these categories are meaningful. Blanchard (2010b; see alsoBlanchardetal.,2009)definesaparaphiliabyrelativeascertainment (the interest in paraphilic stimuli is greater than the interest in normophilic stimuli) rather than absolute ascertainment (the interest is intense). Using relative ascertainment confirms that one cannot be both paraphilic and normophilic; the greater interest would classify the individual as paraphilic or normophilic. Blanchard (2010a) then contradicts himself when he asserts that once ascertained with a paraphilia, the individual should retain that label, even if the powerful and persistent paraphilic sexual interest dissipates. Logically, the relative dissipation of the paraphilic and augmentation of the normophilic interests should re-categorize the individual as normophilic. The first aspect of Blanchard’s paraphilia definition is the ‘‘sexual interest incopulatoryorprecopulatorybehavior.’’Obviously, most normophilic individuals do not desire or respond sexually to all adults. Ascertaining if someone is more aroused by the coitus or their partner’s physique, attitude, attributes, etc. seems fruitless and hopelessly convoluted. I can see no other way to interpret sexual interest in copulatory or precopulatory behavior, except to conclude that coitus (between phenotypically normal consenting adults) is normophilic. Otherwise, a powerful and persistent preference for blonde (or Asian or petite) coital partners is a paraphilia. If a relative lack of sexual interest in brunettes as potential coital partners indicates a C. Moser (&) Department of Sexual Medicine, Institute for Advanced Study of Human Sexuality, 45 Castro Street, #125, San Francisco, CA 94114, USA e-mail: docx2@ix.netcom.com 1 Another version of this definition exists (Blanchard, 2009a, 2009b), but I do not believe the changes substantially alter any of my comments.",
"title": ""
},
{
"docid": "c30d53cd8c350615f20d5baef55de6d0",
"text": "The Internet of Things (IoT) is everywhere around us. Smart communicating objects offer the digitalization of lives. Thus, IoT opens new opportunities in criminal investigations such as a protagonist or a witness to the event. Any investigation process involves four phases: firstly the identification of an incident and its evidence, secondly device collection and preservation, thirdly data examination and extraction and then finally data analysis and formalization.\n In recent years, the scientific community sought to develop a common digital framework and methodology adapted to IoT-based infrastructure. However, the difficulty of IoT lies in the heterogeneous nature of the device, lack of standards and the complex architecture. Although digital forensics are considered and adopted in IoT investigations, this work only focuses on collection. Indeed the identification phase is relatively unexplored. It addresses challenges of finding the best evidence and locating hidden devices. So, the traditional method of digital forensics does not fully fit the IoT environment.\n In this paperwork, we investigate the mobility in the context of IoT at the crime scene. This paper discusses the data identification and the classification methodology from IoT to looking for the best evidences. We propose tools and techniques to identify and locate IoT devices. We develop the recent concept of \"digital footprint\" in the crime area based on frequencies and interactions mapping between devices. We propose technical and data criteria to efficiently select IoT devices. Finally, the paper introduces a generalist classification table as well as the limits of such an approach.",
"title": ""
},
{
"docid": "0a557bbd59817ceb5ae34699c72d79ee",
"text": "In this paper, we propose a PTS-based approach to solve the high peak-to-average power ratio (PAPR) problem in filter bank multicarrier (FBMC) system with the consider of the prototype filter and the overlap feature of the symbols in time domain. In this approach, we improve the performance of the traditional PTS approach by modifying the choice of the best weighting factors with the consideration of the overlap between the present symbol and the past symbols. The simulation result shows this approach performs better than traditional PTS approach in the reduction of PAPR in FBMC system.",
"title": ""
},
{
"docid": "8705415b41d8b3c2e7cb4f7523e0f958",
"text": "Research in the field of Computer Supported Collaborative Learning (CSCL) is based on a wide variety of methodologies. In this paper, we focus upon content analysis, which is a technique often used to analyze transcripts of asynchronous, computer mediated discussion groups in formal educational settings. Although this research technique is often used, standards are not yet established. The applied instruments reflect a wide variety of approaches and differ in their level of detail and the type of analysis categories used. Further differences are related to a diversity in their theoretical base, the amount of information about validity and reliability, and the choice for the unit of analysis. This article presents an overview of different content analysis instruments, building on a sample of models commonly used in the CSCL-literature. The discussion of 15 instruments results in a number of critical conclusions. There are questions about the coherence between the theoretical base and the operational translation of the theory in the instruments. Instruments are hardly compared or contrasted with one another. As a consequence the empirical base of the validity of the instruments is limited. The analysis is rather critical when it comes to the issue of reliability. The authors put forward the need to improve the theoretical and empirical base of the existing instruments in order to promote the overall quality of CSCL-research. 2005 Elsevier Ltd. All rights reserved.",
"title": ""
}
] | scidocsrr |
99051e983f91eea7b2e3c66f305c2d63 | Machine Recognition of Music Emotion: A Review | [
{
"docid": "c692dd35605c4af62429edef6b80c121",
"text": "As one of the most important mid-level features of music, chord contains rich information of harmonic structure that is useful for music information retrieval. In this paper, we present a chord recognition system based on the N-gram model. The system is time-efficient, and its accuracy is comparable to existing systems. We further propose a new method to construct chord features for music emotion classification and evaluate its performance on commercial song recordings. Experimental results demonstrate the advantage of using chord features for music classification and retrieval.",
"title": ""
}
] | [
{
"docid": "502d31f5f473f3e93ee86bdfd79e0d75",
"text": "The call-by-need lambda calculus provides an equational framework for reasoning syntactically about lazy evaluation. This paper examines its operational characteristics.\n By a series of reasoning steps, we systematically unpack the standard-order reduction relation of the calculus and discover a novel abstract machine definition which, like the calculus, goes \"under lambdas.\" We prove that machine evaluation is equivalent to standard-order evaluation.\n Unlike traditional abstract machines, delimited control plays a significant role in the machine's behavior. In particular, the machine replaces the manipulation of a heap using store-based effects with disciplined management of the evaluation stack using control-based effects. In short, state is replaced with control.\n To further articulate this observation, we present a simulation of call-by-need in a call-by-value language using delimited control operations.",
"title": ""
},
{
"docid": "5666b1a6289f4eac05531b8ff78755cb",
"text": "Neural text generation models are often autoregressive language models or seq2seq models. These models generate text by sampling words sequentially, with each word conditioned on the previous word, and are state-of-the-art for several machine translation and summarization benchmarks. These benchmarks are often defined by validation perplexity even though this is not a direct measure of the quality of the generated text. Additionally, these models are typically trained via maximum likelihood and teacher forcing. These methods are well-suited to optimizing perplexity but can result in poor sample quality since generating text requires conditioning on sequences of words that may have never been observed at training time. We propose to improve sample quality using Generative Adversarial Networks (GANs), which explicitly train the generator to produce high quality samples and have shown a lot of success in image generation. GANs were originally designed to output differentiable values, so discrete language generation is challenging for them. We claim that validation perplexity alone is not indicative of the quality of text generated by a model. We introduce an actor-critic conditional GAN that fills in missing text conditioned on the surrounding context. We show qualitatively and quantitatively, evidence that this produces more realistic conditional and unconditional text samples compared to a maximum likelihood trained model.",
"title": ""
},
{
"docid": "8c3ecd27a695fef2d009bbf627820a0d",
"text": "This paper presents a novel attention mechanism to improve stereo-vision based object recognition systems in terms of recognition performance and computational efficiency at the same time. We utilize the Stixel World, a compact medium-level 3D representation of the local environment, as an early focus-of-attention stage for subsequent system modules. In particular, the search space of computationally expensive pattern classifiers is significantly narrowed down. We explicitly couple the 3D Stixel representation with prior knowledge about the object class of interest, i.e. 3D geometry and symmetry, to precisely focus processing on well-defined local regions that are consistent with the environment model. Experiments are conducted on large real-world datasets captured from a moving vehicle in urban traffic. In case of vehicle recognition as an experimental testbed, we demonstrate that the proposed Stixel-based attention mechanism significantly reduces false positive rates at constant sensitivity levels by up to a factor of 8 over state-of-the-art. At the same time, computational costs are reduced by more than an order of magnitude.",
"title": ""
},
{
"docid": "b825426604420620e1bba43c0f45115e",
"text": "Taxonomies are the backbone of many structured, semantic knowledge resources. Recent works for extracting taxonomic relations from text focused on collecting lexical-syntactic patterns to extract the taxonomic relations by matching the patterns to text. These approaches, however, often show low coverage due to the lack of contextual analysis across sentences. To address this issue, we propose a novel approach that collectively utilizes contextual information of terms in syntactic structures such that if the set of contexts of a term includes most of contexts of another term, a subsumption relation between the two terms is inferred. We apply this method to the task of taxonomy construction from scratch, where we introduce another novel graph-based algorithm for taxonomic structure induction. Our experiment results show that the proposed method is well complementary with previous methods of linguistic pattern matching and significantly improves recall and thus F-measure.",
"title": ""
},
{
"docid": "44ff9580f0ad6321827cf3f391a61151",
"text": "This paper aims to evaluate the aesthetic visual quality of a special type of visual media: digital images of paintings. Assessing the aesthetic visual quality of paintings can be considered a highly subjective task. However, to some extent, certain paintings are believed, by consensus, to have higher aesthetic quality than others. In this paper, we treat this challenge as a machine learning problem, in order to evaluate the aesthetic quality of paintings based on their visual content. We design a group of methods to extract features to represent both the global characteristics and local characteristics of a painting. Inspiration for these features comes from our prior knowledge in art and a questionnaire survey we conducted to study factors that affect human's judgments. We collect painting images and ask human subjects to score them. These paintings are then used for both training and testing in our experiments. Experimental results show that the proposed work can classify high-quality and low-quality paintings with performance comparable to humans. This work provides a machine learning scheme for the research of exploring the relationship between aesthetic perceptions of human and the computational visual features extracted from paintings.",
"title": ""
},
{
"docid": "616bd9a0599c2039ca6d32fd855b43da",
"text": "A new software-based liveness detection approach using a novel fingerprint parameterization based on quality related features is proposed. The system is tested on a highly challenging database comprising over 10,500 real and fake images acquired with five sensors of different technologies and covering a wide range of direct attack scenarios in terms of materials and procedures followed to generate the gummy fingers. The proposed solution proves to be robust to the multi-scenario dataset, and presents an overall rate of 90% correctly classified samples. Furthermore, the liveness detection method presented has the added advantage over previously studied techniques of needing just one image from a finger to decide whether it is real or fake. This last characteristic provides the method with very valuable features as it makes it less intrusive, more user friendly, faster and reduces its implementation costs.",
"title": ""
},
{
"docid": "4d11eca5601f5128801a8159a154593a",
"text": "Polymorphic malware belong to the class of host based threats which defy signature based detection mechanisms. Threat actors use various code obfuscation methods to hide the code details of the polymorphic malware and each dynamic iteration of the malware bears different and new signatures therefore makes its detection harder by signature based antimalware programs. Sandbox based detection systems perform syntactic analysis of the binary files to find known patterns from the un-encrypted segment of the malware file. Anomaly based detection systems can detect polymorphic threats but generate enormous false alarms. In this work, authors present a novel cognitive framework using semantic features to detect the presence of polymorphic malware inside a Microsoft Windows host using a process tree based temporal directed graph. Fractal analysis is performed to find cognitively distinguishable patterns of the malicious processes containing polymorphic malware executables. The main contributions of this paper are; the presentation of a graph theoretic approach for semantic characterization of polymorphism in the operating system's process tree, and the cognitive feature extraction of the polymorphic behavior for detection over a temporal process space.",
"title": ""
},
{
"docid": "f23316e66118193da4c6f166edfae6c0",
"text": "We present the first unsupervised approach for semantic parsing that rivals the accuracy of supervised approaches in translating natural-language questions to database queries. Our GUSP system produces a semantic parse by annotating the dependency-tree nodes and edges with latent states, and learns a probabilistic grammar using EM. To compensate for the lack of example annotations or question-answer pairs, GUSP adopts a novel grounded-learning approach to leverage database for indirect supervision. On the challenging ATIS dataset, GUSP attained an accuracy of 84%, effectively tying with the best published results by supervised approaches.",
"title": ""
},
{
"docid": "5ee21318b1601a1d42162273a7c9026c",
"text": "We used a knock-in strategy to generate two lines of mice expressing Cre recombinase under the transcriptional control of the dopamine transporter promoter (DAT-cre mice) or the serotonin transporter promoter (SERT-cre mice). In DAT-cre mice, immunocytochemical staining of adult brains for the dopamine-synthetic enzyme tyrosine hydroxylase and for Cre recombinase revealed that virtually all dopaminergic neurons in the ventral midbrain expressed Cre. Crossing DAT-cre mice with ROSA26-stop-lacZ or ROSA26-stop-YFP reporter mice revealed a near perfect correlation between staining for tyrosine hydroxylase and beta-galactosidase or YFP. YFP-labeled fluorescent dopaminergic neurons could be readily identified in live slices. Crossing SERT-cre mice with the ROSA26-stop-lacZ or ROSA26-stop-YFP reporter mice similarly revealed a near perfect correlation between staining for serotonin-synthetic enzyme tryptophan hydroxylase and beta-galactosidase or YFP. Additional Cre expression in the thalamus and cortex was observed, reflecting the known pattern of transient SERT expression during early postnatal development. These findings suggest a general strategy of using neurotransmitter transporter promoters to drive selective Cre expression and thus control mutations in specific neurotransmitter systems. Crossed with fluorescent-gene reporters, this strategy tags neurons by neurotransmitter status, providing new tools for electrophysiology and imaging.",
"title": ""
},
{
"docid": "b73f0b44786330a363bbbcbb71c63219",
"text": "In the third shared task of the Computational Approaches to Linguistic CodeSwitching (CALCS) workshop, we focus on Named Entity Recognition (NER) on code-switched social-media data. We divide the shared task into two competitions based on the English-Spanish (ENG-SPA) and Modern Standard ArabicEgyptian (MSA-EGY) language pairs. We use Twitter data and 9 entity types to establish a new dataset for code-switched NER benchmarks. In addition to the CS phenomenon, the diversity of the entities and the social media challenges make the task considerably hard to process. As a result, the best scores of the competitions are 63.76% and 71.61% for ENG-SPA and MSA-EGY, respectively. We present the scores of 9 participants and discuss the most common challenges among submissions.",
"title": ""
},
{
"docid": "1128977e3831283b900f7d1c344f6713",
"text": "In this work, we present a framework to capture 3D models of faces in high resolutions with low computational load. The system captures only two pictures of the face, one illuminated with a colored stripe pattern and one with regular white light. The former is needed for the depth calculation, the latter is used as texture. Having these two images a combination of specialized algorithms is applied to generate a 3D model. The results are shown in different views: simple surface, wire grid respective polygon mesh or textured 3D surface.",
"title": ""
},
{
"docid": "79ad27cffbbcbe3a49124abd82c6e477",
"text": "In this paper we address the following problem in web document and information retrieval (IR): How can we use long-term context information to gain better IR performance? Unlike common IR methods that use bag of words representation for queries and documents, we treat them as a sequence of words and use long short term memory (LSTM) to capture contextual dependencies. To the best of our knowledge, this is the first time that LSTM is applied to information retrieval tasks. Unlike training traditional LSTMs, the training strategy is different due to the special nature of information retrieval problem. Experimental evaluation on an IR task derived from the Bing web search demonstrates the ability of the proposed method in addressing both lexical mismatch and long-term context modelling issues, thereby, significantly outperforming existing state of the art methods for web document retrieval task.",
"title": ""
},
{
"docid": "67808f54305bc2bb2b3dd666f8b4ef42",
"text": "Sensing devices are becoming the source of a large portion of the Web data. To facilitate the integration of sensed data with data from other sources, both sensor stream sources and data are being enriched with semantic descriptions, creating Linked Stream Data. Despite its enormous potential, little has been done to explore Linked Stream Data. One of the main characteristics of such data is its “live” nature, which prohibits existing Linked Data technologies to be applied directly. Moreover, there is currently a lack of tools to facilitate publishing Linked Stream Data and making it available to other applications. To address these issues we have developed the Linked Stream Middleware (LSM), a platform that brings together the live real world sensed data and the Semantic Web. A LSM deployment is available at http://lsm.deri.ie/. It provides many functionalities such as: i) wrappers for real time data collection and publishing; ii) a web interface for data annotation and visualisation; and iii) a SPARQL endpoint for querying unified Linked Stream Data and Linked Data. In this paper we describe the system architecture behind LSM, provide details how Linked Stream Data is generated, and demonstrate the benefits of the platform by showcasing its interface.",
"title": ""
},
{
"docid": "b6da971f13c1075ce1b4aca303e7393f",
"text": "In this paper, we evaluate the generalization power of deep features (ConvNets) in two new scenarios: aerial and remote sensing image classification. We evaluate experimentally ConvNets trained for recognizing everyday objects for the classification of aerial and remote sensing images. ConvNets obtained the best results for aerial images, while for remote sensing, they performed well but were outperformed by low-level color descriptors, such as BIC. We also present a correlation analysis, showing the potential for combining/fusing different ConvNets with other descriptors or even for combining multiple ConvNets. A preliminary set of experiments fusing ConvNets obtains state-of-the-art results for the well-known UCMerced dataset.",
"title": ""
},
{
"docid": "9bff76e87f4bfa3629e38621060050f7",
"text": "Non-textual components such as charts, diagrams and tables provide key information in many scientific documents, but the lack of large labeled datasets has impeded the development of data-driven methods for scientific figure extraction. In this paper, we induce high-quality training labels for the task of figure extraction in a large number of scientific documents, with no human intervention. To accomplish this we leverage the auxiliary data provided in two large web collections of scientific documents (arXiv and PubMed) to locate figures and their associated captions in the rasterized PDF. We share the resulting dataset of over 5.5 million induced labels---4,000 times larger than the previous largest figure extraction dataset---with an average precision of 96.8%, to enable the development of modern data-driven methods for this task. We use this dataset to train a deep neural network for end-to-end figure detection, yielding a model that can be more easily extended to new domains compared to previous work. The model was successfully deployed in Semantic Scholar,\\footnote\\urlhttps://www.semanticscholar.org/ a large-scale academic search engine, and used to extract figures in 13 million scientific documents.\\footnoteA demo of our system is available at \\urlhttp://labs.semanticscholar.org/deepfigures/,and our dataset of induced labels can be downloaded at \\urlhttps://s3-us-west-2.amazonaws.com/ai2-s2-research-public/deepfigures/jcdl-deepfigures-labels.tar.gz. Code to run our system locally can be found at \\urlhttps://github.com/allenai/deepfigures-open.",
"title": ""
},
{
"docid": "9dad87b0134d9f165b0208baf40c7f0f",
"text": "Frequent Itemset Mining (FIM) is the most important and time-consuming step of association rules mining. With the increment of data scale, many efficient single-machine algorithms of FIM, such as FP-growth and Apriori, cannot accomplish the computing tasks within reasonable time. As a result of the limitation of single-machine methods, researchers presented some distributed algorithms based on MapReduce and Spark, such as PFP and YAFIM. Nevertheless, the heavy disk I/O cost at each MapReduce operation makes PFP not efficient enough. YAFIM needs to generate candidate frequent itemsets in each iterative step. It makes YAFIM time-consuming. And if the scale of data is large enough, YAFIM algorithm will not work due to the limitation of memory since the candidate frequent itemsets need to be stored in the memory. And the size of candidate itemsets is very large especially facing the massive data. In this work, we propose a distributed FP-growth algorithm based on Spark, we call it DFPS. DFPS partitions computing tasks in such a way that each computing node builds the conditional FP-tree and adopts a pattern fragment growth method to mine the frequent itemsets independently. DFPS doesn't need to pass messages between nodes during mining frequent itemsets. Our performance study shows that DFPS algorithm is more excellent than YAFIM, especially when the length of transactions is long, the number of items is large and the data is massive. And DFPS has an excellent scalability. The experimental results show that DFPS is more than 10 times faster than YAFIM for T10I4D100K dataset and Pumsb_star dataset.",
"title": ""
},
{
"docid": "3c8d59590b328e0b4ab6b856721009aa",
"text": "Mobile augmented reality (MAR) enabled devices have the capability to present a large amount of information in real time, based on sensors that determine proximity, visual reference, maps, and detailed information on the environment. Location and proximity technologies combined with detailed mapping allow effective navigation. Visual analysis software and growing image databases enable object recognition. Advanced graphics capabilities bring sophisticated presentation of the user interface. These capabilities together allow for real-time melding of the physical and the virtual worlds and can be used for information overlay of the user’s environment for various purposes such as entertainment, tourist assistance, navigation assistance, and education [ 1 ] . In designing for MAR applications it is very important to understand the context in which the information has to be presented. Past research on information presentation on small form factor computing has highlighted the importance of presenting the right information in the right way to effectively engage the user [ 2– 4 ] . The screen space that is available on a small form factor is limited, and having augmented information presented as an overlay poses very interesting challenges. MAR usages involve devices that are able to perceive the context of the user based on the location and other sensor based information. In their paper on “ContextAware Pervasive Systems: Architectures for a New Breed of Applications”, Loke [ 5 ] ,",
"title": ""
},
{
"docid": "87a14f9cfdec433672095c2b0d9b9dde",
"text": "This paper discusses a comprehensive suite of experiments that analyze the performance of the random forest (RF) learner implemented in Weka. RF is a relatively new learner, and to the best of our knowledge, only preliminary experimentation on the construction of random forest classifiers in the context of imbalanced data has been reported in previous work. Therefore, the contribution of this study is to provide an extensive empirical evaluation of RF learners built from imbalanced data. What should be the recommended default number of trees in the ensemble? What should the recommended value be for the number of attributes? How does the RF learner perform on imbalanced data when compared with other commonly-used learners? We address these and other related issues in this work.",
"title": ""
},
{
"docid": "34dfcc1e7744afb236f14b5804214c40",
"text": "This paper presents a vision-based real-time gaze zone estimator based on a driver's head orientation composed of yaw and pitch. Generally, vision-based methods are vulnerable to the wearing of eyeglasses and image variations between day and night. The proposed method is novel in the following four ways: First, the proposed method can work under both day and night conditions and is robust to facial image variation caused by eyeglasses because it only requires simple facial features and not specific features such as eyes, lip corners, and facial contours. Second, an ellipsoidal face model is proposed instead of a cylindrical face model to exactly determine a driver's yaw. Third, we propose new features-the normalized mean and the standard deviation of the horizontal edge projection histogram-to reliably and rapidly estimate a driver's pitch. Fourth, the proposed method obtains an accurate gaze zone by using a support vector machine. Experimental results from 200 000 images showed that the root mean square errors of the estimated yaw and pitch angles are below 7 under both daylight and nighttime conditions. Equivalent results were obtained for drivers with glasses or sunglasses, and 18 gaze zones were accurately estimated using the proposed gaze estimation method.",
"title": ""
},
{
"docid": "d507fc48f5d2500251b72cb2ebc94d40",
"text": "We investigate the extent to which social ties between people can be inferred from co-occurrence in time and space: Given that two people have been in approximately the same geographic locale at approximately the same time, on multiple occasions, how likely are they to know each other? Furthermore, how does this likelihood depend on the spatial and temporal proximity of the co-occurrences? Such issues arise in data originating in both online and offline domains as well as settings that capture interfaces between online and offline behavior. Here we develop a framework for quantifying the answers to such questions, and we apply this framework to publicly available data from a social media site, finding that even a very small number of co-occurrences can result in a high empirical likelihood of a social tie. We then present probabilistic models showing how such large probabilities can arise from a natural model of proximity and co-occurrence in the presence of social ties. In addition to providing a method for establishing some of the first quantifiable estimates of these measures, our findings have potential privacy implications, particularly for the ways in which social structures can be inferred from public online records that capture individuals' physical locations over time.",
"title": ""
}
] | scidocsrr |
7083fcf39daecbb9e4e1ef55b25e9f16 | Big data on cloud for government agencies: benefits, challenges, and solutions | [
{
"docid": "72944a6ad81c2802d0401f9e0c2d8bb5",
"text": "Available online 10 August 2016 Big Data (BD), with their potential to ascertain valued insights for enhanced decision-making process, have recently attracted substantial interest from both academics and practitioners. Big Data Analytics (BDA) is increasingly becoming a trending practice that many organizations are adopting with the purpose of constructing valuable information from BD. The analytics process, including the deployment and use of BDA tools, is seen by organizations as a tool to improve operational efficiency though it has strategic potential, drive new revenue streams and gain competitive advantages over business rivals. However, there are different types of analytic applications to consider. Therefore, prior to hasty use and buying costly BD tools, there is a need for organizations to first understand the BDA landscape. Given the significant nature of theBDandBDA, this paper presents a state-ofthe-art review that presents a holistic view of the BD challenges and BDA methods theorized/proposed/ employed by organizations to help others understand this landscape with the objective of making robust investment decisions. In doing so, systematically analysing and synthesizing the extant research published on BD and BDA area. More specifically, the authors seek to answer the following two principal questions: Q1 –What are the different types of BD challenges theorized/proposed/confronted by organizations? and Q2 – What are the different types of BDA methods theorized/proposed/employed to overcome BD challenges?. This systematic literature review (SLR) is carried out through observing and understanding the past trends and extant patterns/themes in the BDA research area, evaluating contributions, summarizing knowledge, thereby identifying limitations, implications and potential further research avenues to support the academic community in exploring research themes/patterns. Thus, to trace the implementation of BD strategies, a profiling method is employed to analyze articles (published in English-speaking peer-reviewed journals between 1996 and 2015) extracted from the Scopus database. The analysis presented in this paper has identified relevant BD research studies that have contributed both conceptually and empirically to the expansion and accrual of intellectual wealth to the BDA in technology and organizational resource management discipline. © 2016 The Authors. Published by Elsevier Inc. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).",
"title": ""
},
{
"docid": "03d5c8627ec09e4332edfa6842b6fe44",
"text": "In the same way businesses use big data to pursue profits, governments use it to promote the public good.",
"title": ""
}
] | [
{
"docid": "f4d514a95cc4444dc1cbfdc04737ec75",
"text": "Ultra-high speed data links such as 400GbE continuously push transceivers to achieve better performance and lower power consumption. This paper presents a highly parallelized TRX at 56Gb/s with integrated serializer/deserializer, FFE/CTLE/DFE, CDR, and eye-monitoring circuits. It achieves BER<10−12 under 24dB loss at 14GHz while dissipating 602mW of power.",
"title": ""
},
{
"docid": "d57072f4ffa05618ebf055824e7ae058",
"text": "Online social networks such as Friendster, MySpace, or the Facebook have experienced exponential growth in membership in recent years. These networks offer attractive means for interaction and communication, but also raise privacy and security concerns. In this study we survey a representative sample of the members of the Facebook (a social network for colleges and high schools) at a US academic institution, and compare the survey data to information retrieved from the network itself. We look for underlying demographic or behavioral differences between the communities of the network’s members and non-members; we analyze the impact of privacy concerns on members’ behavior; we compare members’ stated attitudes with actual behavior; and we document the changes in behavior subsequent to privacy-related information exposure. We find that an individual’s privacy concerns are only a weak predictor of his membership to the network. Also privacy concerned individuals join the network and reveal great amounts of personal information. Some manage their privacy concerns by trusting their ability to control the information they provide and the external access to it. However, we also find evidence of members’ misconceptions about the online community’s actual size and composition, and about the visibility of members’ profiles.",
"title": ""
},
{
"docid": "b074ba4ae329ffad0da3216dc84b22b9",
"text": "A recent research trend in Artificial Intelligence (AI) is the combination of several programs into one single, stronger, program; this is termed portfolio methods. We here investigate the application of such methods to Game Playing Programs (GPPs). In addition, we consider the case in which only one GPP is available by decomposing this single GPP into several ones through the use of parameters or even simply random seeds. These portfolio methods are trained in a learning phase. We propose two different offline approaches. The simplest one, BestArm, is a straightforward optimization of seeds or parameters; it performs quite well against the original GPP, but performs poorly against an opponent which repeats games and learns. The second one, namely Nash-portfolio, performs similarly in a “one game” test, and is much more robust against an opponent who learns. We also propose an online learning portfolio, which tests several of the GPP repeatedly and progressively switches to the best one using a bandit algorithm.",
"title": ""
},
{
"docid": "b99efb63e8016c7f5ab09e868ae894da",
"text": "The popular bag of words approach for action recognition is based on the classifying quantized local features density. This approach focuses excessively on the local features but discards all information about the interactions among them. Local features themselves may not be discriminative enough, but combined with their contexts, they can be very useful for the recognition of some actions. In this paper, we present a novel representation that captures contextual interactions between interest points, based on the density of all features observed in each interest point's mutliscale spatio-temporal contextual domain. We demonstrate that augmenting local features with our contextual feature significantly improves the recognition performance.",
"title": ""
},
{
"docid": "3bb1065dfc4e06fa35ef91e2c89d50d2",
"text": "Portable, accurate, and relatively inexpensive high-frequency vector network analyzers (VNAs) have great utility for a wide range of applications, encompassing microwave circuit characterization, reflectometry, imaging, material characterization, and nondestructive testing to name a few. To meet the rising demand for VNAs possessing the aforementioned attributes, we present a novel and simple VNA design based on a standing-wave probing device and an electronically controllable phase shifter. The phase shifter is inserted between a device under test (DUT) and a standing-wave probing device. The complex reflection coefficient of the DUT is then obtained from multiple standing-wave voltage measurements taken for several different values of the phase shift. The proposed VNA design eliminates the need for expensive heterodyne detection schemes required for tuned-receiver-based VNA designs. Compared with previously developed VNAs that operate based on performing multiple power measurements, the proposed VNA utilizes a single power detector without the need for multiport hybrid couplers. In this paper, the efficacy of the proposed VNA is demonstrated via numerical simulations and experimental measurements. For this purpose, measurements of various DUTs obtained using an X-band (8.2-12.4 GHz) prototype VNA are presented and compared with results obtained using an Agilent HP8510C VNA. The results show that the proposed VNA provides highly accurate vector measurements with typical errors on the order of 0.02 and 1° for magnitude and phase, respectively.",
"title": ""
},
{
"docid": "e37a93ff39840e1d6df589b415848a85",
"text": "In this paper we propose a stacked generalization (or stacking) model for event extraction in bio-medical text. Event extraction deals with the process of extracting detailed biological phenomenon, which is more challenging compared to the traditional binary relation extraction such as protein-protein interaction. The overall process consists of mainly three steps: event trigger detection, argument extraction by edge detection and finding correct combination of arguments. In stacking, we use Linear Support Vector Classification (Linear SVC), Logistic Regression (LR) and Stochastic Gradient Descent (SGD) as base-level learning algorithms. As meta-level learner we use Linear SVC. In edge detection step, we find out the arguments of triggers detected in trigger detection step using a SVM classifier. To find correct combination of arguments, we use rules generated by studying the properties of bio-molecular event expressions, and form an event expression consisting of event trigger, its class and arguments. The output of trigger detection is fed to edge detection for argument extraction. Experiments on benchmark datasets of BioNLP2011 show the recall, precision and Fscore of 48.96%, 66.46% and 56.38%, respectively. Comparisons with the existing systems show that our proposed model attains state-of-the-art performance.",
"title": ""
},
{
"docid": "4d585dd4d56dda31c2fb929a61aba5f8",
"text": "Growing greenhouse vegetables is one of the most exacting and intense forms of all agricultural enterprises. In combination with greenhouses, hydroponics is becoming increasingly popular, especially in the United States, Canada, western Europe, and Japan. It is high technology and capital intensive. It is highly productive, conservative of water and land and protective of the environment. For production of leafy vegetables and herbs, deep flow hydroponics is common. For growing row crops such as tomato, cucumber, and pepper, the two most popular artificial growing media are rockwool and perlite. Computers today operate hundreds of devices within a greenhouse by utilizing dozens of input parameters, to maintain the most desired growing environment. The technology of greenhouse food production is changing rapidly with systems today producing yields never before realized. The future for hydroponic/soilless cultured systems appears more positive today than any time over the last 50 years.",
"title": ""
},
{
"docid": "11c4d318abb6d2e838f74d2a6ae61415",
"text": "We propose a new framework for entity and event extraction based on generative adversarial imitation learning – an inverse reinforcement learning method using generative adversarial network (GAN). We assume that instances and labels yield to various extents of difficulty and the gains and penalties (rewards) are expected to be diverse. We utilize discriminators to estimate proper rewards according to the difference between the labels committed by ground-truth (expert) and the extractor (agent). Experiments also demonstrate that the proposed framework outperforms state-of-the-art methods.",
"title": ""
},
{
"docid": "5a3f65509a2acd678563cd495fe287de",
"text": "Auditory menus have the potential to make devices that use visual menus accessible to a wide range of users. Visually impaired users could especially benefit from the auditory feedback received during menu navigation. However, auditory menus are a relatively new concept, and there are very few guidelines that describe how to design them. This paper details how visual menu concepts may be applied to auditory menus in order to help develop design guidelines. Specifically, this set of studies examined possible ways of designing an auditory scrollbar for an auditory menu. The following different auditory scrollbar designs were evaluated: single-tone, double-tone, alphabetical grouping, and proportional grouping. Three different evaluations were conducted to determine the best design. The first two evaluations were conducted with sighted users, and the last evaluation was conducted with visually impaired users. The results suggest that pitch polarity does not matter, and proportional grouping is the best of the auditory scrollbar designs evaluated here.",
"title": ""
},
{
"docid": "4749d4153d09082d81b2b64f7954b9cd",
"text": " Background. Punctate or stippled cartilaginous calcifications are associated with many conditions, including chromosomal, infectious, endocrine, and teratogenic etiologies. Some of these conditions are clinically mild, while others are lethal. Accurate diagnosis can prove instrumental in clinical management and in genetic counseling. Objective. To describe the diagnostic radiographic features seen in Pacman dysplasia, a distinct autosomal recessive, lethal skeletal dysplasia. Materials and methods. We present the fourth reported case of Pacman dysplasia and compare the findings seen in our patient with the three previously described patients. Results. Invariable and variable radiographic findings were seen in all four cases of histologically proven Pacman dysplasia. Conclusion. Pacman dysplasia presents both constant and variable diagnostic radiographic features.",
"title": ""
},
{
"docid": "8a679c93185332398c5261ddcfe81e84",
"text": "We discuss the temporal-difference learning algorithm, as applied to approximating the cost-to-go function of an infinite-horizon discounted Markov chain, using a function approximator involving linear combinations of fixed basis functions. The algorithm we analyze performs on-line updating of a parameter vector during a single endless trajectory of an ergodic Markov chain with a finite or infinite state space. We present a proof of convergence (with probability 1), a characterization of the limit of convergence, and a bound on the resulting approximation error. In addition to proving new and stronger results than those previously available, our analysis is based on a new line of reasoning that provides new intuition about the dynamics of temporal-difference learning. Finally, we prove that on-line updates, based on entire trajectories of the Markov chain, are in a certain sense necessary for convergence. This fact reconciles positive and negative results that have been discussed in the literature, regarding the soundness of temporal-difference learning.",
"title": ""
},
{
"docid": "4248fb006221fbb74d565705dcbc5a7a",
"text": "Shot boundary detection (SBD) is an important and fundamental step in video content analysis such as content-based video indexing, browsing, and retrieval. In this paper, a hybrid SBD method is presented by integrating a high-level fuzzy Petri net (HLFPN) model with keypoint matching. The HLFPN model with histogram difference is executed as a predetection. Next, the speeded-up robust features (SURF) algorithm that is reliably robust to image affine transformation and illumination variation is used to figure out all possible false shots and the gradual transition based on the assumption from the HLFPN model. The top-down design can effectively lower down the computational complexity of SURF algorithm. The proposed approach has increased the precision of SBD and can be applied in different types of videos.",
"title": ""
},
{
"docid": "b9717a3ce0ed7245621314ba3e1ce251",
"text": "Analog beamforming with phased arrays is a promising technique for 5G wireless communication at millimeter wave frequencies. Using a discrete codebook consisting of multiple analog beams, each beam focuses on a certain range of angles of arrival or departure and corresponds to a set of fixed phase shifts across frequency due to practical hardware considerations. However, for sufficiently large bandwidth, the gain provided by the phased array is actually frequency dependent, which is an effect called beam squint, and this effect occurs even if the radiation pattern of the antenna elements is frequency independent. This paper examines the nature of beam squint for a uniform linear array (ULA) and analyzes its impact on codebook design as a function of the number of antennas and system bandwidth normalized by the carrier frequency. The criterion for codebook design is to guarantee that each beam's minimum gain for a range of angles and for all frequencies in the wideband system exceeds a target threshold, for example 3 dB below the array's maximum gain. Analysis and numerical examples suggest that a denser codebook is required to compensate for beam squint. For example, 54% more beams are needed compared to a codebook design that ignores beam squint for a ULA with 32 antennas operating at a carrier frequency of 73 GHz and bandwidth of 2.5 GHz. Furthermore, beam squint with this design criterion limits the bandwidth or the number of antennas of the array if the other one is fixed.",
"title": ""
},
{
"docid": "2d6d5c8b1ac843687db99ccf50a0baff",
"text": "This paper presents algorithms for fast segmentation of 3D point clouds and subsequent classification of the obtained 3D segments. The method jointly determines the ground surface and segments individual objects in 3D, including overhanging structures. When compared to six other terrain modelling techniques, this approach has minimal error between the sensed data and the representation; and is fast (processing a Velodyne scan in approximately 2 seconds). Applications include improved alignment of successive scans by enabling operations in sections (Velodyne scans are aligned 7% sharper compared to an approach using raw points) and more informed decision-making (paths move around overhangs). The use of segmentation to aid classification through 3D features, such as the Spin Image or the Spherical Harmonic Descriptor, is discussed and experimentally compared. Moreover, the segmentation facilitates a novel approach to 3D classification that bypasses feature extraction and directly compares 3D shapes via the ICP algorithm. This technique is shown to achieve accuracy on par with the best feature based classifier (92.1%) while being significantly faster and allowing a clearer understanding of the classifier’s behaviour.",
"title": ""
},
{
"docid": "61ba52f205c8b497062995498816b60f",
"text": "The past century experienced a proliferation of retail formats in the marketplace. However, as a new century begins, these retail formats are being threatened by the emergence of a new kind of store, the online or Internet store. From being almost a novelty in 1995, online retailing sales were expected to reach $7 billion by 2000 [9]. In this increasngly timeconstrained world, Internet stores allow consumers to shop from the convenience of remote locations. Yet most of these Internet stores are losing money [6]. Why is such counterintuitive phenomena prevailing? The explanation may lie in the risks associated with Internet shopping. These risks may arise because consumers are concerned about the security of transmitting credit card information over the Internet. Consumers may also be apprehensive about buying something without touching or feeling it and being unable to return it if it fails to meet their approval. Having said this, however, we must point out that consumers are buying goods on the Internet. This is reflected in the fact that total sales on the Internet are on the increase [8, 11]. Who are the consumers that are patronizing the Internet? Evidently, for them the perception of the risk associated with shopping on the Internet is low or is overshadowed by its relative convenience. This article attempts to determine why certain consumers are drawn to the Internet and why others are not. Since the pioneering research done by Becker [3], it has been accepted that the consumer maximizes his utility subject to not only income constraints but also time constraints. A consumer seeks out his best decision given that he has a limited budget of time and money. While purchasing a product from a store, a consumer has to expend both money and time. Therefore, the consumer patronizes the retail store where his total costs or the money and time spent in the entire process are the least. Since the util-",
"title": ""
},
{
"docid": "28cf177349095e7db4cdaf6c9c4a6cb1",
"text": "Neural Architecture Search aims at automatically finding neural architectures that are competitive with architectures designed by human experts. While recent approaches have achieved state-of-the-art predictive performance for image recognition, they are problematic under resource constraints for two reasons: (1) the neural architectures found are solely optimized for high predictive performance, without penalizing excessive resource consumption; (2) most architecture search methods require vast computational resources. We address the first shortcoming by proposing LEMONADE, an evolutionary algorithm for multi-objective architecture search that allows approximating the entire Pareto-front of architectures under multiple objectives, such as predictive performance and number of parameters, in a single run of the method. We address the second shortcoming by proposing a Lamarckian inheritance mechanism for LEMONADE which generates children networks that are warmstarted with the predictive performance of their trained parents. This is accomplished by using (approximate) network morphism operators for generating children. The combination of these two contributions allows finding models that are on par or even outperform both hand-crafted as well as automatically-designed networks.",
"title": ""
},
{
"docid": "8bb5a38908446ca4e6acb4d65c4c817c",
"text": "Column-oriented database systems have been a real game changer for the industry in recent years. Highly tuned and performant systems have evolved that provide users with the possibility of answering ad hoc queries over large datasets in an interactive manner. In this paper we present the column-oriented datastore developed as one of the central components of PowerDrill. It combines the advantages of columnar data layout with other known techniques (such as using composite range partitions) and extensive algorithmic engineering on key data structures. The main goal of the latter being to reduce the main memory footprint and to increase the efficiency in processing typical user queries. In this combination we achieve large speed-ups. These enable a highly interactive Web UI where it is common that a single mouse click leads to processing a trillion values in the underlying dataset.",
"title": ""
},
{
"docid": "4775bf71a5eea05b77cafa53daefcff9",
"text": "There is mounting empirical evidence that interacting with nature delivers measurable benefits to people. Reviews of this topic have generally focused on a specific type of benefit, been limited to a single discipline, or covered the benefits delivered from a particular type of interaction. Here we construct novel typologies of the settings, interactions and potential benefits of people-nature experiences, and use these to organise an assessment of the benefits of interacting with nature. We discover that evidence for the benefits of interacting with nature is geographically biased towards high latitudes and Western societies, potentially contributing to a focus on certain types of settings and benefits. Social scientists have been the most active researchers in this field. Contributions from ecologists are few in number, perhaps hindering the identification of key ecological features of the natural environment that deliver human benefits. Although many types of benefits have been studied, benefits to physical health, cognitive performance and psychological well-being have received much more attention than the social or spiritual benefits of interacting with nature, despite the potential for important consequences arising from the latter. The evidence for most benefits is correlational, and although there are several experimental studies, little as yet is known about the mechanisms that are important for delivering these benefits. For example, we do not know which characteristics of natural settings (e.g., biodiversity, level of disturbance, proximity, accessibility) are most important for triggering a beneficial interaction, and how these characteristics vary in importance among cultures, geographic regions and socio-economic groups. These are key directions for future research if we are to design landscapes that promote high quality interactions between people and nature in a rapidly urbanising world.",
"title": ""
},
{
"docid": "db158f806e56a1aae74aae15252703d2",
"text": "Despite achieving impressive performance, state-of-the-art classifiers remain highly vulnerable to small, imperceptible, adversarial perturbations. This vulnerability has proven empirically to be very intricate to address. In this paper, we study the phenomenon of adversarial perturbations under the assumption that the data is generated with a smooth generative model. We derive fundamental upper bounds on the robustness to perturbations of any classification function, and prove the existence of adversarial perturbations that transfer well across different classifiers with small risk. Our analysis of the robustness also provides insights onto key properties of generative models, such as their smoothness and dimensionality of latent space. We conclude with numerical experimental results showing that our bounds provide informative baselines to the maximal achievable robustness on several datasets.",
"title": ""
},
{
"docid": "4f7fbc3f313e68456e57a2d6d3c90cd0",
"text": "This survey paper describes a focused literature survey of machine learning (ML) and data mining (DM) methods for cyber analytics in support of intrusion detection. Short tutorial descriptions of each ML/DM method are provided. Based on the number of citations or the relevance of an emerging method, papers representing each method were identified, read, and summarized. Because data are so important in ML/DM approaches, some well-known cyber data sets used in ML/DM are described. The complexity of ML/DM algorithms is addressed, discussion of challenges for using ML/DM for cyber security is presented, and some recommendations on when to use a given method are provided.",
"title": ""
}
] | scidocsrr |
3a1cadc1ff0328e393819c2c150fdd8e | THE LANGLANDS-KOTTWITZ APPROACH FOR SOME SIMPLE SHIMURA VARIETIES | [
{
"docid": "134ecc62958fa9bb930ff934c5fad7a3",
"text": "We extend our methods from [24] to reprove the Local Langlands Correspondence for GLn over p-adic fields as well as the existence of `-adic Galois representations attached to (most) regular algebraic conjugate self-dual cuspidal automorphic representations, for which we prove a local-global compatibility statement as in the book of Harris-Taylor, [10]. In contrast to the proofs of the Local Langlands Correspondence given by Henniart, [13], and Harris-Taylor, [10], our proof completely by-passes the numerical Local Langlands Correspondence of Henniart, [11]. Instead, we make use of a previous result from [24] describing the inertia-invariant nearby cycles in certain regular situations.",
"title": ""
}
] | [
{
"docid": "d337f149d3e52079c56731f4f3d8ea3e",
"text": "Contextual word representations derived from pre-trained bidirectional language models (biLMs) have recently been shown to provide significant improvements to the state of the art for a wide range of NLP tasks. However, many questions remain as to how and why these models are so effective. In this paper, we present a detailed empirical study of how the choice of neural architecture (e.g. LSTM, CNN, or self attention) influences both end task accuracy and qualitative properties of the representations that are learned. We show there is a tradeoff between speed and accuracy, but all architectures learn high quality contextual representations that outperform word embeddings for four challenging NLP tasks. Additionally, all architectures learn representations that vary with network depth, from exclusively morphological based at the word embedding layer through local syntax based in the lower contextual layers to longer range semantics such coreference at the upper layers. Together, these results suggest that unsupervised biLMs, independent of architecture, are learning much more about the structure of language than previously appreciated.",
"title": ""
},
{
"docid": "38aba50fc1512bc48773df729c8305cf",
"text": "In this study, we explore various natural language processing (NLP) methods to perform sentiment analysis. We look at two different datasets, one with binary labels, and one with multi-class labels. For the binary classification we applied the bag of words, and skip-gram word2vec models followed by various classifiers, including random forest, SVM, and logistic regression. For the multi-class case, we implemented the recursive neural tensor networks (RNTN). To overcome the high computational cost of training the standard RNTN we introduce the lowrank RNTN, in which the matrices involved in the quadratic term of RNTN are substituted by symmetric low-rank matrices. We show that the low-rank RNTN leads to significant saving in computational cost, while having similar a accuracy as that of RNTN.",
"title": ""
},
{
"docid": "f006b6e0768e001d9593b14c8800cfde",
"text": "Do learning and retrieval of a memory activate the same neurons? Does the number of reactivated neurons correlate with memory strength? We developed a transgenic mouse that enables the long-lasting genetic tagging of c-fos-active neurons. We found neurons in the basolateral amygdala that are activated during Pavlovian fear conditioning and are reactivated during memory retrieval. The number of reactivated neurons correlated positively with the behavioral expression of the fear memory, indicating a stable neural correlate of associative memory. The ability to manipulate these neurons genetically should allow a more precise dissection of the molecular mechanisms of memory encoding within a distributed neuronal network.",
"title": ""
},
{
"docid": "805f445952a94a0e068966998b486db4",
"text": "Narcissistic personality disorder (NPD) is a trait-based disorder that can be understood as a pathological amplification of narcissistic traits. While temperamental vulnerability and psychological adversity are risk factors for NPD, sociocultural factors are also important. This review hypothesizes that increases in narcissistic traits and cultural narcissism could be associated with changes in the prevalence of NPD. These shifts seem to be a relatively recent phenomenon, driven by social changes associated with modernity. While the main treatment for NPD remains psychotherapy, that form of treatment is itself a product of modernity and individualism. The hypothesis is presented that psychological treatment, unless modified to address the specific problems associated with NPD, could run the risk of supporting narcissism.",
"title": ""
},
{
"docid": "2e4ac47cdc063d76089c17f30a379765",
"text": "Determination of the type and origin of the body fluids found at a crime scene can give important insights into crime scene reconstruction by supporting a link between sample donors and actual criminal acts. For more than a century, numerous types of body fluid identification methods have been developed, such as chemical tests, immunological tests, protein catalytic activity tests, spectroscopic methods and microscopy. However, these conventional body fluid identification methods are mostly presumptive, and are carried out for only one body fluid at a time. Therefore, the use of a molecular genetics-based approach using RNA profiling or DNA methylation detection has been recently proposed to supplant conventional body fluid identification methods. Several RNA markers and tDMRs (tissue-specific differentially methylated regions) which are specific to forensically relevant body fluids have been identified, and their specificities and sensitivities have been tested using various samples. In this review, we provide an overview of the present knowledge and the most recent developments in forensic body fluid identification and discuss its possible practical application to forensic casework.",
"title": ""
},
{
"docid": "e5bb10773d74dfe745176f1c4d7046b2",
"text": "An integral enabler of the smart city vision is the ability to effectively model collective population behaviour. The realisation of sustainable smart mobility is underpinned by the effective modelling of the spatial movements of the population. Furthermore, it is also crucial to identify significant deviations in collective behaviour over time. For example, a change in urban mobility patterns would subsequently impact traffic management systems. This paper focuses on the issue of modelling the collective behaviour of a population by utilizing mobile phone data and investigates the ability to identify significant deviations in behaviour over time. Mobile phone data facilitates the inference of real social networks from their call data records (CDR). We use this data to model collective behaviour and apply change-point detection algorithms, a category of anomaly detection, in order to identify statistically significant changes in collective behaviour over time. The result off the empirical analysis demonstrate that modern change point detection can accurately identify change points with an R2 value of 0.9633.",
"title": ""
},
{
"docid": "5ac0e1b30f3aeeb4e1f7ddae656f7dd5",
"text": "The present paper describes an implementation of fast running motions involving a humanoid robot. Two important technologies are described: a motion generation and a balance control. The motion generation is a unified way to design both walking and running and can generate the trajectory with the vertical conditions of the Center Of Mass (COM) in short calculation time. The balance control enables a robot to maintain balance by changing the positions of the contact foot dynamically when the robot is disturbed. This control consists of 1) compliance control without force sensors, in which the joints are made compliant by feed-forward torques and adjustment of gains of position control, and 2) feedback control, which uses the measured orientation of the robot's torso used in the motion generation as an initial condition to decide the foot positions. Finally, a human-sized humanoid robot that can run forward at 7.0 [km/h] is presented.",
"title": ""
},
{
"docid": "db3523bc1e3616b9fe262e5f6cab7ad8",
"text": "Traditional models for question answering optimize using cross entropy loss, which encourages exact answers at the cost of penalizing nearby or overlapping answers that are sometimes equally accurate. We propose a mixed objective that combines cross entropy loss with self-critical policy learning. The objective uses rewards derived from word overlap to solve the misalignment between evaluation metric and optimization objective. In addition to the mixed objective, we improve dynamic coattention networks (DCN) with a deep residual coattention encoder that is inspired by recent work in deep self-attention and residual networks. Our proposals improve model performance across question types and input lengths, especially for long questions that requires the ability to capture long-term dependencies. On the Stanford Question Answering Dataset, our model achieves state-of-the-art results with 75.1% exact match accuracy and 83.1% F1, while the ensemble obtains 78.9% exact match accuracy and 86.0% F1.",
"title": ""
},
{
"docid": "b1856943f53a15df08d0ccf1a20b0251",
"text": "In this paper we introduce Graffoo, i.e., a graphical notation to develop OWL ontologies by means of yEd, a free editor for diagrams.",
"title": ""
},
{
"docid": "d00436e6248a3c7382e0e4df33205bb7",
"text": "BACKGROUND\nIt is uncertain whether male circumcision reduces the risks of penile human papillomavirus (HPV) infection in the man and of cervical cancer in his female partner.\n\n\nMETHODS\nWe pooled data on 1913 couples enrolled in one of seven case-control studies of cervical carcinoma in situ and cervical cancer in five countries. Circumcision status was self-reported, and the accuracy of the data was confirmed by physical examination at three study sites. The presence or absence of penile HPV DNA was assessed by a polymerase-chain-reaction assay in 1520 men and yielded a valid result in the case of 1139 men (74.9 percent).\n\n\nRESULTS\nPenile HPV was detected in 166 of the 847 uncircumcised men (19.6 percent) and in 16 of the 292 circumcised men (5.5 percent). After adjustment for age at first intercourse, lifetime number of sexual partners, and other potential confounders, circumcised men were less likely than uncircumcised men to have HPV infection (odds ratio, 0.37; 95 percent confidence interval, 0.16 to 0.85). Monogamous women whose male partners had six or more sexual partners and were circumcised had a lower risk of cervical cancer than women whose partners were uncircumcised (adjusted odds ratio, 0.42; 95 percent confidence interval, 0.23 to 0.79). Results were similar in the subgroup of men in whom circumcision was confirmed by medical examination.\n\n\nCONCLUSIONS\nMale circumcision is associated with a reduced risk of penile HPV infection and, in the case of men with a history of multiple sexual partners, a reduced risk of cervical cancer in their current female partners.",
"title": ""
},
{
"docid": "4cc52c8b6065d66472955dff9200b71f",
"text": "Over the past few years there has been an increasing focus on the development of features for resource management within the Linux kernel. The addition of the fair group scheduler has enabled the provisioning of proportional CPU time through the specification of group weights. Since the scheduler is inherently workconserving in nature, a task or a group can consume excess CPU share in an otherwise idle system. There are many scenarios where this extra CPU share can cause unacceptable utilization or latency. CPU bandwidth provisioning or limiting approaches this problem by providing an explicit upper bound on usage in addition to the lower bound already provided by shares. There are many enterprise scenarios where this functionality is useful. In particular are the cases of payper-use environments, and latency provisioning within non-homogeneous environments. This paper details the requirements behind this feature, the challenges involved in incorporating into CFS (Completely Fair Scheduler), and the future development road map for this feature. 1 CPU as a manageable resource Before considering the aspect of bandwidth provisioning let us first review some of the basic existing concepts currently arbitrating entity management within the scheduler. There are two major scheduling classes within the Linux CPU scheduler, SCHED_RT and SCHED_NORMAL. When runnable, entities from the former, the real-time scheduling class, will always be elected to run over those from the normal scheduling class. Prior to v2.6.24, the scheduler had no notion of any entity larger than that of single task1. The available management APIs reflected this and the primary control of bandwidth available was nice(2). In v2.6.24, the completely fair scheduler (CFS) was merged, replacing the existing SCHED_NORMAL scheduling class. This new design delivered weight based scheduling of CPU bandwidth, enabling arbitrary partitioning. This allowed support for group scheduling to be added, managed using cgroups through the CPU controller sub-system. This support allows for the flexible creation of scheduling groups, allowing the fraction of CPU resources received by a group of tasks to be arbitrated as a whole. The addition of this support has been a major step in scheduler development, enabling Linux to align more closely with enterprise requirements for managing this resouce. The hierarchies supported by this model are flexible, and groups may be nested within groups. Each group entity’s bandwidth is provisioned using a corresponding shares attribute which defines its weight. Similarly, the nice(2) API was subsumed to control the weight of an individual task entity. Figure 1 shows the hierarchical groups that might be created in a typical university server to differentiate CPU bandwidth between users such as professors, students, and different departments. One way to think about shares is that it provides lowerbound provisioning. When CPU bandwidth is scheduled at capacity, all runnable entities will receive bandwidth in accordance with the ratio of their share weight. It’s key to observe here that not all entities may be runnable 1Recall that under Linux any kernel-backed thread is considered individual task entity, there is no typical notion of a process in scheduling context.",
"title": ""
},
{
"docid": "ea9c8ee7d22c0abc34fcf3ad073e20ac",
"text": "Job performance is the most researched concept studied in industrial and organizational psychology, with the emphasis being on organizational citizenship behavior (OCB) and counterproductive work behavior (CWB) as two dimensions of it. The relationship between these two dimensions of job performance are unclear, hence the objective of the current study was to examine the relationship between organizational citizenship behavior and counterproductive work behavior. A total of 267 students studying psychology were given a questionnaire that measured organizational citizenship behavior and counterproductive work behavior (most have had part-time work experience). Correlational analysis found OCB and CWB to have only a moderate negative correlation which suggests OCB and CWB are two separate but related constructs. It was also found that females and longer-tenured individuals tend to show more OCB but no difference was found for CWB. The findings showed that individuals can engage in OCB and CWB at the same time, which necessitates organizations to find a way to encourage their employees to engage in OCB and not in CWB.",
"title": ""
},
{
"docid": "84e471482dd64e3be90e6ab884fc4481",
"text": "Game theory is a set of tools developed to model interactions between agents with conflicting interests [5]. It is a field of applied mathematics that defines and evaluates interactive decision situations. It provides analytical tools to predict the outcome of complicated interactions between rational entities, where rationality demands strict adherence to a strategy based on observed or measured results [13]. Originally developed to model problems in the field of economics, game theory has recently been applied to network problems, in most cases to solve the resource allocation problems in a competitive environment. The reason that game theory is an adapted choice for studying cooperative communications is various. Nodes in the network are independent agents, making decisions only for their own interests. Game theory provides us sufficient theoretical tools to analyze the network users’ behaviors and actions. Game theory, also primarily deals with distributed optimization, which often requires local information only. Thus it enables us to design distributed algorithms. [14]. This article surveys the literature on game theory as they apply to wireless networks. First, a brief overview of classifications of games, important definitions used in games (Nash Equilibrium, Pareto efficiency, Pure, Mixed and Fully mixed strategies) and game models are presented. Then, we identified five areas of application of game theory in wireless networks; therefore, we discuss related work to game theory in communication networks, cognitive radio networks, wireless sensor networks, resource allocation and power control. Finally, we discuss the limitations of the application of game theory in wireless networks.",
"title": ""
},
{
"docid": "6058813ab7c5a2504faea224b9f32bba",
"text": "LinkedIn, with over 1.5 million Groups, has become a popular place for business employees to create private groups to exchange information and communicate. Recent research on social networking sites (SNSs) has widely explored the phenomenon and its positive effects on firms. However, social networking’s negative effects on information security were not adequately addressed. Supported by the credibility, persuasion and motivation theories, we conducted 1) a field experiment, demonstrating how sensitive organizational data can be exploited, followed by 2) a qualitative study of employees engaged in SNSs activities; and 3) interviews with Chief Information Security Officers (CISOs). Our research has resulted in four main findings: 1) employees are easily deceived and susceptible to victimization on SNSs where contextual elements provide psychological triggers to attackers; 2) organizations lack mechanisms to control SNS online security threats, 3) companies need to strengthen their information security policies related to SNSs, where stronger employee identification and authentication is needed, and 4) SNSs have become important security holes where, with the use of social engineering techniques, malicious attacks are easily facilitated.",
"title": ""
},
{
"docid": "f03a96d81f7eeaf8b9befa73c2b6fbd5",
"text": "This research provided the first empirical investigation of how approach and avoidance motives for sacrifice in intimate relationships are associated with personal well-being and relationship quality. In Study 1, the nature of everyday sacrifices made by dating partners was examined, and a measure of approach and avoidance motives for sacrifice was developed. In Study 2, which was a 2-week daily experience study of college students in dating relationships, specific predictions from the theoretical model were tested and both longitudinal and dyadic components were included. Whereas approach motives for sacrifice were positively associated with personal well-being and relationship quality, avoidance motives for sacrifice were negatively associated with personal well-being and relationship quality. Sacrificing for avoidance motives was particularly detrimental to the maintenance of relationships over time. Perceptions of a partner's motives for sacrifice were also associated with well-being and relationship quality. Implications for the conceptualization of relationship maintenance processes along these 2 dimensions are discussed.",
"title": ""
},
{
"docid": "e5eda75a8adcd01ca98b8fa28768e1ca",
"text": "As demand grows for mobile phone applications, research in optical character recognition, a technology well developed for scanned documents, is shifting focus to the recognition of text embedded in digital photographs. In this paper, we present OCRdroid, a generic framework for developing OCR-based applications on mobile phones. OCRdroid combines a light-weight image preprocessing suite installed inside the mobile phone and an OCR engine connected to a backend server. We demonstrate the power and functionality of this framework by implementing two applications called PocketPal and PocketReader based on OCRdroid on HTC Android G1 mobile phone. Initial evaluations of these pilot experiments demonstrate the potential of using OCRdroid framework for realworld OCR-based mobile applications.",
"title": ""
},
{
"docid": "de3f2ad88e3a99388975cc3da73e5039",
"text": "Machine-learning techniques have recently been proved to be successful in various domains, especially in emerging commercial applications. As a set of machine-learning techniques, artificial neural networks (ANNs), requiring considerable amount of computation and memory, are one of the most popular algorithms and have been applied in a broad range of applications such as speech recognition, face identification, natural language processing, ect. Conventionally, as a straightforward way, conventional CPUs and GPUs are energy-inefficient due to their excessive effort for flexibility. According to the aforementioned situation, in recent years, many researchers have proposed a number of neural network accelerators to achieve high performance and low power consumption. Thus, the main purpose of this literature is to briefly review recent related works, as well as the DianNao-family accelerators. In summary, this review can serve as a reference for hardware researchers in the area of neural networks.",
"title": ""
},
{
"docid": "273a3f15e374d85921904cf40a77fa63",
"text": "Human activity recognition is a significant component of many innovative and human-behavior based systems. The ability to recognize various human activities enables the developing of intelligent control system. Usually the task of human activity recognition is mapped to the classification task of images representing person’s actions. This paper addresses the problem of human activities’ classification using various machine learning methods such as Convolutional Neural Networks, Bag of Features model, Support Vector Machine and K-Nearest Neighbors. This paper provides the comparison study on these methods applied for human activity recognition task using the set of images representing five different categories of daily life activities. The usage of wearable sensors that could improve classification results of human activity recognition is beyond the scope of this research. Keywords–activity recognition; machine learning; CNN; BoF; KNN; SVM",
"title": ""
},
{
"docid": "2c3bfdb36a691434ece6b9f3e7e281e9",
"text": "Heterogeneous cloud radio access networks (H-CRAN) is a new trend of SC that aims to leverage the heterogeneous and cloud radio access networks advantages. Low power remote radio heads (RRHs) are exploited to provide high data rates for users with high quality of service requirements (QoS), while high power macro base stations (BSs) are deployed for coverage maintenance and low QoS users support. However, the inter-tier interference between the macro BS and RRHs and energy efficiency are critical challenges that accompany resource allocation in H-CRAN. Therefore, we propose a centralized resource allocation scheme using online learning, which guarantees interference mitigation and maximizes energy efficiency while maintaining QoS requirements for all users. To foster the performance of such scheme with a model-free learning, we consider users' priority in resource blocks (RBs) allocation and compact state representation based learning methodology to enhance the learning process. Simulation results confirm that the proposed resource allocation solution can mitigate interference, increase energy and spectral efficiencies significantly, and maintain users' QoS requirements.",
"title": ""
},
{
"docid": "d3afbb88f0575bd18365c85c6faea868",
"text": "The present paper examines the causal linkage between foreign direct investment (FDI), financial development, and economic growth in a panel of 4 countries of North Africa (Tunisia, Morocco, Algeria and Egypt) over the period 1980-2011. The study moves away from the traditional cross-sectional analysis, and focuses on more direct evidence of the channels through which FDI inflows can promote economic growth of the host country. Using Generalized Method of Moment (GMM) panel data analysis, we find strong evidence of a positive relationship between FDI and economic growth. We also find evidence that the development of the domestic financial system is an important prerequisite for FDI to have a positive effect on economic growth. The policy implications of this study appeared clear. Improvement efforts need to be driven by local-level reforms to ensure the development of domestic financial system in order to maximize the benefits of the presence of FDI.",
"title": ""
}
] | scidocsrr |
d3e0cc84199f9795bfe1f2001d87685e | Aromatase inhibitors versus tamoxifen in early breast cancer: patient-level meta-analysis of the randomised trials | [
{
"docid": "f2b291fd6dacf53ed88168d7e1e4ecce",
"text": "BACKGROUND\nAs trials of 5 years of tamoxifen in early breast cancer mature, the relevance of hormone receptor measurements (and other patient characteristics) to long-term outcome can be assessed increasingly reliably. We report updated meta-analyses of the trials of 5 years of adjuvant tamoxifen.\n\n\nMETHODS\nWe undertook a collaborative meta-analysis of individual patient data from 20 trials (n=21,457) in early breast cancer of about 5 years of tamoxifen versus no adjuvant tamoxifen, with about 80% compliance. Recurrence and death rate ratios (RRs) were from log-rank analyses by allocated treatment.\n\n\nFINDINGS\nIn oestrogen receptor (ER)-positive disease (n=10,645), allocation to about 5 years of tamoxifen substantially reduced recurrence rates throughout the first 10 years (RR 0·53 [SE 0·03] during years 0-4 and RR 0·68 [0·06] during years 5-9 [both 2p<0·00001]; but RR 0·97 [0·10] during years 10-14, suggesting no further gain or loss after year 10). Even in marginally ER-positive disease (10-19 fmol/mg cytosol protein) the recurrence reduction was substantial (RR 0·67 [0·08]). In ER-positive disease, the RR was approximately independent of progesterone receptor status (or level), age, nodal status, or use of chemotherapy. Breast cancer mortality was reduced by about a third throughout the first 15 years (RR 0·71 [0·05] during years 0-4, 0·66 [0·05] during years 5-9, and 0·68 [0·08] during years 10-14; p<0·0001 for extra mortality reduction during each separate time period). Overall non-breast-cancer mortality was little affected, despite small absolute increases in thromboembolic and uterine cancer mortality (both only in women older than 55 years), so all-cause mortality was substantially reduced. In ER-negative disease, tamoxifen had little or no effect on breast cancer recurrence or mortality.\n\n\nINTERPRETATION\n5 years of adjuvant tamoxifen safely reduces 15-year risks of breast cancer recurrence and death. ER status was the only recorded factor importantly predictive of the proportional reductions. Hence, the absolute risk reductions produced by tamoxifen depend on the absolute breast cancer risks (after any chemotherapy) without tamoxifen.\n\n\nFUNDING\nCancer Research UK, British Heart Foundation, and Medical Research Council.",
"title": ""
}
] | [
{
"docid": "e6704cac805b39fe7f321f095a92ebf4",
"text": "Crowd counting is a challenging task, mainly due to the severe occlusions among dense crowds. This paper aims to take a broader view to address crowd counting from the perspective of semantic modeling. In essence, crowd counting is a task of pedestrian semantic analysis involving three key factors: pedestrians, heads, and their context structure. The information of different body parts is an important cue to help us judge whether there exists a person at a certain position. Existing methods usually perform crowd counting from the perspective of directly modeling the visual properties of either the whole body or the heads only, without explicitly capturing the composite body-part semantic structure information that is crucial for crowd counting. In our approach, we first formulate the key factors of crowd counting as semantic scene models. Then, we convert the crowd counting problem into a multi-task learning problem, such that the semantic scene models are turned into different sub-tasks. Finally, the deep convolutional neural networks are used to learn the sub-tasks in a unified scheme. Our approach encodes the semantic nature of crowd counting and provides a novel solution in terms of pedestrian semantic analysis. In experiments, our approach outperforms the state-of-the-art methods on four benchmark crowd counting data sets. The semantic structure information is demonstrated to be an effective cue in scene of crowd counting.",
"title": ""
},
{
"docid": "c61f68104b2d058acb0d16c89e4b1454",
"text": "Recently, training with adversarial examples, which are generated by adding a small but worst-case perturbation on input examples, has improved the generalization performance of neural networks. In contrast to the biased individual inputs to enhance the generality, this paper introduces adversarial dropout, which is a minimal set of dropouts that maximize the divergence between 1) the training supervision and 2) the outputs from the network with the dropouts. The identified adversarial dropouts are used to automatically reconfigure the neural network in the training process, and we demonstrated that the simultaneous training on the original and the reconfigured network improves the generalization performance of supervised and semi-supervised learning tasks on MNIST, SVHN, and CIFAR-10. We analyzed the trained model to find the performance improvement reasons. We found that adversarial dropout increases the sparsity of neural networks more than the standard dropout. Finally, we also proved that adversarial dropout is a regularization term with a rank-valued hyper parameter that is different from a continuous-valued parameter to specify the strength of the regularization.",
"title": ""
},
{
"docid": "ab47dbcafba637ae6e3b474642439bd3",
"text": "Ear detection from a profile face image is an important step in many applications including biometric recognition. But accurate and rapid detection of the ear for real-time applications is a challenging task, particularly in the presence of occlusions. In this work, a cascaded AdaBoost based ear detection approach is proposed. In an experiment with a test set of 203 profile face images, all the ears were accurately detected by the proposed detector with a very low (5 x 10-6) false positive rate. It is also very fast and relatively robust to the presence of occlusions and degradation of the ear images (e.g. motion blur). The detection process is fully automatic and does not require any manual intervention.",
"title": ""
},
{
"docid": "fef45863bc531960dbf2a7783995bfdb",
"text": "The main goal of facial attribute recognition is to determine various attributes of human faces, e.g. facial expressions, shapes of mouth and nose, headwears, age and race, by extracting features from the images of human faces. Facial attribute recognition has a wide range of potential application, including security surveillance and social networking. The available approaches, however, fail to consider the correlations and heterogeneities between different attributes. This paper proposes that by utilizing these correlations properly, an improvement can be achieved on the recognition of different attributes. Therefore, we propose a facial attribute recognition approach based on the grouping of different facial attribute tasks and a multi-task CNN structure. Our approach can fully utilize the correlations between attributes, and achieve a satisfactory recognition result on a large number of attributes with limited amount of parameters. Several modifications to the traditional architecture have been tested in the paper, and experiments have been conducted to examine the effectiveness of our approach.",
"title": ""
},
{
"docid": "2f9b8ee2f7578c7820eced92fb98c696",
"text": "The Tic tac toe is very popular game having a 3 × 3 grid board and 2 players. A Special Symbol (X or O) is assigned to each player to indicate the slot is covered by the respective player. The winner of the game is the player who first cover a horizontal, vertical and diagonal row of the board having only player's own symbols. This paper presents the design model of Tic tac toe Game using Multi-Tape Turing Machine in which both player choose input randomly and result of the game is declared. The computational Model of Tic tac toe is used to describe it in a formal manner.",
"title": ""
},
{
"docid": "3c203c55c925fb3f78506d46b8b453a8",
"text": "In this paper, we provide combinatorial interpretations for some determinantal identities involving Fibonacci numbers. We use the method due to Lindström-Gessel-Viennot in which we count nonintersecting n-routes in carefully chosen digraphs in order to gain insight into the nature of some well-known determinantal identities while allowing room to generalize and discover new ones.",
"title": ""
},
{
"docid": "5705022b0a08ca99d4419485f3c03eaa",
"text": "In this paper, we propose a wireless sensor network paradigm for real-time forest fire detection. The wireless sensor network can detect and forecast forest fire more promptly than the traditional satellite-based detection approach. This paper mainly describes the data collecting and processing in wireless sensor networks for real-time forest fire detection. A neural network method is applied to in-network data processing. We evaluate the performance of our approach by simulations.",
"title": ""
},
{
"docid": "673674dd11047747db79e5614daa4974",
"text": "Distracted driving is one of the main causes of vehicle collisions in the United States. Passively monitoring a driver's activities constitutes the basis of an automobile safety system that can potentially reduce the number of accidents by estimating the driver's focus of attention. This paper proposes an inexpensive vision-based system to accurately detect Eyes Off the Road (EOR). The system has three main components: 1) robust facial feature tracking; 2) head pose and gaze estimation; and 3) 3-D geometric reasoning to detect EOR. From the video stream of a camera installed on the steering wheel column, our system tracks facial features from the driver's face. Using the tracked landmarks and a 3-D face model, the system computes head pose and gaze direction. The head pose estimation algorithm is robust to nonrigid face deformations due to changes in expressions. Finally, using a 3-D geometric analysis, the system reliably detects EOR.",
"title": ""
},
{
"docid": "c281538d7aa7bd8727ce4718de82c7c8",
"text": "More than 15 years after model predictive control (MPC) appeared in industry as an effective means to deal with multivariable constrained control problems, a theoretical basis for this technique has started to emerge. The issues of feasibility of the on-line optimization, stability and performance are largely understood for systems described by linear models. Much progress has been made on these issues for non-linear systems but for practical applications many questions remain, including the reliability and efficiency of the on-line computation scheme. To deal with model uncertainty ‘rigorously’ an involved dynamic programming problem must be solved. The approximation techniques proposed for this purpose are largely at a conceptual stage. Among the broader research needs the following areas are identified: multivariable system identification, performance monitoring and diagnostics, non-linear state estimation, and batch system control. Many practical problems like control objective prioritization and symptom-aided diagnosis can be integrated systematically and effectively into the MPC framework by expanding the problem formulation to include integer variables yielding a mixed-integer quadratic or linear program. Efficient techniques for solving these problems are becoming available. © 1999 Elsevier Science Ltd. All rights reserved.",
"title": ""
},
{
"docid": "fa2ba8897c9dcd087ea01de2caaed9e4",
"text": "This paper aims to investigate the relationship between library anxiety and emotional intelligence of Bushehr University of Medical Sciences’ students and Persian Gulf University’s students in Bushehr municipality. In this descriptive study which is of correlation type, 700 students of Bushehr University of Medical Sciences and the Persian Gulf University selected through stratified random sampling. Required data has been collected using normalized Siberia Shrink’s emotional intelligence questionnaire and localized Bostick’s library anxiety scale. The results show that the rate of library anxiety among students is less than average (91.73%) except “mechanical factors”. There is not a significant difference in all factors of library anxiety except “interaction with librarian” between male and female. The findings also indicate that there is a negative significant relationship between library anxiety and emotional intelligence (r= -0.41). According to the results, it seems that by improving the emotional intelligence we can decrease the rate of library anxiety among students during their search in a library. Emotional intelligence can optimize academic library’s productivity.",
"title": ""
},
{
"docid": "dcee61dad66f59b2450a3e154726d6b1",
"text": "Mussels are marine organisms that have been mimicked due to their exceptional adhesive properties to all kind of surfaces, including rocks, under wet conditions. The proteins present on the mussel's foot contain 3,4-dihydroxy-l-alanine (DOPA), an amino acid from the catechol family that has been reported by their adhesive character. Therefore, we synthesized a mussel-inspired conjugated polymer, modifying the backbone of hyaluronic acid with dopamine by carbodiimide chemistry. Ultraviolet-visible (UV-vis) spectroscopy and nuclear magnetic resonance (NMR) techniques confirmed the success of this modification. Different techniques have been reported to produce two-dimensional (2D) or three-dimensional (3D) systems capable to support cells and tissue regeneration; among others, multilayer systems allow the construction of hierarchical structures from nano- to macroscales. In this study, the layer-by-layer (LbL) technique was used to produce freestanding multilayer membranes made uniquely of chitosan and dopamine-modified hyaluronic acid (HA-DN). The electrostatic interactions were found to be the main forces involved in the film construction. The surface morphology, chemistry, and mechanical properties of the freestanding membranes were characterized, confirming the enhancement of the adhesive properties in the presence of HA-DN. The MC3T3-E1 cell line was cultured on the surface of the membranes, demonstrating the potential of these freestanding multilayer systems to be used for bone tissue engineering.",
"title": ""
},
{
"docid": "31dbf3fcd1a70ad7fb32fb6e69ef88e3",
"text": "OBJECTIVE\nHealth care researchers have not taken full advantage of the potential to effectively convey meaning in their multivariate data through graphical presentation. The aim of this paper is to translate knowledge from the fields of analytical chemistry, toxicology, and marketing research to the field of medicine by introducing the radar plot, a useful graphical display method for multivariate data.\n\n\nSTUDY DESIGN AND SETTING\nDescriptive study based on literature review.\n\n\nRESULTS\nThe radar plotting technique is described, and examples are used to illustrate not only its programming language, but also the differences in tabular and bar chart approaches compared to radar-graphed data displays.\n\n\nCONCLUSION\nRadar graphing, a form of radial graphing, could have great utility in the presentation of health-related research, especially in situations in which there are large numbers of independent variables, possibly with different measurement scales. This technique has particular relevance for researchers who wish to illustrate the degree of multiple-group similarity/consensus, or group differences on multiple variables in a single graphical display.",
"title": ""
},
{
"docid": "206263c06b0d41725aeec7844f3b3a01",
"text": "Basic properties of the operational transconductance amplifier (OTA) are discussed. Applications of the OTA in voltage-controlled amplifiers, filters, and impedances are presented. A versatile family of voltage-controlled filter sections suitable for systematic design requirements is described. The total number of components used in these circuits is small, and the design equations and voltage-control characteristics are attractive. Limitations as well as practical considerations of OTA-based filters using commercially available bipolar OTAs are discussed. Applications of OTAs in continuous-time monolithic filters are considered.",
"title": ""
},
{
"docid": "9b3a39ddeadd14ea5a50be8ac2057a26",
"text": "0 7 4 0 7 4 5 9 / 0 0 / $ 1 0 . 0 0 © 2 0 0 0 I E E E J u l y / A u g u s t 2 0 0 0 I E E E S O F T W A R E 19 design, algorithm, code, or test—does indeed improve software quality and reduce time to market. Additionally, student and professional programmers consistently find pair programming more enjoyable than working alone. Yet most who have not tried and tested pair programming reject the idea as a redundant, wasteful use of programming resources: “Why would I put two people on a job that just one can do? I can’t afford to do that!” But we have found, as Larry Constantine wrote, that “Two programmers in tandem is not redundancy; it’s a direct route to greater efficiency and better quality.”1 Our supportive evidence comes from professional programmers and from advanced undergraduate students who participated in a structured experiment. The experimental results show that programming pairs develop better code faster with only a minimal increase in prerelease programmer hours. These results apply to all levels of programming skill from novice to expert.",
"title": ""
},
{
"docid": "d76b7b25bce29cdac24015f8fa8ee5bb",
"text": "A circularly polarized magnetoelectric dipole antenna with high efficiency based on printed ridge gap waveguide is presented. The antenna gain is improved by using a wideband lens in front of the antennas. The lens consists of three layers dual-polarized mu-near zero (MNZ) inclusions. Each layer consists of a <inline-formula> <tex-math notation=\"LaTeX\">$3\\times4$ </tex-math></inline-formula> MNZ unit cell. The measured results indicate that the magnitude of <inline-formula> <tex-math notation=\"LaTeX\">$S_{11}$ </tex-math></inline-formula> is below −10 dB in the frequency range of 29.5–37 GHz. The resulting 3-dB axial ratio is over a frequency range of 32.5–35 GHz. The measured realized gain of the antenna is more than 10 dBi over a frequency band of 31–35 GHz achieving a radiation efficiency of 94% at 34 GHz.",
"title": ""
},
{
"docid": "e30df718ca1981175e888755cce3ce90",
"text": "Human identification at distance by analysis of gait patterns extracted from video has recently become very popular research in biometrics. This paper presents multi-projections based approach to extract gait patterns for human recognition. Binarized silhouette of a motion object is represented by 1-D signals which are the basic image features called the distance vectors. The distance vectors are differences between the bounding box and silhouette, and extracted using four projections to silhouette. Eigenspace transformation is applied to time-varying distance vectors and the statistical distance based supervised pattern classification is then performed in the lower-dimensional eigenspace for human identification. A fusion strategy developed is finally executed to produce final decision. Based on normalized correlation on the distance vectors, gait cycle estimation is also performed to extract the gait cycle. Experimental results on four databases demonstrate that the right person in top two matches 100% of the times for the cases where training and testing sets corresponds to the same walking styles, and in top three-four matches 100% of the times for training and testing sets corresponds to the different walking styles.",
"title": ""
},
{
"docid": "c5eb252d17c2bec8ab168ca79ec11321",
"text": "Personalization is pervasive in the online space as it leads to higher efficiency and revenue by allowing the most relevant content to be served to each user. However, recent studies suggest that personalization methods can propagate societal or systemic biases and polarize opinions; this has led to calls for regulatory mechanisms and algorithms to combat bias and inequality. Algorithmically, bandit optimization has enjoyed great success in learning user preferences and personalizing content or feeds accordingly. We propose an algorithmic framework that allows for the possibility to control bias or discrimination in such bandit-based personalization. Our model allows for the specification of general fairness constraints on the sensitive types of the content that can be displayed to a user. The challenge, however, is to come up with a scalable and low regret algorithm for the constrained optimization problem that arises. Our main technical contribution is a provably fast and low-regret algorithm for the fairness-constrained bandit optimization problem. Our proofs crucially leverage the special structure of our problem. Experiments on synthetic and real-world data sets show that our algorithmic framework can control bias with only a minor loss to revenue. ∗A short version of this paper appeared in the FAT/ML 2017 workshop (https://arxiv.org/abs/1707.02260) 1 ar X iv :1 80 2. 08 67 4v 1 [ cs .L G ] 2 3 Fe b 20 18",
"title": ""
},
{
"docid": "3db3308b3f98563390e8f21e565798b7",
"text": "RDF question/answering (Q/A) allows users to ask questions in natural languages over a knowledge base represented by RDF. To answer a natural language question, the existing work takes a two-stage approach: question understanding and query evaluation. Their focus is on question understanding to deal with the disambiguation of the natural language phrases. The most common technique is the joint disambiguation, which has the exponential search space. In this paper, we propose a systematic framework to answer natural language questions over RDF repository (RDF Q/A) from a graph data-driven perspective. We propose a semantic query graph to model the query intention in the natural language question in a structural way, based on which, RDF Q/A is reduced to subgraph matching problem. More importantly, we resolve the ambiguity of natural language questions at the time when matches of query are found. The cost of disambiguation is saved if there are no matching found. More specifically, we propose two different frameworks to build the semantic query graph, one is relation (edge)-first and the other one is node-first. We compare our method with some state-of-the-art RDF Q/A systems in the benchmark dataset. Extensive experiments confirm that our method not only improves the precision but also speeds up query performance greatly.",
"title": ""
},
{
"docid": "23ff0b54dcef99754549275eb6714a9a",
"text": "The HCI community has developed guidelines and recommendations for improving the usability system that are usually applied at the last stages of the software development process. On the other hand, the SE community has developed sound methods to elicit functional requirements in the early stages, but usability has been relegated to the last stages together with other nonfunctional requirements. Therefore, there are no methods of usability requirements elicitation to develop software within both communities. An example of this problem arises if we focus on the Model-Driven Development paradigm, where the methods and tools that are used to develop software do not support usability requirements elicitation. In order to study the existing publications that deal with usability requirements from the first steps of the software development process, this work presents a mapping study. Our aim is to compare usability requirements methods and to identify the strong points of each one.",
"title": ""
},
{
"docid": "a6d550a64dc633e50ee2b21255344e7b",
"text": "Sentiment classification is a much-researched field that identifies positive or negative emotions in a large number of texts. Most existing studies focus on document-based approaches and documents are represented as bag-of word. Therefore, this feature representation fails to obtain the relation or associative information between words and it can't distinguish different opinions of a sentiment word with different targets. In this paper, we present a dependency tree-based sentence-level sentiment classification approach. In contrast to a document, a sentence just contains little information and a small set of features which can be used for the sentiment classification. So we not only capture flat features (bag-of-word), but also extract structured features from the dependency tree of a sentence. We propose a method to add more information to the dependency tree and provide an algorithm to prune dependency tree to reduce the noisy, and then introduce a convolution tree kernel-based approach to the sentence-level sentiment classification. The experimental results show that our dependency tree-based approach achieved significant improvement, particularly for implicit sentiment classification.",
"title": ""
}
] | scidocsrr |
eaae75ea41536abc581cd11693810975 | Estimating or Propagating Gradients Through Stochastic Neurons for Conditional Computation | [
{
"docid": "3223563162967868075a43ca86c1d31a",
"text": "Deep learning research aims at discovering learning algorithms that discover multiple levels of distributed representations, with higher levels representing more abstract concepts. Although the study of deep learning has already led to impressive theoretical results, learning algorithms and breakthrough experiments, several challenges lie ahead. This paper proposes to examine some of these challenges, centering on the questions of scaling deep learning algorithms to much larger models and datasets, reducing optimization difficulties due to ill-conditioning or local minima, designing more efficient and powerful inference and sampling procedures, and learning to disentangle the factors of variation underlying the observed data. It also proposes a few forward-looking research directions aimed at overcoming these",
"title": ""
},
{
"docid": "cff671af6a7a170fac2daf6acd9d1e3e",
"text": "We show how to learn a deep graphical model of the word-count vectors obtained from a large set of documents. The values of the latent variables in the deepest layer are easy to infer and gi ve a much better representation of each document than Latent Sem antic Analysis. When the deepest layer is forced to use a small numb er of binary variables (e.g. 32), the graphical model performs “semantic hashing”: Documents are mapped to memory addresses in such a way that semantically similar documents are located at near by ddresses. Documents similar to a query document can then be fo und by simply accessing all the addresses that differ by only a fe w bits from the address of the query document. This way of extending the efficiency of hash-coding to approximate matching is much fa ster than locality sensitive hashing, which is the fastest curre nt method. By using semantic hashing to filter the documents given to TFID , we achieve higher accuracy than applying TF-IDF to the entir document set.",
"title": ""
}
] | [
{
"docid": "df7a68ebb9bc03d8a73a54ab3474373f",
"text": "We report on the implementation of a color-capable sub-pixel resolving optofluidic microscope based on the pixel super-resolution algorithm and sequential RGB illumination, for low-cost on-chip color imaging of biological samples with sub-cellular resolution.",
"title": ""
},
{
"docid": "a522072914b33af2611896cac9613cb4",
"text": "Relation Extraction refers to the task of populating a database with tuples of the form r(e1, e2), where r is a relation and e1, e2 are entities. Distant supervision is one such technique which tries to automatically generate training examples based on an existing KB such as Freebase. This paper is a survey of some of the techniques in distant supervision which primarily rely on Probabilistic Graphical Models (PGMs).",
"title": ""
},
{
"docid": "296602c0884ea9c330a6fc8e33a7b722",
"text": "The skin is a major exposure route for many potentially toxic chemicals. It is, therefore, important to be able to predict the permeability of compounds through skin under a variety of conditions. Available skin permeability databases are often limited in scope and not conducive to developing effective models. This sparseness and ambiguity of available data prompted the use of fuzzy set theory to model and predict skin permeability. Using a previously published database containing 140 compounds, a rule-based Takagi–Sugeno fuzzy model is shown to predict skin permeability of compounds using octanol-water partition coefficient, molecular weight, and temperature as inputs. Model performance was estimated using a cross-validation approach. In addition, 10 data points were removed prior to model development for additional testing with new data. The fuzzy model is compared to a regression model for the same inputs using both R2 and root mean square error measures. The quality of the fuzzy model is also compared with previously published models. The statistical analysis demonstrates that the fuzzy model performs better than the regression model with identical data and validation protocols. The prediction quality for this model is similar to others that were published. The fuzzy model provides insights on the relationships between lipophilicity, molecular weight, and temperature on percutaneous penetration. This model can be used as a tool for rapid determination of initial estimates of skin permeability.",
"title": ""
},
{
"docid": "0153774b49121d8735cc3d33df69fc00",
"text": "A common requirement of many empirical software engineering studies is the acquisition and curation of data from software repositories. During the last few years, GitHub has emerged as a popular project hosting, mirroring and collaboration platform. GitHub provides an extensive rest api, which enables researchers to retrieve both the commits to the projects' repositories and events generated through user actions on project resources. GHTorrent aims to create a scalable off line mirror of GitHub's event streams and persistent data, and offer it to the research community as a service. In this paper, we present the project's design and initial implementation and demonstrate how the provided datasets can be queried and processed.",
"title": ""
},
{
"docid": "2450ccfdff4503fc642550a876976f10",
"text": "The purpose of this paper is to introduce sequential investment strategies that guarantee an optimal rate of growth of the capital, under minimal assumptions on the behavior of the market. The new strategies are analyzed both theoretically and empirically. The theoretical results show that the asymptotic rate of growth matches the optimal one that one could achieve with a full knowledge of the statistical properties of the underlying process generating the market, under the only assumption that the market is stationary and ergodic. The empirical results show that the performance of the proposed investment strategies measured on past NYSE and currency exchange data is solid, and sometimes even spectacular.",
"title": ""
},
{
"docid": "8ffb63dcee3bc0f541e3ec0df0d46be5",
"text": "In this paper, we show the existence of small coresets for the problems of computing k-median and kmeans clustering for points in low dimension. In other words, we show that given a point set P in <, one can compute a weighted set S ⊆ P , of size O(kε−d log n), such that one can compute the k-median/means clustering on S instead of on P , and get an (1 + ε)-approximation. As a result, we improve the fastest known algorithms for (1+ε)-approximate k-means and k-median. Our algorithms have linear running time for a fixed k and ε. In addition, we can maintain the (1+ε)-approximate k-median or k-means clustering of a stream when points are being only inserted, using polylogarithmic space and update time.",
"title": ""
},
{
"docid": "84e926e7b255a3c45e0cb515804250c3",
"text": "User-driven access control improves the coarse-grained access control of current operating systems (particularly in the mobile space) that provide only all-or-nothing access to a resource such as the camera or the current location. By granting appropriate permissions only in response to explicit user actions (for example, pressing a camera button), user-driven access control better aligns application actions with user expectations. Prior work on user-driven access control has relied in essential ways on operating system (OS) modifications to provide applications with uncompromisable access control gadgets, distinguished user interface (UI) elements that can grant access permissions. This work presents a design, implementation, and evaluation of user-driven access control that works with no OS modifications, thus making deployability and incremental adoption of the model more feasible. We develop (1) a user-level trusted library for access control gadgets, (2) static analyses to prevent malicious creation of UI events, illegal flows of sensitive information, and circumvention of our library, and (3) dynamic analyses to ensure users are not tricked into granting permissions. In addition to providing the original user-driven access control guarantees, we use static information flow to limit where results derived from sensitive sources may flow in an application.\n Our implementation targets Android applications. We port open-source applications that need interesting resource permissions to use our system. We determine in what ways user-driven access control in general and our implementation in particular are good matches for real applications. We demonstrate that our system is secure against a variety of attacks that malware on Android could otherwise mount.",
"title": ""
},
{
"docid": "2fbcd34468edf53ee08e0a76a048c275",
"text": "Recently, the introduction of the generative adversarial network (GAN) and its variants has enabled the generation of realistic synthetic samples, which has been used for enlarging training sets. Previous work primarily focused on data augmentation for semi-supervised and supervised tasks. In this paper, we instead focus on unsupervised anomaly detection and propose a novel generative data augmentation framework optimized for this task. In particular, we propose to oversample infrequent normal samples - normal samples that occur with small probability, e.g., rare normal events. We show that these samples are responsible for false positives in anomaly detection. However, oversampling of infrequent normal samples is challenging for real-world high-dimensional data with multimodal distributions. To address this challenge, we propose to use a GAN variant known as the adversarial autoencoder (AAE) to transform the high-dimensional multimodal data distributions into low-dimensional unimodal latent distributions with well-defined tail probability. Then, we systematically oversample at the 'edge' of the latent distributions to increase the density of infrequent normal samples. We show that our oversampling pipeline is a unified one: it is generally applicable to datasets with different complex data distributions. To the best of our knowledge, our method is the first data augmentation technique focused on improving performance in unsupervised anomaly detection. We validate our method by demonstrating consistent improvements across several real-world datasets.",
"title": ""
},
{
"docid": "3b7c0a822c5937ac9e4d702bb23e3432",
"text": "In a video surveillance system with static cameras, object segmentation often fails when part of the object has similar color with the background, resulting in poor performance of the subsequent object tracking. Multiple kernels have been utilized in object tracking to deal with occlusion, but the performance still highly depends on segmentation. This paper presents an innovative system, named Multiple-kernel Adaptive Segmentation and Tracking (MAST), which dynamically controls the decision thresholds of background subtraction and shadow removal around the adaptive kernel regions based on the preliminary tracking results. Then the objects are tracked for the second time according to the adaptively segmented foreground. Evaluations of both segmentation and tracking on benchmark datasets and our own recorded video sequences demonstrate that the proposed method can successfully track objects in similar-color background and/or shadow areas with favorable segmentation performance.",
"title": ""
},
{
"docid": "9e766871b172f7a752c8af629bd10856",
"text": "A fundamental computational limit on automated reasoning and its effect on Knowledge Representation is examined. Basically, the problem is that it can be more difficult to reason correctly ;Nith one representationallanguage than with another and, moreover, that this difficulty increases dramatically as the expressive power of the language increases. This leads to a tradeoff between the expressiveness of a representational language and its computational tractability. Here we show that this tradeoff can be seen to underlie the differences among a number of existing representational formalisms, in addition to motivating many of the current research issues in Knowledge Representation.",
"title": ""
},
{
"docid": "37edb948f37baa14aff4843d3f83e69b",
"text": "This article concerns the manner in which group interaction during focus groups impacted upon the data generated in a study of adolescent sexual health. Twenty-nine group interviews were conducted with secondary school pupils in Ireland, and data were subjected to a qualitative analysis. In exploring the relationship between method and theory generation, we begin by focusing on the ethnographic potential within group interviews. We propose that at times during the interviews, episodes of acting-out, or presenting a particular image in the presence of others, can be highly revealing in attempting to understand the normative rules embedded in the culture from which participants are drawn. However, we highlight a specific problem with distinguishing which parts of the group interview are a valid representation of group processes and which parts accurately reflect individuals' retrospective experiences of reality. We also note that at various points in the interview, focus groups have the potential to reveal participants' vulnerabilities. In addition, group members themselves can challenge one another on how aspects of their sub-culture are represented within the focus group, in a way that is normally beyond reach within individual interviews. The formation and composition of focus groups, particularly through the clustering of like-minded individuals, can affect the dominant views being expressed within specific groups. While focus groups have been noted to have an educational and transformative potential, we caution that they may also be a source of inaccurate information, placing participants at risk. Finally, the opportunities that focus groups offer in enabling researchers to cross-check the trustworthiness of data using a post-interview questionnaire are considered. We conclude by arguing that although far from flawless, focus groups are a valuable method for gathering data about health issues.",
"title": ""
},
{
"docid": "1796b8d91de88303571cc6f3f66b580b",
"text": "In this paper it is shown that bifilar of a Quadrifilar Helix Antenna (QHA) when designed in side-fed configuration at a given diameter and length of helical arm, effectively becomes equivalent to combination of a loop and a dipole antenna. The vertical and horizontal electric fields caused by these equivalent antennas can be made to vary by changing the turn angle of the bifilar. It is shown how the variation in horizontal and vertical electric field dominance is seen until perfect circular polarization is achieved when two fields are equal at a certain turn angle where area of the loop equals product of pitch of helix and radian length i.e. equivalent dipole length. The antenna is low profile and does not require ground plane and thus can be used in high speed aerodynamic and platform bodies made of composite material where metallic ground is unavailable. Additionally not requiring ground plane increases the isolation between the antennas with stable radiation pattern and hence can be used in MIMO systems.",
"title": ""
},
{
"docid": "0bc68769c263973309b7f19a8bc7d06d",
"text": "The publication of a scholarly book is always the conjunction of an author’s desire (or need) to disseminate their experience and knowledge and the interest or expectations of a potential community of readers to gain benefit from the publication itself. Michael Piotrowski has indeed managed to optimize this relation by bringing to the public a compendium of information that I think has been heavily awaited by many scholars having to deal with corpora of historical texts. The book covers most topics related to the acquisition, encoding, and annotation of historical textual data, seen from the point of view of their linguistic content. As such, it does not address issues related, for instance, to scholarly editions of these texts, but conveys a wealth of information on the various aspects where recent developments in language technology may help digital humanities projects to be aware of the current state of the art in the field.",
"title": ""
},
{
"docid": "52d4f95b6dc6da7d5dd54003b0bc5fbf",
"text": "Leadership is a process directing to a target of which followers, the participators are shared. For this reason leadership has an important effect on succeeding organizational targets. More importance is given to the leadership studies in order to increase organizational success each day. One of the leadership researches that attracts attention recently is spiritual leadership. Spiritual leadership (SL) is important for imposing ideal to the followers and giving meaning to the works they do. Focusing on SL that has recently taken its place in leadership literature, this study looks into what extend faculty members teaching at Faculty of Education display SL qualities. The study is in descriptive scanning model. 1819 students studying at Kocaeli University Faculty of Education in 2009-2010 academic year constitute the universe of the study. Observing leadership qualities takes long time. Therefore, the sample of the study is determined by deliberate sampling method and includes 432 students studying at the last year of the faculty. Data regarding faculty members' SL qualities were collected using a questionnaire adapted from Fry's (2003) 'Spiritual Leadership Scale'. Consequently, university students think that academic stuff shows the features of SL and its sub dimensions in a medium level. According to students, academicians show attitudes related to altruistic love rather than faith and vision. It is found that faculty members couldn't display leadership qualities enough according to the students at the end of the study. © 2011 Published by Elsevier Ltd.",
"title": ""
},
{
"docid": "3b5e584b95ae31ff94be85d7dbea1ccb",
"text": "Due to the fact that no NP-complete problem can be solved in polynomial time (unless P=NP), many approximability results (both positive and negative) of NP-hard optimization problems have appeared in the technical literature. In this compendium, we collect a large number of these results. ● Introduction ❍ NPO Problems: Definitions and Preliminaries ❍ Approximate Algorithms and Approximation Classes ❍ Completeness in Approximation Classes ❍ A list of NPO problems ❍ Improving the compendium ● Graph Theory ❍ Covering and Partitioning ❍ Subgraphs and Supergraphs ❍ Vertex Ordering file:///E|/COMPEND/COMPED19/COMPENDI.HTM (1 of 2) [19/1/2003 1:36:58] A compendium of NP optimization problems ❍ Isoand Other Morphisms ❍ Miscellaneous ● Network Design ❍ Spanning Trees ❍ Cuts and Connectivity ❍ Routing Problems ❍ Flow Problems ❍ Miscellaneous ● Sets and Partitions ❍ Covering, Hitting, and Splitting ❍ Weighted Set Problems ● Storage and Retrieval ❍ Data Storage ❍ Compression and Representation ❍ Miscellaneous ● Sequencing and Scheduling ❍ Sequencing on One Processor ❍ Multiprocessor Scheduling ❍ Shop Scheduling ❍ Miscellaneous ● Mathematical Programming ● Algebra and Number Theory ● Games and Puzzles ● Logic ● Program Optimization ● Miscellaneous ● References ● Index ● About this document ... Viggo Kann Mon Apr 21 13:07:14 MET DST 1997 file:///E|/COMPEND/COMPED19/COMPENDI.HTM (2 of 2) [19/1/2003 1:36:58]",
"title": ""
},
{
"docid": "0b7142ade987ca6f2683fc3fe6179fcb",
"text": "The Psychophysics Toolbox is a software package that supports visual psychophysics. Its routines provide an interface between a high-level interpreted language (MATLAB on the Macintosh) and the video display hardware. A set of example programs is included with the Toolbox distribution.",
"title": ""
},
{
"docid": "53c836280ad99b28c892ef85f31a5985",
"text": "This paper focuses on the design of 1 bit full adder circuit using Gate Diffusion Input Logic. The proposed adder schematics are developed using DSCH2 CAD tool, and their layouts are generated with Microwind 3 VLSI CAD tool. A 1 bit adder circuits are analyzed using standard CMOS 120nm features with corresponding voltage of 1.2V. The Simulated results of the proposed adder is compared with those of Pass transistor, Transmission Function, and CMOS based adder circuits. The proposed adder dissipates low power and responds faster.",
"title": ""
},
{
"docid": "55bdb8b6f4dd3dc836e9751ae8d721e3",
"text": "Influence maximization in social networks has been widely studied motivated by applications like spread of ideas or innovations in a network and viral marketing of products. Current studies focus almost exclusively on unsigned social networks containing only positive relationships (e.g. friend or trust) between users. Influence maximization in signed social networks containing both positive relationships and negative relationships (e.g. foe or distrust) between users is still a challenging problem that has not been studied. Thus, in this paper, we propose the polarity-related influence maximization (PRIM) problem which aims to find the seed node set with maximum positive influence or maximum negative influence in signed social networks. To address the PRIM problem, we first extend the standard Independent Cascade (IC) model to the signed social networks and propose a Polarity-related Independent Cascade (named IC-P) diffusion model. We prove that the influence function of the PRIM problem under the IC-P model is monotonic and submodular Thus, a greedy algorithm can be used to achieve an approximation ratio of 1-1/e for solving the PRIM problem in signed social networks. Experimental results on two signed social network datasets, Epinions and Slashdot, validate that our approximation algorithm for solving the PRIM problem outperforms state-of-the-art methods.",
"title": ""
},
{
"docid": "6bc31257bfbcc9531a3acf1ec738c790",
"text": "BACKGROUND\nThe interaction of depression and anesthesia and surgery may result in significant increases in morbidity and mortality of patients. Major depressive disorder is a frequent complication of surgery, which may lead to further morbidity and mortality.\n\n\nLITERATURE SEARCH\nSeveral electronic data bases, including PubMed, were searched pairing \"depression\" with surgery, postoperative complications, postoperative cognitive impairment, cognition disorder, intensive care unit, mild cognitive impairment and Alzheimer's disease.\n\n\nREVIEW OF THE LITERATURE\nThe suppression of the immune system in depressive disorders may expose the patients to increased rates of postoperative infections and increased mortality from cancer. Depression is commonly associated with cognitive impairment, which may be exacerbated postoperatively. There is evidence that acute postoperative pain causes depression and depression lowers the threshold for pain. Depression is also a strong predictor and correlate of chronic post-surgical pain. Many studies have identified depression as an independent risk factor for development of postoperative delirium, which may be a cause for a long and incomplete recovery after surgery. Depression is also frequent in intensive care unit patients and is associated with a lower health-related quality of life and increased mortality. Depression and anxiety have been widely reported soon after coronary artery bypass surgery and remain evident one year after surgery. They may increase the likelihood for new coronary artery events, further hospitalizations and increased mortality. Morbidly obese patients who undergo bariatric surgery have an increased risk of depression. Postoperative depression may also be associated with less weight loss at one year and longer. The extent of preoperative depression in patients scheduled for lumbar discectomy is a predictor of functional outcome and patient's dissatisfaction, especially after revision surgery. General postoperative mortality is increased.\n\n\nCONCLUSIONS\nDepression is a frequent cause of morbidity in surgery patients suffering from a wide range of conditions. Depression may be identified through the use of Patient Health Questionnaire-9 or similar instruments. Counseling interventions may be useful in ameliorating depression, but should be subject to clinical trials.",
"title": ""
},
{
"docid": "4b5d5d4da56ad916afdad73cc0180cb5",
"text": "This work proposes a substrate integrated waveguide (SIW) power divider employing the Wilkinson configuration for improving the isolation performance of conventional T-junction SIW power dividers. Measurement results at 15GHz show that the isolation (S23, S32) between output ports is about 17 dB and the output return losses (S22, S33) are about 14.5 dB, respectively. The Wilkinson-type performance has been greatly improved from those (7.0 dB ∼ 8.0 dB) of conventional T-junction SIW power dividers. The measured input return loss (23 dB) and average insertion loss (3.9 dB) are also improved from those of conventional ones. The proposed Wilkinson SIW divider will play an important role in high performance SIW circuits involving power divisions.",
"title": ""
}
] | scidocsrr |
797ec259cf5128e687eb9748f3e338f9 | Chronic insomnia and its negative consequences for health and functioning of adolescents: a 12-month prospective study. | [
{
"docid": "b6bf6c87040bc4996315fee62acb911b",
"text": "The influence of the sleep patterns of 2,259 students, aged 11 to 14 years, on trajectories of depressive symptoms, self-esteem, and grades was longitudinally examined using latent growth cross-domain models. Consistent with previous research, sleep decreased over time. Students who obtained less sleep in sixth grade exhibited lower initial self-esteem and grades and higher initial levels of depressive symptoms. Similarly, students who obtained less sleep over time reported heightened levels of depressive symptoms and decreased self-esteem. Sex of the student played a strong role as a predictor of hours of sleep, self-esteem, and grades. This study underscores the role of sleep in predicting adolescents' psychosocial outcomes and highlights the importance of using idiographic methodologies in the study of developmental processes.",
"title": ""
}
] | [
{
"docid": "e510140bfc93089e69cb762b968de5e9",
"text": "Owing to the popularity of the PDF format and the continued exploitation of Adobe Reader, the detection of malicious PDFs remains a concern. All existing detection techniques rely on the PDF parser to a certain extent, while the complexity of the PDF format leaves an abundant space for parser confusion. To quantify the difference between these parsers and Adobe Reader, we create a reference JavaScript extractor by directly tapping into Adobe Reader at locations identified through a mostly automatic binary analysis technique. By comparing the output of this reference extractor against that of several opensource JavaScript extractors on a large data set obtained from VirusTotal, we are able to identify hundreds of samples which existing extractors fail to extract JavaScript from. By analyzing these samples we are able to identify several weaknesses in each of these extractors. Based on these lessons, we apply several obfuscations on a malicious PDF sample, which can successfully evade all the malware detectors tested. We call this evasion technique a PDF parser confusion attack. Lastly, we demonstrate that the reference JavaScript extractor improves the accuracy of existing JavaScript-based classifiers and how it can be used to mitigate these parser limitations in a real-world setting.",
"title": ""
},
{
"docid": "e9838d3c33d19bdd20a001864a878757",
"text": "FPGAs are increasingly popular as application-specific accelerators because they lead to a good balance between flexibility and energy efficiency, compared to CPUs and ASICs. However, the long routing time imposes a barrier on FPGA computing, which significantly hinders the design productivity. Existing attempts of parallelizing the FPGA routing either do not fully exploit the parallelism or suffer from an excessive quality loss. Massive parallelism using GPUs has the potential to solve this issue but faces non-trivial challenges.\n To cope with these challenges, this work presents Corolla, a GPU-accelerated FPGA routing method. Corolla enables applying the GPU-friendly shortest path algorithm in FPGA routing, leveraging the idea of problem size reduction by limiting the search in routing subgraphs. We maintain the convergence after problem size reduction using the dynamic expansion of the routing resource subgraphs. In addition, Corolla explores the fine-grained single-net parallelism and proposes a hybrid approach to combine the static and dynamic parallelism on GPU. To explore the coarse-grained multi-net parallelism, Corolla proposes an effective method to parallelize mutli-net routing while preserving the equivalent routing results as the original single-net routing. Experimental results show that Corolla achieves an average of 18.72x speedup on GPU with a tolerable loss in the routing quality and sustains a scalable speedup on large-scale routing graphs. To our knowledge, this is the first work to demonstrate the effectiveness of GPU-accelerated FPGA routing.",
"title": ""
},
{
"docid": "77d11e0b66f3543fadf91d0de4c928c9",
"text": "In the United States, the number of people over 65 will double between ow and 2030 to 69.4 million. Providing care for this increasing population becomes increasingly difficult as the cognitive and physical health of elders deteriorates. This survey article describes ome of the factors that contribute to the institutionalization of elders, and then presents some of the work done towards providing technological support for this vulnerable community.",
"title": ""
},
{
"docid": "02855c493744435d868d669a6ddedd1c",
"text": "Recurrent neural networks (RNNs), particularly long short-term memory (LSTM), have gained much attention in automatic speech recognition (ASR). Although some successful stories have been reported, training RNNs remains highly challenging, especially with limited training data. Recent research found that a well-trained model can be used as a teacher to train other child models, by using the predictions generated by the teacher model as supervision. This knowledge transfer learning has been employed to train simple neural nets with a complex one, so that the final performance can reach a level that is infeasible to obtain by regular training. In this paper, we employ the knowledge transfer learning approach to train RNNs (precisely LSTM) using a deep neural network (DNN) model as the teacher. This is different from most of the existing research on knowledge transfer learning, since the teacher (DNN) is assumed to be weaker than the child (RNN); however, our experiments on an ASR task showed that it works fairly well: without applying any tricks on the learning scheme, this approach can train RNNs successfully even with limited training data.",
"title": ""
},
{
"docid": "c6160b8ad36bc4f297bfb1f6b04c79e0",
"text": "Despite their incentive structure flaws, mining pools account for more than 95% of Bitcoin’s computation power. This paper introduces an attack against mining pools in which a malicious party pays pool members to withhold their solutions from their pool operator. We show that an adversary with a tiny amount of computing power and capital can execute this attack. Smart contracts enforce the malicious party’s payments, and therefore miners need neither trust the attacker’s intentions nor his ability to pay. Assuming pool members are rational, an adversary with a single mining ASIC can, in theory, destroy all big mining pools without losing any money (and even make some profit).",
"title": ""
},
{
"docid": "62c6050db8e42b1de54f8d1d54fd861f",
"text": "In this paper we present our approach of solving the PAN 2016 Author Profiling Task. It involves classifying users’ gender and age using social media posts. We used SVM classifiers and neural networks on TF-IDF and verbosity features. Results showed that SVM classifiers are better for English datasets and neural networks perform better for Dutch and Spanish datasets.",
"title": ""
},
{
"docid": "3e9f54363d930c703dfe20941b2568b0",
"text": "Organizations are looking to new graduate nurses to fill expected staffing shortages over the next decade. Creative and effective onboarding programs will determine the success or failure of these graduates as they transition from student to professional nurse. This longitudinal quantitative study with repeated measures used the Casey-Fink Graduate Nurse Experience Survey to investigate the effects of offering a prelicensure extern program and postlicensure residency program on new graduate nurses and organizational outcomes versus a residency program alone. Compared with the nurse residency program alone, the combination of extern program and nurse residency program improved neither the transition factors most important to new nurse graduates during their first year of practice nor a measure important to organizations, retention rates. The additional cost of providing an extern program should be closely evaluated when making financially responsible decisions.",
"title": ""
},
{
"docid": "68971b7efc9663c37113749206b5382b",
"text": "Trehalose 6-phosphate (Tre6P), the intermediate of trehalose biosynthesis, has a profound influence on plant metabolism, growth, and development. It has been proposed that Tre6P acts as a signal of sugar availability and is possibly specific for sucrose status. Short-term sugar-feeding experiments were carried out with carbon-starved Arabidopsis thaliana seedlings grown in axenic shaking liquid cultures. Tre6P increased when seedlings were exogenously supplied with sucrose, or with hexoses that can be metabolized to sucrose, such as glucose and fructose. Conditional correlation analysis and inhibitor experiments indicated that the hexose-induced increase in Tre6P was an indirect response dependent on conversion of the hexose sugars to sucrose. Tre6P content was affected by changes in nitrogen status, but this response was also attributable to parallel changes in sucrose. The sucrose-induced rise in Tre6P was unaffected by cordycepin but almost completely blocked by cycloheximide, indicating that de novo protein synthesis is necessary for the response. There was a strong correlation between Tre6P and sucrose even in lines that constitutively express heterologous trehalose-phosphate synthase or trehalose-phosphate phosphatase, although the Tre6P:sucrose ratio was shifted higher or lower, respectively. It is proposed that the Tre6P:sucrose ratio is a critical parameter for the plant and forms part of a homeostatic mechanism to maintain sucrose levels within a range that is appropriate for the cell type and developmental stage of the plant.",
"title": ""
},
{
"docid": "555e3bbc504c7309981559a66c584097",
"text": "The hippocampus has been implicated in the regulation of anxiety and memory processes. Nevertheless, the precise contribution of its ventral (VH) and dorsal (DH) division in these issues still remains a matter of debate. The Trial 1/2 protocol in the elevated plus-maze (EPM) is a suitable approach to assess features associated with anxiety and memory. Information about the spatial environment on initial (Trial 1) exploration leads to a subsequent increase in open-arm avoidance during retesting (Trial 2). The objective of the present study was to investigate whether transient VH or DH deactivation by lidocaine microinfusion would differently interfere with the performance of EPM-naive and EPM-experienced rats. Male Wistar rats were bilaterally-implanted with guide cannulas aimed at the VH or the DH. One-week after surgery, they received vehicle or lidocaine 2.0% in 1.0 microL (0.5 microL per side) at pre-Trial 1, post-Trial 1 or pre-Trial 2. There was an increase in open-arm exploration after the intra-VH lidocaine injection on Trial 1. Intra-DH pre-Trial 2 administration of lidocaine also reduced the open-arm avoidance. No significant changes were observed in enclosed-arm entries, an EPM index of general exploratory activity. The cautious exploration of potentially dangerous environment requires VH functional integrity, suggesting a specific role for this region in modulating anxiety-related behaviors. With regard to the DH, it may be preferentially involved in learning and memory since the acquired response of inhibitory avoidance was no longer observed when lidocaine was injected pre-Trial 2.",
"title": ""
},
{
"docid": "4ec266df91a40330b704c4e10eacb820",
"text": "Recently many cases of missing children between ages 14 and 17 years are reported. Parents always worry about the possibility of kidnapping of their children. This paper proposes an Android based solution to aid parents to track their children in real time. Nowadays, most mobile phones are equipped with location services capabilities allowing us to get the device’s geographic position in real time. The proposed solution takes the advantage of the location services provided by mobile phone since most of kids carry mobile phones. The mobile application use the GPS and SMS services found in Android mobile phones. It allows the parent to get their child’s location on a real time map. The system consists of two sides, child side and parent side. A parent’s device main duty is to send a request location SMS to the child’s device to get the location of the child. On the other hand, the child’s device main responsibility is to reply the GPS position to the parent’s device upon request. Keywords—Child Tracking System, Global Positioning System (GPS), SMS-based Mobile Application.",
"title": ""
},
{
"docid": "065b0af0f1ed195ac90fa3ad041fa4c4",
"text": "We present CapWidgets, passive tangible controls for capacitive touch screens. CapWidgets bring back physical controls to off-the-shelf multi-touch surfaces as found in mobile phones and tablet computers. While the user touches the widget, the surface detects the capacitive marker on the widget's underside. We study the relative performance of this tangible interaction with direct multi-touch interaction and our experimental results show that user performance and preferences are not automatically in favor of tangible widgets and careful design is necessary to validate their properties.",
"title": ""
},
{
"docid": "16d417e6d2c75edbdf2adbed8ec8d072",
"text": "Network middleboxes are difficult to manage and troubleshoot, due to their proprietary monolithic design. Moving towards Network Functions Virtualization (NFV), virtualized middlebox appliances can be more flexibly instantiated and dynamically chained, making troubleshooting even more difficult. To guarantee carrier-grade availability and minimize outages, operators need ways to automatically verify that the deployed network and middlebox configurations obey higher level network policies. In this paper, we first define and identify the key challenges for checking the correct forwarding behavior of Service Function Chains (SFC). We then design and develop a network diagnosis framework that aids network administrators in verifying the correctness of SFC policy enforcement. Our prototype - SFC-Checker can verify stateful service chains efficiently, by analyzing the switches' forwarding rules and the middleboxes' stateful forwarding behavior. Built on top of the network function models we proposed, we develop a diagnosis algorithm that is able to check the stateful forwarding behavior of a chain of network service functions.",
"title": ""
},
{
"docid": "1a2fe54f7456c5e726f87a401a4628f3",
"text": "Starting from a neurobiological standpoint, I will propose that our capacity to understand others as intentional agents, far from being exclusively dependent upon mentalistic/linguistic abilities, be deeply grounded in the relational nature of our interactions with the world. According to this hypothesis, an implicit, prereflexive form of understanding of other individuals is based on the strong sense of identity binding us to them. We share with our conspecifics a multiplicity of states that include actions, sensations and emotions. A new conceptual tool able to capture the richness of the experiences we share with others will be introduced: the shared manifold of intersubjectivity. I will posit that it is through this shared manifold that it is possible for us to recognize other human beings as similar to us. It is just because of this shared manifold that intersubjective communication and ascription of intentionality become possible. It will be argued that the same neural structures that are involved in processing and controlling executed actions, felt sensations and emotions are also active when the same actions, sensations and emotions are to be detected in others. It therefore appears that a whole range of different \"mirror matching mechanisms\" may be present in our brain. This matching mechanism, constituted by mirror neurons originally discovered and described in the domain of action, could well be a basic organizational feature of our brain, enabling our rich and diversified intersubjective experiences. This perspective is in a position to offer a global approach to the understanding of the vulnerability to major psychoses such as schizophrenia.",
"title": ""
},
{
"docid": "7c9d35fb9cec2affbe451aed78541cef",
"text": "Dental caries, also known as dental cavities, is the most widespread pathology in the world. Up to a very recent period, almost all individuals had the experience of this pathology at least once in their life. Early detection of dental caries can help in a sharp decrease in the dental disease rate. Thanks to the growing accessibility to medical imaging, the clinical applications now have better impact on patient care. Recently, there has been interest in the application of machine learning strategies for classification and analysis of image data. In this paper, we propose a new method to detect and identify dental caries using X-ray images as dataset and deep neural network as technique. This technique is based on stacked sparse auto-encoder and a softmax classifier. Those techniques, sparse auto-encoder and softmax, are used to train a deep neural network. The novelty here is to apply deep neural network to diagnosis of dental caries. This approach was tested on a real dataset and has demonstrated a good performance of detection. Keywords-dental X-ray; classification; Deep Neural Networks; Stacked sparse auto-encoder; Softmax.",
"title": ""
},
{
"docid": "e98aefff2ab776efcc13c1d9534ec9fb",
"text": "Many software providers operate crash reporting services to automatically collect crashes from millions of customers and file bug reports. Precisely triaging crashes is necessary and important for software providers because the millions of crashes that may be reported every day are critical in identifying high impact bugs. However, the triaging accuracy of existing systems is limited, as they rely only on the syntactic information of the stack trace at the moment of a crash without analyzing program semantics.\n In this paper, we present RETracer, the first system to triage software crashes based on program semantics reconstructed from memory dumps. RETracer was designed to meet the requirements of large-scale crash reporting services. RETracer performs binary-level backward taint analysis without a recorded execution trace to understand how functions on the stack contribute to the crash. The main challenge is that the machine state at an earlier time cannot be recovered completely from a memory dump, since most instructions are information destroying.\n We have implemented RETracer for x86 and x86-64 native code, and compared it with the existing crash triaging tool used by Microsoft. We found that RETracer eliminates two thirds of triage errors based on a manual analysis of 140 bugs fixed in Microsoft Windows and Office. RETracer has been deployed as the main crash triaging system on Microsoft's crash reporting service.",
"title": ""
},
{
"docid": "ed3a859e2cea465a6d34c556fec860d9",
"text": "Multi-word expressions constitute a significant portion of the lexicon of every natural language, and handling them correctly is mandatory for various NLP applications. Yet such entities are notoriously hard to define, and are consequently missing from standard lexicons and dictionaries. Multi-word expressions exhibit idiosyncratic behavior on various levels: orthographic, morphological, syntactic and semantic. In this work we take advantage of the morphological and syntactic idiosyncrasy of Hebrew noun compounds and employ it to extract such expressions from text corpora. We show that relying on linguistic information dramatically improves the accuracy of compound extraction, reducing over one third of the errors compared with the best baseline.",
"title": ""
},
{
"docid": "c80dbfc2e1f676a7ffe4a6a4f7460d36",
"text": "Coarse-grained semantic categories such as supersenses have proven useful for a range of downstream tasks such as question answering or machine translation. To date, no effort has been put into integrating the supersenses into distributional word representations. We present a novel joint embedding model of words and supersenses, providing insights into the relationship between words and supersenses in the same vector space. Using these embeddings in a deep neural network model, we demonstrate that the supersense enrichment leads to a significant improvement in a range of downstream classification tasks.",
"title": ""
},
{
"docid": "e1e1005788a0133025f9f3951b9a5372",
"text": "Despite the recent success of neural networks in tasks involving natural language understanding (NLU) there has only been limited progress in some of the fundamental challenges of NLU, such as the disambiguation of the meaning and function of words in context. This work approaches this problem by incorporating contextual information into word representations prior to processing the task at hand. To this end we propose a general-purpose reading architecture that is employed prior to a task-specific NLU model. It is responsible for refining context-agnostic word representations with contextual information and lends itself to the introduction of additional, context-relevant information from external knowledge sources. We demonstrate that previously non-competitive models benefit dramatically from employing contextual representations, closing the gap between general-purpose reading architectures and the state-of-the-art performance obtained with fine-tuned, task-specific architectures. Apart from our empirical results we present a comprehensive analysis of the computed representations which gives insights into the kind of information added during the refinement process.",
"title": ""
},
{
"docid": "a3cb839b4299a50c475b2bb1b608ee91",
"text": "In this work, we present an event detection method in Twitter based on clustering of hashtags and introduce an enhancement technique by using the semantic similarities between the hashtags. To this aim, we devised two methods for tweet vector generation and evaluated their effect on clustering and event detection performance in comparison to word-based vector generation methods. By analyzing the contexts of hashtags and their co-occurrence statistics with other words, we identify their paradigmatic relationships and similarities. We make use of this information while applying a lexico-semantic expansion on tweet contents before clustering the tweets based on their similarities. Our aim is to tolerate spelling errors and capture statements which actually refer to the same concepts. We evaluate our enhancement solution on a three-day dataset of tweets with Turkish content. In our evaluations, we observe clearer clusters, improvements in accuracy, and earlier event detection times.",
"title": ""
},
{
"docid": "de2527840267fbc3bf5412498323933b",
"text": "In time series classification, signals are typically mapped into some intermediate representation which is used to construct models. We introduce the joint time-frequency scattering transform, a locally time-shift invariant representation which characterizes the multiscale energy distribution of a signal in time and frequency. It is computed through wavelet convolutions and modulus non-linearities and may therefore be implemented as a deep convolutional neural network whose filters are not learned but calculated from wavelets. We consider the progression from mel-spectrograms to time scattering and joint time-frequency scattering transforms, illustrating the relationship between increased discriminability and refinements of convolutional network architectures. The suitability of the joint time-frequency scattering transform for characterizing time series is demonstrated through applications to chirp signals and audio synthesis experiments. The proposed transform also obtains state-of-the-art results on several audio classification tasks, outperforming time scattering transforms and achieving accuracies comparable to those of fully learned networks.",
"title": ""
}
] | scidocsrr |
d3d243348f69ac02e98045c4eca89f10 | 3D Keypoint Detection Based on Deep Neural Network with Sparse Autoencoder | [
{
"docid": "33915af49384d028a591d93336feffd6",
"text": "This paper presents a new approach for recognition of 3D objects that are represented as 3D point clouds. We introduce a new 3D shape descriptor called Intrinsic Shape Signature (ISS) to characterize a local/semi-local region of a point cloud. An intrinsic shape signature uses a view-independent representation of the 3D shape to match shape patches from different views directly, and a view-dependent transform encoding the viewing geometry to facilitate fast pose estimation. In addition, we present a highly efficient indexing scheme for the high dimensional ISS shape descriptors, allowing for fast and accurate search of large model databases. We evaluate the performance of the proposed algorithm on a very challenging task of recognizing different vehicle types using a database of 72 models in the presence of sensor noise, obscuration and scene clutter.",
"title": ""
}
] | [
{
"docid": "e0c52b0fdf2d67bca4687b8060565288",
"text": "Large graph databases are commonly collected and analyzed in numerous domains. For reasons related to either space efficiency or for privacy protection (e.g., in the case of social network graphs), it sometimes makes sense to replace the original graph with a summary, which removes certain details about the original graph topology. However, this summarization process leaves the database owner with the challenge of processing queries that are expressed in terms of the original graph, but are answered using the summary. In this paper, we propose a formal semantics for answering queries on summaries of graph structures. At its core, our formulation is based on a random worlds model. We show that important graph-structure queries (e.g., adjacency, degree, and eigenvector centrality) can be answered efficiently and in closed form using these semantics. Further, based on this approach to query answering, we formulate three novel graph partitioning/compression problems. We develop algorithms for finding a graph summary that least affects the accuracy of query results, and we evaluate our proposed algorithms using both real and synthetic data.",
"title": ""
},
{
"docid": "b7b01049a4cc9cfd2dd951ee1302bfbc",
"text": "This article describes the design, implementation, and results of the latest installment of the dermoscopic image analysis benchmark challenge. The goal is to support research and development of algorithms for automated diagnosis of melanoma, the most lethal skin cancer. The challenge was divided into 3 tasks: lesion segmentation, feature detection, and disease classification. Participation involved 593 registrations, 81 pre-submissions, 46 finalized submissions (including a 4-page manuscript), and approximately 50 attendees, making this the largest standardized and comparative study in this field to date. While the official challenge duration and ranking of participants has concluded, the dataset snapshots remain available for further research and development.",
"title": ""
},
{
"docid": "c3f9db192c47edb46cecac8d5c421dcf",
"text": "The concept of strategic sourcing recognizes that procurement is not just a cost function, but supports the firm’s effort to achieve its long-term objectives. Organizations more and more expect from their chief procurement officer (CPO) to develop long-term and short-term plans in procurement. Typically, however, procurement is driven by a tactical spend management sourcing process aimed at cost saving targets, which is not able to support organizations in achieving strategic objectives like innovation, value creation, sustainable competitive advantage and long-term partnerships. A paradigm shift from a tactical way of thinking about sourcing to a more strategic way of thinking is needed by focusing on value-driven targets. To help realize the new paradigm of value-driven management in sourcing, we designed a systemic view on strategic sourcing based on Service-Dominant Logic and (service) systems thinking. We used this systemic view to develop the conceptual basis of a new modeling and analysis language that helps organizations in exploring sourcing alternatives according to value-driven management.",
"title": ""
},
{
"docid": "14f3ecd814f5affe186146288d83697c",
"text": "Accidental intra-arterial filler injection may cause significant tissue injury and necrosis. Hyaluronic acid (HA) fillers, currently the most popular, are the focus of this article, which highlights complications and their symptoms, risk factors, and possible treatment strategies. Although ischemic events do happen and are therefore important to discuss, they seem to be exceptionally rare and represent a small percentage of complications in individual clinical practices. However, the true incidence of this complication is unknown because of underreporting by clinicians. Typical clinical findings include skin blanching, livedo reticularis, slow capillary refill, and dusky blue-red discoloration, followed a few days later by blister formation and finally tissue slough. Mainstays of treatment (apart from avoidance by meticulous technique) are prompt recognition, immediate treatment with hyaluronidase, topical nitropaste under occlusion, oral acetylsalicylic acid (aspirin), warm compresses, and vigorous massage. Secondary lines of treatment may involve intra-arterial hyaluronidase, hyperbaric oxygen therapy, and ancillary vasodilating agents such as prostaglandin E1. Emergency preparedness (a \"filler crash cart\") is emphasized, since early intervention is likely to significantly reduce morbidity. A clinical summary chart is provided, organized by complication presentation.",
"title": ""
},
{
"docid": "4cdef79370abcd380357c8be92253fa5",
"text": "In order to realize the full potential of dependency-based syntactic parsing, it is desirable to allow non-projective dependency structures. We show how a datadriven deterministic dependency parser, in itself restricted to projective structures, can be combined with graph transformation techniques to produce non-projective structures. Experiments using data from the Prague Dependency Treebank show that the combined system can handle nonprojective constructions with a precision sufficient to yield a significant improvement in overall parsing accuracy. This leads to the best reported performance for robust non-projective parsing of Czech.",
"title": ""
},
{
"docid": "4fe25b570cd7b58a688232486ae9db6e",
"text": "In last few years, the rate of development and advances in the field of EAP has accelerated significantly and it is increasingly getting closer to the point of finding them used in commercial products. Substantial development has been reported in the understanding of their drive mechanisms and the parameters that control their electro-activation behavior. Further, efforts are being made to develop mass production techniques with greatly improved actuation capability and operation durability. The recent efforts to develop energy harvesting techniques, haptic interfacing (including refreshable braille displays), and toys are further increasing the likelihood of finding niches for these materials. In this paper, the author sought to examine the potential directions for the future development of the field of EAP in relation to the state-of-the-art.",
"title": ""
},
{
"docid": "974869c228cbc69f0197fbb73a2c5c37",
"text": "Gut microbial communities represent one source of human genetic and metabolic diversity. To examine how gut microbiomes differ among human populations, here we characterize bacterial species in fecal samples from 531 individuals, plus the gene content of 110 of them. The cohort encompassed healthy children and adults from the Amazonas of Venezuela, rural Malawi and US metropolitan areas and included mono- and dizygotic twins. Shared features of the functional maturation of the gut microbiome were identified during the first three years of life in all three populations, including age-associated changes in the genes involved in vitamin biosynthesis and metabolism. Pronounced differences in bacterial assemblages and functional gene repertoires were noted between US residents and those in the other two countries. These distinctive features are evident in early infancy as well as adulthood. Our findings underscore the need to consider the microbiome when evaluating human development, nutritional needs, physiological variations and the impact of westernization.",
"title": ""
},
{
"docid": "b281ac9bcb248772ecc1de4104d1b125",
"text": "Content Based Image Retrieval (CBIR) is the technique which uses visual contents to search images from large database. Image retrieval is achieved according to the similarity of image features. Color and texture is the most important visual features. CBIR systems focused on using low-level features like color, texture and shape for image representation. The color and texture features can be extracted using global color histogram. This paper measures the performance of color and textual statistical features of an image in retrieving the similar images from the data set. The performance is measured by implementing a single CBIR system in two levels. The first level uses color features for image retrieval. The second level uses the texture features for similar image extraction. Euclidean distance is used as the distance measure of two images. It is found that the system which uses texture features retrieves the most similar images from the data set.",
"title": ""
},
{
"docid": "bb47e6b493a204a9e0fbe97aa14fec06",
"text": "Intelligent artificial agents need to be able to explain and justify their actions. They must therefore understand the rationales for their own actions. This paper describes a technique for acquiring this understanding, implemented in a multimedia explanation system. The system determines the motivation for a decision by recalling the situation in which the decision was made, and replaying the decision under variants of the original situation. Through experimentation the agent is able to discover what factors led to the decisions, and what alternatives might have been chosen had the situation been slightly different. The agent learns to recognize similar situations where the same decision would be made for the same reasons. This approach is implemented in an artificial fighter pilot that can explain the motivations for its actions, situation assessments,",
"title": ""
},
{
"docid": "00547f45936c7cea4b7de95ec1e0fbcd",
"text": "With the emergence of the Internet of Things (IoT) and Big Data era, many applications are expected to assimilate a large amount of data collected from environment to extract useful information. However, how heterogeneous computing devices of IoT ecosystems can execute the data processing procedures has not been clearly explored. In this paper, we propose a framework which characterizes energy and performance requirements of the data processing applications across heterogeneous devices, from a server in the cloud and a resource-constrained gateway at edge. We focus on diverse machine learning algorithms which are key procedures for handling the large amount of IoT data. We build analytic models which automatically identify the relationship between requirements and data in a statistical way. The proposed framework also considers network communication cost and increasing processing demand. We evaluate the proposed framework on two heterogenous devices, a Raspberry Pi and a commercial Intel server. We show that the identified models can accurately estimate performance and energy requirements with less than error of 4.8% for both platforms. Based on the models, we also evaluate whether the resource-constrained gateway can process the data more efficiently than the server in the cloud. The results present that the less-powerful device can achieve better energy and performance efficiency for more than 50% of machine learning algorithms.",
"title": ""
},
{
"docid": "7cff04976bf78c5d8a1b4338b2107482",
"text": "Classifiers trained on given databases perform poorly when tested on data acquired in different settings. This is explained in domain adaptation through a shift among distributions of the source and target domains. Attempts to align them have traditionally resulted in works reducing the domain shift by introducing appropriate loss terms, measuring the discrepancies between source and target distributions, in the objective function. Here we take a different route, proposing to align the learned representations by embedding in any given network specific Domain Alignment Layers, designed to match the source and target feature distributions to a reference one. Opposite to previous works which define a priori in which layers adaptation should be performed, our method is able to automatically learn the degree of feature alignment required at different levels of the deep network. Thorough experiments on different public benchmarks, in the unsupervised setting, confirm the power of our approach.",
"title": ""
},
{
"docid": "1c39ffe697fe2f64c9c6b71cc8ba3652",
"text": "Mouse dynamics is the process of identifying individual users based on their mouse operating characteristics. Although previous work has reported some promising results, mouse dynamics is still a newly emerging technique and has not reached an acceptable level of performance. One of the major reasons is intrinsic behavioral variability. This study presents a novel approach by using pattern-growth-based mining method to extract frequent-behavior segments in obtaining stable mouse characteristics, employing one-class classification algorithms to perform the task of continuous user authentication. Experimental results show that mouse characteristics extracted from frequent-behavior segments are much more stable than those from holistic behavior, and the approach achieves a practically useful level of performance with FAR of 0.37% and FRR of 1.12%. These findings suggest that mouse dynamics suffice to be a significant enhancement for a traditional authentication system. Our dataset is publicly available to facilitate future research.",
"title": ""
},
{
"docid": "6da745a03e290f312f7cd2960ebe54b8",
"text": "INTRODUCTION\nThe aim of effective clinical handover is seamless transfer of information between care providers. Handover between paramedics and the trauma team provides challenges in ensuring that information loss does not occur. Handover is often time-pressured and paramedics' clinical notes are often delayed in reaching the trauma team. Documentation by trauma team members must be accurate. This study evaluated information loss and discordance as patients were transferred from the scene of an incident to the Trauma Centre.\n\n\nMETHODS\nTwenty-five trauma patients presenting by ambulance to a tertiary Emergency and Trauma Centre were randomly selected. Audiotaped (pre-hospital) and videotaped (in-hospital) handover was compared with written documentation.\n\n\nRESULTS\nIn the pre-hospital setting 171/228 (75%) of data items handed over by paramedics to the trauma team were documented and in the in-hospital handover 335/498 (67%) of information was documented. Information least likely to be documented by trauma team members (1) in the pre-hospital setting related to treatment provided and (2) in the in-hospital setting related to signs and symptoms. While 79% of information was subsequently documented by paramedics, 9% (n=59) of information was not documented either by trauma team members or paramedics and constitutes information loss. Information handed over was not congruent with documentation on seven occasions. Discrepancies included a patient's allergy status and sites of injury (n=2). Demographic details were most likely to be documented but not handed over by paramedics.\n\n\nCONCLUSION\nBy documenting where deficits in handover occur we can identify points of vulnerability and strategies to capture this information.",
"title": ""
},
{
"docid": "4420990e60ca5a043d1353019c947db5",
"text": "Recent work has shown that the end-to-end approach using convolutional neural network (CNN) is effective in various types of machine learning tasks. For audio signals, the approach takes raw waveforms as input using an 1-D convolution layer. In this paper, we improve the 1-D CNN architecture for music auto-tagging by adopting building blocks from state-of-the-art image classification models, ResNets and SENets, and adding multi-level feature aggregation to it. We compare different combinations of the modules in building CNN architectures. The results show that they achieve significant improvements over previous state-of-the-art models on the MagnaTagATune dataset and comparable results on Million Song Dataset. Furthermore, we analyze and visualize our model to show how the 1-D CNN operates.",
"title": ""
},
{
"docid": "c87a1cea06d135628691a912cad582c1",
"text": "OBJECTIVE\nDelphi technique is a structured process commonly used to developed healthcare quality indicators, but there is a little recommendation for researchers who wish to use it. This study aimed 1) to describe reporting of the Delphi method to develop quality indicators, 2) to discuss specific methodological skills for quality indicators selection 3) to give guidance about this practice.\n\n\nMETHODOLOGY AND MAIN FINDING\nThree electronic data bases were searched over a 30 years period (1978-2009). All articles that used the Delphi method to select quality indicators were identified. A standardized data extraction form was developed. Four domains (questionnaire preparation, expert panel, progress of the survey and Delphi results) were assessed. Of 80 included studies, quality of reporting varied significantly between items (9% for year's number of experience of the experts to 98% for the type of Delphi used). Reporting of methodological aspects needed to evaluate the reliability of the survey was insufficient: only 39% (31/80) of studies reported response rates for all rounds, 60% (48/80) that feedback was given between rounds, 77% (62/80) the method used to achieve consensus and 57% (48/80) listed quality indicators selected at the end of the survey. A modified Delphi procedure was used in 49/78 (63%) with a physical meeting of the panel members, usually between Delphi rounds. Median number of panel members was 17(Q1:11; Q3:31). In 40/70 (57%) studies, the panel included multiple stakeholders, who were healthcare professionals in 95% (38/40) of cases. Among 75 studies describing criteria to select quality indicators, 28 (37%) used validity and 17(23%) feasibility.\n\n\nCONCLUSION\nThe use and reporting of the Delphi method for quality indicators selection need to be improved. We provide some guidance to the investigators to improve the using and reporting of the method in future surveys.",
"title": ""
},
{
"docid": "a600e2638d7e628534e8ba72d07e68c3",
"text": "A Software Defined Radio (SDR) is a radio which can tune to any frequency band, transmit and receive different modulations and different physical parameters across a large frequency spectrum by using a programmable hardware and powerful software. An SDR performs significant amounts of signal processing in a general purpose computer, or a reconfigurable piece of digital electronics or the combination of both. In this paper, we seek to explore the viability of using GNU Radio; an open source SDR implementation and the Universal Software Radio Peripheral (USRP); an SDR hardware platform, to transmit and receive the OFDM radio signal with QPSK and BPSK modulation. Quality of Service (QoS) in terms of Packet Received Ratio (PRR) on the data transmitted will then be investigated and analyzed.",
"title": ""
},
{
"docid": "990e48305cb2040b434f42c307664c22",
"text": "A novel property of DNA is described: the capacity of some bacterial DNA sequences to induce electromagnetic waves at high aqueous dilutions. It appears to be a resonance phenomenon triggered by the ambient electromagnetic background of very low frequency waves. The genomic DNA of most pathogenic bacteria contains sequences which are able to generate such signals. This opens the way to the development of highly sensitive detection system for chronic bacterial infections in human and animal diseases.",
"title": ""
},
{
"docid": "f694bb852f79e56adb9735ad42a08a7f",
"text": "With the development of deep learning, supervised learning has frequently been adopted to classify remotely sensed images using convolutional networks. However, due to the limited amount of labeled data available, supervised learning is often difficult to carry out. Therefore, we proposed an unsupervised model called multiple-layer feature-matching generative adversarial networks (MARTA GANs) to learn a representation using only unlabeled data. MARTA GANs consists of both a generative model <inline-formula> <tex-math notation=\"LaTeX\">$G$ </tex-math></inline-formula> and a discriminative model <inline-formula> <tex-math notation=\"LaTeX\">$D$ </tex-math></inline-formula>. We treat <inline-formula> <tex-math notation=\"LaTeX\">$D$ </tex-math></inline-formula> as a feature extractor. To fit the complex properties of remote sensing data, we use a fusion layer to merge the mid-level and global features. <inline-formula> <tex-math notation=\"LaTeX\">$G$ </tex-math></inline-formula> can produce numerous images that are similar to the training data; therefore, <inline-formula> <tex-math notation=\"LaTeX\">$D$ </tex-math></inline-formula> can learn better representations of remotely sensed images using the training data provided by <inline-formula> <tex-math notation=\"LaTeX\">$G$ </tex-math></inline-formula>. The classification results on two widely used remote sensing image databases show that the proposed method significantly improves the classification performance compared with other state-of-the-art methods.",
"title": ""
},
{
"docid": "3bcd11082fc70d52da15a5e087ab5375",
"text": "The problem of maximizing information diffusion through a network is a topic of considerable recent interest. A conventional problem is to select a set of any arbitrary k nodes as the initial influenced nodes so that they can effectively disseminate the information to the rest of the network. However, this model is usually unrealistic in online social networks since we cannot typically choose arbitrary nodes in the network as the initial influenced nodes. From the point of view of an individual user who wants to spread information as much as possible, a more reasonable model is to try to initially share the information with only some of its neighbours rather than a set of any arbitrary nodes; but how can these neighbours be effectively chosen? We empirically study how to design more effective neighbours selection strategies to maximize information diffusion. Our experimental results through intensive simulation on several real- world network topologies show that an effective neighbours selection strategy is to use node degree information for short-term propagation while a naive random selection is also adequate for long-term propagation to cover more than half of a network. We also discuss the effects of the number of initial activated neighbours. If we particularly select the highest degree nodes as initial activated neighbours, the number of initial activated neighbours is not an important factor at least for long-term propagation of information.",
"title": ""
},
{
"docid": "2cfa3df5cc6749a2c290807fa6833855",
"text": "A method is presented to recover 3D scene structure and camera motion from multiple images without the need for correspondence information. The problem is framed as finding the maximum likelihood structure and motion given only the 2D measurements, integrating over all possible assignments of 3D features to 2D measurements. This goal is achieved by means of an algorithm which iteratively refines a probability distribution over the set of all correspondence assignments. At each iteration a new structure from motion problem is solved, using as input a set of ’virtual measurements’ derived from this probability distribution. The distribution needed can be efficiently obtained by Markov Chain Monte Carlo sampling. The approach is cast within the framework of Expectation-Maximization,which guarantees convergence to a local maximizer of the likelihood. The algorithm works well in practice, as will be demonstrated using results on several real image sequences.",
"title": ""
}
] | scidocsrr |
f1f2b203fbc36b0eaaafc04dd6cad860 | DiSCern: A diversified citation recommendation system for scientific queries | [
{
"docid": "20e1df986157da9a86f608a1e1fd977e",
"text": "Every day researchers from all over the world have to filter the huge mass of existing research papers with the crucial aim of finding out useful publications related to their current work. In this paper we propose a research paper recommending algorithm based on the citation graph and random-walker properties. The PaperRank algorithm is able to assign a preference score to a set of documents contained in a digital library and linked one each other by bibliographic references. A data set of papers extracted by ACM portal has been used for testing and very promising performances have been measured",
"title": ""
},
{
"docid": "eac86562382c4ec9455f1422b6f50e9f",
"text": "In this paper we look at how to sparsify a graph i.e. how to reduce the edgeset while keeping the nodes intact, so as to enable faster graph clustering without sacrificing quality. The main idea behind our approach is to preferentially retain the edges that are likely to be part of the same cluster. We propose to rank edges using a simple similarity-based heuristic that we efficiently compute by comparing the minhash signatures of the nodes incident to the edge. For each node, we select the top few edges to be retained in the sparsified graph. Extensive empirical results on several real networks and using four state-of-the-art graph clustering and community discovery algorithms reveal that our proposed approach realizes excellent speedups (often in the range 10-50), with little or no deterioration in the quality of the resulting clusters. In fact, for at least two of the four clustering algorithms, our sparsification consistently enables higher clustering accuracies.",
"title": ""
}
] | [
{
"docid": "9ec39badc92094783fcaaa28c2eb2f7a",
"text": "In trying to solve multiobjective optimization problems, many traditional methods scalarize the objective vector into a single objective. In those cases, the obtained solution is highly sensitive to the weight vector used in the scalarization process and demands that the user have knowledge about the underlying problem. Moreover, in solving multiobjective problems, designers may be interested in a set of Pareto-optimal points, instead of a single point. Since genetic algorithms (GAs) work with a population of points, it seems natural to use GAs in multiobjective optimization problems to capture a number of solutions simultaneously. Although a vector evaluated GA (VEGA) has been implemented by Schaffer and has been tried to solve a number of multiobjective problems, the algorithm seems to have bias toward some regions. In this paper, we investigate Goldberg's notion of nondominated sorting in GAs along with a niche and speciation method to find multiple Pareto-optimal points simultaneously. The proof-of-principle results obtained on three problems used by Schaffer and others suggest that the proposed method can be extended to higher dimensional and more difficult multiobjective problems. A number of suggestions for extension and application of the algorithm are also discussed.",
"title": ""
},
{
"docid": "b29e373d536b254af56d10348d3afd78",
"text": "The keyterm-based approach is arguably intuitive for users to direct text-clustering processes and adapt results to various applications in text analysis. Its way of markedly influencing the results, for instance, by expressing important terms in relevance order, requires little knowledge of the algorithm and has predictable effect, speeding up the task. This article first presents a text-clustering algorithm that can easily be extended into an interactive algorithm. We evaluate its performance against state-of-the-art clustering algorithms in unsupervised mode. Next, we propose three interactive versions of the algorithm based on keyterm labeling, document labeling, and hybrid labeling. We then demonstrate that keyterm labeling is more effective than document labeling in text clustering. Finally, we propose a visual approach to support the keyterm-based version of the algorithm. Visualizations are provided for the whole collection as well as for detailed views of document and cluster relationships. We show the effectiveness and flexibility of our framework, Vis-Kt, by presenting typical clustering cases on real text document collections. A user study is also reported that reveals overwhelmingly positive acceptance toward keyterm-based clustering.",
"title": ""
},
{
"docid": "7b046793afebf1c722ce3a62da11c534",
"text": "Location Based Social Networks (LBSNs) are new Web 2.0 systems that are attracting new users in exponential rates. LBSNs like Foursquare and Yelp allow users to share their geographic location with friends through smartphones equipped with GPS, search for interesting places as well as posting tips about existing locations. By allowing users to comment on locations, LBSNs increasingly have to deal with new forms of spammers, which aim at advertising unsolicited messages on tips about locations. Spammers may jeopardize the trust of users on the system, thus, compromising its success in promoting location-based social interactions. In spite of that, the available literature is very limited in providing a deep understanding of this problem. In this paper, we investigated the task of identifying different types of tip spam on a popular Brazilian LBSN system, namely Apontador. Based on a labeled collection of tips provided by Apontador as well as crawled information about users and locations, we identified three types of irregular tips, namely Local Marketing, Pollution and, Bad-mouthing. We leveraged our characterization study towards a classification approach able to differentiate these tips with high accuracy.",
"title": ""
},
{
"docid": "121fc3a009e8ce2938f822ba437bdaa3",
"text": "Due to an increased awareness and significant environmental pressures from various stakeholders, companies have begun to realize the significance of incorporating green practices into their daily activities. This paper proposes a framework using Fuzzy TOPSIS to select green suppliers for a Brazilian electronics company; our framework is built on the criteria of green supply chain management (GSCM) practices. An empirical analysis is made, and the data are collected from a set of 12 available suppliers. We use a fuzzy TOPSIS approach to rank the suppliers, and the results of the proposed framework are compared with the ranks obtained by both the geometric mean and the graded mean methods of fuzzy TOPSIS methodology. Then a Spearman rank correlation coefficient is used to find the statistical difference between the ranks obtained by the three methods. Finally, a sensitivity analysis has been performed to examine the influence of the preferences given by the decision makers for the chosen GSCM practices on the selection of green suppliers. Results indicate that the four dominant criteria are Commitment of senior management to GSCM; Product designs that reduce, reuse, recycle, or reclaim materials, components, or energy; Compliance with legal environmental requirements and auditing programs; and Product designs that avoid or reduce toxic or hazardous material use. 2013 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "6f0f6bf051ff36907b3184501cecbf19",
"text": "American divorce rates rose from the 1950s to the 1970s, peaked around 1980, and have fallen ever since. The mean age at marriage also substantially increased after 1970. Using data from the Survey of Income and Program Participation, 1979 National Longitudinal Survey of Youth, and National Survey of Family Growth, I explore the extent to which the rise in age at marriage can explain the rapid decrease in divorce rates for cohorts marrying after 1980. Three different empirical approaches all suggest that the increase in women’s age at marriage was the main proximate cause of the fall in divorce. ∗Email: drotz@mathematica-mpr.com. I would like to thank Roland Fryer, Claudia Goldin, and Larry Katz for continued guidance and support on this project, as well as Timothy Bond, Richard Freeman, Stephanie Hurder, Jeff Liebman, Claudia Olivetti, Amanda Pallais, Laszlo Sandor, Emily Glassberg Sands, Alessandra Voena, Justin Wolfers, and seminar participants at Case Western Reserve University, Harvard University, Mathematica Policy Research, UCLA, University of Arizona, University of Illinois-Chicago, University of Iowa, University of Texas-Austin, and the US Census Bureau for helpful comments and discussions. I am also grateful to Larry Katz and Phillip Levine for providing data on oral contraceptive pill access and abortion rates respectively. All remaining errors are my own. This research has been supported by the NSF-IGERT program, \"Multidisciplinary Program in Inequality and Social Policy\" at Harvard University (Grant No. 0333403). The views expressed herein are those of the author and not necessarily those of Mathematica Policy Research.",
"title": ""
},
{
"docid": "c4fb0699f31c5df1045e60e3272369ab",
"text": "We consider the least-squares regression problem and provide a detailed asymptotic analysis of the performance of averaged constant-step-size stochastic gradient descent. In the strongly-convex case, we provide an asymptotic expansion up to explicit exponentially decaying terms. Our analysis leads to new insights into stochastic approximation algorithms: (a) it gives a tighter bound on the allowed step-size; (b) the generalization error may be divided into a variance term which is decaying as O(1/n), independently of the step-size γ, and a bias term that decays as O(1/γn); (c) when allowing non-uniform sampling of examples over a dataset, the choice of a good sampling density depends on the trade-off between bias and variance: when the variance term dominates, optimal sampling densities do not lead to much gain, while when the bias term dominates, we can choose larger step-sizes that lead to significant improvements.",
"title": ""
},
{
"docid": "6e6bb38507e7188b2ed119b7e8e80838",
"text": "Technologies to measure whole-genome mRNA abundances and methods to organize and display such data are emerging as valuable tools for systems-level exploration of transcriptional regulatory networks. For instance, it has been shown that mRNA data from 118 genes, measured at several time points in the developing hindbrain of mice, can be hierarchically clustered into various patterns (or 'waves') whose members tend to participate in common processes. We have previously shown that hierarchical clustering can group together genes whose cis-regulatory elements are bound by the same proteins in vivo. Hierarchical clustering has also been used to organize genes into hierarchical dendograms on the basis of their expression across multiple growth conditions. The application of Fourier analysis to synchronized yeast mRNA expression data has identified cell-cycle periodic genes, many of which have expected cis-regulatory elements. Here we apply a systematic set of statistical algorithms, based on whole-genome mRNA data, partitional clustering and motif discovery, to identify transcriptional regulatory sub-networks in yeast—without any a priori knowledge of their structure or any assumptions about their dynamics. This approach uncovered new regulons (sets of co-regulated genes) and their putative cis-regulatory elements. We used statistical characterization of known regulons and motifs to derive criteria by which we infer the biological significance of newly discovered regulons and motifs. Our approach holds promise for the rapid elucidation of genetic network architecture in sequenced organisms in which little biology is known.",
"title": ""
},
{
"docid": "321b5e5f05344b25605b289bcc5fab94",
"text": "We revisit a pioneer unsupervised learning technique called archetypal analysis, [5] which is related to successful data analysis methods such as sparse coding [18] and non-negative matrix factorization [19]. Since it was proposed, archetypal analysis did not gain a lot of popularity even though it produces more interpretable models than other alternatives. Because no efficient implementation has ever been made publicly available, its application to important scientific problems may have been severely limited. Our goal is to bring back into favour archetypal analysis. We propose a fast optimization scheme using an active-set strategy, and provide an efficient open-source implementation interfaced with Matlab, R, and Python. Then, we demonstrate the usefulness of archetypal analysis for computer vision tasks, such as codebook learning, signal classification, and large image collection visualization.",
"title": ""
},
{
"docid": "3c733b60b2319c706069d9163cf849d4",
"text": "A novel dual-mode microstrip square loop resonator is proposed using the slow-wave and dispersion features of the microstrip slow-wave open-loop resonator. It is shown that the designed and fabricated dual-mode microstrip filter has a wide stopband including the first spurious resonance frequency. Also, it has a size reduction of about 50% at the same center frequency, as compared with the dual-mode bandpass filters such as microstrip patch, cross-slotted patch, square loop, and ring resonator filter.",
"title": ""
},
{
"docid": "316f7f744db9f8f66c9f4d5b69e7431d",
"text": "We propose automated sport game models as a novel technical means for the analysis of team sport games. The basic idea is that automated sport game models are based on a conceptualization of key notions in such games and probabilistically derived from a set of previous games. In contrast to existing approaches, automated sport game models provide an analysis that is sensitive to their context and go beyond simple statistical aggregations allowing objective, transparent and meaningful concept definitions. Based on automatically gathered spatio-temporal data by a computer vision system, a model hierarchy is built bottom up, where context-sensitive concepts are instantiated by the application of machine learning techniques. We describe the current state of implementation of the ASPOGAMO system including its computer vision subsystem that realizes the idea of automated sport game models. Their usage is exemplified with an analysis of the final of the soccer World Cup 2006.",
"title": ""
},
{
"docid": "16a0329d2b7a6995a48bdef0e845658a",
"text": "Digital market has never been so unstable due to more and more demanding users and new disruptive competitors. CEOs from most of industries investigate digitalization opportunities. Through a Systematic Literature Review, we found that digital transformation is more than just a technological shift. According to this study, these transformations have had an impact on the business models, the operational processes and the end-users experience. Considering the richness of this topic, we had proposed a research agenda of digital transformation in a managerial perspective.",
"title": ""
},
{
"docid": "8ae0e3101adba2373fc44209c6e3b651",
"text": "Many predictive tasks of web applications need to model categorical variables, such as user IDs and demographics like genders and occupations. To apply standard machine learning techniques, these categorical predictors are always converted to a set of binary features via one-hot encoding, making the resultant feature vector highly sparse. To learn from such sparse data effectively, it is crucial to account for the interactions between features.\n Factorization Machines (FMs) are a popular solution for efficiently using the second-order feature interactions. However, FM models feature interactions in a linear way, which can be insufficient for capturing the non-linear and complex inherent structure of real-world data. While deep neural networks have recently been applied to learn non-linear feature interactions in industry, such as the Wide&Deep by Google and DeepCross by Microsoft, the deep structure meanwhile makes them difficult to train.\n In this paper, we propose a novel model Neural Factorization Machine (NFM) for prediction under sparse settings. NFM seamlessly combines the linearity of FM in modelling second-order feature interactions and the non-linearity of neural network in modelling higher-order feature interactions. Conceptually, NFM is more expressive than FM since FM can be seen as a special case of NFM without hidden layers. Empirical results on two regression tasks show that with one hidden layer only, NFM significantly outperforms FM with a 7.3% relative improvement. Compared to the recent deep learning methods Wide&Deep and DeepCross, our NFM uses a shallower structure but offers better performance, being much easier to train and tune in practice.",
"title": ""
},
{
"docid": "f55c50c210079d2a28a0c3fd4f32db9b",
"text": "OBJECTIVE\nMeta-analyses of behavior change (BC) interventions typically find large heterogeneity in effectiveness and small effects. This study aimed to assess the effectiveness of active BC interventions designed to promote physical activity and healthy eating and investigate whether theoretically specified BC techniques improve outcome.\n\n\nDESIGN\nInterventions, evaluated in experimental or quasi-experimental studies, using behavioral and/or cognitive techniques to increase physical activity and healthy eating in adults, were systematically reviewed. Intervention content was reliably classified into 26 BC techniques and the effects of individual techniques, and of a theoretically derived combination of self-regulation techniques, were assessed using meta-regression.\n\n\nMAIN OUTCOME MEASURES\nValid outcomes of physical activity and healthy eating.\n\n\nRESULTS\nThe 122 evaluations (N = 44,747) produced an overall pooled effect size of 0.31 (95% confidence interval = 0.26 to 0.36, I(2) = 69%). The technique, \"self-monitoring,\" explained the greatest amount of among-study heterogeneity (13%). Interventions that combined self-monitoring with at least one other technique derived from control theory were significantly more effective than the other interventions (0.42 vs. 0.26).\n\n\nCONCLUSION\nClassifying interventions according to component techniques and theoretically derived technique combinations and conducting meta-regression enabled identification of effective components of interventions designed to increase physical activity and healthy eating.",
"title": ""
},
{
"docid": "0df681e77b30e9143f7563b847eca5c6",
"text": "BRIDGE bot is a 158 g, 10.7 × 8.9 × 6.5 cm3, magnetic-wheeled robot designed to traverse and inspect steel bridges. Utilizing custom magnetic wheels, the robot is able to securely adhere to the bridge in any orientation. The body platform features flexible, multi-material legs that enable a variety of plane transitions as well as robot shape manipulation. The robot is equipped with a Cortex-M0 processor, inertial sensors, and a modular wireless radio. A camera is included to provide images for detection and evaluation of identified problems. The robot has been demonstrated moving through plane transitions from 45° to 340° as well as over obstacles up to 9.5 mm in height. Preliminary use of sensor feedback to improve plane transitions has also been demonstrated.",
"title": ""
},
{
"docid": "021243b584395d190e191e0713fe4a5c",
"text": "Convolutional neural networks (CNNs) have achieved remarkable performance in a wide range of computer vision tasks, typically at the cost of massive computational complexity. The low speed of these networks may hinder real-time applications especially when computational resources are limited. In this paper, an efficient and effective approach is proposed to accelerate the test-phase computation of CNNs based on low-rank and group sparse tensor decomposition. Specifically, for each convolutional layer, the kernel tensor is decomposed into the sum of a small number of low multilinear rank tensors. Then we replace the original kernel tensors in all layers with the approximate tensors and fine-tune the whole net with respect to the final classification task using standard backpropagation. \\\\ Comprehensive experiments on ILSVRC-12 demonstrate significant reduction in computational complexity, at the cost of negligible loss in accuracy. For the widely used VGG-16 model, our approach obtains a 6.6$\\times$ speed-up on PC and 5.91$\\times$ speed-up on mobile device of the whole network with less than 1\\% increase on top-5 error.",
"title": ""
},
{
"docid": "5a71d766ecd60b8973b965e53ef8ddfd",
"text": "An m-polar fuzzy model is useful for multi-polar information, multi-agent, multi-attribute and multiobject network models which gives more precision, flexibility, and comparability to the system as compared to the classical, fuzzy and bipolar fuzzy models. In this paper, m-polar fuzzy sets are used to introduce the notion of m-polar psi-morphism on product m-polar fuzzy graph (mFG). The action of this morphism is studied and established some results on weak and co-weak isomorphism. d2-degree and total d2-degree of a vertex in product mFG are defined and studied their properties. A real life situation has been modeled as an application of product mFG. c ©2018 World Academic Press, UK. All rights reserved.",
"title": ""
},
{
"docid": "644936acfe1f9ffa0b5f3e8751015d86",
"text": "The use of electromagnetic induction lamps without electrodes has increased because of their long life and energy efficiency. The control of the ignition and luminosity of the lamp is provided by an electronic ballast. Beyond that, the electronic ballast also provides a power factor correction, allowing the minimizing of the lamps impact on the quality of service of the electrical network. The electronic ballast includes several blocks, namely a bridge rectifier, a power factor correcting circuit (PFC), an asymmetric half-bridge inverter with a resonant filter on the inverter output, and a circuit to control the conduction time ot the ballast transistors. Index Terms – SEPIC, PFC, electrodeless lamp, ressonant filter,",
"title": ""
},
{
"docid": "3b26f9c91ee0eb76768403fcb9579003",
"text": "The major task of network embedding is to learn low-dimensional vector representations of social-network nodes. It facilitates many analytical tasks such as link prediction and node clustering and thus has attracted increasing attention. The majority of existing embedding algorithms are designed for unsigned social networks. However, many social media networks have both positive and negative links, for which unsigned algorithms have little utility. Recent findings in signed network analysis suggest that negative links have distinct properties and added value over positive links. This brings about both challenges and opportunities for signed network embedding. In addition, user attributes, which encode properties and interests of users, provide complementary information to network structures and have the potential to improve signed network embedding. Therefore, in this paper, we study the novel problem of signed social network embedding with attributes. We propose a novel framework SNEA, which exploits the network structure and user attributes simultaneously for network representation learning. Experimental results on link prediction and node clustering with real-world datasets demonstrate the effectiveness of SNEA.",
"title": ""
},
{
"docid": "6b5ccfaa3a8d7bbc7ad9325e008bd0a3",
"text": "Although classical first-order logic is the de facto standard logical foundation for artificial intelligence, the lack of a built-in, semantically grounded capability for reasoning under uncertainty renders it inadequate for many important classes of problems. Probability is the bestunderstood and most widely applied formalism for computational scientific reasoning under uncertainty. Increasingly expressive languages are emerging for which the fundamental logical basis is probability. This paper presents Multi-Entity Bayesian Networks (MEBN), a first-order language for specifying probabilistic knowledge bases as parameterized fragments of Bayesian networks. MEBN fragments (MFrags) can be instantiated and combined to form arbitrarily complex graphical probability models. An MFrag represents probabilistic relationships among a conceptually meaningful group of uncertain hypotheses. Thus, MEBN facilitates representation of knowledge at a natural level of granularity. The semantics of MEBN assigns a probability distribution over interpretations of an associated classical first-order theory on a finite or countably infinite domain. Bayesian inference provides both a proof theory for combining prior knowledge with observations, and a learning theory for refining a representation as evidence accrues. A proof is given that MEBN can represent a probability distribution on interpretations of any finitely axiomatizable first-order theory.",
"title": ""
},
{
"docid": "b12984acfb3d48040d0fad8818606355",
"text": "Facial expressions of a person representing similar emotion are not always unique. Naturally, the facial features of a subject taken from different instances of the same emotion have wide variations. In the presence of two or more facial features, the variation of the attributes together makes the emotion recognition problem more complicated. This variation is the main source of uncertainty in the emotion recognition problem, which has been addressed here in two steps using type-2 fuzzy sets. First a type-2 fuzzy face space is constructed with the background knowledge of facial features of different subjects for different emotions. Second, the emotion of an unknown facial expression is determined based on the consensus of the measured facial features with the fuzzy face space. Both interval and general type-2 fuzzy sets (GT2FS) have been used separately to model the fuzzy face space. The interval type-2 fuzzy set (IT2FS) involves primary membership functions for m facial features obtained from n-subjects, each having l-instances of facial expressions for a given emotion. The GT2FS in addition to employing the primary membership functions mentioned above also involves the secondary memberships for individual primary membership curve, which has been obtained here by formulating and solving an optimization problem. The optimization problem here attempts to minimize the difference between two decoded signals: the first one being the type-1 defuzzification of the average primary membership functions obtained from the n-subjects, while the second one refers to the type-2 defuzzified signal for a given primary membership function with secondary memberships as unknown. The uncertainty management policy adopted using GT2FS has resulted in a classification accuracy of 98.333% in comparison to 91.667% obtained by its interval type-2 counterpart. A small improvement (approximately 2.5%) in classification accuracy by IT2FS has been attained by pre-processing measurements using the well-known interval approach.",
"title": ""
}
] | scidocsrr |
693a7765d3d98364d7d8eb154de2f31d | Towards a Unified Natural Language Inference Framework to Evaluate Sentence Representations | [
{
"docid": "e925f5fa3f6a2bdcce3712e2f8e79fe3",
"text": "Events are communicated in natural language with varying degrees of certainty. For example, if you are “hoping for a raise,” it may be somewhat less likely than if you are “expecting” one. To study these distinctions, we present scalable, highquality annotation schemes for event detection and fine-grained factuality assessment. We find that non-experts, with very little training, can reliably provide judgments about what events are mentioned and the extent to which the author thinks they actually happened. We also show how such data enables the development of regression models for fine-grained scalar factuality predictions that outperform strong baselines.",
"title": ""
}
] | [
{
"docid": "61a2b0e51b27f46124a8042d59c0f022",
"text": "We address the highly challenging problem of real-time 3D hand tracking based on a monocular RGB-only sequence. Our tracking method combines a convolutional neural network with a kinematic 3D hand model, such that it generalizes well to unseen data, is robust to occlusions and varying camera viewpoints, and leads to anatomically plausible as well as temporally smooth hand motions. For training our CNN we propose a novel approach for the synthetic generation of training data that is based on a geometrically consistent image-to-image translation network. To be more specific, we use a neural network that translates synthetic images to \"real\" images, such that the so-generated images follow the same statistical distribution as real-world hand images. For training this translation network we combine an adversarial loss and a cycle-consistency loss with a geometric consistency loss in order to preserve geometric properties (such as hand pose) during translation. We demonstrate that our hand tracking system outperforms the current state-of-the-art on challenging RGB-only footage.",
"title": ""
},
{
"docid": "a922051835f239db76be1dbb8edead3e",
"text": "Among the simplest and most intuitively appealing classes of nonprobabilistic classification procedures are those that weight the evidence of nearby sample observations most heavily. More specifically, one might wish to weight the evidence of a neighbor close to an unclassified observation more heavily than the evidence of another neighbor which is at a greater distance from the unclassified observation. One such classification rule is described which makes use of a neighbor weighting function for the purpose of assigning a class to an unclassified sample. The admissibility of such a rule is also considered.",
"title": ""
},
{
"docid": "93a49a164437d3cc266d8e859f2bb265",
"text": "...................................................................................................................................................4",
"title": ""
},
{
"docid": "579536fe3f52f4ed244f06210a9c2cd1",
"text": "OBJECTIVE\nThis review integrates recent advances in attachment theory, affective neuroscience, developmental stress research, and infant psychiatry in order to delineate the developmental precursors of posttraumatic stress disorder.\n\n\nMETHOD\nExisting attachment, stress physiology, trauma, and neuroscience literatures were collected using Index Medicus/Medline and Psychological Abstracts. This converging interdisciplinary data was used as a theoretical base for modelling the effects of early relational trauma on the developing central and autonomic nervous system activities that drive attachment functions.\n\n\nRESULTS\nCurrent trends that integrate neuropsychiatry, infant psychiatry, and clinical psychiatry are generating more powerful models of the early genesis of a predisposition to psychiatric disorders, including PTSD. Data are presented which suggest that traumatic attachments, expressed in episodes of hyperarousal and dissociation, are imprinted into the developing limbic and autonomic nervous systems of the early maturing right brain. These enduring structural changes lead to the inefficient stress coping mechanisms that lie at the core of infant, child, and adult posttraumatic stress disorders.\n\n\nCONCLUSIONS\nDisorganised-disoriented insecure attachment, a pattern common in infants abused in the first 2 years of life, is psychologically manifest as an inability to generate a coherent strategy for coping with relational stress. Early abuse negatively impacts the developmental trajectory of the right brain, dominant for attachment, affect regulation, and stress modulation, thereby setting a template for the coping deficits of both mind and body that characterise PTSD symptomatology. These data suggest that early intervention programs can significantly alter the intergenerational transmission of posttraumatic stress disorders.",
"title": ""
},
{
"docid": "553ec50cb948fb96d96b5481ada71399",
"text": "Enormous amount of online information, available in legal domain, has made legal text processing an important area of research. In this paper, we attempt to survey different text summarization techniques that have taken place in the recent past. We put special emphasis on the issue of legal text summarization, as it is one of the most important areas in legal domain. We start with general introduction to text summarization, briefly touch the recent advances in single and multi-document summarization, and then delve into extraction based legal text summarization. We discuss different datasets and metrics used in summarization and compare performances of different approaches, first in general and then focused to legal text. we also mention highlights of different summarization techniques. We briefly cover a few software tools used in legal text summarization. We finally conclude with some future research directions.",
"title": ""
},
{
"docid": "ec1228f8ddf271e8ec5e7018e45b0e77",
"text": "The present work is focused on the systematization of a process of knowledge acquisition for its use in intelligent management systems. The result was the construction of a computational structure for use inside the institutions (Intranet) as well as out of them (Internet). This structure was called Knowledge Engineering Suite an ontological engineering tool to support the construction of antologies in a collaborative setting and was based on observations made at Semantic Web, UNL (Universal Networking Language) and WorldNet. We use a knowledge representation technique called DCKR to organize knowledge and psychoanalytic studies, focused mainly on Lacan and his language theory to develop a methodology called Engineering of Minds to improve the synchronicity between knowledge engineers and specialist in a particular knowledge domain.",
"title": ""
},
{
"docid": "82af5212b43e8dfe6d54582de621d96c",
"text": "The use of multiple radar configurations can overcome some of the geometrical limitations that exist when obtaining radar images of a target using inverse synthetic aperture radar (ISAR) techniques. It is shown here how a particular bistatic configuration can produce three view angles and three ISAR images simultaneously. A new ISAR signal model is proposed and the applicability of employing existing monostatic ISAR techniques to bistatic configurations is analytically demonstrated. An analysis of the distortion introduced by the bistatic geometry to the ISAR image point spread function (PSF) is then carried out and the limits of the applicability of ISAR techniques (without the introduction of additional signal processing) are found and discussed. Simulations and proof of concept experimental data are also provided that support the theory.",
"title": ""
},
{
"docid": "70789bc929ef7d36f9bb4a02793f38f5",
"text": "Lock managers are among the most studied components in concurrency control and transactional systems. However, one question seems to have been generally overlooked: “When there are multiple lock requests on the same object, which one(s) should be granted first?” Nearly all existing systems rely on a FIFO (first in, first out) strategy to decide which transaction(s) to grant the lock to. In this paper, however, we show that the lock scheduling choices have significant ramifications on the overall performance of a transactional system. Despite the large body of research on job scheduling outside the database context, lock scheduling presents subtle but challenging requirements that render existing results on scheduling inapt for a transactional database. By carefully studying this problem, we present the concept of contention-aware scheduling, show the hardness of the problem, and propose novel lock scheduling algorithms (LDSF and bLDSF), which guarantee a constant factor approximation of the best scheduling. We conduct extensive experiments using a popular database on both TPC-C and a microbenchmark. Compared to FIFO— the default scheduler in most database systems—our bLDSF algorithm yields up to 300x speedup in overall transaction latency. Alternatively, our LDSF algorithm, which is simpler and achieves comparable performance to bLDSF, has already been adopted by open-source community, and was chosen as the default scheduling strategy in MySQL 8.0.3+. PVLDB Reference Format: Boyu Tian, Jiamin Huang, Barzan Mozafari, Grant Schoenebeck. Contention-Aware Lock Scheduling for Transactional Databases. PVLDB, 11 (5): xxxx-yyyy, 2018. DOI: 10.1145/3177732.3177740",
"title": ""
},
{
"docid": "1e69c1aef1b194a27d150e45607abd5a",
"text": "Methods of semantic relatedness are essential for wide range of tasks such as information retrieval and text mining. This paper, concerned with these automated methods, attempts to improve Gloss Vector semantic relatedness measure for more reliable estimation of relatedness between two input concepts. Generally, this measure by considering frequency cut-off for big rams tries to remove low and high frequency words which usually do not end up being significant features. However, this naive cutting approach can lead to loss of valuable information. By employing point wise mutual information (PMI) as a measure of association between features, we will try to enforce the foregoing elimination step in a statistical fashion. Applying both approaches to the biomedical domain, using MEDLINE as corpus, MeSH as thesaurus, and available reference standard of 311 concept pairs manually rated for semantic relatedness, we will show that PMI for removing insignificant features is more effective approach than frequency cut-off.",
"title": ""
},
{
"docid": "68c1aa2e3d476f1f24064ed6f0f07fb7",
"text": "Granuloma annulare is a benign, asymptomatic, self-limited papular eruption found in patients of all ages. The primary skin lesion usually is grouped papules in an enlarging annular shape, with color ranging from flesh-colored to erythematous. The two most common types of granuloma annulare are localized, which typically is found on the lateral or dorsal surfaces of the hands and feet; and disseminated, which is widespread. Localized disease generally is self-limited and resolves within one to two years, whereas disseminated disease lasts longer. Because localized granuloma annulare is self-limited, no treatment other than reassurance may be necessary. There are no well-designed randomized controlled trials of the treatment of granuloma annulare. Treatment recommendations are based on the pathophysiology of the disease, expert opinion, and case reports only. Liquid nitrogen, injected steroids, or topical steroids under occlusion have been recommended for treatment of localized disease. Disseminated granuloma annulare may be treated with one of several systemic therapies such as dapsone, retinoids, niacinamide, antimalarials, psoralen plus ultraviolet A therapy, fumaric acid esters, tacrolimus, and pimecrolimus. Consultation with a dermatologist is recommended because of the possible toxicities of these agents.",
"title": ""
},
{
"docid": "c04171e96f62493fd75cdf379de1c2ab",
"text": "Alarming epidemiological features of Alzheimer's disease impose curative treatment rather than symptomatic relief. Drug repurposing, that is reappraisal of a substance's indications against other diseases, offers time, cost and efficiency benefits in drug development, especially when in silico techniques are used. In this study, we have used gene signatures, where up- and down-regulated gene lists summarize a cell's gene expression perturbation from a drug or disease. To cope with the inherent biological and computational noise, we used an integrative approach on five disease-related microarray data sets of hippocampal origin with three different methods of evaluating differential gene expression and four drug repurposing tools. We found a list of 27 potential anti-Alzheimer agents that were additionally processed with regard to molecular similarity, pathway/ontology enrichment and network analysis. Protein kinase C, histone deacetylase, glycogen synthase kinase 3 and arginase inhibitors appear consistently in the resultant drug list and may exert their pharmacologic action in an epidermal growth factor receptor-mediated subpathway of Alzheimer's disease.",
"title": ""
},
{
"docid": "f0a5d33084588ed4b7fc4905995f91e2",
"text": "A new microstrip dual-band polarization reconfigurable antenna is presented for wireless local area network (WLAN) systems operating at 2.4 and 5.8 GHz. The antenna consists of a square microstrip patch that is aperture coupled to a microstrip line located along the diagonal line of the patch. The dual-band operation is realized by employing the TM10 and TM30 modes of the patch antenna. Four shorting posts are inserted into the patch to adjust the frequency ratio of the two modes. The center of each edge of the patch is connected to ground via a PIN diode for polarization switching. By switching between the different states of PIN diodes, the proposed antenna can radiate either horizontal, vertical, or 45° linear polarization in the two frequency bands. Measured results on reflection coefficients and radiation patterns agree well with numerical simulations.",
"title": ""
},
{
"docid": "a4e92e4dc5d93aec4414bc650436c522",
"text": "Where you can find the compiling with continuations easily? Is it in the book store? On-line book store? are you sure? Keep in mind that you will find the book in this site. This book is very referred for you because it gives not only the experience but also lesson. The lessons are very valuable to serve for you, that's not about who are reading this compiling with continuations book. It is about this book that will give wellness for all people from many societies.",
"title": ""
},
{
"docid": "948e65673f679fe37027f4dc496397f8",
"text": "Online courses are growing at a tremendous rate, and although we have discovered a great deal about teaching and learning in the online environment, there is much left to learn. One variable that needs to be explored further is procrastination in online coursework. In this mixed methods study, quantitative methods were utilized to evaluate the influence of online graduate students’ attributions for academic outcomes to ability, effort, context, and luck on their tendency to procrastinate. Additionally, qualitative methods were utilized to explore students’ attributional beliefs about their tendency to procrastinate in their online coursework. Collectively, results indicated that ability, effort, context, and luck influenced procrastination in this sample of graduate students. A discussion of these findings, implications for instructors, and recommendations for future research ensues. Online course offerings and degree programs have recently increased at a rapid rate and have gained in popularity among students (Allen & Seaman, 2010, 2011). Garrett (2007) reported that half of prospective students surveyed about postsecondary programs expressed a preference for online and hybrid programs, typically because of the flexibility and convenience (Daymont, Blau, & Campbell, 2011). Advances in learning management systems such as Blackboard have facilitated the dramatic increase in asynchronous programs. Although the research literature concerning online learning has blossomed over the past decade, much is left to learn about important variables that impact student learning and achievement. The purpose of this mixed methods study was to better understand the relationship between online graduate students’ attributional beliefs and their tendency to procrastinate. The approach to this objective was twofold. First, quantitative methods were utilized to evaluate the influence of students’ attributions for academic outcomes to ability, effort, context, and luck on their tendency to procrastinate. Second, qualitative methods were utilized to explore students’ attributional beliefs about their tendency to procrastinate in their online coursework. Journal of Interactive Online Learning Rakes, Dunn, and Rakes",
"title": ""
},
{
"docid": "9d1455f0c26812ae7bbf6d0cebd190c2",
"text": "This paper describes the design, construction, and performance analysis of an adjustable Scotch yoke mechanism mimicking the dorsoventral movement for dolphin-like robots. Since dolphins propel themselves by vertical oscillations following a sinusoidal path with alterable amplitudes, a two- motor-driven Scotch yoke mechanism is adopted as the main propulsor to generate sinusoidal oscillations, where leading screw mechanism and rack and pinion mechanism actuated by the minor motor are incorporated to independently change the length of the crank actuated by the major motor. Meanwhile, the output of the Scotch yoke, i.e., reciprocating motion, is converted into the up-and-down oscillation via rack and gear transmission. A motion control scheme based on the novel Scotch yoke is then formed and applied to achieve desired propulsion. Preliminary tests in a robotics context finally confirm the feasibility of the developed mechanism in mechanics and propulsion.",
"title": ""
},
{
"docid": "57233e0b2c7ef60cc505cd23492a2e03",
"text": "In nature, the eastern North American monarch population is known for its southward migration during the late summer/autumn from the northern USA and southern Canada to Mexico, covering thousands of miles. By simplifying and idealizing the migration of monarch butterflies, a new kind of nature-inspired metaheuristic algorithm, called monarch butterfly optimization (MBO), a first of its kind, is proposed in this paper. In MBO, all the monarch butterfly individuals are located in two distinct lands, viz. southern Canada and the northern USA (Land 1) and Mexico (Land 2). Accordingly, the positions of the monarch butterflies are updated in two ways. Firstly, the offsprings are generated (position updating) by migration operator, which can be adjusted by the migration ratio. It is followed by tuning the positions for other butterflies by means of butterfly adjusting operator. In order to keep the population unchanged and minimize fitness evaluations, the sum of the newly generated butterflies in these two ways remains equal to the original population. In order to demonstrate the superior performance of the MBO algorithm, a comparative study with five other metaheuristic algorithms through thirty-eight benchmark problems is carried out. The results clearly exhibit the capability of the MBO method toward finding the enhanced function values on most of the benchmark problems with respect to the other five algorithms. Note that the source codes of the proposed MBO algorithm are publicly available at GitHub ( https://github.com/ggw0122/Monarch-Butterfly-Optimization , C++/MATLAB) and MATLAB Central ( http://www.mathworks.com/matlabcentral/fileexchange/50828-monarch-butterfly-optimization , MATLAB).",
"title": ""
},
{
"docid": "f39d7a353e289e7aa13f060c93a81acd",
"text": "Functional magnetic resonance imaging was used to study brain regions implicated in retrieval of memories that are decades old. To probe autobiographical memory, family photographs were selected by confederates without the participant's involvement, thereby eliminating many of the variables that potentially confounded previous neuroimaging studies. We found that context-rich memories were associated with activity in lingual and precuneus gyri independently of their age. By contrast, retrosplenial cortex was more active for recent events regardless of memory vividness. Hippocampal activation was related to the richness of re-experiencing (vividness) rather than the age of the memory per se. Remote memories were associated with distributed activation along the rostrocaudal axis of the hippocampus whereas activation associated with recent memories was clustered in the anterior portion. This may explain why circumscribed lesions to the hippocampus disproportionately affect recent memories. These findings are incompatible with theories of long-term memory consolidation, and are more easily accommodated by multiple-trace theory, which posits that detailed memories are always dependent on the hippocampus.",
"title": ""
},
{
"docid": "a08e91040414d6bbec156a5ee90d854d",
"text": "MapReduce has emerged as an important paradigm for processing data in large data centers. MapReduce is a three phase algorithm comprising of Map, Shuffle and Reduce phases. Due to its widespread deployment, there have been several recent papers outlining practical schemes to improve the performance of MapReduce systems. All these efforts focus on one of the three phases to obtain performance improvement. In this paper, we consider the problem of jointly scheduling all three phases of the MapReduce process with a view of understanding the theoretical complexity of the joint scheduling and working towards practical heuristics for scheduling the tasks. We give guaranteed approximation algorithms and outline several heuristics to solve the joint scheduling problem.",
"title": ""
},
{
"docid": "dad7dbbb31f0d9d6268bfdc8303d1c9c",
"text": "This letter proposes a reconfigurable microstrip patch antenna with polarization states being switched among linear polarization (LP), left-hand (LH) and right-hand (RH) circular polarizations (CP). The CP waves are excited by two perturbation elements of loop slots in the ground plane. A p-i-n diode is placed on every slot to alter the current direction, which determines the polarization state. The influences of the slots and p-i-n diodes on antenna performance are minimized because the slots and diodes are not on the patch. The simulated and measured results verified the effectiveness of the proposed antenna configuration. The experimental bandwidths of the -10-dB reflection coefficient for LHCP and RHCP are about 60 MHz, while for LP is about 30 MHz. The bandwidths of the 3-dB axial ratio for both CP states are 20 MHz with best value of 0.5 dB at the center frequency on the broadside direction. Gains for two CP operations are 6.4 dB, and that for the LP one is 5.83 dB. This reconfigurable patch antenna with agile polarization has good performance and concise structure, which can be used for 2.4 GHz wireless communication systems.",
"title": ""
},
{
"docid": "4b4ff17023cf54fe552697ef83c83926",
"text": "Artificial intelligence has been an active branch of research for computer scientists and psychologists for 50 years. The concept of mimicking human intelligence in a computer fuels the public imagination and has led to countless academic papers, news articles and fictional works. However, public expectations remain largely unfulfilled, owing to the incredible complexity of everyday human behavior. A wide range of tools and techniques have emerged from the field of artificial intelligence, many of which are reviewed here. They include rules, frames, model-based reasoning, case-based reasoning, Bayesian updating, fuzzy logic, multiagent systems, swarm intelligence, genetic algorithms, neural networks, and hybrids such as blackboard systems. These are all ingenious, practical, and useful in various contexts. Some approaches are pre-specified and structured, while others specify only low-level behavior, leaving the intelligence to emerge through complex interactions. Some approaches are based on the use of knowledge expressed in words and symbols, whereas others use only mathematical and numerical constructions. It is proposed that there exists a spectrum of intelligent behaviors from low-level reactive systems through to high-level systems that encapsulate specialist expertise. Separate branches of research have made strides at both ends of the spectrum, but difficulties remain in devising a system that spans the full spectrum of intelligent behavior, including the difficult areas in the middle that include common sense and perception. Artificial intelligence is increasingly appearing in situated systems that interact with their physical environment. As these systems become more compact they are likely to become embedded into everyday equipment. As the 50th anniversary approaches of the Dartmouth conference where the term ‘artificial intelligence’ was first published, it is concluded that the field is in good shape and has delivered some great results. Yet human thought processes are incredibly complex, and mimicking them convincingly remains an elusive challenge. ADVANCES IN COMPUTERS, VOL. 65 1 Copyright © 2005 Elsevier Inc. ISSN: 0065-2458/DOI 10.1016/S0065-2458(05)65001-2 All rights reserved.",
"title": ""
}
] | scidocsrr |
29a0a7020da68a5c1dc9988ca8da05f8 | A Review of Experiences with Reliable Multicast | [
{
"docid": "383cfad43187d0cca06b4211548e4f5c",
"text": "Research can rarely be performed on large-scale, distributed systems at the level of thousands of workstations. In this paper, we describe the motivating constraints, design principles, and architecture for an extensible, distributed system operating in such an environment. The constraints include continuous operation, dynamic system evolution, and integration with extant systems. The Information Bus, our solution, is a novel synthesis of four design principles: core communication protocols have minimal semantics, objects are self-describing, types can be dynamically defined, and communication is anonymous. The current implementation provides both flexibility and high performance, and has been proven in several commercial environments, including integrated circuit fabrication plants and brokerage/trading floors.",
"title": ""
}
] | [
{
"docid": "4f59e141ffc88aaed620ca58522e8f03",
"text": "Undergraduate volunteers rated a series of words for pleasantness while hearing a particular background music. The subjects in Experiment 1 received, immediately or after a 48-h delay, an unexpected word-recall test in one of the following musical cue contexts: same cue (S), different cue (D), or no cue (N). For immediate recall, context dependency (S-D) was significant but same-cue facilitation (S-N) was not. No cue effects at all were found for delayed recall, and there was a significant interaction between cue and retention interval. A similar interaction was also found in Experiment 3, which was designed to rule out an alternative explanation with respect to distraction. When the different musical selection was changed specifically in either tempo or form (genre), only pieces having an altered tempo produced significantly lower immediate recall compared with the same pieces (Experiment 2). The results support a stimulus generalization view of music-dependent memory.",
"title": ""
},
{
"docid": "dfe502f728d76f9b4294f725eca78413",
"text": "SUMMARY This paper reports work being carried out under the AMODEUS project (BRA 3066). The goal of the project is to develop interdisciplinary approaches to studying human-computer interaction and to move towards applying the results to the practicalities of design. This paper describes one of the approaches the project is taking to represent design-Design Space Analysis. One of its goals is help us bridge from relatively theoretical concerns to the practicalities of design. Design Space Analysis is a central component of a framework for representing the design rationale for designed artifacts. Our current work focusses more specifically on the design of user interfaces. A Design Space Analysis is represented using the QOC notation, which consists of Questions identifying key design issues, Options providing possible answers to the Questions, and Criteria for assessing and comparing the Options. In this paper we give an overview of our approach, some examples of the research issues we are currently tackling and an illustration of its role in helping to integrate the work of some of our project partners with design considerations.",
"title": ""
},
{
"docid": "1384f95f0f66e64af28e91f8c99a12e8",
"text": "Nature-inspired computing has been a hot topic in scientific and engineering fields in recent years. Inspired by the shallow water wave theory, the paper presents a novel metaheuristic method, named water wave optimization (WWO), for global optimization problems. We show how the beautiful phenomena of water waves, such as propagation, refraction, and breaking, can be used to derive effective mechanisms for searching in a high-dimensional solution space. In general, the algorithmic framework of WWO is simple, and easy to implement with a small-size population and only a few control parameters. We have tested WWO on a diverse set of benchmark problems, and applied WWO to a real-world high-speed train scheduling problem in China. The computational results demonstrate that WWO is very competitive with state-of-the-art evolutionary algorithms including invasive weed optimization (IWO), biogeography-based optimization (BBO), bat algorithm (BA), etc. The new metaheuristic is expected to have wide applications in real-world engineering optimization problems. & 2014 Elsevier Ltd. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-SA license (http://creativecommons.org/licenses/by-nc-sa/3.0/).",
"title": ""
},
{
"docid": "ba72cbe165b4dc5855498f4dc5c0eb71",
"text": "Meta-heuristic algorithms prove to be competent in outperforming deterministic algorithms for real-world optimization problems. Firefly algorithm is one such recently developed algorithm inspired by the flashing behavior of fireflies. In this work, a detailed formulation and explanation of the Firefly algorithm implementation is given. Later Firefly algorithm is verified using six unimodal engineering optimization problems reported in the specialized literature.",
"title": ""
},
{
"docid": "1eee6741c5f303763a45fccf2aebe776",
"text": "This report summarizes a variety of the most useful and commonly applied methods for obtaining Dempster-Shafer structures, and their mathematical kin probability boxes, from empirical information or theoretical knowledge. The report includes a review of the aggregation methods for handling agreement and conflict when multiple such objects are obtained from different sources. * The work described in this report was performed for Sandia National Laboratories under Contract No. 19094",
"title": ""
},
{
"docid": "90acc4ae44da11db8fbcae5cfa70bf10",
"text": "Capsules as well as dynamic routing between them are most recently proposed structures for deep neural networks. A capsule groups data into vectors or matrices as poses rather than conventional scalars to represent specific properties of target instance. Besides of pose, a capsule should be attached with a probability (often denoted as activation) for its presence. The dynamic routing helps capsules achieve more generalization capacity with many fewer model parameters. However, the bottleneck that prevents widespread applications of capsule is the expense of computation during routing. To address this problem, we generalize existing routing methods within the framework of weighted kernel density estimation, and propose two fast routing methods with different optimization strategies. Our methods prompt the time efficiency of routing by nearly 40% with negligible performance degradation. By stacking a hybrid of convolutional layers and capsule layers, we construct a network architecture to handle inputs at a resolution of 64× 64 pixels. The proposed models achieve a parallel performance with other leading methods in multiple benchmarks.",
"title": ""
},
{
"docid": "71404f5500b0e173c91ac1abdf5d1c88",
"text": "Understanding the navigational behavior of website visitors is a significant factor of success in the emerging business models of electronic commerce and even mobile commerce. In this paper, we describe the different approaches of mining web navigation pattern.",
"title": ""
},
{
"docid": "15f2aca611a24b4932e70b472a8ec7e3",
"text": "Hashing is critical for high performance computer architecture. Hashing is used extensively in hardware applications, such as page tables, for address translation. Bit extraction and exclusive ORing hashing “methods” are two commonly used hashing functions for hardware applications. There is no study of the performance of these functions and no mention anywhere of the practical performance of the hashing functions in comparison with the theoretical performance prediction of hashing schemes. In this paper, we show that, by choosing hashing functions at random from a particular class, called H3, of hashing functions, the analytical performance of hashing can be achieved in practice on real-life data. Our results about the expected worst case performance of hashing are of special significance, as they provide evidence for earlier theoretical predictions. Index Terms —Hashing in hardware, high performance computer architecture, page address translation, signature functions, high speed information storage and retrieval.",
"title": ""
},
{
"docid": "736b98a5b6a86db837362ab2c7086484",
"text": "This is an in-vitro pilot study which established the effect of radiofrequency radiation (RFR) from 2.4 GHz laptop antenna on human semen. Ten samples of the semen, collected from donors between the ages of 20 and 30 years were exposed when the source of the RFR was in active mode. Sequel to the exposure, both the exposed samples and another ten unexposed samples from same donors were analysed for sperm concentration, motility and morphology grading. A test of significance between results of these semen parameters using Mann-Whitney Utest at 0.05 level of significance showed a significant effect of RFR exposure on the semen parameters considered.",
"title": ""
},
{
"docid": "a520bf66f1b54a7444f2cbe3f2da8000",
"text": "In this work we study the problem of Intrusion Detection is sensor networks and we propose a lightweight scheme that can be applied to such networks. Its basic characteristic is that nodes monitor their neighborhood and collaborate with their nearest neighbors to bring the network back to its normal operational condition. We emphasize in a distributed approach in which, even though nodes don’t have a global view, they can still detect an intrusion and produce an alert. We apply our design principles for the blackhole and selective forwarding attacks by defining appropriate rules that characterize malicious behavior. We also experimentally evaluate our scheme to demonstrate its effectiveness in detecting the afore-mentioned attacks.",
"title": ""
},
{
"docid": "95306b34302c35b3c38fd5141e472896",
"text": "We used the machine learning technique of Li et al. (PRL 114, 2015) for molecular dynamics simulations. Atomic configurations were described by feature matrix based on internal vectors, and linear regression was used as a learning technique. We implemented this approach in the LAMMPS code. The method was applied to crystalline and liquid aluminum and uranium at different temperatures and densities, and showed the highest accuracy among different published potentials. Phonon density of states, entropy and melting temperature of aluminum were calculated using this machine learning potential. The results are in excellent agreement with experimental data and results of full ab initio calculations.",
"title": ""
},
{
"docid": "3e28cbfc53f6c42bb0de2baf5c1544aa",
"text": "Cloud computing is an emerging paradigm which allows the on-demand delivering of software, hardware, and data as services. As cloud-based services are more numerous and dynamic, the development of efficient service provisioning policies become increasingly challenging. Game theoretic approaches have shown to gain a thorough analytical understanding of the service provisioning problem.\n In this paper we take the perspective of Software as a Service (SaaS) providers which host their applications at an Infrastructure as a Service (IaaS) provider. Each SaaS needs to comply with quality of service requirements, specified in Service Level Agreement (SLA) contracts with the end-users, which determine the revenues and penalties on the basis of the achieved performance level. SaaS providers want to maximize their revenues from SLAs, while minimizing the cost of use of resources supplied by the IaaS provider. Moreover, SaaS providers compete and bid for the use of infrastructural resources. On the other hand, the IaaS wants to maximize the revenues obtained providing virtualized resources. In this paper we model the service provisioning problem as a Generalized Nash game, and we propose an efficient algorithm for the run time management and allocation of IaaS resources to competing SaaSs.",
"title": ""
},
{
"docid": "13a06fb1a1bdf0df0043fe10f74443e1",
"text": "Coping with the extreme growth of the number of users is one of the main challenges for the future IEEE 802.11 networks. The high interference level, along with the conventional standardized carrier sensing approaches, will degrade the network performance. To tackle these challenges, the Dynamic Sensitivity Control (DSC) and the BSS Color scheme are considered in IEEE 802.11ax and IEEE 802.11ah, respectively. The main purpose of these schemes is to enhance the network throughput and improve the spectrum efficiency in dense networks. In this paper, we evaluate the DSC and the BSS Color scheme along with the PARTIAL-AID (PAID) feature introduced in IEEE 802.11ac, in terms of throughput and fairness. We also, exploit the performance when the aforementioned techniques are combined. The simulations show a significant gain in total throughput when these techniques are applied.",
"title": ""
},
{
"docid": "63429f5eebc2434660b0073b802127c2",
"text": "Body Area Networks are unique in that the large-scale mobility of users allows the network itself to travel across a diverse range of operating domains or even to enter new and unknown environments. This network mobility is unlike node mobility in that sensed changes in inter-network interference level may be used to identify opportunities for intelligent inter-networking, for example, by merging or splitting from other networks, thus providing an extra degree of freedom. This paper introduces the concept of context-aware bodynets for interactive environments using inter-network interference sensing. New ideas are explored at both the physical and link layers with an investigation based on a 'smart' office environment. A series of carefully controlled measurements of the mesh interconnectivity both within and between an ambulatory body area network and a stationary desk-based network were performed using 2.45 GHz nodes. Received signal strength and carrier to interference ratio time series for selected node to node links are presented. The results provide an insight into the potential interference between the mobile and static networks and highlight the possibility for automatic identification of network merging and splitting opportunities.",
"title": ""
},
{
"docid": "b34eb302108ffd515ed9fc896fa7015f",
"text": "Recent magnetoencephalography (MEG) and functional magnetic resonance imaging studies of human auditory cortex are pointing to brain areas on lateral Heschl's gyrus as the 'pitch-processing center'. Here we describe results of a combined MEG-psychophysical study designed to investigate the timing of the formation of the percept of pitch and the generality of the hypothesized 'pitch-center'. We compared the cortical and behavioral responses to Huggins pitch (HP), a stimulus requiring binaural processing to elicit a pitch percept, with responses to tones embedded in noise (TN)-perceptually similar but physically very different signals. The stimuli were crafted to separate the electrophysiological responses to onset of the pitch percept from the onset of the initial stimulus. Our results demonstrate that responses to monaural pitch stimuli are affected by cross-correlational processes in the binaural pathway. Additionally, we show that MEG illuminates processes not simply observable in behavior. Crucially, the MEG data show that, although physically disparate, both HP and TN are mapped onto similar representations by 150 ms post-onset, and provide critical new evidence that the 'pitch onset response' reflects central pitch mechanisms, in agreement with models postulating a single, central pitch extractor.",
"title": ""
},
{
"docid": "e4f31c3e7da3ad547db5fed522774f0e",
"text": "Surface reconstruction from oriented points can be cast as a spatial Poisson problem. This Poisson formulation considers all the points at once, without resorting to heuristic spatial partitioning or blending, and is therefore highly resilient to data noise. Unlike radial basis function schemes, the Poisson approach allows a hierarchy of locally supported basis functions, and therefore the solution reduces to a well conditioned sparse linear system. To reconstruct detailed models in limited memory, we solve this Poisson formulation efficiently using a streaming framework. Specifically, we introduce a multilevel streaming representation, which enables efficient traversal of a sparse octree by concurrently advancing through multiple streams, one per octree level. Remarkably, for our reconstruction application, a sufficiently accurate solution to the global linear system is obtained using a single iteration of cascadic multigrid, which can be evaluated within a single multi-stream pass. Finally, we explore the application of Poisson reconstruction to the setting of multi-view stereo, to reconstruct detailed 3D models of outdoor scenes from collections of Internet images.\n This is joint work with Michael Kazhdan, Matthew Bolitho, and Randal Burns (Johns Hopkins University), and Michael Goesele, Noah Snavely, Brian Curless, and Steve Seitz (University of Washington).",
"title": ""
},
{
"docid": "30aaf753d3ec72f07d4838de391524ca",
"text": "The present study was aimed to determine the effect on liver, associated oxidative stress, trace element and vitamin alteration in dogs with sarcoptic mange. A total of 24 dogs with clinically established diagnosis of sarcoptic mange, divided into two groups, severely infested group (n=9) and mild/moderately infested group (n=15), according to the extent of skin lesions caused by sarcoptic mange and 6 dogs as control group were included in the present study. In comparison to healthy control hemoglobin, PCV, and TEC were significantly (P<0.05) decreased in dogs with sarcoptic mange however, significant increase in TLC along with neutrophilia and lymphopenia was observed only in severely infested dogs. The albumin, glucose and cholesterol were significantly (P<0.05) decreased and globulin, ALT, AST and bilirubin were significantly (P<0.05) increased in severely infested dogs when compared to other two groups. Malondialdehyde (MDA) levels were significantly (P<0.01) higher in dogs with sarcoptic mange, with levels highest in severely infested groups. Activity of superoxide dismutase (SOD) (P<0.05) and catalase were significantly (P<0.01) lower in sarcoptic infested dogs when compared with the healthy control group. Zinc and copper levels in dogs with sarcoptic mange were significantly (P<0.05) lower when compared with healthy control group with the levels lowest in severely infested group. Vitamin A and vitamin C levels were significantly (P<0.05) lower in sarcoptic infested dogs when compared to healthy control. From the present study, it was concluded that sarcoptic mange in dogs affects the liver and the infestation is associated with oxidant/anti-oxidant imbalance, significant alteration in trace elements and vitamins.",
"title": ""
},
{
"docid": "41da3bc399664e62b4e07006893cdd50",
"text": "Cloud storage service is one of cloud services where cloud service provider can provide storage space to customers. Because cloud storage service has many advantages which include convenience, high computation and capacity, it attracts the user to outsource data in the cloud. However, the user outsources data directly in cloud storage service that is unsafe when outsourcing data is sensitive for the user. Therefore, ciphertext-policy attribute-based encryption is a promising cryptographic solution in cloud environment, which can be drawn up for access control by the data owner to define access policy. Unfortunately, an outsourced architecture applied with the attribute-based encryption introduces many challenges in which one of the challenges is revocation. The issue is a threat to data security in the data owner. In this paper, we survey related studies in cloud data storage with revocation and define their requirements. Then we explain and analyze four representative approaches. Finally, we provide some topics for future research",
"title": ""
},
{
"docid": "eba25ae59603328f3ef84c0994d46472",
"text": "We address the problem of how to personalize educational content to students in order to maximize their learning gains over time. We present a new computational approach to this problem called MAPLE (Multi-Armed Bandits based Personalization for Learning Environments) that combines difficulty ranking with multi-armed bandits. Given a set of target questions MAPLE estimates the expected learning gains for each question and uses an exploration-exploitation strategy to choose the next question to pose to the student. It maintains a personalized ranking over the difficulties of question in the target set and updates it in real-time according to students’ progress. We show in simulations that MAPLE was able to improve students’ learning gains compared to approaches that sequence questions in increasing level of difficulty, or rely on content experts. When implemented in a live e-learning system in the wild, MAPLE showed promising initial results.",
"title": ""
},
{
"docid": "dd9ff422ede7f5df297fa29fdef49db3",
"text": "Courts have articulated a number of legal tests to distinguish corporate transactions that have a legitimate business or economic purpose from those carried out largely, if not solely, for favorable tax treatment. We outline an approach to analyzing the economic substance of corporate transactions based on the property rights theory of the firm and describe its application in two recent tax cases.",
"title": ""
}
] | scidocsrr |
3c446b49ef831b5440cd70aeec16bf2a | QoE Doctor: Diagnosing Mobile App QoE with Automated UI Control and Cross-layer Analysis | [
{
"docid": "5af83f822ac3d9379c7b477ff1d32a97",
"text": "Sprout is an end-to-end transport protocol for interactive applications that desire high throughput and low delay. Sprout works well over cellular wireless networks, where link speeds change dramatically with time, and current protocols build up multi-second queues in network gateways. Sprout does not use TCP-style reactive congestion control; instead the receiver observes the packet arrival times to infer the uncertain dynamics of the network path. This inference is used to forecast how many bytes may be sent by the sender, while bounding the risk that packets will be delayed inside the network for too long. In evaluations on traces from four commercial LTE and 3G networks, Sprout, compared with Skype, reduced self-inflicted end-to-end delay by a factor of 7.9 and achieved 2.2× the transmitted bit rate on average. Compared with Google’s Hangout, Sprout reduced delay by a factor of 7.2 while achieving 4.4× the bit rate, and compared with Apple’s Facetime, Sprout reduced delay by a factor of 8.7 with 1.9× the bit rate. Although it is end-to-end, Sprout matched or outperformed TCP Cubic running over the CoDel active queue management algorithm, which requires changes to cellular carrier equipment to deploy. We also tested Sprout as a tunnel to carry competing interactive and bulk traffic (Skype and TCP Cubic), and found that Sprout was able to isolate client application flows from one another.",
"title": ""
},
{
"docid": "74227709f4832c3978a21abb9449203b",
"text": "Mobile consumer-electronics devices, especially phones, are powered from batteries which are limited in size and therefore capacity. This implies that managing energy well is paramount in such devices. Good energy management requires a good understanding of where and how the energy is used. To this end we present a detailed analysis of the power consumption of a recent mobile phone, the Openmoko Neo Freerunner. We measure not only overall system power, but the exact breakdown of power consumption by the device’s main hardware components. We present this power breakdown for micro-benchmarks as well as for a number of realistic usage scenarios. These results are validated by overall power measurements of two other devices: the HTC Dream and Google Nexus One. We develop a power model of the Freerunner device and analyse the energy usage and battery lifetime under a number of usage patterns. We discuss the significance of the power drawn by various components, and identify the most promising areas to focus on for further improvements of power management. We also analyse the energy impact of dynamic voltage and frequency scaling of the device’s application processor.",
"title": ""
},
{
"docid": "e4ade1f0baea7c50d0dff4470bbbfcd9",
"text": "Ad networks for mobile apps require inspection of the visual layout of their ads to detect certain types of placement frauds. Doing this manually is error prone, and does not scale to the sizes of today’s app stores. In this paper, we design a system called DECAF to automatically discover various placement frauds scalably and effectively. DECAF uses automated app navigation, together with optimizations to scan through a large number of visual elements within a limited time. It also includes a framework for efficiently detecting whether ads within an app violate an extensible set of rules that govern ad placement and display. We have implemented DECAF for Windows-based mobile platforms, and applied it to 1,150 tablet apps and 50,000 phone apps in order to characterize the prevalence of ad frauds. DECAF has been used by the ad fraud team in Microsoft and has helped find many instances of ad frauds.",
"title": ""
}
] | [
{
"docid": "5f516d2453d976d015ae28149892af43",
"text": "This two-part study integrates a quantitative review of one year of US newspaper coverage of climate science with a qualitative, comparative analysis of media-created themes and frames using a social constructivist approach. In addition to an examination of newspaper articles, this paper includes a reflexive comparison with attendant wire stories and scientific texts. Special attention is given to articles constructed with and framed by rhetoric emphasising uncertainty, controversy, and climate scepticism. r 2005 Elsevier Ltd. All rights reserved.",
"title": ""
},
{
"docid": "d993c297753e963aab55718c556783ea",
"text": "Customer relationship management (CRM) initiatives have gained much attention in recent years. With the aid of data mining technology, businesses can formulate specific strategies for different customer bases more precisely. Additionally, personalisation is another important issue in CRM - especially when a company has a huge product range. This paper presents a case model and investigates the use of computational intelligent techniques for CRM. These techniques allow the complex functions of relating customer behaviour to internal business processes to be learned more easily and the industry expertise and experience from business managers to be integrated into the modelling framework directly. Hence, they can be used in the CRM framework to enhance the creation of targeted strategies for specific customer bases.",
"title": ""
},
{
"docid": "83d330486c50fe2ae1d6960a4933f546",
"text": "In this paper, an upgraded version of vehicle tracking system is developed for inland vessels. In addition to the features available in traditional VTS (Vehicle Tracking System) for automobiles, it has the capability of remote monitoring of the vessel's motion and orientation. Furthermore, this device can detect capsize events and other accidents by motion tracking and instantly notify the authority and/or the owner with current coordinates of the vessel, which is obtained using the Global Positioning System (GPS). This can certainly boost up the rescue process and minimize losses. We have used GSM network for the communication between the device installed in the ship and the ground control. So, this can be implemented only in the inland vessels. But using iridium satellite communication instead of GSM will enable the device to be used in any sea-going ships. At last, a model of an integrated inland waterway control system (IIWCS) based on this device is discussed.",
"title": ""
},
{
"docid": "d0603a92425308bec8c53551d018accc",
"text": "It is a significant challenge to classify images with multiple labels by using only a small number of labeled samples. One option is to learn a binary classifier for each label and use manifold regularization to improve the classification performance by exploring the underlying geometric structure of the data distribution. However, such an approach does not perform well in practice when images from multiple concepts are represented by high-dimensional visual features. Thus, manifold regularization is insufficient to control the model complexity. In this paper, we propose a manifold regularized multitask learning (MRMTL) algorithm. MRMTL learns a discriminative subspace shared by multiple classification tasks by exploiting the common structure of these tasks. It effectively controls the model complexity because different tasks limit one another's search volume, and the manifold regularization ensures that the functions in the shared hypothesis space are smooth along the data manifold. We conduct extensive experiments, on the PASCAL VOC'07 dataset with 20 classes and the MIR dataset with 38 classes, by comparing MRMTL with popular image classification algorithms. The results suggest that MRMTL is effective for image classification.",
"title": ""
},
{
"docid": "4aed0c391351671ccb5297b2fe9d4891",
"text": "Applying evolution to generate simple agent behaviours has become a successful and heavily used practice. However the notion of scaling up behaviour into something more noteworthy and complex is far from elementary. In this paper we propose a method of combining neuroevolution practices with the subsumption paradigm; in which we generate Artificial Neural Network (ANN) layers ordered in a hierarchy such that high-level controllers can override lower behaviours. To explore this proposal we apply our controllers to the dasiaEvoTankspsila domain; a small, dynamic, adversarial environment. Our results show that once layers are evolved we can generate competent and capable results that can deal with hierarchies of multiple layers. Further analysis of results provides interesting insights into design decisions for such controllers, particularly when compared to the original suggestions for the subsumption paradigm.",
"title": ""
},
{
"docid": "5694ebf4c1f1e0bf65dd7401d35726ed",
"text": "Data collection is not a big issue anymore with available honeypot software and setups. However malware collections gathered from these honeypot systems often suffer from massive sample counts, data analysis systems like sandboxes cannot cope with. Sophisticated self-modifying malware is able to generate new polymorphic instances of itself with different message digest sums for each infection attempt, thus resulting in many different samples stored for the same specimen. Scaling analysis systems that are fed by databases that rely on sample uniqueness based on message digests is only feasible to a certain extent. In this paper we introduce a non cryptographic, fast to calculate hash function for binaries in the Portable Executable format that transforms structural information about a sample into a hash value. Grouping binaries by hash values calculated with the new function allows for detection of multiple instances of the same polymorphic specimen as well as samples that are broken e.g. due to transfer errors. Practical evaluation on different malware sets shows that the new function allows for a significant reduction of sample counts.",
"title": ""
},
{
"docid": "b4e3d746969860c7a3946487a2609a03",
"text": "People tracking is a key technology for autonomous systems, intelligent cars and social robots operating in populated environments. What makes the task di fficult is that the appearance of humans in range data can change drastically as a function of body pose, distance to the sensor, self-occlusion and occlusion by other objects. In this paper we propose a novel approach to pedestrian detection in 3D range data based on supervised learning techniques to create a bank of classifiers for different height levels of the human body. In particular, our approach applies AdaBoost to train a strong classifier from geometrical and statistical features of groups of neighboring points at the same height. In a second step, the AdaBoost classifiers mutually enforce their evidence across di fferent heights by voting into a continuous space. Pedestrians are finally found efficiently by mean-shift search for local maxima in the voting space. Experimental results carried out with 3D laser range data illustrate the robustness and e fficiency of our approach even in cluttered urban environments. The learned people detector reaches a classification rate up to 96% from a single 3D scan.",
"title": ""
},
{
"docid": "85d31f3940ee258589615661e596211d",
"text": "Bulk Synchronous Parallelism (BSP) provides a good model for parallel processing of many large-scale graph applications, however it is unsuitable/inefficient for graph applications that require coordination, such as graph-coloring, subcoloring, and clustering. To address this problem, we present an efficient modification to the BSP model to implement serializability (sequential consistency) without reducing the highlyparallel nature of BSP. Our modification bypasses the message queues in BSP and reads directly from the worker’s memory for the internal vertex executions. To ensure serializability, coordination is performed— implemented via dining philosophers or token ring— only for border vertices partitioned across workers. We implement our modifications to BSP on Giraph, an open-source clone of Google’s Pregel. We show through a graph-coloring application that our modified framework, Giraphx, provides much better performance than implementing the application using dining-philosophers over Giraph. In fact, Giraphx outperforms Giraph even for embarrassingly parallel applications that do not require coordination, e.g., PageRank.",
"title": ""
},
{
"docid": "20beb90c2f2024b3976a2ee0c95059c6",
"text": "In this paper, the robust trajectory tracking design of uncertain nonlinear systems is investigated by virtue of a self-learning optimal control formulation. The primary novelty lies in that an effective learning based robust tracking control strategy is developed for nonlinear systems under a general uncertain environment. The augmented system construction is performed by combining the tracking error with the reference trajectory. Then, an improved adaptive critic technique, which does not depend on the initial stabilizing controller, is employed to solve the Hamilton–Jacobi–Bellman (HJB) equation with respect to the nominal augmented system. Using the obtained control law, the closed-loop form of the augmented system is built with stability proof. Moreover, the robust trajectory tracking performance is guaranteed via Lyapunov approach in theory and then through simulation demonstration, where an application to a practical spring–mass–damper system is included.",
"title": ""
},
{
"docid": "94c7fde13a5792a89b7575ac41827f1c",
"text": "The noise sensitivities of nine different QRS detection algorithms were measured for a normal, single-channel, lead-II, synthesized ECG corrupted with five different types of synthesized noise: electromyographic interference, 60-Hz power line interference, baseline drift due to respiration, abrupt baseline shift, and a composite noise constructed from all of the other noise types. The percentage of QRS complexes detected, the number of false positives, and the detection delay were measured. None of the algorithms were able to detect all QRS complexes without any false positives for all of the noise types at the highest noise level. Algorithms based on amplitude and slope had the highest performance for EMG-corrupted ECG. An algorithm using a digital filter had the best performance for the composite-noise-corrupted data.<<ETX>>",
"title": ""
},
{
"docid": "17d1439650efccf83390834ba933db1a",
"text": "The arterial vascularization of the pineal gland (PG) remains a debatable subject. This study aims to provide detailed information about the arterial vascularization of the PG. Thirty adult human brains were obtained from routine autopsies. Cerebral arteries were separately cannulated and injected with colored latex. The dissections were carried out using a surgical microscope. The diameters of the branches supplying the PG at their origin and vascularization areas of the branches of the arteries were investigated. The main artery of the PG was the lateral pineal artery, and it originated from the posterior circulation. The other arteries included the medial pineal artery from the posterior circulation and the rostral pineal artery mainly from the anterior circulation. Posteromedial choroidal artery was an important artery that branched to the PG. The arterial supply to the PG was studied comprehensively considering the debate and inadequacy of previously published studies on this issue available in the literature. This anatomical knowledge may be helpful for surgical treatment of pathologies of the PG, especially in children who develop more pathology in this region than adults.",
"title": ""
},
{
"docid": "5eb03beba0ac2c94e6856d16e90799fc",
"text": "The explosive growth of malware variants poses a major threat to information security. Traditional anti-virus systems based on signatures fail to classify unknown malware into their corresponding families and to detect new kinds of malware programs. Therefore, we propose a machine learning based malware analysis system, which is composed of three modules: data processing, decision making, and new malware detection. The data processing module deals with gray-scale images, Opcode n-gram, and import functions, which are employed to extract the features of the malware. The decision-making module uses the features to classify the malware and to identify suspicious malware. Finally, the detection module uses the shared nearest neighbor (SNN) clustering algorithm to discover new malware families. Our approach is evaluated on more than 20 000 malware instances, which were collected by Kingsoft, ESET NOD32, and Anubis. The results show that our system can effectively classify the unknown malware with a best accuracy of 98.9%, and successfully detects 86.7% of the new malware.",
"title": ""
},
{
"docid": "66e00cb4593c1bc97a10e0b80dcd6a8f",
"text": "OBJECTIVE\nTo determine the probable factors responsible for stress among undergraduate medical students.\n\n\nMETHODS\nThe qualitative descriptive study was conducted at a public-sector medical college in Islamabad, Pakistan, from January to April 2014. Self-administered open-ended questionnaires were used to collect data from first year medical students in order to study the factors associated with the new environment.\n\n\nRESULTS\nThere were 115 students in the study with a mean age of 19±6.76 years. Overall, 35(30.4%) students had mild to moderate physical problems, 20(17.4%) had severe physical problems and 60(52.2%) did not have any physical problem. Average stress score was 19.6±6.76. Major elements responsible for stress identified were environmental factors, new college environment, student abuse, tough study routines and personal factors.\n\n\nCONCLUSIONS\nMajority of undergraduate students experienced stress due to both academic and emotional factors.",
"title": ""
},
{
"docid": "0251f38f48c470e2e04fb14fc7ba34b2",
"text": "The fast development of Internet of Things (IoT) and cyber-physical systems (CPS) has triggered a large demand of smart devices which are loaded with sensors collecting information from their surroundings, processing it and relaying it to remote locations for further analysis. The wide deployment of IoT devices and the pressure of time to market of device development have raised security and privacy concerns. In order to help better understand the security vulnerabilities of existing IoT devices and promote the development of low-cost IoT security methods, in this paper, we use both commercial and industrial IoT devices as examples from which the security of hardware, software, and networks are analyzed and backdoors are identified. A detailed security analysis procedure will be elaborated on a home automation system and a smart meter proving that security vulnerabilities are a common problem for most devices. Security solutions and mitigation methods will also be discussed to help IoT manufacturers secure their products.",
"title": ""
},
{
"docid": "2a9d399edc3c2dcc153d966760f38d80",
"text": "Asynchronous parallel implementations of stochastic gradient (SG) have been broadly used in solving deep neural network and received many successes in practice recently. However, existing theories cannot explain their convergence and speedup properties, mainly due to the nonconvexity of most deep learning formulations and the asynchronous parallel mechanism. To fill the gaps in theory and provide theoretical supports, this paper studies two asynchronous parallel implementations of SG: one is over a computer network and the other is on a shared memory system. We establish an ergodic convergence rate O(1/ √ K) for both algorithms and prove that the linear speedup is achievable if the number of workers is bounded by √ K (K is the total number of iterations). Our results generalize and improve existing analysis for convex minimization.",
"title": ""
},
{
"docid": "e20d26ce3dea369ae6817139ff243355",
"text": "This article explores the roots of white support for capital punishment in the United States. Our analysis addresses individual-level and contextual factors, paying particular attention to how racial attitudes and racial composition influence white support for capital punishment. Our findings suggest that white support hinges on a range of attitudes wider than prior research has indicated, including social and governmental trust and individualist and authoritarian values. Extending individual-level analyses, we also find that white responses to capital punishment are sensitive to local context. Perhaps most important, our results clarify the impact of race in two ways. First, racial prejudice emerges here as a comparatively strong predictor of white support for the death penalty. Second, black residential proximity functions to polarize white opinion along lines of racial attitude. As the black percentage of county residents rises, so too does the impact of racial prejudice on white support for capital punishment.",
"title": ""
},
{
"docid": "6d396f65f8cb4b7dcd4b502e7b167aca",
"text": "We study cost-sensitive learning of decision trees that incorporate both test costs and misclassification costs. In particular, we first propose a lazy decision tree learning that minimizes the total cost of tests and misclassifications. Then assuming test examples may contain unknown attributes whose values can be obtained at a cost (the test cost), we design several novel test strategies which attempt to minimize the total cost of tests and misclassifications for each test example. We empirically evaluate our treebuilding and various test strategies, and show that they are very effective. Our results can be readily applied to real-world diagnosis tasks, such as medical diagnosis where doctors must try to determine what tests (e.g., blood tests) should be ordered for a patient to minimize the total cost of tests and misclassifications (misdiagnosis). A case study on heart disease is given throughout the paper.",
"title": ""
},
{
"docid": "caac45f02e29295d592ee784697c6210",
"text": "The studies included in this PhD thesis examined the interactions of syphilis, which is caused by Treponema pallidum, and HIV. Syphilis reemerged worldwide in the late 1990s and hereafter increasing rates of early syphilis were also reported in Denmark. The proportion of patients with concurrent HIV has been substantial, ranging from one third to almost two thirds of patients diagnosed with syphilis some years. Given that syphilis facilitates transmission and acquisition of HIV the two sexually transmitted diseases are of major public health concern. Further, syphilis has a negative impact on HIV infection, resulting in increasing viral loads and decreasing CD4 cell counts during syphilis infection. Likewise, HIV has an impact on the clinical course of syphilis; patients with concurrent HIV are thought to be at increased risk of neurological complications and treatment failure. Almost ten per cent of Danish men with syphilis acquired HIV infection within five years after they were diagnosed with syphilis during an 11-year study period. Interestingly, the risk of HIV declined during the later part of the period. Moreover, HIV-infected men had a substantial increased risk of re-infection with syphilis compared to HIV-uninfected men. As one third of the HIV-infected patients had viral loads >1,000 copies/ml, our conclusion supported the initiation of cART in more HIV-infected MSM to reduce HIV transmission. During a five-year study period, including the majority of HIV-infected patients from the Copenhagen area, we observed that syphilis was diagnosed in the primary, secondary, early and late latent stage. These patients were treated with either doxycycline or penicillin and the rate of treatment failure was similar in the two groups, indicating that doxycycline can be used as a treatment alternative - at least in an HIV-infected population. During a four-year study period, the T. pallidum strain type distribution was investigated among patients diagnosed by PCR testing of material from genital lesions. In total, 22 strain types were identified. HIV-infected patients were diagnosed with nine different strains types and a difference by HIV status was not observed indicating that HIV-infected patients did not belong to separate sexual networks. In conclusion, concurrent HIV remains common in patients diagnosed with syphilis in Denmark, both in those diagnosed by serological testing and PCR testing. Although the rate of syphilis has stabilized in recent years, a spread to low-risk groups is of concern, especially due to the complex symptomatology of syphilis. However, given the efficient treatment options and the targeted screening of pregnant women and persons at higher risk of syphilis, control of the infection seems within reach. Avoiding new HIV infections is the major challenge and here cART may play a prominent role.",
"title": ""
},
{
"docid": "124d740d3796d6a707100e0d8c384f1f",
"text": "We present Nodeinfo, an unsupervised algorithm for anomaly detection in system logs. We demonstrate Nodeinfo's effectiveness on data from four of the world's most powerful supercomputers: using logs representing over 746 million processor-hours, in which anomalous events called alerts were manually tagged for scoring, we aim to automatically identify the regions of the log containing those alerts. We formalize the alert detection task in these terms, describe how Nodeinfo uses the information entropy of message terms to identify alerts, and present an online version of this algorithm, which is now in production use. This is the first work to investigate alert detection on (several) publicly-available supercomputer system logs, thereby providing a reproducible performance baseline.",
"title": ""
},
{
"docid": "ef208f640807a377c4301fb22cd172cb",
"text": "Providing access to relevant biomedical literature in a clinical setting has the potential to bridge a critical gap in evidence-based medicine. Here, our goal is specifically to provide relevant articles to clinicians to improve their decision-making in diagnosing, treating, and testing patients. To this end, the TREC 2014 Clinical Decision Support Track evaluated a system’s ability to retrieve relevant articles in one of three categories (Diagnosis, Treatment, Test) using an idealized form of a patient medical record . Over 100 submissions from over 25 participants were evaluated on 30 topics, resulting in over 37k relevance judgments. In this article, we provide an overview of the task, a survey of the information retrieval methods employed by the participants, an analysis of the results, and a discussion on the future directions for this challenging yet important task.",
"title": ""
}
] | scidocsrr |
59c00b34ca8e8fa0b9345fff33a7d05d | 3D modelling of leaves from color and ToF data for robotized plant measuring | [
{
"docid": "f9da4bfe6dba0a6ec886758b164cd10b",
"text": "Physically based deformable models have been widely embraced by the Computer Graphics community. Many problems outlined in a previous survey by Gibson and Mirtich [GM97] have been addressed, thereby making these models interesting and useful for both offline and real-time applications, such as motion pictures and video games. In this paper, we present the most significant contributions of the past decade, which produce such impressive and perceivably realistic animations and simulations: finite element/difference/volume methods, mass-spring systems, meshfree methods, coupled particle systems and reduced deformable models based on modal analysis. For completeness, we also make a connection to the simulation of other continua, such as fluids, gases and melting objects. Since time integration is inherent to all simulated phenomena, the general notion of time discretization is treated separately, while specifics are left to the respective models. Finally, we discuss areas of application, such as elastoplastic deformation and fracture, cloth and hair animation, virtual surgery simulation, interactive entertainment and fluid/smoke animation, and also suggest areas for future research.",
"title": ""
}
] | [
{
"docid": "4d389e4f6e33d9f5498e3071bf116a49",
"text": "This paper reviews the origins and definitions of social capital in the writings of Bourdieu, Loury, and Coleman, among other authors. It distinguishes four sources of social capital and examines their dynamics. Applications of the concept in the sociological literature emphasize its role in social control, in family support, and in benefits mediated by extrafamilial networks. I provide examples of each of these positive functions. Negative consequences of the same processes also deserve attention for a balanced picture of the forces at play. I review four such consequences and illustrate them with relevant examples. Recent writings on social capital have extended the concept from an individual asset to a feature of communities and even nations. The final sections describe this conceptual stretch and examine its limitations. I argue that, as shorthand for the positive consequences of sociability, social capital has a definite place in sociological theory. However, excessive extensions of the concept may jeopardize its heuristic value. Alejandro Portes: Biographical Sketch Alejandro Portes is professor of sociology at Princeton University and faculty associate of the Woodrow Wilson School of Public Affairs. He formerly taught at Johns Hopkins where he held the John Dewey Chair in Arts and Sciences, Duke University, and the University of Texas-Austin. In 1997 he held the Emilio Bacardi distinguished professorship at the University of Miami. In the same year he was elected president of the American Sociological Association. Born in Havana, Cuba, he came to the United States in 1960. He was educated at the University of Havana, Catholic University of Argentina, and Creighton University. He received his MA and PhD from the University of Wisconsin-Madison. 0360-0572/98/0815-0001$08.00 1 A nn u. R ev . S oc io l. 19 98 .2 4: 124 . D ow nl oa de d fr om w w w .a nn ua lr ev ie w s. or g A cc es s pr ov id ed b y St an fo rd U ni ve rs ity M ai n C am pu s R ob er t C ro w n L aw L ib ra ry o n 03 /1 0/ 17 . F or p er so na l u se o nl y. Portes is the author of some 200 articles and chapters on national development, international migration, Latin American and Caribbean urbanization, and economic sociology. His most recent books include City on the Edge, the Transformation of Miami (winner of the Robert Park award for best book in urban sociology and of the Anthony Leeds award for best book in urban anthropology in 1995); The New Second Generation (Russell Sage Foundation 1996); Caribbean Cities (Johns Hopkins University Press); and Immigrant America, a Portrait. The latter book was designated as a centennial publication by the University of California Press. It was originally published in 1990; the second edition, updated and containing new chapters on American immigration policy and the new second generation, was published in 1996.",
"title": ""
},
{
"docid": "45d808ef2824bb57e4c1dd8d75960e63",
"text": "The use of game-based learning in the classroom has turned out to be a trend nowadays. Most game-based learning tools and platforms are based on a quiz concept where the students can score points if they can choose the correct answer among multiple answers. Based on our experience in Faculty of Electrical Engineering, Universiti Teknologi MARA, most undergraduate students have difficulty to appreciate the Computer Programming course thus demotivating them in learning any programming related courses. Game-based learning approach using a Game-based Classroom Response System (GCRS) tool known as Kahoot is used to address this issue. This paper presents students' perceptions on Kahoot activity that they experienced in the classroom. The study was carried out by distributing a survey form to 120 students. Based on the feedback, majority of students enjoyed the activity and able to attract their interest in computer programming.",
"title": ""
},
{
"docid": "88a8ea1de5ad5cb8883890c1e30b3491",
"text": "Service robots will have to accomplish more and more complex, open-ended tasks and regularly acquire new skills. In this work, we propose a new approach to the problem of generating plans for such household robots. Instead composing them from atomic actions — the common approach in robot planning — we propose to transform task descriptions on web sites like ehow.com into executable robot plans. We present methods for automatically converting the instructions from natural language into a formal, logic-based representation, for resolving the word senses using the WordNet database and the Cyc ontology, and for exporting the generated plans into the mobile robot's plan language RPL. We discuss the problem of inferring information that is missing in these descriptions and the problem of grounding the abstract task descriptions in the perception and action system, and we propose techniques for solving them. The whole system works autonomously without human interaction. It has successfully been tested with a set of about 150 natural language directives, of which up to 80% could be correctly transformed.",
"title": ""
},
{
"docid": "870674d3ab86ad52116e9f0dd4e9605c",
"text": "Due to the global need for oil production and distribution, surrounding ecosystems have been negatively affected by oil spill externalities in individual health and community diversity. Conventional land remediation techniques run the risk of leaving chemical residues, and interacting with metals in the soil. The objective of this study was to test worm compost tea, also known as vermitea, as a bioremediation method to replace current techniques used on oil contaminated soils. To test the conditions that contributed to the efficacy of the teas, I examined different teas that looked into the mode and length of pollutant exposure. I examined oil emulsification activity, presence of biosurfactant-producing bacteria colonies, microbial diversity and abundance, and applicability of the teas to artificially contaminated soils. Overall, I found that the long-term direct oil tea had a 7.42% significant increase in biosurfactant producing microbes in comparison to the control tea. However, the long-term crude soil vermitea was found to be the best type of pollutant degrading tea in terms of emulsifying activity and general applicability towards reducing oil concentrations in the soil. These results will help broaden the scientific understanding towards stimulated microbial degradation of pollution, and broaden the approaches that can be taken in restoring polluted ecosystems.",
"title": ""
},
{
"docid": "288f32db8af5789e6e6049fa4cec0334",
"text": "Trusted execution environments, and particularly the Software Guard eXtensions (SGX) included in recent Intel x86 processors, gained significant traction in recent years. A long track of research papers, and increasingly also realworld industry applications, take advantage of the strong hardware-enforced confidentiality and integrity guarantees provided by Intel SGX. Ultimately, enclaved execution holds the compelling potential of securely offloading sensitive computations to untrusted remote platforms. We present Foreshadow, a practical software-only microarchitectural attack that decisively dismantles the security objectives of current SGX implementations. Crucially, unlike previous SGX attacks, we do not make any assumptions on the victim enclave’s code and do not necessarily require kernel-level access. At its core, Foreshadow abuses a speculative execution bug in modern Intel processors, on top of which we develop a novel exploitation methodology to reliably leak plaintext enclave secrets from the CPU cache. We demonstrate our attacks by extracting full cryptographic keys from Intel’s vetted architectural enclaves, and validate their correctness by launching rogue production enclaves and forging arbitrary local and remote attestation responses. The extracted remote attestation keys affect millions of devices.",
"title": ""
},
{
"docid": "3f96a3cd2e3f795072567a3f3c8ccc46",
"text": "Good corporate reputations are critical because of their potential for value creation, but also because their intangible character makes replication by competing firms considerably more difficult. Existing empirical research confirms that there is a positive relationship between reputation and financial performance. This paper complements these findings by showing that firms with relatively good reputations are better able to sustain superior profit outcomes over time. In particular, we undertake an analysis of the relationship between corporate reputation and the dynamics of financial performance using two complementary dynamic models. We also decompose overall reputation into a component that is predicted by previous financial performance, and that which is ‘left over’, and find that each (orthogonal) element supports the persistence of above-average profits over time. Copyright 2002 John Wiley & Sons, Ltd.",
"title": ""
},
{
"docid": "a27b626618e225b03bec1eea8327be4d",
"text": "As a fundamental preprocessing of various multimedia applications, object proposal aims to detect the candidate windows possibly containing arbitrary objects in images with two typical strategies, window scoring and grouping. In this paper, we first analyze the feasibility of improving object proposal performance by integrating window scoring and grouping strategies. Then, we propose a novel object proposal method for RGB-D images, named elastic edge boxes. The initial bounding boxes of candidate object regions are efficiently generated by edge boxes, and further adjusted by grouping the super-pixels within elastic range to obtain more accurate candidate windows. To validate the proposed method, we construct the largest RGB-D image data set NJU1800 for object proposal with balanced object number distribution. The experimental results show that our method can effectively and efficiently generate the candidate windows of object regions and it outperforms the state-of-the-art methods considering both accuracy and efficiency.",
"title": ""
},
{
"docid": "63115b12e4a8192fdce26eb7e2f8989a",
"text": "Theorems and techniques to form different types of transformationally invariant processing and to produce the same output quantitatively based on either transformationally invariant operators or symmetric operations have recently been introduced by the authors. In this study, we further propose to compose a geared rotationally identical CNN system (GRI-CNN) with a small angle increment by connecting networks of participated processes at the first flatten layer. Using an ordinary CNN structure as a base, requirements for constructing a GRI-CNN include the use of either symmetric input vector or kernels with an angle increment that can form a complete cycle as a \"gearwheel\". Four basic GRI-CNN structures were studied. Each of them can produce quantitatively identical output results when a rotation angle of the input vector is evenly divisible by the increment angle of the gear. Our study showed when a rotated input vector does not match to a gear angle, the GRI-CNN can also produce a highly consistent result. With an ultrafine increment angle (e.g., 1 or 0.1), a virtually isotropic CNN system can be constructed.",
"title": ""
},
{
"docid": "5d377a17d3444d6137be582cbbc6c1db",
"text": "Next generation malware will by be characterized by the intense use of polymorphic and metamorphic techniques aimed at circumventing the current malware detectors, based on pattern matching. In order to deal with this new kind of threat novel techniques have to be devised for the realization of malware detectors. Recent papers started to address such issue and this paper represents a further contribution in such a field. More precisely in this paper we propose a strategy for the detection of malicious codes that adopt the most evolved self-mutation techniques; we also provide experimental data supporting the validity of",
"title": ""
},
{
"docid": "91fbf465741c6a033a00a4aa982630b4",
"text": "This paper presents an integrated functional link interval type-2 fuzzy neural system (FLIT2FNS) for predicting the stock market indices. The hybrid model uses a TSK (Takagi–Sugano–Kang) type fuzzy rule base that employs type-2 fuzzy sets in the antecedent parts and the outputs from the Functional Link Artificial Neural Network (FLANN) in the consequent parts. Two other approaches, namely the integrated FLANN and type-1 fuzzy logic system and Local Linear Wavelet Neural Network (LLWNN) are also presented for a comparative study. Backpropagation and particle swarm optimization (PSO) learning algorithms have been used independently to optimize the parameters of all the forecasting models. To test the model performance, three well known stock market indices like the Standard’s & Poor’s 500 (S&P 500), Bombay stock exchange (BSE), and Dow Jones industrial average (DJIA) are used. The mean absolute percentage error (MAPE) and root mean square error (RMSE) are used to find out the performance of all the three models. Finally, it is observed that out of three methods, FLIT2FNS performs the best irrespective of the time horizons spanning from 1 day to 1 month. © 2011 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "e4dd63dcf11cac8ebff7b53bae58a05a",
"text": "Earth orbiting satellites come in a wide range of shapes and sizes to meet a diverse variety of uses and applications. Large satellites with masses over 1000 kg support high-resolution remote sensing of the Earth, high bandwidth communications services, and world-class scientific studies but take lengthy developments and are costly to build and launch. The advent of commercially available, high-volume, and hence low-cost microelectronics has enabled a different approach through miniaturization. This results in physically far smaller satellites that dramatically reduce timescales and costs and that are able to provide operational and commercially viable services. This paper charts the evolution and rise of small satellites from being an early curiosity with limited utility through to the present where small satellites are a key element of modern space capabilities.",
"title": ""
},
{
"docid": "4247314290ffa50098775e2bbc41b002",
"text": "Heterogeneous integration enables the construction of silicon (Si) photonic systems, which are fully integrated with a range of passive and active elements including lasers and detectors. Numerous advancements in recent years have shown that heterogeneous Si platforms can be extended beyond near-infrared telecommunication wavelengths to the mid-infrared (MIR) (2–20 μm) regime. These wavelengths hold potential for an extensive range of sensing applications and the necessary components for fully integrated heterogeneous MIR Si photonic technologies have now been demonstrated. However, due to the broad wavelength range and the diverse assortment of MIR technologies, the optimal platform for each specific application is unclear. Here, we overview Si photonic waveguide platforms and lasers at the MIR, including quantum cascade lasers on Si. We also discuss progress toward building an integrated multispectral source, which can be constructed by wavelength beam combining the outputs from multiple lasers with arrayed waveguide gratings and duplexing adiabatic couplers.",
"title": ""
},
{
"docid": "c4b037a8818cd2c335cd88daa07f70c9",
"text": "This paper presents the findings of an outdoor thermal comfort study conducted in Hong Kong using longitudinal experiments--an alternative approach to conventional transverse surveys. In a longitudinal experiment, the thermal sensations of a relatively small number of subjects over different environmental conditions are followed and evaluated. This allows an exploration of the effects of changing climatic conditions on thermal sensation, and thus can provide information that is not possible to acquire through the conventional transverse survey. The paper addresses the effects of changing wind and solar radiation conditions on thermal sensation. It examines the use of predicted mean vote (PMV) in the outdoor context and illustrates the use of an alternative thermal index--physiological equivalent temperature (PET). The paper supports the conventional assumption that thermal neutrality corresponds to thermal comfort. Finally, predictive formulas for estimating outdoor thermal sensation are presented as functions of air temperature, wind speed, solar radiation intensity and absolute humidity. According to the formulas, for a person in light clothing sitting under shade on a typical summer day in Hong Kong where the air temperature is about 28°C and relative humidity about 80%, a wind speed of about 1.6 m/s is needed to achieve neutral thermal sensation.",
"title": ""
},
{
"docid": "55032007199b5126480d432b1c45db4a",
"text": "Concern about national security has increased after the 26/11 Mumbai attack. In this paper we look at the use of missing value and clustering algorithm for a data mining approach to help predict the crimes patterns and fast up the process of solving crime. We will concentrate on MV algorithm and Apriori algorithm with some enhancements to aid in the process of filling the missing value and identification of crime patterns. We applied these techniques to real crime data. We also use semisupervised learning technique in this paper for knowledge discovery from the crime records and to help increase the predictive accuracy. General Terms Crime data mining, MV Algorithm, Apriori Algorithm",
"title": ""
},
{
"docid": "fa471f49367e03e57e7739d253385eaf",
"text": "■ Abstract The literature on effects of habitat fragmentation on biodiversity is huge. It is also very diverse, with different authors measuring fragmentation in different ways and, as a consequence, drawing different conclusions regarding both the magnitude and direction of its effects. Habitat fragmentation is usually defined as a landscape-scale process involving both habitat loss and the breaking apart of habitat. Results of empirical studies of habitat fragmentation are often difficult to interpret because ( a) many researchers measure fragmentation at the patch scale, not the landscape scale and ( b) most researchers measure fragmentation in ways that do not distinguish between habitat loss and habitat fragmentation per se, i.e., the breaking apart of habitat after controlling for habitat loss. Empirical studies to date suggest that habitat loss has large, consistently negative effects on biodiversity. Habitat fragmentation per se has much weaker effects on biodiversity that are at least as likely to be positive as negative. Therefore, to correctly interpret the influence of habitat fragmentation on biodiversity, the effects of these two components of fragmentation must be measured independently. More studies of the independent effects of habitat loss and fragmentation per se are needed to determine the factors that lead to positive versus negative effects of fragmentation per se. I suggest that the term “fragmentation” should be reserved for the breaking apart of habitat, independent of habitat loss.",
"title": ""
},
{
"docid": "a87e49bd4a49f35099171b89d278c4d9",
"text": "Due to its versatility, copositive optimization receives increasing interest in the Operational Research community, and is a rapidly expanding and fertile field of research. It is a special case of conic optimization, which consists of minimizing a linear function over a cone subject to linear constraints. The diversity of copositive formulations in different domains of optimization is impressive, since problem classes both in the continuous and discrete world, as well as both deterministic and stochastic models are covered. Copositivity appears in local and global optimality conditions for quadratic optimization, but can also yield tighter bounds for NP-hard combinatorial optimization problems. Here some of the recent success stories are told, along with principles, algorithms and applications.",
"title": ""
},
{
"docid": "e077a3c57b1df490d418a2b06cf14b2c",
"text": "Inductive power transfer (IPT) is widely discussed for the automated opportunity charging of plug-in hybrid and electric public transport buses without moving mechanical components and reduced maintenance requirements. In this paper, the design of an on-board active rectifier and dc–dc converter for interfacing the receiver coil of a 50 kW/85 kHz IPT system is designed. Both conversion stages employ 1.2 kV SiC MOSFET devices for their low switching losses. For the dc–dc conversion, a modular, nonisolated buck+boost-type topology with coupled magnetic devices is used for increasing the power density. For the presented hardware prototype, a power density of 9.5 kW/dm3 (or 156 W/in3) is achieved, while the ac–dc efficiency from the IPT receiver coil to the vehicle battery is 98.6%. Comprehensive experimental results are presented throughout this paper to support the theoretical analysis.",
"title": ""
},
{
"docid": "cc5516333c3ed4773eec4dab874b31e9",
"text": "Communities, whose reliance on critical cyber infrastructures is growing, are threatened by a wide range of cyber events that can adversely affect these systems and networks. The development of computer security taxonomies to classify computer and network vulnerabilities and attacks has led to a greater insight into the causes, effects, mitigation, and remediation of cyber attacks. In developing these taxonomies researchers are better able to understand and address the many different attacks that can occur. No current taxonomy, however, has been developed that takes into account the community aspects of cyber attacks or other cyber events affecting communities. We present a new taxonomy that considers the motivation, methodology, and effects of cyber events that can affect communities. We include a discussion on how our taxonomy is useful to e-government, industry, and security researchers.",
"title": ""
},
{
"docid": "ddb51863430250a28f37c5f12c13c910",
"text": "Much of our understanding of human thinking is based on probabilistic models. This innovative book by Jerome R. Busemeyer and Peter D. Bruza argues that, actually, the underlying mathematical structures from quantum theory provide a much better account of human thinking than traditional models. They introduce the foundations for modelling probabilistic-dynamic systems using two aspects of quantum theory. The first, “contextuality,” is a way to understand interference effects found with inferences and decisions under conditions of uncertainty. The second, “quantum entanglement,” allows cognitive phenomena to be modelled in non-reductionist ways. Employing these principles drawn from quantum theory allows us to view human cognition and decision in a totally new light. Introducing the basic principles in an easy-to-follow way, this book does not assume a physics background or a quantum brain and comes complete with a tutorial and fully worked-out applications in important areas of cognition and decision.",
"title": ""
},
{
"docid": "b3d49bd191e0432e4306ee08b49e4c7c",
"text": "ConceptNet is a knowledge representation project, providing a large semantic graph that describes general human knowledge and how it is expressed in natural language. This paper presents the latest iteration, ConceptNet 5, including its fundamental design decisions, ways to use it, and evaluations of its coverage and accuracy.",
"title": ""
}
] | scidocsrr |
5a4098d72885cbcbcffd0f1fb7eb6091 | The beliefs behind the teacher that influences their ICT practices | [
{
"docid": "ecddd4f80f417dcec49021065394c89a",
"text": "Research in the area of educational technology has often been critiqued for a lack of theoretical grounding. In this article we propose a conceptual framework for educational technology by building on Shulman’s formulation of ‘‘pedagogical content knowledge’’ and extend it to the phenomenon of teachers integrating technology into their pedagogy. This framework is the result of 5 years of work on a program of research focused on teacher professional development and faculty development in higher education. It attempts to capture some of the essential qualities of teacher knowledge required for technology integration in teaching, while addressing the complex, multifaceted, and situated nature of this knowledge. We argue, briefly, that thoughtful pedagogical uses of technology require the development of a complex, situated form of knowledge that we call Technological Pedagogical Content Knowledge (TPCK). In doing so, we posit the complex roles of, and interplay among, three main components of learning environments: content, pedagogy, and technology. We argue that this model has much to offer to discussions of technology integration at multiple levels: theoretical, pedagogical, and methodological. In this article, we describe the theory behind our framework, provide examples of our teaching approach based upon the framework, and illustrate the methodological contributions that have resulted from this work.",
"title": ""
},
{
"docid": "c17e6363762e0e9683b51c0704d43fa7",
"text": "Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org/about/terms.html. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use.",
"title": ""
}
] | [
{
"docid": "2683c65d587e8febe45296f1c124e04d",
"text": "We present a new autoencoder-type architecture, that is trainable in an unsupervised mode, sustains both generation and inference, and has the quality of conditional and unconditional samples boosted by adversarial learning. Unlike previous hybrids of autoencoders and adversarial networks, the adversarial game in our approach is set up directly between the encoder and the generator, and no external mappings are trained in the process of learning. The game objective compares the divergences of each of the real and the generated data distributions with the canonical distribution in the latent space. We show that direct generator-vs-encoder game leads to a tight coupling of the two components, resulting in samples and reconstructions of a comparable quality to some recently-proposed more complex architectures.",
"title": ""
},
{
"docid": "4f096ba7fc6164cdbf5d37676d943fa8",
"text": "This work presents an intelligent clothes search system based on domain knowledge, targeted at creating a virtual assistant to search clothes matched to fashion and userpsila expectation using all what have already been in real closet. All what garment essentials and fashion knowledge are from visual images. Users can simply submit the desired image keywords, such as elegant, sporty, casual, and so on, and occasion type, such as formal meeting, outdoor dating, and so on, to the system. And then the fashion style recognition module is activated to search the desired clothes within the personal garment database. Category learning with supervised neural networking is applied to cluster garments into different impression groups. The input stimuli of the neural network are three sensations, warmness, loudness, and softness, which are transformed from the physical garment essentials like major color tone, print type, and fabric material. The system aims to provide such an intelligent user-centric services system functions as a personal fashion advisor.",
"title": ""
},
{
"docid": "1a9e2481abf23501274e67575b1c9be6",
"text": "The multiple criteria decision making (MCDM) methods VIKOR and TOPSIS are based on an aggregating function representing “closeness to the idealâ€, which originated in the compromise programming method. In VIKOR linear normalization and in TOPSIS vector normalization is used to eliminate the units of criterion functions. The VIKOR method of compromise ranking determines a compromise solution, providing a maximum “group utility†for the “majority†and a minimum of an individual regret for the “opponentâ€. The TOPSIS method determines a solution with the shortest distance to the ideal solution and the greatest distance from the negative-ideal solution, but it does not consider the relative importance of these distances. A comparative analysis of these two methods is illustrated with a numerical example, showing their similarity and some differences. a, 1 b Purchase Export Previous article Next article Check if you have access through your login credentials or your institution.",
"title": ""
},
{
"docid": "71aae4cbccf6d3451d35528ceca8b8a9",
"text": "We propose Hierarchical Space-Time Segments as a new representation for action recognition and localization. This representation has a two-level hierarchy. The first level comprises the root space-time segments that may contain a human body. The second level comprises multi-grained space-time segments that contain parts of the root. We present an unsupervised method to generate this representation from video, which extracts both static and non-static relevant space-time segments, and also preserves their hierarchical and temporal relationships. Using simple linear SVM on the resultant bag of hierarchical space-time segments representation, we attain better than, or comparable to, state-of-the-art action recognition performance on two challenging benchmark datasets and at the same time produce good action localization results.",
"title": ""
},
{
"docid": "372c5918e55e79c0a03c14105eb50fad",
"text": "Boosting is one of the most significant advances in machine learning for classification and regression. In its original and computationally flexible version, boosting seeks to minimize empirically a loss function in a greedy fashion. The resulted estimator takes an additive function form and is built iteratively by applying a base estimator (or learner) to updated samples depending on the previous iterations. An unusual regularization technique, early stopping, is employed based on CV or a test set. This paper studies numerical convergence, consistency, and statistical rates of convergence of boosting with early stopping, when it is carried out over the linear span of a family of basis functions. For general loss functions, we prove the convergence of boosting’s greedy optimization to the infinimum of the loss function over the linear span. Using the numerical convergence result, we find early stopping strategies under which boosting is shown to be consistent based on iid samples, and we obtain bounds on the rates of convergence for boosting estimators. Simulation studies are also presented to illustrate the relevance of our theoretical results for providing insights to practical aspects of boosting. As a side product, these results also reveal the importance of restricting the greedy search step sizes, as known in practice through the works of Friedman and others. Moreover, our results lead to a rigorous proof that for a linearly separable problem, AdaBoost with ǫ → 0 stepsize becomes an L-margin maximizer when left to run to convergence.",
"title": ""
},
{
"docid": "efc11b77182119202190f97d705b3bb7",
"text": "In many E-commerce recommender systems, a special class of recommendation involves recommending items to users in a life cycle. For example, customers who have babies will shop on Diapers.com within a relatively long period, and purchase different products for babies within different growth stages. Traditional recommendation algorithms produce recommendation lists similar to items that the target user has accessed before (content filtering), or compute recommendation by analyzing the items purchased by the users who are similar to the target user (collaborative filtering). Such recommendation paradigms cannot effectively resolve the situation with a life cycle, i.e., the need of customers within different stages might vary significantly. In this paper, we model users’ behavior with life cycles by employing handcrafted item taxonomies, of which the background knowledge can be tailored for the computation of personalized recommendation. In particular, our method first formalizes a user’s long-term behavior using the item taxonomy, and then identifies the exact stage of the user. By incorporating collaborative filtering into recommendation, we can easily provide a personalized item list to the user through other similar users within the same stage. An empirical evaluation conducted on a purchasing data collection obtained from Diapers.com demonstrates the efficacy of our proposed method. 2012 Elsevier Ltd. All rights reserved.",
"title": ""
},
{
"docid": "b3e9c251b2da6c704da6285602773afe",
"text": "It has been well established that most operating system crashes are due to bugs in device drivers. Because drivers are normally linked into the kernel address space, a buggy driver can wipe out kernel tables and bring the system crashing to a halt. We have greatly mitigated this problem by reducing the kernel to an absolute minimum and running each driver as a separate, unprivileged process in user space. In addition, we implemented a POSIX-conformant operating system as multiple user-mode processes. In this design, all that is left in kernel mode is a tiny kernel of under 3800 lines of executable code for catching interrupts, starting and stopping processes, and doing IPC. By moving nearly the entire operating system to multiple, protected user-mode processes we reduce the consequences of faults, since a driver failure no longer is fatal and does not require rebooting the computer. In fact, our system incorporates a reincarnation server that is designed to deal with such errors and often allows for full recovery, transparent to the application and without loss of data. To achieve maximum reliability, our design was guided by simplicity, modularity, least authorization, and fault tolerance. This paper discusses our lightweight approach and reports on its performance and reliability. It also compares our design to other proposals for protecting drivers using kernel wrapping and virtual machines.",
"title": ""
},
{
"docid": "7e5d83af3c6496e41c19b36b2392f076",
"text": "JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage documents and browser windows, however, it has also opened the door for many browser-based security attacks. Insecure engineering practices of using JavaScript may not directly lead to security breaches, but they can create new attack vectors and greatly increase the risks of browser-based attacks. In this article, we present the first measurement study on insecure practices of using JavaScript on the Web. Our focus is on the insecure practices of JavaScript inclusion and dynamic generation, and we examine their severity and nature on 6,805 unique websites. Our measurement results reveal that insecure JavaScript practices are common at various websites: (1) at least 66.4% of the measured websites manifest the insecure practices of including JavaScript files from external domains into the top-level documents of their webpages; (2) over 44.4% of the measured websites use the dangerous eval() function to dynamically generate and execute JavaScript code on their webpages; and (3) in JavaScript dynamic generation, using the document.write() method and the innerHTML property is much more popular than using the relatively secure technique of creating script elements via DOM methods. Our analysis indicates that safe alternatives to these insecure practices exist in common cases and ought to be adopted by website developers and administrators for reducing potential security risks.",
"title": ""
},
{
"docid": "54e5cd296371e7e058a00b1835251242",
"text": "In this paper, a quasi-millimeter-wave wideband bandpass filter (BPF) is designed by using a microstrip dual-mode ring resonator and two folded half-wavelength resonators. Based on the transmission line equivalent circuit of the filter, variations of the frequency response of the filter versus the circuit parameters are investigated first by using the derived formulas and circuit simulators. Then a BPF with a 3dB fractional bandwidth (FBW) of 20% at 25.5 GHz is designed, which realizes the desired wide passband, sharp skirt property, and very wide stopband. Finally, the designed BPF is fabricated, and its measured frequency response is found agree well with the simulated result.",
"title": ""
},
{
"docid": "93d06eafb15063a7d17ec9a7429075f0",
"text": "Non-orthogonal multiple access (NOMA) is emerging as a promising, yet challenging, multiple access technology to improve spectrum utilization for the fifth generation (5G) wireless networks. In this paper, the application of NOMA to multicast cognitive radio networks (termed as MCR-NOMA) is investigated. A dynamic cooperative MCR-NOMA scheme is proposed, where the multicast secondary users serve as relays to improve the performance of both primary and secondary networks. Based on the available channel state information (CSI), three different secondary user scheduling strategies for the cooperative MCR-NOMA scheme are presented. To evaluate the system performance, we derive the closed-form expressions of the outage probability and diversity order for both networks. Furthermore, we introduce a new metric, referred to as mutual outage probability to characterize the cooperation benefit compared to non-cooperative MCR-NOMA scheme. Simulation results demonstrate significant performance gains are obtained for both networks, thanks to the use of our proposed cooperative MCR-NOMA scheme. It is also demonstrated that higher spatial diversity order can be achieved by opportunistically utilizing the CSI available for the secondary user scheduling.",
"title": ""
},
{
"docid": "92386ee2988b6d7b6f2f0b3cdcbf44ba",
"text": "In the rst part of the paper we consider the problem of dynamically apportioning resources among a set of options in a worst-case on-line framework. The model we study can be interpreted as a broad, abstract extension of the well-studied on-line prediction model to a general decision-theoretic setting. We show that the multiplicative weightupdate rule of Littlestone and Warmuth [20] can be adapted to this model yielding bounds that are slightly weaker in some cases, but applicable to a considerably more general class of learning problems. We show how the resulting learning algorithm can be applied to a variety of problems, including gambling, multiple-outcome prediction, repeated games and prediction of points in R n . In the second part of the paper we apply the multiplicative weight-update technique to derive a new boosting algorithm. This boosting algorithm does not require any prior knowledge about the performance of the weak learning algorithm. We also study generalizations of the new boosting algorithm to the problem of learning functions whose range, rather than being binary, is an arbitrary nite set or a bounded segment of the real line.",
"title": ""
},
{
"docid": "858a5ed092f02d057437885ad1387c9f",
"text": "The current state-of-the-art singledocument summarization method generates a summary by solving a Tree Knapsack Problem (TKP), which is the problem of finding the optimal rooted subtree of the dependency-based discourse tree (DEP-DT) of a document. We can obtain a gold DEP-DT by transforming a gold Rhetorical Structure Theory-based discourse tree (RST-DT). However, there is still a large difference between the ROUGE scores of a system with a gold DEP-DT and a system with a DEP-DT obtained from an automatically parsed RST-DT. To improve the ROUGE score, we propose a novel discourse parser that directly generates the DEP-DT. The evaluation results showed that the TKP with our parser outperformed that with the state-of-the-art RST-DT parser, and achieved almost equivalent ROUGE scores to the TKP with the gold DEP-DT.",
"title": ""
},
{
"docid": "49329aef5ac732cc87b3cc78520c7ff5",
"text": "This paper surveys the previous and ongoing research on surface electromyogram (sEMG) signal processing implementation through various hardware platforms. The development of system that incorporates sEMG analysis capability is essential in rehabilitation devices, prosthesis arm/limb and pervasive healthcare in general. Most advanced EMG signal processing algorithms rely heavily on computational resource of a PC that negates the elements of portability, size and power dissipation of a pervasive healthcare system. Signal processing techniques applicable to sEMG are discussed with aim for proper execution in platform other than full-fledge PC. Performance and design parameters issues in some hardware implementation are also being pointed up. The paper also outlines the trends and alternatives solutions in developing portable and efficient EMG signal processing hardware.",
"title": ""
},
{
"docid": "1785d1d7da87d1b6e5c41ea89e447bf9",
"text": "Web usage mining is the application of data mining techniques to discover usage patterns from Web data, in order to understand and better serve the needs of Web-based applications. Web usage mining consists of three phases, namely preprocessing, pattern discovery, and pattern analysis. This paper describes each of these phases in detail. Given its application potential, Web usage mining has seen a rapid increase in interest, from both the research and practice communities. This paper provides a detailed taxonomy of the work in this area, including research efforts as well as commercial offerings. An up-to-date survey of the existing work is also provided. Finally, a brief overview of the WebSIFT system as an example of a prototypical Web usage mining system is given.",
"title": ""
},
{
"docid": "18e1f1171844fa27905246b9246cc975",
"text": "Autonomous robots must be able to learn and maintain models of their environments. Research on mobile robot navigation has produced two major paradigms for mapping indoor environments: grid-based and topological. While grid-based methods produce accurate metric maps, their complexity often prohibits efficient planning and problem solving in large-scale indoor environments. Topological maps, on the other hand, can be used much more efficiently, yet accurate and consistent topological maps are often difficult to learn and maintain in large-scale environments, particularly if momentary sensor data is highly ambiguous. This paper describes an approach that integrates both paradigms: grid-based and topoIogica1. Grid-based maps are learned using artificial neural networks and naive Bayesian integration. Topological maps are generated on top of the grid-based maps, by partitioning the latter into coherent regions. By combining both paradigms, the approach presented here gains advantages from both worlds: accuracy/consistency and efficiency. The paper gives results for autonomous exploration, mapping and operation of a mobile robot in populated multi-room environments. @ 1998 Elsevier Science B.V.",
"title": ""
},
{
"docid": "60182038191a764fd7070e8958185718",
"text": "Shales of very low metamorphic grade from the 2.78 to 2.45 billion-year-old (Ga) Mount Bruce Supergroup, Pilbara Craton, Western Australia, were analyzed for solvent extractable hydrocarbons. Samples were collected from ten drill cores and two mines in a sampling area centered in the Hamersley Basin near Wittenoom and ranging 200 km to the southeast, 100 km to the southwest and 70 km to the northwest. Almost all analyzed kerogenous sedimentary rocks yielded solvent extractable organic matter. Concentrations of total saturated hydrocarbons were commonly in the range of 1 to 20 ppm ( g/g rock) but reached maximum values of 1000 ppm. The abundance of aromatic hydrocarbons was 1 to 30 ppm. Analysis of the extracts by gas chromatography-mass spectrometry (GC-MS) and GC-MS metastable reaction monitoring (MRM) revealed the presence of n-alkanes, midand end-branched monomethylalkanes, -cyclohexylalkanes, acyclic isoprenoids, diamondoids, trito pentacyclic terpanes, steranes, aromatic steroids and polyaromatic hydrocarbons. Neither plant biomarkers nor hydrocarbon distributions indicative of Phanerozoic contamination were detected. The host kerogens of the hydrocarbons were depleted in C by 2 to 21‰ relative ton-alkanes, a pattern typical of, although more extreme than, other Precambrian samples. Acyclic isoprenoids showed carbon isotopic depletion relative to n-alkanes and concentrations of 2 -methylhopanes were relatively high, features rarely observed in the Phanerozoic but characteristic of many other Precambrian bitumens. Molecular parameters, including sterane and hopane ratios at their apparent thermal maxima, condensate-like alkane profiles, high monoand triaromatic steroid maturity parameters, high methyladamantane and methyldiamantane indices and high methylphenanthrene maturity ratios, indicate thermal maturities in the wet-gas generation zone. Additionally, extracts from shales associated with iron ore deposits at Tom Price and Newman have unusual polyaromatic hydrocarbon patterns indicative of pyrolytic dealkylation. The saturated hydrocarbons and biomarkers in bitumens from the Fortescue and Hamersley Groups are characterized as ‘probably syngenetic with their Archean host rock’ based on their typical Precambrian molecular and isotopic composition, extreme maturities that appear consistent with the thermal history of the host sediments, the absence of biomarkers diagnostic of Phanerozoic age, the absence of younger petroleum source rocks in the basin and the wide geographic distribution of the samples. Aromatic hydrocarbons detected in shales associated with iron ore deposits at Mt Tom Price and Mt Whaleback are characterized as ‘clearly Archean’ based on their hypermature composition and covalent bonding to kerogen. Copyright © 2003 Elsevier Ltd",
"title": ""
},
{
"docid": "9b942a1342eb3c4fd2b528601fa42522",
"text": "Peer and self-assessment offer an opportunity to scale both assessment and learning to global classrooms. This article reports our experiences with two iterations of the first large online class to use peer and self-assessment. In this class, peer grades correlated highly with staff-assigned grades. The second iteration had 42.9% of students’ grades within 5% of the staff grade, and 65.5% within 10%. On average, students assessed their work 7% higher than staff did. Students also rated peers’ work from their own country 3.6% higher than those from elsewhere. We performed three experiments to improve grading accuracy. We found that giving students feedback about their grading bias increased subsequent accuracy. We introduce short, customizable feedback snippets that cover common issues with assignments, providing students more qualitative peer feedback. Finally, we introduce a data-driven approach that highlights high-variance items for improvement. We find that rubrics that use a parallel sentence structure, unambiguous wording, and well-specified dimensions have lower variance. After revising rubrics, median grading error decreased from 12.4% to 9.9%.",
"title": ""
},
{
"docid": "14bcbfcb6e7165e67247453944f37ac0",
"text": "This study investigated whether psychologists' confidence in their clinical decisions is really justified. It was hypothesized that as psychologists study information about a case (a) their confidence about the case increases markedly and steadily but (b) the accuracy of their conclusions about the case quickly reaches a ceiling. 32 judges, including 8 clinical psychologists, read background information about a published case, divided into 4 sections. After reading each section of the case, judges answered a set of 25 questions involving personality judgments about the case. Results strongly supported the hypotheses. Accuracy did not increase significantly with increasing information, but confidence increased steadily and significantly. All judges except 2 became overconfident, most of them markedly so. Clearly, increasing feelings of confidence are not a sure sign of increasing predictive accuracy about a case.",
"title": ""
},
{
"docid": "1d1ba5f131c9603fe3d919ad493a6dc1",
"text": "By its very nature, software development consists of many knowledge-intensive processes. One of the most difficult to model, however, is requirements elicitation. This paper presents a mathematical model of the requirements elicitation process that clearly shows the critical role of knowledge in its performance. One metaprocess of requirements elicitation, selection of an appropriate elicitation technique, is also captured in the model. The values of this model are: (1) improved understanding of what needs to be performed during elicitation helps analysts improve their elicitation efforts, (2) improved understanding of how elicitation techniques are selected helps less experienced analysts be as successful as more experienced analysts, and (3) as we improve our ability to perform elicitation, we improve the likelihood that the systems we create will meet their intended customers’ needs. Many papers have been written that promulgate specific elicitation methods. A few have been written that model elicitation in general. However, none have yet to model elicitation in a way that makes clear the critical role played by knowledge. This paper’s model captures the critical roles played by knowledge in both elicitation and elicitation technique selection.",
"title": ""
},
{
"docid": "632fc99930154b2caaa83254a0cc3c52",
"text": "Article history: Received 1 May 2012 Received in revised form 1 May 2014 Accepted 3 May 2014 Available online 10 May 2014",
"title": ""
}
] | scidocsrr |
66bbf76fd3ac85326535b5b30371d231 | ASAP: A Self-Adaptive Prediction System for Instant Cloud Resource Demand Provisioning | [
{
"docid": "e06cc2a4291c800a76fd2a107d2230e4",
"text": "Surprisingly, console logs rarely help operators detect problems in large-scale datacenter services, for they often consist of the voluminous intermixing of messages from many software components written by independent developers. We propose a general methodology to mine this rich source of information to automatically detect system runtime problems. We first parse console logs by combining source code analysis with information retrieval to create composite features. We then analyze these features using machine learning to detect operational problems. We show that our method enables analyses that are impossible with previous methods because of its superior ability to create sophisticated features. We also show how to distill the results of our analysis to an operator-friendly one-page decision tree showing the critical messages associated with the detected problems. We validate our approach using the Darkstar online game server and the Hadoop File System, where we detect numerous real problems with high accuracy and few false positives. In the Hadoop case, we are able to analyze 24 million lines of console logs in 3 minutes. Our methodology works on textual console logs of any size and requires no changes to the service software, no human input, and no knowledge of the software's internals.",
"title": ""
}
] | [
{
"docid": "312d05085096de7d4dfaaef815f35249",
"text": "Chemomechanical caries removal allies an atraumatic technique with antimicrobiotic characteristics, minimizing painful stimuli and maximally preserving healthy dental structures. The purpose of this study was to compare the cytotoxic effects of papain-based gel (Papacarie) and another caries-removing substance, Carisolv, to a nontreatment control on cultured fibroblasts in vitro and the biocompatibility in subcutaneous tissue in vivo. The cytotoxicity analysis was performed on fibroblast cultures (NIH-3T3) after 0-, 4-, 8-, and 12-hour exposure (cell viability assay) and after 1-, 3-, 5-, and 7-day exposure (survival assay). In the in vivo study, the 2 compounds were introduced into polyethylene tubes that were implanted into subcutaneous tissues of rats. After 1, 7, 14, 30, and 60 days, tissue samples were examined histologically. Cell viability did not differ between the 2 experimental groups. The control group, however, showed significantly higher percentage viability. There were no differences in cell survival between the control and experimental groups. The histological analysis revealed a moderate inflammatory response at 2 and 7 days and a mild response at 15 days, becoming almost imperceptible by 30 and 60 days in both experimental groups. The 2 tested substances exhibited acceptable biocompatibilities and demonstrated similar responses in the in vitro cytotoxicity and in vivo implantation assay.",
"title": ""
},
{
"docid": "26e60be4012b20575f3ddee16f046daa",
"text": "Natural scene character recognition is challenging due to the cluttered background, which is hard to separate from text. In this paper, we propose a novel method for robust scene character recognition. Specifically, we first use robust principal component analysis (PCA) to denoise character image by recovering the missing low-rank component and filtering out the sparse noise term, and then use a simple Histogram of oriented Gradient (HOG) to perform image feature extraction, and finally, use a sparse representation based classifier for recognition. In experiments on four public datasets, namely the Char74K dataset, ICADAR 2003 robust reading dataset, Street View Text (SVT) dataset and IIIT5K-word dataset, our method was demonstrated to be competitive with the state-of-the-art methods.",
"title": ""
},
{
"docid": "0257589dc59f1ddd4ec19a2450e3156f",
"text": "Drawing upon the literatures on beliefs about magical contagion and property transmission, we examined people's belief in a novel mechanism of human-to-human contagion, emotional residue. This is the lay belief that people's emotions leave traces in the physical environment, which can later influence others or be sensed by others. Studies 1-4 demonstrated that Indians are more likely than Americans to endorse a lay theory of emotions as substances that move in and out of the body, and to claim that they can sense emotional residue. However, when the belief in emotional residue is measured implicitly, both Indians and American believe to a similar extent that emotional residue influences the moods and behaviors of those who come into contact with it (Studies 5-7). Both Indians and Americans also believe that closer relationships and a larger number of people yield more detectable residue (Study 8). Finally, Study 9 demonstrated that beliefs about emotional residue can influence people's behaviors. Together, these finding suggest that emotional residue is likely to be an intuitive concept, one that people in different cultures acquire even without explicit instruction.",
"title": ""
},
{
"docid": "e073e8ae88b49ef2d3636a4f7f15076d",
"text": "Human evaluation for natural language generation (NLG) often suffers from inconsistent user ratings. While previous research tends to attribute this problem to individual user preferences, we show that the quality of human judgements can also be improved by experimental design. We present a novel rank-based magnitude estimation method (RankME), which combines the use of continuous scales and relative assessments. We show that RankME significantly improves the reliability and consistency of human ratings compared to traditional evaluation methods. In addition, we show that it is possible to evaluate NLG systems according to multiple, distinct criteria, which is important for error analysis. Finally, we demonstrate that RankME, in combination with Bayesian estimation of system quality, is a cost-effective alternative for ranking multiple NLG systems.",
"title": ""
},
{
"docid": "45cbfbe0a0bcf70910a6d6486fb858f0",
"text": "Grid cells in the entorhinal cortex of freely moving rats provide a strikingly periodic representation of self-location which is indicative of very specific computational mechanisms. However, the existence of grid cells in humans and their distribution throughout the brain are unknown. Here we show that the preferred firing directions of directionally modulated grid cells in rat entorhinal cortex are aligned with the grids, and that the spatial organization of grid-cell firing is more strongly apparent at faster than slower running speeds. Because the grids are also aligned with each other, we predicted a macroscopic signal visible to functional magnetic resonance imaging (fMRI) in humans. We then looked for this signal as participants explored a virtual reality environment, mimicking the rats’ foraging task: fMRI activation and adaptation showing a speed-modulated six-fold rotational symmetry in running direction. The signal was found in a network of entorhinal/subicular, posterior and medial parietal, lateral temporal and medial prefrontal areas. The effect was strongest in right entorhinal cortex, and the coherence of the directional signal across entorhinal cortex correlated with spatial memory performance. Our study illustrates the potential power of combining single-unit electrophysiology with fMRI in systems neuroscience. Our results provide evidence for grid-cell-like representations in humans, and implicate a specific type of neural representation in a network of regions which supports spatial cognition and also autobiographical memory.",
"title": ""
},
{
"docid": "3963e1a10366748bf4e52d34cc15cc0f",
"text": "Surface electromyography (sEMG) is widely used in clinical diagnosis, rehabilitation engineering and humancomputer interaction and other fields. In this paper, we use Myo armband to collect sEMG signals. Myo armband can be worn above any elbow of any arm and it can capture the bioelectric signal generated when the arm muscles move. MYO can pass of signals through its low-power Blue-tooth, and its interference is small, which makes the signal quality really good. By collecting the sEMG signals of the upper limb forearm, we extract five eigenvalues in the time domain, and use the BP neural network classification algorithm to realize the recognition of six gestures in this paper. Experimental results show that the use of MYO for gesture recognition can get a very good recognition results, it can accurately identify the six hand movements with the average recognition rate of 93%.",
"title": ""
},
{
"docid": "3fd6d0ef0240b2fdd2a9c76a023ecab6",
"text": "In this work, an exponential spline method is developed and a nalyzed for approximating solutions of calculus of variati ons problems. The method uses a spline interpolant, which is con structed from exponential spline. It is proved to be secondrder convergent. Finally some illustrative examples are includ ed to demonstrate the applicability of the new technique. Nu merical results confirm the order of convergence predicted by the analysis.",
"title": ""
},
{
"docid": "490114176c31592da4cac2bcf75f31f3",
"text": "In this letter, we present a compact ultrawideband (UWB) antenna printed on a 50.8-μm Kapton polyimide substrate. The antenna is fed by a linearly tapered coplanar waveguide (CPW) that provides smooth transitional impedance for improved matching. The proposed design is tuned to cover the 2.2-14.3-GHz frequency range that encompasses both the 2.45-GHz Industrial, Scientific, Medical (ISM) band and the standard 3.1-10.6-GHz UWB band. Furthermore, the antenna is compared to a conventional CPW-fed antenna to demonstrate the significance of the proposed design. A parametric study is first performed on the feed of the proposed design to achieve the desired impedance matching. Next, a prototype is fabricated; measurement results show good agreement with the simulated model. Moreover, the antenna demonstrates a very low susceptibility to performance degradation due to bending effects in terms of impedance matching and far-field radiation patterns, which makes it suitable for integration within modern flexible electronic devices.",
"title": ""
},
{
"docid": "8de4182b607888e6c7cbe6d6ae8ee122",
"text": "In this article, we focus on isolated gesture recognition and explore different modalities by involving RGB stream, depth stream, and saliency stream for inspection. Our goal is to push the boundary of this realm even further by proposing a unified framework that exploits the advantages of multi-modality fusion. Specifically, a spatial-temporal network architecture based on consensus-voting has been proposed to explicitly model the long-term structure of the video sequence and to reduce estimation variance when confronted with comprehensive inter-class variations. In addition, a three-dimensional depth-saliency convolutional network is aggregated in parallel to capture subtle motion characteristics. Extensive experiments are done to analyze the performance of each component and our proposed approach achieves the best results on two public benchmarks, ChaLearn IsoGD and RGBD-HuDaAct, outperforming the closest competitor by a margin of over 10% and 15%, respectively. Our project and codes will be released at https://davidsonic.github.io/index/acm_tomm_2017.html.",
"title": ""
},
{
"docid": "f073981b6c7893dd904fb04707f5ebeb",
"text": "Plant growth-promoting rhizobacteria (PGPR) are the rhizosphere bacteria that can enhance plant growth by a wide variety of mechanisms like phosphate solubilization, siderophore production, biological nitrogen fixation, rhizosphere engineering, production of 1-Aminocyclopropane-1-carboxylate deaminase (ACC), quorum sensing (QS) signal interference and inhibition of biofilm formation, phytohormone production, exhibiting antifungal activity, production of volatile organic compounds (VOCs), induction of systemic resistance, promoting beneficial plant-microbe symbioses, interference with pathogen toxin production etc. The potentiality of PGPR in agriculture is steadily increased as it offers an attractive way to replace the use of chemical fertilizers, pesticides and other supplements. Growth promoting substances are likely to be produced in large quantities by these rhizosphere microorganisms that influence indirectly on the overall morphology of the plants. Recent progress in our understanding on the diversity of PGPR in the rhizosphere along with their colonization ability and mechanism of action should facilitate their application as a reliable component in the management of sustainable agricultural system. The progress to date in using the rhizosphere bacteria in a variety of applications related to agricultural improvement along with their mechanism of action with special reference to plant growth-promoting traits are summarized and discussed in this review.",
"title": ""
},
{
"docid": "39e9fe27f70f54424df1feec453afde3",
"text": "Ontology is a sub-field of Philosophy. It is the study of the nature of existence and a branch of metaphysics concerned with identifying the kinds of things that actually exists and how to describe them. It describes formally a domain of discourse. Ontology is used to capture knowledge about some domain of interest and to describe the concepts in the domain and also to express the relationships that hold between those concepts. Ontology consists of finite list of terms (or important concepts) and the relationships among the terms (or Classes of Objects). Relationships typically include hierarchies of classes. It is an explicit formal specification of conceptualization and the science of describing the kind of entities in the world and how they are related (W3C). Web Ontology Language (OWL) is a language for defining and instantiating web ontologies (a W3C Recommendation). OWL ontology includes description of classes, properties and their instances. OWL is used to explicitly represent the meaning of terms in vocabularies and the relationships between those terms. Such representation of terms and their interrelationships is called ontology. OWL has facilities for expressing meaning and semantics and the ability to represent machine interpretable content on the Web. OWL is designed for use by applications that need to process the content of information instead of just presenting information to humans. This is used for knowledge representation and also is useful to derive logical consequences from OWL formal semantics.",
"title": ""
},
{
"docid": "fae3b6d1415e5f1d95aa2126c14e7a09",
"text": "This paper presents an active RF phase shifter with 10 bit control word targeted toward the upcoming 5G wireless systems. The circuit is designed and fabricated using 45 nm CMOS SOI technology. An IQ vector modulator (IQVM) topology is used which provides both amplitude and phase control. The design is programmable with exhaustive digital controls available for parameters like bias voltage, resonance frequency, and gain. The frequency of operation is tunable from 12.5 GHz to 15.7 GHz. The mean angular separation between phase points is 1.5 degree at optimum amplitude levels. The rms phase error over the operating band is as low as 0.8 degree. Active area occupied is 0.18 square millimeter. The total DC power consumed from 1 V supply is 75 mW.",
"title": ""
},
{
"docid": "e34873c21f9c0dd0705e0496886137df",
"text": "This paper examines two principal categories of manipulative behaviour. The term ‘macro-manipulation’ is used to describe the lobbying of regulators to persuade them to produce regulation that is more favourable to the interests of preparers. ‘Micromanipulation’ describes the management of accounting figures to produce a biased view at the entity level. Both categories of manipulation can be viewed as attempts at creativity by financial statement preparers. The paper analyses two cases of manipulation which are considered in an ethical context. The paper concludes that the manipulations described in it can be regarded as morally reprehensible. They are not fair to users, they involve an unjust exercise of power, and they tend to weaken the authority of accounting regulators.",
"title": ""
},
{
"docid": "c07c69bf5e2fce6f9944838ce80b5b8c",
"text": "Many image editing applications rely on the analysis of image patches. In this paper, we present a method to analyze patches by embedding them to a vector space, in which the Euclidean distance reflects patch similarity. Inspired by Word2Vec, we term our approach Patch2Vec. However, there is a significant difference between words and patches. Words have a fairly small and well defined dictionary. Image patches, on the other hand, have no such dictionary and the number of different patch types is not well defined. The problem is aggravated by the fact that each patch might contain several objects and textures. Moreover, Patch2Vec should be universal because it must be able to map never-seen-before texture to the vector space. The mapping is learned by analyzing the distribution of all natural patches. We use Convolutional Neural Networks (CNN) to learn Patch2Vec. In particular, we train a CNN on labeled images with a triplet-loss objective function. The trained network encodes a given patch to a 128D vector. Patch2Vec is evaluated visually, qualitatively, and quantitatively. We then use several variants of an interactive single-click image segmentation algorithm to demonstrate the power of our method.",
"title": ""
},
{
"docid": "df5ce1a194802b0f6dac28d1a05bb08e",
"text": "This paper presents a 77-GHz CMOS frequency-modulated continuous-wave (FMCW) frequency synthesizer with the capability of reconfigurable chirps. The frequency-sweep range and sweep time of the chirp signals can be reconfigured every cycle such that the frequency-hopping random chirp signal can be realized for an FMCW radar transceiver. The frequency synthesizer adopts the fractional-N phase-locked-loop technique and is fully integrated in TSMC 65-nm digital CMOS technology. The silicon area of the synthesizer is 0.65 mm × 0.45 mm and it consumes 51.3 mW of power. The measured output phase noise of the synthesizer is -85.1 dBc/Hz at 1-MHz offset and the root-mean-square modulation frequency error is smaller than 73 kHz.",
"title": ""
},
{
"docid": "6724f1e8a34a6d9f64a30061ce7f67c0",
"text": "Mental contrasting with implementation intentions (MCII) has been found to improve selfregulation across many life domains. The present research investigates whether MCII can benefit time management. In Study 1, we asked students to apply MCII to a pressing academic problem and assessed how they scheduled their time for the upcoming week. MCII participants scheduled more time than control participants who in their thoughts either reflected on similar contents using different cognitive procedures (content control group) or applied the same cognitive procedures on different contents (format control group). In Study 2, students were taught MCII as a metacognitive strategy to be used on any upcoming concerns of the subsequent week. As compared to the week prior to the training, students in the MCII (vs. format control) condition improved in self-reported time management. In Study 3, MCII (vs. format control) helped working mothers who enrolled in a vocational business program to attend classes more regularly. The findings suggest that performing MCII on one’s everyday concerns improves time management.",
"title": ""
},
{
"docid": "85fc78cc3f71b784063b8b564e6509a9",
"text": "Numerous research papers have listed different vectors of personally identifiable information leaking via tradition al and mobile Online Social Networks (OSNs) and highlighted the ongoing aggregation of data about users visiting popular We b sites. We argue that the landscape is worsening and existing proposals (including the recent U.S. Federal Trade Commission’s report) do not address several key issues. We examined over 100 popular non-OSN Web sites across a number of categories where tens of millions of users representing d iverse demographics have accounts, to see if these sites leak private information to prominent aggregators. Our results raise considerable concerns: we see leakage in sites for every category we examined; fully 56% of the sites directly leak pieces of private information with this result growing to 75% if we also include leakage of a site userid. Sensitive search strings sent to healthcare Web sites and travel itineraries on flight reservation sites are leaked in 9 of the top 10 sites studied for each category. The community needs a clear understanding of the shortcomings of existing privac y protection measures and the new proposals. The growing disconnect between the protection measures and increasing leakage and linkage suggests that we need to move beyond the losing battle with aggregators and examine what roles first-party sites can play in protecting privacy of their use rs.",
"title": ""
},
{
"docid": "43269c32b765b0f5d5d0772e0b1c5906",
"text": "Silver nanoparticles (AgNPs) have been synthesized by Lantana camara leaf extract through simple green route and evaluated their antibacterial and catalytic activities. The leaf extract (LE) itself acts as both reducing and stabilizing agent at once for desired nanoparticle synthesis. The colorless reaction mixture turns to yellowish brown attesting the AgNPs formation and displayed UV-Vis absorption spectra. Structural analysis confirms the crystalline nature and formation of fcc structured metallic silver with majority (111) facets. Morphological studies elicit the formation of almost spherical shaped nanoparticles and as AgNO3 concentration is increased, there is an increment in the particle size. The FTIR analysis evidences the presence of various functional groups of biomolecules of LE is responsible for stabilization of AgNPs. Zeta potential measurement attests the higher stability of synthesized AgNPs. The synthesized AgNPs exhibited good antibacterial activity when tested against Escherichia coli, Pseudomonas spp., Bacillus spp. and Staphylococcus spp. using standard Kirby-Bauer disc diffusion assay. Furthermore, they showed good catalytic activity on the reduction of methylene blue by L. camara extract which is monitored and confirmed by the UV-Vis spectrophotometer.",
"title": ""
},
{
"docid": "b9cdda89b24a8595481933e268319e18",
"text": "Wireless hotspots allow users to use Internet via Wi-Fi interface, and many shops, cafés, parks, and airports provide free wireless hotspot services to attract customers. However, there is no authentication mechanism of Wi-Fi access points (APs) available in such hotspots, which makes them vulnerable to evil twin AP attacks. Such attacks are harmful because they allow to steal sensitive data from users. Today, there is no client-side mechanism that can effectively detect an evil twin AP attack without additional infrastructure supports. In this paper, we propose a mechanism CETAD leveraging public servers to detect such attacks. CETAD only requires installing an app at the client device and does not require to change the hotspot APs. CETAD explores the similarities between the legitimate APs and discrepancies between evil twin APs, and legitimate ones to detect an evil twin AP attack. Through our implementation and evaluation, we show that CETAD can detect evil twin AP attacks in various scenarios effectively.",
"title": ""
},
{
"docid": "c26346ffb5d1ea7cc18514a92f3105b8",
"text": "Ontologies are one of the core foundations of the Semantic Web. To participate in Semantic Web projects, domain experts need to be able to understand the ontologies involved. Visual notations can provide an overview of the ontology and help users to understand the connections among entities. However, the users first need to learn the visual notation before they can interpret it correctly. Controlled natural language representation would be readable right away and might be preferred in case of complex axioms, however, the structure of the ontology would remain less apparent. We propose to combine ontology visualizations with contextual ontology verbalizations of selected ontology (diagram) elements, displaying controlled natural language (CNL) explanations of OWL axioms corresponding to the selected visual notation elements. Thus, the domain experts will benefit from both the high-level overview provided by the graphical notation and the detailed textual explanations of particular elements in the diagram.",
"title": ""
}
] | scidocsrr |
144dd1ce7bca26bfa92bd1c5d9891e2c | Case Study: Extreme Programming in a University Environment | [
{
"docid": "f987c0af2814b3f7d75fc33c22530936",
"text": "All I Really Need to Know I Learned in Kindergarten By Robert Fulghum (Fulghum 1988) Share everything. Play fair. Don’t hit people. Put things back where you found them. Clean up your own mess. Don’t take things that aren’t yours. Say you’re sorry when you hurt somebody. Wash your hands before you eat. Flush. Warm cookies and cold milk are good for you. Live a balanced life – learn some and think some and draw and paint and sing and dance and play and work every day some. Take a nap every afternoon. When you go out into the world, watch out for traffic, hold hands and stick together. Be aware of wonder. Introduction Pair programming is a style of programming in which two programmers work side-by-side at one computer, continuously collaborating on the same design, algorithm, code or test. As discussed below, use of this practice has been demonstrated to improve productivity and quality of software products. Additionally, based on a survey(Williams 1999) of pair programmers (hereafter referred to as “the pair programming survey\"), 100% agreed that they had more confidence in their solution when pair programming than when they program alone. Likewise, 96% agreed that they enjoy their job more than when programming alone.",
"title": ""
},
{
"docid": "9b3a39ddeadd14ea5a50be8ac2057a26",
"text": "0 7 4 0 7 4 5 9 / 0 0 / $ 1 0 . 0 0 © 2 0 0 0 I E E E J u l y / A u g u s t 2 0 0 0 I E E E S O F T W A R E 19 design, algorithm, code, or test—does indeed improve software quality and reduce time to market. Additionally, student and professional programmers consistently find pair programming more enjoyable than working alone. Yet most who have not tried and tested pair programming reject the idea as a redundant, wasteful use of programming resources: “Why would I put two people on a job that just one can do? I can’t afford to do that!” But we have found, as Larry Constantine wrote, that “Two programmers in tandem is not redundancy; it’s a direct route to greater efficiency and better quality.”1 Our supportive evidence comes from professional programmers and from advanced undergraduate students who participated in a structured experiment. The experimental results show that programming pairs develop better code faster with only a minimal increase in prerelease programmer hours. These results apply to all levels of programming skill from novice to expert.",
"title": ""
}
] | [
{
"docid": "dd14599e6a4d2e83a7a476471be53d13",
"text": "This paper presents the modeling, design, fabrication, and measurement of microelectromechanical systems-enabled continuously tunable evanescent-mode electromagnetic cavity resonators and filters with very high unloaded quality factors (Qu). Integrated electrostatically actuated thin diaphragms are used, for the first time, for tuning the frequency of the resonators/filters. An example tunable resonator with 2.6:1 (5.0-1.9 GHz) tuning ratio and Qu of 300-650 is presented. A continuously tunable two-pole filter from 3.04 to 4.71 GHz with 0.7% bandwidth and insertion loss of 3.55-2.38 dB is also shown as a technology demonstrator. Mechanical stability measurements show that the tunable resonators/filters exhibit very low frequency drift (less than 0.5% for 3 h) under constant bias voltage. This paper significantly expands upon previously reported tunable resonators.",
"title": ""
},
{
"docid": "6efd4b5a06a18eee892e291211f1ca54",
"text": "Recent work has shown that optical flow estimation can be formulated as a supervised learning problem. Moreover, convolutional networks have been successfully applied to this task. However, supervised flow learning is obfuscated by the shortage of labeled training data. As a consequence, existing methods have to turn to large synthetic datasets for easily computer generated ground truth. In this work, we explore if a deep network for flow estimation can be trained without supervision. Using image warping by the estimated flow, we devise a simple yet effective unsupervised method for learning optical flow, by directly minimizing photometric consistency. We demonstrate that a flow network can be trained from endto-end using our unsupervised scheme. In some cases, our results come tantalizingly close to the performance of methods trained with full supervision.",
"title": ""
},
{
"docid": "2f2801e502492a648a0758b6e33fe19d",
"text": "Intel is developing the Intel® Software Guard Extensions (Intel® SGX) technology, an extension to Intel® Architecture for generating protected software containers. The container is referred to as an enclave. Inside the enclave, software’s code, data, and stack are protected by hardware enforced access control policies that prevent attacks against the enclave’s content. In an era where software and services are deployed over the Internet, it is critical to be able to securely provision enclaves remotely, over the wire or air, to know with confidence that the secrets are protected and to be able to save secrets in non-volatile memory for future use. This paper describes the technology components that allow provisioning of secrets to an enclave. These components include a method to generate a hardware based attestation of the software running inside an enclave and a means for enclave software to seal secrets and export them outside of the enclave (for example store them in non-volatile memory) such that only the same enclave software would be able un-seal them back to their original form.",
"title": ""
},
{
"docid": "5629a9cf39611bed79ce76e661dba2fe",
"text": "We investigate aspects of interoperability between a broad range of common annotation schemes for syntacto-semantic dependencies. With the practical goal of making the LinGO Redwoods Treebank accessible to broader usage, we contrast seven distinct annotation schemes of functor–argument structure, both in terms of syntactic and semantic relations. Drawing examples from a multi-annotated gold standard, we show how abstractly similar information can take quite different forms across frameworks. We further seek to shed light on the representational ‘distance’ between pure bilexical dependencies, on the one hand, and full-blown logical-form propositional semantics, on the other hand. Furthermore, we propose a fully automated conversion procedure from (logical-form) meaning representation to bilexical semantic dependencies.†",
"title": ""
},
{
"docid": "ccddd7df2b5246c44d349bfb0aae499a",
"text": "We consider stochastic multi-armed bandit problems with complex actions over a set of basic arms, where the decision maker plays a complex action rather than a basic arm in each round. The reward of the complex action is some function of the basic arms’ rewards, and the feedback observed may not necessarily be the reward per-arm. For instance, when the complex actions are subsets of the arms, we may only observe the maximum reward over the chosen subset. Thus, feedback across complex actions may be coupled due to the nature of the reward function. We prove a frequentist regret bound for Thompson sampling in a very general setting involving parameter, action and observation spaces and a likelihood function over them. The bound holds for discretely-supported priors over the parameter space without additional structural properties such as closed-form posteriors, conjugate prior structure or independence across arms. The regret bound scales logarithmically with time but, more importantly, with an improved constant that non-trivially captures the coupling across complex actions due to the structure of the rewards. As applications, we derive improved regret bounds for classes of complex bandit problems involving selecting subsets of arms, including the first nontrivial regret bounds for nonlinear MAX reward feedback from subsets.",
"title": ""
},
{
"docid": "659e71fb9274c47f369c37de751a91b2",
"text": "The Timed Up and Go (TUG) is a clinical test used widely to measure balance and mobility, e.g. in Parkinson's disease (PD). The test includes a sequence of functional activities, namely: sit-to-stand, 3-meters walk, 180° turn, walk back, another turn and sit on the chair. Meanwhile the stopwatch is used to score the test by measuring the time which the patients with PD need to perform the test. Here, the work presents an instrumented TUG using a wearable inertial sensor unit attached on the lower back of the person. The approach is used to automate the process of assessment compared with the manual evaluation by using visual observation and a stopwatch. The developed algorithm is based on the Dynamic Time Warping (DTW) for multi-dimensional time series and has been applied with the augmented feature for detection and duration assessment of turn state transitions, while a 1-dimensional DTW is used to detect the sit-to-stand and stand-to-sit phases. The feature set is a 3-dimensional vector which consists of the angular velocity, derived angle and features from Linear Discriminant Analysis (LDA). The algorithm was tested on 10 healthy individuals and 20 patients with PD (10 patients with early and late disease phases respectively). The test demonstrates that the developed technique can successfully extract the time information of the sit-to-stand, both turns and stand-to-sit transitions in the TUG test.",
"title": ""
},
{
"docid": "acecf40720fd293972555918878b805e",
"text": "This article outlines a number of important research issues in human-computer interaction in the e-commerce environment. It highlights some of the challenges faced by users in browsing Web sites and conducting searches for information, and suggests several areas of research for promoting ease of navigation and search. Also, it discusses the importance of trust in the online environment, describing some of the antecedents and consequences of trust, and provides guidelines for integrating trust into Web site design. The issues discussed in this article are presented under three broad categories of human-computer interaction – Web usability, interface design, and trust – and are intended to highlight what we believe are worthwhile areas for future research in e-commerce.",
"title": ""
},
{
"docid": "c1d7990c2c94ffd3ed16cce5947e4e27",
"text": "The introduction of online social networks (OSN) has transformed the way people connect and interact with each other as well as share information. OSN have led to a tremendous explosion of network-centric data that could be harvested for better understanding of interesting phenomena such as sociological and behavioural aspects of individuals or groups. As a result, online social network service operators are compelled to publish the social network data for use by third party consumers such as researchers and advertisers. As social network data publication is vulnerable to a wide variety of reidentification and disclosure attacks, developing privacy preserving mechanisms are an active research area. This paper presents a comprehensive survey of the recent developments in social networks data publishing privacy risks, attacks, and privacy-preserving techniques. We survey and present various types of privacy attacks and information exploited by adversaries to perpetrate privacy attacks on anonymized social network data. We present an in-depth survey of the state-of-the-art privacy preserving techniques for social network data publishing, metrics for quantifying the anonymity level provided, and information loss as well as challenges and new research directions. The survey helps readers understand the threats, various privacy preserving mechanisms, and their vulnerabilities to privacy breach attacks in social network data publishing as well as observe common themes and future directions.",
"title": ""
},
{
"docid": "12579b211831d9df508ecd1f90469399",
"text": "This article considers stochastic algorithms for efficiently solving a class of large scale non-linear least squares (NLS) problems which frequently arise in applications. We propose eight variants of a practical randomized algorithm where the uncertainties in the major stochastic steps are quantified. Such stochastic steps involve approximating the NLS objective function using Monte-Carlo methods, and this is equivalent to the estimation of the trace of corresponding symmetric positive semi-definite (SPSD) matrices. For the latter, we prove tight necessary and sufficient conditions on the sample size (which translates to cost) to satisfy the prescribed probabilistic accuracy. We show that these conditions are practically computable and yield small sample sizes. They are then incorporated in our stochastic algorithm to quantify the uncertainty in each randomized step. The bounds we use are applications of more general results regarding extremal tail probabilities of linear combinations of gamma distributed random variables. We derive and prove new results concerning the maximal and minimal tail probabilities of such linear combinations, which can be considered independently of the rest of this paper.",
"title": ""
},
{
"docid": "619f38266a35e76a77fb4141879e1e68",
"text": "In article various approaches to measurement of efficiency of innovations and the problems arising at their measurement are considered, the system of an indistinct conclusion for the solution of a problem of obtaining recommendations about measurement of efficiency of innovations is offered.",
"title": ""
},
{
"docid": "6975d01d114a8ecd45188cb99fd8b770",
"text": "Flowerlike α-Fe(2)O(3) nanostructures were synthesized via a template-free microwave-assisted solvothermal method. All chemicals used were low-cost compounds and environmentally benign. These flowerlike α-Fe(2)O(3) nanostructures had high surface area and abundant hydroxyl on their surface. When tested as an adsorbent for arsenic and chromium removal, the flowerlike α-Fe(2)O(3) nanostructures showed excellent adsorption properties. The adsorption mechanism for As(V) and Cr(VI) onto flowerlike α-Fe(2)O(3) nanostructures was elucidated by X-ray photoelectron spectroscopy and synchrotron-based X-ray absorption near edge structure analysis. The results suggested that ion exchange between surface hydroxyl groups and As(V) or Cr(VI) species was accounted for by the adsorption. With maximum capacities of 51 and 30 mg g(-1) for As(V) and Cr(VI), respectively, these low-cost flowerlike α-Fe(2)O(3) nanostructures are an attractive adsorbent for the removal of As(V) and Cr(VI) from water.",
"title": ""
},
{
"docid": "141cab8897e01abef28bf2c2a78874e1",
"text": "Botnet is a network of compromised computers controlled by the attacker(s) from remote locations via Command and Control (C&C) channels. The botnets are one of the largest global threats to the Internet-based commercial and social world. The decentralized Peer-to-Peer (P2P) botnets have appeared in the recent past and are growing at a faster pace. These P2P botnets are continuously evolving from diverse C&C protocols using hybrid structures and are turning to be more complicated and stealthy. In this paper, we present a comprehensive survey of the evolution, functionalities, modelling and the development life cycle of P2P botnets. Further, we investigate the various P2P botnet detection approaches. Finally, discuss the key research challenges useful for the research initiatives. This paper is useful in understanding the P2P botnets and gives an insight into the usefulness and limitations of the various P2P botnet detection techniques proposed by the researchers. The study will enable the researchers toward proposing the more useful detection techniques.",
"title": ""
},
{
"docid": "52e1c954aefca110d15c24d90de902b2",
"text": "Reinforcement learning (RL) agents can benefit from adaptive exploration/exploitation behavior, especially in dynamic environments. We focus on regulating this exploration/exploitation behavior by controlling the action-selection mechanism of RL. Inspired by psychological studies which show that affect influences human decision making, we use artificial affect to influence an agent’s action-selection. Two existing affective strategies are implemented and, in addition, a new hybrid method that combines both. These strategies are tested on ‘maze tasks’ in which a RL agent has to find food (rewarded location) in a maze. We use Soar-RL, the new RL-enabled version of Soar, as a model environment. One task tests the ability to quickly adapt to an environmental change, while the other tests the ability to escape a local optimum in order to find the global optimum. We show that artificial affect-controlled action-selection in some cases helps agents to faster adapt to changes in the environment.",
"title": ""
},
{
"docid": "c62fc94fc0fe403f3a416d897b6b9336",
"text": "Nutrigenomics is the application of high-throughput genomics tools in nutrition research. Applied wisely, it will promote an increased understanding of how nutrition influences metabolic pathways and homeostatic control, how this regulation is disturbed in the early phase of a diet-related disease and to what extent individual sensitizing genotypes contribute to such diseases. Ultimately, nutrigenomics will allow effective dietary-intervention strategies to recover normal homeostasis and to prevent diet-related diseases.",
"title": ""
},
{
"docid": "04956fbf44b2a1d7164325fc395c019a",
"text": "The ever-growing number of people using Twitter makes it a valuable source of timely information. However, detecting events in Twitter is a difficult task, because tweets that report interesting events are overwhelmed by a large volume of tweets on unrelated topics. Existing methods focus on the textual content of tweets and ignore the social aspect of Twitter. In this paper, we propose mention-anomaly-based event detection (MABED), a novel statistical method that relies solely on tweets and leverages the creation frequency of dynamic links (i.e., mentions) that users insert in tweets to detect significant events and estimate the magnitude of their impact over the crowd. MABED also differs from the literature in that it dynamically estimates the period of time during which each event is discussed, rather than assuming a predefined fixed duration for all events. The experiments we conducted on both English and French Twitter data show that the mention-anomaly-based approach leads to more accurate event detection and improved robustness in presence of noisy Twitter content. Qualitatively speaking, we find that MABED helps with the interpretation of detected events by providing clear textual descriptions and precise temporal descriptions. We also show how MABED can help understanding users’ interest. Furthermore, we describe three visualizations designed to favor an efficient exploration of the detected events.",
"title": ""
},
{
"docid": "df32741927ce78904e5845203b1d8583",
"text": "Powerful specialized software is essential for managing, quantifying, and ultimately deriving scientific insight from results of a microarray experiment. We have developed a suite of software applications, known as TM4, to support such gene expression studies. The suite consists of open-source tools for data management and reporting, image analysis, normalization and pipeline control, and data mining and visualization. An integrated MIAME-compliant MySQL database is included. This chapter describes each component of the suite and includes a sample analysis walk-through.",
"title": ""
},
{
"docid": "c01fe3b589479fb14568ce1e00a08125",
"text": "Purpose – The purpose of this paper is to propose a model to examine the impact of organizational support on behavioral intention (BI) regarding enterprise resource planning (ERP) implementation based on the technology acceptance model (TAM). Design/methodology/approach – A research model is proposed which describes the effects of organizational support, both formal and informal, on factors of TAM. A survey questionnaire is developed to test the proposed model. A total of 700 of questionnaires are distributed to users in small and medium enterprises that have implemented ERP systems in Korea and 209 responses are used for analyses. Structural equation modeling is employed to test the research hypotheses. Findings – The results indicate that the organizational support is an important factor for perceived usefulness (PU) and perceived ease of use (PEOU). PU and PEOU seem to lead to a higher level of interest in the ERP system and BI to use the system. The most notable finding of our study is that organizational support is positively associated with factors of TAM. Research limitations/implications – The survey data used in this paper are collected from smalland medium-sized companies in South Korea. Thus, the respondents in these firms might have been trained at different levels or on different modules of ERP, which would yield diversity in subject experience with different ERP systems. Originality/value – To improve the efficiency and effectiveness of ERP implementation in a real world environment, organizations need to better understand user satisfaction. The TAM model provides a theoretical construct to explain how user satisfaction is affected.",
"title": ""
},
{
"docid": "cfcc5b98ebebe08475d68667aacaf46f",
"text": "Sequence alignment is an important task in bioinformatics which involves typical database search where data is in the form of DNA, RNA or protein sequence. For alignment various methods have been devised starting from pairwise alignment to multiple sequence alignment (MSA). To perform multiple sequence alignment various methods exists like progressive, iterative and concepts of dynamic programming in which we use Needleman Wunsch and Smith Waterman algorithms. This paper discusses various sequence alignment methods including their advantages and disadvantages. The alignment results of DNA sequence of chimpanzee and gorilla are shown.",
"title": ""
},
{
"docid": "6dbc238948d555578039ed268f3d4f51",
"text": "Chidi Okafor, David M. Ward, Michele H. Mokrzycki, Robert Weinstein, Pamela Clark, and Rasheed A. Balogun* Department of Medicine, Division of Nephrology, University of Virginia Health System, Charlottesville, Virginia Department of Medicine, University of California, San Diego, California Department of Medicine, Albert Einstein College of Medicine, Bronx, New York Departments of Medicine and Pathology, University of Massachusetts, Amherst, Massachusetts Department of Pathology, University of Virginia, Charlottesville, Virginia",
"title": ""
}
] | scidocsrr |
e173053430b9612fdc518cf83dc7a7d2 | Novel Leakage Detection by Ensemble CNN-SVM and Graph-Based Localization in Water Distribution Systems | [
{
"docid": "3f45d5b611b59e0bcaa0ff527d11f5af",
"text": "Ensemble methods use multiple models to get better performance. Ensemble methods have been used in multiple research fields such as computational intelligence, statistics and machine learning. This paper reviews traditional as well as state-of-the-art ensemble methods and thus can serve as an extensive summary for practitioners and beginners. The ensemble methods are categorized into conventional ensemble methods such as bagging, boosting and random forest, decomposition methods, negative correlation learning methods, multi-objective optimization based ensemble methods, fuzzy ensemble methods, multiple kernel learning ensemble methods and deep learning based ensemble methods. Variations, improvements and typical applications are discussed. Finally this paper gives some recommendations for future research directions.",
"title": ""
},
{
"docid": "b9d25bdbb337a9d16a24fa731b6b479d",
"text": "The implementation of effective strategies to manage leaks represents an essential goal for all utilities involved with drinking water supply in order to reduce water losses affecting urban distribution networks. This study concerns the early detection of leaks occurring in small-diameter customers’ connections to water supply networks. An experimental campaign was carried out in a test bed to investigate the sensitivity of Acoustic Emission (AE) monitoring to water leaks. Damages were artificially induced on a polyethylene pipe (length 28 m, outer diameter 32 mm) at different distances from an AE transducer. Measurements were performed in both unburied and buried pipe conditions. The analysis permitted the identification of a clear correlation between three monitored parameters (namely total Hits, Cumulative Counts and Cumulative Amplitude) and the characteristics of the examined leaks.",
"title": ""
},
{
"docid": "a9931e49d853b5c35735bb7770ceeee1",
"text": "Human activity recognition involves classifying times series data, measured at inertial sensors such as accelerometers or gyroscopes, into one of pre-defined actions. Recently, convolutional neural network (CNN) has established itself as a powerful technique for human activity recognition, where convolution and pooling operations are applied along the temporal dimension of sensor signals. In most of existing work, 1D convolution operation is applied to individual univariate time series, while multi-sensors or multi-modality yield multivariate time series. 2D convolution and pooling operations are applied to multivariate time series, in order to capture local dependency along both temporal and spatial domains for uni-modal data, so that it achieves high performance with less number of parameters compared to 1D operation. However for multi-modal data existing CNNs with 2D operation handle different modalities in the same way, which cause interferences between characteristics from different modalities. In this paper, we present CNNs (CNN-pf and CNN-pff), especially CNN-pff, for multi-modal data. We employ both partial weight sharing and full weight sharing for our CNN models in such a way that modality-specific characteristics as well as common characteristics across modalities are learned from multi-modal (or multi-sensor) data and are eventually aggregated in upper layers. Experiments on benchmark datasets demonstrate the high performance of our CNN models, compared to state of the arts methods.",
"title": ""
}
] | [
{
"docid": "e730935b097cb4c4f36221d774d2e63a",
"text": "This paper outlines key design principles of Scilla—an intermediatelevel language for verified smart contracts. Scilla provides a clean separation between the communication aspect of smart contracts on a blockchain, allowing for the rich interaction patterns, and a programming component, which enjoys principled semantics and is amenable to formal verification. Scilla is not meant to be a high-level programming language, and we are going to use it as a translation target for high-level languages, such as Solidity, for performing program analysis and verification, before further compilation to an executable bytecode. We describe the automata-based model of Scilla, present its programming component and show how contract definitions in terms of automata streamline the process of mechanised verification of their safety and temporal properties.",
"title": ""
},
{
"docid": "972fe2e08a7317a674115e361eed898f",
"text": "The topic of emotions in the workplace is beginning to garner closer attention by researchers and theorists. The study of emotional labor addresses the stress of managing emotions when the work role demands that certain expressions be shown to customers. However, there has been no overarching framework to guide this work, and the previous studies have often disagreed on the definition and operationalization of emotional labor. The purposes of this article are as follows: to review and compare previous perspectives of emotional labor, to provide a definition of emotional labor that integrates these perspectives, to discuss emotion regulation as a guiding theory for understanding the mechanisms of emotional labor, and to present a model of emotional labor that includes individual differences (such as emotional intelligence) and organizational factors (such as supervisor support).",
"title": ""
},
{
"docid": "493b22055a1b9bda564c2c1ae6727cba",
"text": "Earlier studies have introduced a list of high-level evaluation criteria to assess how well a language supports generic programming. Since each language that meets all criteria is considered generic, those criteria are not fine-grained enough to differentiate between languages for generic programming. We refine these criteria into a taxonomy that captures differences between type classes in Haskell and concepts in C++, and discuss which differences are incidental and which ones are due to other language features. The taxonomy allows for an improved understanding of language support for generic programming, and the comparison is useful for the ongoing discussions among language designers and users of both languages.",
"title": ""
},
{
"docid": "3bf252bcb0953016cc5a834d9d9325d3",
"text": "This paper proposes a digital phase leading filter current compensation (PLFCC) technique for a continuous conduction mode boost power factor correction to improve PF in high line voltage and light load conditions. The proposed technique provides a corrected average inductor current reference and utilizes an enhanced duty ratio feed-forward technique which can cancel the adverse effect of the phase leading currents caused by filter capacitors. Moreover, the proposed PLFCC technique also provides the switching dead-zone in nature so the switching loss can be reduced. Therefore, the proposed PLFCC can significantly improve power quality and can achieve a high efficiency in high line voltage and light load conditions. The principle and analysis of the proposed PLFCC are presented, and performance and feasibility are verified by experimental results from the universal input (90-260 VAC) and 750 W-400 V output laboratory prototype.",
"title": ""
},
{
"docid": "ba5b5732dd7c48874e4f216903bba0b1",
"text": "This article presents a review of the application of insole plantar pressure sensor system in recognition and analysis of the hemiplegic gait in stroke patients. Based on the review, tailor made 3D insoles for plantar pressure measurement were designed and fabricated. The function is to compare with that of conventional flat insoles. Tailor made 3D contour of the insole can improve the contact between insole and foot and enable sampling plantar pressure at a high reproducibility.",
"title": ""
},
{
"docid": "456b7ad01115d9bc04ca378f1eb6d7f2",
"text": "Article history: Received 13 October 2007 Received in revised form 12 June 2008 Accepted 31 July 2008",
"title": ""
},
{
"docid": "99574bec7125cfa9e2ebc19bb6bb4bf5",
"text": "Health care delivery and education has become a challenge for providers. Nurses and other professionals are challenged daily to assure that the patient has the necessary information to make informed decisions. Patients and their families are given a multitude of information about their health and commonly must make important decisions from these facts. Obstacles that prevent easy delivery of health care information include literacy, culture, language, and physiological barriers. It is up to the nurse to assess and evaluate the patient's learning needs and readiness to learn because everyone learns differently. This article will examine how each of these barriers impact care delivery along with teaching and learning strategies will be examined.",
"title": ""
},
{
"docid": "8b7d3410e279f335f3ed5c6d6e9b60bc",
"text": "A wideband patch antenna loaded with a planar metamaterial unit cell is proposed. The metamaterial unit cell is composed of an interdigital capacitor and a complementary split-ring resonator (CSRR) slot. A dispersion analysis of the metamaterial unit cell reveals that an increase in series capacitance can decrease the half-wavelength resonance frequency, thus reducing the electrical size of the proposed antenna. In addition, circulating current distributions around the CSRR slot with increased interdigital finger length bring about the TM01 mode radiation, while the normal radiation mode is the TM10 mode. Furthermore, the TM01 mode can be combined with the TM10 mode without a pattern distortion. The hybridization of the two modes yields a wideband property (6.8%) and a unique radiation pattern that is comparable with two independent dipole antennas positioned orthogonally. Also, the proposed antenna achieves high efficiency (96%) and reasonable gain (3.85 dBi), even though the electrical size of the antenna is only 0.24λ0×0.24λ0×0.02λ0.",
"title": ""
},
{
"docid": "2701f46ac9a473cb809773df5ae1d612",
"text": "Testing and measuring the security of software system architectures is a difficult task. An attempt is made in this paper to analyze the issues of architecture security of object-oriented software’s using common security concepts to evaluate the security of a system under design. Object oriented systems are based on various architectures like COM, DCOM, CORBA, MVC and Broker. In object oriented technology the basic system component is an object. Individual system component is posing it own risk in the system. Security policies and the associated risk in these software architectures can be calculated for the individual component. Overall risk can be calculated based on the context and risk factors in the architecture. Small risk factors get accumulated together and form a major risk in the systems and can damage the systems.",
"title": ""
},
{
"docid": "5e0921d158f0fa7b299fffba52f724d5",
"text": "Space syntax derives from a set of analytic measures of configuration that have been shown to correlate well with how people move through and use buildings and urban environments. Space syntax represents the open space of an environment in terms of the intervisibility of points in space. The measures are thus purely configurational, and take no account of attractors, nor do they make any assumptions about origins and destinations or path planning. Space syntax has found that, despite many proposed higher-level cognitive models, there appears to be a fundamental process that informs human and social usage of an environment. In this paper we describe an exosomatic visual architecture, based on space syntax visibility graphs, giving many agents simultaneous access to the same pre-processed information about the configuration of a space layout. Results of experiments in a simulated retail environment show that a surprisingly simple ‘random next step’ based rule outperforms a more complex ‘destination based’ rule in reproducing observed human movement behaviour. We conclude that the effects of spatial configuration on movement patterns that space syntax studies have found are consistent with a model of individual decision behaviour based on the spatial affordances offered by the morphology of the local visual field.",
"title": ""
},
{
"docid": "8b66ffe2afae5f1f46b7803d80422248",
"text": "This paper describes the torque production capabilities of electrical machines with planar windings and presents an automated procedure for coils conductors' arrangement. The procedure has been applied on an ironless axial flux slotless permanent magnet machines having stator windings realized using printed circuit board (PCB) coils. An optimization algorithm has been implemented to find a proper arrangement of PCB traces in order to find the best compromise between the maximization of average torque and the minimization of torque ripple. A time-efficient numerical model has been developed to reduce computational load and thus make the optimization based design feasible.",
"title": ""
},
{
"docid": "035feb63adbe5f83b691e8baf89629cc",
"text": "In this article we study the problem of document image representation based on visual features. We propose a comprehensive experimental study that compares three types of visual document image representations: (1) traditional so-called shallow features, such as the RunLength and the Fisher-Vector descriptors, (2) deep features based on Convolutional Neural Networks, and (3) features extracted from hybrid architectures that take inspiration from the two previous ones. We evaluate these features in several tasks ( i.e. classification, clustering, and retrieval) and in different setups ( e.g. domain transfer) using several public and in-house datasets. Our results show that deep features generally outperform other types of features when there is no domain shift and the new task is closely related to the one used to train the model. However, when a large domain or task shift is present, the Fisher-Vector shallow features generalize better and often obtain the best results.",
"title": ""
},
{
"docid": "6ee2d94f0ccebbb05df2ea4b79b30976",
"text": "Received: 25 June 2013 Revised: 11 October 2013 Accepted: 25 November 2013 Abstract This paper distinguishes and contrasts two design science research strategies in information systems. In the first strategy, a researcher constructs or builds an IT meta-artefact as a general solution concept to address a class of problem. In the second strategy, a researcher attempts to solve a client’s specific problem by building a concrete IT artefact in that specific context and distils from that experience prescriptive knowledge to be packaged into a general solution concept to address a class of problem. The two strategies are contrasted along 16 dimensions representing the context, outcomes, process and resource requirements. European Journal of Information Systems (2015) 24(1), 107–115. doi:10.1057/ejis.2013.35; published online 7 January 2014",
"title": ""
},
{
"docid": "91e0722c00b109d7db137fb3468c088a",
"text": "This paper proposes a novel flexible piezoelectric micro-machined ultrasound transducer, which is based on PZT and a polyimide substrate. The transducer is made on the polyimide substrate and packaged with medical polydimethylsiloxane. Instead of etching the PZT ceramic, this paper proposes a method of putting diced PZT blocks into holes on the polyimide which are pre-etched. The device works in d31 mode and the electromechanical coupling factor is 22.25%. Its flexibility, good conformal contacting with skin surfaces and proper resonant frequency make the device suitable for heart imaging. The flexible packaging ultrasound transducer also has a good waterproof performance after hundreds of ultrasonic electric tests in water. It is a promising ultrasound transducer and will be an effective supplementary ultrasound imaging method in the practical applications.",
"title": ""
},
{
"docid": "6d44c4244064634deda30a5059acd87e",
"text": "Currently, gene sequence genealogies of the Oligotrichea Bütschli, 1889 comprise only few species. Therefore, a cladistic approach, especially to the Oligotrichida, was made, applying Hennig's method and computer programs. Twenty-three characters were selected and discussed, i.e., the morphology of the oral apparatus (five characters), the somatic ciliature (eight characters), special organelles (four characters), and ontogenetic particulars (six characters). Nine of these characters developed convergently twice. Although several new features were included into the analyses, the cladograms match other morphological trees in the monophyly of the Oligotrichea, Halteriia, Oligotrichia, Oligotrichida, and Choreotrichida. The main synapomorphies of the Oligotrichea are the enantiotropic division mode and the de novo-origin of the undulating membranes. Although the sister group relationship of the Halteriia and the Oligotrichia contradicts results obtained by gene sequence analyses, no morphologic, ontogenetic or ultrastructural features were found, which support a branching of Halteria grandinella within the Stichotrichida. The cladistic approaches suggest paraphyly of the family Strombidiidae probably due to the scarce knowledge. A revised classification of the Oligotrichea is suggested, including all sufficiently known families and genera.",
"title": ""
},
{
"docid": "4cfc991f626f6fc9d131514985863127",
"text": "Simultaneous recordings from large neural populations are becoming increasingly common. An important feature of population activity is the trial-to-trial correlated fluctuation of spike train outputs from recorded neuron pairs. Similar to the firing rate of single neurons, correlated activity can be modulated by a number of factors, from changes in arousal and attentional state to learning and task engagement. However, the physiological mechanisms that underlie these changes are not fully understood. We review recent theoretical results that identify three separate mechanisms that modulate spike train correlations: changes in input correlations, internal fluctuations and the transfer function of single neurons. We first examine these mechanisms in feedforward pathways and then show how the same approach can explain the modulation of correlations in recurrent networks. Such mechanistic constraints on the modulation of population activity will be important in statistical analyses of high-dimensional neural data.",
"title": ""
},
{
"docid": "ad2a1afc5602057d76caa34abc92feba",
"text": "We have developed a proprietary package that is fully compatible with variously sized chips. In this paper, we present design and development of a Quad Flat No-Lead (QFN) package. We will show how we have built and characterized low-loss packages using standard Printed Circuit Board (PCB) laminate materials. In particular, this package has been developed using Liquid Crystal Polymer (LCP). These packages are unique in that they fully account for and incorporate solder joint and ball bond wire parasitic effects into design. The package has a large cavity section that allow for a variety of chips and decoupling capacitors to be quickly and easily packaged. Insertion loss through a single package transition is measured to be less than 0.4 dB across DC to 40 GHz. Return losses are measured to be better than 15 dB up through 40 GHz. Further, a bare die low noise amplifier (LNA) is packaged using this technology and measured after being surface mounted onto PCB. The packaged LNA is measured to show 19 dB gain over 32 GHz to 44 GHz. Return loss for both bare die and packaged version show no difference, and both measure 15 dB. The LCP package LNA exhibits 4.5 dB noise figure over 37 GHz to 40 GHz. Keywords-Hybrid integrated circuit packaging, liquid crystal polymer, and microwave devices",
"title": ""
},
{
"docid": "4d32e09258fb80eb7f79c25549f808b7",
"text": "Data-efficient learning in continuous state-action spaces using very high-dimensional observations remains a key challenge in developing fully autonomous systems. In this paper, we consider one instance of this challenge, the pixels to torques problem, where an agent must learn a closed-loop control policy from pixel information only. We introduce a data-efficient, model-based reinforcement learning algorithm that learns such a closed-loop policy directly from pixel information. The key ingredient is a deep dynamical model that uses deep autoencoders to learn a low-dimensional embedding of images jointly with a predictive model in this low-dimensional feature space. Joint learning ensures that not only static but also dynamic properties of the data are accounted for. This is crucial for long-term predictions, which lie at the core of the adaptive model predictive control strategy that we use for closed-loop control. Compared to state-of-the-art reinforcement learning methods for continuous states and actions, our approach learns quickly, scales to highdimensional state spaces and is an important step toward fully autonomous learning from pixels to torques.",
"title": ""
},
{
"docid": "b0afcee1ac7ce691f60302dd8298b633",
"text": "With the increase of online customer opinions in specialised websites and social networks, the necessity of automatic systems to help to organise and classify customer reviews by domain-specific aspect/categories and sentiment polarity is more important than ever. Supervised approaches for Aspect Based Sentiment Analysis obtain good results for the domain/language they are trained on, but having manually labelled data for training supervised systems for all domains and languages is usually very costly and time consuming. In this work we describe W2VLDA, an almost unsupervised system based on topic modelling, that combined with some other unsupervised methods and a minimal configuration, performs aspect/category classification, aspectterms/opinion-words separation and sentiment polarity classification for any given domain and language. We evaluate the performance of the aspect and sentiment classification in the multilingual SemEval 2016 task 5 (ABSA) dataset. We show competitive results for several languages (English, Spanish, French and Dutch) and domains (hotels, restaurants, electronic devices).",
"title": ""
},
{
"docid": "a62c1426e09ab304075e70b61773914f",
"text": "Converting a scanned or shot line drawing image into a vector graph can facilitate further editand reuse, making it a hot research topic in computer animation and image processing. Besides avoiding noiseinfluence, its main challenge is to preserve the topological structures of the original line drawings, such as linejunctions, in the procedure of obtaining a smooth vector graph from a rough line drawing. In this paper, wepropose a vectorization method of line drawings based on junction analysis, which retains the original structureunlike done by existing methods. We first combine central line tracking and contour tracking, which allowsus to detect the encounter of line junctions when tracing a single path. Then, a junction analysis approachbased on intensity polar mapping is proposed to compute the number and orientations of junction branches.Finally, we make use of bending degrees of contour paths to compute the smoothness between adjacent branches,which allows us to obtain the topological structures corresponding to the respective ones in the input image.We also introduce a correction mechanism for line tracking based on a quadratic surface fitting, which avoidsaccumulating errors of traditional line tracking and improves the robustness for vectorizing rough line drawings.We demonstrate the validity of our method through comparisons with existing methods, and a large amount ofexperiments on both professional and amateurish line drawing images. 本文提出一种基于交叉点分析的线条矢量化方法, 克服了现有方法难以保持拓扑结构的不足。通过中心路径跟踪和轮廓路径跟踪相结合的方式, 准确检测交叉点的出现提出一种基于极坐标亮度映射的交叉点分析方法, 计算交叉点的分支数量和朝向; 利用轮廓路径的弯曲角度判断交叉点相邻分支间的光顺度, 从而获得与原图一致的拓扑结构。",
"title": ""
}
] | scidocsrr |
ca3c7d5557af8b229bdc140df64ad055 | Enrichr: a comprehensive gene set enrichment analysis web server 2016 update | [
{
"docid": "246f56b1b5aa4f095c6dd281a670210f",
"text": "The Allen Brain Atlas (http://www.brain-map.org) provides a unique online public resource integrating extensive gene expression data, connectivity data and neuroanatomical information with powerful search and viewing tools for the adult and developing brain in mouse, human and non-human primate. Here, we review the resources available at the Allen Brain Atlas, describing each product and data type [such as in situ hybridization (ISH) and supporting histology, microarray, RNA sequencing, reference atlases, projection mapping and magnetic resonance imaging]. In addition, standardized and unique features in the web applications are described that enable users to search and mine the various data sets. Features include both simple and sophisticated methods for gene searches, colorimetric and fluorescent ISH image viewers, graphical displays of ISH, microarray and RNA sequencing data, Brain Explorer software for 3D navigation of anatomy and gene expression, and an interactive reference atlas viewer. In addition, cross data set searches enable users to query multiple Allen Brain Atlas data sets simultaneously. All of the Allen Brain Atlas resources can be accessed through the Allen Brain Atlas data portal.",
"title": ""
}
] | [
{
"docid": "1eafc02a19766817536f3da89230b4cf",
"text": "Basically, Bayesian Belief Networks (BBNs) as probabilistic tools provide suitable facilities for modelling process under uncertainty. A BBN applies a Directed Acyclic Graph (DAG) for encoding relations between all variables in state of problem. Finding the beststructure (structure learning) ofthe DAG is a classic NP-Hard problem in BBNs. In recent years, several algorithms are proposed for this task such as Hill Climbing, Greedy Thick Thinning and K2 search. In this paper, we introduced Simulated Annealing algorithm with complete details as new method for BBNs structure learning. Finally, proposed algorithm compared with other structure learning algorithms based on classification accuracy and construction time on valuable databases. Experimental results of research show that the simulated annealing algorithmis the bestalgorithmfrom the point ofconstructiontime but needs to more attention for classification process.",
"title": ""
},
{
"docid": "30dcd32d4b94fa5b269b711b3b0e49cd",
"text": "The basic idea of process mining is to extract knowledge from event logs recorded by an information system. Until recently, the information in these event logs was rarely used to analyze the underlying processes. Process mining aims at improving this by providing techniques and tools for discovering process, organizational, social, and performance information from event logs. Fuelled by the omnipresence of event logs in transactional information systems (cf. WFM, ERP, CRM, SCM, and B2B systems), process mining has become a vivid research area [1, 2]. In this paper we introduce the challenging process mining domain and discuss a heuristics driven process mining algorithm; the so-called “HeuristicsMiner” in detail. HeuristicsMiner is a practical applicable mining algorithm that can deal with noise, and can be used to express the main behavior (i.e. not all details and exceptions) registered in an event log. In the experimental section of this paper we introduce benchmark material (12.000 different event logs) and measurements by which the performance of process mining algorithms can be measured.",
"title": ""
},
{
"docid": "045a56e333b1fe78677b8f4cc4c20ecc",
"text": "Swarm robotics is an approach to collective robotics that takes inspiration from the self-organized behaviors of social animals. Through simple rules and local interactions, swarm robotics aims at designing robust, scalable, and flexible collective behaviors for the coordination of large numbers of robots. In this paper, we analyze the literature from the point of view of swarm engineering: we focus mainly on ideas and concepts that contribute to the advancement of swarm robotics as an engineering field and that could be relevant to tackle real-world applications. Swarm engineering is an emerging discipline that aims at defining systematic and well founded procedures for modeling, designing, realizing, verifying, validating, operating, and maintaining a swarm robotics system. We propose two taxonomies: in the first taxonomy, we classify works that deal with design and analysis methods; in the second taxonomy, we classify works according to the collective behavior studied. We conclude with a discussion of the current limits of swarm robotics as an engineering discipline and with suggestions for future research directions.",
"title": ""
},
{
"docid": "dbe8e36bd7d1323ab4da0e1a3213f62e",
"text": "Problem: Parallels have been drawn between the rise of the internet in 1990s and the present rise of bitcoin (cryptocurrency) and underlying blockchain technology. This resulted in a widespread of media coverage due to extreme price fluctuations and increased supply and demand. Garcia et al. (2014) argues that this is driven by several social aspects including word-of-mouth communication on social media, indicating that this aspect of social media effects individual attitude formation and intention towards cryptocurrency. However, this combination of social media of antecedent of consumer acceptance is limited explored, especially in the context of technology acceptance. Purpose: The purpose of this thesis is to create further understanding in the Technology Acceptance Model with the additional construct: social influence, first suggested by Malhotra et al. (1999). Hereby, the additional construct of social media influence was added to advance the indirect effects of social media influence on attitude formation and behavioural intention towards cryptocurrency, through the processes of social influence (internalization; identification; compliance) by Kelman. Method: This study carries out a quantitative study where survey-research was used that included a total sample of 250 cases. This sample consists of individuals between 18-37 years old, where social media usage is part of the life. As a result of the data collection, analysis was conducted using multiple regression techniques. Conclusion: Analysis of the findings established theoretical validation of the appliance of the Technology Acceptance Model on digital innovation, like cryptocurrency. By adding the construct of social media, further understanding is created in the behaviour of millennials towards cryptocurrency. The evidence suggests that there are clear indirect effects of social media on attitude formation and intention towards engaging in cryptocurrency through the processes of social influence. This study should be seen as preliminary, where future research could be built upon. More specifically, in terms of consumer acceptance of cryptocurrency and the extent of influence by social media.",
"title": ""
},
{
"docid": "71759cdcf18dabecf1d002727eb9d8b8",
"text": "A commonly observed neural correlate of working memory is firing that persists after the triggering stimulus disappears. Substantial effort has been devoted to understanding the many potential mechanisms that may underlie memory-associated persistent activity. These rely either on the intrinsic properties of individual neurons or on the connectivity within neural circuits to maintain the persistent activity. Nevertheless, it remains unclear which mechanisms are at play in the many brain areas involved in working memory. Herein, we first summarize the palette of different mechanisms that can generate persistent activity. We then discuss recent work that asks which mechanisms underlie persistent activity in different brain areas. Finally, we discuss future studies that might tackle this question further. Our goal is to bridge between the communities of researchers who study either single-neuron biophysical, or neural circuit, mechanisms that can generate the persistent activity that underlies working memory.",
"title": ""
},
{
"docid": "53a55e8aa8b3108cdc8d015eabb3476d",
"text": "We investigate a family of poisoning attacks against Support Vector Machines (SVM). Such attacks inject specially crafted training data that increases the SVM’s test error. Central to the motivation for these attacks is the fact that most learning algorithms assume that their training data comes from a natural or well-behaved distribution. However, this assumption does not generally hold in security-sensitive settings. As we demonstrate, an intelligent adversary can, to some extent, predict the change of the SVM’s decision function due to malicious input and use this ability to construct malicious data. The proposed attack uses a gradient ascent strategy in which the gradient is computed based on properties of the SVM’s optimal solution. This method can be kernelized and enables the attack to be constructed in the input space even for non-linear kernels. We experimentally demonstrate that our gradient ascent procedure reliably identifies good local maxima of the non-convex validation error surface, which significantly increases the classifier’s test error.",
"title": ""
},
{
"docid": "124f40ccd178e6284cc66b88da98709d",
"text": "The tripeptide glutathione is the thiol compound present in the highest concentration in cells of all organs. Glutathione has many physiological functions including its involvement in the defense against reactive oxygen species. The cells of the human brain consume about 20% of the oxygen utilized by the body but constitute only 2% of the body weight. Consequently, reactive oxygen species which are continuously generated during oxidative metabolism will be generated in high rates within the brain. Therefore, the detoxification of reactive oxygen species is an essential task within the brain and the involvement of the antioxidant glutathione in such processes is very important. The main focus of this review article will be recent results on glutathione metabolism of different brain cell types in culture. The glutathione content of brain cells depends strongly on the availability of precursors for glutathione. Different types of brain cells prefer different extracellular glutathione precursors. Glutathione is involved in the disposal of peroxides by brain cells and in the protection against reactive oxygen species. In coculture astroglial cells protect other neural cell types against the toxicity of various compounds. One mechanism for this interaction is the supply by astroglial cells of glutathione precursors to neighboring cells. Recent results confirm the prominent role of astrocytes in glutathione metabolism and the defense against reactive oxygen species in brain. These results also suggest an involvement of a compromised astroglial glutathione system in the oxidative stress reported for neurological disorders.",
"title": ""
},
{
"docid": "9b3eabdc0101e067ad4dda88086fd68d",
"text": "Missing maxillary lateral incisors create an esthetic problem with specific orthodontic and prosthetic considerations. The aim of the present study is to evaluate the clinical success of the transmucosal flapless implant placement and immediate loading of the implants to restore the agenic lateral incisors after completing the orthodontic treatment and during the retention period.",
"title": ""
},
{
"docid": "4ac12c76112ff2085c4701130448f5d5",
"text": "A key point in the deployment of new wireless services is the cost-effective extension and enhancement of the network's radio coverage in indoor environments. Distributed Antenna Systems using Fiber-optics distribution (F-DAS) represent a suitable method of extending multiple-operator radio coverage into indoor premises, tunnels, etc. Another key point is the adoption of MIMO (Multiple Input — Multiple Output) transmission techniques which can exploit the multipath nature of the radio link to ensure reliable, high-speed wireless communication in hostile environments. In this paper novel indoor deployment solutions based on Radio over Fiber (RoF) and distributed-antenna MIMO techniques are presented and discussed, highlighting their potential in different cases.",
"title": ""
},
{
"docid": "348a5c33bde53e7f9a1593404c6589b4",
"text": "Few prior works study deep learning on point sets. PointNet [20] is a pioneer in this direction. However, by design PointNet does not capture local structures induced by the metric space points live in, limiting its ability to recognize fine-grained patterns and generalizability to complex scenes. In this work, we introduce a hierarchical neural network that applies PointNet recursively on a nested partitioning of the input point set. By exploiting metric space distances, our network is able to learn local features with increasing contextual scales. With further observation that point sets are usually sampled with varying densities, which results in greatly decreased performance for networks trained on uniform densities, we propose novel set learning layers to adaptively combine features from multiple scales. Experiments show that our network called PointNet++ is able to learn deep point set features efficiently and robustly. In particular, results significantly better than state-of-the-art have been obtained on challenging benchmarks of 3D point clouds.",
"title": ""
},
{
"docid": "72928de176eb35b0cfdc1fd78cca9994",
"text": "INTRODUCTION\nCongenital epulis, known as a congenital gingival granular cell tumor, is a benign tumor and very rare in newborns. Voluminous or multiple tumors can cause mechanical obstruction of the oral cavity and may result in postnatal feeding and respiratory problems.\n\n\nDISCUSSION\nWe report the clinical case of a female full-term newborn who presented a tumor on the upper gum obtruding into the oral cavity discovered at birth. The pregnancy was followed normally with three prenatal ultrasounds, which did not show abnormalities. The mass was excised under local anesthesia on the second day of life. The outcome was good after surgery and regular feedings were started on the second postoperative day. Histological examination confirmed the diagnosis of gingival tumor with granular cells and absence of signs of malignancy.\n\n\nCONCLUSION\nPrenatal diagnosis is fundamental in the therapeutic approach to this rare lesion but remains difficult because the findings are non specific and the generally late development of the tumor.",
"title": ""
},
{
"docid": "eb31d3d6264e3a6aba0753b5ba14f572",
"text": "Using aggregate product search data from Amazon.com, we jointly estimate consumer information search and online demand for consumer durable goods. To estimate the demand and search primitives, we introduce an optimal sequential search process into a model of choice and treat the observed marketlevel product search data as aggregations of individual-level optimal search sequences. The model builds on the dynamic programming framework by Weitzman (1979) and combines it with a choice model. It can accommodate highly complex demand patterns at the market level. At the individual level, the model has a number of attractive properties in estimation, including closed-form expressions for the probability distribution of alternative sets of searched goods and breaking the curse of dimensionality. Using numerical experiments, we verify the model's ability to identify the heterogeneous consumer tastes and search costs from product search data. Empirically, the model is applied to the online market for camcorders and is used to answer manufacturer questions about market structure and competition, and to address policy maker issues about the e ect of selectively lowered search costs on consumer surplus outcomes. We nd that consumer search for camcorders at Amazon.com is typically limited to little over 10 choice options, and that this a ects the estimates of own and cross elasticities. In a policy simulation, we also nd that the vast majority of the households bene t from the Amazon.com's product recommendations via lower search costs.",
"title": ""
},
{
"docid": "9d30cfbc7d254882e92cad01f5bd17c7",
"text": "Data from culture studies have revealed that Enterococcus faecalis is occasionally isolated from primary endodontic infections but frequently recovered from treatment failures. This molecular study was undertaken to investigate the prevalence of E. faecalis in endodontic infections and to determine whether this species is associated with particular forms of periradicular diseases. Samples were taken from cases of untreated teeth with asymptomatic chronic periradicular lesions, acute apical periodontitis, or acute periradicular abscesses, and from root-filled teeth associated with asymptomatic chronic periradicular lesions. DNA was extracted from the samples, and a 16S rDNA-based nested polymerase chain reaction assay was used to identify E. faecalis. This species occurred in seven of 21 root canals associated with asymptomatic chronic periradicular lesions, in one of 10 root canals associated with acute apical periodontitis, and in one of 19 pus samples aspirated from acute periradicular abscesses. Statistical analysis showed that E. faecalis was significantly more associated with asymptomatic cases than with symptomatic ones. E. faecalis was detected in 20 of 30 cases of persistent endodontic infections associated with root-filled teeth. When comparing the frequencies of this species in 30 cases of persistent infections with 50 cases of primary infections, statistical analysis demonstrated that E. faecalis was strongly associated with persistent infections. The average odds of detecting E. faecalis in cases of persistent infections associated with treatment failure were 9.1. The results of this study indicated that E. faecalis is significantly more associated with asymptomatic cases of primary endodontic infections than with symptomatic ones. Furthermore, E. faecalis was much more likely to be found in cases of failed endodontic therapy than in primary infections.",
"title": ""
},
{
"docid": "bd4316193b5cfa465dd2a5bdca990a86",
"text": "Electroporation is a fascinating cell membrane phenomenon with several existing biological applications and others likely. Although DNA introduction is the most common use, electroporation of isolated cells has also been used for: (1) introduction of enzymes, antibodies, and other biochemical reagents for intracellular assays; (2) selective biochemical loading of one size cell in the presence of many smaller cells; (3) introduction of virus and other particles; (4) cell killing under nontoxic conditions; and (5) insertion of membrane macromolecules into the cell membrane. More recently, tissue electroporation has begun to be explored, with potential applications including: (1) enhanced cancer tumor chemotherapy, (2) gene therapy, (3) transdermal drug delivery, and (4) noninvasive sampling for biochemical measurement. As presently understood, electroporation is an essentially universal membrane phenomenon that occurs in cell and artificial planar bilayer membranes. For short pulses (microsecond to ms), electroporation occurs if the transmembrane voltage, U(t), reaches 0.5-1.5 V. In the case of isolated cells, the pulse magnitude is 10(3)-10(4) V/cm. These pulses cause reversible electrical breakdown (REB), accompanied by a tremendous increase molecular transport across the membrane. REB results in a rapid membrane discharge, with the elevated U(t) returning to low values within a few microseconds of the pulse. However, membrane recovery can be orders of magnitude slower. An associated cell stress commonly occurs, probably because of chemical influxes and effluxes leading to chemical imbalances, which also contribute to eventual survival or death. Basic phenomena, present understanding of mechanism, and the existing and potential applications are briefly reviewed.",
"title": ""
},
{
"docid": "f483546c90f058aae692409449fbbabf",
"text": "In this paper, we analyze the performance limits of the slotted CSMA/CA mechanism of IEEE 802.15.4 in the beacon-enabled mode for broadcast transmissions in WSNs. The motivation for evaluating the beaconenabled mode is due to its flexibility for WSN applications as compared to the non-beacon enabled mode. Our analysis is based on an accurate simulation model of the slotted CSMA/CA mechanism on top of a realistic physical layer, with respect to the IEEE 802.15.4 standard specification. The performance of the slotted CSMA/CA is evaluated and analyzed for different network settings to understand the impact of the protocol attributes (superframe order, beacon order and backoff exponent) on the network performance, namely in terms of throughput (S), average delay (D) and probability of success (Ps). We introduce the concept of utility (U) as a combination of two or more metrics, to determine the best offered load range for an optimal behavior of the network. We show that the optimal network performance using slotted CSMA/CA occurs in the range of 35% to 60% with respect to an utility function proportional to the network throughput (S) divided by the average delay (D).",
"title": ""
},
{
"docid": "57502ae793808fded7d446a3bb82ca74",
"text": "Over the last decade, the “digitization” of the electron enterprise has grown at exponential rates. Utility, industrial, commercial, and even residential consumers are transforming all aspects of their lives into the digital domain. Moving forward, it is expected that every piece of equipment, every receptacle, every switch, and even every light bulb will possess some type of setting, monitoring and/or control. In order to be able to manage the large number of devices and to enable the various devices to communicate with one another, a new communication model was needed. That model has been developed and standardized as IEC61850 – Communication Networks and Systems in Substations. This paper looks at the needs of next generation communication systems and provides an overview of the IEC61850 protocol and how it meets these needs. I. Communication System Needs Communication has always played a critical role in the real-time operation of the power system. In the beginning, the telephone was used to communicate line loadings back to the control center as well as to dispatch operators to perform switching operations at substations. Telephoneswitching based remote control units were available as early as the 1930’s and were able to provide status and control for a few points. As digital communications became a viable option in the 1960’s, data acquisition systems (DAS) were installed to automatically collect measurement data from the substations. Since bandwidth was limited, DAS communication protocols were optimized to operate over low-bandwidth communication channels. The “cost” of this optimization was the time it took to configure, map, and document the location of the various data bits received by the protocol. As we move into the digital age, literally thousands of analog and digital data points are available in a single Intelligent Electronic Device (IED) and communication bandwidth is no longer a limiting factor. Substation to master communication data paths operating at 64,000 bits per second are becoming commonplace with an obvious migration path to much high rates. With this migration in technology, the “cost” component of a data acquisition system has now become the configuration and documentation component. Consequently, a key component of a communication system is the ability to describe themselves from both a data and services (communication functions that an IED performs) perspective. Other “key” requirements include: • High-speed IED to IED communication",
"title": ""
},
{
"docid": "b7a9e7afa7167fe9a22105bd88a8102d",
"text": "Gender information has many useful applications in computer vision systems, such as surveillance systems, counting the number of males and females in a shopping mall, accessing control systems in restricted areas, or any human-computer interaction system. In most previous studies, researchers attempted to recognize gender by using visible light images of the human face or body. However, shadow, illumination, and time of day greatly affect the performance of these methods. To overcome this problem, we propose a new gender recognition method based on the combination of visible light and thermal camera images of the human body. Experimental results, through various kinds of feature extraction and fusion methods, show that our approach is efficient for gender recognition through a comparison of recognition rates with conventional systems.",
"title": ""
},
{
"docid": "3ea021309fd2e729ffced7657e3a6038",
"text": "Physiological and pharmacological research undertaken on sloths during the past 30 years is comprehensively reviewed. This includes the numerous studies carried out upon the respiratory and cardiovascular systems, anesthesia, blood chemistry, neuromuscular responses, the brain and spinal cord, vision, sleeping and waking, water balance and kidney function and reproduction. Similarities and differences between the physiology of sloths and that of other mammals are discussed in detail.",
"title": ""
},
{
"docid": "3c46bd625fdaf144c8a571eafe76b945",
"text": "Neurocognitive model inspired by the putative processes in the brain has been applied to invention of novel words. This domain is proposed as the simplest way to understand creativity using experimental and computational means. Three factors are essential for creativity in this domain: knowledge of the statistical language properties, imagination constrained by this knowledge, and filtering of results that selects most interesting novel words. These principles are implemented using a simple correlation-based algorithm for auto-associative memory that learns the statistical properties of language. Results are surprisingly similar to those created by humans. Perspectives on computational models of creativity are discussed. Keywords—Creativity, brain, language processing, higher cognitive functions, neural modeling.",
"title": ""
},
{
"docid": "fc9ec90a7fb9c18a5209f462d21cf0e1",
"text": "The demand for accurate and reliable positioning in industrial applications, especially in robotics and high-precision machines, has led to the increased use of Harmonic Drives. The unique performance features of harmonic drives, such as high reduction ratio and high torque capacity in a compact geometry, justify their widespread application. However, nonlinear torsional compliance and friction are the most fundamental problems in these components and accurate modelling of the dynamic behaviour is expected to improve the performance of the system. This paper offers a model for torsional compliance of harmonic drives. A statistical measure of variation is defined, by which the reliability of the estimated parameters for different operating conditions, as well as the accuracy and integrity of the proposed model, are quantified. The model performance is assessed by simulation to verify the experimental results. Two test setups have been developed and built, which are employed to evaluate experimentally the behaviour of the system. Each setup comprises a different type of harmonic drive, namely the high load torque and the low load torque harmonic drive. The results show an accurate match between the simulation torque obtained from the identified model and the measured torque from the experiment, which indicates the reliability of the proposed model.",
"title": ""
}
] | scidocsrr |
b6cae67c818937f9541d78b6b8472b86 | Parallel Selective Algorithms for Nonconvex Big Data Optimization | [
{
"docid": "e2a9bb49fd88071631986874ea197bc1",
"text": "We consider the class of iterative shrinkage-thresholding algorithms (ISTA) for solving linear inverse problems arising in signal/image processing. This class of methods, which can be viewed as an extension of the classical gradient algorithm, is attractive due to its simplicity and thus is adequate for solving large-scale problems even with dense matrix data. However, such methods are also known to converge quite slowly. In this paper we present a new fast iterative shrinkage-thresholding algorithm (FISTA) which preserves the computational simplicity of ISTA but with a global rate of convergence which is proven to be significantly better, both theoretically and practically. Initial promising numerical results for wavelet-based image deblurring demonstrate the capabilities of FISTA which is shown to be faster than ISTA by several orders of magnitude.",
"title": ""
}
] | [
{
"docid": "dee76f07eb39e33e59608a2544215c0a",
"text": "We ask, and answer, the question of what’s computable by Turing machines equipped with time travel into the past: that is, closed timelike curves or CTCs (with no bound on their size). We focus on a model for CTCs due to Deutsch, which imposes a probabilistic consistency condition to avoid grandfather paradoxes. Our main result is that computers with CTCs can solve exactly the problems that are Turing-reducible to the halting problem, and that this is true whether we consider classical or quantum computers. Previous work, by Aaronson and Watrous, studied CTC computers with a polynomial size restriction, and showed that they solve exactly the problems in PSPACE, again in both the classical and quantum cases. Compared to the complexity setting, the main novelty of the computability setting is that not all CTCs have fixed-points, even probabilistically. Despite this, we show that the CTCs that do have fixed-points suffice to solve the halting problem, by considering fixed-point distributions involving infinite geometric series. The tricky part is to show that even quantum computers with CTCs can be simulated using a Halt oracle. For that, we need the Riesz representation theorem from functional analysis, among other tools. We also study an alternative model of CTCs, due to Lloyd et al., which uses postselection to “simulate” a consistency condition, and which yields BPPpath in the classical case or PP in the quantum case when subject to a polynomial size restriction. With no size limit, we show that postselected CTCs yield only the computable languages if we impose a certain finiteness condition, or all languages nonadaptively reducible to the halting problem if we don’t.",
"title": ""
},
{
"docid": "9164bd704cdb8ca76d0b5f7acda9d4ef",
"text": "In this paper we present a deep neural network topology that incorporates a simple to implement transformationinvariant pooling operator (TI-POOLING). This operator is able to efficiently handle prior knowledge on nuisance variations in the data, such as rotation or scale changes. Most current methods usually make use of dataset augmentation to address this issue, but this requires larger number of model parameters and more training data, and results in significantly increased training time and larger chance of under-or overfitting. The main reason for these drawbacks is that that the learned model needs to capture adequate features for all the possible transformations of the input. On the other hand, we formulate features in convolutional neural networks to be transformation-invariant. We achieve that using parallel siamese architectures for the considered transformation set and applying the TI-POOLING operator on their outputs before the fully-connected layers. We show that this topology internally finds the most optimal \"canonical\" instance of the input image for training and therefore limits the redundancy in learned features. This more efficient use of training data results in better performance on popular benchmark datasets with smaller number of parameters when comparing to standard convolutional neural networks with dataset augmentation and to other baselines.",
"title": ""
},
{
"docid": "9043a5aae40471cb9f671a33725b0072",
"text": "In a software development group of IBM Retail Store Solutions, we built a non-trivial software system based on a stable standard specification using a disciplined, rigorous unit testing and build approach based on the test- driven development (TDD) practice. Using this practice, we reduced our defect rate by about 50 percent compared to a similar system that was built using an ad-hoc unit testing approach. The project completed on time with minimal development productivity impact. Additionally, the suite of automated unit test cases created via TDD is a reusable and extendable asset that will continue to improve quality over the lifetime of the software system. The test suite will be the basis for quality checks and will serve as a quality contract between all members of the team.",
"title": ""
},
{
"docid": "08f7c7d3bc473e929b4a224636f2a887",
"text": "Some existing CNN-based methods for single-view 3D object reconstruction represent a 3D object as either a 3D voxel occupancy grid or multiple depth-mask image pairs. However, these representations are inefficient since empty voxels or background pixels are wasteful. We propose a novel approach that addresses this limitation by replacing masks with “deformation-fields”. Given a single image at an arbitrary viewpoint, a CNN predicts multiple surfaces, each in a canonical location relative to the object. Each surface comprises a depth-map and corresponding deformation-field that ensures every pixel-depth pair in the depth-map lies on the object surface. These surfaces are then fused to form the full 3D shape. During training we use a combination of perview loss and multi-view losses. The novel multi-view loss encourages the 3D points back-projected from a particular view to be consistent across views. Extensive experiments demonstrate the efficiency and efficacy of our method on single-view 3D object reconstruction.",
"title": ""
},
{
"docid": "4ddfa45a585704edcca612f188cc6b78",
"text": "This paper presents a case study of using distributed word representations, word2vec in particular, for improving performance of Named Entity Recognition for the eCommerce domain. We also demonstrate that distributed word representations trained on a smaller amount of in-domain data are more effective than word vectors trained on very large amount of out-of-domain data, and that their combination gives the best results.",
"title": ""
},
{
"docid": "5cc26542d0f4602b2b257e19443839b3",
"text": "Accurate performance evaluation of cloud computing resources is a necessary prerequisite for ensuring that quality of service parameters remain within agreed limits. In this paper, we employ both the analytical and simulation modeling to addresses the complexity of cloud computing systems. Analytical model is comprised of distinct functional submodels, the results of which are combined in an iterative manner to obtain the solution with required accuracy. Our models incorporate the important features of cloud centers such as batch arrival of user requests, resource virtualization, and realistic servicing steps, to obtain important performance metrics such as task blocking probability and total waiting time incurred on user requests. Also, our results reveal important insights for capacity planning to control delay of servicing users requests.",
"title": ""
},
{
"docid": "15ccdecd20bbd9c4b93c57717cbfb787",
"text": "As a crucial challenge for video understanding, exploiting the spatial-temporal structure of video has attracted much attention recently, especially on video captioning. Inspired by the insight that people always focus on certain interested regions of video content, we propose a novel approach which will automatically focus on regions-of-interest and catch their temporal structures. In our approach, we utilize a specific attention model to adaptively select regions-of-interest for each video frame. Then a Dual Memory Recurrent Model (DMRM) is introduced to incorporate temporal structure of global features and regions-of-interest features in parallel, which will obtain rough understanding of video content and particular information of regions-of-interest. Since the attention model could not always catch the right interests, we additionally adopt semantic supervision to attend to interested regions more correctly. We evaluate our method for video captioning on two public benchmarks: the Microsoft Video Description Corpus (MSVD) and the Montreal Video Annotation Dataset (M-VAD). The experiments demonstrate that catching temporal regions-of-interest information really enhances the representation of input videos and our approach obtains the state-of-the-art results on popular evaluation metrics like BLEU-4, CIDEr, and METEOR.",
"title": ""
},
{
"docid": "a6815743923b1f46aee28534597611a9",
"text": "Prognostics focuses on predicting the future performance of a system, specifically the time at which the system no long performs its desired functionality, its time to failure. As an important aspect of prognostics, remaining useful life (RUL) prediction estimates the remaining usable life of a system, which is essential for maintenance decision making and contingency mitigation. A significant amount of research has been reported in the literature to develop prognostics models that are able to predict a system's RUL. These models can be broadly categorized into experience-based models, date-driven models, and physics-based models. However, due to system complexity, data availability, and application constraints, there is no universally accepted best model to estimate RUL. The review part of this paper specifically focused on the development of hybrid prognostics approaches, attempting to leverage the advantages of combining the prognostics models in the aforementioned different categories for RUL prediction. The hybrid approaches reported in the literature were systematically classified by the combination and interfaces of various types of prognostics models. In the case study part, a hybrid prognostics method was proposed and applied to a battery degradation case to show the potential benefit of the hybrid prognostics approach.",
"title": ""
},
{
"docid": "1dc41e5c43fc048bc1f1451eaa1ff764",
"text": "249 words) + Body (6178 words) + 4 Figures = 7,427 Total Words Luis Fernando Molina molinac1@illinois.edu (217) 244-6063 Esther Resendiz eresendi@illinois.edu (217) 244-4174 J. Riley Edwards jedward2@illinois.edu (217) 244-7417 John M. Hart j-hart3@illinois.edu (217) 244-4174 Christopher P. L. Barkan cbarkan@illinois.edu (217) 244-6338 Narendra Ahuja ahuja@illinois.edu (217) 333-1837 3 Corresponding author Molina et al. 11-1442 2 ABSTRACT Individual railroad track maintenance standards and the Federal Railroad Administration (FRA)Individual railroad track maintenance standards and the Federal Railroad Administration (FRA) Track Safety Standards require periodic inspection of railway infrastructure to ensure safe and efficient operation. This inspection is a critical, but labor-intensive task that results in large annual operating expenditures and has limitations in speed, quality, objectivity, and scope. To improve the cost-effectiveness of the current inspection process, machine vision technology can be developed and used as a robust supplement to manual inspections. This paper focuses on the development and performance of machine vision algorithms designed to recognize turnout components, as well as the performance of algorithms designed to recognize and detect defects in other track components. In order to prioritize which components are the most critical for the safe operation of trains, a risk-based analysis of the FRA Accident Database was performed. Additionally, an overview of current technologies for track and turnout component condition assessment is presented. The machine vision system consists of a video acquisition system for recording digital images of track and customized algorithms to identify defects and symptomatic conditions within the images. A prototype machine vision system has been developed for automated inspection of rail anchors and cut spikes, as well as tie recognition. Experimental test results from the system have shown good reliability for recognizing ties, anchors, and cut spikes. This machine vision system, in conjunction with defect analysis and trending of historical data, will enhance the ability for longer-term predictive assessment of the health of the track system and its components. Molina et al. 11-1442 3 INTRODUCTION Railroads conduct regular inspections of their track in order to maintain safe and efficient operation. In addition to internal railroad inspection procedures, periodic track inspections are required under the Federal Railroad Administration (FRA) Track Safety Standards. The objective of this research is to investigate the feasibility of developing a machine vision system to make track inspection more efficient, effective, and objective. In addition, interim approaches to automated track inspection are possible, which will potentially lead to greater inspection effectiveness and efficiency prior to full machine vision system development and implementation. Interim solutions include video capture using vehicle-mounted cameras, image enhancement using image-processing software, and assisted automation using machine vision algorithms (1). The primary focus of this research is inspection of North American Class I railroad mainline and siding tracks, as these generally experience the highest traffic densities. High traffic densities necessitate frequent inspection and more stringent maintenance requirements, and leave railroads less time to accomplish it. This makes them the most likely locations for cost-effective investment in new, more efficient, but potentially more capital-intensive inspection technology. The algorithms currently under development will also be adaptable to many types of infrastructure and usage, including transit and some components of high-speed rail (HSR) infrastructure. The machine vision system described in this paper was developed through an interdisciplinary research collaboration at the University of Illinois at Urbana-Champaign (UIUC) between the Computer Vision and Robotics Laboratory (CVRL) at the Beckman Institute for Advanced Science and Technology and the Railroad Engineering Program in the Department of Civil and Environmental Engineering. CURRENT TRACK INSPECTION TECHNOLOGIES USING MACHINE VISION The international railroad community has undertaken significant research to develop innovative applications for advanced technologies with the objective of improving the process of visual track inspection. The development of machine vision, one such inspection technology which uses video cameras, optical sensors, and custom designed algorithms, began in the early 1990’s with work analyzing rail surface defects (2). Machine vision systems are currently in use or under development for a variety of railroad inspection tasks, both wayside and mobile, including inspection of joint bars, surface defects in the rail, rail profile, ballast profile, track gauge, intermodal loading efficiency, railcar structural components, and railcar safety appliances (1, 3-21, 23). The University of Illinois at Urbana-Champaign (UIUC) has been involved in multiple railroad machine-vision research projects sponsored by the Association of American Railroads (AAR), BNSF Railway, NEXTRANS Region V Transportation Center, and the Transportation Research Board (TRB) High-Speed Rail IDEA Program (6-11). In this section, we provide a brief overview of machine vision condition monitoring applications currently in use or under development for inspection of railway infrastructure. Railway applications of machine vision technology have three main elements: the image acquisition system, the image analysis system, and the data analysis system (1). The attributes and performance of each of these individual components determines the overall performance of a machine vision system. Therefore, the following review includes a discussion of the overall Molina et al. 11-1442 4 machine vision system, as well as approaches to image acquisition, algorithm development techniques, lighting methodologies, and experimental results. Rail Surface Defects The Institute of Digital Image Processing (IDIP) in Austria has developed a machine vision system for rail surface inspection during the rail manufacturing process (12). Currently, rail inspection is carried out by humans and complemented with eddy current systems. The objective of this machine vision system is to replace visual inspections on rail production lines. The machine vision system uses spectral image differencing procedure (SIDP) to generate threedimensional (3D) images and detect surface defects in the rails. Additionally, the cameras can capture images at speeds up to 37 miles per hour (mph) (60 kilometers per hour (kph)). Although the system is currently being used only in rail production lines, it can also be attached to an inspection vehicle for field inspection of rail. Additionally, the Institute of Intelligent Systems for Automation (ISSIA) in Italy has been researching and developing a system for detecting rail corrugation (13). The system uses images of 512x2048 pixels in resolution, artificial light, and classification of texture to identify surface defects. The system is capable of acquiring images at speeds of up to 125 mph (200 kph). Three image-processing methods have been proposed and evaluated by IISA: Gabor, wavelet, and Gabor wavelet. Gabor was selected as the preferred processing technique. Currently, the technology has been implemented through the patented system known as Visual Inspection System for Railways (VISyR). Rail Wear The Moscow Metro and the State of Common Means of Moscow developed photonic system to measure railhead wear (14). The system consists of 4 CCD cameras and 4 laser lights mounted on an inspection vehicle. The cameras are connected to a central computer that receives images every 20 nanoseconds (ns). The system extracts the profile of the rail using two methods (cut-off and tangent) and the results are ultimately compared with pre-established rail wear templates. Tie Condition The Georgetown Rail Equipment Company (GREX) has developed and commercialized a crosstie inspection system called AURORA (15). The objective of the system is to inspect and classify the condition of timber and concrete crossties. Additionally, the system can be adapted to measure rail seat abrasion (RSA) and detect defects in fastening systems. AURORA uses high-definition cameras and high-voltage lasers as part of the lighting arrangement and is capable of inspecting 70,000 ties per hour at a speed of 30-45 mph (48-72 kph). The system has been shown to replicate results obtained by track inspectors with an accuracy of 88%. Since 2008, Napier University in Sweden has been researching the use of machine vision technology for inspection of timber crossties (16). Their system evaluates the condition of the ends of the ties and classifies them into one of two categories: good or bad. This classification is performed by evaluating quantitative parameters such as the number, length, and depth of cracks, as well as the condition of the tie plate. Experimental results showed that the system has an accuracy of 90% with respect to the correct classification of ties. Future research work includes evaluation of the center portion of the ties and integration with other non-destructive testing (NDT) applications. Molina et al. 11-1442 5 In 2003, the University of Zaragoza in Spain began research on the development of machine vision techniques to inspect concrete crossties using a stereo-metric system to measure different surface shapes (17). The system is used to estimate the deviation from the required dimensional tolerances of the concrete ties in production lines. Two CCD cameras with a resolution of 768x512 pixels are used for image capture and lasers are used for artificial lighting. The system has been shown to produce reliable results, but quantifiable results were not found in the available literature. Ballast The ISS",
"title": ""
},
{
"docid": "2b3de55ff1733fac5ee8c22af210658a",
"text": "With faster connection speed, Internet users are now making social network a huge reservoir of texts, images and video clips (GIF). Sentiment analysis for such online platform can be used to predict political elections, evaluates economic indicators and so on. However, GIF sentiment analysis is quite challenging, not only because it hinges on spatio-temporal visual contentabstraction, but also for the relationship between such abstraction and final sentiment remains unknown.In this paper, we dedicated to find outsuch relationship.We proposed a SentiPairSequence basedspatiotemporal visual sentiment ontology, which forms the midlevel representations for GIFsentiment. The establishment process of SentiPair contains two steps. First, we construct the Synset Forest to define the semantic tree structure of visual sentiment label elements. Then, through theSynset Forest, we organically select and combine sentiment label elements to form a mid-level visual sentiment representation. Our experiments indicate that SentiPair outperforms other competing mid-level attributes. Using SentiPair, our analysis frameworkcan achieve satisfying prediction accuracy (72.6%). We also opened ourdataset (GSO-2015) to the research community. GSO-2015 contains more than 6,000 manually annotated GIFs out of more than 40,000 candidates. Each is labeled with both sentiment and SentiPair Sequence.",
"title": ""
},
{
"docid": "5883597258387e83c4c5b9c1e896c818",
"text": "Techniques making use of Deep Neural Networks (DNN) have recently been seen to bring large improvements in textindependent speaker recognition. In this paper, we verify that the DNN based methods result in excellent performances in the context of text-dependent speaker verification as well. We build our system on the previously introduced HMM based ivector approach, where phone models are used to obtain frame level alignment in order to collect sufficient statistics for ivector extraction. For comparison, we experiment with an alternative alignment obtained directly from the output of DNN trained for phone classification. We also experiment with DNN based bottleneck features and their combinations with standard cepstral features. Although the i-vector approach is generally considered not suitable for text-dependent speaker verification, we show that our HMM based approach combined with bottleneck features provides truly state-of-the-art performance on RSR2015 data.",
"title": ""
},
{
"docid": "be19dab37fdd4b6170816defbc550e2e",
"text": "A new continuous transverse stub (CTS) antenna array is presented in this paper. It is built using the substrate integrated waveguide (SIW) technology and designed for beam steering applications in the millimeter waveband. The proposed CTS antenna array consists of 18 stubs that are arranged in the SIW perpendicular to the wave propagation. The performance of the proposed CTS antenna array is demonstrated through simulation and measurement results. From the experimental results, the peak gain of 11.63-16.87 dBi and maximum radiation power of 96.8% are achieved in the frequency range 27.06-36 GHz with low cross-polarization level. In addition, beam steering capability is achieved in the maximum radiation angle range varying from -43° to 3 ° depending on frequency.",
"title": ""
},
{
"docid": "87e2d691570403ae36e0a9a87099ad71",
"text": "Audiovisual translation is one of several overlapping umbrella terms that include ‘media translation’, ‘multimedia translation’, ‘multimodal translation’ and ‘screen translation’. These different terms all set out to cover the interlingual transfer of verbal language when it is transmitted and accessed both visually and acoustically, usually, but not necessarily, through some kind of electronic device. Theatrical plays and opera, for example, are clearly audiovisual yet, until recently, audiences required no technological devices to access their translations; actors and singers simply acted and sang the translated versions. Nowadays, however, opera is frequently performed in the original language with surtitles in the target language projected on to the stage. Furthermore, electronic librettos placed on the back of each seat containing translations are now becoming widely available. However, to date most research in audiovisual translation has been dedicated to the field of screen translation, which, while being both audiovisual and multimedial in nature, is specifically understood to refer to the translation of films and other products for cinema, TV, video and DVD. After the introduction of the first talking pictures in the 1920s a solution needed to be found to allow films to circulate despite language barriers. How to translate film dialogues and make movie-going accessible to speakers of all languages was to become a major concern for both North American and European film directors. Today, of course, screens are no longer restricted to cinema theatres alone. Television screens, computer screens and a series of devices such as DVD players, video game consoles, GPS navigation devices and mobile phones are also able to send out audiovisual products to be translated into scores of languages. Hence, strictly speaking, screen translation includes translations for any electronic appliance with a screen; however, for the purposes of this chapter, the term will be used mainly to refer to translations for the most popular products, namely for cinema, TV, video and DVD, and videogames. The two most widespread modalities adopted for translating products for the screen are dubbing and subtitling.1 Dubbing is a process which uses the acoustic channel for translational purposes, while subtitling is visual and involves a written translation that is superimposed on to the",
"title": ""
},
{
"docid": "7cbe504e03ab802389c48109ed1f1802",
"text": "Despite recent breakthroughs in the applications of deep neural networks, one setting that presents a persistent challenge is that of “one-shot learning.” Traditional gradient-based networks require a lot of data to learn, often through extensive iterative training. When new data is encountered, the models must inefficiently relearn their parameters to adequately incorporate the new information without catastrophic interference. Architectures with augmented memory capacities, such as Neural Turing Machines (NTMs), offer the ability to quickly encode and retrieve new information, and hence can potentially obviate the downsides of conventional models. Here, we demonstrate the ability of a memory-augmented neural network to rapidly assimilate new data, and leverage this data to make accurate predictions after only a few samples. We also introduce a new method for accessing an external memory that focuses on memory content, unlike previous methods that additionally use memory locationbased focusing mechanisms.",
"title": ""
},
{
"docid": "ce2f8135fe123e09b777bd147bec4bb3",
"text": "Supervised learning, e.g., classification, plays an important role in processing and organizing microblogging data. In microblogging, it is easy to mass vast quantities of unlabeled data, but would be costly to obtain labels, which are essential for supervised learning algorithms. In order to reduce the labeling cost, active learning is an effective way to select representative and informative instances to query for labels for improving the learned model. Different from traditional data in which the instances are assumed to be independent and identically distributed (i.i.d.), instances in microblogging are networked with each other. This presents both opportunities and challenges for applying active learning to microblogging data. Inspired by social correlation theories, we investigate whether social relations can help perform effective active learning on networked data. In this paper, we propose a novel Active learning framework for the classification of Networked Texts in microblogging (ActNeT). In particular, we study how to incorporate network information into text content modeling, and design strategies to select the most representative and informative instances from microblogging for labeling by taking advantage of social network structure. Experimental results on Twitter datasets show the benefit of incorporating network information in active learning and that the proposed framework outperforms existing state-of-the-art methods.",
"title": ""
},
{
"docid": "d9b261d1ed01f40ca22e7955c015d72c",
"text": "A series of experiments has investigated the relationship between the playing of background music during the performance of repetitive work and efficiency in performing such a task. The results give strong support to the contention that economic benefits can accure from the use of music in industry. The studies show that music is effective in raising efficiency in this type of work even when in competition with the unfavourable conditions produced by machine noise.",
"title": ""
},
{
"docid": "8a9191c256f62b7efce93033752059e6",
"text": "Food products fermented by lactic acid bacteria have long been used for their proposed health promoting properties. In recent years, selected probiotic strains have been thoroughly investigated for specific health effects. Properties like relief of lactose intolerance symptoms and shortening of rotavirus diarrhoea are now widely accepted for selected probiotics. Some areas, such as the treatment and prevention of atopy hold great promise. However, many proposed health effects still need additional investigation. In particular the potential benefits for the healthy consumer, the main market for probiotic products, requires more attention. Also, the potential use of probiotics outside the gastrointestinal tract deserves to be explored further. Results from well conducted clinical studies will expand and increase the acceptance of probiotics for the treatment and prevention of selected diseases.",
"title": ""
},
{
"docid": "77e5724ff3b8984a1296731848396701",
"text": "Temporal networks, i.e., networks in which the interactions among a set of elementary units change over time, can be modelled in terms of timevarying graphs, which are time-ordered sequences of graphs over a set of nodes. In such graphs, the concepts of node adjacency and reachability crucially depend on the exact temporal ordering of the links. Consequently, all the concepts and metrics proposed and used for the characterisation of static complex networks have to be redefined or appropriately extended to time-varying graphs, in order to take into account the effects of time ordering on causality. In this chapter we V. Nicosia ( ) Computer Laboratory, University of Cambridge, 15 JJ Thomson Avenue, Cambridge CB3 0FD, UK e-mail: V.Nicosia@qmul.ac.uk Laboratorio sui Sistemi Complessi, Scuola Superiore di Catania, Via Valdisavoia 9, 95123 Catania, Italy J. Tang C. Mascolo Computer Laboratory, University of Cambridge, 15 JJ Thomson Avenue, Cambridge CB3 0FD, UK M. Musolesi ( ) School of Computer Science, University of Birmingham, Edgbaston, Birmingham B15 2TT, UK e-mail: m.musolesi@cs.bham.ac.uk G. Russo Dipartimento di Matematica e Informatica, Universitá di Catania, Via S. Sofia 64, 95123 Catania, Italy V. Latora Laboratorio sui Sistemi Complessi, Scuola Superiore di Catania, Via Valdisavoia 9, 95123 Catania, Italy School of Mathematical Sciences, Queen Mary, University of London, E1 4NS London, UK Dipartimento di Fisica e Astronomia and INFN, Universitá di Catania, Via S. Sofia 64, 95123 Catania, Italy P. Holme and J. Saramäki (eds.), Temporal Networks, Understanding Complex Systems, DOI 10.1007/978-3-642-36461-7 2, © Springer-Verlag Berlin Heidelberg 2013 15 16 V. Nicosia et al. discuss how to represent temporal networks and we review the definitions of walks, paths, connectedness and connected components valid for graphs in which the links fluctuate over time. We then focus on temporal node–node distance, and we discuss how to characterise link persistence and the temporal small-world behaviour in this class of networks. Finally, we discuss the extension of classic centrality measures, including closeness, betweenness and spectral centrality, to the case of time-varying graphs, and we review the work on temporal motifs analysis and the definition of modularity for temporal graphs.",
"title": ""
},
{
"docid": "85a01086e72befaccff9b8741b920fdf",
"text": "While search engines are the major sources of content discovery on online content providers and e-commerce sites, their capability is limited since textual descriptions cannot fully describe the semantic of content such as videos. Recommendation systems are now widely used in online content providers and e-commerce sites and play an important role in discovering content. In this paper, we describe how one can boost the popularity of a video through the recommendation system in YouTube. We present a model that captures the view propagation between videos through the recommendation linkage and quantifies the influence that a video has on the popularity of another video. Furthermore, we identify that the similarity in titles and tags is an important factor in forming the recommendation linkage between videos. This suggests that one can manipulate the metadata of a video to boost its popularity.",
"title": ""
},
{
"docid": "9d87c71c136264a03a74139417bd7a1e",
"text": "Deep reinforcement learning (deep RL) has been successful in learning sophisticated behaviors automatically; however, the learning process requires a huge number of trials. In contrast, animals can learn new tasks in just a few trials, benefiting from their prior knowledge about the world. This paper seeks to bridge this gap. Rather than designing a “fast” reinforcement learning algorithm, we propose to represent it as a recurrent neural network (RNN) and learn it from data. In our proposed method, RL, the algorithm is encoded in the weights of the RNN, which are learned slowly through a general-purpose (“slow”) RL algorithm. The RNN receives all information a typical RL algorithm would receive, including observations, actions, rewards, and termination flags; and it retains its state across episodes in a given Markov Decision Process (MDP). The activations of the RNN store the state of the “fast” RL algorithm on the current (previously unseen) MDP. We evaluate RL experimentally on both small-scale and large-scale problems. On the small-scale side, we train it to solve randomly generated multi-armed bandit problems and finite MDPs. After RL is trained, its performance on new MDPs is close to human-designed algorithms with optimality guarantees. On the largescale side, we test RL on a vision-based navigation task and show that it scales up to high-dimensional problems.",
"title": ""
}
] | scidocsrr |
e630c9b7f1d11be7fe813c9371489332 | Sparsity-based DOA estimation using co-prime arrays | [
{
"docid": "4bc74a746ef958a50bb8c542aa25860f",
"text": "A new approach to super resolution line spectrum estimation in both temporal and spatial domain using a coprime pair of samplers is proposed. Two uniform samplers with sample spacings MT and NT are used where M and N are coprime and T has the dimension of space or time. By considering the difference set of this pair of sample spacings (which arise naturally in computation of second order moments), sample locations which are O(MN) consecutive multiples of T can be generated using only O(M + N) physical samples. In order to efficiently use these O(MN) virtual samples for super resolution spectral estimation, a novel algorithm based on the idea of spatial smoothing is proposed, which can be used for estimating frequencies of sinusoids buried in noise as well as for estimating Directions-of-Arrival (DOA) of impinging signals on a sensor array. This technique allows us to construct a suitable positive semidefinite matrix on which subspace based algorithms like MUSIC can be applied to detect O(MN) spectral lines using only O(M + N) physical samples.",
"title": ""
}
] | [
{
"docid": "6200e3a50d2e578d56ef9015149dd5fb",
"text": "This study investigated the frequency of college students' procrastination on academic tasks and the reasons for procrastination behavior. A high percentage of students reported problems with procrastination on several specific academic tasks. Self-reported procrastination was positively correlated with the number of self-paced quizzes students took late in the semester and with participation in an experimental session offered late in the semester. A factor analysis of the reasons for procrastination indicated that the factors Fear of Failure and Aversiveness of the Task accounted for most of the variance. A small but very homogeneous group of subjects endorsed items on the Fear of Failure factor that correlated significantly with self-report measures of depression, irrational cognitions, low self-esteem, delayed study behavior, anxiety, and lack of assertion. A larger and relatively heterogeneous group of subjects reported procrastinating as a result of aversiveness of the task. The Aversiveness of the Task factor did not correlate significantly with anxiety or assertion, but it did correlate significantly with'depression, irrational cognitions, low self-esteem, and delayed study behavior. These results indicate that procrastination is not solely a deficit in study habits or time management, but involves a complex interaction of behavioral, cognitive, and affective components;",
"title": ""
},
{
"docid": "23ef781d3230124360f24cc6e38fb15f",
"text": "Exploration of ANNs for the economic purposes is described and empirically examined with the foreign exchange market data. For the experiments, panel data of the exchange rates (USD/EUR, JPN/USD, USD/ GBP) are examined and optimized to be used for time-series predictions with neural networks. In this stage the input selection, in which the processing steps to prepare the raw data to a suitable input for the models are investigated. The best neural network is found with the best forecasting abilities, based on a certain performance measure. A visual graphs on the experiments data set is presented after processing steps, to illustrate that particular results. The out-of-sample results are compared with training ones. & 2015 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "f72150d92ff4e0422ae44c3c21e8345e",
"text": "There has been a recent paradigm shift in robotics to data-driven learning for planning and control. Due to large number of experiences required for training, most of these approaches use a self-supervised paradigm: using sensors to measure success/failure. However, in most cases, these sensors provide weak supervision at best. In this work, we propose an adversarial learning framework that pits an adversary against the robot learning the task. In an effort to defeat the adversary, the original robot learns to perform the task with more robustness leading to overall improved performance. We show that this adversarial framework forces the robot to learn a better grasping model in order to overcome the adversary. By grasping 82% of presented novel objects compared to 68% without an adversary, we demonstrate the utility of creating adversaries. We also demonstrate via experiments that having robots in adversarial setting might be a better learning strategy as compared to having collaborative multiple robots. For supplementary video see: youtu.be/QfK3Bqhc6Sk",
"title": ""
},
{
"docid": "7b526ab92e31c2677fd20022a8b46189",
"text": "Close physical interaction between robots and humans is a particularly challenging aspect of robot development. For successful interaction and cooperation, the robot must have the ability to adapt its behavior to the human counterpart. Based on our earlier work, we present and evaluate a computationally efficient machine learning algorithm that is well suited for such close-contact interaction scenarios. We show that this algorithm helps to improve the quality of the interaction between a robot and a human caregiver. To this end, we present two human-in-the-loop learning scenarios that are inspired by human parenting behavior, namely, an assisted standing-up task and an assisted walking task.",
"title": ""
},
{
"docid": "60ad412d0d6557d2a06e9914bbf3c680",
"text": "Helpfulness of online reviews is a multi-faceted concept that can be driven by several types of factors. This study was designed to extend existing research on online review helpfulness by looking at not just the quantitative factors (such as word count), but also qualitative aspects of reviewers (including reviewer experience, reviewer impact, reviewer cumulative helpfulness). This integrated view uncovers some insights that were not available before. Our findings suggest that word count has a threshold in its effects on review helpfulness. Beyond this threshold, its effect diminishes significantly or becomes near non-existent. Reviewer experience and their impact were not statistically significant predictors of helpfulness, but past helpfulness records tended to predict future helpfulness ratings. Review framing was also a strong predictor of helpfulness. As a result, characteristics of reviewers and review messages have a varying degree of impact on review helpfulness. Theoretical and practical implications are discussed. 2015 Elsevier Ltd. All rights reserved.",
"title": ""
},
{
"docid": "7e7739bfddbae8cfa628d67eb582c121",
"text": "When firms implement enterprise resource planning, they need to redesign their business processes to make information flow smooth within organizations. ERP thus results in changes in processes and responsibilities. Firms cannot realize expected returns from ERP investments unless these changes are effectively managed after ERP systems are put into operation. This research proposes a conceptual framework to highlight the importance of the change management after firms implement ERP systems. Our research model is empirically tested using data collected from over 170 firms that had used ERP systems for more than one year. Our analysis reveals that the eventual success of ERP systems depends on effective change management after ERP implementation, supporting the existence of the valley of despair.",
"title": ""
},
{
"docid": "21b6eabf98a24614375cd0192126ef12",
"text": "Interior permanent magnet motors equipped with a squirrel-cage rotor are receiving lately an increased interest. Defined as line-start, line-fed or hybrid synchronous-induction motors, such machines combine the advantage of the brushless permanent magnet motors, i.e. high efficiency, constant torque for variable speed, with the high starting capability of the induction motors connected directly to the supply system. This paper proposes a unified analysis of these motors, with an emphasis on how any possible configuration may be described by using symmetrical components and two equivalent fictitious machines: positive and negative sequences. The analysis is validated on a single-phase unbalanced and on a three-phase balanced line-fed interior permanent magnet motors.",
"title": ""
},
{
"docid": "1d11b3ddedc72cdcb3002c149ea41316",
"text": "The \\emph{wavelet tree} data structure is a space-efficient technique for rank and select queries that generalizes from binary characters to an arbitrary multicharacter alphabet. It has become a key tool in modern full-text indexing and data compression because of its capabilities in compressing, indexing, and searching. We present a comparative study of its practical performance regarding a wide range of options on the dimensions of different coding schemes and tree shapes. Our results are both theoretical and experimental: (1)~We show that the run-length $\\delta$ coding size of wavelet trees achieves the 0-order empirical entropy size of the original string with leading constant 1, when the string's 0-order empirical entropy is asymptotically less than the logarithm of the alphabet size. This result complements the previous works that are dedicated to analyzing run-length $\\gamma$-encoded wavelet trees. It also reveals the scenarios when run-length $\\delta$ encoding becomes practical. (2)~We introduce a full generic package of wavelet trees for a wide range of options on the dimensions of coding schemes and tree shapes. Our experimental study reveals the practical performance of the various modifications.",
"title": ""
},
{
"docid": "25ff7c7f05c7c640447ab077efb8c84b",
"text": "Most propeller injuries occur at water recreational facilities such as those with provision for water skiing, boat racing, skin and scuba diving. Propeller injuries resulting from nautical accidents can be fatal. The sharp blades of propellers rotating at high speeds cause multiple and serious injuries such as deep laceration, chop wounds, bone fractures and mutilation of extremities. We present the autopsy reports of three people who died after colliding with boat propellers.",
"title": ""
},
{
"docid": "bf9d706685f76877a56d323423b32a5c",
"text": "BACKGROUND\nFine particulate air pollution has been linked to cardiovascular disease, but previous studies have assessed only mortality and differences in exposure between cities. We examined the association of long-term exposure to particulate matter of less than 2.5 microm in aerodynamic diameter (PM2.5) with cardiovascular events.\n\n\nMETHODS\nWe studied 65,893 postmenopausal women without previous cardiovascular disease in 36 U.S. metropolitan areas from 1994 to 1998, with a median follow-up of 6 years. We assessed the women's exposure to air pollutants using the monitor located nearest to each woman's residence. Hazard ratios were estimated for the first cardiovascular event, adjusting for age, race or ethnic group, smoking status, educational level, household income, body-mass index, and presence or absence of diabetes, hypertension, or hypercholesterolemia.\n\n\nRESULTS\nA total of 1816 women had one or more fatal or nonfatal cardiovascular events, as confirmed by a review of medical records, including death from coronary heart disease or cerebrovascular disease, coronary revascularization, myocardial infarction, and stroke. In 2000, levels of PM2.5 exposure varied from 3.4 to 28.3 microg per cubic meter (mean, 13.5). Each increase of 10 microg per cubic meter was associated with a 24% increase in the risk of a cardiovascular event (hazard ratio, 1.24; 95% confidence interval [CI], 1.09 to 1.41) and a 76% increase in the risk of death from cardiovascular disease (hazard ratio, 1.76; 95% CI, 1.25 to 2.47). For cardiovascular events, the between-city effect appeared to be smaller than the within-city effect. The risk of cerebrovascular events was also associated with increased levels of PM2.5 (hazard ratio, 1.35; 95% CI, 1.08 to 1.68).\n\n\nCONCLUSIONS\nLong-term exposure to fine particulate air pollution is associated with the incidence of cardiovascular disease and death among postmenopausal women. Exposure differences within cities are associated with the risk of cardiovascular disease.",
"title": ""
},
{
"docid": "70612623517870632503f321977af4c9",
"text": "Today, the Open Standard for Authorization (OAuth) is widely used by many service providers such as Google, Github, and Facebook. The OAuth-WebView implementation is the most widely used approach despite explicit warnings to the developers of its security and privacy risks. Previous researches have discussed these risks and proposed solutions that mandate numerous implementation's changes and/or do not assume strong attacking assumptions. In this work, we introduce SecureOAuth, a whitelist access control protection framework for the Android platform. SecureOAuth is composed of: Android library modifications, service creation, and system app creation. We have implemented a prototype of the SecureOAuth framework and evaluated it on performance and memory overhead. We also showcase examples of security threats that this framework counters. The framework hardens the OAuth-WebView implementation with bounded overhead while keeping the user's involvement to minimum. Moreover, the framework requires no implementations' changes and it assumes attackers with advanced and expert skill levels.",
"title": ""
},
{
"docid": "993d20256b3fee12e46df15e72302139",
"text": "Searching for and making decisions about information is becoming increasingly difficult as the amount of information and number of choices increases. Recommendation systems help users find items of interest of a particular type, such as movies or restaurants, but are still somewhat awkward to use. Our solution is to take advantage of the complementary strengths of personalized recommendation systems and dialogue systems, creating personalized aides. We present a system – the Adaptive Place Advisor – that treats item selection as an interactive, conversational process, with the program inquiring about item attributes and the user responding. Individual, long-term user preferences are unobtrusively obtained in the course of normal recommendation dialogues and used to direct future conversations with the same user. We present a novel user model that influences both item search and the questions asked during a conversation. We demonstrate the effectiveness of our system in significantly reducing the time and number of interactions required to find a satisfactory item, as compared to a control group of users interacting with a non-adaptive version of the system.",
"title": ""
},
{
"docid": "490fe197e7ed6c658160c8a04ee1fc82",
"text": "Automatic concept learning from large scale imbalanced data sets is a key issue in video semantic analysis and retrieval, which means the number of negative examples is far more than that of positive examples for each concept in the training data. The existing methods adopt generally under-sampling for the majority negative examples or over-sampling for the minority positive examples to balance the class distribution on training data. The main drawbacks of these methods are: (1) As a key factor that affects greatly the performance, in most existing methods, the degree of re-sampling needs to be pre-fixed, which is not generally the optimal choice; (2) Many useful negative samples may be discarded in under-sampling. In addition, some works only focus on the improvement of the computational speed, rather than the accuracy. To address the above issues, we propose a new approach and algorithm named AdaOUBoost (Adaptive Over-sampling and Under-sampling Boost). The novelty of AdaOUBoost mainly lies in: adaptively over-sample the minority positive examples and under-sample the majority negative examples to form different sub-classifiers. And combine these sub-classifiers according to their accuracy to create a strong classifier, which aims to use fully the whole training data and improve the performance of the class-imbalance learning classifier. In AdaOUBoost, first, our clustering-based under-sampling method is employed to divide the majority negative examples into some disjoint subsets. Then, for each subset of negative examples, we utilize the borderline-SMOTE (synthetic minority over-sampling technique) algorithm to over-sample the positive examples with different size, train each sub-classifier using each of them, and get the classifier by fusing these sub-classifiers with different weights. Finally, we combine these classifiers in each subset of negative examples to create a strong classifier. We compare the performance between AdaOUBoost and the state-of-the-art methods on TRECVID 2008 benchmark with all 20 concepts, and the results show the AdaOUBoost can achieve the superior performance in large scale imbalanced data sets.",
"title": ""
},
{
"docid": "a9c4f01cfdbdde6245d99a9c5056f83f",
"text": "Brachyolmia (BO) is a heterogeneous group of skeletal dysplasias with skeletal changes limited to the spine or with minimal extraspinal features. BO is currently classified into types 1, 2, 3, and 4. BO types 1 and 4 are autosomal recessive conditions caused by PAPSS2 mutations, which may be merged together as an autosomal recessive BO (AR-BO). The clinical and radiological signs of AR-BO in late childhood have already been reported; however, the early manifestations and their age-dependent evolution have not been well documented. We report an affected boy with AR-BO, whose skeletal abnormalities were detected in utero and who was followed until 10 years of age. Prenatal ultrasound showed bowing of the legs. In infancy, radiographs showed moderate platyspondyly and dumbbell deformity of the tubular bones. Gradually, the platyspondyly became more pronounced, while the bowing of the legs and dumbbell deformities of the tubular bones diminished with age. In late childhood, the overall findings were consistent with known features of AR-BO. Genetic testing confirmed the diagnosis. Being aware of the initial skeletal changes may facilitate early diagnosis of PAPSS2-related skeletal dysplasias.",
"title": ""
},
{
"docid": "4eaa8c1af7a4f6f6c9de1e6de3f2495f",
"text": "Technologies to support the Internet of Things are becoming more important as the need to better understand our environments and make them smart increases. As a result it is predicted that intelligent devices and networks, such as WSNs, will not be isolated, but connected and integrated, composing computer networks. So far, the IP-based Internet is the largest network in the world; therefore, there are great strides to connect WSNs with the Internet. To this end, the IETF has developed a suite of protocols and open standards for accessing applications and services for wireless resource constrained networks. However, many open challenges remain, mostly due to the complex deployment characteristics of such systems and the stringent requirements imposed by various services wishing to make use of such complex systems. Thus, it becomes critically important to study how the current approaches to standardization in this area can be improved, and at the same time better understand the opportunities for the research community to contribute to the IoT field. To this end, this article presents an overview of current standards and research activities in both industry and academia.",
"title": ""
},
{
"docid": "e22f9516948725be20d8e331d5bafa56",
"text": "Spatial information captured from optical remote sensors on board unmanned aerial vehicles (UAVs) has great potential in automatic surveillance of electrical infrastructure. For an automatic vision-based power line inspection system, detecting power lines from a cluttered background is one of the most important and challenging tasks. In this paper, a novel method is proposed, specifically for power line detection from aerial images. A pulse coupled neural filter is developed to remove background noise and generate an edge map prior to the Hough transform being employed to detect straight lines. An improved Hough transform is used by performing knowledge-based line clustering in Hough space to refine the detection results. The experiment on real image data captured from a UAV platform demonstrates that the proposed approach is effective for automatic power line detection.",
"title": ""
},
{
"docid": "680d755a3a6d8fcd926eb441fad5aa57",
"text": "DNA hybridization arrays simultaneously measure the expression level for thousands of genes. These measurements provide a “snapshot” of transcription levels within the cell. A major challenge in computational biology is to uncover, from such measurements, gene/protein interactions and key biological features of cellular systems.\nIn this paper, we propose a new framework for discovering interactions between genes based on multiple expression measurements This framework builds on the use of Bayesian networks for representing statistical dependencies. A Bayesian network is a graph-based model of joint multi-variate probability distributions that captures properties of conditional independence between variables. Such models are attractive for their ability to describe complex stochastic processes, and for providing clear methodologies for learning from (noisy) observations.\nWe start by showing how Bayesian networks can describe interactions between genes. We then present an efficient algorithm capable of learning such networks and statistical method to assess our confidence in their features. Finally, we apply this method to the S. cerevisiae cell-cycle measurements of Spellman et al. [35] to uncover biological features",
"title": ""
},
{
"docid": "224ec7b58d17f4ffb9753ac85bf29456",
"text": "This paper presents Venus, a service for securing user interaction with untrusted cloud storage. Specifically, Venus guarantees integrity and consistency for applications accessing a key-based object store service, without requiring trusted components or changes to the storage provider. Venus completes all operations optimistically, guaranteeing data integrity. It then verifies operation consistency and notifies the application. Whenever either integrity or consistency is violated, Venus alerts the application. We implemented Venus and evaluated it with Amazon S3 commodity storage service. The evaluation shows that it adds no noticeable overhead to storage operations.",
"title": ""
},
{
"docid": "2f012c2941f8434b9d52ae1942b64aff",
"text": "Classification of plants based on a multi-organ approach is very challenging. Although additional data provide more information that might help to disambiguate between species, the variability in shape and appearance in plant organs also raises the degree of complexity of the problem. Despite promising solutions built using deep learning enable representative features to be learned for plant images, the existing approaches focus mainly on generic features for species classification, disregarding the features representing plant organs. In fact, plants are complex living organisms sustained by a number of organ systems. In our approach, we introduce a hybrid generic-organ convolutional neural network (HGO-CNN), which takes into account both organ and generic information, combining them using a new feature fusion scheme for species classification. Next, instead of using a CNN-based method to operate on one image with a single organ, we extend our approach. We propose a new framework for plant structural learning using the recurrent neural network-based method. This novel approach supports classification based on a varying number of plant views, capturing one or more organs of a plant, by optimizing the contextual dependencies between them. We also present the qualitative results of our proposed models based on feature visualization techniques and show that the outcomes of visualizations depict our hypothesis and expectation. Finally, we show that by leveraging and combining the aforementioned techniques, our best network outperforms the state of the art on the PlantClef2015 benchmark. The source code and models are available at https://github.com/cs-chan/Deep-Plant.",
"title": ""
}
] | scidocsrr |
cf924398bc98316b3b981c4e7f28cce1 | Defense Against Adversarial Attacks with Saak Transform | [
{
"docid": "06e8a075db8e18ca0b3a1dd91b89af45",
"text": "Deep neural networks have proven remarkably effective at solving many classification problems, but have been criticized recently for two major weaknesses: the reasons behind their predictions are uninterpretable, and the predictions themselves can often be fooled by small adversarial perturbations. These problems pose major obstacles for the adoption of neural networks in domains that require security or transparency. In this work, we evaluate the effectiveness of defenses that differentiably penalize the degree to which small changes in inputs can alter model predictions. Across multiple attacks, architectures, defenses, and datasets, we find that neural networks trained with this input gradient regularization exhibit robustness to transferred adversarial examples generated to fool all of the other models. We also find that adversarial examples generated to fool gradient-regularized models fool all other models equally well, and actually lead to more “legitimate,” interpretable misclassifications as rated by people (which we confirm in a human subject experiment). Finally, we demonstrate that regularizing input gradients makes them more naturally interpretable as rationales for model predictions. We conclude by discussing this relationship between interpretability and robustness in deep neural",
"title": ""
},
{
"docid": "0d23f763744f39614ecef498ed4c2c31",
"text": "Deep Neural Networks (DNNs) have achieved remarkable performance in a myriad of realistic applications. However, recent studies show that welltrained DNNs can be easily misled by adversarial examples (AE) – the maliciously crafted inputs by introducing small and imperceptible input perturbations. Existing mitigation solutions, such as adversarial training and defensive distillation, suffer from expensive retraining cost and demonstrate marginal robustness improvement against the stateof-the-art attacks like CW family adversarial examples. In this work, we propose a novel low-cost “feature distillation” strategy to purify the adversarial input perturbations of AEs by redesigning the popular image compression framework “JPEG”. The proposed “feature distillation” wisely maximizes the malicious feature loss of AE perturbations during image compression while suppressing the distortions of benign features essential for high accurate DNN classification. Experimental results show that our method can drastically reduce the success rate of various state-of-the-art AE attacks by ∼ 60% on average for both CIFAR-10 and ImageNet benchmarks without harming the testing accuracy, outperforming existing solutions like default JPEG compression and “feature squeezing”.",
"title": ""
},
{
"docid": "2bc30693be1c5855a9410fb453128054",
"text": "Person re-identification is to match pedestrian images from disjoint camera views detected by pedestrian detectors. Challenges are presented in the form of complex variations of lightings, poses, viewpoints, blurring effects, image resolutions, camera settings, occlusions and background clutter across camera views. In addition, misalignment introduced by the pedestrian detector will affect most existing person re-identification methods that use manually cropped pedestrian images and assume perfect detection. In this paper, we propose a novel filter pairing neural network (FPNN) to jointly handle misalignment, photometric and geometric transforms, occlusions and background clutter. All the key components are jointly optimized to maximize the strength of each component when cooperating with others. In contrast to existing works that use handcrafted features, our method automatically learns features optimal for the re-identification task from data. The learned filter pairs encode photometric transforms. Its deep architecture makes it possible to model a mixture of complex photometric and geometric transforms. We build the largest benchmark re-id dataset with 13, 164 images of 1, 360 pedestrians. Unlike existing datasets, which only provide manually cropped pedestrian images, our dataset provides automatically detected bounding boxes for evaluation close to practical applications. Our neural network significantly outperforms state-of-the-art methods on this dataset.",
"title": ""
},
{
"docid": "11a69c06f21e505b3e05384536108325",
"text": "Most existing machine learning classifiers are highly vulnerable to adversarial examples. An adversarial example is a sample of input data which has been modified very slightly in a way that is intended to cause a machine learning classifier to misclassify it. In many cases, these modifications can be so subtle that a human observer does not even notice the modification at all, yet the classifier still makes a mistake. Adversarial examples pose security concerns because they could be used to perform an attack on machine learning systems, even if the adversary has no access to the underlying model. Up to now, all previous work have assumed a threat model in which the adversary can feed data directly into the machine learning classifier. This is not always the case for systems operating in the physical world, for example those which are using signals from cameras and other sensors as an input. This paper shows that even in such physical world scenarios, machine learning systems are vulnerable to adversarial examples. We demonstrate this by feeding adversarial images obtained from cell-phone camera to an ImageNet Inception classifier and measuring the classification accuracy of the system. We find that a large fraction of adversarial examples are classified incorrectly even when perceived through the camera.",
"title": ""
}
] | [
{
"docid": "4683411126e9b7a307b345f4a052059a",
"text": "In industrialized countries there is a rapidly increasing demand from the consumer for fresh-like, minimally processed food products and in developing countries, food storable without refrigeration are of special interest, because refrigeration is costly and not continuously available. Hurdle technology is an intelligent mix of hurdles which works synergistically and provides safe, healthy products of high quality. The present review focuses on hurdle technology: different types of hurdles used, how these hurdles work together (mechanism), its effect on the microorganism and ultimately it explains how it gives a quality food product. A literature search was carried out and a total of 11 food products and their effect after the application of hurdle technology were studied. It was found that the application of this technology will result in a safe product with optimal shelf life, improved microbial stability, sensory quality, nutritional & economic properties, convenient to use, incur in less transportation and storage costs. Thus, hurdle technology is a technology which aims to improve the total quality of foods by the application of an intelligent mix of hurdles. Keywords-Hurdle technology, hurdles, inactivation, quality, stability",
"title": ""
},
{
"docid": "f94ef71233db13830d29ef9a0802f140",
"text": "In deterministic optimization, line searches are a standard tool ensuring stability and efficiency. Where only stochastic gradients are available, no direct equivalent has so far been formulated, because uncertain gradients do not allow for a strict sequence of decisions collapsing the search space. We construct a probabilistic line search by combining the structure of existing deterministic methods with notions from Bayesian optimization. Our method retains a Gaussian process surrogate of the univariate optimization objective, and uses a probabilistic belief over the Wolfe conditions to monitor the descent. The algorithm has very low computational cost, and no user-controlled parameters. Experiments show that it effectively removes the need to define a learning rate for stochastic gradient descent.",
"title": ""
},
{
"docid": "888de1004e212e1271758ac35ff9807d",
"text": "We present the design and implementation of iVoLVER, a tool that allows users to create visualizations without textual programming. iVoLVER is designed to enable flexible acquisition of many types of data (text, colors, shapes, quantities, dates) from multiple source types (bitmap charts, webpages, photographs, SVGs, CSV files) and, within the same canvas, supports transformation of that data through simple widgets to construct interactive animated visuals. Aside from the tool, which is web-based and designed for pen and touch, we contribute the design of the interactive visual language and widgets for extraction, transformation, and representation of data. We demonstrate the flexibility and expressive power of the tool through a set of scenarios, and discuss some of the challenges encountered and how the tool fits within the current infovis tool landscape.",
"title": ""
},
{
"docid": "9a65a5c09df7e34383056509d96e772d",
"text": "With explosive growth of Android malware and due to its damage to smart phone users (e.g., stealing user credentials, resource abuse), Android malware detection is one of the cyber security topics that are of great interests. Currently, the most significant line of defense against Android malware is anti-malware software products, such as Norton, Lookout, and Comodo Mobile Security, which mainly use the signature-based method to recognize threats. However, malware attackers increasingly employ techniques such as repackaging and obfuscation to bypass signatures and defeat attempts to analyze their inner mechanisms. The increasing sophistication of Android malware calls for new defensive techniques that are harder to evade, and are capable of protecting users against novel threats. In this paper, we propose a novel dynamic analysis method named Component Traversal that can automatically execute the code routines of each given Android application (app) as completely as possible. Based on the extracted Linux kernel system calls, we further construct the weighted directed graphs and then apply a deep learning framework resting on the graph based features for newly unknown Android malware detection. A comprehensive experimental study on a real sample collection from Comodo Cloud Security Center is performed to compare various malware detection approaches. Promising experimental results demonstrate that our proposed method outperforms other alternative Android malware detection techniques. Our developed system Deep4MalDroid has also been integrated into a commercial Android anti-malware software.",
"title": ""
},
{
"docid": "0f927fc7b8005ee6bb6ec22d8070a062",
"text": "We propose a Dynamic-Spatial-Attention (DSA) Recurrent Neural Network (RNN) for anticipating accidents in dashcam videos (Fig. 1). Our DSA-RNN learns to (1) distribute soft-attention to candidate objects dynamically to gather subtle cues and (2) model the temporal dependencies of all cues to robustly anticipate an accident. Anticipating accidents is much less addressed than anticipating events such as changing a lane, making a turn, etc., since accidents are rare to be observed and can happen in many different ways mostly in a sudden. To overcome these challenges, we (1) utilize state-of-the-art object detector [3] to detect candidate objects, and (2) incorporate full-frame and object-based appearance and motion features in our model. We also harvest a diverse dataset of 678 dashcam accident videos on the web (Fig. 3). The dataset is unique, since various accidents (e.g., a motorbike hits a car, a car hits another car, etc.) occur in all videos. We manually mark the time-location of accidents and use them as supervision to train and evaluate our method. We show that our method anticipates accidents about 2 seconds before they occur with 80% recall and 56.14% precision. Most importantly, it achieves the highest mean average precision (74.35%) outperforming other baselines without attention or RNN. 2 Fu-Hsiang Chan, Yu-Ting Chen, Yu Xiang, Min Sun",
"title": ""
},
{
"docid": "4334f0fffe71b3250ac8ee78f326f04d",
"text": "The frequency distribution of words has been a key object of study in statistical linguistics for the past 70 years. This distribution approximately follows a simple mathematical form known as Zipf's law. This article first shows that human language has a highly complex, reliable structure in the frequency distribution over and above this classic law, although prior data visualization methods have obscured this fact. A number of empirical phenomena related to word frequencies are then reviewed. These facts are chosen to be informative about the mechanisms giving rise to Zipf's law and are then used to evaluate many of the theoretical explanations of Zipf's law in language. No prior account straightforwardly explains all the basic facts or is supported with independent evaluation of its underlying assumptions. To make progress at understanding why language obeys Zipf's law, studies must seek evidence beyond the law itself, testing assumptions and evaluating novel predictions with new, independent data.",
"title": ""
},
{
"docid": "912ba1dcf32b892a1ef8a832eb0ac88a",
"text": "Training technicians to acquire newmaintenance and assembly skills is important for various industries. Becausemaintenance and assembly tasks can be very complex, training technicians to efficiently perform new skills is challenging. Training of this type can be supported by Augmented Reality, a powerful industrial training technology that directly links instructions on how to perform the service tasks to the machine parts that require processing. Because of the increasing complexity ofmaintenance tasks, it is not sufficient to train the technicians in task execution. Instead, techniciansmust be trained in the underlying skills—sensorimotor and cognitive—that are necessary for the efficient acquisition and performance of new maintenance operations. These facts illustrate the need for efficient training systems for maintenance and assembly skills that accelerate the technicians’ acquisition of new maintenance procedures. Furthermore, these systems should improve the adjustment of the training process for new training scenarios and enable the reuse of worthwhile existing training material. In this context, we have developed a novel concept and platform for multimodal Augmented Reality-based training of maintenance and assembly skills, which includes sub-skill training and the evaluation of the training system. Because procedural skills are considered as the most important skills for maintenance and assembly operations, we focus on these skills and the appropriate methods for improving them. © 2012 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "7d86abdf71d6c9dd05fc41e63952d7bf",
"text": "Crowdsourced 3D CAD models are easily accessible online, and can potentially generate an infinite number of training images for almost any object category. We show that augmenting the training data of contemporary Deep Convolutional Neural Net (DCNN) models with such synthetic data can be effective, especially when real training data is limited or not well matched to the target domain. Most freely available CAD models capture 3D shape but are often missing other low level cues, such as realistic object texture, pose, or background. In a detailed analysis, we use synthetic CAD images to probe the ability of DCNN to learn without these cues, with surprising findings. In particular, we show that when the DCNN is fine-tuned on the target detection task, it exhibits a large degree of invariance to missing low-level cues, but, when pretrained on generic ImageNet classification, it learns better when the low-level cues are simulated. We show that our synthetic DCNN training approach significantly outperforms previous methods on the benchmark PASCAL VOC2007 dataset when learning in the few-shot scenario and improves performance in a domain shift scenario on the Office benchmark.",
"title": ""
},
{
"docid": "2ca724c035515a7e5a4369fae856f8a1",
"text": "This paper presents a model-based planner called the Probabilistic Sulu Planner or the p-Sulu Planner, which controls stochastic systems in a goal directed manner within user-specified risk bounds. The objective of the p-Sulu Planner is to allow users to command continuous, stochastic systems, such as unmanned aerial and space vehicles, in a manner that is both intuitive and safe. To this end, we first develop a new plan representation called a chance-constrained qualitative state plan (CCQSP), through which users can specify the desired evolution of the plant state as well as the acceptable level of risk. An example of a CCQSP statement is “go to A through B within 30 minutes, with less than 0.001% probability of failure.” We then develop the p-Sulu Planner, which can tractably solve a CCQSP planning problem. In order to enable CCQSP planning, we develop the following two capabilities in this paper: 1) risk-sensitive planning with risk bounds, and 2) goal-directed planning in a continuous domain with temporal constraints. The first capability is to ensures that the probability of failure is bounded. The second capability is essential for the planner to solve problems with a continuous state space such as vehicle path planning. We demonstrate the capabilities of the p-Sulu Planner by simulations on two real-world scenarios: the path planning and scheduling of a personal aerial vehicle as well as the space rendezvous of an autonomous cargo spacecraft.",
"title": ""
},
{
"docid": "1847cce79f842a7d01f1f65721c1f007",
"text": "Many tasks in AI require the collaboration of multiple agents. Typically, the communication protocol between agents is manually specified and not altered during training. In this paper we explore a simple neural model, called CommNN, that uses continuous communication for fully cooperative tasks. The model consists of multiple agents and the communication between them is learned alongside their policy. We apply this model to a diverse set of tasks, demonstrating the ability of the agents to learn to communicate amongst themselves, yielding improved performance over non-communicative agents and baselines. In some cases, it is possible to interpret the language devised by the agents, revealing simple but effective strategies for solving the task at hand.",
"title": ""
},
{
"docid": "96fbd665c43461b7cd8bbbe1f0aa43e4",
"text": "Inductor current sensing is becoming widely used in current programmed controllers for microprocessor applications. This method exploits a low-pass filter in parallel with the inductor to provide lossless current sense. A major drawback of inductor current sensing is that accurate sense the DC and AC components of the current signal requires precise matching between the low-pass filter time constant and the inductor time constant (L/RL). However, matching accuracy depends on the tolerance of the components and on the operating conditions; therefore it can hardly be guaranteed. To overcome this problem, a novel digital auto-tuning system is proposed that automatically compensates any time constant mismatch. This auto-tuning system has been developed for VRM current programmed controllers. It makes it possible to meet the adaptive voltage positioning requirements using conventional and low cost components, and to solve problems such as aging effects, temperature variations and process tolerances as well. A prototype of the auto-tuning system based on an FPGA and a commercial DC/DC controller has been designed and tested. The experimental results fully confirmed the effectiveness of the proposed method, showing an improvement of the current sense precision from about 30% up to 4%. This innovative solution is suitable to fulfill the challenging accuracy specifications required by the future VRM applications",
"title": ""
},
{
"docid": "9f84630422777d869edd7167ff6da443",
"text": "Video surveillance, closed-circuit TV and IP-camera systems became virtually omnipresent and indispensable for many organizations, businesses, and users. Their main purpose is to provide physical security, increase safety, and prevent crime. They also became increasingly complex, comprising many communication means, embedded hardware and non-trivial firmware. However, most research to date focused mainly on the privacy aspects of such systems, and did not fully address their issues related to cyber-security in general, and visual layer (i.e., imagery semantics) attacks in particular. In this paper, we conduct a systematic review of existing and novel threats in video surveillance, closed-circuit TV and IP-camera systems based on publicly available data. The insights can then be used to better understand and identify the security and the privacy risks associated with the development, deployment and use of these systems. We study existing and novel threats, along with their existing or possible countermeasures, and summarize this knowledge into a comprehensive table that can be used in a practical way as a security checklist when assessing cyber-security level of existing or new CCTV designs and deployments. We also provide a set of recommendations and mitigations that can help improve the security and privacy levels provided by the hardware, the firmware, the network communications and the operation of video surveillance systems. We hope the findings in this paper will provide a valuable knowledge of the threat landscape that such systems are exposed to, as well as promote further research and widen the scope of this field beyond its current boundaries.",
"title": ""
},
{
"docid": "e42a1faf3d983bac59c0bfdd79212093",
"text": "L eadership matters, according to prominent leadership scholars (see also Bennis, 2007). But what is leadership? That turns out to be a challenging question to answer. Leadership is a complex and diverse topic, and trying to make sense of leadership research can be an intimidating endeavor. One comprehensive handbook of leadership (Bass, 2008), covering more than a century of scientific study, comprises more than 1,200 pages of text and more than 200 additional pages of references! There is clearly a substantial scholarly body of leadership theory and research that continues to grow each year. Given the sheer volume of leadership scholarship that is available, our purpose is not to try to review it all. That is why our focus is on the nature or essence of leadership as we and our chapter authors see it. But to fully understand and appreciate the nature of leadership, it is essential that readers have some background knowledge of the history of leadership research, the various theoretical streams that have evolved over the years, and emerging issues that are pushing the boundaries of the leadership frontier. Further complicating our task is that more than one hundred years of leadership research have led to several paradigm shifts and a voluminous body of knowledge. On several occasions, scholars of leadership became quite frustrated by the large amount of false starts, incremental theoretical advances, and contradictory findings. As stated more than five decades ago by Warren Bennis (1959, pp. 259–260), “Of all the hazy and confounding areas in social psychology, leadership theory undoubtedly contends for Leadership: Past, Present, and Future",
"title": ""
},
{
"docid": "df4146f0b223b9bc7a983a4198589b48",
"text": "Since its official introduction in 2012, the Robot Web Tools project has grown tremendously as an open-source community, enabling new levels of interoperability and portability across heterogeneous robot systems, devices, and front-end user interfaces. At the heart of Robot Web Tools is the rosbridge protocol as a general means for messaging ROS topics in a client-server paradigm suitable for wide area networks, and human-robot interaction at a global scale through modern web browsers. Building from rosbridge, this paper describes our efforts with Robot Web Tools to advance: 1) human-robot interaction through usable client and visualization libraries for more efficient development of front-end human-robot interfaces, and 2) cloud robotics through more efficient methods of transporting high-bandwidth topics (e.g., kinematic transforms, image streams, and point clouds). We further discuss the significant impact of Robot Web Tools through a diverse set of use cases that showcase the importance of a generic messaging protocol and front-end development systems for human-robot interaction.",
"title": ""
},
{
"docid": "0cc02773fd194c42071f8500a0c88261",
"text": "Neuroscientific and psychological data suggest a close link between affordance and mirror systems in the brain. However, we still lack a full understanding of both the individual systems and their interactions. Here, we propose that the architecture and functioning of the two systems is best understood in terms of two challenges faced by complex organisms, namely: (a) the need to select among multiple affordances and possible actions dependent on context and high-level goals and (b) the exploitation of the advantages deriving from a hierarchical organisation of behaviour based on actions and action-goals. We first review and analyse the psychological and neuroscientific literature on the mechanisms and processes organisms use to deal with these challenges. We then analyse existing computational models thereof. Finally we present the design of a computational framework that integrates the reviewed knowledge. The framework can be used both as a theoretical guidance to interpret empirical data and design new experiments, and to design computational models addressing specific problems debated in the literature.",
"title": ""
},
{
"docid": "1d6066e7adbaccaf97e2b55a6bd0c084",
"text": "This paper presents a Java-based hyperbolic-style browser designed to render RDF files as structured ontological maps. The program was motivated by the need to browse the content of a web-accessible ontology server: WEBKB-2. The ontology server contains descriptions of over 74,500 object types derived from the WORDNET 1.7 lexical database and can be accessed using RDF syntax. Such a structure creates complications for hyperbolic-style displays. In WEBKB-2 there are 140 stable ontology link types and a hyperbolic display needs to filter and iconify the view so different link relations can be distinguished in multi-link views. Our browsing tool, ONTORAMA, is therefore motivated by two possibly interfering aims: the first to display up to 10 times the number of nodes in a hyperbolicstyle view than using a conventional graphics display; secondly, to render the ontology with multiple links comprehensible in that view.",
"title": ""
},
{
"docid": "5121650dfe1625bb03b45d28e32c65ea",
"text": "Data mining is process to analyses number of data sets and then extracts the meaning of data. It helps to predict the patterns and future trends, allowing business in decision making. Data mining applications are able to give the answer of business questions which can take much time to resolve traditionally. High amount of data that can be generated for the prediction of disease is analyzed traditionally and is too complicated along with voluminous to be processed. Data mining provides methods and techniques for transformation of the data into useful information for decision making. These techniques can make process fast and take less time to predict the heart disease with more accuracy. The healthcare sector assembles enormous quantity of healthcare data which cannot be mined to uncover hidden information for effectual decision making. However, there is a plenty of hidden information in this data which is untapped and not being used appropriately for predictions. It becomes more influential in case of heart disease that is considered as the predominant reason behind death all over the world. In medical field, Data Mining provides several methods which are widely used in the medical and clinical decision support systems which should be helpful for diagnosis and predicting of various diseases. These data mining techniques can be used in heart diseases takes less time and make the process much faster for the prediction system to predict diseases with good accuracy to improve their health. In this paper we survey different papers in which one or more algorithms of data mining used for the prediction of heart disease. By Applying data mining techniques to heart disease data which requires to be processed, we can get effective results and achieve reliable performance which will help in decision making in healthcare industry. It will help the medical practitioners to diagnose the disease in less time and predict probable complications well in advance. Identify the major risk factors of Heart Disease categorizing the risk factors in an order which causes damages to the heart such as diabetes, high blood cholesterol, obesity, hyper tension, smoking, poor diet, stress, etc. Data mining techniques and functions are used to identify the level of risk factors which helps the patients to take precautions in advance to save their life. Keywords—Data mining, disease prediction, KNN,decision tree, SVM",
"title": ""
},
{
"docid": "3d3f2c536a397007338572a17da80b7b",
"text": "Traffic engineering is an important mechanism for Internet network providers seeking to optimize network performance and traffic delivery. Routing optimization plays a key role in traffic engineering, finding efficient routes so as to achieve the desired network performance. In this survey we review Internet traffic engineering from the perspective of routing optimization. A taxonomy of routing algorithms in the literature is provided, dating from the advent of the TE concept in the late 1990s. We classify the algorithms into multiple dimensions: unicast/multicast, intra-/inter- domain, IP-/MPLS-based and offline/online TE schemes. In addition, we investigate some important traffic engineering issues, including robustness, TE interactions, and interoperability with overlay selfish routing. In addition to a review of existing solutions, we also point out some challenges in TE operation and important issues that are worthy of investigation in future research activities.",
"title": ""
},
{
"docid": "dbbf8da8ac3d797409d137987ca6c15e",
"text": "Detecting fraudulent and abusive cases in healthcare is one of the most challenging problems for data mining studies. However, most of the existing studies have a shortage of real data for analysis and focus on a very limited version of the problem by covering only a specific actor, healthcare service, or disease. The purpose of this study is to implement and evaluate a novel framework to detect fraudulent and abusive cases independently from the actors and commodities involved in the claims and an extensible structure to introduce new fraud and abuse types. Interactive machine learning that allows incorporating expert knowledge in an unsupervised setting is utilized to detect fraud and abusive cases in healthcare. In order to increase the accuracy of the framework, several well-known methods are utilized, such as the pairwise comparison method of analytic hierarchical processing (AHP) for weighting the actors and attributes, expectation maximization (EM) for clustering similar actors, two-stage data warehousing for proactive risk calculations, visualization tools for effective analyzing, and z-score and standardization in order to calculate the risks. The experts are involved in all phases of the study and produce six different abnormal behavior types using storyboards. The proposed framework is evaluated with real-life data for six different abnormal behavior types for prescriptions by covering all relevant actors and commodities. The Area Under the Curve (AUC) values are presented for each experiment. Moreover, a cost-saving model is also presented. The developed framework, i.e., the eFAD suite, is actorand commodity-independent, configurable (i.e., easily adaptable in the dynamic environment of fraud and abusive behaviors), and effectively handles the fragmented nature of abnormal behaviors. The proposed framework combines both proactive and retrospective analysis with an enhanced visualization tool that significantly reduces the time requirements for the fact-finding process after the eFAD detects risky claims. This system is utilized by a company to produce monthly reports that include abnormal behaviors to be evaluated by the insurance company. © 2015 Elsevier B.V. All rights reserved.",
"title": ""
}
] | scidocsrr |
6de0e8c4f027268cff896f11872c785f | Dynamic topic detection and tracking: A comparison of HDP, C-word, and cocitation methods | [
{
"docid": "2855a1f420ed782317c1598c9d9c185e",
"text": "Ranking authors is vital for identifying a researcher’s impact and his standing within a scientific field. There are many different ranking methods (e.g., citations, publications, h-index, PageRank, and weighted PageRank), but most of them are topic-independent. This paper proposes topic-dependent ranks based on the combination of a topic model and a weighted PageRank algorithm. The Author-Conference-Topic (ACT) model was used to extract topic distribution of individual authors. Two ways for combining the ACT model with the PageRank algorithm are proposed: simple combination (I_PR) or using a topic distribution as a weighted vector for PageRank (PR_t). Information retrieval was chosen as the test field and representative authors for different topics at different time phases were identified. Principal Component Analysis (PCA) was applied to analyze the ranking difference between I_PR and PR_t.",
"title": ""
}
] | [
{
"docid": "9cb682049f4a4d1291189b7cfccafb1e",
"text": "The sequencing by hybridization (SBH) of determining the order in which nucleotides should occur on a DNA string is still under discussion for enhancements on computational intelligence although the next generation of DNA sequencing has come into existence. In the last decade, many works related to graph theory-based DNA sequencing have been carried out in the literature. This paper proposes a method for SBH by integrating hypergraph with genetic algorithm (HGGA) for designing a novel analytic technique to obtain DNA sequence from its spectrum. The paper represents elements of the spectrum and its relation as hypergraph and applies the unimodular property to ensure the compatibility of relations between l-mers. The hypergraph representation and unimodular property are bound with the genetic algorithm that has been customized with a novel selection and crossover operator reducing the computational complexity with accelerated convergence. Subsequently, upon determining the primary strand, an anti-homomorphism is invoked to find the reverse complement of the sequence. The proposed algorithm is implemented in the GenBank BioServer datasets, and the results are found to prove the efficiency of the algorithm. The HGGA is a non-classical algorithm with significant advantages and computationally attractive complexity reductions ranging to $$O(n^{2} )$$ O ( n 2 ) with improved accuracy that makes it prominent for applications other than DNA sequencing like image processing, task scheduling and big data processing.",
"title": ""
},
{
"docid": "2e9d0bf42b8bb6eb8752e89eb46f2fc5",
"text": "What is the growth pattern of social networks, like Facebook and WeChat? Does it truly exhibit exponential early growth, as predicted by textbook models like the Bass model, SI, or the Branching Process? How about the count of links, over time, for which there are few published models?\n We examine the growth of several real networks, including one of the world's largest online social network, ``WeChat'', with 300 million nodes and 4.75 billion links by 2013; and we observe power law growth for both nodes and links, a fact that completely breaks the sigmoid models (like SI, and Bass). In its place, we propose NETTIDE, along with differential equations for the growth of the count of nodes, as well as links. Our model accurately fits the growth patterns of real graphs; it is general, encompassing as special cases all the known, traditional models (including Bass, SI, log-logistic growth); while still remaining parsimonious, requiring only a handful of parameters. Moreover, our NETTIDE for link growth is the first one of its kind, accurately fitting real data, and naturally leading to the densification phenomenon. We validate our model with four real, time-evolving social networks, where NETTIDE gives good fitting accuracy, and, more importantly, applied on the WeChat data, our NETTIDE forecasted more than 730 days into the future, with 3% error.",
"title": ""
},
{
"docid": "380dc2289f621b06f0085a1d8e178638",
"text": "Feature modeling is an important approach to capture the commonalities and variabilities in system families and product lines. Cardinality-based feature modeling integrates a number of existing extensions of the original feature-modeling notation from Feature-Oriented Domain Analysis. Staged configuration is a process that allows the incremental configuration of cardinality-based feature models. It can be achieved by performing a step-wise specialization of the feature model. In this paper, we argue that cardinality-based feature models can be interpreted as a special class of context-free grammars. We make this precise by specifying a translation from a feature model into a context-free grammar. Consequently, we provide a semantic interpretation for cardinalitybased feature models by assigning an appropriate semantics to the language recognized by the corresponding grammar. Finally, we give an account on how feature model specialization can be formalized as transformations on the grammar equivalent of feature models.",
"title": ""
},
{
"docid": "5e6a2439641793594087d0543fcaec99",
"text": "Background: Virtual Machine (VM) consolidation is an effective technique to improve resource utilization and reduce energy footprint in cloud data centers. It can be implemented in a centralized or a distributed fashion. Distributed VM consolidation approaches are currently gaining popularity because they are often more scalable than their centralized counterparts and they avoid a single point of failure. Objective: To present a comprehensive, unbiased overview of the state-of-the-art on distributed VM consolidation approaches. Method: A Systematic Mapping Study (SMS) of the existing distributed VM consolidation approaches. Results: 19 papers on distributed VM consolidation categorized in a variety of ways. The results show that the existing distributed VM consolidation approaches use four types of algorithms, optimize a number of different objectives, and are often evaluated with experiments involving simulations. Conclusion: There is currently an increasing amount of interest on developing and evaluating novel distributed VM consolidation approaches. A number of research gaps exist where the focus of future research may be directed.",
"title": ""
},
{
"docid": "018d05daa52fb79c17519f29f31026d7",
"text": "The aim of this paper is to review conceptual and empirical literature on the concept of distributed leadership (DL) in order to identify its origins, key arguments and areas for further work. Consideration is given to the similarities and differences between DL and related concepts, including ‘shared’, ‘collective’, ‘collaborative’, ‘emergent’, ‘co-’ and ‘democratic’ leadership. Findings indicate that, while there are some common theoretical bases, the relative usage of these concepts varies over time, between countries and between sectors. In particular, DL is a notion that has seen a rapid growth in interest since the year 2000, but research remains largely restricted to the field of school education and of proportionally more interest to UK than US-based academics. Several scholars are increasingly going to great lengths to indicate that, in order to be ‘distributed’, leadership need not necessarily be widely ‘shared’ or ‘democratic’ and, in order to be effective, there is a need to balance different ‘hybrid configurations’ of practice. The paper highlights a number of areas for further attention, including three factors relating to the context of much work on DL (power and influence; organizational boundaries and context; and ethics and diversity), and three methodological and developmental challenges (ontology; research methods; and leadership development, reward and recognition). It is concluded that descriptive and normative perspectives which dominate the literature should be supplemented by more critical accounts which recognize the rhetorical and discursive significance of DL in (re)constructing leader– follower identities, mobilizing collective engagement and challenging or reinforcing traditional forms of organization.",
"title": ""
},
{
"docid": "a2223d57a866b0a0ef138e52fb515b84",
"text": "This paper is concerned with paraphrase detection, i.e., identifying sentences that are semantically identical. The ability to detect similar sentences written in natural language is crucial for several applications, such as text mining, text summarization, plagiarism detection, authorship authentication and question answering. Recognizing this importance, we study in particular how to address the challenges with detecting paraphrases in user generated short texts, such as Twitter, which often contain language irregularity and noise, and do not necessarily contain as much semantic information as longer clean texts. We propose a novel deep neural network-based approach that relies on coarse-grained sentence modelling using a convolutional neural network (CNN) and a recurrent neural network (RNN) model, combined with a specific fine-grained word-level similarity matching model. More specifically, we develop a new architecture, called DeepParaphrase, which enables to create an informative semantic representation of each sentence by (1) using CNN to extract the local region information in form of important n-grams from the sentence, and (2) applying RNN to capture the long-term dependency information. In addition, we perform a comparative study on stateof-the-art approaches within paraphrase detection. An important insight from this study is that existing paraphrase approaches perform well when applied on clean texts, but they do not necessarily deliver good performance against noisy texts, and vice versa. In contrast, our evaluation has shown that the proposed DeepParaphrase-based approach achieves good results in both types of texts, thus making it more robust and generic than the existing approaches.",
"title": ""
},
{
"docid": "43cd94df4a686b89ab6ca5e2782f5a54",
"text": "Relational databases scattered over the web are generally opaque to regular web crawling tools. To address this concern, many RDB-to-RDF approaches have been proposed over the last years. In this paper, we propose a detailed review of seventeen RDB-to-RDF initiatives, considering end-to-end projects that delivered operational tools. The different tools are classified along three major axes: mapping description language, mapping implementation and data retrieval method. We analyse the motivations, commonalities and differences between existing approaches. The expressiveness of existing mapping languages is not always sufficient to produce semantically rich data and make it usable, interoperable and linkable. We therefore briefly present various strategies investigated in the literature to produce additional knowledge. Finally, we show that R2RML, the W3C recommendation for describing RDB to RDF mappings, may not apply to all needs in the wide scope of RDB to RDF translation applications, leaving space for future extensions.",
"title": ""
},
{
"docid": "ffd84e3418a6d1d793f36bfc2efed6be",
"text": "Anterior cingulate cortex (ACC) is a part of the brain's limbic system. Classically, this region has been related to affect, on the basis of lesion studies in humans and in animals. In the late 1980s, neuroimaging research indicated that ACC was active in many studies of cognition. The findings from EEG studies of a focal area of negativity in scalp electrodes following an error response led to the idea that ACC might be the brain's error detection and correction device. In this article, these various findings are reviewed in relation to the idea that ACC is a part of a circuit involved in a form of attention that serves to regulate both cognitive and emotional processing. Neuroimaging studies showing that separate areas of ACC are involved in cognition and emotion are discussed and related to results showing that the error negativity is influenced by affect and motivation. In addition, the development of the emotional and cognitive roles of ACC are discussed, and how the success of this regulation in controlling responses might be correlated with cingulate size. Finally, some theories are considered about how the different subdivisions of ACC might interact with other cortical structures as a part of the circuits involved in the regulation of mental and emotional activity.",
"title": ""
},
{
"docid": "ed83ce40780419961a8c5eeca780636e",
"text": "Some objects in our environment are strongly tied to motor actions, a phenomenon called object affordance. A cup, for example, affords us to reach out to it and grasp it by its handle. Studies indicate that merely viewing an affording object triggers motor activations in the brain. The present study investigated whether object affordance would also result in an attention bias, that is, whether observers would rather attend to graspable objects within reach compared to non-graspable but reachable objects or to graspable objects out of reach. To this end, we conducted a combined reaction time and motion tracking study with a table in a virtual three-dimensional space. Two objects were positioned on the table, one near, the other one far from the observer. In each trial, two graspable objects, two non-graspable objects, or a combination of both was presented. Participants were instructed to detect a probe appearing on one of the objects as quickly as possible. Detection times served as indirect measure of attention allocation. The motor association with the graspable object was additionally enhanced by having participants grasp a real object in some of the trials. We hypothesized that visual attention would be preferentially allocated to the near graspable object, which should be reflected in reduced reaction times in this condition. Our results confirm this assumption: probe detection was fastest at the graspable object at the near position compared to the far position or to a non-graspable object. A follow-up experiment revealed that in addition to object affordance per se, immediate graspability of an affording object may also influence this near-space advantage. Our results suggest that visuospatial attention is preferentially allocated to affording objects which are immediately graspable, and thus establish a strong link between an object' s motor affordance and visual attention.",
"title": ""
},
{
"docid": "7bd3f6b7b2f79f08534b70c16be91c02",
"text": "This paper describes a dual-loop delay-locked loop (DLL) which overcomes the problem of a limited delay range by using multiple voltage-controlled delay lines (VCDLs). A reference loop generates quadrature clocks, which are then delayed with controllable amounts by four VCDLs and multiplexed to generate the output clock in a main loop. This architecture enables the DLL to emulate the infinite-length VCDL with multiple finite-length VCDLs. The DLL incorporates a replica biasing circuit for low-jitter characteristics and a duty cycle corrector immune to prevalent process mismatches. A test chip has been fabricated using a 0.25m CMOS process. At 400 MHz, the peak-to-peak jitter with a quiet 2.5-V supply is 54 ps, and the supply-noise sensitivity is 0.32 ps/mV.",
"title": ""
},
{
"docid": "65da855a28cff9bf67c9f5e42aae9b02",
"text": "Barnacles are a persistent fouling problem in the marine environment, although their effects (eg reduced fuel efficiency, increased corrosion) can be reduced through the application of antifouling or fouling-release coatings to marine structures. However, the developments of fouling-resistant coatings that are cost-effective and that are not deleterious to the marine environment are continually being sought. The incorporation of proteolytic enzymes into coatings has been suggested as one potential option. In this study, the efficacy of a commercially available serine endopeptidase, Alcalase as an antifoulant is assessed and its mode of action on barnacle cypris larvae investigated. In situ atomic force microscopy (AFM) of barnacle cyprid adhesives during exposure to Alcalase supported the hypothesis that Alcalase reduces the effectiveness of the cyprid adhesives, rather than deterring the organisms from settling. Quantitative behavioural tracking of cyprids, using Ethovision 3.1, further supported this observation. Alcalase removed cyprid 'footprint' deposits from glass surfaces within 26 min, but cyprid permanent cement became resistant to attack by Alcalase within 15 h of expression, acquiring a crystalline appearance in its cured state. It is concluded that Alcalase has antifouling potential on the basis of its effects on cyprid footprints, un-cured permanent cement and its non-toxic mode of action, providing that it can be successfully incorporated into a coating.",
"title": ""
},
{
"docid": "50b316a52bdfacd5fe319818d0b22962",
"text": "Artificial neural networks (ANN) are used to predict 1) degree program completion, 2) earned hours, and 3) GPA for college students. The feed forward neural net architecture is used with the back propagation learning function and the logistic activation function. The database used for training and validation consisted of 17,476 student transcripts from Fall 1983 through Fall 1994. It is shown that age, gender, race, ACT scores, and reading level are significant in predicting the degree program completion, earned hours, and GPA. Of the three, earned hours proved the most difficult to predict.",
"title": ""
},
{
"docid": "e027a08aaf7d67e77cb637a449ee99f1",
"text": "Cross-client data deduplication has been widely used to eliminate redundant storage overhead in cloud storage system. Recently, Abadi et al. introduced the primitive of MLE2 with nice security properties for secure and efficient data deduplication. However, besides the computationally expensive noninteractive zero-knowledge proofs, their fully randomized scheme (R-MLE2) requires the inefficient equality-testing algorithm to identify all duplicate ciphertexts. Thus, an interesting challenging problem is how to reduce the overhead of R-MLE2 and propose an efficient construction for R-MLE2. In this paper, we introduce a new primitive called μR-MLE2, which gives a partial positive answer for this challenging problem. We propose two schemes: static scheme and dynamic scheme, where the latter one allows tree adjustment by increasing some computation cost. Our main trick is to use the interactive protocol based on static or dynamic decision trees. The advantage gained from it is, by interacting with clients, the server will reduce the time complexity of deduplication equality test from linear time to efficient logarithmic time over the whole data items in the database. The security analysis and the performance evaluation show that our schemes are Path-PRV-CDA2 secure and achieve several orders of magnitude higher performance for data equality test than R-MLE2 scheme when the number of data items is relatively large.",
"title": ""
},
{
"docid": "4fd4828e4845d22d54ebe7b936402d48",
"text": "Agriculture is the mainstay of the Indian economy. Almost 70% people depend on it & shares major part of the GDP. Diseases in crops mostly on the leaves affects on the reduction of both quality and quantity of agricultural products. Perception of human eye is not so much stronger so as to observe minute variation in the infected part of leaf. In this paper, we are providing software solution to automatically detect and classify plant leaf diseases. In this we are using image processing techniques to classify diseases & quickly diagnosis can be carried out as per disease. This approach will enhance productivity of crops. It includes several steps viz. image acquisition, image pre-processing, segmentation, features extraction and neural network based classification.",
"title": ""
},
{
"docid": "ac0a6e663caa3cb8cdcb1a144561e624",
"text": "A two-stage process is performed by human operator for cleaning windows. The first being the application of cleaning fluid, which is usually achieved by using a wetted applicator. The aim of this task being to cover the whole window area in the shortest possible time. This depends on two parameters: the size of the applicator and the path which the applicator travels without significantly overlapping previously wetted area. The second is the removal of cleaning fluid by a squeegee blade without spillage on to other areas of the facade or previously cleaned areas of glass. This is particularly difficult for example if the window is located on the roof of a building and cleaning is performed from inside by the human window cleaner.",
"title": ""
},
{
"docid": "a80e4f3282646e406ce37964cf6bb933",
"text": "In this paper we present a new semantic smoothing vector space kernel (S-VSM) for text documents clustering. In the suggested approach semantic relatedness between words is used to smooth the similarity and the representation of text documents. The basic hypothesis examined is that considering semantic relatedness between two text documents may improve the performance of the text document clustering task. For our experimental evaluation we analyze the performance of several semantic relatedness measures when embedded in the proposed (S-VSM) and present results with respect to different experimental conditions, such as: (i) the datasets used, (ii) the underlying knowledge sources of the utilized measures, and (iii) the clustering algorithms employed. To the best of our knowledge, the current study is the first to systematically compare, analyze and evaluate the impact of semantic smoothing in text clustering based on ‘wisdom of linguists’, e.g., WordNets, ‘wisdom of crowds’, e.g., Wikipedia, and ‘wisdom of corpora’, e.g., large text corpora represented with the traditional Bag of Words (BoW) model. Three semantic relatedness measures for text are considered; two knowledge-based (Omiotis [1] that uses WordNet, and WLM [2] that uses Wikipedia), and one corpus-based (PMI [3] trained on a semantically tagged SemCor version). For the comparison of different experimental conditions we use the BCubed F-Measure evaluation metric which satisfies all formal constraints of good quality cluster. The experimental results show that the clustering performance based on the S-VSM is better compared to the traditional VSM model and compares favorably against the standard GVSM kernel which uses word co-occurrences to compute the latent similarities between document terms. 2013 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "de4e2e131a0ceaa47934f4e9209b1cdd",
"text": "With the popularity of mobile devices, spatial crowdsourcing is rising as a new framework that enables human workers to solve tasks in the physical world. With spatial crowdsourcing, the goal is to crowdsource a set of spatiotemporal tasks (i.e., tasks related to time and location) to a set of workers, which requires the workers to physically travel to those locations in order to perform the tasks. In this article, we focus on one class of spatial crowdsourcing, in which the workers send their locations to the server and thereafter the server assigns to every worker tasks in proximity to the worker’s location with the aim of maximizing the overall number of assigned tasks. We formally define this maximum task assignment (MTA) problem in spatial crowdsourcing, and identify its challenges. We propose alternative solutions to address these challenges by exploiting the spatial properties of the problem space, including the spatial distribution and the travel cost of the workers. MTA is based on the assumptions that all tasks are of the same type and all workers are equally qualified in performing the tasks. Meanwhile, different types of tasks may require workers with various skill sets or expertise. Subsequently, we extend MTA by taking the expertise of the workers into consideration. We refer to this problem as the maximum score assignment (MSA) problem and show its practicality and generality. Extensive experiments with various synthetic and two real-world datasets show the applicability of our proposed framework.",
"title": ""
},
{
"docid": "8d581aef7779713f3cb9f236fb83d7ff",
"text": "Sandro Botticelli was one of the most esteemed painters and draughtsmen among Renaissance artists. Under the patronage of the De' Medici family, he was active in Florence during the flourishing of the Renaissance trend towards the reclamation of lost medical and anatomical knowledge of ancient times through the dissection of corpses. Combining the typical attributes of the elegant courtly style with hallmarks derived from the investigation and analysis of classical templates, he left us immortal masterpieces, the excellence of which incomprehensibly waned and was rediscovered only in the 1890s. Few know that it has already been reported that Botticelli concealed the image of a pair of lungs in his masterpiece, The Primavera. The present investigation provides evidence that Botticelli embedded anatomic imagery of the lung in another of his major paintings, namely, The Birth of Venus. Both canvases were most probably influenced and enlightened by the neoplatonic philosophy of the humanist teachings in the De' Medici's circle, and they represent an allegorical celebration of the cycle of life originally generated by the Divine Wind or Breath. This paper supports the theory that because of the anatomical knowledge to which he was exposed, Botticelli aimed to enhance the iconographical meaning of both the masterpieces by concealing images of the lung anatomy within them.",
"title": ""
},
{
"docid": "11ed7e0742ddb579efe6e1da258b0d3c",
"text": "Supervisory Control and Data Acquisition(SCADA) systems are deeply ingrained in the fabric of critical infrastructure sectors. These computerized real-time process control systems, over geographically dispersed continuous distribution operations, are increasingly subject to serious damage and disruption by cyber means due to their standardization and connectivity to other networks. However, SCADA systems generally have little protection from the escalating cyber threats. In order to understand the potential danger and to protect SCADA systems, in this paper, we highlight their difference from standard IT systems and present a set of security property goals. Furthermore, we focus on systematically identifying and classifying likely cyber attacks including cyber-induced cyber-physical attack son SCADA systems. Determined by the impact on control performance of SCADA systems, the attack categorization criteria highlights commonalities and important features of such attacks that define unique challenges posed to securing SCADA systems versus traditional Information Technology(IT) systems.",
"title": ""
},
{
"docid": "ab662b1dd07a7ae868f70784408e1ce1",
"text": "We use autoencoders to create low-dimensional embeddings of underlying patient phenotypes that we hypothesize are a governing factor in determining how different patients will react to different interventions. We compare the performance of autoencoders that take fixed length sequences of concatenated timesteps as input with a recurrent sequence-to-sequence autoencoder. We evaluate our methods on around 35,500 patients from the latest MIMIC III dataset from Beth Israel Deaconess Hospital.",
"title": ""
}
] | scidocsrr |
9fb6202d6d18b99a484bb9a3b41b1132 | Car Number Plate Recognition (CNPR) system using multiple template matching | [
{
"docid": "9185a7823e699c758dde3a81f7d6d86d",
"text": "Reading text from photographs is a challenging problem that has received a significant amount of attention. Two key components of most systems are (i) text detection from images and (ii) character recognition, and many recent methods have been proposed to design better feature representations and models for both. In this paper, we apply methods recently developed in machine learning -- specifically, large-scale algorithms for learning the features automatically from unlabeled data -- and show that they allow us to construct highly effective classifiers for both detection and recognition to be used in a high accuracy end-to-end system.",
"title": ""
},
{
"docid": "a81c87374e7ea9a3066f643ac89bfd2b",
"text": "Image edge detection is a process of locating the e dg of an image which is important in finding the approximate absolute gradient magnitude at each point I of an input grayscale image. The problem of getting an appropriate absolute gradient magnitude for edges lies in the method used. The Sobel operator performs a 2-D spatial gradient measurement on images. Transferri ng a 2-D pixel array into statistically uncorrelated data se t enhances the removal of redundant data, as a result, reduction of the amount of data is required to represent a digital image. The Sobel edge detector uses a pair of 3 x 3 convolution masks, one estimating gradient in the x-direction and the other estimating gradient in y–direction. The Sobel detector is incredibly sensit ive o noise in pictures, it effectively highlight them as edges. Henc e, Sobel operator is recommended in massive data communication found in data transfer.",
"title": ""
}
] | [
{
"docid": "275afb5836acf741593f6bac90e5ffce",
"text": "We propose algorithms to address the spectrum efficiency and fairness issues of multi band multiuser Multiple-Input and Multiple-Output (MIMO) cognitive ad-hoc networks. To improve the transmission efficiency of the MIMO system, a cross layer antenna selection algorithm is proposed. Using the transmission efficiency results, user data rate of the cognitive ad-hoc network is determined. Objective function for the average data rate of the multi band multiuser cognitive MIMO ad-hoc network is also defined. For the average data rate objective function, primary users interference is considered as performance constraint. Furthermore, using the user data rate results, a learning-based channel allocation algorithm is proposed. Finally, numerical results are presented for performance evaluation of the proposed antenna selection and channel allocation algorithms.",
"title": ""
},
{
"docid": "97353be7c54dd2ded69815bf93545793",
"text": "In recent years, with the rapid development of deep learning, it has achieved great success in the field of image recognition. In this paper, we applied the convolution neural network (CNN) on supermarket commodity identification, contributing to the study of supermarket commodity identification. Different from the QR code identification of supermarket commodity, our work applied the CNN using the collected images of commodity as input. This method has the characteristics of fast and non-contact. In this paper, we mainly did the following works: 1. Collected a small dataset of supermarket goods. 2. Built Different convolutional neural network frameworks in caffe and trained the dataset using the built networks. 3. Improved train methods by finetuning the trained model.",
"title": ""
},
{
"docid": "39debcb0aa41eec73ff63a4e774f36fd",
"text": "Automatically segmenting unstructured text strings into structured records is necessary for importing the information contained in legacy sources and text collections into a data warehouse for subsequent querying, analysis, mining and integration. In this paper, we mine tables present in data warehouses and relational databases to develop an automatic segmentation system. Thus, we overcome limitations of existing supervised text segmentation approaches, which require comprehensive manually labeled training data. Our segmentation system is robust, accurate, and efficient, and requires no additional manual effort. Thorough evaluation on real datasets demonstrates the robustness and accuracy of our system, with segmentation accuracy exceeding state of the art supervised approaches.",
"title": ""
},
{
"docid": "625b96d21cb9ff05785aa34c98c567ff",
"text": "The number of mitoses per tissue area gives an important aggressiveness indication of the invasive breast carcinoma. However, automatic mitosis detection in histology images remains a challenging problem. Traditional methods either employ hand-crafted features to discriminate mitoses from other cells or construct a pixel-wise classifier to label every pixel in a sliding window way. While the former suffers from the large shape variation of mitoses and the existence of many mimics with similar appearance, the slow speed of the later prohibits its use in clinical practice. In order to overcome these shortcomings, we propose a fast and accurate method to detect mitosis by designing a novel deep cascaded convolutional neural network, which is composed of two components. First, by leveraging the fully convolutional neural network, we propose a coarse retrieval model to identify and locate the candidates of mitosis while preserving a high sensitivity. Based on these candidates, a fine discrimination model utilizing knowledge transferred from cross-domain is developed to further single out mitoses from hard mimics. Our approach outperformed other methods by a large margin in 2014 ICPR MITOS-ATYPIA challenge in terms of detection accuracy. When compared with the state-of-the-art methods on the 2012 ICPR MITOSIS data (a smaller and less challenging dataset), our method achieved comparable or better results with a roughly 60 times faster speed.",
"title": ""
},
{
"docid": "8bc418be099f14d677d3fdfbfa516248",
"text": "The present study examines the influence of social context on the use of emoticons in Internet communication. Secondary school students (N = 158) responded to short internet chats. Social context (task-oriented vs. socio-emotional) and valence of the context (positive vs. negative) were manipulated in these chats. Participants were permitted to respond with text, emoticon or a combination of both. Results showed that participants used more emoticons in socio-emotional than in task-oriented social contexts. Furthermore, students used more positive emoticons in positive contexts and more negative emoticons in negative contexts. An interaction was found between valence and kind of context; in negative, task-oriented contexts subjects used the least emoticons. Results are related to research about the expression of emotions in face-to-face interaction. 2004 Elsevier Ltd. All rights reserved.",
"title": ""
},
{
"docid": "813a45c7cae19fcd548a8b95a670d65a",
"text": "In this paper, conical monopole type UWB antenna which suppress dual bands is proposed. The SSRs were arranged in such a way that the interaction of the magnetic field with them enables the UWB antenna to reject the dual bands using the resonance of SRRs. The proposed conical monopole antenna has a return loss less than -10dB and antenna gain greater than 5dB at 2GHz~11GHz frequency band, except the suppressed bands. The return loss and gain at WiMAX and WLAN bands is greater than -3dB and less than 0dB respectively.",
"title": ""
},
{
"docid": "ca3c3dec83821747896d44261ba2f9ad",
"text": "Building discriminative representations for 3D data has been an important task in computer graphics and computer vision research. Convolutional Neural Networks (CNNs) have shown to operate on 2D images with great success for a variety of tasks. Lifting convolution operators to 3D (3DCNNs) seems like a plausible and promising next step. Unfortunately, the computational complexity of 3D CNNs grows cubically with respect to voxel resolution. Moreover, since most 3D geometry representations are boundary based, occupied regions do not increase proportionately with the size of the discretization, resulting in wasted computation. In this work, we represent 3D spaces as volumetric fields, and propose a novel design that employs field probing filters to efficiently extract features from them. Each field probing filter is a set of probing points — sensors that perceive the space. Our learning algorithm optimizes not only the weights associated with the probing points, but also their locations, which deforms the shape of the probing filters and adaptively distributes them in 3D space. The optimized probing points sense the 3D space “intelligently”, rather than operating blindly over the entire domain. We show that field probing is significantly more efficient than 3DCNNs, while providing state-of-the-art performance, on classification tasks for 3D object recognition benchmark datasets.",
"title": ""
},
{
"docid": "62b345b0aa68a909fbbded8ba18ea75c",
"text": "The transmission of malaria is highly variable and depends on a range of climatic and anthropogenic factors. In addition, the dispersal of Anopheles mosquitoes is a key determinant that affects the persistence and dynamics of malaria. Simple, lumped-population models of malaria prevalence have been insufficient for predicting the complex responses of malaria to environmental changes. A stochastic lattice-based model that couples a mosquito dispersal and a susceptible-exposed-infected-recovered epidemics model was developed for predicting the dynamics of malaria in heterogeneous environments. The It$$\\hat{o}$$ o^ approximation of stochastic integrals with respect to Brownian motion was used to derive a model of stochastic differential equations. The results show that stochastic equations that capture uncertainties in the life cycle of mosquitoes and interactions among vectors, parasites, and hosts provide a mechanism for the disruptions of malaria. Finally, model simulations for a case study in the rural area of Kilifi county, Kenya are presented. A stochastic lattice-based integrated malaria model has been developed. The applicability of the model for capturing the climate-driven hydrologic factors and demographic variability on malaria transmission has been demonstrated.",
"title": ""
},
{
"docid": "dfaa6e183e70cbacc5c9de501993b7af",
"text": "Traditional buildings consume more of the energy resources than necessary and generate a variety of emissions and waste. The solution to overcoming these problems will be to build them green and smart. One of the significant components in the concept of smart green buildings is using renewable energy. Solar energy and wind energy are intermittent sources of energy, so these sources have to be combined with other sources of energy or storage devices. While batteries and/or supercapacitors are an ideal choice for short-term energy storage, regenerative hydrogen-oxygen fuel cells are a promising candidate for long-term energy storage. This paper is to design and test a green building energy system that consists of renewable energy, energy storage, and energy management. The paper presents the architecture of the proposed green building energy system and a simulation model that allows for the study of advanced control strategies for the green building energy system. An example green building energy system is tested and simulation results show that the variety of energy source and storage devices can be managed very well.",
"title": ""
},
{
"docid": "a827f7ceabd844453dcf81cf7f87c7db",
"text": "Steganography means hiding the secret message within an ordinary message and extraction of it as its destination. In the texture synthesis process here re-samples smaller texture image which gives a new texture image with a similar local appearance. In the existing system, work is done for the texture synthesis process but the embedding capacity of those systems is very low. In the project introduced the method SURTDS (steganography using reversible texture synthesis) for enhancing the embedding capacity of the system by using the difference expansion method with texture synthesis. Initially, this system evaluates the binary value of the secret image and converts this value into a decimal value. The process of embedding is performed by using the difference expansion techniques. Difference expansion computes the average and difference in a patch and embedded the value one by one. This system improves the embedding capacity of the stego image. The experimental result has verified that this system improves the embedding capacity of the SURTDS is better than the existing system.",
"title": ""
},
{
"docid": "61a782f8797b76d6d5ce581729c3cfc0",
"text": "Wordnets are lexico-semantic resources essential in many NLP tasks. Princeton WordNet is the most widely known, and the most influential, among them. Wordnets for languages other than English tend to adopt unquestioningly WordNet’s structure and its net of lexicalised concepts. We discuss a large wordnet constructed independently of WordNet, upon a model with a small yet significant difference. A mapping onto WordNet is under way; the large portions already linked open up a unique perspective on the comparison of similar but not fully compatible lexical resources. We also try to characterise numerically a wordnet’s aptitude for NLP applications.",
"title": ""
},
{
"docid": "336d83fd5628d9325fed0d88c56bc617",
"text": "Influence of fruit development and ripening on the changes in physico-chemical properties, antiradical activity and the accumulation of polyphenolic compounds were investigated in Maoluang fruits. Total phenolics content (TP) was assayed according to the Folin-Ciocalteu method, and accounted for 19.60-8.66 mg GAE/g f.w. The TP gradually decreased from the immature to the over ripe stages. However, the total anthocyanin content (TA) showed the highest content at the over ripe stage, with an average value of 141.94 mg/100 g f.w. The antiradical activity (AA) of methanolic extracts from Maoluang fruits during development and ripening were determined with DPPH (2,2-diphenyl-1-picrylhydrazyl) radical scavenging. The highest AA was observed at the immature stage accompanied by the highest content of gallic acid and TP. Polyphenols were quantified by HPLC. The level of procyanidin B2, procyanidin B1, (+)-catechin, (–)-epicatechin, rutin and tran-resveratrol as the main polyphenol compounds, increased during fruit development and ripening. Other phenolic acids such as gallic, caffeic, and ellagic acids significantly decreased (p < 0.05) during fruit development and ripening. At over ripe stage, Maoluang possess the highest antioxidants. Thus, the over ripe stage would be the appropriate time to harvest when taking nutrition into consideration. This existing published information provides a helpful daily diet guide and useful guidance for industrial utilization of Maoluang fruits.",
"title": ""
},
{
"docid": "105f34c3fa2d4edbe83d184b7cf039aa",
"text": "Software development methodologies are constantly evolving due to changing technologies and new demands from users. Today's dynamic business environment has given rise to emergent organizations that continuously adapt their structures, strategies, and policies to suit the new environment [12]. Such organizations need information systems that constantly evolve to meet their changing requirements---but the traditional, plan-driven software development methodologies lack the flexibility to dynamically adjust the development process.",
"title": ""
},
{
"docid": "82917c4e6fb56587cc395078c14f3bb7",
"text": "We can leverage data and complex systems science to better understand society and human nature on a population scale through language — utilizing tools that include sentiment analysis, machine learning, and data visualization. Data-driven science and the sociotechnical systems that we use every day are enabling a transformation from hypothesis-driven, reductionist methodology to complex systems sciences. Namely, the emergence and global adoption of social media has rendered possible the real-time estimation of population-scale sentiment, with profound implications for our understanding of human behavior. Advances in computing power, natural language processing, and digitization of text now make it possible to study a culture’s evolution through its texts using a “big data” lens. Given the growing assortment of sentiment measuring instruments, it is imperative to understand which aspects of sentiment dictionaries contribute to both their classification accuracy and their ability to provide richer understanding of texts. Here, we perform detailed, quantitative tests and qualitative assessments of 6 dictionary-based methods applied to 4 different corpora, and briefly examine a further 20 methods. We show that while inappropriate for sentences, dictionary-based methods are generally robust in their classification accuracy for longer texts. Most importantly they can aid understanding of texts with reliable and meaningful word shift graphs if (1) the dictionary covers a sufficiently large enough portion of a given text’s lexicon when weighted by word usage frequency; and (2) words are scored on a continuous scale. Our ability to communicate relies in part upon a shared emotional experience, with stories often following distinct emotional trajectories, forming patterns that are meaningful to us. By classifying the emotional arcs for a filtered subset of 4,803 stories from Project Gutenberg’s fiction collection, we find a set of six core trajectories which form the building blocks of complex narratives. We strengthen our findings by separately applying optimization, linear decomposition, supervised learning, and unsupervised learning. For each of these six core emotional arcs, we examine the closest characteristic stories in publication today and find that particular emotional arcs enjoy greater success, as measured by downloads. Within stories lie the core values of social behavior, rich with both strategies and proper protocol, which we can begin to study more broadly and systematically as a true reflection of culture. Of profound scientific interest will be the degree to which we can eventually understand the full landscape of human stories, and data driven approaches will play a crucial role. Finally, we utilize web-scale data from Twitter to study the limits of what social data can tell us about public health, mental illness, discourse around the protest movement of #BlackLivesMatter, discourse around climate change, and hidden networks. We conclude with a review of published works in complex systems that separately analyze charitable donations, the happiness of words in 10 languages, 100 years of daily temperature data across the United States, and Australian Rules Football games.",
"title": ""
},
{
"docid": "8d7af01e003961cbf2a473abe32d8b7e",
"text": "This paper presents a series of control strategies for soft compliant manipulators. We provide a novel approach to control multi-fingered tendon-driven foam hands using a CyberGlove and a simple ridge regression model. The results achieved include complex posing, dexterous grasping and in-hand manipulations. To enable efficient data sampling and a more intuitive design process of foam robots, we implement and evaluate a finite element based simulation. The accuracy of this model is evaluated using a Vicon motion capture system. We then use this simulation to solve inverse kinematics and compare the performance of supervised learning, reinforcement learning, nearest neighbor and linear ridge regression methods in terms of their accuracy and sample efficiency.",
"title": ""
},
{
"docid": "96973058d3ca943f3621dfe843baf631",
"text": "Many organizations are gradually catching up with the tide of adopting agile practices at workplace, but they seem to be struggling with how to choose the agile practices and mix them into their IT software project development and management. These organizations have already had their own development styles, many of which have adhered to the traditional plan-driven methods such as waterfall. The inherent corporate culture of resisting to change or hesitation to abandon what they have established for a whole new methodology hampers the process change. In this paper, we will review the current state of agile adoption in business organizations and propose a new approach to IT project development and management by blending Scrum, an agile method, into traditional plan-driven project development and management. The management activity involved in Scrum is discussed, the team and meeting composing of Scrum are investigated, the challenges and benefits of applying Scrum in traditional IT project development and management are analyzed, the blending structure is illustrated and discussed, and the iterative process with Scrum and planned process without Scrum are compared.",
"title": ""
},
{
"docid": "c31ffcb1514f437313c2f3f0abaf3a88",
"text": "Identifying temporal relations between events is an essential step towards natural language understanding. However, the temporal relation between two events in a story depends on, and is often dictated by, relations among other events. Consequently, effectively identifying temporal relations between events is a challenging problem even for human annotators. This paper suggests that it is important to take these dependencies into account while learning to identify these relations and proposes a structured learning approach to address this challenge. As a byproduct, this provides a new perspective on handling missing relations, a known issue that hurts existing methods. As we show, the proposed approach results in significant improvements on the two commonly used data sets for this problem.",
"title": ""
},
{
"docid": "245a31291c7d8fbaac249f9e4585c652",
"text": "A recent advancement of the mobile web has enabled features previously only found in natively developed apps. Thus, arduous development for several platforms or using cross-platform approaches was required. The novel approach, coined Progressive Web Apps, can be implemented through a set of concepts and technologies on any web site that meets certain requirements. In this paper, we argue for progressive web apps as a possibly unifying technology for web apps and native apps. After an introduction of features, we scrutinize the performance. Two cross-platform mobile apps and one Progressive Web App have been developed for comparison purposes, and provided in an open source repository for results’ validity verification. We aim to spark interest in the academic community, as a lack of academic involvement was identified as part of the literature search.",
"title": ""
},
{
"docid": "c0db1cd3688a18c853331772dbdfdedc",
"text": "In this review we describe the challenges and opportunities for creating magnetically active metamaterials in the optical part of the spectrum. The emphasis is on the sub-wavelength periodic metamaterials whose unit cell is much smaller than the optical wavelength. The conceptual differences between microwave and optical metamaterials are demonstrated. We also describe several theoretical techniques used for calculating the effective parameters of plasmonic metamaterials: the effective dielectric permittivity eff(ω) and magnetic permeability μeff(ω). Several examples of negative permittivity and negative permeability plasmonic metamaterials are used to illustrate the theory. c © 2008 Elsevier Ltd. All rights reserved. PACS: 42.70.-a; 41.20.Gz; 78.67.Bf",
"title": ""
},
{
"docid": "2e7b03f13b1c33a42b3ff77886e0683e",
"text": "Internet of Things (IoT), cloud computing and integrated deployment are becoming central topics in Internet development. In this paper, a cloud containerization solution, Docker, has been introduced to the original \"Bluetooth Based Software Defined Function\" (BT-SDF), a framework designed to simplify the IoT function redefining process. With the assistance of Docker and its clustering, Docker Swarm, the BT-SDF will be transformed to a scalable, extensible and flexible IoT function redefining framework named \"Cloud and Bluetooth based software defined function\".",
"title": ""
}
] | scidocsrr |
ab5ee24b16e16adfa05daec9c1e3ed52 | Computational models for text summarization | [
{
"docid": "1c68002a59372ea3b206ea6127545670",
"text": "We present a novel graph-based summarization framework (Opinosis) that generates concise abstractive summaries of highly redundant opinions. Evaluation results on summarizing user reviews show that Opinosis summaries have better agreement with human summaries compared to the baseline extractive method. The summaries are readable, reasonably well-formed and are informative enough to convey the major opinions.",
"title": ""
},
{
"docid": "46b6b08d160a95e42c187f756a6c3977",
"text": "We have created layers of annotation on the English Gigaword v.5 corpus to render it useful as a standardized corpus for knowledge extraction and distributional semantics. Most existing large-scale work is based on inconsistent corpora which often have needed to be re-annotated by research teams independently, each time introducing biases that manifest as results that are only comparable at a high level. We provide to the community a public reference set based on current state-of-the-art syntactic analysis and coreference resolution, along with an interface for programmatic access. Our goal is to enable broader involvement in large-scale knowledge-acquisition efforts by researchers that otherwise may not have had the ability to produce such a resource on their own.",
"title": ""
},
{
"docid": "00ccf224c9188cf26f1da60ec9aa741b",
"text": "In recent years, distributed representations of inputs have led to performance gains in many applications by allowing statistical information to be shared across inputs. However, the predicted outputs (labels, and more generally structures) are still treated as discrete objects even though outputs are often not discrete units of meaning. In this paper, we present a new formulation for structured prediction where we represent individual labels in a structure as dense vectors and allow semantically similar labels to share parameters. We extend this representation to larger structures by defining compositionality using tensor products to give a natural generalization of standard structured prediction approaches. We define a learning objective for jointly learning the model parameters and the label vectors and propose an alternating minimization algorithm for learning. We show that our formulation outperforms structural SVM baselines in two tasks: multiclass document classification and part-of-speech tagging.",
"title": ""
}
] | [
{
"docid": "8b764c3b6576e8334979503d9d76a8d3",
"text": "Twitter is a well-known micro-blogging website which allows millions of users to interact over different types of communities, topics, and tweeting trends. The big data being generated on Twitter daily, and its significant impact on social networking, has motivated the application of data mining (analysis) to extract useful information from tweets. In this paper, we analyze the impact of tweets in predicting the winner of the recent 2013 election held in Pakistan. We identify relevant Twitter users, pre-process their tweets, and construct predictive models for three representative political parties which were significantly tweeted, i.e., Pakistan Tehreek-e-Insaaf (PTI), Pakistan Muslim League Nawaz (PMLN), and Muttahida Qaumi Movement (MQM). The predictions for last four days before the elections showed that PTI will emerge as the election winner, which was actually won by PMLN. However, considering that PTI obtained landslide victory in one province and bagged several important seats across the country, we conclude that Twitter can have some type of a positive influence on the election result, although it cannot be considered representative of the overall voting population.",
"title": ""
},
{
"docid": "719fc4274008294688257ea36f0d5661",
"text": "BACKGROUND\nGlobally, mobile phones have achieved wide reach at an unprecedented rate, and mobile phone apps have become increasingly prevalent among users. The number of health-related apps that were published on the two leading platforms (iOS and Android) reached more than 100,000 in 2014. However, there is a lack of synthesized evidence regarding the effectiveness of mobile phone apps in changing people's health-related behaviors.\n\n\nOBJECTIVE\nThe aim was to examine the effectiveness of mobile phone apps in achieving health-related behavior change in a broader range of interventions and the quality of the reported studies.\n\n\nMETHODS\nWe conducted a comprehensive bibliographic search of articles on health behavior change using mobile phone apps in peer-reviewed journals published between January 1, 2010 and June 1, 2015. Databases searched included Medline, PreMedline, PsycINFO, Embase, Health Technology Assessment, Education Resource Information Center (ERIC), and Cumulative Index to Nursing and Allied Health Literature (CINAHL). Articles published in the Journal of Medical Internet Research during that same period were hand-searched on the journal's website. Behavior change mechanisms were coded and analyzed. The quality of each included study was assessed by the Cochrane Risk of Bias Assessment Tool.\n\n\nRESULTS\nA total of 23 articles met the inclusion criteria, arranged under 11 themes according to their target behaviors. All studies were conducted in high-income countries. Of these, 17 studies reported statistically significant effects in the direction of targeted behavior change; 19 studies included in this analysis had a 65% or greater retention rate in the intervention group (range 60%-100%); 6 studies reported using behavior change theories with the theory of planned behavior being the most commonly used (in 3 studies). Self-monitoring was the most common behavior change technique applied (in 12 studies). The studies suggest that some features improve the effectiveness of apps, such as less time consumption, user-friendly design, real-time feedback, individualized elements, detailed information, and health professional involvement. All studies were assessed as having some risk of bias.\n\n\nCONCLUSIONS\nOur results provide a snapshot of the current evidence of effectiveness for a range of health-related apps. Large sample, high-quality, adequately powered, randomized controlled trials are required. In light of the bias evident in the included studies, better reporting of health-related app interventions is also required. The widespread adoption of mobile phones highlights a significant opportunity to impact health behaviors globally, particularly in low- and middle-income countries.",
"title": ""
},
{
"docid": "9962a2910be250ae1e9e702c3aa19a57",
"text": "Security issues related to the cloud computing are relevant to various stakeholders for an informed cloud adoption decision. Apart from data breaches, the cyber security research community is revisiting the attack space for cloud-specific solutions as these issues affect budget, resource management, and service quality. Distributed Denial of Service (DDoS) attack is one such serious attack in the cloud space. In this paper, we present developments related to DDoS attack mitigation solutions in the cloud. In particular, we present a comprehensive survey with a detailed insight into the characterization, prevention, detection, and mitigation mechanisms of these attacks. Additionally, we present a comprehensive solution taxonomy to classify DDoS attack solutions. We also provide a comprehensive discussion on important metrics to evaluate various solutions. This survey concludes that there is a strong requirement of solutions, which are designed keeping utility computing models in mind. Accurate auto-scaling decisions, multi-layer mitigation, and defense using profound resources in the cloud, are some of the key requirements of the desired solutions. In the end, we provide a definite guideline on effective solution building and detailed solution requirements to help the cyber security research community in designing defense mechanisms. To the best of our knowledge, this work is a novel attempt to identify the need of DDoS mitigation solutions involving multi-level information flow and effective resource management during the attack.",
"title": ""
},
{
"docid": "12ee117f58c5bd5b6794de581bfcacdb",
"text": "The visualization of complex network traffic involving a large number of communication devices is a common yet challenging task. Traditional layout methods create the network graph with overwhelming visual clutter, which hinders the network understanding and traffic analysis tasks. The existing graph simplification algorithms (e.g. community-based clustering) can effectively reduce the visual complexity, but lead to less meaningful traffic representations. In this paper, we introduce a new method to the traffic monitoring and anomaly analysis of large networks, namely Structural Equivalence Grouping (SEG). Based on the intrinsic nature of the computer network traffic, SEG condenses the graph by more than 20 times while preserving the critical connectivity information. Computationally, SEG has a linear time complexity and supports undirected, directed and weighted traffic graphs up to a million nodes. We have built a Network Security and Anomaly Visualization (NSAV) tool based on SEG and conducted case studies in several real-world scenarios to show the effectiveness of our technique.",
"title": ""
},
{
"docid": "4762cbac8a7e941f26bce8217cf29060",
"text": "The 2-D maximum entropy method not only considers the distribution of the gray information, but also takes advantage of the spatial neighbor information with using the 2-D histogram of the image. As a global threshold method, it often gets ideal segmentation results even when the image s signal noise ratio (SNR) is low. However, its time-consuming computation is often an obstacle in real time application systems. In this paper, the image thresholding approach based on the index of entropy maximization of the 2-D grayscale histogram is proposed to deal with infrared image. The threshold vector (t, s), where t is a threshold for pixel intensity and s is another threshold for the local average intensity of pixels, is obtained through a new optimization algorithm, namely, the particle swarm optimization (PSO) algorithm. PSO algorithm is realized successfully in the process of solving the 2-D maximum entropy problem. The experiments of segmenting the infrared images are illustrated to show that the proposed method can get ideal segmentation result with less computation cost. 2004 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "b6a8abc8946f8b13a22e3bacd2a6caa5",
"text": "The aim of this research was to determine the sun protection factor (SPF) of sunscreens emulsions containing chemical and physical sunscreens by ultraviolet spectrophotometry. Ten different commercially available samples of sunscreen emulsions of various manufactures were evaluated. The SPF labeled values were in the range of 8 to 30. The SPF values of the 30% of the analyzed samples are in close agreement with the labeled SPF, 30% presented SPF values above the labeled amount and 40% presented SPF values under the labeled amount. The proposed spectrophotometric method is simple and rapid for the in vitro determination of SPF values of sunscreens emulsions. *Correspondence:",
"title": ""
},
{
"docid": "1cae7b0548fc84f00cd36cae1b6f1ceb",
"text": "Combining abstract, symbolic reasoning with continuous neural reasoning is a grand challenge of representation learning. As a step in this direction, we propose a new architecture, called neural equivalence networks, for the problem of learning continuous semantic representations of algebraic and logical expressions. These networks are trained to represent semantic equivalence, even of expressions that are syntactically very different. The challenge is that semantic representations must be computed in a syntax-directed manner, because semantics is compositional, but at the same time, small changes in syntax can lead to very large changes in semantics, which can be difficult for continuous neural architectures. We perform an exhaustive evaluation on the task of checking equivalence on a highly diverse class of symbolic algebraic and boolean expression types, showing that our model significantly outperforms existing architectures.",
"title": ""
},
{
"docid": "3021a6be2aab29e18f1fe7e77c59a1d8",
"text": "We demonstrate the advantage of specializing semantic word embeddings for either similarity or relatedness. We compare two variants of retrofitting and a joint-learning approach, and find that all three yield specialized semantic spaces that capture human intuitions regarding similarity and relatedness better than unspecialized spaces. We also show that using specialized spaces in NLP tasks and applications leads to clear improvements, for document classification and synonym selection, which rely on either similarity or relatedness but not both.",
"title": ""
},
{
"docid": "2febfc549459450164bfa89f0a6ca964",
"text": "This paper discusses the effectiveness of deep auto-encoder neural networks in visual reinforcement learning (RL) tasks. We propose a framework for combining the training of deep auto-encoders (for learning compact feature spaces) with recently-proposed batch-mode RL algorithms (for learning policies). An emphasis is put on the data-efficiency of this combination and on studying the properties of the feature spaces automatically constructed by the deep auto-encoders. These feature spaces are empirically shown to adequately resemble existing similarities and spatial relations between observations and allow to learn useful policies. We propose several methods for improving the topology of the feature spaces making use of task-dependent information. Finally, we present first results on successfully learning good control policies directly on synthesized and real images.",
"title": ""
},
{
"docid": "95612aa090b77fc660279c5f2886738d",
"text": "Healthy biological systems exhibit complex patterns of variability that can be described by mathematical chaos. Heart rate variability (HRV) consists of changes in the time intervals between consecutive heartbeats called interbeat intervals (IBIs). A healthy heart is not a metronome. The oscillations of a healthy heart are complex and constantly changing, which allow the cardiovascular system to rapidly adjust to sudden physical and psychological challenges to homeostasis. This article briefly reviews current perspectives on the mechanisms that generate 24 h, short-term (~5 min), and ultra-short-term (<5 min) HRV, the importance of HRV, and its implications for health and performance. The authors provide an overview of widely-used HRV time-domain, frequency-domain, and non-linear metrics. Time-domain indices quantify the amount of HRV observed during monitoring periods that may range from ~2 min to 24 h. Frequency-domain values calculate the absolute or relative amount of signal energy within component bands. Non-linear measurements quantify the unpredictability and complexity of a series of IBIs. The authors survey published normative values for clinical, healthy, and optimal performance populations. They stress the importance of measurement context, including recording period length, subject age, and sex, on baseline HRV values. They caution that 24 h, short-term, and ultra-short-term normative values are not interchangeable. They encourage professionals to supplement published norms with findings from their own specialized populations. Finally, the authors provide an overview of HRV assessment strategies for clinical and optimal performance interventions.",
"title": ""
},
{
"docid": "a0e4c16bf0a696be510c232360c33267",
"text": "We consider the task of fine-grained sentiment analysis from the perspective of multiple instance learning (MIL). Our neural model is trained on document sentiment labels, and learns to predict the sentiment of text segments, i.e. sentences or elementary discourse units (EDUs), without segment-level supervision. We introduce an attention-based polarity scoring method for identifying positive and negative text snippets and a new dataset which we call SpoT (as shorthand for Segment-level POlariTy annotations) for evaluating MIL-style sentiment models like ours. Experimental results demonstrate superior performance against multiple baselines, whereas a judgement elicitation study shows that EDU-level opinion extraction produces more informative summaries than sentence-based alternatives.",
"title": ""
},
{
"docid": "c3261d1552912642d407b512d08cc6f7",
"text": "Four studies apply self-determination theory (SDT; Ryan & Deci, 2000) in investigating motivation for computer game play, and the effects of game play on wellbeing. Studies 1–3 examine individuals playing 1, 2 and 4 games, respectively and show that perceived in-game autonomy and competence are associated with game enjoyment, preferences, and changes in well-being preto post-play. Competence and autonomy perceptions are also related to the intuitive nature of game controls, and the sense of presence or immersion in participants’ game play experiences. Study 4 surveys an on-line community with experience in multiplayer games. Results show that SDT’s theorized needs for autonomy, competence, and relatedness independently predict enjoyment and future game play. The SDT model is also compared with Yee’s (2005) motivation taxonomy of game play motivations. Results are discussed in terms of the relatively unexplored landscape of human motivation within virtual worlds.",
"title": ""
},
{
"docid": "e5701d5cd667f4f4ab9bbad4da1d659a",
"text": "In clustering algorithms, choosing a subset of representative examples is very important in data set. Such ''exemplars \" can be found by randomly choosing an initial subset of data objects and then iteratively refining it, but this works well only if that initial choice is close to a good solution. In this paper, based on the frequency of attribute values, the average density of an object is defined. Furthermore, a novel ini-tialization method for categorical data is proposed, in which the distance between objects and the density of the object is considered. We also apply the proposed initialization method to k-modes algorithm and fuzzy k-modes algorithm. Experimental results illustrate that the proposed initialization method is superior to random initialization method and can be applied to large data sets for its linear time complexity with respect to the number of data objects. Clustering data based on a measure of similarity is a critical step in scientific data analysis and in engineering systems. A common method is to use data to learn a set of centers such that the sum of squared errors between objects and their nearest centers is small (Brendan & Delbert, 2007). At present, the popular partition clustering technique usually begins with an initial set of randomly selected exemplars and iteratively refines this set so as to decrease the sum of squared errors. Due to the simpleness, random initiali-zation method has been widely used. However, these clustering algorithms need to be rerun many times with different initializa-tions in an attempt to find a good solution. Furthermore, random initialization method works well only when the number of clusters is small and chances are good that at least one random initializa-tion is close to a good solution. Therefore, how to choose initial cluster centers is extremely important as they have a direct impact on the formation of final clusters. Based on the difference in data type, selection of initial cluster centers mainly can be classified into numeric data and categorical data. Aiming at numeric data, several attempts have been reported to solve the cluster initialization to date, few researches are concerned with initialization of categorical data. Huang (1998) introduced two initial mode selection methods for k-modes algorithm. The first method selects the first k distinct objects from the data set as the initial k-modes. The second method assigns the most frequent categories equally to the initial k-modes. Though the second method …",
"title": ""
},
{
"docid": "b4e9cfc0dbac4a5d7f76001e73e8973d",
"text": "Style transfer aims to apply the style of an exemplar model to a target one, while retaining the target’s structure. The main challenge in this process is to algorithmically distinguish style from structure, a high-level, potentially ill-posed cognitive task. Inspired by cognitive science research we recast style transfer in terms of shape analogies. In IQ testing, shape analogy queries present the subject with three shapes: source, target and exemplar, and ask them to select an output such that the transformation, or analogy, from the exemplar to the output is similar to that from the source to the target. The logical process involved in identifying the source-to-target analogies implicitly detects the structural differences between the source and target and can be used effectively to facilitate style transfer. Since the exemplar has a similar structure to the source, applying the analogy to the exemplar will provide the output we seek. The main technical challenge we address is to compute the source to target analogies, consistent with human logic. We observe that the typical analogies we look for consist of a small set of simple transformations, which when applied to the exemplar generate a continuous, seamless output model. To assemble a shape analogy, we compute an optimal set of source-to-target transformations, such that the assembled analogy best fits these criteria. The assembled analogy is then applied to the exemplar shape to produce the desired output model. We use the proposed framework to seamlessly transfer a variety of style properties between 2D and 3D objects and demonstrate significant improvements over the state of the art in style transfer. We further show that our framework can be used to successfully complete partial scans with the help of a user provided structural template, coherently propagating scan style across the completed surfaces.",
"title": ""
},
{
"docid": "cbd8e376ae26ad4f8b253ca4ad3aa94a",
"text": "Social media allow for an unprecedented amount of interactions and information exchange between people online. A fundamental aspect of human social behavior, however, is the tendency of people to associate themselves with like-minded individuals, forming homogeneous social circles both online and offline. In this work, we apply a new model that allows us to distinguish between social ties of varying strength, and to observe evidence of homophily with regards to politics, music, health, residential sector & year in college, within the online and offline social network of 74 college students. We present a multiplex network approach to social tie strength, here applied to mobile communication data calls, text messages, and co-location, allowing us to dimensionally identify relationships by considering the number of channels utilized between students. We find that strong social ties are characterized by maximal use of communication channels, while weak ties by minimal use. We are able to identify 75% of close friendships, 90% of weaker ties, and 90% of Facebook friendships as compared to reported ground truth. We then show that stronger ties exhibit greater profile similarity than weaker ones. Apart from high homogeneity in social circles with respect to political and health aspects, we observe strong homophily driven by music, residential sector and year in college. Despite Facebook friendship being highly dependent on residence and year, exposure to less homogeneous content can be found in the online rather than the offline social circles of students, most notably in political and music aspects.",
"title": ""
},
{
"docid": "cbae0fd956a12827152e38f93e2b3e7a",
"text": "Bare-metal clouds are an emerging infrastructure-as-a-service (IaaS) that leases physical machines (bare-metal instances) rather than virtual machines, allowing resource-intensive applications to have exclusive access to physical hardware. Unfortunately, bare-metal instances require time-consuming or OS-specific tasks for deployment due to the lack of virtualization layers, thereby sacrificing several beneficial features of traditional IaaS clouds such as agility, elasticity, and OS transparency. We present BMcast, an OS deployment system with a special-purpose de-virtualizable virtual machine monitor (VMM) that supports quick and OS-transparent startup of bare-metal instances. BMcast performs streaming OS deployment while allowing direct access to physical hardware from the guest OS, and then disappears after completing the deployment. Quick startup of instances improves agility and elasticity significantly, and OS transparency greatly simplifies management tasks for cloud customers. Experimental results have confirmed that BMcast initiated a bare-metal instance 8.6 times faster than image copying, and database performance on BMcast during streaming OS deployment was comparable to that on a state-of-the-art VMM without performing deployment. BMcast incurred zero overhead after de-virtualization.",
"title": ""
},
{
"docid": "03609a2c69b670d819d35d42ae0ac354",
"text": "A MAJOR problem in the search for new antidepressant drugs is the lack of animal models which both resemble depressive illness and are selectively sensitive to clinically effective antidepressant treatments. We have been working on a new behavioural model in the rat which attempts to meet these two requirements. The method is based on the observation that a rat, when forced to swim in a situation from which there is no escape, will, after an initial period of vigorous activity, eventually cease to move altogether making only those movements necessary to keep its head above water. We think that this characteristic and readily identifiable behavioural immobility indicates a state of despair in which the rat has learned that escape is impossible and resigns itself to the experimental conditions. This hypothesis receives support from results presented below which indicate that immobility is reduced by different treatments known to be therapeutic in depression including three drugs, iprindole, mianserin and viloxazine which although clinically active1–3 show little or no ‘antidepressant’ activity in the usual animal tests4–6.",
"title": ""
},
{
"docid": "8f3eaf1a65cd3d81e718143304e4ce81",
"text": "Issue tracking systems store valuable data for testing hypotheses concerning maintenance, building statistical prediction models and recently investigating developers \"affectiveness\". In particular, the Jira Issue Tracking System is a proprietary tracking system that has gained a tremendous popularity in the last years and offers unique features like the project management system and the Jira agile kanban board. This paper presents a dataset extracted from the Jira ITS of four popular open source ecosystems (as well as the tools and infrastructure used for extraction) the Apache Software Foundation, Spring, JBoss and CodeHaus communities. Our dataset hosts more than 1K projects, containing more than 700K issue reports and more than 2 million issue comments. Using this data, we have been able to deeply study the communication process among developers, and how this aspect affects the development process. Furthermore, comments posted by developers contain not only technical information, but also valuable information about sentiments and emotions. Since sentiment analysis and human aspects in software engineering are gaining more and more importance in the last years, with this repository we would like to encourage further studies in this direction.",
"title": ""
},
{
"docid": "ff418efbdd2381692f01b5cdc94143d5",
"text": "The U.S. legislation at both the federal and state levels mandates certain organizations to inform customers about information uses and disclosures. Such disclosures are typically accomplished through privacy policies, both online and offline. Unfortunately, the policies are not easy to comprehend, and, as a result, online consumers frequently do not read the policies provided at healthcare Web sites. Because these policies are often required by law, they should be clear so that consumers are likely to read them and to ensure that consumers can comprehend these policies. This, in turn, may increase consumer trust and encourage consumers to feel more comfortable when interacting with online organizations. In this paper, we present results of an empirical study, involving 993 Internet users, which compared various ways to present privacy policy information to online consumers. Our findings suggest that users perceive typical, paragraph-form policies to be more secure than other forms of policy representation, yet user comprehension of such paragraph-form policies is poor as compared to other policy representations. The results of this study can help managers create more trustworthy policies, aid compliance officers in detecting deceptive organizations, and serve legislative bodies by providing tangible evidence as to the ineffectiveness of current privacy policies.",
"title": ""
},
{
"docid": "e442f267a189ac2bfc5fb6f9da081606",
"text": "The prevalence of Autism Spectrum Disorder (ASD) is 1 in 110 persons in the U.S. Both parents of children with ASD are under stress that may impact their health-related quality of life (HRQL) (physical and mental health). The purpose of the current study was to explore the relationship of parenting stress, support from family functioning and the HRQL (physical and mental health) of both parents. Female (n = 64) and male (n = 64) parents of children with ASD completed Web-based surveys examining parenting stress, family functioning, and physical and mental health. Results of a Wilcoxon signed-ranks test showed that female parent discrepant (D) scores between \"what is\" and \"should be\" family functioning were significantly larger than male parents, p = .002. Results of stepwise linear regression for the male-female partners showed that (1) higher female caregiving stress was related to lower female physical health (p < .001), (2) a higher discrepancy score in family functioning predicted lower mental health (p < .001), accounting for 31% of the variance for females and (3) male parent personal and family life stress (p < .001) and family functioning discrepant (D) score (p < .001) predicted poor mental health, with the discrepancy score accounting for 35% of the variance. These findings suggest that there may be differences in mothers' and fathers' perceptions and expectations about family functioning and this difference needs to be explored and applied when working with families of children with ASD.",
"title": ""
}
] | scidocsrr |
194eb4db59d2578c68acf2278f07f7aa | Visualizing Workload and Emotion Data in Air Traffic Control - An Approach Informed by the Supervisors Decision Making Process | [
{
"docid": "9089a8cc12ffe163691d81e319ec0f25",
"text": "Complex problem solving (CPS) emerged in the last 30 years in Europe as a new part of the psychology of thinking and problem solving. This paper introduces into the field and provides a personal view. Also, related concepts like macrocognition or operative intelligence will be explained in this context. Two examples for the assessment of CPS, Tailorshop and MicroDYN, are presented to illustrate the concept by means of their measurement devices. Also, the relation of complex cognition and emotion in the CPS context is discussed. The question if CPS requires complex cognition is answered with a tentative “yes.”",
"title": ""
}
] | [
{
"docid": "993b753e365e6a1956c425c7d0bf1a2a",
"text": "Injection molding is a very complicated process to monitor and control. With its high complexity and many process parameters, the optimization of these systems is a very challenging problem. To meet the requirements and costs demanded by the market, there has been an intense development and research with the aim to maintain the process under control. This paper outlines the latest advances in necessary algorithms for plastic injection process and monitoring, and also a flexible data acquisition system that allows rapid implementation of complex algorithms to assess their correct performance and can be integrated in the quality control process. This is the main topic of this paper. Finally, to demonstrate the performance achieved by this combination, a real case of use is presented. Keywords—Plastic injection, machine learning, rapid complex algorithm prototyping.",
"title": ""
},
{
"docid": "20662e12b45829c00c67434277ab9a26",
"text": "Given the significance of placement in IC physical design, extensive research studies performed over the last 50 years addressed numerous aspects of global and detailed placement. The objectives and the constraints dominant in placement have been revised many times over, and continue to evolve. Additionally, the increasing scale of placement instances affects the algorithms of choice for high-performance tools. We survey the history of placement research, the progress achieved up to now, and outstanding challenges.",
"title": ""
},
{
"docid": "b0747e6cbc20a8e4d9dec0ef75386701",
"text": "The US Vice President, Al Gore, in a speech on the information superhighway, suggested that it could be used to remotely control a nuclear reactor. We do not have enough confidence in computer software, hardware, or networks to attempt this experiment, but have instead built a Internet-accessible, remote-controlled model car that provides a race driver's view via a video camera mounted on the model car. The remote user can see live video from the car, and, using a mouse, control the speed and direction of the car. The challenge was to build a car that could be controlled by novice users in narrow corridors, and that would work not only with the full motion video that the car natively provides, but also with the limited size and frame rate video available over the Internet multicast backbone. We have built a car that has been driven from a site 50 miles away over a 56-kbps IP link using $\\mbox{{\\tt nv}}$ format video at as little as one frame per second and at as low as $100\\times 100$ pixels resolution. We also built hardware to control the car, using a slightly modified voice grade channel videophone. Our experience leads us to believe that it is now possible to put together readily available hardware and software components to build a cheap and effective telepresence.",
"title": ""
},
{
"docid": "dfb68d81ed159e82b6c9f2e930436e97",
"text": "The last decade has seen the fields of molecular biology and genetics transformed by the development of CRISPR-based gene editing technologies. These technologies were derived from bacterial defense systems that protect against viral invasion. Elegant studies focused on the evolutionary battle between CRISPR-encoding bacteria and the viruses that infect and kill them revealed the next step in this arms race, the anti-CRISPR proteins. Investigation of these proteins has provided important new insight into how CRISPR-Cas systems work and how bacterial genomes evolve. They have also led to the development of important biotechnological tools that can be used for genetic engineering, including off switches for CRISPR-Cas9 genome editing in human cells.",
"title": ""
},
{
"docid": "0bc847391ea276e19d91bdb0ab14a5e5",
"text": "Modern machine learning models are beginning to rival human performance on some realistic object recognition tasks, but we still lack a full understanding of how the human brain solves this same problem. This thesis combines knowledge from machine learning and computational neuroscience to create models of human object recognition that are increasingly realistic both in their treatment of low-level neural mechanisms and in their reproduction of high-level human behaviour. First, I present extensions to the Neural Engineering Framework to make its preferred type of model—the “fixed-encoding” network—more accurate for object recognition tasks. These extensions include better distributions—such as Gabor filters—for the encoding weights, and better loss functions—namely weighted squared loss, softmax loss, and hinge loss—to solve for decoding weights. Second, I introduce increased biological realism into deep convolutional neural networks trained with backpropagation, by training them to run using spiking leaky integrate-andfire (LIF) neurons. Convolutional neural networks have been successful in machine learning, and I am able to convert them to spiking networks while retaining similar levels of performance. I present a novel method to smooth the LIF rate response function in order to avoid the common problems associated with differentiating spiking neurons in general and LIF neurons in particular. I also derive a number of novel characterizations of spiking variability, and use these to train spiking networks to be more robust to this variability. Finally, to address the problems with implementing backpropagation in a biological system, I train spiking deep neural networks using the more biological Feedback Alignment algorithm. I examine this algorithm in depth, including many variations on the core algorithm, methods to train using non-differentiable spiking neurons, and some of the limitations of the algorithm. Using these findings, I construct a spiking model that learns online in a biologically realistic manner. The models developed in this thesis help to explain both how spiking neurons in the brain work together to allow us to recognize complex objects, and how the brain may learn this behaviour. Their spiking nature allows them to be implemented on highly efficient neuromorphic hardware, opening the door to object recognition on energy-limited devices such as cell phones and mobile robots.",
"title": ""
},
{
"docid": "4eebd9eb516bf2fe0b89c5d684f1ff96",
"text": "Psychological theories have suggested that creativity involves a twofold process characterized by a generative component facilitating the production of novel ideas and an evaluative component enabling the assessment of their usefulness. The present study employed a novel fMRI paradigm designed to distinguish between these two components at the neural level. Participants designed book cover illustrations while alternating between the generation and evaluation of ideas. The use of an fMRI-compatible drawing tablet allowed for a more natural drawing and creative environment. Creative generation was associated with preferential recruitment of medial temporal lobe regions, while creative evaluation was associated with joint recruitment of executive and default network regions and activation of the rostrolateral prefrontal cortex, insula, and temporopolar cortex. Executive and default regions showed positive functional connectivity throughout task performance. These findings suggest that the medial temporal lobe may be central to the generation of novel ideas and creative evaluation may extend beyond deliberate analytical processes supported by executive brain regions to include more spontaneous affective and visceroceptive evaluative processes supported by default and limbic regions. Thus, creative thinking appears to recruit a unique configuration of neural processes not typically used together during traditional problem solving tasks.",
"title": ""
},
{
"docid": "32817233f5aa05036ca292e7b57143fb",
"text": "Asphalt pavement distresses have significant importance in roads and highways. This paper addresses the detection and localization of one of the key pavement distresses, the potholes using computer vision. Different kinds of pothole and non-pothole images from asphalt pavement are considered for experimentation. Considering the appearance-shape based nature of the potholes, Histograms of oriented gradients (HOG) features are computed for the input images. Features are trained and classified using Naïve Bayes classifier resulting in labeling of the input as pothole or non-pothole image. To locate the pothole in the detected pothole images, normalized graph cut segmentation scheme is employed. Proposed scheme is tested on a dataset having broad range of pavement images. Experimentation results showed 90 % accuracy for the detection of pothole images and high recall for the localization of pothole in the detected images.",
"title": ""
},
{
"docid": "4b453a0f541d1efcd7e24dfc631aaecb",
"text": "Intelligent tutoring systems (ITSs), which provide step-by-step guidance to students in complex problem-solving activities, have been shown to enhance student learning in a range of domains. However, they tend to be difficult to build. Our project investigates whether the process of authoring an ITS can be simplified, while at the same time maintaining the characteristics that make ITS effective, and also maintaining the ability to support large-scale tutor development. Specifically, our project tests whether authoring tools based on programming-by-demonstration techniques (developed in prior research) can support the development of a large-scale, real-world tutor. We are creating an open-access Web site, called Mathtutor (http://webmathtutor.org), where middle school students can solve math problems with step-by-step guidance from ITS. The Mathtutor site fields example-tracing tutors, a novel type of ITS that are built \"by demonstration,\" without programming, using the cognitive tutor authoring tools (CTATs). The project's main contribution will be that it represents a stringent test of large-scale tutor authoring through programming by demonstration. A secondary contribution will be that it tests whether an open-access site (i.e., a site that is widely and freely available) with software tutors for math learning can attract and sustain user interest and learning on a large scale.",
"title": ""
},
{
"docid": "3eaec3c5f9681f131cde6dd72c3ad141",
"text": "This paper proposes a novel acoustic echo suppression (AES) algorithm based on speech presence probability in a frequency domain. Double talk detection algorithm based on two cross-correlation coefficients modeled by Beta distribution controls the update of echo path response to improve the quality of near-end speech. The near-end speech presence probability combined with the Wiener gain function is used to reduce the residual echo. The performance of the proposed algorithm is evaluated by objective tests. High echo-return-loss enhancement and perceptual evaluation of speech quality (PESQ) scores are obtained by comparing with the conventional AES method.",
"title": ""
},
{
"docid": "c04cc8c930b534d57f729d9e53fd283b",
"text": "This paper presents a morphological classification of languages from the IR perspective. Linguistic typology research has shown that the morphological complexity of each language of the world can be described by two variables, index of synthesis and index of fusion. These variables provide a theoretical basis for IR research handling morphological issues. A common theoretical framework is needed in particular due to the increasing significance of cross-language retrieval research and CLIR systems processing different languages. The paper elaborates the linguistic morphological typology for the purposes of IR research. It is studied how the indices of synthesis and fusion could be used as practical tools in monoand cross-lingual IR research. The need for semantic and syntactic typologies is discussed. The paper also reviews studies done in different languages on the effects of morphology and stemming in IR.",
"title": ""
},
{
"docid": "b052e965bd0a28bf52d8faa6f177ed1a",
"text": "Cloud computing requires comprehensive security sol utions based upon many aspects of a large and loosely integrated system. The application software and databases in cloud computing are moved to the centralized large data centers, where the managemen t of the data and services may not be fully trustwo r hy. Threats, vulnerabilities and risks for cloud comput ing are explained, and then, we have designed a clo ud computing security development lifecycle model to a chieve safety and enable the user to take advantage of this technology as much as possible of security and f ce the risks that may be exposed to data. A data integrity checking algorithm; which eliminates the third party auditing, is explained to protect stati c and dynamic data from unauthorized observation, modific ation, or interference. Keyword: Cloud Computing, Cloud Computing Security, Data Integrity, Cloud Threads, Cloud Risks",
"title": ""
},
{
"docid": "413d0b457cc1b96bf65d8a3e1c98ed41",
"text": "Peer-to-peer (P2P) lending is a fast growing financial technology (FinTech) trend that is displacing traditional retail banking. Studies on P2P lending have focused on predicting individual interest rates or default probabilities. However, the relationship between aggregated P2P interest rates and the general economy will be of interest to investors and borrowers as the P2P credit market matures. We show that the variation in P2P interest rates across grade types are determined by three macroeconomic latent factors formed by Canonical Correlation Analysis (CCA) — macro default, investor uncertainty, and the fundamental value of the market. However, the variation in P2P interest rates across term types cannot be explained by the general economy.",
"title": ""
},
{
"docid": "c135c90c9af331d89982dce0b4454a87",
"text": "Suicide attempts often are impulsive, yet little is known about the characteristics of impulsive suicide. We examined impulsive suicide attempts within a population-based, case-control study of nearly lethal suicide attempts among people 13-34 years of age. Attempts were considered impulsive if the respondent reported spending less than 5 minutes between the decision to attempt suicide and the actual attempt. Among the 153 case-subjects, 24% attempted impulsively. Impulsive attempts were more likely among those who had been in a physical fight and less likely among those who were depressed. Relative to control subjects, male sex, fighting, and hopelessness distinguished impulsive cases but depression did not. Our findings suggest that inadequate control of aggressive impulses might be a greater indicator of risk for impulsive suicide attempts than depression.",
"title": ""
},
{
"docid": "8b7cc94a7284d4380537418ed9ee0f01",
"text": "The subject matter of this research; employee motivation and performance seeks to look at how best employees can be motivated in order to achieve high performance within a company or organization. Managers and entrepreneurs must ensure that companies or organizations have a competent personnel that is capable to handle this task. This takes us to the problem question of this research “why is not a sufficient motivation for high performance?” This therefore establishes the fact that money is for high performance but there is need to look at other aspects of motivation which is not necessarily money. Four theories were taken into consideration to give an explanation to the question raised in the problem formulation. These theories include: Maslow’s hierarchy of needs, Herzberg two factor theory, John Adair fifty-fifty theory and Vroom’s expectancy theory. Furthermore, the performance management process as a tool to measure employee performance and company performance. This research equally looked at the various reward systems which could be used by a company. In addition to the above, culture and organizational culture and it influence on employee behaviour within a company was also examined. An empirical study was done at Ultimate Companion Limited which represents the case study of this research work. Interviews and questionnaires were conducted to sample employee and management view on motivation and how it can increase performance at the company. Finally, a comparison of findings with theories, a discussion which raises critical issues on motivation/performance and conclusion constitute the last part of the research. Subject headings, (keywords) Motivation, Performance, Intrinsic, Extrinsic, Incentive, Tangible and Intangible, Reward",
"title": ""
},
{
"docid": "4a5abe07b93938e7549df068967731fc",
"text": "A novel compact dual-polarized unidirectional wideband antenna based on two crossed magneto-electric dipoles is proposed. The proposed miniaturization method consist in transforming the electrical filled square dipoles into vertical folded square loops. The surface of the radiating element is reduced to 0.23λ0∗0.23λ0, where λ0 is the wavelength at the lowest operation frequency for a standing wave ratio (SWR) <2.5, which corresponds to a reduction factor of 48%. The antenna has been prototyped using 3D printing technology. The measured input impedance bandwidth is 51.2% from 1.7 GHz to 2.9 GHz with a Standing wave ratio (SWR) <2.",
"title": ""
},
{
"docid": "7a5fb7d551d412fd8bdbc3183dafc234",
"text": "Presentations have been an effective means of delivering information to groups for ages. Over the past few decades, technological advancements have revolutionized the way humans deliver presentations. Despite that, the quality of presentations can be varied and affected by a variety of reasons. Conventional presentation evaluation usually requires painstaking manual analysis by experts. Although the expert feedback can definitely assist users in improving their presentation skills, manual evaluation suffers from high cost and is often not accessible to most people. In this work, we propose a novel multi-sensor self-quantification framework for presentations. Utilizing conventional ambient sensors (i.e., static cameras, Kinect sensor) and the emerging wearable egocentric sensors (i.e., Google Glass), we first analyze the efficacy of each type of sensor with various nonverbal assessment rubrics, which is followed by our proposed multi-sensor presentation analytics framework. The proposed framework is evaluated on a new presentation dataset, namely NUS Multi-Sensor Presentation (NUSMSP) dataset, which consists of 51 presentations covering a diverse set of topics. The dataset was recorded with ambient static cameras, Kinect sensor, and Google Glass. In addition to multi-sensor analytics, we have conducted a user study with the speakers to verify the effectiveness of our system generated analytics, which has received positive and promising feedback.",
"title": ""
},
{
"docid": "1d98b5bd0c7178b39b7da0e0f9586615",
"text": "TDMA has been proposed as a MAC protocol for wireless sensor networks (WSNs) due to its efficiency in high WSN load. However, TDMA is plagued with shortcomings; we present modifications to TDMA that will allow for the same efficiency of TDMA, while allowing the network to conserve energy during times of low load (when there is no activity being detected). Recognizing that aggregation plays an essential role in WSNs, TDMA-ASAP adds to TDMA: (a) transmission parallelism based on a level-by-level localized graph-coloring, (b) appropriate sleeping between transmissions (\"napping\"), (c) judicious and controlled TDMA slot stealing to avoid empty slots to be unused and (d) intelligent scheduling/ordering transmissions. Our results show that TDMA-ASAP's unique combination of TDMA, slot-stealing, napping, and message aggregation significantly outperforms other hybrid WSN MAC algorithms and has a performance that is close to optimal in terms of energy consumption and overall delay.",
"title": ""
},
{
"docid": "ab1b9e358d10fc091e8c7eedf4674a8a",
"text": "An effective and efficient defect inspection system for TFT-LCD polarised films using adaptive thresholds and shape-based image analyses Chung-Ho Noha; Seok-Lyong Leea; Deok-Hwan Kimb; Chin-Wan Chungc; Sang-Hee Kimd a School of Industrial and Management Engineering, Hankuk University of Foreign Studies, Yonginshi, Korea b School of Electronics Engineering, Inha University, Yonghyun-dong, Incheon-shi, Korea c Division of Computer Science, KAIST, Daejeon-shi, Korea d Key Technology Research Center, Agency for Defense Development, Daejeon-shi, Korea",
"title": ""
},
{
"docid": "d71af4267f6e54288ecff049748bcd7d",
"text": "Background: The purpose of this study was to investigate the effect of a combined visual efficiency and perceptual-motor training programme on the handwriting performance of Chinese children aged 6 to 9 years with handwriting difficulties (HWD). Methods: Twenty-six children with HWD were assigned randomly and equally into two groups. The training programme was provided over eight consecutive weeks with one session per week. The perceptual-motor group received training only on perceptual-motor functions, including visual spatial relationship, visual sequential memory, visual constancy, visual closure, graphomotor control and grip control. The combined training group received additional training components on visual efficiency, including accommodation, ocular motility, and binocular fusion. Visual efficiency, visual perceptual skills, and Chinese handwriting performance were assessed before and after the training programme. Results: The results showed statistically significant improvement in handwriting speed after the training in both groups. However, the combined training gave no additional benefit on improving handwriting speed (ANCOVA: F=0.43, p=0.52). In terms of visual efficiency, participants in the combined training group showed greater improvement in amplitude of accommodation measured with right eye (F=4.34, p<0.05), left eye (F=5.77, p<0.05) and both eyes (F=11.08, p<0.01). Conclusions: Although the additional visual efficiency training did not provide further improvement in the handwriting speed of children with HWD, children showed improvement in their accommodation amplitude. As accommodative function is important for providing sustainable and clear near vision in the process of reading and word recognition for writing, the effect of the combined training on handwriting performance should be further investigated.",
"title": ""
},
{
"docid": "d878e4bb4b17901a36c2cf7235c4568f",
"text": "Cloud computing is the future generation of computational services delivered over the Internet. As cloud infrastructure expands, resource management in such a large heterogeneous and distributed environment is a challenging task. In a cloud environment, uncertainty and dispersion of resources encounters problems of allocation of resources. Unfortunately, existing resource management techniques, frameworks and mechanisms are insufficient to handle these environments, applications and resource behaviors. To provide an efficient performance and to execute workloads, there is a need of quality of service (QoS) based autonomic resource management approach which manages resources automatically and provides reliable, secure and cost efficient cloud services. In this paper, we present an intelligent QoS-aware autonomic resource management approach named as CHOPPER (Configuring, Healing, Optimizing and Protecting Policy for Efficient Resource management). CHOPPER offers self-configuration of applications and resources, self-healing by handling sudden failures, self-protection against security attacks and self-optimization for maximum resource utilization. We have evaluated the performance of the proposed approach in a real cloud environment and the experimental results show that the proposed approach performs better in terms of cost, execution time, SLA violation, resource contention and also provides security against attacks.",
"title": ""
}
] | scidocsrr |
6c9ea1fc40a5839741027f008ab7a70e | Link Prediction via Matrix Completion | [
{
"docid": "228f2487760407daf669676ce3677609",
"text": "The limitation of using low electron doses in non-destructive cryo-electron tomography of biological specimens can be partially offset via averaging of aligned and structurally homogeneous subsets present in tomograms. This type of sub-volume averaging is especially challenging when multiple species are present. Here, we tackle the problem of conformational separation and alignment with a \"collaborative\" approach designed to reduce the effect of the \"curse of dimensionality\" encountered in standard pair-wise comparisons. Our new approach is based on using the nuclear norm as a collaborative similarity measure for alignment of sub-volumes, and by exploiting the presence of symmetry early in the processing. We provide a strict validation of this method by analyzing mixtures of intact simian immunodeficiency viruses SIV mac239 and SIV CP-MAC. Electron microscopic images of these two virus preparations are indistinguishable except for subtle differences in conformation of the envelope glycoproteins displayed on the surface of each virus particle. By using the nuclear norm-based, collaborative alignment method presented here, we demonstrate that the genetic identity of each virus particle present in the mixture can be assigned based solely on the structural information derived from single envelope glycoproteins displayed on the virus surface.",
"title": ""
}
] | [
{
"docid": "0cec4473828bf542d97b20b64071a890",
"text": "The effectiveness of knowledge transfer using classification algorithms depends on the difference between the distribution that generates the training examples and the one from which test examples are to be drawn. The task can be especially difficult when the training examples are from one or several domains different from the test domain. In this paper, we propose a locally weighted ensemble framework to combine multiple models for transfer learning, where the weights are dynamically assigned according to a model's predictive power on each test example. It can integrate the advantages of various learning algorithms and the labeled information from multiple training domains into one unified classification model, which can then be applied on a different domain. Importantly, different from many previously proposed methods, none of the base learning method is required to be specifically designed for transfer learning. We show the optimality of a locally weighted ensemble framework as a general approach to combine multiple models for domain transfer. We then propose an implementation of the local weight assignments by mapping the structures of a model onto the structures of the test domain, and then weighting each model locally according to its consistency with the neighborhood structure around the test example. Experimental results on text classification, spam filtering and intrusion detection data sets demonstrate significant improvements in classification accuracy gained by the framework. On a transfer learning task of newsgroup message categorization, the proposed locally weighted ensemble framework achieves 97% accuracy when the best single model predicts correctly only on 73% of the test examples. In summary, the improvement in accuracy is over 10% and up to 30% across different problems.",
"title": ""
},
{
"docid": "6e051906ec3deac14acb249ea4982d2e",
"text": "Recent attempts to fabricate surfaces with custom reflectance functions boast impressive angular resolution, yet their spatial resolution is limited. In this paper we present a method to construct spatially varying reflectance at a high resolution of up to 220dpi, orders of magnitude greater than previous attempts, albeit with a lower angular resolution. The resolution of previous approaches is limited by the machining, but more fundamentally, by the geometric optics model on which they are built. Beyond a certain scale geometric optics models break down and wave effects must be taken into account. We present an analysis of incoherent reflectance based on wave optics and gain important insights into reflectance design. We further suggest and demonstrate a practical method, which takes into account the limitations of existing micro-fabrication techniques such as photolithography to design and fabricate a range of reflection effects, based on wave interference.",
"title": ""
},
{
"docid": "565a8ea886a586dc8894f314fa21484a",
"text": "BACKGROUND\nThe Entity Linking (EL) task links entity mentions from an unstructured document to entities in a knowledge base. Although this problem is well-studied in news and social media, this problem has not received much attention in the life science domain. One outcome of tackling the EL problem in the life sciences domain is to enable scientists to build computational models of biological processes with more efficiency. However, simply applying a news-trained entity linker produces inadequate results.\n\n\nMETHODS\nSince existing supervised approaches require a large amount of manually-labeled training data, which is currently unavailable for the life science domain, we propose a novel unsupervised collective inference approach to link entities from unstructured full texts of biomedical literature to 300 ontologies. The approach leverages the rich semantic information and structures in ontologies for similarity computation and entity ranking.\n\n\nRESULTS\nWithout using any manual annotation, our approach significantly outperforms state-of-the-art supervised EL method (9% absolute gain in linking accuracy). Furthermore, the state-of-the-art supervised EL method requires 15,000 manually annotated entity mentions for training. These promising results establish a benchmark for the EL task in the life science domain. We also provide in depth analysis and discussion on both challenges and opportunities on automatic knowledge enrichment for scientific literature.\n\n\nCONCLUSIONS\nIn this paper, we propose a novel unsupervised collective inference approach to address the EL problem in a new domain. We show that our unsupervised approach is able to outperform a current state-of-the-art supervised approach that has been trained with a large amount of manually labeled data. Life science presents an underrepresented domain for applying EL techniques. By providing a small benchmark data set and identifying opportunities, we hope to stimulate discussions across natural language processing and bioinformatics and motivate others to develop techniques for this largely untapped domain.",
"title": ""
},
{
"docid": "530cb20db77c76d229fd90e73b3a65ca",
"text": "While automatic response generation for building chatbot s ys ems has drawn a lot of attention recently, there is limited understanding on when we need to c onsider the linguistic context of an input text in the generation process. The task is challeng ing, as messages in a conversational environment are short and informal, and evidence that can in dicate a message is context dependent is scarce. After a study of social conversation data cra wled from the web, we observed that some characteristics estimated from the responses of messa ges are discriminative for identifying context dependent messages. With the characteristics as we ak supervision, we propose using a Long Short Term Memory (LSTM) network to learn a classifier. O ur method carries out text representation and classifier learning in a unified framewor k. Experimental results show that the proposed method can significantly outperform baseline meth ods on accuracy of classification.",
"title": ""
},
{
"docid": "95ac40af0bc68a69a1f56fdb358c149e",
"text": "This paper presents an approach to the study of cognitive activities in collaborative software development. This approach has been developed by a multidisciplinary team made up of software engineers and cognitive psychologists. The basis of this approach is to improve our understanding of software development by observing professionals at work. The goal is to derive lines of conduct or good practices based on observations and analyses of the processes that are naturally used by software engineers. The strategy involved is derived from a standard approach in cognitive science. It is based on the videotaping of the activities of software engineers, transcription of the videos, coding of the transcription, defining categories from the coded episodes and defining cognitive behaviors or dialogs from the categories. This project presents two original contributions that make this approach generic in software engineering. The first contribution is the introduction of a formal hierarchical coding scheme, which will enable comparison of various types of observations. The second is the merging of psychological and statistical analysis approaches to build a cognitive model. The details of this new approach are illustrated with the initial data obtained from the analysis of technical review meetings.",
"title": ""
},
{
"docid": "df6b7ae7be0721be558a4a65074f1b78",
"text": "Despite the increasing importance and popularity of association football forecasting systems there is no agreed method of evaluating their accuracy. We have classified the evaluators used into two broad categories: those which consider only the prediction for the observed outcome; and those which consider the predictions for the unobserved as well as observed outcome. We highlight fundamental inconsistencies between them and demonstrate that they produce wildly different conclusions about the accuracy of four different forecasting systems (Fink Tank/Castrol Predictor, Bet365, Odds Wizard, and pi-football) based on recent Premier league data. None of the existing evaluators satisfy a set of simple theoretical benchmark criteria. Hence, it is dangerous to assume that any existing evaluator can adequately assess the performance of football forecasting systems and, until evaluators are developed that address all the benchmark criteria, it is best to use multiple types of predictive evaluators (preferably based on posterior validation).",
"title": ""
},
{
"docid": "c139f6b162c5dd9a849a28ece14ea097",
"text": "Digital documents are vulnerable to being copied. Most existing copy detection prototypes employ an exhaustive sentence-based comparison method in comparing a potential plagiarized document against a repository of legal or original documents to identify plagiarism activities. This approach is not scalable due to the potentially large number of original documents and the large number of sentences in each document . Furthermore, the security level of existing mechanisms is quite weak; a plagiarized document could simply by-pass the detection mechanisms by performing a minor modification on each sentence. In this paper, we propose a copy detection mechanism that will el iminate unnecessary comparisons. This is based on the observation that comparisons between two documents addressing different subjects are not necessary. We describe the design and implementation of our exper imental proto type called CHECK. The results of some exploratory experiments will be illust rated and the security level of our mechanism will be discussed.",
"title": ""
},
{
"docid": "a10a51d1070396e1e8a8b186af18f87d",
"text": "An upcoming trend for automobile manufacturers is to provide firmware updates over the air (FOTA) as a service. Since the firmware controls the functionality of a vehicle, security is important. To this end, several secure FOTA protocols have been developed. However, the secure FOTA protocols only solve the security for the transmission of the firmware binary. Once the firmware is downloaded, an attacker could potentially modify its contents before it is flashed to the corresponding ECU'S ROM. Thus, there is a need to extend the flashing procedure to also verify that the correct firmware has been flashed to the ECU. We present a framework for self-verification of firmware updates over the air. We include a verification code in the transmission to the vehicle, and after the firmware has been flashed, the integrity of the memory contents can be verified using the verification code. The verification procedure entails only simple hash functions and is thus suitable for the limited resources in the vehicle. Virtualization techniques are employed to establish a trusted computing base in the ECU, which is then used to perform the verification. The proposed framework allows the ECU itself to perform self-verification and can thus ensure the successful flashing of the firmware.",
"title": ""
},
{
"docid": "2ea626f0e1c4dfa3d5a23c80d8fbf70c",
"text": "Although research studies in education show that use of technology can help student learning, its use is generally affected by certain barriers. In this paper, we first identify the general barriers typically faced by K-12 schools, both in the United States as well as other countries, when integrating technology into the curriculum for instructional purposes, namely: (a) resources, (b) institution, (c) subject culture, (d) attitudes and beliefs, (e) knowledge and skills, and (f) assessment. We then describe the strategies to overcome such barriers: (a) having a shared vision and technology integration plan, (b) overcoming the scarcity of resources, (c) changing attitudes and beliefs, (d) conducting professional development, and (e) reconsidering assessments. Finally, we identify several current knowledge gaps pertaining to the barriers and strategies of technology integration, and offer pertinent recommendations for future research.",
"title": ""
},
{
"docid": "42ec2c6dfab766d76c71507827ba2275",
"text": "In this era of internet transfer of information is in digital form using multimedia files such as image, video, audio, etc. which relies on secure communication techniques to convey information safely. Due to the frequent transfer of videos over the internet nowadays they have become a good cover media for secure and covert communication in the form of video steganography. For efficient video steganography, it must fulfill its basic requirements such as capacity, imperceptibility, and robustness. In order to make a balance between imperceptibility and robustness, an efficient video steganography scheme is proposed for Standard Definition (SD) and High Definition (HD) videos. This scheme employs DWT (discrete wavelet transforms) for embedding the secret message inside the video frames utilizing only luminance (Y) component, and the security of the proposed scheme is strengthen by pre-processing the secret message with encryption before embedding. The embedding process is done by utilizing the middle-frequency sub-bands after applying second level 2-D DWT to the video frames to decompose it into 16 sub-bands. The performance of the proposed scheme is tested on different videos with quality metrics including peak signal to noise ratio (PSNR), structural similarity (SSIM) index, bit error rate (BER) and also by applying Gaussian and salt & pepper noise attacks. Moreover, the scheme is tested for the different level of compression on stego-video and also compared with U and V components used while embedding. Experimental results show that for both types of videos (HD and SD) the proposed scheme is able to achieve high imperceptibility. Further, it also provides robustness against different types of noise attacks and different compression levels which makes the proposed scheme evident for secure data transmission.",
"title": ""
},
{
"docid": "8a399beb6c89bbd2e8de9a4fd135c74f",
"text": "This paper presents findings emerging from the EU-Funded Games and Learning Alliance (GALA) Network of Excellence on serious games (SGs) that has a focus upon pedagogy-driven design of SGs. The overall framework presented in this paper concerns some elements that we consider key for the design of a new generation of more pedagogically-effective and easily author-able SGs: pedagogical perspectives, learning goals mapping to game mechanics and cognition-based SGs models. The paper also includes two corresponding illustrative case studies, developed by the network, on (1) the analysis of the Re-mission game based on the developed analytical framework of learning and game mechanics and (2) the Sandbox SGs cognition-based model in the Travel in Europe project. Practitioner notes: What is already known about this topic: Early studies have demonstrated the valuable contributions of game-based approaches in education and training. Early work has revealed particular strengths in some entertainment game mechanics, some of which look suited for serious and educational games. There are however no established practices, framework, models in serious games design and development (mechanics, development framework, etc.). Games and learning have separate mechanics and Serious Games Mechanics have yet to be defined. What this paper adds: An overall and integrated view of pedagogy-driven considerations related to SG design. The introduction to an analytical model that maps learning mechanics to game mechanics (LMGM model) towards defining Serious Games mechanics essential for the design and development of games for learning. The discussion on a cognition-based SG design model, the Sandbox SG model (SBSG), that seems to have the potential to contextualise learning in a meaningful virtual environment. Implications for practice and/or policy: The two models will support the design of a game-based learning environment that encapsulates various learning theories and approaches (in particular considering education at schools and universities) be they objectivist, associative, cognitive or situative, and combine contents with mechanics that sustain interest and engagement. The definition of Serious Games Mechanics will help bridge the gap between the expected learning outcomes and the desired positive engagement with the game-based learning environment. Formal deployment of game-based intervention for training and education can be further encouraged if pedagogy plays a key role in the design, development and deployment of serious games. The role of educators/practitioners in the development process is also key to encouraging the uptake of game-based intervention. Introduction The increasing use of pervasive and ubiquitous digital gaming technologies gives a significant opportunity for enhancing education methods, in particular thanks to the games’ ability to appeal a wide population. Yet, despite the digital games’ potential in terms of interactivity, immersion and engagement, much work must still be done to understand how to better design, administrate and evaluate digital games across different learning contexts and targets (Alvarez and Michaud, 2008; Ulicsac, 2010; de Freitas and Liarokapis, 2011). Also, games have now evolved exploiting a variety of modules ranging from social networking and multiplayer online facilities to advanced natural interaction modalities (ISFE, 2010). A new typology of digital games has emerged, namely serious games (SG) for education and training, that are designed with a primary pedagogical goal. Samples such as America’s Army or Code of Everand have become increasingly popular, reaching large numbers of players and engaging them for long periods of time. Early studies undertaken in the US and Europe attest to the valuable contributions of game-based approaches in education (e.g. Kato et al., 2008; Knight et al., 2010). And improvements can be further achieved by better understanding the target audience, pedagogic perspectives, so to make learning experiences more immersive, relevant and engaging. A recent survey by the International Software Federation of Europe (ISFE, 2010) revealed that 74% of those aged 16-19 considered themselves as gamers (n=3000), while 60% of those 20-24, 56% 25-29 and 38% 30-44 considered themselves regular players of games. And the projected growth figures for SGs currently stand at 47% per year until 2015 (Alvarez and Michaud, 2008). The importance of pedagogy at the heart of game development is alien to digital game development for entertainment. The absence of game mechanics and dynamics specifically designed and dedicated for learning purposes is an issue, which makes such intervention unsuited for educational purposes. Certainly, the SGs’ educational potential and actual effectiveness may vary appreciably as a consequence of the pedagogical choices made a priori by the game designer (Squire, 2005). Thus, a more thought-out design is key to meet the end-user and stakeholder requirements that are twofold, on the entertainment and education sides. On the one hand, it is undeniable that a fine-tuned pedagogy plays a major role in sustaining learning effectiveness (Bellotti et al., 2010). On the other hand, one of the biggest problems of educational games to date is the inadequate integration of educational and game design principles (e.g. Kiili, 2005; 2008; Lim et al., 2011) and this is also due to the fact that digital game designers and educational experts do not usually share a common vocabulary (Bellotti et al., 2011). In this paper we report the working experience of the Games and Learning Alliance (GALA, www.galanoe.eu) Network of Excellence, funded by the European 7 th Research Framework Programme, which brings together both the research and industry SG development communities, especially from the context of Technology Enhanced Learning in order to give the nascent industry opportunities to develop, find new markets and business models and utilise IP and scientific and pedagogic outcomes. This paper presents the GALA reflections on these topics that rely on a systematic review methodology (eg. Connolly et al., 2012) and the study of models and frameworks that have been developed by the GALA partners. The paper’s main added value consists in providing an overall and integrated view of pedagogically driven design of SGs. The paper begins with an examination of the pedagogical perspectives of SGs and highlights an analytical view of the importance of mapping game mechanics to pedagogical goals. A promising cognition-based model for SG development is discussed, demonstrating some specific development strategies, which are opening up new possibilities for efficient SG production. This paper highlights illustrative case studies on the Remission and Travel in Europe games, developed by the network and associate partners Pedagogical perspective of SGs Pedagogy lies at the heart of the distinction of what is considered as games for learning compared to other entertainment games. From a pedagogical perspective, SGs are not designed mainly for entertainment purposes (Michael and Chen, 2006), but to exploit the game appeal and the consequent player motivation to support development of knowledge and skills (Doughty et al., 2009). SGs offer an effective and engaging experience (Westera et al, 2008) and careful balancing to achieve symbiosis between pedagogy and game-play is needed (Dror, 2008a). Naively transcribing existing material and instructional methods into a SG domain is detrimental (Bruckman, 1999; Dror, 2008b). SGs should have knowledge transference as a core part of their game mechanics (Shute et al, 2009; Baek, 2010). Thus, understanding how game mechanics can relate to relevant educational strategies is needed. Pedagogy is the practice of learning theory, and applying learning theory in practice is a craft that has been developed in traditional education and training contexts for many hundreds of years. In SGs, however, the standard approach has been to take established theories of learning such as associative, cognitive or situative (de Freitas and Jameson, 2012), and to seek to extend these theories within virtual and game environments. Given the many theories of learning available as candidates for application, this approach is arbitrary and possibly ineffectual. However, it is fair to say that, in general, games have to date largely implemented task-centred and cognitive theories; in particular, experiential learning and scaffolded learning approaches have been tested in game environments. In a few cases game use has led to the development of new learning theories such as the exploratory learning model (de Freitas and Neumann, 2009); however well established theories mainly prevail. A key issue for SG design is to match the desired learning outcomes with the typical game characteristics. Games are quite varied in terms of features and can potentially offer different kinds of learning experience. So, it is urgent to understand how different game elements can contribute to an effective facilitation of learning and appropriate measures supporting effectiveness assessment are needed. Measures should include both learning outcomes (knowledge transfer including cognitive and skill-based abilities) and engagement (affective learning experience). Schiphorst (2007) stated that technology should be designed “as” experience and not only “for” experience. The reason why games are good learning environments is because they allow the learner to live through experiences, interact with learning objects and have social interactions with others including teachers and peers. Real value exists in designing learning experiences to support an exploratory and open-ended model of learning to encourage learners to make their own reflections and summations and to come to an understanding in their own way (de Freitas and Neumann, 2009). These two aspects of SGs (engagement",
"title": ""
},
{
"docid": "33f3f6ca25b8abec09d961a4ed72770a",
"text": "We develop a formal, type-theoretic account of the basic mechanisms of object-oriented programming: encapsulation, message passing, subtyping, and inheritance. By modeling object encapsulation in terms of existential types instead of the recursive records used in other recent studies, we obtain a substantial simpliication both in the model of objects and in the underlying typed-calculus.",
"title": ""
},
{
"docid": "1eb4805e6874ea1882a995d0f1861b80",
"text": "The Asian-Pacific Association for the Study of the Liver (APASL) convened an international working party on the \"APASL consensus statements and recommendation on management of hepatitis C\" in March, 2015, in order to revise \"APASL consensus statements and management algorithms for hepatitis C virus infection (Hepatol Int 6:409-435, 2012)\". The working party consisted of expert hepatologists from the Asian-Pacific region gathered at Istanbul Congress Center, Istanbul, Turkey on 13 March 2015. New data were presented, discussed and debated to draft a revision. Participants of the consensus meeting assessed the quality of cited studies. Finalized recommendations on treatment of hepatitis C are presented in this review.",
"title": ""
},
{
"docid": "d7c84c8282526c46d63e93091861e04d",
"text": "We propose a sketch-based two-step neural model for generating structured queries (SQL) based on a user’s request in natural language. The sketch is obtained by using placeholders for specific entities in the SQL query, such as column names, table names, aliases and variables, in a process similar to semantic parsing. The first step is to apply a sequence-to-sequence (SEQ2SEQ) model to determine the most probable SQL sketch based on the request in natural language. Then, a second network designed as a dual-encoder SEQ2SEQ model using both the text query and the previously obtained sketch is employed to generate the final SQL query. Our approach shows improvements over previous approaches on two recent large datasets (WikiSQL and SENLIDB) suitable for data-driven solutions for natural language interfaces for databases.",
"title": ""
},
{
"docid": "5214f391d5b152f9809bec1f6f069d21",
"text": "Abstract—Magnetic resonance imaging (MRI) is an important diagnostic imaging technique for the early detection of brain cancer. Brain cancer is one of the most dangerous diseases occurring commonly among human beings. The chances of survival can be increased if the cancer is detected at its early stage. MRI brain image plays a vital role in assisting radiologists to access patients for diagnosis and treatment. Studying of medical image by the Radiologist is not only a tedious and time consuming process but also accuracy depends upon their experience. So, the use of computer aided systems becomes very necessary to overcome these limitations. Even though several automated methods are available, still segmentation of MRI brain image remains as a challenging problem due to its complexity and there is no standard algorithm that can produce satisfactory results. In this review paper, various current methodologies of brain image segmentation using automated algorithms that are accurate and requires little user interaction are reviewed and their advantages, disadvantages are discussed. This review paper guides in combining two or more methods together to produce accurate results.",
"title": ""
},
{
"docid": "841ae5c6d2dcdbafcbec534fa46dfa1e",
"text": "In a recent paper, Levy and Goldberg [2] pointed out an interesting connection between prediction-based word embedding models and count models based on pointwise mutual information. Under certain conditions, they showed that both models end up optimizing equivalent objective functions. This paper explores this connection in more detail and lays out the factors leading to differences between these models. We find that the most relevant differences from an optimization perspective are (i) predict models work in a low dimensional space where embedding vectors can interact heavily; (ii) since predict models have fewer parameters, they are less prone to overfitting. Motivated by the insight of our analysis, we show how count models can be regularized in a principled manner and provide closed-form solutions for L1 and L2 regularization. Finally, we propose a new embedding model with a convex objective and the additional benefit of being intelligible.",
"title": ""
},
{
"docid": "232d020c8b006063151050f3c5a67a3d",
"text": "An experimental approach to cut-mark investigation has proved particularly successful and should arguably be a prerequisite for individuals interested in developing standard methods to study butchery data. This paper offers a brief review of the criteria used to investigate cut marks and subsequently outlines recent research that has integrated results from replication studies of archaeological tools and cut marks with written resources to study historic butchery practices. The case is made for a degree of standardization to be incorporated into the recording of butchery data and for the integration of evidence from the analysis of cut marks and tool signatures. While the call for standardization is not without precedent the process would benefit from a suitable model: one is proposed herein based in large part on experimental replication and personal vocational experience gained in the modern butchery trade. Furthermore, the paper identifies issues that need to be kept at the forefront of an experimental approach to butchery investigation and places emphasis on the use of modern analogy and cultural theory as a means of improving our interpretation of cut-mark data.",
"title": ""
},
{
"docid": "ee16956200a7950366c7204a1d0e94c9",
"text": "Hierarchical clustering is a common method used to determine clusters of similar data points in multidimensional spaces. O(n*) algorithms are known for this problem [3,4,11,19]. This paper reviews important results for sequential algorithms and describes previous work on parallel algorithms for hierarchical clustering. Parallel algorithms to perform hierarchical clustering using several distance metrics are then described. Optimal PRAM algorithms using n/log n processors are given for the average link, complete link, centroid, median, and minimum variance metrics. Optimal butterfly and tree algorithms using n/log n processors are given for the centroid, median, and minimum variance metrics. Optimal asymptotic speedups are achieved for the best practical algorithm to perform clustering using the single link metric on a n/log n processor PRAh4, butterfly, or tree.",
"title": ""
},
{
"docid": "6b2860d90c6e5f3200b2d5fd3bd5da37",
"text": "BACKGROUND\nFrontal fibrosing alopecia (FFA) is an acquired scarring alopecia currently considered a clinical variant of lichen planopilaris (LPP). Our purpose was to examine the clinicopathological features of FFA. In addition, we investigated the similarities and differences between FFA and LPP.\n\n\nMETHODS\nBiopsies from the scalp lesions of eight patients with FFA and eight patients with LPP were microscopically analyzed. Two cases of FFA and four cases of LPP were studied using direct immunofluorescence.\n\n\nRESULTS\nIn spite of the completely different clinical characteristics of FFA and LPP patients, the histopathological findings for the two entities were similar. Common microscopic findings for both FFA and LPP included an inflammatory lymphocytic infiltrate involving the isthmus and infundibulum of the hair follicles, the presence of apoptotic cells in the external root sheath, and a concentric fibrosis surrounding the hair follicles that resulted in their destruction with subsequent scarring alopecia. Biopsies taken from FFA patients showed less follicular inflammation and more apoptotic cells than those from LPP patients. In some cases of LPP, the inflammatory infiltrate involved the interfollicular epidermis, a finding never present in our FFA cases. Direct immunofluorescence was negative in the two cases of FFA studied and showed deposits of immunoglobulins and/or complement in two of the four LPP cases examined.\n\n\nCONCLUSIONS\nThe characteristic findings for FFA were more prominent apoptosis and less inflammation than found in LPP, along with spared interfollicular epidermis. FFA cases showed a rather characteristic histopathological pattern, although we could not find any clear-cut histological differences between FFA and LPP.",
"title": ""
},
{
"docid": "84a01029714dfef5d14bc4e2be78921e",
"text": "Integrating frequent pattern mining with interactive visualization for temporal event sequence analysis poses many interesting research questions and challenges. We review and reflect on some of these challenges based on our experiences working on event sequence data from two domains: web analytics and application logs. These challenges can be organized using a three-stage framework: pattern mining, pattern pruning and interactive visualization.",
"title": ""
}
] | scidocsrr |
37eefbb5ecbd5dea4f08b1eb61577077 | Occluded Imaging with Time-of-Flight Sensors | [
{
"docid": "1b6ddffacc50ad0f7e07675cfe12c282",
"text": "Realism in computer-generated images requires accurate input models for lighting, textures and BRDFs. One of the best ways of obtaining high-quality data is through measurements of scene attributes from real photographs by inverse rendering. However, inverse rendering methods have been largely limited to settings with highly controlled lighting. One of the reasons for this is the lack of a coherent mathematical framework for inverse rendering under general illumination conditions. Our main contribution is the introduction of a signal-processing framework which describes the reflected light field as a convolution of the lighting and BRDF, and expresses it mathematically as a product of spherical harmonic coefficients of the BRDF and the lighting. Inverse rendering can then be viewed as deconvolution. We apply this theory to a variety of problems in inverse rendering, explaining a number of previous empirical results. We will show why certain problems are ill-posed or numerically ill-conditioned, and why other problems are more amenable to solution. The theory developed here also leads to new practical representations and algorithms. For instance, we present a method to factor the lighting and BRDF from a small number of views, i.e. to estimate both simultaneously when neither is known.",
"title": ""
}
] | [
{
"docid": "e59136e0d0a710643a078b58075bd8cd",
"text": "PURPOSE\nEpidemiological evidence suggests that chronic consumption of fruit-based flavonoids is associated with cognitive benefits; however, the acute effects of flavonoid-rich (FR) drinks on cognitive function in the immediate postprandial period require examination. The objective was to investigate whether consumption of FR orange juice is associated with acute cognitive benefits over 6 h in healthy middle-aged adults.\n\n\nMETHODS\nMales aged 30-65 consumed a 240-ml FR orange juice (272 mg) and a calorie-matched placebo in a randomized, double-blind, counterbalanced order on 2 days separated by a 2-week washout. Cognitive function and subjective mood were assessed at baseline (prior to drink consumption) and 2 and 6 h post consumption. The cognitive battery included eight individual cognitive tests. A standardized breakfast was consumed prior to the baseline measures, and a standardized lunch was consumed 3 h post-drink consumption.\n\n\nRESULTS\nChange from baseline analysis revealed that performance on tests of executive function and psychomotor speed was significantly better following the FR drink compared to the placebo. The effects of objective cognitive function were supported by significant benefits for subjective alertness following the FR drink relative to the placebo.\n\n\nCONCLUSIONS\nThese data demonstrate that consumption of FR orange juice can acutely enhance objective and subjective cognition over the course of 6 h in healthy middle-aged adults.",
"title": ""
},
{
"docid": "106086a4b63a5bfe0554f36c9feff5f5",
"text": "It seems uncontroversial that providing feedback after a test, in the form of the correct answer, enhances learning. In real-world educational situations, however, the time available for learning is often constrained-and feedback takes time. We report an experiment in which total time for learning was fixed, thereby creating a trade-off between spending time receiving feedback and spending time on other learning activities. Our results suggest that providing feedback is not universally beneficial. Indeed, under some circumstances, taking time to provide feedback can have a negative net effect on learning. We also found that learners appear to have some insight about the costs of feedback; when they were allowed to control feedback, they often skipped unnecessary feedback in favor of additional retrieval attempts, and they benefited from doing so. These results underscore the importance of considering the costs and benefits of interventions designed to enhance learning.",
"title": ""
},
{
"docid": "541055772a5c2bed70649d2ca9a6c584",
"text": "This report discusses methods for forecasting hourly loads of a US utility as part of the load forecasting track of the Global Energy Forecasting Competition 2012 hosted on Kaggle. The methods described (gradient boosting machines and Gaussian processes) are generic machine learning / regression algorithms and few domain specific adjustments were made. Despite this, the algorithms were able to produce highly competitive predictions and hopefully they can inspire more refined techniques to compete with state-of-the-art load forecasting methodologies.",
"title": ""
},
{
"docid": "3e570e415690daf143ea30a8554b0ac8",
"text": "Innovative technology on intelligent processes for smart home applications that utilize Internet of Things (IoT) is mainly limited and dispersed. The available trends and gaps were investigated in this study to provide valued visions for technical environments and researchers. Thus, a survey was conducted to create a coherent taxonomy on the research landscape. An extensive search was conducted for articles on (a) smart homes, (b) IoT and (c) applications. Three databases, namely, IEEE Explore, ScienceDirect and Web of Science, were used in the article search. These databases comprised comprehensive literature that concentrate on IoT-based smart home applications. Subsequently, filtering process was achieved on the basis of intelligent processes. The final classification scheme outcome of the dataset contained 40 articles that were classified into four classes. The first class includes the knowledge engineering process that examines data representation to identify the means of accomplishing a task for IoT applications and their utilisation in smart homes. The second class includes papers on the detection process that uses artificial intelligence (AI) techniques to capture the possible changes in IoT-based smart home applications. The third class comprises the analytical process that refers to the use of AI techniques to understand the underlying problems in smart homes by inferring new knowledge and suggesting appropriate solutions for the problem. The fourth class comprises the control process that describes the process of measuring and instructing the performance of IoT-based smart home applications against the specifications with the involvement of intelligent techniques. The basic features of this evolving approach were then identified in the aspects of motivation of intelligent process utilisation for IoT-based smart home applications and open-issue restriction utilisation. The recommendations for the approval and utilisation of intelligent process for IoT-based smart home applications were also determined from the literature.",
"title": ""
},
{
"docid": "6cb7cded3c10f00228ac58ff3b82d45e",
"text": "This paper presents a hierarchical control framework for the obstacle avoidance of autonomous and semi-autonomous ground vehicles. The high-level planner is based on motion primitives created from a four-wheel nonlinear dynamic model. Parameterized clothoids and drifting maneuvers are used to improve vehicle agility. The low-level tracks the planned trajectory with a nonlinear Model Predictive Controller. The first part of the paper describes the proposed control architecture and methodology. The second part presents simulative and experimental results with an autonomous and semi-autonomous ground vehicle traveling at high speed on an icy surface.",
"title": ""
},
{
"docid": "cbc04fde0873e0aff630388ee63b53bd",
"text": "Recent works in speech recognition rely either on connectionist temporal classification (CTC) or sequence-to-sequence models for character-level recognition. CTC assumes conditional independence of individual characters, whereas attention-based models can provide nonsequential alignments. Therefore, we could use a CTC loss in combination with an attention-based model in order to force monotonic alignments and at the same time get rid of the conditional independence assumption. In this paper, we use the recently proposed hybrid CTC/attention architecture for audio-visual recognition of speech in-the-wild. To the best of our knowledge, this is the first time that such a hybrid architecture architecture is used for audio-visual recognition of speech. We use the LRS2 database and show that the proposed audio-visual model leads to an 1.3% absolute decrease in word error rate over the audio-only model and achieves the new state-of-the-art performance on LRS2 database (7% word error rate). We also observe that the audio-visual model significantly outperforms the audio-based model (up to 32.9% absolute improvement in word error rate) for several different types of noise as the signal-to-noise ratio decreases.",
"title": ""
},
{
"docid": "59a1088003576f2e75cdbedc24ae8bdf",
"text": "Two literatures or sets of articles are complementary if, considered together, they can reveal useful information of scientik interest not apparent in either of the two sets alone. Of particular interest are complementary literatures that are also mutually isolated and noninteractive (they do not cite each other and are not co-cited). In that case, the intriguing possibility akrae that thm &tfnrmnt;nn n&wd hv mwnhXno them 4. nnvnl Lyww u-c “‘1 YLL”I&.L.sU”4L 6uy’“s. u, b..S..“Y.Ayj .a.-** Y ..u. -... During the past decade, we have identified seven examples of complementary noninteractive structures in the biomedical literature. Each structure led to a novel, plausible, and testable hypothesis that, in several cases, was subsequently corroborated by medical researchers through clinical or laboratory investigation. We have also developed, tested, and described a systematic, computer-sided approach to iinding and identifying complementary noninteractive literatures. Specialization, Fragmentation, and a Connection Explosion By some obscure spontaneous process scientists have responded to the growth of science by organizing their work into soecialties, thus permitting each individual to -r-~ focus on a small part of the total literature. Specialties that grow too large tend to divide into subspecialties that have their own literatures which, by a process of repeated splitting, maintain more or less fixed and manageable size. As the total literature grows, the number of specialties, but not in general the size of each, increases (Kochen, 1963; Swanson, 199Oc). But the unintended consequence of specialization is fragmentation. By dividing up the pie, the potential relationships among its pieces tend to be neglected. Although scientific literature cannot, in the long run, grow disproportionately to the growth of the communities and resources that produce it, combinations of implicitlyrelated segments of literature can grow much faster than the literature itself and can readily exceed the capacity of the community to identify and assimilate such relatedness (Swanson, 1993). The signilicance of the “information explosion” thus may lie not in an explosion of quantity per se, but in an incalculably greater combinatorial explosion of unnoticed and unintended logical connections. The Significance of Complementary Noninteractive Literatures If two literatures each of substantial size are linked by arguments that they respectively put forward -that is, are “logically” related, or complementary -one would expect to gain usefui information by combining them. For example, suppose that one (biomedical) literature establishes that some environmental factor A influences certain internal physiological conditions and a second literature establishes that these same physiological changes influence the course of disease C. Presumably, then, anyone who reads both literatures could conclude that factor A might influence disease C. Under such --->!L---f -----l-----ry-?r-. ----.---,a ?1-_----_I rl-conamons or comptementdnty one woum dtso expect me two literatures to refer to each other. If, however, the two literatures were developed independently of one another, the logical l inkage illustrated may be both unintended and unnoticed. To detect such mutual isolation, we examine the citation pattern. If two literatures are “noninteractive” that ir if thmv hnvm n~.rer fnr odAnm\\ kppn &ml = ulyc 1U) a. “W, na6L.V ..Y.“. ,“a vva&“..n] “W.. UluIu together, and if neither cites the other, then it is possible that scientists have not previously considered both iiteratures together, and so it is possible that no one is aware of the implicit A-C connection. The two conditions, complementarily and noninteraction, describe a model structure that shows how useful information can remain undiscovered even though its components consist of public knowledge (Swanson, 1987,199l). Public Knowledge / Private Knowledge There is, of course, no way to know in any particular case whether the possibility of an AC relationship in the above model has or has not occurred to someone, or whether or not anyone has actually considered the two literatures on A and C together, a private matter that necessarily remains conjectural. However, our argument is based only on determining whether there is any printed evidence to the contrary. We are concerned with public rather than Data Mining: Integration Q Application 295 From: KDD-96 Proceedings. Copyright © 1996, AAAI (www.aaai.org). All rights reserved. private knowledge -with the state of the record produced rather than the state of mind of the producers (Swanson, 1990d). The point of bringing together the AB and BC literatures, in any event, is not to \"prove\" an AC linkage, (by considering only transitive relationships) but rather call attention to an apparently unnoticed association that may be worth investigating. In principle any chain of scientific, including analogic, reasoning in which different links appear in noninteractive literatures may lead to the discovery of new interesting connections. \"What people know\" is a common u derstanding of what is meant by \"knowledge\". If taken in this subjective sense, the idea of \"knowledge discovery\" could mean merely that someone discovered something they hadn’t known before. Our focus in the present paper is on a second sense of the word \"knowledge\", a meaning associated with the products of human i tellectual activity, as encoded in the public record, rather than with the contents of the human mind. This abstract world of human-created \"objective\" knowledge is open to exploration and discovery, for it can contain territory that is subjectively unknown to anyone (Popper, 1972). Our work is directed toward the discovery of scientificallyuseful information implicit in the public record, but not previously made xplicit. The problem we address concerns structures within the scientific literature, not within the mind. The Process of Finding Complementary Noninteractive Literatures During the past ten years, we have pursued three goals: i) to show in principle how new knowledge might be gained by synthesizing logicallyrelated noninteractive literatures; ii) to demonstrate that such structures do exist, at least within the biomedical literature; and iii) to develop a systematic process for finding them. In pursuit of goal iii, we have created interactive software and database arch strategies that can facilitate the discovery of complementary st uctures in the published literature of science. The universe or searchspace under consideration is limited only by the coverage of the major scientific databases, though we have focused primarily on the biomedical field and the MEDLINE database (8 million records). In 1991, a systematic approach to finding complementary structures was outlined and became a point of departure for software development (Swanson, 1991). The system that has now taken shape is based on a 3-way interaction between computer software, bibliographic databases, and a human operator. Tae interaction generates information structtues that are used heuristically to guide the search for promising complementary literatures. The user of the system begins by choosing a question 296 Technology Spotlight or problem area of scientific interest that can be associated with a literature, C. Elsewhere we describe and evaluate experimental computer software, which we call ARROWSMITH (Swanson & Smalheiser, 1997), that performs two separate functions that can be used independently. The first function produces a list of candidates for a second literature, A, complementary o C, from which the user can select one candidate (at a time) an input, along with C, to the second function. This first function can be considered as a computer-assisted process of problem-discovery, an issue identified in the AI literature (Langley, et al., 1987; p304-307). Alternatively, the user may wish to identify a second literature, A, as a conjecture or hypothesis generated independently of the computer-produced list of candidates. Our approach has been based on the use of article titles as a guide to identifying complementary literatures. As indicated above, our point of departure for the second function is a tentative scientific hypothesis associated with two literalxtres, A and C. A title-word search of MEDLINE is used to create two local computer title-files associated with A and C, respectively. These files are used as input to the ARROWSMITH software, which then produces a list of all words common to the two sets of titles, except for words excluded by an extensive stoplist (presently about 5000 words). The resulting list of words provides the basis for identifying title-word pathways that might provide clues to the presence of complementary arguments within the literatures corresponding to A and C. The output of this procedure is a structured titledisplay (plus journal citation), that serves as a heuristic aid to identifying word-linked titles and serves also as an organized guide to the literature.",
"title": ""
},
{
"docid": "f5ac489e8e387321abd9d3839d7d8ba2",
"text": "Online social networks like Slashdot bring valuable information to millions of users - but their accuracy is based on the integrity of their user base. Unfortunately, there are many “trolls” on Slashdot who post misinformation and compromise system integrity. In this paper, we develop a general algorithm called TIA (short for Troll Identification Algorithm) to classify users of an online “signed” social network as malicious (e.g. trolls on Slashdot) or benign (i.e. normal honest users). Though applicable to many signed social networks, TIA has been tested on troll detection on Slashdot Zoo under a wide variety of parameter settings. Its running time is faster than many past algorithms and it is significantly more accurate than existing methods.",
"title": ""
},
{
"docid": "878bdefc419be3da8d9e18111d26a74f",
"text": "PURPOSE\nTo estimate prevalence and chronicity of insomnia and the impact of chronic insomnia on health and functioning of adolescents.\n\n\nMETHODS\nData were collected from 4175 youths 11-17 at baseline and 3134 a year later sampled from managed care groups in a large metropolitan area. Insomnia was assessed by youth-reported DSM-IV symptom criteria. Outcomes are three measures of somatic health, three measures of mental health, two measures of substance use, three measures of interpersonal problems, and three of daily activities.\n\n\nRESULTS\nOver one-fourth reported one or more symptoms of insomnia at baseline and about 5% met diagnostic criteria for insomnia. Almost 46% of those who reported one or more symptoms of insomnia in Wave 1 continued to be cases at Wave 2 and 24% met DSM-IV symptom criteria for chronic insomnia (cases in Wave 1 were also cases in Wave 2). Multivariate analyses found chronic insomnia increased subsequent risk for somatic health problems, interpersonal problems, psychological problems, and daily activities. Significant odds (p < .05) ranged from 1.6 to 5.6 for poor outcomes. These results are the first reported on chronic insomnia among youths, and corroborate, using prospective data, previous findings on correlates of disturbed sleep based on cross-sectional studies.\n\n\nCONCLUSIONS\nInsomnia is both common and chronic among adolescents. The data indicate that the burden of insomnia is comparable to that of other psychiatric disorders such as mood, anxiety, disruptive, and substance use disorders. Chronic insomnia severely impacts future health and functioning of youths. Those with chronic insomnia are more likely to seek medical care. These data suggest primary care settings might provide a venue for screening and early intervention for adolescent insomnia.",
"title": ""
},
{
"docid": "c1ddefd126c6d338c4cd9238e9067435",
"text": "Tensor networks are efficient representations of high-dimensional tensors which have been very successful for physics and mathematics applications. We demonstrate how algorithms for optimizing such networks can be adapted to supervised learning tasks by using matrix product states (tensor trains) to parameterize models for classifying images. For the MNIST data set we obtain less than 1% test set classification error. We discuss how the tensor network form imparts additional structure to the learned model and suggest a possible generative interpretation.",
"title": ""
},
{
"docid": "cbdbe103bcc85f76f9e6ac09eed8ea4c",
"text": "Using the evidence collection and analysis methodology for Android devices proposed by Martini, Do and Choo (2015), we examined and analyzed seven popular Android cloud-based apps. Firstly, we analyzed each app in order to see what information could be obtained from their private app storage and SD card directories. We collated the information and used it to aid our investigation of each app’s database files and AccountManager data. To complete our understanding of the forensic artefacts stored by apps we analyzed, we performed further analysis on the apps to determine if the user’s authentication credentials could be collected for each app based on the information gained in the initial analysis stages. The contributions of this research include a detailed description of artefacts, which are of general forensic interest, for each app analyzed.",
"title": ""
},
{
"docid": "9f7bb80631e6aa2b13d0045580af15d1",
"text": "This paper presents an extensive study of the software implementation on workstations of the NIST-recommended elliptic curves over prime fields. We present the results of our implementation in C and assembler on a Pentium II 400 MHz workstation. We also provide a comparison with the NIST-recommended curves over binary fields.",
"title": ""
},
{
"docid": "d37d6139ced4c85ff0cbc4cce018212b",
"text": "We describe isone, a tool that facilitates the visual exploration of social networks. Social network analysis is a methodological approach in the social sciences using graph-theoretic concepts to describe, understand and explain social structure. The isone software is an attempt to integrate analysis and visualization of social networks and is intended to be used in research and teaching. While we are primarily focussing on users in the social sciences, several features provided in the tool will be useful in other fields as well. In contrast to more conventional mathematical software in the social sciences that aim at providing a comprehensive suite of analytical options, our emphasis is on complementing every option we provide with tailored means of graphical interaction. We attempt to make complicated types of analysis and data handling transparent, intuitive, and more readily accessible. User feedback indicates that many who usually regard data exploration and analysis complicated and unnerving enjoy the playful nature of visual interaction. Consequently, much of the tool is about graph drawing methods specifically adapted to facilitate visual data exploration. The origins of isone lie in an interdisciplinary cooperation with researchers from political science which resulted in innovative uses of graph drawing methods for social network visualization, and prototypical implementations thereof. With the growing demand for access to these methods, we started implementing an integrated tool for public use. It should be stressed, however, that isone remains a research platform and testbed for innovative methods, and is not intended to become",
"title": ""
},
{
"docid": "afe2bc204458117fb278ef500b485ea1",
"text": "PURPOSE\nTitanium based implant systems, though considered as the gold standard for rehabilitation of edentulous spaces, have been criticized for many inherent flaws. The onset of hypersensitivity reactions, biocompatibility issues, and an unaesthetic gray hue have raised demands for more aesthetic and tissue compatible material for implant fabrication. Zirconia is emerging as a promising alternative to conventional Titanium based implant systems for oral rehabilitation with superior biological, aesthetics, mechanical and optical properties. This review aims to critically analyze and review the credibility of Zirconia implants as an alternative to Titanium for prosthetic rehabilitation.\n\n\nSTUDY SELECTION\nThe literature search for articles written in the English language in PubMed and Cochrane Library database from 1990 till December 2016. The following search terms were utilized for data search: \"zirconia implants\" NOT \"abutment\", \"zirconia implants\" AND \"titanium implants\" AND \"osseointegration\", \"zirconia implants\" AND compatibility.\n\n\nRESULTS\nThe number of potential relevant articles selected were 47. All the human in vivo clinical, in vitro, animals' studies were included and discussed under the following subheadings: Chemical composition, structure and phases; Physical and mechanical properties; Aesthetic and optical properties; Osseointegration and biocompatibility; Surface modifications; Peri-implant tissue compatibility, inflammation and soft tissue healing, and long-term prognosis.\n\n\nCONCLUSIONS\nZirconia implants are a promising alternative to titanium with a superior soft-tissue response, biocompatibility, and aesthetics with comparable osseointegration. However, further long-term longitudinal and comparative clinical trials are required to validate zirconia as a viable alternative to the titanium implant.",
"title": ""
},
{
"docid": "dfc0f23dbb0a0556f53f5a913b936c8f",
"text": "Neural network-based methods represent the state-of-the-art in question generation from text. Existing work focuses on generating only questions from text without concerning itself with answer generation. Moreover, our analysis shows that handling rare words and generating the most appropriate question given a candidate answer are still challenges facing existing approaches. We present a novel two-stage process to generate question-answer pairs from the text. For the first stage, we present alternatives for encoding the span of the pivotal answer in the sentence using Pointer Networks. In our second stage, we employ sequence to sequence models for question generation, enhanced with rich linguistic features. Finally, global attention and answer encoding are used for generating the question most relevant to the answer. We motivate and linguistically analyze the role of each component in our framework and consider compositions of these. This analysis is supported by extensive experimental evaluations. Using standard evaluation metrics as well as human evaluations, our experimental results validate the significant improvement in the quality of questions generated by our framework over the state-of-the-art. The technique presented here represents another step towards more automated reading comprehension assessment. We also present a live system to demonstrate the effectiveness of our approach.",
"title": ""
},
{
"docid": "18233af1857390bff51d2e713bc766d9",
"text": "Name disambiguation is a perennial challenge for any large and growing dataset but is particularly significant for scientific publication data where documents and ideas are linked through citations and depend on highly accurate authorship. Differentiating personal names in scientific publications is a substantial problem as many names are not sufficiently distinct due to the large number of researchers active in most academic disciplines today. As more and more documents and citations are published every year, any system built on this data must be continually retrained and reclassified to remain relevant and helpful. Recently, some incremental learning solutions have been proposed, but most of these have been limited to small-scale simulations and do not exhibit the full heterogeneity of the millions of authors and papers in real world data. In our work, we propose a probabilistic model that simultaneously uses a rich set of metadata and reduces the amount of pairwise comparisons needed for new articles. We suggest an approach to disambiguation that classifies in an incremental fashion to alleviate the need for retraining the model and re-clustering all papers and uses fewer parameters than other algorithms. Using a published dataset, we obtained the highest K-measure which is a geometric mean of cluster and author-class purity. Moreover, on a difficult author block from the Clarivate Analytics Web of Science, we obtain higher precision than other algorithms.",
"title": ""
},
{
"docid": "e0ef97db18a47ba02756ba97830a0d0c",
"text": "This article reviews the literature concerning the introduction of interactive whiteboards (IWBs) in educational settings. It identifies common themes to emerge from a burgeoning and diverse literature, which includes reports and summaries available on the Internet. Although the literature reviewed is overwhelmingly positive about the impact and the potential of IWBs, it is primarily based on the views of teachers and pupils. There is insufficient evidence to identify the actual impact of such technologies upon learning either in terms of classroom interaction or upon attainment and achievement. This article examines this issue in light of varying conceptions of interactivity and research into the effects of learning with verbal and visual information.",
"title": ""
},
{
"docid": "a12538c128f7cd49f2561170f6aaf0ac",
"text": "We also define qp(kp) = 0, k ∈ Z. Fermat quotients appear and play a major role in various questions of computational and algebraic number theory and thus their distribution modulo p has been studied in a number of works; see, for example, [1, 5, 6, 7, 8, 9, 10, 11, 13, 15, 16, 17, 18] and the references therein. In particular, the image set Ip(U) = {qp(u) : 1 ≤ u ≤ U} has been investigated in some of these works. Let Ip(U) = #Ip(U) be the cardinality of Ip(U). It is well known (see, for example, [6, Section 2]) that",
"title": ""
},
{
"docid": "3bbf4bd1daaf0f6f916268907410b88f",
"text": "UNLABELLED\nNoncarious cervical lesions are highly prevalent and may have different etiologies. Regardless of their origin, be it acid erosion, abrasion, or abfraction, restoring these lesions can pose clinical challenges, including access to the lesion, field control, material placement and handling, marginal finishing, patient discomfort, and chair time. This paper describes a novel technique for minimizing these challenges and optimizing the restoration of noncarious cervical lesions using a technique the author describes as the class V direct-indirect restoration. With this technique, clinicians can create precise extraoral margin finishing and polishing, while maintaining periodontal health and controlling polymerization shrinkage stress.\n\n\nCLINICAL SIGNIFICANCE\nThe clinical technique described in this article has the potential for being used routinely in treating noncarious cervical lesions, especially in cases without easy access and limited field control. Precise margin finishing and polishing is one of the greatest benefits of the class V direct-indirect approach, as the author has seen it work successfully in his practice over the past five years.",
"title": ""
}
] | scidocsrr |
89d1b9e0fc2d35058a88b50565026c6c | Inductorless DC-AC Cascaded H-Bridge Multilevel Boost Inverter for Electric/Hybrid Electric Vehicle Applications | [
{
"docid": "913709f4fe05ba2783c3176ed00015fe",
"text": "A generalization of the PWM (pulse width modulation) subharmonic method for controlling single-phase or three-phase multilevel voltage source inverters (VSIs) is considered. Three multilevel PWM techniques for VSI inverters are presented. An analytical expression of the spectral components of the output waveforms covering all the operating conditions is derived. The analysis is based on an extension of Bennet's method. The improvements in harmonic spectrum are pointed out, and several examples are presented which prove the validity of the multilevel modulation. Improvements in the harmonic contents were achieved due to the increased number of levels.<<ETX>>",
"title": ""
}
] | [
{
"docid": "7e7d4a3ab8fe57c6168835fa1ab3b413",
"text": "Massively parallel architectures such as the GPU are becoming increasingly important due to the recent proliferation of data. In this paper, we propose a key class of hybrid parallel graphlet algorithms that leverages multiple CPUs and GPUs simultaneously for computing k-vertex induced subgraph statistics (called graphlets). In addition to the hybrid multi-core CPU-GPU framework, we also investigate single GPU methods (using multiple cores) and multi-GPU methods that leverage all available GPUs simultaneously for computing induced subgraph statistics. Both methods leverage GPU devices only, whereas the hybrid multicore CPU-GPU framework leverages all available multi-core CPUs and multiple GPUs for computing graphlets in large networks. Compared to recent approaches, our methods are orders of magnitude faster, while also more cost effective enjoying superior performance per capita and per watt. In particular, the methods are up to 300 times faster than a recent state-of-the-art method. To the best of our knowledge, this is the first work to leverage multiple CPUs and GPUs simultaneously for computing induced subgraph statistics.",
"title": ""
},
{
"docid": "a2cbc2b95b1988dae97d501c141e161d",
"text": "We present a fast and simple method to compute bundled layouts of general graphs. For this, we first transform a given graph drawing into a density map using kernel density estimation. Next, we apply an image sharpening technique which progressively merges local height maxima by moving the convolved graph edges into the height gradient flow. Our technique can be easily and efficiently implemented using standard graphics acceleration techniques and produces graph bundlings of similar appearance and quality to state-of-the-art methods at a fraction of the cost. Additionally, we show how to create bundled layouts constrained by obstacles and use shading to convey information on the bundling quality. We demonstrate our method on several large graphs.",
"title": ""
},
{
"docid": "180a271a86f9d9dc71cc140096d08b2f",
"text": "This communication demonstrates for the first time the capability to independently control the real and imaginary parts of the complex propagation constant in planar, printed circuit board compatible leaky-wave antennas. The structure is based on a half-mode microstrip line which is loaded with an additional row of periodic metallic posts, resulting in a substrate integrated waveguide SIW with one of its lateral electric walls replaced by a partially reflective wall. The radiation mechanism is similar to the conventional microstrip leaky-wave antenna operating in its first higher-order mode, with the novelty that the leaky-mode leakage rate can be controlled by virtue of a sparse row of metallic vias. For this topology it is demonstrated that it is possible to independently control the antenna pointing angle and main lobe beamwidth while achieving high radiation efficiencies, thus providing low-cost, low-profile, simply fed, and easily integrable leaky-wave solutions for high-gain frequency beam-scanning applications. Several prototypes operating at 15 GHz have been designed, simulated, manufactured and tested, to show the operation principle and design flexibility of this one dimensional leaky-wave antenna.",
"title": ""
},
{
"docid": "64a14e3dfc292fb4d1dc16160e89dedf",
"text": "Approaches to climate change impact, adaptation and vulnerability assessment: towards a classification framework to serve decision-making.",
"title": ""
},
{
"docid": "9cab244eeb45f9553fc25ecca2c37bbd",
"text": "BACKGROUND\nPeriorbital skin hyperpigmentation, so-called dark circles, is of major concern for many people. However, only a few reports refer to the morbidity and treatment, and as far as the authors know, there are no reports of the condition in Asians.\n\n\nMETHODS\nA total of 18 Japanese patients underwent combined therapy using Q-switched ruby laser to eliminate dermal pigmentation following topical bleaching treatment with tretinoin aqueous gel and hydroquinone ointment performed initially (6 weeks) to reduce epidermal melanin. Both steps were repeated two to four times until physical clearance of the pigmentation was confirmed and patient satisfaction was achieved. Skin biopsy was performed at baseline in each patient and at the end of treatment in three patients, all with informed consent. Clinical and histologic appearances of periorbital hyperpigmentation were evaluated and rated as excellent, good, fair, poor, or default.\n\n\nRESULTS\nSeven of 18 patients (38.9 percent) showed excellent clearing after treatment and eight (44.4 percent) were rated good. Only one (5.6 percent) was rated fair and none was rated poor. Postinflammatory hyperpigmentation was observed in only two patients (11.1 percent). Histologic examination showed obvious epidermal hyperpigmentation in 10 specimens. Dermal pigmentation was observed in all specimens but was not considered to be melanocytosis. Remarkable reduction of dermal pigmentation was observed in the biopsy specimens of three patients after treatment.\n\n\nCONCLUSION\nThe new treatment protocol combining Q-switched ruby laser and topical bleaching treatment using tretinoin and hydroquinone is considered effective for improvement of periorbital skin hyperpigmentation, with a low incidence of postinflammatory hyperpigmentation.",
"title": ""
},
{
"docid": "3a2740b7f65841f7eb4f74a1fb3c9b65",
"text": "Getting a better understanding of user behavior is important for advancing information retrieval systems. Existing work focuses on modeling and predicting single interaction events, such as clicks. In this paper, we for the first time focus on modeling and predicting sequences of interaction events. And in particular, sequences of clicks. We formulate the problem of click sequence prediction and propose a click sequence model (CSM) that aims to predict the order in which a user will interact with search engine results. CSM is based on a neural network that follows the encoder-decoder architecture. The encoder computes contextual embeddings of the results. The decoder predicts the sequence of positions of the clicked results. It uses an attentionmechanism to extract necessary information about the results at each timestep. We optimize the parameters of CSM by maximizing the likelihood of observed click sequences. We test the effectiveness ofCSMon three new tasks: (i) predicting click sequences, (ii) predicting the number of clicks, and (iii) predicting whether or not a user will interact with the results in the order these results are presented on a search engine result page (SERP). Also, we show that CSM achieves state-of-the-art results on a standard click prediction task, where the goal is to predict an unordered set of results a user will click on.",
"title": ""
},
{
"docid": "9a6a724f8aa0ae4fa9de1367f8661583",
"text": "In this paper, we develop a simple algorithm to determine the required number of generating units of wind-turbine generator and photovoltaic array, and the associated storage capacity for stand-alone hybrid microgrid. The algorithm is based on the observation that the state of charge of battery should be periodically invariant. The optimal sizing of hybrid microgrid is given in the sense that the life cycle cost of system is minimized while the given load power demand can be satisfied without load rejection. We also report a case study to show the efficacy of the developed algorithm.",
"title": ""
},
{
"docid": "7efa3543711bc1bb6e3a893ed424b75d",
"text": "This dissertation is concerned with the creation of training data and the development of probability models for statistical parsing of English with Combinatory Categorial Grammar (CCG). Parsing, or syntactic analysis, is a prerequisite for semantic interpretation, and forms therefore an integral part of any system which requires natural language understanding. Since almost all naturally occurring sentences are ambiguous, it is not sufficient (and often impossible) to generate all possible syntactic analyses. Instead, the parser needs to rank competing analyses and select only the most likely ones. A statistical parser uses a probability model to perform this task. I propose a number of ways in which such probability models can be defined for CCG. The kinds of models developed in this dissertation, generative models over normal-form derivation trees, are particularly simple, and have the further property of restricting the set of syntactic analyses to those corresponding to a canonical derivation structure. This is important to guarantee that parsing can be done efficiently. In order to achieve high parsing accuracy, a large corpus of annotated data is required to estimate the parameters of the probability models. Most existing wide-coverage statistical parsers use models of phrase-structure trees estimated from the Penn Treebank, a 1-million-word corpus of manually annotated sentences from the Wall Street Journal. This dissertation presents an algorithm which translates the phrase-structure analyses of the Penn Treebank to CCG derivations. The resulting corpus, CCGbank, is used to train and test the models proposed in this dissertation. Experimental results indicate that parsing accuracy (when evaluated according to a comparable metric, the recovery of unlabelled word-word dependency relations), is as high as that of standard Penn Treebank parsers which use similar modelling techniques. Most existing wide-coverage statistical parsers use simple phrase-structure grammars whose syntactic analyses fail to capture long-range dependencies, and therefore do not correspond to directly interpretable semantic representations. By contrast, CCG is a grammar formalism in which semantic representations that include long-range dependencies can be built directly during the derivation of syntactic structure. These dependencies define the predicate-argument structure of a sentence, and are used for two purposes in this dissertation: First, the performance of the parser can be evaluated according to how well it recovers these dependencies. In contrast to purely syntactic evaluations, this yields a direct measure of how accurate the semantic interpretations returned by the parser are. Second, I propose a generative model that captures the local and non-local dependencies in the predicate-argument structure, and investigate the impact of modelling non-local in addition to local dependencies.",
"title": ""
},
{
"docid": "56205e79e706e05957cb5081d6a8348a",
"text": "Corpus-based set expansion (i.e., finding the “complete” set of entities belonging to the same semantic class, based on a given corpus and a tiny set of seeds) is a critical task in knowledge discovery. It may facilitate numerous downstream applications, such as information extraction, taxonomy induction, question answering, and web search. To discover new entities in an expanded set, previous approaches either make one-time entity ranking based on distributional similarity, or resort to iterative pattern-based bootstrapping. The core challenge for these methods is how to deal with noisy context features derived from free-text corpora, which may lead to entity intrusion and semantic drifting. In this study, we propose a novel framework, SetExpan, which tackles this problem, with two techniques: (1) a context feature selection method that selects clean context features for calculating entity-entity distributional similarity, and (2) a ranking-based unsupervised ensemble method for expanding entity set based on denoised context features. Experiments on three datasets show that SetExpan is robust and outperforms previous state-of-the-art methods in terms of mean average precision.",
"title": ""
},
{
"docid": "fcca051539729b005271e4f96563538d",
"text": "!is paper presents a novel methodological approach of how to design, conduct and analyse robot-assisted play. !is approach is inspired by non-directive play therapy. !e experimenter participates in the experiments, but the child remains the main leader for play. Besides, beyond inspiration from non-directive play therapy, this approach enables the experimenter to regulate the interaction under speci\"c conditions in order to guide the child or ask her questions about reasoning or a#ect related to the robot. !is approach has been tested in a longterm study with six children with autism in a school setting. An autonomous robot with zoomorphic, dog-like appearance was used in the studies. !e children’s progress was analyzed according to three dimensions, namely, Play, Reasoning and A#ect. Results from the case-study evaluations have shown the capability of the method to meet each child’s needs and abilities. Children who mainly played solitarily progressively experienced basic imitation games with the experimenter. Children who proactively played socially progressively experienced higher levels of play and constructed more reasoning related to the robot. !ey also expressed some interest in the robot, including, on occasion, a#ect.",
"title": ""
},
{
"docid": "9ae435f5169e867dc9d4dc0da56ec9fb",
"text": "Renewable energy is currently the main direction of development of electric power. Because of its own characteristics, the reliability of renewable energy generation is low. Renewable energy generation system needs lots of energy conversion devices which are made of power electronic devices. Too much power electronic components can damage power quality in microgrid. High Frequency AC (HFAC) microgrid is an effective way to solve the problems of renewable energy generation system. Transmitting electricity by means of HFAC is a novel idea in microgrid. Although the HFAC will cause more loss of power, it can improve the power quality in microgrid. HFAC can also reduce the impact of fluctuations of renewable energy in microgrid. This paper mainly simulates the HFAC with Matlab/Simulink and analyzes the feasibility of HFAC in microgrid.",
"title": ""
},
{
"docid": "2e167507f8b44e783d60312c0d71576d",
"text": "The goal of this paper is to study different techniques to predict stock price movement using the sentiment analysis from social media, data mining. In this paper we will find efficient method which can predict stock movement more accurately. Social media offers a powerful outlet for people’s thoughts and feelings it is an enormous ever-growing source of texts ranging from everyday observations to involved discussions. This paper contributes to the field of sentiment analysis, which aims to extract emotions and opinions from text. A basic goal is to classify text as expressing either positive or negative emotion. Sentiment classifiers have been built for social media text such as product reviews, blog posts, and even twitter messages. With increasing complexity of text sources and topics, it is time to re-examine the standard sentiment extraction approaches, and possibly to redefine and enrich the definition of sentiment. Next, unlike sentiment analysis research to date, we examine sentiment expression and polarity classification within and across various social media streams by building topical datasets within each stream. Different data mining methods are used to predict market more efficiently along with various hybrid approaches. We conclude that stock prediction is very complex task and various factors should be considered for forecasting the market more accurately and efficiently.",
"title": ""
},
{
"docid": "bfae60b46b97cf2491d6b1136c60f6a6",
"text": "Educational data mining concerns with developing methods for discovering knowledge from data that come from educational domain. In this paper we used educational data mining to improve graduate students’ performance, and overcome the problem of low grades of graduate students. In our case study we try to extract useful knowledge from graduate students data collected from the college of Science and Technology – Khanyounis. The data include fifteen years period [1993-2007]. After preprocessing the data, we applied data mining techniques to discover association, classification, clustering and outlier detection rules. In each of these four tasks, we present the extracted knowledge and describe its importance in educational domain.",
"title": ""
},
{
"docid": "73bee7e59be3d6a044965a512abdf115",
"text": "The underlaying equations for the models we consider are hyperbolic systems of conservation laws in one dimension: ut + f(u)x = 0, where x ∈ R, u ∈ R and Df(u) is assumed to have real distinct eigenvalues. The main mathematical novelty is to describe the dynamics on a network, represented by a directed topological graph, instead of a real line. The more advanced results are available for the scalar case, i.e. n = 1.",
"title": ""
},
{
"docid": "6bda457a005dbb2ff6abf84392d7b197",
"text": "One of the major problems in developing media mix models is that the data that is generally available to the modeler lacks sufficient quantity and information content to reliably estimate the parameters in a model of even moderate complexity. Pooling data from different brands within the same product category provides more observations and greater variability in media spend patterns. We either directly use the results from a hierarchical Bayesian model built on the category dataset, or pass the information learned from the category model to a brand-specific media mix model via informative priors within a Bayesian framework, depending on the data sharing restriction across brands. We demonstrate using both simulation and real case studies that our category analysis can improve parameter estimation and reduce uncertainty of model prediction and extrapolation.",
"title": ""
},
{
"docid": "b7e78ca489cdfb8efad03961247e12f2",
"text": "ASR short for Automatic Speech Recognition is the process of converting a spoken speech into text that can be manipulated by a computer. Although ASR has several applications, it is still erroneous and imprecise especially if used in a harsh surrounding wherein the input speech is of low quality. This paper proposes a post-editing ASR error correction method and algorithm based on Bing’s online spelling suggestion. In this approach, the ASR recognized output text is spell-checked using Bing’s spelling suggestion technology to detect and correct misrecognized words. More specifically, the proposed algorithm breaks down the ASR output text into several word-tokens that are submitted as search queries to Bing search engine. A returned spelling suggestion implies that a query is misspelled; and thus it is replaced by the suggested correction; otherwise, no correction is performed and the algorithm continues with the next token until all tokens get validated. Experiments carried out on various speeches in different languages indicated a successful decrease in the number of ASR errors and an improvement in the overall error correction rate. Future research can improve upon the proposed algorithm so much so that it can be parallelized to take advantage of multiprocessor computers. KeywordsSpeech Recognition; Error Correction; Bing Spelling",
"title": ""
},
{
"docid": "c82cecc94eadfa9a916d89a9ee3fac21",
"text": "In this paper, we develop a supply chain network model consisting of manufacturers and retailers in which the demands associated with the retail outlets are random. We model the optimizing behavior of the various decision-makers, derive the equilibrium conditions, and establish the finite-dimensional variational inequality formulation. We provide qualitative properties of the equilibrium pattern in terms of existence and uniqueness results and also establish conditions under which the proposed computational procedure is guaranteed to converge. Finally, we illustrate the model through several numerical examples for which the equilibrium prices and product shipments are computed. This is the first supply chain network equilibrium model with random demands for which modeling, qualitative analysis, and computational results have been obtained.",
"title": ""
},
{
"docid": "6de71e8106d991d2c3d2b845a9e0a67e",
"text": "XML repositories are now a widespread means for storing and exchanging information on the Web. As these repositories become increasingly used in dynamic applications such as e-commerce, there is a rapidly growing need for a mechanism to incorporate reactive functionality in an XML setting. Event-condition-action (ECA) rules are a technology from active databases and are a natural method for supporting suchfunctionality. ECA rules can be used for activities such as automatically enforcing document constraints, maintaining repository statistics, and facilitating publish/subscribe applications. An important question associated with the use of a ECA rules is how to statically predict their run-time behaviour. In this paper, we define a language for ECA rules on XML repositories. We then investigate methods for analysing the behaviour of a set of ECA rules, a task which has added complexity in this XML setting compared with conventional active databases.",
"title": ""
},
{
"docid": "dd01a74456f7163e3240ebde99cad89e",
"text": "Features of consciousness difficult to understand in terms of conventional neuroscience have evoked application of quantum theory, which describes the fundamental behavior of matter and energy. In this paper we propose that aspects of quantum theory (e.g. quantum coherence) and of a newly proposed physical phenomenon of quantum wave function \"self-collapse\"(objective reduction: OR Penrose, 1994) are essential for consciousness, and occur in cytoskeletal microtubules and other structures within each of the brain's neurons. The particular characteristics of microtubules suitable for quantum effects include their crystal-like lattice structure, hollow inner core, organization of cell function and capacity for information processing. We envisage that conformational states of microtubule subunits (tubulins) are coupled to internal quantum events, and cooperatively interact (compute) with other tubulins. We further assume that macroscopic coherent superposition of quantum-coupled tubulin conformational states occurs throughout significant brain volumes and provides the global binding essential to consciousness. We equate the emergence of the microtubule quantum coherence with pre-conscious processing which grows (for up to 500 milliseconds) until the mass-energy difference among the separated states of tubulins reaches a threshold related to quantum gravity. According to the arguments for OR put forth in Penrose (1994), superpositioned states each have their own space-time geometries. When the degree of coherent mass-energy difference leads to sufficient separation of space-time geometry, the system must choose and decay (reduce, collapse) to a single universe state. In this way, a transient superposition of slightly differing space-time geometries persists until an abrupt quantum classical reduction occurs. Unlike the random, \"subjective reduction\"(SR, or R) of standard quantum theory caused by observation or environmental entanglement, the OR we propose in microtubules is a self-collapse and it results in particular patterns of microtubule-tubulin conformational states that regulate neuronal activities including synaptic functions. Possibilities and probabilities for postreduction tubulin states are influenced by factors including attachments of microtubule-associated proteins (MAPs) acting as \"nodes\"which tune and \"orchestrate\"the quantum oscillations. We thus term the self-tuning OR process in microtubules \"orchestrated objective reduction\"(\"B>Orch OR\", and calculate an estimate for the number of tubulins (and neurons) whose coherence for relevant time periods (e.g. 500 milliseconds) will elicit Orch OR. In providing a connection among 1) pre-conscious to conscious transition, 2) fundamental space-time notions, 3) noncomputability, and 4) binding of various (time scale and spatial) reductions into an instantaneous event (\"conscious now\", we believe Orch OR in brain microtubules is the most specific and plausible model for consciousness yet proposed.",
"title": ""
},
{
"docid": "018b25742275dd628c58208e5bd5a532",
"text": "Multivariate time series (MTS) datasets broadly exist in numerous fields, including health care, multimedia, finance, and biometrics. How to classify MTS accurately has become a hot research topic since it is an important element in many computer vision and pattern recognition applications. In this paper, we propose a Mahalanobis distance-based dynamic time warping (DTW) measure for MTS classification. The Mahalanobis distance builds an accurate relationship between each variable and its corresponding category. It is utilized to calculate the local distance between vectors in MTS. Then we use DTW to align those MTS which are out of synchronization or with different lengths. After that, how to learn an accurate Mahalanobis distance function becomes another key problem. This paper establishes a LogDet divergence-based metric learning with triplet constraint model which can learn Mahalanobis matrix with high precision and robustness. Furthermore, the proposed method is applied on nine MTS datasets selected from the University of California, Irvine machine learning repository and Robert T. Olszewski's homepage, and the results demonstrate the improved performance of the proposed approach.",
"title": ""
}
] | scidocsrr |
83ec8904e67472c9e73bc941d2216ea8 | Using Deep Learning to Identify Utility Poles with Crossarms and Estimate Their Locations from Google Street View Images | [
{
"docid": "76ad212ccd103c93d45c1ffa0e208b45",
"text": "The highest accuracy object detectors to date are based on a two-stage approach popularized by R-CNN, where a classifier is applied to a sparse set of candidate object locations. In contrast, one-stage detectors that are applied over a regular, dense sampling of possible object locations have the potential to be faster and simpler, but have trailed the accuracy of two-stage detectors thus far. In this paper, we investigate why this is the case. We discover that the extreme foreground-background class imbalance encountered during training of dense detectors is the central cause. We propose to address this class imbalance by reshaping the standard cross entropy loss such that it down-weights the loss assigned to well-classified examples. Our novel Focal Loss focuses training on a sparse set of hard examples and prevents the vast number of easy negatives from overwhelming the detector during training. To evaluate the effectiveness of our loss, we design and train a simple dense detector we call RetinaNet. Our results show that when trained with the focal loss, RetinaNet is able to match the speed of previous one-stage detectors while surpassing the accuracy of all existing state-of-the-art two-stage detectors.",
"title": ""
}
] | [
{
"docid": "e90755afe850d597ad7b3f4b7e590b66",
"text": "Privacy is considered to be a fundamental human right (Movius and Krup, 2009). Around the world this has led to a large amount of legislation in the area of privacy. Nearly all national governments have imposed local privacy legislation. In the United States several states have imposed their own privacy legislation. In order to maintain a manageable scope this paper only addresses European Union wide and federal United States laws. In addition several US industry (self) regulations are also considered. Privacy regulations in emerging technologies are surrounded by uncertainty. This paper aims to clarify the uncertainty relating to privacy regulations with respect to Cloud Computing and to identify the main open issues that need to be addressed for further research. This paper is based on existing literature and a series of interviews and questionnaires with various Cloud Service Providers (CSPs) that have been performed for the first author’s MSc thesis (Ruiter, 2009). The interviews and questionnaires resulted in data on privacy and security procedures from ten CSPs and while this number is by no means large enough to make any definite conclusions the results are, in our opinion, interesting enough to publish in this paper. The remainder of the paper is organized as follows: the next section gives some basic background on Cloud Computing. Section 3 provides",
"title": ""
},
{
"docid": "ba2ecc0656041cfee29fde2439345c39",
"text": "Software defined radios (SDR) are highly configurable hardware platforms that provide the technology for realizing the rapidly expanding third (and future) generation digital wireless communication infrastructure. While there are a number of silicon alternatives available for implementing the various functions in a SDR, field programmable gate arrays (FPGAs) are an attractive option for many of these tasks for reasons of performance, power consumption and flexibility. Amongst the more complex tasks performed in a high data rate wireless system is synchronization. This paper examines carrier synchronization in SDRs using FPGA based signal processors. We provide a tutorial style overview of carrier recovery techniques for QPSK and QAM modulation schemes and report on the design and FPGA implementation of a carrier recovery loop for a 16-QAM modern. Two design alternatives are presented to highlight the rich design space accessible using configurable logic. The FPGA device utilization and performance for a carrier recovery circuit using a look-up table approach and CORDIC arithmetic are presented. The simulation and FPGA implementation process using a recent system level design tool called System GeneratorTM for DSP described.",
"title": ""
},
{
"docid": "398c506a2fbc1738d3d70f0507334096",
"text": "Preprocessing To prepare the images for the network, each of the training images was resized to 192 pixels by 192 pixels. To create additional training images, each of the training images was elastically distorted. For each of the original training images, four randomly generated elastic distorted images were generated and then resized down to 192 by 192 pixels. In addition, each training image was also rotated 90 degrees and additional elastic distortions were applied to the rotated images.",
"title": ""
},
{
"docid": "a0ce2af1ec7c62e94fb1d0ce314a217c",
"text": "According to the dual mating hypothesis, women possess two overlapping suites of mate-choice mechanisms: one leading to preferences for sexually desirable men who have high-fitness genes and one leading to preferences for men who are able to invest in a woman and her children. Evidence increasingly demonstrates that women's preference for sexual desirability (but not investment attractiveness) increases when women are most fertile within the ovulatory cycle. Little is known, however, about the implications of these preference shifts for women's relationships with their long-term partners. Using luteinizing hormone tests to verify ovulation, across two studies (Samples 1 and 2), we found that women whose partners were relatively low in sexual desirability felt less close to their partner (Samples 1 and 2) and were more critical of their partner's faults (Sample 2) on high-fertility days of the cycle just prior to ovulation compared with low-fertility days of the cycle. Women whose partners were relatively high in sexual desirability felt closer to their partner (Sample 1) and more satisfied with their relationship (Sample 2) on high- than low-fertility days of the cycle. There were no such shifts in women's commitment to their relationship. Therefore, partner sexual desirability predicts women's high-fertility assessments of relationship quality but not their intentions to stay in their relationship, consistent with the dual mating hypothesis. These findings suggest that variations across the ovulation cycle in women's reproductive hormones play an important role in relationship dynamics.",
"title": ""
},
{
"docid": "53267e7e574dce749bb3d5877640e017",
"text": "After a decline in enthusiasm for national community health worker (CHW) programmes in the 1980s, these have re-emerged globally, particularly in the context of HIV. This paper examines the case of South Africa, where there has been rapid growth of a range of lay workers (home-based carers, lay counsellors, DOT supporters etc.) principally in response to an expansion in budgets and programmes for HIV, most recently the rollout of antiretroviral therapy (ART). In 2004, the term community health worker was introduced as the umbrella concept for all the community/lay workers in the health sector, and a national CHW Policy Framework was adopted. We summarize the key features of the emerging national CHW programme in South Africa, which include amongst others, their integration into a national public works programme and the use of non-governmental organizations as intermediaries. We then report on experiences in one Province, Free State. Over a period of 2 years (2004--06), we made serial visits on three occasions to the first 16 primary health care facilities in this Province providing comprehensive HIV services, including ART. At each of these visits, we did inventories of CHW numbers and training, and on two occasions conducted facility-based group interviews with CHWs (involving a total of 231 and 182 participants, respectively). We also interviewed clinic nurses tasked with supervising CHWs. From this evaluation we concluded that there is a significant CHW presence in the South African health system. This infrastructure, however, shares many of the managerial challenges (stability, recognition, volunteer vs. worker, relationships with professionals) associated with previous national CHW programmes, and we discuss prospects for sustainability in the light of the new policy context.",
"title": ""
},
{
"docid": "b8471f4d02599bccfcfbbc04a756f0b6",
"text": "This paper describes the design and realization of an electrostatic actuated MEMS mirror operating at a resonance frequency of 23.5 KHz with a PLL feedback loop. The design is based upon a thorough understanding of the (non-linear) dynamical behavior of the mirror. Using an external position sensitive device (PSD) the proper working of the PLL is demonstrated. Next we study the possibility to replace the PSD sensor with an embedded capacitive phase-angle sensor. We show measurements of capacitance changes with large parasitic influences while actuating the mirror in a feed forward mode. This demonstrates the feasibility of a fully embedded control for a resonant scanning MEMS mirror.",
"title": ""
},
{
"docid": "96f02d68f992d21733890d5f929975de",
"text": "A neural network (NN)-based adaptive controller with an observer is proposed for the trajectory tracking of robotic manipulators with unknown dynamics nonlinearities. It is assumed that the robotic manipulator has only joint angle position measurements. A linear observer is used to estimate the robot joint angle velocity, while NNs are employed to further improve the control performance of the controlled system through approximating the modified robot dynamics function. The adaptive controller for robots with an observer can guarantee the uniform ultimate bounds of the tracking errors and the observer errors as well as the bounds of the NN weights. For performance comparisons, the conventional adaptive algorithm with an observer using linearity in parameters of the robot dynamics is also developed in the same control framework as the NN approach for online approximating unknown nonlinearities of the robot dynamics. Main theoretical results for designing such an observer-based adaptive controller with the NN approach using multilayer NNs with sigmoidal activation functions, as well as with the conventional adaptive approach using linearity in parameters of the robot dynamics are given. The performance comparisons between the NN approach and the conventional adaptation approach with an observer is carried out to show the advantages of the proposed control approaches through simulation studies.",
"title": ""
},
{
"docid": "441a81522a192467b128b59d7af4c39c",
"text": "Selective ensemble is a learning paradigm that follows an “overproduce and choose” strategy, where a number of candidate classifiers are trained, and a set of several classifiers that are accurate and diverse are selected to solve a problem. In this paper, the hybrid approach called D3C is presented; this approach is a hybrid model of ensemble pruning that is based on k-means clustering and the framework of dynamic selection and circulating in combination with a sequential search method. Additionally, a multilabel D3C is derived from D3C through employing a problem transformation for multi-label classification. Empirical study shows that D3C exhibits competitive performance against other high-performance methods, and experiments in multi-label datasets verify the feasibility of multi-label D3C. & 2013 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "7d0badaeeb94658690f0809c134d3963",
"text": "Vascular tissue engineering is an area of regenerative medicine that attempts to create functional replacement tissue for defective segments of the vascular network. One approach to vascular tissue engineering utilizes seeding of biodegradable tubular scaffolds with stem (and/or progenitor) cells wherein the seeded cells initiate scaffold remodeling and prevent thrombosis through paracrine signaling to endogenous cells. Stem cells have received an abundance of attention in recent literature regarding the mechanism of their paracrine therapeutic effect. However, very little of this mechanistic research has been performed under the aegis of vascular tissue engineering. Therefore, the scope of this review includes the current state of TEVGs generated using the incorporation of stem cells in biodegradable scaffolds and potential cell-free directions for TEVGs based on stem cell secreted products. The current generation of stem cell-seeded vascular scaffolds are based on the premise that cells should be obtained from an autologous source. However, the reduced regenerative capacity of stem cells from certain patient groups limits the therapeutic potential of an autologous approach. This limitation prompts the need to investigate allogeneic stem cells or stem cell secreted products as therapeutic bases for TEVGs. The role of stem cell derived products, particularly extracellular vesicles (EVs), in vascular tissue engineering is exciting due to their potential use as a cell-free therapeutic base. EVs offer many benefits as a therapeutic base for functionalizing vascular scaffolds such as cell specific targeting, physiological delivery of cargo to target cells, reduced immunogenicity, and stability under physiological conditions. However, a number of points must be addressed prior to the effective translation of TEVG technologies that incorporate stem cell derived EVs such as standardizing stem cell culture conditions, EV isolation, scaffold functionalization with EVs, and establishing the therapeutic benefit of this combination treatment.",
"title": ""
},
{
"docid": "b210df85635af27665efe9811b2123bf",
"text": "Edge detection plays a significant role in image processing and performance of high-level tasks such as image segmentation and object recognition depends on its efficiency. It is clear that accurate edge map generation is more difficult when images are corrupted with noise. Moreover, most of edge detection methods have parameters which must be set manually. Here we propose a new color edge detector based on a statistical test, which is robust to noise. Also, the parameters of this method will be set automatically based on image content. To show the effectiveness of the proposed method, four state-of-the-art edge detectors are implemented and the results are compared. Experimental results on five of the most well-known edge detection benchmarks show that the proposed method is robust to noise. The performance of our method for lower levels of noise is very comparable to the existing approaches, whose performances highly depend on their parameter tuning stage. However, for higher levels of noise, the observed results significantly highlight the superiority of the proposed method over the existing edge detection methods, both quantitatively and qualitatively.",
"title": ""
},
{
"docid": "3a95be7cbc37f20a6c41b84f78013263",
"text": "We demonstrate a simple strategy to cope with missing data in sequential inputs, addressing the task of multilabel classification of diagnoses given clinical time series. Collected from the pediatric intensive care unit (PICU) at Children’s Hospital Los Angeles, our data consists of multivariate time series of observations. The measurements are irregularly spaced, leading to missingness patterns in temporally discretized sequences. While these artifacts are typically handled by imputation, we achieve superior predictive performance by treating the artifacts as features. Unlike linear models, recurrent neural networks can realize this improvement using only simple binary indicators of missingness. For linear models, we show an alternative strategy to capture this signal. Training models on missingness patterns only, we show that for some diseases, what tests are run can as predictive as the results themselves.",
"title": ""
},
{
"docid": "024570b927c0967bf0c2868c36fc16d6",
"text": "Cognitive training has been shown to improve executive functions (EFs) in middle childhood and adulthood. However, fewer studies have targeted the preschool years-a time when EFs undergo rapid development. The present study tested the effects of a short four session EF training program in 54 four-year-olds. The training group significantly improved their working memory from pre-training relative to an active control group. Notably, this effect extended to a task sharing few surface features with the trained tasks, and continued to be apparent 3 months later. In addition, the benefits of training extended to a measure of mathematical reasoning 3 months later, indicating that training EFs during the preschool years has the potential to convey benefits that are both long-lasting and wide-ranging.",
"title": ""
},
{
"docid": "0e0e802a0e5635ac12f603f160d8d4de",
"text": "This paper describes the design and simulation of a fully-differential, high gain, high speed CMOS Operational Transconductance Amplifier (OTA). The op-amp is designed for unity gain sampler stage of 14bit 12.5Ms/s pipeline analog-to digital converter. The design is implemented using a folding cascode topology with the addition of gain boosting amplifiers for increased gain. Common-mode feedback (CMFB) is used to stable the designed OTA against temperature and other process variations. This design has been implemented in 0.13μm IBM RF mixed signal CMOS Technology. The Spectre simulation shows the DC gain of 91.5 dB and a unity-gain frequency of 714.5MHz with phase margin of 62° (double 7.5-pF load) while consuming 9 mW power. For the normal corner, the settling time to 1/2 LSB of 14bit A/D converter accuracy is 40 ns.",
"title": ""
},
{
"docid": "abdd8eb3c08b63762cb0a0dffdbade12",
"text": "Bagging and boosting are two of the most well-known ensemble learning methods due to their theoretical performance guarantees and strong experimental results. However, these algorithms have been used mainly in batch mode, i.e., they require the entire training set to be available at once and, in some cases, require random access to the data. In this paper, we present online versions of bagging and boosting that require only one pass through the training data. We build on previously presented work by describing some theoretical results. We also compare the online and batch algorithms experimentally in terms of accuracy and running time.",
"title": ""
},
{
"docid": "4d5ba0bc7146518d5c59d7c535d0415e",
"text": "We introduce Opcodes, a Python package which presents x86 and x86-64 instruction sets as a set of high-level objects. Opcodes provides information about instruction names, implicit and explicit operands, and instruction encoding. We use the Opcodes package to auto-generate instruction classes for PeachPy, an x86-64 assembler embedded in Python, and enable new functionality.\n The new PeachPy functionality lets low-level optimization experts write high-performance assembly kernels in Python, load them as callable Python functions, test the kernels using numpy and generate object files for Windows, Linux, and Mac OS X entirely within Python. Additionally, the new PeachPy can generate and run assembly code inside Chromium-based browsers by leveraging Native Client technology. Beyond that, PeachPy gained ability to target Google Go toolchain, by generating either source listing for Go assembler, or object files that can be linked with Go toolchain.\n With backends for Windows, Linux, Mac OS X, Native Client, and Go, PeachPy is the most portable way to write high-performance kernels for x86-64 architecture.",
"title": ""
},
{
"docid": "11ae8b4875d90f89e5d71c1f5608d7dc",
"text": "The aim of this study was to assess the clinical, radiographic and microscopic features of a case series of ossifying fibroma (OF) of the jaws. For the study, all cases with OF diagnosis from the files of the Oral Pathology Laboratory, University of Ribeirão Preto, Ribeirão Preto, SP, Brazil, were reviewed. Clinical data were obtained from the patient files and the radiographic features were evaluated in each case. All cases were reviewed microscopically to confirm the diagnosis. Eight cases were identified, 5 in females and 3 in males. The mean age of the patients was 33.7 years and most lesions (7 cases) occurred in the mandible. Radiographically, all lesions appeared as unilocular images and most of them (5 cases) were of mixed type. The mean size of the tumor was 3.1 cm and 3 cases caused displacement of the involved teeth. Microscopically, all cases showed several bone-like mineralized areas, immersed in the cellular connective tissue. From the 8 cases, 5 underwent surgical excision and 1 patient refused treatment. In the remaining 2 cases, this information was not available. In conclusion, OF occurs more commonly in women in the fourth decade of life, frequently as a mixed radiographic image in the mandible. Coherent differential diagnoses are important to guide the most adequate clinical approach. A correlation between clinical, imaginological and histopathological features is the key to establish the correct diagnosis.",
"title": ""
},
{
"docid": "c36ab593b7ee78f111d04616d4e82a7c",
"text": "The registration of functional brain data to common stereotaxic brain space facilitates data sharing and integration across different subjects, studies, and even imaging modalities. Thus, we previously described a method for the probabilistic registration of functional near-infrared spectroscopy (fNIRS) data onto Montreal Neurological Institute (MNI) coordinate space that can be used even when magnetic resonance images of the subjects are not available. This method, however, requires the careful measurement of scalp landmarks and fNIRS optode positions using a 3D-digitizer. Here we present a novel registration method, based on simulations in place of physical measurements for optode positioning. First, we constructed a holder deformation algorithm and examined its validity by comparing virtual and actual deformation of holders on spherical phantoms and real head surfaces. The discrepancies were negligible. Next, we registered virtual holders on synthetic heads and brains that represent size and shape variations among the population. The registered positions were normalized to MNI space. By repeating this process across synthetic heads and brains, we statistically estimated the most probable MNI coordinate values, and clarified errors, which were in the order of several millimeters across the scalp, associated with this estimation. In essence, the current method allowed the spatial registration of completely stand-alone fNIRS data onto MNI space without the use of supplementary measurements. This method will not only provide a practical solution to the spatial registration issues in fNIRS studies, but will also enhance cross-modal communications within the neuroimaging community.",
"title": ""
},
{
"docid": "d53726710ce73fbcf903a1537f149419",
"text": "We treat in this paper Linear Programming (LP) problems with uncertain data. The focus is on uncertainty associated with hard constraints: those which must be satisfied, whatever is the actual realization of the data (within a prescribed uncertainty set). We suggest a modeling methodology whereas an uncertain LP is replaced by its Robust Counterpart (RC). We then develop the analytical and computational optimization tools to obtain robust solutions of an uncertain LP problem via solving the corresponding explicitly stated convex RC program. In particular, it is shown that the RC of an LP with ellipsoidal uncertainty set is computationally tractable, since it leads to a conic quadratic program, which can be solved in polynomial time.",
"title": ""
},
{
"docid": "e06646b7d2bd6ee83c4d557f4215e143",
"text": "Deep generative models have been praised for their ability to learn smooth latent representation of images, text, and audio, which can then be used to generate new, plausible data. However, current generative models are unable to work with graphs due to their unique characteristics—their underlying structure is not Euclidean or grid-like, they remain isomorphic under permutation of the nodes labels, and they come with a different number of nodes and edges. In this paper, we propose NeVAE, a novel variational autoencoder for graphs, whose encoder and decoder are specially designed to account for the above properties by means of several technical innovations. In addition, by using masking, the decoder is able to guarantee a set of local structural and functional properties in the generated graphs. Experiments reveal that our model is able to learn and mimic the generative process of several well-known random graph models and can be used to discover new molecules more effectively than several state of the art methods. Moreover, by utilizing Bayesian optimization over the continuous latent representation of molecules our model finds, we can also identify molecules that maximize certain desirable properties more effectively than alternatives.",
"title": ""
},
{
"docid": "36fa816c5e738ea6171851fb3200f68d",
"text": "Vehicle speed prediction provides important information for many intelligent vehicular and transportation applications. Accurate on-road vehicle speed prediction is challenging, because an individual vehicle speed is affected by many factors, e.g., the traffic condition, vehicle type, and driver’s behavior, in either deterministic or stochastic way. This paper proposes a novel data-driven vehicle speed prediction method in the context of vehicular networks, in which the real-time traffic information is accessible and utilized for vehicle speed prediction. It first predicts the average traffic speeds of road segments by using neural network models based on historical traffic data. Hidden Markov models (HMMs) are then utilized to present the statistical relationship between individual vehicle speeds and the traffic speed. Prediction for individual vehicle speeds is realized by applying the forward–backward algorithm on HMMs. To evaluate the prediction performance, simulations are set up in the SUMO microscopic traffic simulator with the application of a real Luxembourg motorway network and traffic count data. The vehicle speed prediction result shows that our proposed method outperforms other ones in terms of prediction accuracy.",
"title": ""
}
] | scidocsrr |
7ab28f756e9158baafba01b918080a8b | Modeling and Simulation of 5 DOF educational robot arm | [
{
"docid": "ed35d80dd3af3acbe75e5122b2378756",
"text": "We present a system whereby the human voice may specify continuous control signals to manipulate a simulated 2D robotic arm and a real 3D robotic arm. Our goal is to move towards making accessible the manipulation of everyday objects to individuals with motor impairments. Using our system, we performed several studies using control style variants for both the 2D and 3D arms. Results show that it is indeed possible for a user to learn to effectively manipulate real-world objects with a robotic arm using only non-verbal voice as a control mechanism. Our results provide strong evidence that the further development of non-verbal voice controlled robotics and prosthetic limbs will be successful.",
"title": ""
}
] | [
{
"docid": "bc167cd7a932b1dbd6f7ac9981e863e2",
"text": "An 8-bit successive approximation (SA) analog-to- digital converter (ADC) in 0.18 mum CMOS dedicated for energy-limited applications is presented. The SA ADC achieves a wide effective resolution bandwidth (ERBW) by applying only one bootstrapped switch, thereby preserving the desired low power characteristic. Measurement results show that at a supply voltage of 0.9 V and an output rate of 200 kS/s, the SA ADC performs a peak signal-to-noise-and-distortion ratio of 47.4 dB and an ERBW up to its Nyquist bandwidth (100 kHz). It consumes 2.47 muW in the test, corresponding to a figure of merit of 65 f J/conversion-step.",
"title": ""
},
{
"docid": "df22aa6321c86b0aec44778c7293daca",
"text": "BACKGROUND\nAtopic dermatitis (AD) is characterized by dry skin and a hyperactive immune response to allergens, 2 cardinal features that are caused in part by epidermal barrier defects. Tight junctions (TJs) reside immediately below the stratum corneum and regulate the selective permeability of the paracellular pathway.\n\n\nOBJECTIVE\nWe evaluated the expression/function of the TJ protein claudin-1 in epithelium from AD and nonatopic subjects and screened 2 American populations for single nucleotide polymorphisms in the claudin-1 gene (CLDN1).\n\n\nMETHODS\nExpression profiles of nonlesional epithelium from patients with extrinsic AD, nonatopic subjects, and patients with psoriasis were generated using Illumina's BeadChips. Dysregulated intercellular proteins were validated by means of tissue staining and quantitative PCR. Bioelectric properties of epithelium were measured in Ussing chambers. Functional relevance of claudin-1 was assessed by using a knockdown approach in primary human keratinocytes. Twenty-seven haplotype-tagging SNPs in CLDN1 were screened in 2 independent populations with AD.\n\n\nRESULTS\nWe observed strikingly reduced expression of the TJ proteins claudin-1 and claudin-23 only in patients with AD, which were validated at the mRNA and protein levels. Claudin-1 expression inversely correlated with T(H)2 biomarkers. We observed a remarkable impairment of the bioelectric barrier function in AD epidermis. In vitro we confirmed that silencing claudin-1 expression in human keratinocytes diminishes TJ function while enhancing keratinocyte proliferation. Finally, CLDN1 haplotype-tagging SNPs revealed associations with AD in 2 North American populations.\n\n\nCONCLUSION\nCollectively, these data suggest that an impairment in tight junctions contributes to the barrier dysfunction and immune dysregulation observed in AD subjects and that this may be mediated in part by reductions in claudin-1.",
"title": ""
},
{
"docid": "262be71d64eef2534fab547ec3db6b9a",
"text": "In the past few decades, the rise in attacks on communication devices in networks has resulted in a reduction of network functionality, throughput, and performance. To detect and mitigate these network attacks, researchers, academicians, and practitioners developed Intrusion Detection Systems (IDSs) with automatic response systems. The response system is considered an important component of IDS, since without a timely response IDSs may not function properly in countering various attacks, especially on a real-time basis. To respond appropriately, IDSs should select the optimal response option according to the type of network attack. This research study provides a complete survey of IDSs and Intrusion Response Systems (IRSs) on the basis of our in-depth understanding of the response option for different types of network attacks. Knowledge of the path from IDS to IRS can assist network administrators and network staffs in understanding how to tackle different attacks with state-of-the-art technologies.",
"title": ""
},
{
"docid": "3851a77360fb2d6df454c1ee19c59037",
"text": "Plantar fasciitis affects nearly 1 million persons in the United States at any one time. Conservative therapies have been reported to successfully treat 90% of plantar fasciitis cases; however, for the remaining cases, only invasive therapeutic solutions remain. This investigation studied newly emerging technology, low-level laser therapy. From September 2011 to June 2013, 69 subjects were enrolled in a placebo-controlled, randomized, double-blind, multicenter study that evaluated the clinical utility of low-level laser therapy for the treatment of unilateral chronic fasciitis. The volunteer participants were treated twice a week for 3 weeks for a total of 6 treatments and were evaluated at 5 separate time points: before the procedure and at weeks 1, 2, 3, 6, and 8. The pain rating was recorded using a visual analog scale, with 0 representing \"no pain\" and 100 representing \"worst pain.\" Additionally, Doppler ultrasonography was performed on the plantar fascia to measure the fascial thickness before and after treatment. Study participants also completed the Foot Function Index. At the final follow-up visit, the group participants demonstrated a mean improvement in heel pain with a visual analog scale score of 29.6 ± 24.9 compared with the placebo subjects, who reported a mean improvement of 5.4 ± 16.0, a statistically significant difference (p < .001). Although additional studies are warranted, these data have demonstrated that low-level laser therapy is a promising treatment of plantar fasciitis.",
"title": ""
},
{
"docid": "61f434d5c0b693dd779659106ea35cd4",
"text": "Malignant melanoma has one of the most rapidly increasing incidences in the world and has a considerable mortality rate. Early diagnosis is particularly important since melanoma can be cured with prompt excision. Dermoscopy images play an important role in the non-invasive early detection of melanoma [1]. However, melanoma detection using human vision alone can be subjective, inaccurate and poorly reproducible even among experienced dermatologists. This is attributed to the challenges in interpreting images with diverse characteristics including lesions of varying sizes and shapes, lesions that may have fuzzy boundaries, different skin colors and the presence of hair [2]. Therefore, the automatic analysis of dermoscopy images is a valuable aid for clinical decision making and for image-based diagnosis to identify diseases such as melanoma [1-4].",
"title": ""
},
{
"docid": "9faec965b145160ee7f74b80a6c2d291",
"text": "Several skin substitutes are available that can be used in the management of hand burns; some are intended as temporary covers to expedite healing of shallow burns and others are intended to be used in the surgical management of deep burns. An understanding of skin biology and the relative benefits of each product are needed to determine the optimal role of these products in hand burn management.",
"title": ""
},
{
"docid": "f6ae855fbb4dee8f98c55aafae28a762",
"text": "Air pollution has significant influence on the concentration of constituents in the atmosphere leading to effects like global warming and acid rains. To avoid such adverse imbalances in the nature, an air pollution monitoring system is utmost important. This paper attempts to develop an effective solution for pollution monitoring using wireless sensor networks (WSN) on a real time basis namely real time wireless air pollution monitoring system. Commercially available discrete gas sensors for sensing concentration of gases like CO2, NO2, CO and O2 are calibrated using appropriate calibration technologies. These pre-calibrated gas sensors are then integrated with the wireless sensor motes for field deployment at the campus and the Hyderabad city using multi hop data aggregation algorithm. A light weight middleware and a web interface to view the live pollution data in the form of numbers and charts from the test beds was developed and made available from anywhere on the internet. Other parameters like temperature and humidity were also sensed along with gas concentrations to enable data analysis through data fusion techniques. Experimentation carried out using the developed wireless air pollution monitoring system under different physical conditions show that the system collects reliable source of real time fine-grain pollution data.",
"title": ""
},
{
"docid": "b401c0a7209d98aea517cf0e28101689",
"text": "This paper introduces a deep-learning approach to photographic style transfer that handles a large variety of image content while faithfully transferring the reference style. Our approach builds upon the recent work on painterly transfer that separates style from the content of an image by considering different layers of a neural network. However, as is, this approach is not suitable for photorealistic style transfer. Even when both the input and reference images are photographs, the output still exhibits distortions reminiscent of a painting. Our contribution is to constrain the transformation from the input to the output to be locally affine in colorspace, and to express this constraint as a custom fully differentiable energy term. We show that this approach successfully suppresses distortion and yields satisfying photorealistic style transfers in a broad variety of scenarios, including transfer of the time of day, weather, season, and artistic edits.",
"title": ""
},
{
"docid": "5150c2218353b3ce0aeed2230df82c73",
"text": "Myalgic encephalomyelitis/chronic fatigue syndrome (ME/CFS) is a disease characterized by intense and debilitating fatigue not due to physical activity that has persisted for at least 6 months, post-exertional malaise, unrefreshing sleep, and accompanied by a number of secondary symptoms, including sore throat, memory and concentration impairment, headache, and muscle/joint pain. In patients with post-exertional malaise, significant worsening of symptoms occurs following physical exertion and exercise challenge serves as a useful method for identifying biomarkers for exertion intolerance. Evidence suggests that intestinal dysbiosis and systemic responses to gut microorganisms may play a role in the symptomology of ME/CFS. As such, we hypothesized that post-exertion worsening of ME/CFS symptoms could be due to increased bacterial translocation from the intestine into the systemic circulation. To test this hypothesis, we collected symptom reports and blood and stool samples from ten clinically characterized ME/CFS patients and ten matched healthy controls before and 15 minutes, 48 hours, and 72 hours after a maximal exercise challenge. Microbiomes of blood and stool samples were examined. Stool sample microbiomes differed between ME/CFS patients and healthy controls in the abundance of several major bacterial phyla. Following maximal exercise challenge, there was an increase in relative abundance of 6 of the 9 major bacterial phyla/genera in ME/CFS patients from baseline to 72 hours post-exercise compared to only 2 of the 9 phyla/genera in controls (p = 0.005). There was also a significant difference in clearance of specific bacterial phyla from blood following exercise with high levels of bacterial sequences maintained at 72 hours post-exercise in ME/CFS patients versus clearance in the controls. These results provide evidence for a systemic effect of an altered gut microbiome in ME/CFS patients compared to controls. Upon exercise challenge, there were significant changes in the abundance of major bacterial phyla in the gut in ME/CFS patients not observed in healthy controls. In addition, compared to controls clearance of bacteria from the blood was delayed in ME/CFS patients following exercise. These findings suggest a role for an altered gut microbiome and increased bacterial translocation following exercise in ME/CFS patients that may account for the profound post-exertional malaise experienced by ME/CFS patients.",
"title": ""
},
{
"docid": "18153ed3c2141500e0f245e3846df173",
"text": "This paper presents the modeling and simulation of a 25 kV 50 Hz AC traction system using power system block set (PSB) / SIMULINK software package. The three-phase system with substations, track section with rectifier-fed DC locomotives and a detailed traction load are included in the model. The model has been used to study the effect of loading and fault conditions in 25 kV AC traction. The relay characteristic proposed is a combination of two quadrilaterals in the X-R plane. A brief summary of the hardware set-up used to implement and test the relay characteristic using a Texas Instruments TMS320C50 digital signal processor (DSP) has also been presented.",
"title": ""
},
{
"docid": "1690778a3ccfa6d0bf93a848a19e57e3",
"text": "F a l l 1. Frau H., Hausfrau, 45 Jahre. Mutter yon 4 Kindern. Lungentuberkulose I. Grades; Tabes dorsalis. S t a t u s beim Eintr i t t : Kleine Frau yon mittlerem Ernii, hrungszustand. Der Thorax ist schleeht entwickelt; Supraund Infraklavikulargruben sind beiderseits tier eingesunken. Die Briiste sind klein, schlaff und h~ngen herunter. Die Mammillen sind sehr stark entwickelt. I. R i i n t g e n b i l d vom 15. 6. 1921. Dorso-ventrale Aufnahme. Es zeigt uns einen schmalen, schlecht entwickelten Thorax. Die I. C. R. sind auf der 1. Seite schm~ler als r. L i n k s : ])er Hilus zeigt einige kleine Schatten, yon denen aus feine Strange nach oben und nach unten verlaufen. Abw~rts neben dem Herzschatten zieht ein derberer Strang. Auf der V. Rippe vorn, ziemlich genau in der Mitre zwischen Wirbelsi~ule und lateraler Thoraxwand findet sich ein fast kreisAbb. 1. runder Schatten yon 1,1 cm Durchmesser. Der Schatten iiberragt die R/~nder der V. Rippe nicht. Um diesen Schatten herum verl~uft ein ca. 1 mm breiter hellerer ringfSrmiger Streifen, auf den nach aul~en der Rippenschatten folgt. Zwei Querfinger unterhalb dieses kleinen Schattens ist der untere Rand der Mamma deutlich sichtbar. ]:)as H e r z ist nach beiden Seiten verbreitert . R e c h t s : Die Spitze ist leicht abgeschattet, der YIilus ausgepr~gter als 1. Naeh unten ziehen einige feine Str/~nge. Im Schatten der V. Rippe vorn finder sieh wie 1. ungef~hr in dvr Mitre zwischen Wirbelsiiule und lateraler Thoraxwand ein dem linksseitigen Schatten entsprechender vollkommen kreisrunder Fleck mit dem ])urchmesser 1,2 cm, der die Rippenr/s nicht iiberragt. Um ihn herum zieht sich ein hellerer Ring, auf den nach aullen der Rippenschatten folgt. Der untere Rand der r. Mamma ist deutlich. W~hrend der 1. Schatten gleichm~flig erscheint, findet sich im Schatten r. in der Mitte eine etwas hellere Partie (Abb. 1).",
"title": ""
},
{
"docid": "7d11d25dc6cd2822d7f914b11b7fe640",
"text": "The authors analyze three critical components in training word embeddings: model, corpus, and training parameters. They systematize existing neural-network-based word embedding methods and experimentally compare them using the same corpus. They then evaluate each word embedding in three ways: analyzing its semantic properties, using it as a feature for supervised tasks, and using it to initialize neural networks. They also provide several simple guidelines for training good word embeddings.",
"title": ""
},
{
"docid": "d18181640e98086732e5f32682e12127",
"text": "This paper proposes a novel context-aware joint entity and word-level relation extraction approach through semantic composition of words, introducing a Table Filling Multi-Task Recurrent Neural Network (TF-MTRNN) model that reduces the entity recognition and relation classification tasks to a table-filling problem and models their interdependencies. The proposed neural network architecture is capable of modeling multiple relation instances without knowing the corresponding relation arguments in a sentence. The experimental results show that a simple approach of piggybacking candidate entities to model the label dependencies from relations to entities improves performance. We present state-of-the-art results with improvements of 2.0% and 2.7% for entity recognition and relation classification, respectively on CoNLL04 dataset.",
"title": ""
},
{
"docid": "f16d93249254118060ce81b2f92faca5",
"text": "Radiologists are critically interested in promoting best practices in medical imaging, and to that end, they are actively developing tools that will optimize terminology and reporting practices in radiology. The RadLex® vocabulary, developed by the Radiological Society of North America (RSNA), is intended to create a unifying source for the terminology that is used to describe medical imaging. The RSNA Reporting Initiative has developed a library of reporting templates to integrate reusable knowledge, or meaning, into the clinical reporting process. This report presents the initial analysis of the intersection of these two major efforts. From 70 published radiology reporting templates, we extracted the names of 6,489 reporting elements. These terms were reviewed in conjunction with the RadLex vocabulary and classified as an exact match, a partial match, or unmatched. Of 2,509 unique terms, 1,017 terms (41%) matched exactly to RadLex terms, 660 (26%) were partial matches, and 832 reporting terms (33%) were unmatched to RadLex. There is significant overlap between the terms used in the structured reporting templates and RadLex. The unmatched terms were analyzed using the multidimensional scaling (MDS) visualization technique to reveal semantic relationships among them. The co-occurrence analysis with the MDS visualization technique provided a semantic overview of the investigated reporting terms and gave a metric to determine the strength of association among these terms.",
"title": ""
},
{
"docid": "7256d6c5bebac110734275d2f985ab31",
"text": "The location-based social networks (LBSN) enable users to check in their current location and share it with other users. The accumulated check-in data can be employed for the benefit of users by providing personalized recommendations. In this paper, we propose a context-aware location recommendation system for LBSNs using a random walk approach. Our proposed approach considers the current context (i.e., current social relations, personal preferences and current location) of the user to provide personalized recommendations. We build a graph model of LBSNs for performing a random walk approach with restart. Random walk is performed to calculate the recommendation probabilities of the nodes. A list of locations are recommended to users after ordering the nodes according to the estimated probabilities. We compare our algorithm, CLoRW, with popularity-based, friend-based and expert-based baselines, user-based collaborative filtering approach and a similar work in the literature. According to experimental results, our algorithm outperforms these approaches in all of the test cases.",
"title": ""
},
{
"docid": "27195c18451d0e7c7d0ed73bd5af5d44",
"text": "Clustering is a method by which nodes are hierarchically organized on the basis of their relative proximity to one another. Routes can be recorded hierarchically, across clusters, to increase routing flexibility. Hierarchical routing greatly increases the scalability of routing in ad hoc networks by increasing the robustness of routes. This paper presents the Adaptive Routing using Clusters (ARC) protocol, a protocol that creates a cluster hierarchy composed of cluster leaders and gateway nodes to interconnect clusters. ARC introduces a new algorithm for cluster leader revocation that eliminates the ripple effect caused by leadership changes. Further, ARC utilizes a limited broadcast algorithm for reducing the impact of network floods. The performance of ARC is evaluated by comparing it both with other clustering schemes and with an on-demand ad hoc routing protocol. It is shown that the cluster topology created by ARC is more stable than that created by other clustering algorithms and that the use of ARC can result in throughput increases of over 100%. Copyright 2002 John Wiley & Sons, Ltd.",
"title": ""
},
{
"docid": "4795eb084a07f619ebdede2fb6915f71",
"text": "This paper reports on a Gallium Nitride High Electron Mobility Transistor (GaN HEMT) Monolithic Microwave Integrated Circuit (MMIC) high power amplifier (HPA), which features high power and high gain over C-Ku band 115 % relative bandwidth. A C-Ku band (6 ∼ 18 GHz) GaN HEMT MMIC amplifier was manufactured and measured. The circuit dimension is 4.8 mm by 4 mm. The fabricated MMIC HPA derived an averaged output power of 20 W with averaged power gain of 9.6 dB over C-Ku band. The output power is state-of-the-art output power for GaN HEMT MMIC amplifiers with more than 100 % relative bandwidth and up to Ku band operation frequency.",
"title": ""
},
{
"docid": "f827c29bb9dd6073e626b7457775000c",
"text": "Inter vehicular communication is a technology where vehicles act as different nodes to form a network. In a vehicular network different vehicles communicate among each other via wireless access .Authentication is very crucial security service for inter vehicular communication (IVC) in Vehicular Information Network. It is because, protecting vehicles from any attempt to cause damage (misuse) to their private data and the attacks on their privacy. In this survey paper, we investigate the authentication issues for vehicular information network architecture based on the communication principle of named data networking (NDN). This paper surveys the most emerging paradigm of NDN in vehicular information network. So, we aims this survey paper helps to improve content naming, addressing, data aggregation and mobility for IVC in the vehicular information network.",
"title": ""
}
] | scidocsrr |
2aca62beb39f20ebd65fd85820d46ab5 | Does the Directivity of a Virtual Agent's Speech Influence the Perceived Social Presence? | [
{
"docid": "18a985c7960ee6c94f3f8bde503c07ce",
"text": "Computer-controlled, human-like virtual agents (VAs), are often embedded into immersive virtual environments (IVEs) in order to enliven a scene or to assist users. Certain constraints need to be fulfilled, e.g., a collision avoidance strategy allowing users to maintain their personal space. Violating this flexible protective zone causes discomfort in real-world situations and in IVEs. However, no studies on collision avoidance for small-scale IVEs have been conducted yet. Our goal is to close this gap by presenting the results of a controlled user study in a CAVE. 27 participants were immersed in a small-scale office with the task of reaching the office door. Their way was blocked either by a male or female VA, representing their co-worker. The VA showed different behavioral patterns regarding gaze and locomotion. Our results indicate that participants preferred collaborative collision avoidance: they expect the VA to step aside in order to get more space to pass while being willing to adapt their own walking paths.",
"title": ""
}
] | [
{
"docid": "6021388395ddd784422a22d30dac8797",
"text": "Introduction: The European Directive 2013/59/EURATOM requires patient radiation dose information to be included in the medical report of radiological procedures. To provide effective communication to the patient, it is necessary to first assess the patient's level of knowledge regarding medical exposure. The goal of this work is to survey patients’ current knowledge level of both medical exposure to ionizing radiation and professional disciplines and communication means used by patients to garner information. Material and Methods: A questionnaire was designed comprised of thirteen questions: 737 patients participated in the survey. The data were analysed based on population age, education, and number of radiological procedures received in the three years prior to survey. Results: A majority of respondents (56.4%) did not know which modality uses ionizing radiation. 74.7% had never discussed with healthcare professionals the risk concerning their medical radiological procedures. 70.1% were not aware of the professionals that have expertise to discuss the use of ionizing radiation for medical purposes, and 84.7% believe it is important to have the radiation dose information stated in the medical report. Conclusion: Patients agree with new regulations that it is important to know the radiation level related to the medical exposure, but there is little awareness in terms of which modalities use X-Rays and the professionals and channels that can help them to better understand the exposure information. To plan effective communication, it is essential to devise methods and adequate resources for key professionals (medical physicists, radiologists, referring physicians) to convey correct and effective information.",
"title": ""
},
{
"docid": "8e9c75f7971d75ed72b97756356e3c2c",
"text": "We present the results from the third shared task on multimodal machine translation. In this task a source sentence in English is supplemented by an image and participating systems are required to generate a translation for such a sentence into German, French or Czech. The image can be used in addition to (or instead of) the source sentence. This year the task was extended with a third target language (Czech) and a new test set. In addition, a variant of this task was introduced with its own test set where the source sentence is given in multiple languages: English, French and German, and participating systems are required to generate a translation in Czech. Seven teams submitted 45 different systems to the two variants of the task. Compared to last year, the performance of the multimodal submissions improved, but text-only systems remain competitive.",
"title": ""
},
{
"docid": "ffb65e7e1964b9741109c335f37ff607",
"text": "To build a redundant medium-voltage converter, the semiconductors must be able to turn OFF different short circuits. The most challenging one is a hard turn OFF of a diode which is called short-circuit type IV. Without any protection measures this short circuit destroys the high-voltage diode. Therefore, a novel three-level converter with an increased short-circuit inductance is used. In this paper several short-circuit measurements on a 6.5 kV diode are presented which explain the effect of the protection measures. Moreover, the limits of the protection scheme are presented.",
"title": ""
},
{
"docid": "479e962b8ed5d1b8f03280b209c27249",
"text": "A feedforward network is proposed which lends itself to cost-effective implementations in digital hardware and has a fast forward-pass capability. It differs from the conventional model in restricting its synapses to the set {−1, 0, 1} while allowing unrestricted offsets. Simulation results on the ‘onset of diabetes’ data set and a handwritten numeral recognition database indicate that the new network, despite having strong constraints on its synapses, has a generalization performance similar to that of its conventional counterpart. I. Hardware Implementation Ease of hardware implementation is the key feature that distinguishes the feedforward network from competing statistical and machine learning techniques. The most distinctive characteristic of the graph of that network is its homogeneous modularity. Because of its modular architecture, the natural implementation of this network is a parallel one, whether in software or in hardware. The digital, electronic implementation holds considerable interest – the modular architecture of the feedforward network is well matched with VLSI design tools and therefore lends itself to cost-effective mass production. There is, however, a hitch which makes this union between the feedforward network and digital hardware far from ideal: the network parameters (weights) and its internal functions (dot product, activation functions) are inherently analog. It is too much to expect a network trained in an analog (or high-resolution digital) environment to behave satisfactorily when transplanted into typically low-resolution hardware. Use of the digital approximation of a continuous activation function, and/or range-limiting of weights should, in general, lead to an unsatisfactory approximation. The solution to this problem may lie in a bottom-up approach – instead of trying to fit a trained, but inherently analog network in digital hardware, train the network in such a way that it is suitable for direct digital implementation after training. This approach is the basis of the network proposed here. This network, with synapses from {−1, 0, 1} and continuous offsets, can be formed without using a conventional multiplier. This reduction in complexity, plus the fact that all synapses require no more than a single bit each for storage, makes these networks very attractive. It is possible that the severity of the {−1, 0, 1} restric1Offsets are also known as thresholds as well as biases. 2A zero-valued synapse indicates the absence of a synapse! tion may weaken the approximation capability of this network, however our experiments on classification tasks indicate otherwise. Comfort is also provided by a result on approximation in C(R) [4]. That result, the Multiplier-Free Network (MFN) existence theorem, guarantees that networks with input-layer synapses from the set {−1, 1}, no output-layer synapses, unrestricted offsets, and a single hidden layer of neurons requiring only sign adjustment, addition, and hyperbolic tangent activation functions, can approximate all functions of one variable with any desired accuracy. The constraints placed upon the network weights may result in an increase in the necessary number of hidden neurons required to achieve a given degree of accuracy on most learning tasks. It should also be noted that the hardware implementation benefits are valid only when the MFN has been trained, as the learning task still requires high-resolution arithmetic. This makes the MFN unsuitable for in-situ learning. Moreover, high-resolution offsets and activation function are required during training and for the trained network. II. Approximation in C(R) Consider the function f̂ :",
"title": ""
},
{
"docid": "6767096adc28681387c77a68a3468b10",
"text": "This study investigates fifty small and medium enterprises by using a survey approach to find out the key factors that are determinants to EDI adoption. Based upon the existing model, the study uses six factors grouped into three categories, namely organizational, environmental and technological aspects. The findings indicate that factors such as perceived benefits government support and management support are significant determinants of EDI adoption. The remaining factors like organizational culture, motivation to use EDI and task variety remain insignificant. Based upon the analysis of data, recommendations are made.",
"title": ""
},
{
"docid": "1ada0fc6b22bba07d9baf4ccab437671",
"text": "Tree-based path planners have been shown to be well suited to solve various high dimensional motion planning problems. Here we present a variant of the Rapidly-Exploring Random Tree (RRT) path planning algorithm that is able to explore narrow passages or difficult areas more effectively. We show that both workspace obstacle information and C-space information can be used when deciding which direction to grow. The method includes many ways to grow the tree, some taking into account the obstacles in the environment. This planner works best in difficult areas when planning for free flying rigid or articulated robots. Indeed, whereas the standard RRT can face difficulties planning in a narrow passage, the tree based planner presented here works best in these areas",
"title": ""
},
{
"docid": "835309dca26f0c3fc5a750f9957092da",
"text": "Offline training and testing are playing an essential role in design and evaluation of intelligent vehicle vision algorithms. Nevertheless, long-term inconvenience concerning traditional image datasets is that manually collecting and annotating datasets from real scenes lack testing tasks and diverse environmental conditions. For that virtual datasets can make up for these regrets. In this paper, we propose to construct artificial scenes for evaluating the visual intelligence of intelligent vehicles and generate a new virtual dataset called “ParallelEye-CS”. First of all, the actual track map data is used to build 3D scene model of Chinese Flagship Intelligent Vehicle Proving Center Area, Changshu. Then, the computer graphics and virtual reality technologies are utilized to simulate the virtual testing tasks according to the Chinese Intelligent Vehicles Future Challenge (IVFC) tasks. Furthermore, the Unity3D platform is used to generate accurate ground-truth labels and change environmental conditions. As a result, we present a viable implementation method for constructing artificial scenes for traffic vision research. The experimental results show that our method is able to generate photorealistic virtual datasets with diverse testing tasks.",
"title": ""
},
{
"docid": "7ba4375393aac729b8f549c1e4109ec2",
"text": "Due to their capacity-achieving property, polar codes have become one of the most attractive channel codes. To date, the successive-cancellation list (SCL) decoding algorithm is the primary approach that can guarantee outstanding error-correcting performance of polar codes. However, the hardware designs of the original SCL decoder have a large silicon area and a long decoding latency. Although some recent efforts can reduce either the area or latency of SCL decoders, these two metrics still cannot be optimized at the same time. This brief, for the first time, proposes a general log-likelihood-ratio (LLR) based SCL decoding algorithm with multibit decision. This new algorithm, referred to as LLR - 2K b-SCL, can determine 2K bits simultaneously for arbitrary K with the use of LLR messages. In addition, a reduced-data-width scheme is presented to reduce the critical path of the sorting block. Then, based on the proposed algorithm, a VLSI architecture of the new SCL decoder is developed. Synthesis results show that, for an example (1024, 512) polar code with list size 4, the proposed LLR - 2K b - SCL decoders achieve a significant reduction in both area and latency as compared to prior works. As a result, the hardware efficiencies of the proposed designs with K = 2 and 3 are 2.33 times and 3.32 times of that of the state-of-the-art works, respectively.",
"title": ""
},
{
"docid": "25c25864ac5584b99aacbda88bda6203",
"text": "Our goal is to be able to build a generative model from a deep neural network architecture to try to create music that has both harmony and melody and is passable as music composed by humans. Previous work in music generation has mainly been focused on creating a single melody. More recent work on polyphonic music modeling, centered around time series probability density estimation, has met some partial success. In particular, there has been a lot of work based off of Recurrent Neural Networks combined with Restricted Boltzmann Machines (RNNRBM) and other similar recurrent energy based models. Our approach, however, is to perform end-to-end learning and generation with deep neural nets alone.",
"title": ""
},
{
"docid": "ac8cef535e5038231cdad324325eaa37",
"text": "There are mainly two types of Emergent Self-Organizing Maps (ESOM) grid structures in use: hexgrid (honeycomb like) and quadgrid (trellis like) maps. In addition to that, the shape of the maps may be square or rectangular. This work investigates the effects of these different map layouts. Hexgrids were found to have no convincing advantage over quadgrids. Rectangular maps, however, are distinctively superior to square maps. Most surprisingly, rectangular maps outperform square maps for isotropic data, i.e. data sets with no particular primary direction.",
"title": ""
},
{
"docid": "38024169edcf1272efc7013b68d1c5cb",
"text": "Fractal dimension measures the geometrical complexity of images. Lacunarity being a measure of spatial heterogeneity can be used to differentiate between images that have similar fractal dimensions but different appearances. This paper presents a method to combine fractal dimension (FD) and lacunarity for better texture recognition. For the estimation of the fractal dimension an improved algorithm is presented. This algorithm uses new box-counting measure based on the statistical distribution of the gray levels of the ‘‘boxes’’. Also for the lacunarity estimation, new and faster gliding-box method is proposed, which utilizes summed area tables and Levenberg–Marquardt method. Methods are tested using Brodatz texture database (complete set), a subset of the Oulu rotation invariant texture database (Brodatz subset), and UIUC texture database (partial). Results from the tests showed that combining fractal dimension and lacunarity can improve recognition of textures. & 2011 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "779280c897c09ce0017dfc7848f803b7",
"text": "With increasing storage capacities on current PCs, searching the World Wide Web has ironically become more efficient than searching one’s own personal computer. The recently introduced desktop search engines are a first step towards coping with this problem, but not yet a satisfying solution. The reason for that is that desktop search is actually quite different from its web counterpart. Documents on the desktop are not linked to each other in a way comparable to the web, which means that result ranking is poor or even inexistent, because algorithms like PageRank cannot be used for desktop search. On the other hand, desktop search could potentially profit from a lot of implicit and explicit semantic information available in emails, folder hierarchies, browser cache contexts and others. This paper investigates how to extract and store these activity based context information explicitly as RDF metadata and how to use them, as well as additional background information and ontologies, to enhance desktop search.",
"title": ""
},
{
"docid": "347e7b80b2b0b5cd5f0736d62fa022ae",
"text": "This article presents the results of an interview study on how people perceive and play social network games on Facebook. During recent years, social games have become the biggest genre of games if measured by the number of registered users. These games are designed to cater for large audiences in their design principles and values, a free-to-play revenue model and social network integration that make them easily approachable and playable with friends. Although these games have made the headlines and have been seen to revolutionize the game industry, we still lack an understanding of how people perceive and play them. For this article, we interviewed 18 Finnish Facebook users from a larger questionnaire respondent pool of 134 people. This study focuses on a user-centric approach, highlighting the emergent experiences and the meaning-making of social games players. Our findings reveal that social games are usually regarded as single player games with a social twist, and as suffering partly from their design characteristics, while still providing a wide spectrum of playful experiences for different needs. The free-to-play revenue model provides an easy access to social games, but people disagreed with paying for additional content for several reasons.",
"title": ""
},
{
"docid": "c2845a8a4f6c2467c7cd3a1a95a0ca37",
"text": "In this report I introduce ReSuMe a new supervised learning method for Spiking Neural Networks. The research on ReSuMe has been primarily motivated by the need of inventing an efficient learni ng method for control of movement for the physically disabled. Howeve r, thorough analysis of the ReSuMe method reveals its suitability not on ly to the task of movement control, but also to other real-life applicatio ns including modeling, identification and control of diverse non-statio nary, nonlinear objects. ReSuMe integrates the idea of learning windows, known from t he spikebased Hebbian rules, with a novel concept of remote supervis ion. General overview of the method, the basic definitions, the netwo rk architecture and the details of the learning algorithm are presented . The properties of ReSuMe such as locality, computational simplicity a nd the online processing suitability are discussed. ReSuMe learning abi lities are illustrated in a verification experiment.",
"title": ""
},
{
"docid": "9a75902f8e91aaabaca6e235a91c33f3",
"text": "This article presents and discusses the implementation of a direct volume rendering system for the Web, which articulates a large portion of the rendering task in the client machine. By placing the rendering emphasis in the local client, our system takes advantage of its power, while at the same time eliminates processing from unreliable bottlenecks (e.g. network). The system developed articulates in efficient manner the capabilities of the recently released WebGL standard, which makes available the accelerated graphic pipeline (formerly unusable). The dependency on specially customized hardware is eliminated, and yet efficient rendering rates are achieved. The Web increasingly competes against desktop applications in many scenarios, but the graphical demands of some of the applications (e.g. interactive scientific visualization by volume rendering), have impeded their successful settlement in Web scenarios. Performance, scalability, accuracy, security are some of the many challenges that must be solved before visual Web applications popularize. In this publication we discuss both performance and scalability of the volume rendering by WebGL ray-casting in two different but challenging application domains: medical imaging and radar meteorology.",
"title": ""
},
{
"docid": "a4fb1919a1bf92608a55bc3feedf897d",
"text": "We develop an algebraic framework, Logic Programming Doctrines, for the syntax, proof theory, operational semantics and model theory of Horn Clause logic programming based on indexed premonoidal categories. Our aim is to provide a uniform framework for logic programming and its extensions capable of incorporating constraints, abstract data types, features imported from other programming language paradigms and a mathematical description of the state space in a declarative manner. We define a new way to embed information about data into logic programming derivations by building a sketch-like description of data structures directly into an indexed category of proofs. We give an algebraic axiomatization of bottom-up semantics in this general setting, describing categorical models as fixed points of a continuous operator. © 2009 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "dc81f63623020220eba19f4f6ae545e0",
"text": "In this paper, a new technique for human identification task based on heart sound signals has been proposed. It utilizes a feature level fusion technique based on canonical correlation analysis. For this purpose a robust pre-processing scheme based on the wavelet analysis of the heart sounds is introduced. Then, three feature vectors are extracted depending on the cepstral coefficients of different frequency scale representation of the heart sound namely; the mel, bark, and linear scales. Among the investigated feature extraction methods, experimental results show that the mel-scale is the best with 94.4% correct identification rate. Using a hybrid technique combining MFCC and DWT, a new feature vector is extracted improving the system's performance up to 95.12%. Finally, canonical correlation analysis is applied for feature fusion. This improves the performance of the proposed system up to 99.5%. The experimental results show significant improvements in the performance of the proposed system over methods adopting single feature extraction.",
"title": ""
},
{
"docid": "e5c625ceaf78c66c2bfb9562970c09ec",
"text": "A continuing question in neural net research is the size of network needed to solve a particular problem. If training is started with too small a network for the problem no learning can occur. The researcher must then go through a slow process of deciding that no learning is taking place, increasing the size of the network and training again. If a network that is larger than required is used, then processing is slowed, particularly on a conventional von Neumann computer. An approach to this problem is discussed that is based on learning with a net which is larger than the minimum size network required to solve the problem and then pruning the solution network. The result is a small, efficient network that performs as well or better than the original which does not give a complete answer to the question, since the size of the initial network is still largely based on guesswork but it gives a very useful partial answer and sheds some light on the workings of a neural network in the process.<<ETX>>",
"title": ""
},
{
"docid": "bf15c81fc0cdf463dd2ef81f54f097f8",
"text": "We present an approach to multi-target tracking that has expressive potential beyond the capabilities of chain-shaped hidden Markov models, yet has significantly reduced complexity. Our framework, which we call tracking-by-selection, is similar to tracking-by-detection in that it separates the tasks of detection and tracking, but it shifts temporal reasoning from the tracking stage to the detection stage. The core feature of tracking-by-selection is that it reasons about path hypotheses that traverse the entire video instead of a chain of single-frame object hypotheses. A traditional chain-shaped tracking-by-detection model is only able to promote consistency between one frame and the next. In tracking-by-selection, path hypotheses exist across time, and encouraging long-term temporal consistency is as simple as rewarding path hypotheses with consistent image features. One additional advantage of tracking-by-selection is that it results in a dramatically simplified model that can be solved exactly. We adapt an existing tracking-by-detection model to the tracking-by-selection framework, and show improved performance on a challenging dataset.",
"title": ""
}
] | scidocsrr |
5393c145478fcbcd27ed2558db779cf2 | Low-profile fully integrated 60 GHz 18 element phased array on multilayer liquid crystal polymer flip chip package | [
{
"docid": "c01e3b06294f9e84bcc9d493990c6149",
"text": "An integrated CMOS 60 GHz phased-array antenna module supporting symmetrical 32 TX/RX elements for wireless docking is described. Bidirectional architecture with shared blocks, mm-wave TR switch design with less than 1dB TX loss, and a full built in self test (BIST) circuits with 5deg and +/-1dB measurement accuracy of phase and power are presented. The RFIC size is 29mm2, consuming 1.2W/0.85W at TX and RX with a 29dBm EIRP at -19dB EVM and 10dB NF.",
"title": ""
}
] | [
{
"docid": "9d7a441731e9d0c62dd452ccb3d19f7b",
"text": " In many countries, especially in under developed and developing countries proper health care service is a major concern. The health centers are far and even the medical personnel are deficient when compared to the requirement of the people. For this reason, health services for people who are unhealthy and need health monitoring on regular basis is like impossible. This makes the health monitoring of healthy people left far more behind. In order for citizens not to be deprived of the primary care it is always desirable to implement some system to solve this issue. The application of Internet of Things (IoT) is wide and has been implemented in various areas like security, intelligent transport system, smart cities, smart factories and health. This paper focuses on the application of IoT in health care system and proposes a novel architecture of making use of an IoT concept under fog computing. The proposed architecture can be used to acknowledge the underlying problem of deficient clinic-centric health system and change it to smart patientcentric health system.",
"title": ""
},
{
"docid": "ddf18acc13f1f04e6b992665fd0104df",
"text": "ABSTRACT The problem of ensuring e cient storage and fast retrieval for multi-version structured documents is important because of the recent popularity of XML documents and semistructured information on the web. Traditional document version control systems, e.g. RCS, which model documents as a sequence of lines of text and use the shortest edit script to represent version di erences are inadequate since they do not preserve the logical structure of the original document. Instead we propose a new approach where the structure of the document is preserved intact, and their sub-objects are timestamped hierarchically for e cient reconstruction of current and past versions. Our technique, called the Usefulness Based Copy Control (UBCC), is geared towards efcient version reconstruction while using small space overhead. Our analysis and experiments illustrate the e ectiveness of the overall approach to version control for structured documents.",
"title": ""
},
{
"docid": "ad4d38ee8089a67353586abad319038f",
"text": "State-of-the-art systems of Chinese Named Entity Recognition (CNER) require large amounts of hand-crafted features and domainspecific knowledge to achieve high performance. In this paper, we apply a bidirectional LSTM-CRF neural network that utilizes both characterlevel and radical-level representations. We are the first to use characterbased BLSTM-CRF neural architecture for CNER. By contrasting the results of different variants of LSTM blocks, we find the most suitable LSTM block for CNER. We are also the first to investigate Chinese radical-level representations in BLSTM-CRF architecture and get better performance without carefully designed features. We evaluate our system on the third SIGHAN Bakeoff MSRA data set for simplfied CNER task and achieve state-of-the-art performance 90.95% F1.",
"title": ""
},
{
"docid": "1b53378e33f24f59eb0486f2978bebee",
"text": "The advances in location-acquisition and mobile computing techniques have generated massive spatial trajectory data, which represent the mobility of a diversity of moving objects, such as people, vehicles, and animals. Many techniques have been proposed for processing, managing, and mining trajectory data in the past decade, fostering a broad range of applications. In this article, we conduct a systematic survey on the major research into trajectory data mining, providing a panorama of the field as well as the scope of its research topics. Following a road map from the derivation of trajectory data, to trajectory data preprocessing, to trajectory data management, and to a variety of mining tasks (such as trajectory pattern mining, outlier detection, and trajectory classification), the survey explores the connections, correlations, and differences among these existing techniques. This survey also introduces the methods that transform trajectories into other data formats, such as graphs, matrices, and tensors, to which more data mining and machine learning techniques can be applied. Finally, some public trajectory datasets are presented. This survey can help shape the field of trajectory data mining, providing a quick understanding of this field to the community.",
"title": ""
},
{
"docid": "b0a1a782ce2cbf5f152a52537a1db63d",
"text": "In piezoelectric energy harvesting (PEH), with the use of the nonlinear technique named synchronized switching harvesting on inductor (SSHI), the harvesting efficiency can be greatly enhanced. Furthermore, the introduction of its self-powered feature makes this technique more applicable for standalone systems. In this article, a modified circuitry and an improved analysis for self-powered SSHI are proposed. With the modified circuitry, direct peak detection and better isolation among different units within the circuit can be achieved, both of which result in further removal on dissipative components. In the improved analysis, details in open circuit voltage, switching phase lag, and voltage inversion factor are discussed, all of which lead to a better understanding to the working principle of the self-powered SSHI. Both analyses and experiments show that, in terms of harvesting power, the higher the excitation level, the closer between self-powered and ideal SSHI; at the same time, the more beneficial the adoption of self-powered SSHI treatment in piezoelectric energy harvesting, compared to the standard energy harvesting (SEH) technique.",
"title": ""
},
{
"docid": "3b638c51c7884b63f541ccd44fbaa86d",
"text": "We tried to develop a real time face detection and recognition system which uses an “appearance-based” approach. For detection purpose we used Viola Jones algorithm. To recognize face we worked with Eigen Faces which is a PCA based algorithm. In a real time to recognize a face we need a data training set. For data training set we took five images of each person and manipulated the Eigen values to match the known individual.",
"title": ""
},
{
"docid": "57c81eb0f559ea1c10747b5ecae14c67",
"text": "OBJECTIVE\nAutism spectrum disorder (ASD) is associated with amplified emotional responses and poor emotional control, but little is known about the underlying mechanisms. This article provides a conceptual and methodologic framework for understanding compromised emotion regulation (ER) in ASD.\n\n\nMETHOD\nAfter defining ER and related constructs, methods to study ER were reviewed with special consideration on how to apply these approaches to ASD. Against the backdrop of cognitive characteristics in ASD and existing ER theories, available research was examined to identify likely contributors to emotional dysregulation in ASD.\n\n\nRESULTS\nLittle is currently known about ER in youth with ASD. Some mechanisms that contribute to poor ER in ASD may be shared with other clinical populations (e.g., physiologic arousal, degree of negative and positive affect, alterations in the amygdala and prefrontal cortex), whereas other mechanisms may be more unique to ASD (e.g., differences in information processing/perception, cognitive factors [e.g., rigidity], less goal-directed behavior and more disorganized emotion in ASD).\n\n\nCONCLUSIONS\nAlthough assignment of concomitant psychiatric diagnoses is warranted in some cases, poor ER may be inherent in ASD and may provide a more parsimonious conceptualization for the many associated socioemotional and behavioral problems in this population. Further study of ER in youth with ASD may identify meaningful subgroups of patients and lead to more effective individualized treatments.",
"title": ""
},
{
"docid": "a6b02e927784468398442d7c4586aa92",
"text": "for concrete cause-effect",
"title": ""
},
{
"docid": "bb5ce42707f086d4ca2c6a5d23587070",
"text": "Supervoxel methods such as Simple Linear Iterative Clustering (SLIC) are an effective technique for partitioning an image or volume into locally similar regions, and are a common building block for the development of detection, segmentation and analysis methods. We introduce maskSLIC an extension of SLIC to create supervoxels within regions-of-interest, and demonstrate, on examples from 2-dimensions to 4-dimensions, that maskSLIC overcomes issues that affect SLIC within an irregular mask. We highlight the benefits of this method through examples, and show that it is able to better represent underlying tumour subregions and achieves significantly better results than SLIC on the BRATS 2013 brain tumour challenge data (p=0.001) – outperforming SLIC on 18/20 scans. Finally, we show an application of this method for the analysis of functional tumour subregions and demonstrate that it is more effective than voxel clustering.",
"title": ""
},
{
"docid": "8199c3589d5697ce2f3e19188e49c1a0",
"text": "The aim of this study was to compare 2 models of resistance training (RT) programs, nonperiodized (NP) training and daily nonlinear periodized (DNLP) training, on strength, power, and flexibility in untrained adolescents. Thirty-eight untrained male adolescents were randomly assigned to 1 of 3 groups: a control group, NP RT program, and DNLP program. The subjects were tested pretraining and after 4, 8, and 12 weeks for 1 repetition maximum (1RM) resistances in the bench press and 45° leg press, sit and reach test, countermovement vertical jump (CMVJ), and standing long jump (SLJ). Both training groups performed the same sequence of exercises 3 times a week for a total of 36 sessions. The NP RT consisted of 3 sets of 10-12RM throughout the training period. The DNLP training consisted of 3 sets using different training intensities for each of the 3 training sessions per week. The total volume of the training programs was not significantly different. Both the NP and DNLP groups exhibited a significant increase in the 1RM for the bench press and 45° leg press posttraining compared with that pretraining, but there were no significant differences between groups (p ≤ 0.05). The DNLP group's 1RM changes showed greater percentage improvements and effect sizes. Training intensity for the bench press and 45° leg press did not significantly change during the training. In the CMVJ and SLJ tests, NP and DNLP training showed no significant change. The DNLP group showed a significant increase in the sit and reach test after 8 and 12 weeks of training compared with pretraining; this did not occur with NP training. In summary, in untrained adolescents during a 12-week training period, a DNLP program can be used to elicit similar and possible superior maximal strength and flexibility gains compared with an NP multiset training model.",
"title": ""
},
{
"docid": "9ff522e9874c924636f9daba90f9881a",
"text": "Time management is required in simulations to ensure temporal aspects of the system under investigation are correctly reproduced by the simulation model. This paper describes the time management services that have been defined in the High Level Architecture. The need for time management services is discussed, as well as design rationales that lead to the current definition of the HLA time management services. These services are described, highlighting information that must flow between federates and the Runtime Infrastructure (RTI) software in order to efficiently implement time management algorithms.",
"title": ""
},
{
"docid": "84307c2dd94ebe89c46a535b31b4b51b",
"text": "Building systems that autonomously create temporal abstractions from data is a key challenge in scaling learning and planning in reinforcement learning. One popular approach for addressing this challenge is the options framework [41]. However, only recently in [1] was a policy gradient theorem derived for online learning of general purpose options in an end to end fashion. In this work, we extend previous work on this topic that only focuses on learning a two-level hierarchy including options and primitive actions to enable learning simultaneously at multiple resolutions in time. We achieve this by considering an arbitrarily deep hierarchy of options where high level temporally extended options are composed of lower level options with finer resolutions in time. We extend results from [1] and derive policy gradient theorems for a deep hierarchy of options. Our proposed hierarchical option-critic architecture is capable of learning internal policies, termination conditions, and hierarchical compositions over options without the need for any intrinsic rewards or subgoals. Our empirical results in both discrete and continuous environments demonstrate the efficiency of our framework.",
"title": ""
},
{
"docid": "d62b3a328257253bcb41bf0fbdeb9242",
"text": "Logging has been a common practice for monitoring and diagnosing performance issues. However, logging comes at a cost, especially for large-scale online service systems. First, the overhead incurred by intensive logging is non-negligible. Second, it is costly to diagnose a performance issue if there are a tremendous amount of redundant logs. Therefore, we believe that it is important to limit the overhead incurred by logging, without sacrificing the logging effectiveness. In this paper we propose Log2, a cost-aware logging mechanism. Given a “budget” (defined as the maximum volume of logs allowed to be output in a time interval), Log2 makes the “whether to log” decision through a two-phase filtering mechanism. In the first phase, a large number of irrelevant logs are discarded efficiently. In the second phase, useful logs are cached and output while complying with logging budget. In this way, Log2 keeps the useful logs and discards the less useful ones. We have implemented Log2 and evaluated it on an open source system as well as a real-world online service system from Microsoft. The experimental results show that Log2 can control logging overhead while preserving logging effectiveness.",
"title": ""
},
{
"docid": "67a8a8ef9111edd9c1fa88e7c59b6063",
"text": "The process of obtaining intravenous (IV) access, Venipuncture, is an everyday invasive procedure in medical settings and there are more than one billion venipuncture related procedures like blood draws, peripheral catheter insertions, intravenous therapies, etc. performed per year [3]. Excessive venipunctures are both time and resource consuming events causing anxiety, pain and distress in patients, or can lead to severe harmful injuries [8]. The major problem faced by the doctors today is difficulty in accessing veins for intra-venous drug delivery & other medical situations [3]. There is a need to develop vein detection devices which can clearly show veins. This project deals with the design development of non-invasive subcutaneous vein detection system and is implemented based on near infrared imaging and interfaced to a laptop to make it portable. A customized CCD camera is used for capturing the vein images and Computer Software modules (MATLAB & LabVIEW) is used for the processing [3].",
"title": ""
},
{
"docid": "2e5d9f5ae2f631357d8a6ef22cd52b62",
"text": "Necrobiosis lipoidica is a rare disorder that usually appears in the lower extremities and it is often related to diabetes mellitus. There are few reported cases of necrobiosis lipoidica in children. We present an interesting case in that the patient developed lesions on the abdomen, which is an unusual location.",
"title": ""
},
{
"docid": "f17bd8e3c7e26fa64fb6d650f2ccb9d6",
"text": "Human-robot collaborative work has the potential to advance quality, efficiency and safety in manufacturing. In this paper we present a gestural communication lexicon for human-robot collaboration in industrial assembly tasks and establish methodology for producing such a lexicon. Our user experiments are grounded in a study of industry needs, providing potential real-world applicability to our results. Actions required for industrial assembly tasks are abstracted into three classes: part acquisition, part manipulation, and part operations. We analyzed the communication between human pairs performing these subtasks and derived a set of communication terms and gestures. We found that participant-provided gestures are intuitive and well suited to robotic implementation, but that interpretation is highly dependent on task context. We then implemented these gestures on a robot arm in a human-robot interaction context, and found the gestures to be easily interpreted by observers. We found that observation of human-human interaction can be effective in determining what should be communicated in a given human-robot task, how communication gestures should be executed, and priorities for robotic system implementation based on frequency of use.",
"title": ""
},
{
"docid": "cd338aee8e141212a1548431766df498",
"text": "In recent years, contextual models that exploit maps have been shown to be very effective for many recognition and localization tasks. In this paper we propose to exploit aerial images in order to enhance freely available world maps. Towards this goal, we make use of OpenStreetMap and formulate the problem as the one of inference in a Markov random field parameterized in terms of the location of the road-segment centerlines as well as their width. This parameterization enables very efficient inference and returns only topologically correct roads. In particular, we can segment all OSM roads in the whole world in a single day using a small cluster of 10 computers. Importantly, our approach generalizes very well, it can be trained using only 1.5 km2 aerial imagery and produce very accurate results in any location across the globe. We demonstrate the effectiveness of our approach outperforming the state-of-the-art in two new benchmarks that we collect. We then show how our enhanced maps are beneficial for semantic segmentation of ground images.",
"title": ""
},
{
"docid": "6b2e9b890029ced15f4f9a00a7a7be81",
"text": "Android belongs to the leading operating systems for mobile devices, e.g. smartphones or tablets. The availability of Android's source code under general public license allows interesting developments and useful modifications of the platform for third parties, like the integration of real-time support. This paper presents an extension of Android improving its real-time capabilities, without loss of original Android functionality and compatibility to existing applications. In our approach we apply the RT_PREEMPT patch to the Linux kernel, modify essential Android components like the Dalvik virtual machine and introduce a new real-time interface for Android developers. The resulting Android system supports applications with real-time requirements, which can be implemented in the same way as non-real-time applications.",
"title": ""
},
{
"docid": "19c3b504c0afc170720e9f0a9180a23b",
"text": "The global telephone network is relied upon by billions every day. Central to its operation is the Signaling System 7 (SS7) protocol, which is used for setting up calls, managing mobility, and facilitating many other network services. This protocol was originally built on the assumption that only a small number of trusted parties would be able to directly communicate with its core infrastructure. As a result, SS7 — as a feature — allows all parties with core access to redirect and intercept calls for any subscriber anywhere in the world. Unfortunately, increased interconnectivity with the SS7 network has led to a growing number of illicit call redirection attacks. We address such attacks with Sonar, a system that detects the presence of SS7 redirection attacks by securely measuring call audio round-trip times between telephony devices. This approach works because redirection attacks force calls to travel longer physical distances than usual, thereby creating longer end-to-end delay. We design and implement a distance bounding-inspired protocol that allows us to securely characterize the round-trip time between the two endpoints. We then use custom hardware deployed in 10 locations across the United States and a redirection testbed to characterize how distance affects round trip time in phone networks. We develop a model using this testbed and show Sonar is able to detect 70.9% of redirected calls between call endpoints of varying attacker proximity (300–7100 miles) with low false positive rates (0.3%). Finally, we ethically perform actual SS7 redirection attacks on our own devices with the help of an industry partner to demonstrate that Sonar detects 100% of such redirections in a real network (with no false positives). As such, we demonstrate that telephone users can reliably detect SS7 redirection attacks and protect the integrity of their calls.",
"title": ""
}
] | scidocsrr |
a5c96ee7a17e998288e8735bc7bcc63f | Human-Intent Detection and Physically Interactive Control of a Robot Without Force Sensors | [
{
"docid": "56316a77e260d8122c4812d684f4d223",
"text": "Manipulation fundamentally requires a manipulator to be mechanically coupled to the object being manipulated. A consideration of the physical constraints imposed by dynamic interaction shows that control of a vector quantity such as position or force is inadequate and that control of the manipulator impedance is also necessary. Techniques for control of manipulator behaviour are presented which result in a unified approach to kinematically constrained motion, dynamic interaction, target acquisition and obstacle avoidance.",
"title": ""
},
{
"docid": "9b1d9cc24177c040d165bdf1fee1459e",
"text": "This paper addresses the field of humanoid and personal robotics—its objectives, motivations, and technical problems. The approach described in the paper is based on the analysis of humanoid and personal robots as an evolution from industrial to advanced and service robotics driven by the need for helpful machines, as well as a synthesis of the dream of replicating humans. The first part of the paper describes the development of anthropomorphic components for humanoid robots, with particular regard to anthropomorphic sensors for vision and touch, an eight-d.o.f. arm, a three-fingered hand with sensorized fingertips, and control schemes for grasping. Then, the authors propose a user-oriented designmethodology for personal robots, anddescribe their experience in the design, development, and validation of a real personal robot composed of a mobile unit integrating some of the anthropomorphic components introduced previously and aimed at operating in a distributedworking environment. Based on the analysis of experimental results, the authors conclude that humanoid robotics is a tremendous and attractive technical and scientific challenge for robotics research. The real utility of humanoids has still to be demonstrated, but personal assistance can be envisaged as a promising application domain. Personal robotics also poses difficult technical problems, especially related to the need for achieving adequate safety, proper human–robot interaction, useful performance, and affordable cost. When these problems are solved, personal robots will have an excellent chance for significant application opportunities, especially if integrated into future home automation systems, and if supported by the availability of humanoid robots. © 2001 John Wiley & Sons, Inc.",
"title": ""
}
] | [
{
"docid": "4c48aa985223ae9317c5f73361b5e7a3",
"text": "Low-dropout voltage regulators (LDOs) have been extensively used on-chip to supply voltage for various circuit blocks. Digital LDOs (DLDO) have recently attracted circuit designers for their low voltage operating capability and load current scalability. Existing DLDO techniques suffer from either poor transient performance due to slow digital control loop or poor DC load regulation due to low loop gain. A dual-loop architecture to improve the DC load regulation and transient performance is proposed in this work. The proposed regulator uses a fast control loop for improved transient response and an analog assisted dynamic reference correction loop for an improved DC load regulation. The design achieved a DC load regulation of 0.005mV/mA and a settling time of 139ns while regulating loads up to 200mA. The proposed DLDO is designed in 28nm FD-SOI technology with a 0.027mm2 active area.",
"title": ""
},
{
"docid": "b252aea38a537a22ab34fdf44e9443d2",
"text": "The objective of this study is to describe the case of a patient presenting advanced epidermoid carcinoma of the penis associated to myiasis. A 41-year-old patient presenting with a necrotic lesion of the distal third of the penis infested with myiasis was attended in the emergency room of our hospital and was submitted to an urgent penectomy. This is the first case of penile cancer associated to myiasis described in the literature. This case reinforces the need for educative campaigns to reduce the incidence of this disease in developing countries.",
"title": ""
},
{
"docid": "8c3ecd27a695fef2d009bbf627820a0d",
"text": "This paper presents a novel attention mechanism to improve stereo-vision based object recognition systems in terms of recognition performance and computational efficiency at the same time. We utilize the Stixel World, a compact medium-level 3D representation of the local environment, as an early focus-of-attention stage for subsequent system modules. In particular, the search space of computationally expensive pattern classifiers is significantly narrowed down. We explicitly couple the 3D Stixel representation with prior knowledge about the object class of interest, i.e. 3D geometry and symmetry, to precisely focus processing on well-defined local regions that are consistent with the environment model. Experiments are conducted on large real-world datasets captured from a moving vehicle in urban traffic. In case of vehicle recognition as an experimental testbed, we demonstrate that the proposed Stixel-based attention mechanism significantly reduces false positive rates at constant sensitivity levels by up to a factor of 8 over state-of-the-art. At the same time, computational costs are reduced by more than an order of magnitude.",
"title": ""
},
{
"docid": "d166f4cd01d22d7143487b691138023c",
"text": "Although Bitcoin is often perceived to be an anonymous currency, research has shown that a user’s Bitcoin transactions can be linked to compromise the user’s anonymity. We present solutions to the anonymity problem for both transactions on Bitcoin’s blockchain and off the blockchain (in so called micropayment channel networks). We use an untrusted third party to issue anonymous vouchers which users redeem for Bitcoin. Blind signatures and Bitcoin transaction contracts (aka smart contracts) ensure the anonymity and fairness during the bitcoin ↔ voucher exchange. Our schemes are practical, secure and anonymous.",
"title": ""
},
{
"docid": "2bd8a66a3e3cfafc9b13fd7ec47e86fc",
"text": "Psidium guajava Linn. (Guava) is used not only as food but also as folk medicine in subtropical areas around the world because of its pharmacologic activities. In particular, the leaf extract of guava has traditionally been used for the treatment of diabetes in East Asia and other countries. Many pharmacological studies have demonstrated the ability of this plant to exhibit antioxidant, hepatoprotective, anti-allergy, antimicrobial, antigenotoxic, antiplasmodial, cytotoxic, antispasmodic, cardioactive, anticough, antidiabetic, antiinflamatory and antinociceptive activities, supporting its traditional uses. Suggesting a wide range of clinical applications for the treatment of infantile rotaviral enteritis, diarrhoea and diabetes.",
"title": ""
},
{
"docid": "41aa05455471ecd660599f4ec285ff29",
"text": "The recent progress of human parsing techniques has been largely driven by the availability of rich data resources. In this work, we demonstrate some critical discrepancies between the current benchmark datasets and the real world human parsing scenarios. For instance, all the human parsing datasets only contain one person per image, while usually multiple persons appear simultaneously in a realistic scene. It is more practically demanded to simultaneously parse multiple persons, which presents a greater challenge to modern human parsing methods. Unfortunately, absence of relevant data resources severely impedes the development of multiple-human parsing methods. To facilitate future human parsing research, we introduce the Multiple-Human Parsing (MHP) dataset, which contains multiple persons in a real world scene per single image. The MHP dataset contains various numbers of persons (from 2 to 16) per image with 18 semantic classes for each parsing annotation. Persons appearing in the MHP images present sufficient variations in pose, occlusion and interaction. To tackle the multiple-human parsing problem, we also propose a novel Multiple-Human Parser (MH-Parser), which considers both the global context and local cues for each person in the parsing process. The model is demonstrated to outperform the naive “detect-and-parse” approach by a large margin, which will serve as a solid baseline and help drive the future research in real world human parsing.",
"title": ""
},
{
"docid": "6154efdd165c7323c1ba9ec48e63cfc6",
"text": "A RANSAC based procedure is described for detecting inliers corresponding to multiple models in a given set of data points. The algorithm we present in this paper (called multiRANSAC) on average performs better than traditional approaches based on the sequential application of a standard RANSAC algorithm followed by the removal of the detected set of inliers. We illustrate the effectiveness of our approach on a synthetic example and apply it to the problem of identifying multiple world planes in pairs of images containing dominant planar structures.",
"title": ""
},
{
"docid": "b27224825bb28b9b8d0eea37f8900d42",
"text": "The use of Convolutional Neural Networks (CNN) in natural im age classification systems has produced very impressive results. Combined wit h the inherent nature of medical images that make them ideal for deep-learning, fu rther application of such systems to medical image classification holds much prom ise. However, the usefulness and potential impact of such a system can be compl etely negated if it does not reach a target accuracy. In this paper, we present a s tudy on determining the optimum size of the training data set necessary to achiev e igh classification accuracy with low variance in medical image classification s ystems. The CNN was applied to classify axial Computed Tomography (CT) imag es into six anatomical classes. We trained the CNN using six different sizes of training data set ( 5, 10, 20, 50, 100, and200) and then tested the resulting system with a total of 6000 CT images. All images were acquired from the Massachusetts G eneral Hospital (MGH) Picture Archiving and Communication System (PACS). U sing this data, we employ the learning curve approach to predict classificat ion ccuracy at a given training sample size. Our research will present a general me thodology for determining the training data set size necessary to achieve a cert in target classification accuracy that can be easily applied to other problems within such systems.",
"title": ""
},
{
"docid": "061e10ca5d2b4e807878e5eec0827b28",
"text": "Uplift modeling is a machine learning technique that aims to model treatment effects heterogeneity. It has been used in business and health sectors to predict the effect of a specific action on a given individual. Despite its advantages, uplift models show high sensitivity to noise and disturbance, which leads to unreliable results. In this paper we show different approaches to address the problem of uplift modeling, we demonstrate how disturbance in data can affect uplift measurement. We propose a new approach, we call it Pessimistic Uplift Modeling, that minimizes disturbance effects. We compared our approach with the existing uplift methods, on simulated and real datasets. The experiments show that our approach outperforms the existing approaches, especially in the case of high noise data environment.",
"title": ""
},
{
"docid": "f292b8666eb78e4d881777fee35123f7",
"text": "Abstract. We propose an approach to address data uncertainty for discrete optimization and network flow problems that allows controlling the degree of conservatism of the solution, and is computationally tractable both practically and theoretically. In particular, when both the cost coefficients and the data in the constraints of an integer programming problem are subject to uncertainty, we propose a robust integer programming problem of moderately larger size that allows controlling the degree of conservatism of the solution in terms of probabilistic bounds on constraint violation. When only the cost coefficients are subject to uncertainty and the problem is a 0 − 1 discrete optimization problem on n variables, then we solve the robust counterpart by solving at most n + 1 instances of the original problem. Thus, the robust counterpart of a polynomially solvable 0 − 1 discrete optimization problem remains polynomially solvable. In particular, robust matching, spanning tree, shortest path, matroid intersection, etc. are polynomially solvable. We also show that the robust counterpart of an NP -hard α-approximable 0 − 1 discrete optimization problem, remains α-approximable. Finally, we propose an algorithm for robust network flows that solves the robust counterpart by solving a polynomial number of nominal minimum cost flow problems in a modified network.",
"title": ""
},
{
"docid": "dd52742343462b3106c18274c143928b",
"text": "This paper presents a descriptive account of the social practices surrounding the iTunes music sharing of 13 participants in one organizational setting. Specifically, we characterize adoption, critical mass, and privacy; impression management and access control; the musical impressions of others that are created as a result of music sharing; the ways in which participants attempted to make sense of the dynamic system; and implications of the overlaid technical, musical, and corporate topologies. We interleave design implications throughout our results and relate those results to broader themes in a music sharing design space.",
"title": ""
},
{
"docid": "72d51fd4b384f4a9c3f6fe70606ab120",
"text": "Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. However, cloud Computing presents an added level of risk because essential services are often outsourced to a third party, which makes it harder to maintain data security and privacy, support data and service availability, and demonstrate compliance. Cloud Computing leverages many technologies (SOA, virtualization, Web 2.0); it also inherits their security issues, which we discuss here, identifying the main vulnerabilities in this kind of systems and the most important threats found in the literature related to Cloud Computing and its environment as well as to identify and relate vulnerabilities and threats with possible solutions.",
"title": ""
},
{
"docid": "471579f955f8b68a357c8780a7775cc9",
"text": "In addition to practitioners who care for male patients, with the increased use of high-resolution anoscopy, practitioners who care for women are seeing more men in their practices as well. Some diseases affecting the penis can impact on their sexual partners. Many of the lesions and neoplasms of the penis occur on the vulva as well. In addition, there are common and rare lesions unique to the penis. A review of the scope of penile lesions and neoplasms that may present in a primary care setting is presented to assist in developing a differential diagnosis if such a patient is encountered, as well as for practitioners who care for their sexual partners. A familiarity will assist with recognition, as well as when consultation is needed.",
"title": ""
},
{
"docid": "47e11b1d734b1dcacc182e55d378f2a2",
"text": "Experience replay plays an important role in the success of deep reinforcement learning (RL) by helping stabilize the neural networks. It has become a new norm in deep RL algorithms. In this paper, however, we showcase that varying the size of the experience replay buffer can hurt the performance even in very simple tasks. The size of the replay buffer is actually a hyper-parameter which needs careful tuning. Moreover, our study of experience replay leads to the formulation of the Combined DQN algorithm, which can significantly outperform primitive DQN in some tasks.",
"title": ""
},
{
"docid": "efc341c0a3deb6604708b6db361bfba5",
"text": "In recent years, data analysis has become important with increasing data volume. Clustering, which groups objects according to their similarity, has an important role in data analysis. DBSCAN is one of the most effective and popular density-based clustering algorithm and has been successfully implemented in many areas. However, it is a challenging task to determine the input parameter values of DBSCAN algorithm which are neighborhood radius Eps and minimum number of points MinPts. The values of these parameters significantly affect clustering performance of the algorithm. In this study, we propose AE-DBSCAN algorithm which includes a new method to determine the value of neighborhood radius Eps automatically. The experimental evaluations showed that the proposed method outperformed the classical method.",
"title": ""
},
{
"docid": "7aa5bf782622f2f0247dce09dcb23077",
"text": "In the wake of the digital revolution we will see a dramatic transformation of our economy and societal institutions. While the benefits of this transformation can be massive, there are also tremendous risks. The fundaments of autonomous decision-making, human dignity, and democracy are shaking. After the automation of production processes and vehicle operation, the automation of society is next. This is moving us to a crossroads: we must decide between a society in which the actions are determined in a top-down way and then implemented by coercion or manipulative technologies or a society, in which decisions are taken in a free and participatory way. Modern information and communication systems enable both, but the latter has economic and strategic benefits.",
"title": ""
},
{
"docid": "170e7a72a160951e880f18295d100430",
"text": "In this paper, we introduce an embedding model, named CapsE, exploring a capsule network to model relationship triples (subject, relation, object). Our CapsE represents each triple as a 3-column matrix where each column vector represents the embedding of an element in the triple. This 3-column matrix is then fed to a convolution layer where multiple filters are operated to generate different feature maps. These feature maps are used to construct capsules in the first capsule layer. Capsule layers are connected via dynamic routing mechanism. The last capsule layer consists of only one capsule to produce a vector output. The length of this vector output is used to measure the plausibility of the triple. Our proposed CapsE obtains state-of-the-art link prediction results for knowledge graph completion on two benchmark datasets: WN18RR and FB15k-237, and outperforms strong search personalization baselines on SEARCH17 dataset.",
"title": ""
},
{
"docid": "f96db30bac65af7c9315fae0f9bb7b7e",
"text": "Combining MIMO with OFDM, it is possible to significantly reduce receiver complexity as OFDM greatly simplifies equalization at the receiver. MIMO-OFDM is currently being considered for a number of developing wireless standards; consequently, the study of MIMO-OFDM in realistic environments is of great importance. This paper describes an approach for prototyping a MIMO-OFDM systems using a flexible software defined radio (SDR) system architecture in conjunction with commercially available hardware. An emphasis on software permits a focus on algorithm and system design issues rather than implementation and hardware configuration. The penalty of this flexibility, however, is that the ease of use comes at the expense of overall throughput. To illustrate the benefits of the proposed architecture, applications to MIMO-OFDM system prototyping and preliminary MIMO channel measurements are presented. A detailed description of the hardware is provided along with downloadable software to reproduce the system.",
"title": ""
},
{
"docid": "9e7ec69d26ead38692ee0059980538c8",
"text": "A dynamic control system design has been a great demand in the control engineering community, with many applications particularly in the field of flight control. This paper presents investigations into the development of a dynamic nonlinear inverse-model based control of a twin rotor multi-input multi-output system (TRMS). The TRMS is an aerodynamic test rig representing the control challenges of modern air vehicle. A model inversion control with the developed adaptive model is applied to the system. An adaptive neuro-fuzzy inference system (ANFIS) is augmented with the control system to improve the control response. To demonstrate the applicability of the methods, a simulated hovering motion of the TRMS, derived from experimental data is considered in order to evaluate the tracking properties and robustness capacities of the inverse- model control technique.",
"title": ""
},
{
"docid": "df67da08931ed6d0d100ff857c2b1ced",
"text": "Parallel computers with tens of thousands of processors are typically programmed in a data parallel style, as opposed to the control parallel style used in multiprocessing. The success of data parallel algorithms—even on problems that at first glance seem inherently serial—suggests that this style of programming has much wider applicability than was previously thought.",
"title": ""
}
] | scidocsrr |
ad5a5fe36003f8a01164a35a910a7c2e | External characteristics of the boost-converter with Cockroft-Walton voltage multiplier | [
{
"docid": "24041042e1216a3bbf6aab89fa6f0b93",
"text": "With the increasing demand for renewable energy, distributed power included in fuel cells have been studied and developed as a future energy source. For this system, a power conversion circuit is necessary to interface the generated power to the utility. In many cases, a high step-up DC/DC converter is needed to boost low input voltage to high voltage output. Conventional methods using cascade DC/DC converters cause extra complexity and higher cost. The conventional topologies to get high output voltage use flyback DC/DC converters. They have the leakage components that cause stress and loss of energy that results in low efficiency. This paper presents a high boost converter with a voltage multiplier and a coupled inductor. The secondary voltage of the coupled inductor is rectified using a voltage multiplier. High boost voltage is obtained with low duty cycle. Theoretical analysis and experimental results verify the proposed solutions using a 300 W prototype.",
"title": ""
}
] | [
{
"docid": "73270e8140d763510d97f7bd2fdd969e",
"text": "Inspired by the progress of deep neural network (DNN) in single-media retrieval, the researchers have applied the DNN to cross-media retrieval. These methods are mainly two-stage learning: the first stage is to generate the separate representation for each media type, and the existing methods only model the intra-media information but ignore the inter-media correlation with the rich complementary context to the intra-media information. The second stage is to get the shared representation by learning the cross-media correlation, and the existing methods learn the shared representation through a shallow network structure, which cannot fully capture the complex cross-media correlation. For addressing the above problems, we propose the cross-media multiple deep network (CMDN) to exploit the complex cross-media correlation by hierarchical learning. In the first stage, CMDN jointly models the intra-media and intermedia information for getting the complementary separate representation of each media type. In the second stage, CMDN hierarchically combines the inter-media and intra-media representations to further learn the rich cross-media correlation by a deeper two-level network strategy, and finally get the shared representation by a stacked network style. Experiment results show that CMDN achieves better performance comparing with several state-of-the-art methods on 3 extensively used cross-media datasets.",
"title": ""
},
{
"docid": "627868e179aec6c5b807dc22da3258ed",
"text": "As people integrate use of the cell phone into their lives, do they view it as just an update of the fixed telephone or assign it special values? This study explores that question in the framework of gratifications sought and their relationship both to differential cell phone use and to social connectedness. Based on a survey of Taiwanese college students, we found that the cell phone supplements the fixed telephone as a means of strengthening users’ family bonds, expanding their psychological neighborhoods, and facilitating symbolic proximity to the people they call. Thus, the cell phone has evolved from a luxury for businesspeople into an important facilitator of many users’ social relationships. For the poorly connected socially, the cell phone offers a unique advantage: it confers instant membership in a community. Finally, gender was found to mediate how users exploit the cell phone to maintain social ties.",
"title": ""
},
{
"docid": "c11cb213716d2dff82180d0de069da65",
"text": "In this paper, a simulation of SPWM (Unipolar) strategy is presented for single phase full bridge inverter. The simulation of the single-phase unipolar voltage switching inverter device model is simulated in Matlab/Simulink. The modulation ratio change from 0.4 to 0.9 by varying amplitude of modulating signal. The outputs voltage and current %THD waveforms for variable AC voltages and modulation index are observed on scope, and also see the THD.SPWM techniques are characterized by constant amplitude pulses with different duty cycle for each period. The width of this pulses are modulated in order to obtain inverter output voltage control and to reduce its harmonic content. Sinusoidal pulse width modulation or SPWM is the most common method in motor control and inverter application. Conventionally, to generate the signal, triangle wave as a carrier signal is compared with the sinusoidal wave, whose frequency is the desired frequency. In next the hardware design for unipolar voltage switching for inverter for fixed modulation index and is tested for different resistive loads. Keywords-Sinusoidal pulse width modulation (SPWM), Bipolar, Total Harmonic distortion (THD). Pulse Width Modulation (PWM), UPS (uninterruptible power supplies).",
"title": ""
},
{
"docid": "d47143c38598cf88eeb8be654f8a7a00",
"text": "Long Short-Term Memory (LSTM) networks have yielded excellent results on handwriting recognition. This paper describes an application of bidirectional LSTM networks to the problem of machine-printed Latin and Fraktur recognition. Latin and Fraktur recognition differs significantly from handwriting recognition in both the statistical properties of the data, as well as in the required, much higher levels of accuracy. Applications of LSTM networks to handwriting recognition use two-dimensional recurrent networks, since the exact position and baseline of handwritten characters is variable. In contrast, for printed OCR, we used a one-dimensional recurrent network combined with a novel algorithm for baseline and x-height normalization. A number of databases were used for training and testing, including the UW3 database, artificially generated and degraded Fraktur text and scanned pages from a book digitization project. The LSTM architecture achieved 0.6% character-level test-set error on English text. When the artificially degraded Fraktur data set is divided into training and test sets, the system achieves an error rate of 1.64%. On specific books printed in Fraktur (not part of the training set), the system achieves error rates of 0.15% (Fontane) and 1.47% (Ersch-Gruber). These recognition accuracies were found without using any language modelling or any other post-processing techniques.",
"title": ""
},
{
"docid": "5fb732fd3210a5c9bba42426b1b4ce49",
"text": "While there are optimal TSP solvers, as well as recent learning-based approaches, the generalization of the TSP to the Multiple Traveling Salesmen Problem is much less studied. Here, we design a neural network solution that treats the salesmen, cities and depot as three different sets of varying cardinalities. We apply a novel technique that combines elements from recent architectures that were developed for sets, as well as elements from graph networks. Coupled with new constraint enforcing output layers, a dedicated loss, and a search method, our solution is shown to outperform all the meta-heuristics of the leading solver in the field.",
"title": ""
},
{
"docid": "e5a936bbd9e6dc0189b7cc18268f0f87",
"text": "A new method of obtaining amplitude modulation (AM) for determining target location with spinning reticles is presented. The method is based on the use of graded transmission capabilities. The AM spinning reticles previously presented were functions of three parameters: amplitude vs angle, amplitude vs radius, and phase. This paper presents these parameters along with their capabilities and limitations and shows that multiple parameters can be integrated into a single reticle. It is also shown that AM parameters can be combined with FM parameters in a single reticle. Also, a general equation is developed that relates the AM parameters to a reticle transmission equation.",
"title": ""
},
{
"docid": "b7980ebc9634263729a0ac51cc148604",
"text": "Background: The popularity of the open source software development in the last decade, has brought about an increased interest from the industry on how to use open source components, participate in the open source community, build business models around this type of software development, and learn more about open source development methodologies. Aim: The aim of this study is to review research carried out on usage of open source components and development methodologies by the industry, as well as companies’ participation in the open source community. Method: Systematic review through searches in library databases and manual identification of articles from the open source conference. Results: 19 articles were identified. Conclusions: The articles could be divided into four categories: open source as part of component based software engineering, business models with open source in commercial organization, company participation in open source development communities, and usage of open source processes within a company.",
"title": ""
},
{
"docid": "d3fda1730c1297ed3b63a1d4f133d893",
"text": "Registered nurses were queried about their knowledge and attitudes regarding pain management. Results suggest knowledge of pain management principles and interventions is insufficient.",
"title": ""
},
{
"docid": "efd3280939a90041f50c4938cf886deb",
"text": "A distributed double integrator discrete time consensus protocol is presented along with stability analysis. The protocol will achieve consensus when the communication topology contains at least a directed spanning tree. Average consensus is achieved when the communication topology is strongly connected and balanced, where average consensus for double integrator systems is discussed. For second order systems average consensus occurs when the information states tend toward the average of the current information states not their initial values. Lastly, perturbation to the consensus protocol is addressed. Using a designed perturbation input, an algorithm is presented that accurately tracks the center of a vehicle formation in a decentralized manner.",
"title": ""
},
{
"docid": "757eadf19fee04c91e51ac8e6d3c6de1",
"text": "OBJECTIVES\nInfantile hemangiomas often are inapparent at birth and have a period of rapid growth during early infancy followed by gradual involution. More precise information on growth could help predict short-term outcomes and make decisions about when referral or intervention, if needed, should be initiated. The objective of this study was to describe growth characteristics of infantile hemangioma and compare growth with infantile hemangioma referral patterns.\n\n\nMETHODS\nA prospective cohort study involving 7 tertiary care pediatric dermatology practices was conducted. Growth data were available for a subset of 526 infantile hemangiomas in 433 patients from a cohort study of 1096 children. Inclusion criteria were age younger than 18 months at time of enrollment and presence of at least 1 infantile hemangioma. Growth stage and rate were compared with clinical characteristics and timing of referrals.\n\n\nRESULTS\nEighty percent of hemangioma size was reached during the early proliferative stage at a mean age of 3 months. Differences in growth between hemangioma subtypes included that deep hemangiomas tend to grow later and longer than superficial hemangiomas and that segmental hemangiomas tended to exhibit more continued growth after 3 months of age. The mean age of first visit was 5 months. Factors that predicted need for follow-up included ongoing proliferation, larger size, deep component, and segmental and indeterminate morphologic subtypes.\n\n\nCONCLUSIONS\nMost infantile hemangioma growth occurs before 5 months, yet 5 months was also the mean age at first visit to a specialist. Recognition of growth characteristics and factors that predict the need for follow-up could help aid in clinical decision-making. The first few weeks to months of life are a critical time in hemangioma growth. Infants with hemangiomas need close observation during this period, and those who need specialty care should be referred and seen as early as possible within this critical growth period.",
"title": ""
},
{
"docid": "b84a82dd36b71c9a3937ca1179c8501d",
"text": "Orthogonal frequency division multiplexing (OFDM) has already become a very attractive modulation scheme for many applications. Unfortunately OFDM is very sensitive to synchronization errors, one of them being phase noise, which is of great importance in modern WLAN systems which target high data rates and tend to use higher frequency bands because of the spectrum availability. In this paper we propose a linear Kalman filter as a means for tracking phase noise and its suppression. The algorithm is pilot based. The performance of the proposed method is investigated and compared with the performance of other known algorithms.",
"title": ""
},
{
"docid": "813a38597510d0415818847f3db2374f",
"text": "Numerous consumer reviews of products are now available on the Internet. Consumer reviews contain rich and valuable knowledge for both firms and users. However, the reviews are often disorganized, leading to difficulties in information navigation and knowledge acquisition. This article proposes a product aspect ranking framework, which automatically identifies the important aspects of products from online consumer reviews, aiming at improving the usability of the numerous reviews. The important product aspects are identified based on two observations: 1) the important aspects are usually commented on by a large number of consumers and 2) consumer opinions on the important aspects greatly influence their overall opinions on the product. In particular, given the consumer reviews of a product, we first identify product aspects by a shallow dependency parser and determine consumer opinions on these aspects via a sentiment classifier. We then develop a probabilistic aspect ranking algorithm to infer the importance of aspects by simultaneously considering aspect frequency and the influence of consumer opinions given to each aspect over their overall opinions. The experimental results on a review corpus of 21 popular products in eight domains demonstrate the effectiveness of the proposed approach. Moreover, we apply product aspect ranking to two real-world applications, i.e., document-level sentiment classification and extractive review summarization, and achieve significant performance improvements, which demonstrate the capacity of product aspect ranking in facilitating real-world applications.",
"title": ""
},
{
"docid": "1a598b6f9b3b5f010df40f77f91dc69d",
"text": "We describe and evaluate a character-level tagger for language-independent Named Entity Recognition (NER). Instead of words, a sentence is represented as a sequence of characters. The model consists of stacked bidirectional LSTMs which inputs characters and outputs tag probabilities for each character. These probabilities are then converted to consistent word level named entity tags using a Viterbi decoder. We are able to achieve close to state-of-the-art NER performance in seven languages with the same basic model using only labeled NER data and no hand-engineered features or other external resources like syntactic taggers or Gazetteers.",
"title": ""
},
{
"docid": "a8cf303c5965f12d54e1af67621e157d",
"text": "In this paper, we first discuss the definition of modularity (Q) used as a metric for community quality and then we review the modularity maximization approaches which were used for community detection in the last decade. Then, we discuss two opposite yet coexisting problems of modularity optimization; in some cases, it tends to favor small communities over large ones while in others, large communities over small ones (so-called the resolution limit problem). Next, we overview several community quality metrics proposed to solve the resolution limit problem and discuss Modularity Density (Qds ), which simultaneously avoids the two problems of modularity. Finally, we introduce two novel fine-tuned community detection algorithms that iteratively attempt to improve the community quality measurements by splitting and merging the given network community structure. The first one, referred to as Fine-tuned , is based on modularity (Q), while the second is based on Modularity Density (Qds ) and denoted as Fine-tuned . Then, we compare the greedy algorithm of modularity maximization (denoted as Greedy ), Fine-tuned , and Fine-tuned on four real networks, and also on the classical clique network and the LFR benchmark networks, each of which is instantiated by a wide range of parameters. The results indicate that Fine-tuned Qds is the most effective among the three algorithms discussed. Moreover, we show that Fine-tuned Qds can be applied to the communities detected by other algorithms to significantly improve their results.",
"title": ""
},
{
"docid": "6cc7205ad19d3de8fab076a752d82284",
"text": "Visual odometry and mapping methods can provide accurate navigation and comprehensive environment (obstacle) information for autonomous flights of Unmanned Aerial Vehicle (UAV) in GPS-denied cluttered environments. This work presents a new light small-scale low-cost ARM-based stereo vision pre-processing system, which not only is used as onboard sensor to continuously estimate 6-DOF UAV pose, but also as onboard assistant computer to pre-process visual information, thereby saving more computational capability for the onboard host computer of the UAV to conduct other tasks. The visual odometry is done by one plugin specifically developed for this new system with a fixed baseline (12cm). In addition, the pre-processed infromation from this new system are sent via a Gigabit Ethernet cable to the onboard host computer of UAV for real-time environment reconstruction and obstacle detection with a octree-based 3D occupancy grid mapping approach, i.e. OctoMap. The visual algorithm is evaluated with the stereo video datasets from EuRoC Challenge III in terms of efficiency, accuracy and robustness. Finally, the new system is mounted and tested on a real quadrotor UAV to carry out the visual odometry and mapping task.",
"title": ""
},
{
"docid": "472f59fd9017e3c03650619c4f0201f3",
"text": "Software Defined Networking (SDN) introduces a new communication network management paradigm and has gained much attention from academia and industry. However, the centralized nature of SDN is a potential vulnerability to the system since attackers may launch denial of services (DoS) attacks against the controller. Existing solutions limit requests rate to the controller by dropping overflowed requests, but they also drop legitimate requests to the controller. To address this problem, we propose FlowRanger, a buffer prioritizing solution for controllers to handle routing requests based on their likelihood to be attacking requests, which derives the trust values of the requesting sources. Based on their trust values, FlowRanger classifies routing requests into multiple buffer queues with different priorities. Thus, attacking requests are served with a lower priority than regular requests. Our simulation results demonstrates that FlowRanger can significantly enhance the request serving rate of regular users under DoS attacks against the controller. To the best of our knowledge, our work is the first solution to battle against controller DoS attacks on the controller side.",
"title": ""
},
{
"docid": "bf1e0eaf8ab49fa7093b49f0b005f1b0",
"text": "The emergence of the paradigm of Internet of Things (IoT) has necessitated the development of machine-to-machine (M2M) protocols geared towards wireless sensor network interfacing to the Internet and implementing machine learning algorithms over the cloud. This paper discusses the viability of the MQ Telemetry Transport (MQTT) protocol for such applications. This paper introduces MQTT along with its merits and demerits and suitability towards IoT applications. Then it outlines an implementation of a typical IoT application involving ubiquitous sensing, M2M communication, cloud computing and semantic data extraction. The results of this experiment are then analyzed. Finally, the paper looks at future improvements in the proposed architecture for widespread use.",
"title": ""
},
{
"docid": "a97151d20ac0f25e1897b9e66eb77e9b",
"text": "In this paper, we propose a novel system-Intelligent Personalized Fashion Recommendation System, which creates a new space in web multimedia mining and recommendation. The proposed system significantly helps customers find their most suitable fashion choices in mass fashion information in the virtual space based on multimedia mining. There are three stand-alone models developed in this paper to optimize the analysis of fashion features in mass fashion trend: (i). Interaction and recommender model, which associated clients' personalized demand with the current fashion trend, and helps clients find the most favorable fashion factors in trend. (ii). Evolutionary hierachical fashion multimedia mining model, which creates a hierachical structure to filer the key components of fashion multimedia information in the virtual space, and it proves to be more efficient for web mass multimedia mining in an evolutionary way. (iii). Color tone analysis model, a relevant and straightforward approach for analysis of main color tone as to the skin and clothing is used. In this model, a refined contour extraction of the fashion model method is also developed to solve the dilemma that the accuracy and efficiency of contour extraction in the dynamic and complex video scene. As evidenced by the experiment, the proposed system outperforms in effectiveness on mass fashion information in the virtual space compared with human, and thus developing a personalized and diversified way for fashion recommendation.",
"title": ""
},
{
"docid": "872f224c2dbf06a335eee267bac4ec79",
"text": "Shallow supervised 1-hidden layer neural networks have a number of favorable properties that make them easier to interpret, analyze, and optimize than their deep counterparts, but lack their representational power. Here we use 1-hidden layer learning problems to sequentially build deep networks layer by layer, which can inherit properties from shallow networks. Contrary to previous approaches using shallow networks, we focus on problems where deep learning is reported as critical for success. We thus study CNNs on two large-scale image recognition tasks: ImageNet and CIFAR-10. Using a simple set of ideas for architecture and training we find that solving sequential 1-hidden-layer auxiliary problems leads to a CNN that exceeds AlexNet performance on ImageNet. Extending our training methodology to construct individual layers by solving 2-and-3-hidden layer auxiliary problems, we obtain an 11-layer network that exceeds VGG-11 on ImageNet obtaining 89.8% top-5 single crop.To our knowledge, this is the first competitive alternative to end-to-end training of CNNs that can scale to ImageNet. We conduct a wide range of experiments to study the properties this induces on the intermediate layers.",
"title": ""
},
{
"docid": "16316dc13263ca7a45f5ff3682440cc6",
"text": "This paper describes a hybrid system that combines a powered lower limb exoskeleton with functional electrical stimulation (FES) for gait restoration in persons with paraplegia. The general control structure consists of two control loops: a motor control loop, which utilizes joint angle feedback control to control the output of the joint motor to track the desired joint trajectories, and a muscle control loop, which utilizes joint torque profiles from previous steps to shape the muscle stimulation profile for the subsequent step in order to minimize the motor torque contribution required for joint angle trajectory tracking. The implementation described here incorporates stimulation of the hamstrings and quadriceps muscles, such that the hip joints are actuated by the combination of hip motors and the hamstrings, and the knee joints are actuated by the combination of knee motors and the quadriceps. In order to demonstrate efficacy, the control approach was implemented on three paraplegic subjects with motor complete spinal cord injuries ranging from levels T6 to T10. Experimental data indicates that the cooperative control system provided consistent and repeatable gait motions and reduced the torque and power output required from the hip and knee motors of the exoskeleton compared to walking without FES.",
"title": ""
}
] | scidocsrr |
a933e9c1ab6140aac102052413b934b7 | Increased nature relatedness and decreased authoritarian political views after psilocybin for treatment-resistant depression | [
{
"docid": "9ff6d7a36646b2f9170bd46d14e25093",
"text": "Psychedelic drugs such as LSD and psilocybin are often claimed to be capable of inducing life-changing experiences described as mystical or transcendental, especially if high doses are taken. The present study examined possible enduring effects of such experiences by comparing users of psychedelic drugs (n = 88), users of nonpsychedelic illegal drugs (e.g., marijuana, amphetamines) (n = 29) and non illicit drug-using social drinkers (n = 66) on questionnaire measures of values, beliefs and emotional empathy. Samples were obtained from Israel (n = 110) and Australia (n = 73) in a cross-cultural comparison to see if values associated with psychedelic drug use transcended culture of origin. Psychedelic users scored significantly higher on mystical beliefs (e.g., oneness with God and the universe) and life values of spirituality and concern for others than the other groups, and lower on the value of financial prosperity, irrespective of culture of origin. Users of nonpsychedelic illegal drugs scored significantly lower on a measure of coping ability than both psychedelic users and non illicit drug users. Both groups of illegal drug users scored significantly higher on empathy than non illicit drug users. Results are discussed in the context of earlier findings from Pahnke (1966) and Doblin (1991) of the transformative effect of psychedelic experiences, although the possibility remains that present findings reflect predrug characteristics of those who chose to take psychedelic drugs rather than effects of the drugs themselves.",
"title": ""
}
] | [
{
"docid": "932934a4362bd671427954d0afb61459",
"text": "On the basis of the similarity between spinel and rocksalt structures, it is shown that some spinel oxides (e.g., MgCo2O4, etc) can be cathode materials for Mg rechargeable batteries around 150 °C. The Mg insertion into spinel lattices occurs via \"intercalation and push-out\" process to form a rocksalt phase in the spinel mother phase. For example, by utilizing the valence change from Co(III) to Co(II) in MgCo2O4, Mg insertion occurs at a considerably high potential of about 2.9 V vs. Mg2+/Mg, and similarly it occurs around 2.3 V vs. Mg2+/Mg with the valence change from Mn(III) to Mn(II) in MgMn2O4, being comparable to the ab initio calculation. The feasibility of Mg insertion would depend on the phase stability of the counterpart rocksalt XO of MgO in Mg2X2O4 or MgX3O4 (X = Co, Fe, Mn, and Cr). In addition, the normal spinel MgMn2O4 and MgCr2O4 can be demagnesiated to some extent owing to the robust host structure of Mg1-xX2O4, where the Mg extraction/insertion potentials for MgMn2O4 and MgCr2O4 are both about 3.4 V vs. Mg2+/Mg. Especially, the former \"intercalation and push-out\" process would provide a safe and stable design of cathode materials for polyvalent cations.",
"title": ""
},
{
"docid": "2833dbe3c3e576a3ba8f175a755b6964",
"text": "The accuracy and granularity of network flow measurement play a critical role in many network management tasks, especially for anomaly detection. Despite its important, traffic monitoring often introduces overhead to the network, thus, operators have to employ sampling and aggregation to avoid overloading the infrastructure. However, such sampled and aggregated information may affect the accuracy of traffic anomaly detection. In this work, we propose a novel method that performs adaptive zooming in the aggregation of flows to be measured. In order to better balance the monitoring overhead and the anomaly detection accuracy, we propose a prediction based algorithm that dynamically change the granularity of measurement along both the spatial and the temporal dimensions. To control the load on each individual switch, we carefully delegate monitoring rules in the network wide. Using real-world data and three simple anomaly detectors, we show that the adaptive based counting can detect anomalies more accurately with less overhead.",
"title": ""
},
{
"docid": "631b473342cc30360626eaea0734f1d8",
"text": "Argument extraction is the task of identifying arguments, along with their components in text. Arguments can be usually decomposed into a claim and one or more premises justifying it. The proposed approach tries to identify segments that represent argument elements (claims and premises) on social Web texts (mainly news and blogs) in the Greek language, for a small set of thematic domains, including articles on politics, economics, culture, various social issues, and sports. The proposed approach exploits distributed representations of words, extracted from a large non-annotated corpus. Among the novel aspects of this work is the thematic domain itself which relates to social Web, in contrast to traditional research in the area, which concentrates mainly on law documents and scientific publications. The huge increase of social web communities, along with their user tendency to debate, makes the identification of arguments in these texts a necessity. In addition, a new manually annotated corpus has been constructed that can be used freely for research purposes. Evaluation results are quite promising, suggesting that distributed representations can contribute positively to the task of argument extraction.",
"title": ""
},
{
"docid": "88a27616b16a0d643939a40685be12f1",
"text": "The water supply system has a high operational cost associated with its operations. This is characteristically due to the operations of the pumps that consume significantly high amount of electric energy. In order to minimize the electric energy consumption and reduce the maintenance cost of the system, this paper proposes the use of an Adaptive Weighted sum Genetic Algorithm (AWGA) in creating an optimal pump schedule, which can minimize the cost of electricity and satisfy the constraint of the maximum and minimum levels of water in the reservoir as well. The Adaptive weighted sum GA is based on popular weighted sum approach GA for multi-objective optimization problem wherein the weights multipliers of the individual fitness functions are adaptively selected. The algorithm has been tested using a hypothetical case study and promising results have been obtained and presented.",
"title": ""
},
{
"docid": "10ebda480df1157da5581b6219a9464a",
"text": "Our goal is to create a convenient natural language interface for performing wellspecified but complex actions such as analyzing data, manipulating text, and querying databases. However, existing natural language interfaces for such tasks are quite primitive compared to the power one wields with a programming language. To bridge this gap, we start with a core programming language and allow users to “naturalize” the core language incrementally by defining alternative, more natural syntax and increasingly complex concepts in terms of compositions of simpler ones. In a voxel world, we show that a community of users can simultaneously teach a common system a diverse language and use it to build hundreds of complex voxel structures. Over the course of three days, these users went from using only the core language to using the naturalized language in 85.9% of the last 10K utterances.",
"title": ""
},
{
"docid": "fe16f2d946b3ea7bc1169d5667365dbe",
"text": "This study assessed embodied simulation via electromyography (EMG) as participants first encoded emotionally ambiguous faces with emotion concepts (i.e., \"angry,\"\"happy\") and later passively viewed the faces without the concepts. Memory for the faces was also measured. At initial encoding, participants displayed more smiling-related EMG activity in response to faces paired with \"happy\" than in response to faces paired with \"angry.\" Later, in the absence of concepts, participants remembered happiness-encoded faces as happier than anger-encoded faces. Further, during passive reexposure to the ambiguous faces, participants' EMG indicated spontaneous emotion-specific mimicry, which in turn predicted memory bias. No specific EMG activity was observed when participants encoded or viewed faces with non-emotion-related valenced concepts, or when participants encoded or viewed Chinese ideographs. From an embodiment perspective, emotion simulation is a measure of what is currently perceived. Thus, these findings provide evidence of genuine concept-driven changes in emotion perception. More generally, the findings highlight embodiment's role in the representation and processing of emotional information.",
"title": ""
},
{
"docid": "ba9de90efb41ef69e64a6880e420e0ac",
"text": "The emergence of chronic inflammation during obesity in the absence of overt infection or well-defined autoimmune processes is a puzzling phenomenon. The Nod-like receptor (NLR) family of innate immune cell sensors, such as the nucleotide-binding domain, leucine-rich–containing family, pyrin domain–containing-3 (Nlrp3, but also known as Nalp3 or cryopyrin) inflammasome are implicated in recognizing certain nonmicrobial originated 'danger signals' leading to caspase-1 activation and subsequent interleukin-1β (IL-1β) and IL-18 secretion. We show that calorie restriction and exercise-mediated weight loss in obese individuals with type 2 diabetes is associated with a reduction in adipose tissue expression of Nlrp3 as well as with decreased inflammation and improved insulin sensitivity. We further found that the Nlrp3 inflammasome senses lipotoxicity-associated increases in intracellular ceramide to induce caspase-1 cleavage in macrophages and adipose tissue. Ablation of Nlrp3 in mice prevents obesity-induced inflammasome activation in fat depots and liver as well as enhances insulin signaling. Furthermore, elimination of Nlrp3 in obese mice reduces IL-18 and adipose tissue interferon-γ (IFN-γ) expression, increases naive T cell numbers and reduces effector T cell numbers in adipose tissue. Collectively, these data establish that the Nlrp3 inflammasome senses obesity-associated danger signals and contributes to obesity-induced inflammation and insulin resistance.",
"title": ""
},
{
"docid": "3c3e377d9e06499549e4de8e13e39612",
"text": "A plastic ankle foot orthosis (AFO) was developed, referred to as functional ankle foot orthosis Type 2 (FAFO (II)), which can deal with genu recurvatum and the severe spastic foot in walking. Clinical trials were successful for all varus and drop feet, and for most cases of genu recurvatum. Electromyogram studies showed that the FAFO (II) reduced the spasticity of gastrocnemius and hamstring muscles and activated the quadricep muscles. Gait analysis revealed a reduction of the knee angles in the stance phase on the affected side when using the FAFO (II). Mechanical stress tests showed excellent durability of the orthosis and demonstrated its effectiveness for controlling spasticity in comparison with other types of plastic AFOs.",
"title": ""
},
{
"docid": "1a23c0ed6aea7ba2cf4d3021de4cfa8b",
"text": "This article focuses on the traffic coordination problem at traffic intersections. We present a decentralized coordination approach, combining optimal control with model-based heuristics. We show how model-based heuristics can lead to low-complexity solutions that are suitable for a fast online implementation, and analyze its properties in terms of efficiency, feasibility and optimality. Finally, simulation results for different scenarios are also presented.",
"title": ""
},
{
"docid": "af78c57378a472c8f7be4eb354feb442",
"text": "Mutations in the human sonic hedgehog gene ( SHH) are the most frequent cause of autosomal dominant inherited holoprosencephaly (HPE), a complex brain malformation resulting from incomplete cleavage of the developing forebrain into two separate hemispheres and ventricles. Here we report the clinical and molecular findings in five unrelated patients with HPE and their relatives with an identified SHH mutation. Three new and one previously reported SHH mutations were identified, a fifth proband was found to carry a reciprocal subtelomeric rearrangement involving the SHH locus in 7q36. An extremely wide intrafamilial phenotypic variability was observed, ranging from the classical phenotype with alobar HPE accompanied by typical severe craniofacial abnormalities to very mild clinical signs of choanal stenosis or solitary median maxillary central incisor (SMMCI) only. Two families were initially ascertained because of microcephaly in combination with developmental delay and/or mental retardation and SMMCI, the latter being a frequent finding in patients with an identified SHH mutation. In other affected family members a delay in speech acquisition and learning disabilities were the leading clinical signs. Conclusion: mutational analysis of the sonic hedgehog gene should not only be considered in patients presenting with the classical holoprosencephaly phenotype but also in those with two or more clinical signs of the wide phenotypic spectrum of associated abnormalities, especially in combination with a positive family history.",
"title": ""
},
{
"docid": "a0ca6986d59905cea49ed28fa378c69e",
"text": "The epidemic of type 2 diabetes and impaired glucose tolerance is one of the main causes of morbidity and mortality worldwide. In both disorders, tissues such as muscle, fat and liver become less responsive or resistant to insulin. This state is also linked to other common health problems, such as obesity, polycystic ovarian disease, hyperlipidaemia, hypertension and atherosclerosis. The pathophysiology of insulin resistance involves a complex network of signalling pathways, activated by the insulin receptor, which regulates intermediary metabolism and its organization in cells. But recent studies have shown that numerous other hormones and signalling events attenuate insulin action, and are important in type 2 diabetes.",
"title": ""
},
{
"docid": "7604835dc6d7927880abcf7b91b5c405",
"text": "The computational modeling of emotion has been an area of growing interest in cognitive robotics research in recent years, but also a source of contention regarding how to conceive of emotion and how to model it. In this paper, emotion is characterized as (a) closely connected to embodied cognition, (b) grounded in homeostatic bodily regulation, and (c) a powerful organizational principle—affective modulation of behavioral and cognitive mechanisms—that is ‘useful’ in both biological brains and robotic cognitive architectures. We elaborate how emotion theories and models centered on core neurological structures in the mammalian brain, and inspired by embodied, dynamical, and enactive approaches in cognitive science, may impact on computational and robotic modeling. In light of the theoretical discussion, work in progress on the development of an embodied cognitive-affective architecture for robots is presented, incorporating aspects of the theories discussed.",
"title": ""
},
{
"docid": "5f3b787993ae1ebae34d8cee3ba1a975",
"text": "Neisseria meningitidis remains an important cause of severe sepsis and meningitis worldwide. The bacterium is only found in human hosts, and so must continually coexist with the immune system. Consequently, N meningitidis uses multiple mechanisms to avoid being killed by antimicrobial proteins, phagocytes, and, crucially, the complement system. Much remains to be learnt about the strategies N meningitidis employs to evade aspects of immune killing, including mimicry of host molecules by bacterial structures such as capsule and lipopolysaccharide, which poses substantial problems for vaccine design. To date, available vaccines only protect individuals against subsets of meningococcal strains. However, two promising vaccines are currently being assessed in clinical trials and appear to offer good prospects for an effective means of protecting individuals against endemic serogroup B disease, which has proven to be a major challenge in vaccine research.",
"title": ""
},
{
"docid": "b045350bfb820634046bff907419d1bf",
"text": "Action recognition and human pose estimation are closely related but both problems are generally handled as distinct tasks in the literature. In this work, we propose a multitask framework for jointly 2D and 3D pose estimation from still images and human action recognition from video sequences. We show that a single architecture can be used to solve the two problems in an efficient way and still achieves state-of-the-art results. Additionally, we demonstrate that optimization from end-to-end leads to significantly higher accuracy than separated learning. The proposed architecture can be trained with data from different categories simultaneously in a seamlessly way. The reported results on four datasets (MPII, Human3.6M, Penn Action and NTU) demonstrate the effectiveness of our method on the targeted tasks.",
"title": ""
},
{
"docid": "ecd486fabd206ad8c28ea9d9da8cd0ee",
"text": "The prevailing binding of SOAP to HTTP specifies that SOAP messages be encoded as an XML 1.0 document which is then sent between client and server. XML processing however can be slow and memory intensive, especially for scientific data, and consequently SOAP has been regarded as an inappropriate protocol for scientific data. Efficiency considerations thus lead to the prevailing practice of separating data from the SOAP control channel. Instead, it is stored in specialized binary formats and transmitted either via attachments or indirectly via a file sharing mechanism, such as GridFTP or HTTP. This separation invariably complicates development due to the multiple libraries and type systems to be handled; furthermore it suffers from performance issues, especially when handling small binary data. As an alternative solution, binary XML provides a highly efficient encoding scheme for binary data in the XML and SOAP messages, and with it we can gain high performance as well as unifying the development environment without unduly impacting the Web service protocol stack. In this paper we present our implementation of a generic SOAP engine that supports both textual XML and binary XML as the encoding scheme of the message. We also present our binary XML data model and encoding scheme. Our experiments show that for scientific applications binary XML together with the generic SOAP implementation not only ease development, but also provide better performance and are more widely applicable than the commonly used separated schemes",
"title": ""
},
{
"docid": "e9f19d60dfa80d34ca4db370080b977d",
"text": "This paper reviews three recent books on data mining written from three different perspectives, i.e. databases, machine learning, and statistics. Although the exploration in this paper is suggestive instead of conclusive, it reveals that besides some common properties, different perspectives lay strong emphases on different aspects of data mining. The emphasis of the database perspective is on efficiency because this perspective strongly concerns the whole discovery process and huge data volume. The emphasis of the machine learning perspective is on effectiveness because this perspective is heavily attracted by substantive heuristics working well in data analysis although they may not always be useful. As for the statistics perspective, its emphasis is on validity because this perspective cares much for mathematical soundness behind mining methods.",
"title": ""
},
{
"docid": "243d1dc8df4b8fbd37cc347a6782a2b5",
"text": "This paper introduces a framework for`curious neural controllers' which employ an adaptive world model for goal directed on-line learning. First an on-line reinforcement learning algorithm for autonomousànimats' is described. The algorithm is based on two fully recurrent`self-supervised' continually running networks which learn in parallel. One of the networks learns to represent a complete model of the environmental dynamics and is called thèmodel network'. It provides completècredit assignment paths' into the past for the second network which controls the animats physical actions in a possibly reactive environment. The an-imats goal is to maximize cumulative reinforcement and minimize cumulativèpain'. The algorithm has properties which allow to implement something like the desire to improve the model network's knowledge about the world. This is related to curiosity. It is described how the particular algorithm (as well as similar model-building algorithms) may be augmented by dynamic curiosity and boredom in a natural manner. This may be done by introducing (delayed) reinforcement for actions that increase the model network's knowledge about the world. This in turn requires the model network to model its own ignorance, thus showing a rudimentary form of self-introspective behavior.",
"title": ""
},
{
"docid": "709aa1bc4ace514e46f7edbb07fb03a9",
"text": "Empirical scoring functions based on either molecular force fields or cheminformatics descriptors are widely used, in conjunction with molecular docking, during the early stages of drug discovery to predict potency and binding affinity of a drug-like molecule to a given target. These models require expert-level knowledge of physical chemistry and biology to be encoded as hand-tuned parameters or features rather than allowing the underlying model to select features in a data-driven procedure. Here, we develop a general 3-dimensional spatial convolution operation for learning atomic-level chemical interactions directly from atomic coordinates and demonstrate its application to structure-based bioactivity prediction. The atomic convolutional neural network is trained to predict the experimentally determined binding affinity of a protein-ligand complex by direct calculation of the energy associated with the complex, protein, and ligand given the crystal structure of the binding pose. Non-covalent interactions present in the complex that are absent in the protein-ligand sub-structures are identified and the model learns the interaction strength associated with these features. We test our model by predicting the binding free energy of a subset of protein-ligand complexes found in the PDBBind dataset and compare with state-of-the-art cheminformatics and machine learning-based approaches. We find that all methods achieve experimental accuracy (less than 1 kcal/mol mean absolute error) and that atomic convolutional networks either outperform or perform competitively with the cheminformatics based methods. Unlike all previous protein-ligand prediction systems, atomic convolutional networks are end-to-end and fully-differentiable. They represent a new data-driven, physics-based deep learning model paradigm that offers a strong foundation for future improvements in structure-based bioactivity prediction.",
"title": ""
},
{
"docid": "74fcade8e5f5f93f3ffa27c4d9130b9f",
"text": "Resampling is an important signature of manipulated images. In this paper, we propose two methods to detect and localize image manipulations based on a combination of resampling features and deep learning. In the first method, the Radon transform of resampling features are computed on overlapping image patches. Deep learning classifiers and a Gaussian conditional random field model are then used to create a heatmap. Tampered regions are located using a Random Walker segmentation method. In the second method, resampling features computed on overlapping image patches are passed through a Long short-term memory (LSTM) based network for classification and localization. We compare the performance of detection/localization of both these methods. Our experimental results show that both techniques are effective in detecting and localizing digital image forgeries.",
"title": ""
},
{
"docid": "80383246c35226231b4f136c6cc0019b",
"text": "How to automatically monitor wide critical open areas is a challenge to be addressed. Recent computer vision algorithms can be exploited to avoid the deployment of a large amount of expensive sensors. In this work, we propose our object tracking system which, combined with our recently developed anomaly detection system. can provide intelligence and protection for critical areas. In this work. we report two case studies: an international pier and a city parking lot. We acquire sequences to evaluate the effectiveness of the approach in challenging conditions. We report quantitative results for object counting, detection, parking analysis, and anomaly detection. Moreover, we report state-of-the-art results for statistical anomaly detection on a public dataset.",
"title": ""
}
] | scidocsrr |
92823cda4b3cb951828ecdfda0143ca3 | Fringing Field Capacitance Sensor for Measuring the Moisture Content of Agricultural Commodities | [
{
"docid": "3ae884fc5b7c090fc386367f9a2c6fa2",
"text": "This review paper focuses on interdigital electrodes-a geometric structure encountered in a wide variety of sensor and transducer designs. Physical and chemical principles behind the operation of these devices vary so much across different fields of science and technology that the common features present in all devices are often overlooked. This paper attempts to bring under one umbrella capacitive, inductive, dielectric, piezoacoustic, chemical, biological, and microelectromechanical interdigital sensors and transducers. The paper also provides historical perspective, discusses fabrication techniques, modeling of sensor parameters, application examples, and directions of future research.",
"title": ""
}
] | [
{
"docid": "b7dc17865a5d4894ef8c57d04a7346e7",
"text": "Recent advancements in signal processing and machine learning coupled with developments of electronic medical record keeping in hospitals and the availability of extensive set of medical images through internal/external communication systems, have resulted in a recent surge of significant interest in “Radiomics”. Radiomics is an emerging and relatively new research field, which refers to extracting semi-quantitative and/or quantitative features from medical images with the goal of developing predictive and/or prognostic models, and is expected to become a critical component for integration of image-derived information for personalized treatment in the near future. The conventional Radiomics workflow is typically based on extracting pre-designed features (also referred to as hand-crafted or engineered features) from a segmented region of interest. Nevertheless, recent advancements in deep learning have caused trends towards deep learning-based Radiomics (also referred to as discovery Radiomics). Capitalizing on the advantageous of these two approaches, there are also hybrid solutions developed to exploit the potentials of multiple data sources. Considering the variety of approaches to Radiomics, further improvements require a comprehensive and integrated sketch, which is the goal of this article. This manuscript provides a unique interdisciplinary perspective on Radiomics by discussing state-of-the-art signal processing solutions in the context of cancer Radiomics.",
"title": ""
},
{
"docid": "015c14741bfdfcf5f257d47d0933b45a",
"text": "It is a challenging task to identify sentiment polarity of Chinese reviews because the resources for Chinese sentiment analysis are limited. Instead of leveraging only monolingual Chinese knowledge, this study proposes a novel approach to leverage reliable English resources to improve Chinese sentiment analysis. Rather than simply projecting English resources onto Chinese resources, our approach first translates Chinese reviews into English reviews by machine translation services, and then identifies the sentiment polarity of English reviews by directly leveraging English resources. Furthermore, our approach performs sentiment analysis for both Chinese reviews and English reviews, and then uses ensemble methods to combine the individual analysis results. Experimental results on a dataset of 886 Chinese product reviews demonstrate the effectiveness of the proposed approach. The individual analysis of the translated English reviews outperforms the individual analysis of the original Chinese reviews, and the combination of the individual analysis results further improves the performance.",
"title": ""
},
{
"docid": "70b9aad14b2fc75dccab0dd98b3d8814",
"text": "This paper describes the first phase of an ongoing program of research into theory and practice of IT governance. It conceptually explores existing IT governance literature and reveals diverse definitions of IT governance, that acknowledge its structures, control frameworks and/or processes. The definitions applied within the literature and the nature and breadth of discussion demonstrate a lack of a clear shared understanding of the term IT governance. This lack of clarity has the potential to confuse and possibly impede useful research in the field and limit valid cross-study comparisons of results. Using a content analysis approach, a number of existing diverse definitions are moulded into a \"definitive\" definition of IT governance and its usefulness is critically examined. It is hoped that this exercise will heighten awareness of the \"broad reach\" of the IT governance concept to assist researchers in the development of research projects and more effectively guide practitioners in the overall assessment of IT governance.",
"title": ""
},
{
"docid": "c8bc5126cfd10674ba1198400a3c4a48",
"text": "We present a novel method called Contextual Pyramid CNN (CP-CNN) for generating high-quality crowd density and count estimation by explicitly incorporating global and local contextual information of crowd images. The proposed CP-CNN consists of four modules: Global Context Estimator (GCE), Local Context Estimator (LCE), Density Map Estimator (DME) and a Fusion-CNN (F-CNN). GCE is a VGG-16 based CNN that encodes global context and it is trained to classify input images into different density classes, whereas LCE is another CNN that encodes local context information and it is trained to perform patch-wise classification of input images into different density classes. DME is a multi-column architecture-based CNN that aims to generate high-dimensional feature maps from the input image which are fused with the contextual information estimated by GCE and LCE using F-CNN. To generate high resolution and high-quality density maps, F-CNN uses a set of convolutional and fractionally-strided convolutional layers and it is trained along with the DME in an end-to-end fashion using a combination of adversarial loss and pixellevel Euclidean loss. Extensive experiments on highly challenging datasets show that the proposed method achieves significant improvements over the state-of-the-art methods.",
"title": ""
},
{
"docid": "f2a72dcfaddde40a82b1182ecc945a29",
"text": "Cybersickness is an undesirable side effect, which occurs when people experience in a virtual environment (VE). A number of studies have tried to find ways to control cybersickness and some of them have demonstrated that presenting rest frames in VE might be one promising method to reduce cybersickness. This study investigates the effects of rest frames on cybersickness and the cybersickness-related brain activities. Participants (n=22) were exposed to a roller coaster simulator in a VE, both under a rest frame condition and a nonrest frame condition, in counter-balanced order while undergoing EEG recordings. Participants who experienced less cybersickness in the rest frame condition showed characteristic oscillations in different EEG frequency bands compared to those of in the nonrest frame condition. Based on the level of cybersickness and oscillatory EEG changes, we suggest that rest frames may reduce or delay the onset of cybersickness by alleviating users' attention or perception load.",
"title": ""
},
{
"docid": "ef159fe7f05868432dc93b02f31f36a1",
"text": "Modern mobile devices are equipped with multiple network interfaces, including 3G/LTE and WiFi. Bandwidth aggregation over LTE and WiFi links offers an attractive opportunity of supporting bandwidth-intensive services, such as high-quality video streaming, on mobile devices. However, achieving effective bandwidth aggregation in mobile environments raises several challenges related to deployment, link heterogeneity, network fluctuation, and energy consumption. We present GreenBag, an energy-efficient bandwidth aggregation middleware that supports real-time data-streaming services over asymmetric wireless links, requiring no modifications to the existing Internet infrastructure and servers. GreenBag employs several techniques, including medium load balancing, efficient segment management, and energy-aware mode control, to resolve such challenges. We implement a prototype of GreenBag on Android-based mobile devices which hosts, to the best knowledge of the authors, the first LTE-enabled bandwidth aggregation prototype for energy-efficient real-time video streaming. Our experiment results in both emulated and real-world environments show that GreenBag not only achieves good bandwidth aggregation to provide QoS in bandwidth-scarce environments but also efficiently saves energy on mobile devices. Moreover, energy-aware GreenBag can minimize video interruption while consuming 14-25% less energy than the non-energy-aware counterpart in real-world experiments.",
"title": ""
},
{
"docid": "ddecb743bc098a3e31ca58bc17810cf1",
"text": "Maxout network is a powerful alternate to traditional sigmoid neural networks and is showing success in speech recognition. However, maxout network is prone to overfitting thus regularization methods such as dropout are often needed. In this paper, a stochastic pooling regularization method for max-out networks is proposed to control overfitting. In stochastic pooling, a distribution is produced for each pooling region by the softmax normalization of the piece values. The active piece is selected based on the distribution during training, and an effective probability weighting is conducted during testing. We apply the stochastic pooling maxout (SPM) networks within the DNN-HMM framework and evaluate its effectiveness under a low-resource speech recognition condition. On benchmark test sets, the SPM network yields 4.7-8.6% relative improvements over the baseline maxout network. Further evaluations show the superiority of stochastic pooling over dropout for low-resource speech recognition.",
"title": ""
},
{
"docid": "a44be92d2bb751ffc7e137f48b5dd068",
"text": "http://dx.doi.org/10.1016/j.anbehav.2016.12.005 0003-3472/© 2017 The Authors. Published by Elsevie license (http://creativecommons.org/licenses/by/4.0/) In many areas of animal behaviour research, improvements in our ability to collect large and detailed data sets are outstripping our ability to analyse them. These diverse, complex and often highdimensional data sets exhibit nonlinear dependencies and unknown interactions across multiple variables, and may fail to conform to the assumptions of many classical statistical methods. The field of machine learning provides methodologies that are ideally suited to the task of extracting knowledge from these data. In this review, we aim to introduce animal behaviourists unfamiliar with machine learning (ML) to the promise of these techniques for the analysis of complex behavioural data. We start by describing the rationale behind ML and review a number of animal behaviour studies where ML has been successfully deployed. The ML framework is then introduced by presenting several unsupervised and supervised learning methods. Following this overview, we illustrate key ML approaches by developing data analytical pipelines for three different case studies that exemplify the types of behavioural and ecological questions ML can address. The first uses a large number of spectral and morphological characteristics that describe the appearance of pheasant, Phasianus colchicus, eggs to assign them to putative clutches. The second takes a continuous data stream of feeder visits from PIT (passive integrated transponder)-tagged jackdaws, Corvus monedula, and extracts foraging events from it, which permits the construction of social networks. Our final example uses aerial images to train a classifier that detects the presence of wildebeest, Connochaetes taurinus, to count individuals in a population. With the advent of cheaper sensing and tracking technologies an unprecedented amount of data on animal behaviour is becoming available. We believe that ML will play a central role in translating these data into scientific knowledge and become a useful addition to the animal behaviourist's analytical toolkit. © 2017 The Authors. Published by Elsevier Ltd on behalf of The Association for the Study of Animal Behaviour. This is an open access article under the CC BY license (http://creativecommons.org/licenses/ by/4.0/).",
"title": ""
},
{
"docid": "918c3a6a045454dc9c56b3a0744101e2",
"text": "Cancer immune surveillance is considered to be an important host protection process to inhibit carcinogenesis and to maintain cellular homeostasis. In the interaction of host and tumour cells, three essential phases have been proposed: elimination, equilibrium and escape, which are designated the 'three E's'. Several immune effector cells and secreted cytokines play a critical role in pursuing each process. Nascent transformed cells can initially be eliminated by an innate immune response such as by natural killer cells. During tumour progression, even though an adaptive immune response can be provoked by antigen-specific T cells, immune selection produces tumour cell variants that lose major histocompatibility complex class I and II antigens and decreases amounts of tumour antigens in the equilibrium phase. Furthermore, tumour-derived soluble factors facilitate the escape from immune attack, allowing progression and metastasis. In this review, the central roles of effector cells and cytokines in tumour immunity, and the escape mechanisms of tumour cells during tumour progression are discussed.",
"title": ""
},
{
"docid": "8520be557b90fdaddbe1f7cd0d807d72",
"text": "In the last couple of years, the increasing penetration of renewable energy resulted in the development of grid-connected large-scale power plants. However, a high penetration harbors the risk of grid instability if the generating power plants are not able to support the grid. Therefore, grid stabilization, which depends on the system-type or grid of each country, plays an important role and has been strengthened by different grid codes. With this background, VDE-AR-N 4105 for photovoltaic (PV) systems connected to the low-voltage grid and the German Association of Energy and Water Industries (BDEW) introduced the medium-voltage grid code for connecting power plants to the grid and they are the most stringent certifications. In this paper, the control strategy of generating system is enhanced with VDE-AR-N 4105 and BDEW grid code, where both active/reactive powers are controlled. Simulation and experimental results of 100-kW PV inverter are shown to verify the effectiveness of the proposed implemental control strategy.",
"title": ""
},
{
"docid": "dd53308cc19f85e2a7ab2e379e196b6c",
"text": "Due to the increasingly aging population, there is a rising demand for assistive living technologies for the elderly to ensure their health and well-being. The elderly are mostly chronic patients who require frequent check-ups of multiple vital signs, some of which (e.g., blood pressure and blood glucose) vary greatly according to the daily activities that the elderly are involved in. Therefore, the development of novel wearable intelligent systems to effectively monitor the vital signs continuously over a 24 hour period is in some cases crucial for understanding the progression of chronic symptoms in the elderly. In this paper, recent development of Wearable Intelligent Systems for e-Health (WISEs) is reviewed, including breakthrough technologies and technical challenges that remain to be solved. A novel application of wearable technologies for transient cardiovascular monitoring during water drinking is also reported. In particular, our latest results found that heart rate increased by 9 bpm (P < 0.001) and pulse transit time was reduced by 5 ms (P < 0.001), indicating a possible rise in blood pressure, during swallowing. In addition to monitoring physiological conditions during daily activities, it is anticipated that WISEs will have a number of other potentially viable applications, including the real-time risk prediction of sudden cardiovascular events and deaths. Category: Smart and intelligent computing",
"title": ""
},
{
"docid": "89e88b92adc44176f0112a66ec92515a",
"text": "Computer programming is being introduced in schools worldwide as part of a movement that promotes Computational Thinking (CT) skills among young learners. In general, learners use visual, block-based programming languages to acquire these skills, with Scratch being one of the most popular ones. Similar to professional developers, learners also copy and paste their code, resulting in duplication. In this paper we present the findings of correlating the assessment of the CT skills of learners with the presence of software clones in over 230,000 projects obtained from the Scratch platform. Specifically, we investigate i) if software cloning is an extended practice in Scratch projects, ii) if the presence of code cloning is independent of the programming mastery of learners, iii) if code cloning can be found more frequently in Scratch projects that require specific skills (as parallelism or logical thinking), and iv) if learners who have the skills to avoid software cloning really do so. The results show that i) software cloning can be commonly found in Scratch projects, that ii) it becomes more frequent as learners work on projects that require advanced skills, that iii) no CT dimension is to be found more related to the absence of software clones than others, and iv) that learners -even if they potentially know how to avoid cloning- still copy and paste frequently. The insights from this paper could be used by educators and learners to determine when it is pedagogically more effective to address software cloning, by educational programming platform developers to adapt their systems, and by learning assessment tools to provide better evaluations.",
"title": ""
},
{
"docid": "faa3d0432cbade209fa876240c5db4c0",
"text": "BACKGROUND\nDespite the clinical importance of atrial fibrillation (AF), the development of chronic nonvalvular AF models has been difficult. Animal models of sustained AF have been developed primarily in the short-term setting. Recently, models of chronic ventricular myopathy and fibrillation have been developed after several weeks of continuous rapid ventricular pacing. We hypothesized that chronic rapid atrial pacing would lead to atrial myopathy, yielding a reproducible model of sustained AF.\n\n\nMETHODS AND RESULTS\nTwenty-two halothane-anesthetized mongrel dogs underwent insertion of a transvenous lead at the right atrial appendage that was continuously paced at 400 beats per minute for 6 weeks. Two-dimensional echocardiography was performed in 11 dogs to assess the effects of rapid atrial pacing on atrial size. Atrial vulnerability was defined as the ability to induce sustained repetitive atrial responses during programmed electrical stimulation and was assessed by extrastimulus and burst-pacing techniques. Effective refractory period (ERP) was measured at two endocardial sites in the right atrium. Sustained AF was defined as AF > or = 15 minutes. In animals with sustained AF, 10 quadripolar epicardial electrodes were surgically attached to the right and left atria. The local atrial fibrillatory cycle length (AFCL) was measured in a 20-second window, and the mean AFCL was measured at each site. Marked biatrial enlargement was documented; after 6 weeks of continuous rapid atrial pacing, the left atrium was 7.8 +/- 1 cm2 at baseline versus 11.3 +/- 1 cm2 after pacing, and the right atrium was 4.3 +/- 0.7 cm2 at baseline versus 7.2 +/- 1.3 cm2 after pacing. An increase in atrial area of at least 40% was necessary to induce sustained AF and was strongly correlated with the inducibility of AF (r = .87). Electron microscopy of atrial tissue demonstrated structural changes that were characterized by an increase in mitochondrial size and number and by disruption of the sarcoplasmic reticulum. After 6 weeks of continuous rapid atrial pacing, sustained AF was induced in 18 dogs (82%) and nonsustained AF was induced in 2 dogs (9%). AF occurred spontaneously in 4 dogs (18%). Right atrial ERP, measured at cycle lengths of 400 and 300 milliseconds at baseline, was significantly shortened after pacing, from 150 +/- 8 to 127 +/- 10 milliseconds and from 147 +/- 11 to 123 +/- 12 milliseconds, respectively (P < .001). This finding was highly predictive of inducibility of AF (90%). Increased atrial area (40%) and ERP shortening were highly predictive for the induction of sustained AF (88%). Local epicardial ERP correlated well with local AFCL (R2 = .93). Mean AFCL was significantly shorter in the left atrium (81 +/- 8 milliseconds) compared with the right atrium 94 +/- 9 milliseconds (P < .05). An area in the posterior left atrium was consistently found to have a shorter AFCL (74 +/- 5 milliseconds). Cryoablation of this area was attempted in 11 dogs. In 9 dogs (82%; mean, 9.0 +/- 4.0; range, 5 to 14), AF was terminated and no longer induced after serial cryoablation.\n\n\nCONCLUSIONS\nSustained AF was readily inducible in most dogs (82%) after rapid atrial pacing. This model was consistently associated with biatrial myopathy and marked changes in atrial vulnerability. An area in the posterior left atrium was uniformly shown to have the shortest AFCL. The results of restoration of sinus rhythm and prevention of inducibility of AF after cryoablation of this area of the left atrium suggest that this area may be critical in the maintenance of AF in this model.",
"title": ""
},
{
"docid": "5b0b8da7faa91343bad6296fd7cb181f",
"text": "Transportation research relies heavily on a variety of data. From sensors to surveys, data supports dayto-day operations as well as long-term planning and decision-making. The challenges that arise due to the volume and variety of data that are found in transportation research can be effectively addressed by ontologies. This opportunity has already been recognized – there are a number of existing transportation ontologies, however the relationship between them is unclear. The goal of this work is to provide an overview of the opportunities for ontologies in transportation research and operation, and to present a survey of existing transportation ontologies to serve two purposes: (1) to provide a resource for the transportation research community to aid in understanding (and potentially selecting between) existing transportation ontologies; and (2) to identify future work for the development of transportation ontologies, by identifying areas that may be lacking.",
"title": ""
},
{
"docid": "cc7ed465017e9fcd1785f1f4b2e51a70",
"text": "We explore using the Outer Ear Interface (OEI) to recognize eating activities. OEI contains a 3D gyroscope and a set of proximity sensors encapsulated in an off-the-shelf earpiece to monitor jaw movement by measuring ear canal deformation. In a laboratory setting with 20 participants, OEI could distinguish eating from other activities, such as walking, talking, and silently reading, with over 90% accuracy (user independent). In a second study, six subjects wore the system for 6 hours each while performing their normal daily activities. OEI correctly classified five minute segments of time as eating or non-eating with 93% accuracy (user dependent).",
"title": ""
},
{
"docid": "6992e0712e99e11b9ebe862c01c0882b",
"text": "This paper is in many respects a continuation of the earlier paper by the author published in Proc. R. Soc. A in 1998 entitled ‘A comprehensive methodology for the design of ships (and other complex systems)’. The earlier paper described the approach to the initial design of ships developedby the author during some 35years of design practice, including two previous secondments to teach ship design atUCL.Thepresent paper not only takes thatdevelopment forward, it also explains how the research tool demonstrating the author’s approach to initial ship design has now been incorporated in an industry based design system to provide a working graphically and numerically integrated design system. This achievement is exemplified by a series of practical design investigations, undertaken by the UCL Design Research Centre led by the author, which were mainly undertaken for industry clients in order to investigate real problems towhich the approachhasbrought significant insights.The other new strand in the present paper is the emphasis on the human factors or large scale ergonomics dimension, vital to complex and large scale design products but rarely hitherto beengiven sufficientprominence in the crucial formative stagesof large scale designbecauseof the inherent difficulties in doing so. The UCL Design Building Block approach has now been incorporated in the established PARAMARINE ship design system through a module entitled SURFCON. Work is now underway on an Engineering and Physical Sciences Research Council joint project with the University of Greenwich to interface the latter’s escape simulation toolmaritimeEXODUSwithSURFCONtoprovide initial design guidance to ship designers on personnelmovement. The paper’s concluding section considers the wider applicability of the integration of simulation during initial design with the graphically driven synthesis to other complex and large scale design tasks. The paper concludes by suggesting how such an approach to complex design can contribute to the teaching of designers and, moreover, how this designapproach can enable a creative qualitative approach to engineering design to be sustained despite the risk that advances in computer based methods might encourage emphasis being accorded to solely to quantitative analysis.",
"title": ""
},
{
"docid": "5565f51ad8e1aaee43f44917befad58a",
"text": "We explore the application of deep residual learning and dilated convolutions to the keyword spotting task, using the recently-released Google Speech Commands Dataset as our benchmark. Our best residual network (ResNet) implementation significantly outperforms Google's previous convolutional neural networks in terms of accuracy. By varying model depth and width, we can achieve compact models that also outperform previous small-footprint variants. To our knowledge, we are the first to examine these approaches for keyword spotting, and our results establish an open-source state-of-the-art reference to support the development of future speech-based interfaces.",
"title": ""
},
{
"docid": "da302043eecd427e70c48c28df189aa3",
"text": "Recent advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks that consist of many low-power, low-cost, and small-size sensor nodes. Sensor networks hold the promise of facilitating large-scale and real-time data processing in complex environments. Security is critical for many sensor network applications, such as military target tracking and security monitoring. To provide security and privacy to small sensor nodes is challenging, due to the limited capabilities of sensor nodes in terms of computation, communication, memory/storage, and energy supply. In this article we survey the state of the art in research on sensor network security.",
"title": ""
},
{
"docid": "f94385118e9fca123bae28093b288723",
"text": "One of the major restrictions on the performance of videobased person re-id is partial noise caused by occlusion, blur and illumination. Since different spatial regions of a single frame have various quality, and the quality of the same region also varies across frames in a tracklet, a good way to address the problem is to effectively aggregate complementary information from all frames in a sequence, using better regions from other frames to compensate the influence of an image region with poor quality. To achieve this, we propose a novel Region-based Quality Estimation Network (RQEN), in which an ingenious training mechanism enables the effective learning to extract the complementary region-based information between different frames. Compared with other feature extraction methods, we achieved comparable results of 92.4%, 76.1% and 77.83% on the PRID 2011, iLIDS-VID and MARS, respectively. In addition, to alleviate the lack of clean large-scale person re-id datasets for the community, this paper also contributes a new high-quality dataset, named “Labeled Pedestrian in the Wild (LPW)” which contains 7,694 tracklets with over 590,000 images. Despite its relatively large scale, the annotations also possess high cleanliness. Moreover, it’s more challenging in the following aspects: the age of characters varies from childhood to elderhood; the postures of people are diverse, including running and cycling in addition to the normal walking state.",
"title": ""
},
{
"docid": "4b886b3ee8774a1e3110c12bdbdcbcdf",
"text": "To engage in cooperative activities with human partners, robots have to possess basic interactive abilities and skills. However, programming such interactive skills is a challenging task, as each interaction partner can have different timing or an alternative way of executing movements. In this paper, we propose to learn interaction skills by observing how two humans engage in a similar task. To this end, we introduce a new representation called Interaction Primitives. Interaction primitives build on the framework of dynamic motor primitives (DMPs) by maintaining a distribution over the parameters of the DMP. With this distribution, we can learn the inherent correlations of cooperative activities which allow us to infer the behavior of the partner and to participate in the cooperation. We will provide algorithms for synchronizing and adapting the behavior of humans and robots during joint physical activities.",
"title": ""
}
] | scidocsrr |
5cffc236db2765f3925a57401d746f06 | Quarterly Time-Series Forecasting With Neural Networks | [
{
"docid": "ab813ff20324600d5b765377588c9475",
"text": "Estimating the flows of rivers can have significant economic impact, as this can help in agricultural water management and in protection from water shortages and possible flood damage. The first goal of this paper is to apply neural networks to the problem of forecasting the flow of the River Nile in Egypt. The second goal of the paper is to utilize the time series as a benchmark to compare between several neural-network forecasting methods.We compare between four different methods to preprocess the inputs and outputs, including a novel method proposed here based on the discrete Fourier series. We also compare between three different methods for the multistep ahead forecast problem: the direct method, the recursive method, and the recursive method trained using a backpropagation through time scheme. We also include a theoretical comparison between these three methods. The final comparison is between different methods to perform longer horizon forecast, and that includes ways to partition the problem into the several subproblems of forecasting K steps ahead.",
"title": ""
}
] | [
{
"docid": "72f6f6484499ccaa0188d2a795daa74c",
"text": "Road detection is one of the most important research areas in driver assistance and automated driving field. However, the performance of existing methods is still unsatisfactory, especially in severe shadow conditions. To overcome those difficulties, first we propose a novel shadow-free feature extractor based on the color distribution of road surface pixels. Then we present a road detection framework based on the extractor, whose performance is more accurate and robust than that of existing extractors. Also, the proposed framework has much low-complexity, which is suitable for usage in practical systems.",
"title": ""
},
{
"docid": "e148d17a78b3b8e144bf0db5a218bd97",
"text": "Novel synchronous machines with doubly salient structure and permanent magnets (PMs) in stator yoke have been developed in this paper. The stator is constituted by T-shaped lamination segments sandwiched with circumferentially magnetized PMs with alternate polarity, while the rotor is identical to that of switched reluctance machines (SRMs). The stator pole number is multiples of six, which is the number of stator poles in a unit machine. Similar to variable flux reluctance machines (VFRMs), the rotor pole numbers in the novel machines are not restricted to those in SRMs. When the stator and rotor pole numbers differ by one (or the number of multiples), the novel synchronous machines show sinusoidal bipolar phase flux linkage and back electromotive force (EMF), which make the machines suitable for brushless ac operation. Moreover, two prototype machines with six-pole stator and five-pole, seven-pole rotors are designed and optimized by 2-D finite element analysis. It shows that, compared with VFRMs, the novel machines can produce ~70 % higher torque density with the same copper loss and machine size. Meanwhile, the proposed machines have negligible reluctance torque due to very low saliency ratio. Experimental results of back EFM, cogging torque, and average torque on the prototypes are provided to validate the analysis.",
"title": ""
},
{
"docid": "a914d26b2086e20a7452f0634574820d",
"text": "In this paper, we provide a semantic foundation for role-related concepts in enterprise modelling. We use a conceptual modelling framework to provide a well-founded underpinning for these concepts. We review a number of enterprise modelling approaches in light of the concepts described. This allows us to understand the various approaches, to contrast them and to identify problems in the definition and/or usage of these concepts.",
"title": ""
},
{
"docid": "60c9355aba12e84461519f28b157c432",
"text": "Successful recurrent models such as long short-term memories (LSTMs) and gated recurrent units (GRUs) use ad hoc gating mechanisms. Empirically these models have been found to improve the learning of medium to long term temporal dependencies and to help with vanishing gradient issues. We prove that learnable gates in a recurrent model formally provide quasiinvariance to general time transformations in the input data. We recover part of the LSTM architecture from a simple axiomatic approach. This result leads to a new way of initializing gate biases in LSTMs and GRUs. Experimentally, this new chrono initialization is shown to greatly improve learning of long term dependencies, with minimal implementation effort. Recurrent neural networks (e.g. (Jaeger, 2002)) are a standard machine learning tool to model and represent temporal data; mathematically they amount to learning the parameters of a parameterized dynamical system so that its behavior optimizes some criterion, such as the prediction of the next data in a sequence. Handling long term dependencies in temporal data has been a classical issue in the learning of recurrent networks. Indeed, stability of a dynamical system comes at the price of exponential decay of the gradient signals used for learning, a dilemma known as the vanishing gradient problem (Pascanu et al., 2012; Hochreiter, 1991; Bengio et al., 1994). This has led to the introduction of recurrent models specifically engineered to help with such phenomena. Use of feedback connections (Hochreiter & Schmidhuber, 1997) and control of feedback weights through gating mechanisms (Gers et al., 1999) partly alleviate the vanishing gradient problem. The resulting architectures, namely long short-term memories (LSTMs (Hochreiter & Schmidhuber, 1997; Gers et al., 1999)) and gated recurrent units (GRUs (Chung et al., 2014)) have become a standard for treating sequential data. Using orthogonal weight matrices is another proposed solution to the vanishing gradient problem, thoroughly studied in (Saxe et al., 2013; Le et al., 2015; Arjovsky et al., 2016; Wisdom et al., 2016; Henaff et al., 2016). This comes with either computational overhead, or limitation in representational power. Furthermore, restricting the weight matrices to the set of orthogonal matrices makes forgetting of useless information difficult. The contribution of this paper is threefold: ∙ We show that postulating invariance to time transformations in the data (taking invariance to time warping as an axiom) necessarily leads to a gate-like mechanism in recurrent models (Section 1). This provides a clean derivation of part of the popular LSTM and GRU architectures from first principles. In this framework, gate values appear as time contraction or time dilation coefficients, similar in spirit to the notion of time constant introduced in (Mozer, 1992). ∙ From these insights, we provide precise prescriptions on how to initialize gate biases (Section 2) depending on the range of time dependencies to be captured. It has previously been advocated that setting the bias of the forget gate of LSTMs to 1 or 2 provides overall good performance (Gers & Schmidhuber, 2000; Jozefowicz et al., 2015). The viewpoint here 1 ar X iv :1 80 4. 11 18 8v 1 [ cs .L G ] 2 3 M ar 2 01 8 Published as a conference paper at ICLR 2018 explains why this is reasonable in most cases, when facing medium term dependencies, but fails when facing long to very long term dependencies. ∙ We test the empirical benefits of the new initialization on both synthetic and real world data (Section 3). We observe substantial improvement with long-term dependencies, and slight gains or no change when short-term dependencies dominate. 1 FROM TIME WARPING INVARIANCE TO GATING When tackling sequential learning problems, being resilient to a change in time scale is crucial. Lack of resilience to time rescaling implies that we can make a problem arbitrarily difficult simply by changing the unit of measurement of time. Ordinary recurrent neural networks are highly nonresilient to time rescaling: a task can be rendered impossible for an ordinary recurrent neural network to learn, simply by inserting a fixed, small number of zeros or whitespaces between all elements of the input sequence. An explanation is that, with a given number of recurrent units, the class of functions representable by an ordinary recurrent network is not invariant to time rescaling. Ideally, one would like a recurrent model to be able to learn from time-warped input data x(c(t)) as easily as it learns from data x(t), at least if the time warping c(t) is not overly complex. The change of time c may represent not only time rescalings, but, for instance, accelerations or decelerations of the phenomena in the input data. We call a class of models invariant to time warping, if for any model in the class with input data x(t), and for any time warping c(t), there is another (or the same) model in the class that behaves on data x(c(t)) in the same way the original model behaves on x(t). (In practice, this will only be possible if the warping c is not too complex.) We will show that this is deeply linked to having gating mechanisms in the model. Invariance to time rescaling Let us first discuss the simpler case of a linear time rescaling. Formally, this is a linear transformation of time, that is c : R+ −→ R+ t ↦−→ αt (1) with α > 0. For instance, receiving a new input character every 10 time steps only, would correspond to α = 0.1. Studying time transformations is easier in the continuous-time setting. The discrete time equation of a basic recurrent network with hidden state ht, ht+1 = tanh (Wx xt +Wh ht + b) (2) can be seen as a time-discretized version of the continuous-time equation1 dh(t) dt = tanh (︀ Wx x(t) +Wh h(t) + b )︀ − h(t) (3) namely, (2) is the Taylor expansion h(t+ δt) ≈ h(t) + δt dh(t) dt with discretization step δt = 1. Now imagine that we want to describe time-rescaled data x(αt) with a model from the same class. Substituting t← c(t) = αt, x(t)← x(αt) and h(t)← h(αt) and rewriting (3) in terms of the new variables, the time-rescaled model satisfies2 dh(t) dt = α tanh (︀ Wx x(t) +Wh h(t) + b )︀ − αh(t). (4) However, when translated back to a discrete-time model, this no longer describes an ordinary RNN but a leaky RNN (Jaeger, 2002, §8.1). Indeed, taking the Taylor expansion of h(t+ δt) with δt = 1 in (4) yields the recurrent model ht+1 = α tanh (Wx xt +Wh ht + b) + (1− α)ht (5) We will use indices ht for discrete time and brackets h(t) for continuous time. More precisely, introduce a new time variable T and set the model and data with variable T to H(T ) := h(c(T )) and X(T ) := x(c(T )). Then compute dH(T ) dT . Then rename H to h, X to x and T to t to match the original notation.",
"title": ""
},
{
"docid": "bfc349d95143237cc1cf55f77cb2044f",
"text": "Additive manufacturing, commonly referred to as 3D printing, is a technology that builds three-dimensional structures and components layer by layer. Bioprinting is the use of 3D printing technology to fabricate tissue constructs for regenerative medicine from cell-laden bio-inks. 3D printing and bioprinting have huge potential in revolutionizing the field of tissue engineering and regenerative medicine. This paper reviews the application of 3D printing and bioprinting in the field of pediatrics.",
"title": ""
},
{
"docid": "44e3ca0f64566978c3e0d0baeaa93543",
"text": "Many applications of fast Fourier transforms (FFT’s), such as computer tomography, geophysical signal processing, high-resolution imaging radars, and prediction filters, require high-precision output. An error analysis reveals that the usual method of fixed-point computation of FFT’s of vectors of length2 leads to an average loss of/2 bits of precision. This phenomenon, often referred to as computational noise, causes major problems for arithmetic units with limited precision which are often used for real-time applications. Several researchers have noted that calculation of FFT’s with algebraic integers avoids computational noise entirely, see, e.g., [1]. We will combine a new algorithm for approximating complex numbers by cyclotomic integers with Chinese remaindering strategies to give an efficient algorithm to compute -bit precision FFT’s of length . More precisely, we will approximate complex numbers by cyclotomic integers in [ 2 2 ] whose coefficients, when expressed as polynomials in 2 2 , are bounded in absolute value by some integer . For fixed our algorithm runs in time (log( )), and produces an approximation with worst case error of (1 2 ). We will prove that this algorithm has optimal worst case error by proving a corresponding lower bound on the worst case error of any approximation algorithm for this task. The main tool for designing the algorithms is the use of the cyclotomic units, a subgroup of finite index in the unit group of the cyclotomic field. First implementations of our algorithms indicate that they are fast enough to be used for the design of low-cost high-speed/highprecision FFT chips.",
"title": ""
},
{
"docid": "aa1a97f8f6f9f1c2627f63e1ec13e8cf",
"text": "In this paper, we review recent emerging theoretical and technological advances of artificial intelligence (AI) in the big data settings. We conclude that integrating data-driven machine learning with human knowledge (common priors or implicit intuitions) can effectively lead to explainable, robust, and general AI, as follows: from shallow computation to deep neural reasoning; from merely data-driven model to data-driven with structured logic rules models; from task-oriented (domain-specific) intelligence (adherence to explicit instructions) to artificial general intelligence in a general context (the capability to learn from experience). Motivated by such endeavors, the next generation of AI, namely AI 2.0, is positioned to reinvent computing itself, to transform big data into structured knowledge, and to enable better decision-making for our society.",
"title": ""
},
{
"docid": "90ba548ae91dbd94ea547a372422181f",
"text": "The hypothesis that Attention-Deficit/Hyperactivity Disorder (ADHD) reflects a primary inhibitory executive function deficit has spurred a substantial literature. However, empirical findings and methodological issues challenge the etiologic primacy of inhibitory and executive deficits in ADHD. Based on accumulating evidence of increased intra-individual variability in ADHD, we reconsider executive dysfunction in light of distinctions between 'hot' and 'cool' executive function measures. We propose an integrative model that incorporates new neuroanatomical findings and emphasizes the interactions between parallel processing pathways as potential loci for dysfunction. Such a reconceptualization provides a means to transcend the limits of current models of executive dysfunction in ADHD and suggests a plan for future research on cognition grounded in neurophysiological and developmental considerations.",
"title": ""
},
{
"docid": "453d5d826e0292245f8fa12ec564c719",
"text": "Work with patient H.M., beginning in the 1950s, established key principles about the organization of memory that inspired decades of experimental work. Since H.M., the study of human memory and its disorders has continued to yield new insights and to improve understanding of the structure and organization of memory. Here we review this work with emphasis on the neuroanatomy of medial temporal lobe and diencephalic structures important for memory, multiple memory systems, visual perception, immediate memory, memory consolidation, the locus of long-term memory storage, the concepts of recollection and familiarity, and the question of how different medial temporal lobe structures may contribute differently to memory functions.",
"title": ""
},
{
"docid": "1ceb1718fe3200853204d795c80481ab",
"text": "Open-circuit-voltage (OCV) data is widely used for characterizing battery properties under different conditions. It contains important information that can help to identify battery state-of-charge (SOC) and state-of-health (SOH). While various OCV models have been developed for battery SOC estimation, few have been designed for SOH monitoring. In this paper, we propose a unified OCV model that can be applied for both SOC estimation and SOH monitoring. Improvements in SOC estimation using the new model compared to other existing models are demonstrated. Moreover, it is shown that the proposed OCV model can be used to perform battery SOH monitoring as it effectively captures aging information based on incremental capacity analysis (ICA). Parametric analysis and model complexity reduction are also addressed. Experimental data is used to illustrate the effectiveness of the model and its simplified version in the application context of SOC estimation and SOH monitoring. 2014 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "574b980883ffb73dd7cddf62f627c6b1",
"text": "Getting computers to understand and process audio recordings in terms of their musical content is a difficult challenge. We describe a method in which general, polyphonic audio recordings of music can be aligned to symbolic score information in standard MIDI files. Because of the difficulties of polyphonic transcription, we perform matching directly on acoustic features that we extract from MIDI and audio. Polyphonic audio matching can be used for polyphonic score following, building intelligent editors that understand the content of recorded audio, and the analysis of expressive performance.",
"title": ""
},
{
"docid": "170e2b0f15d9485bb3c00026c6c384a8",
"text": "Chatbots are a rapidly expanding application of dialogue systems with companies switching to bot services for customer support, and new applications for users interested in casual conversation. One style of casual conversation is argument; many people love nothing more than a good argument. Moreover, there are a number of existing corpora of argumentative dialogues, annotated for agreement and disagreement, stance, sarcasm and argument quality. This paper introduces Debbie, a novel arguing bot, that selects arguments from conversational corpora, and aims to use them appropriately in context. We present an initial working prototype of Debbie, with some preliminary evaluation and describe future work.",
"title": ""
},
{
"docid": "f8c4fd23f163c0a604569b5ecf4bdefd",
"text": "The goal of interactive machine learning is to help scientists and engineers exploit more specialized data from within their deployed environment in less time, with greater accuracy and fewer costs. A basic introduction to the main components is provided here, untangling the many ideas that must be combined to produce practical interactive learning systems. This article also describes recent developments in machine learning that have significantly advanced the theoretical and practical foundations for the next generation of interactive tools.",
"title": ""
},
{
"docid": "a3c011d846fed4f910cd3b112767ccc1",
"text": "Tooth morphometry is known to be influenced by cultural, environmental and racial factors. Tooth size standards can be used in age and sex determination. One hundred models (50 males & 50 females) of normal occlusion were evaluated and significant correlations (p<0.001) were found to exist between the combined maxillary incisor widths and the maxillary intermolar and interpremolar arch widths. The study establishes the morphometric criterion for premolar and molar indices and quantifies the existence of a statistically significant sexual dimorphism in arch widths (p<0.02). INTRODUCTION Teeth are an excellent material in living and non-living populations for anthropological, genetic, odontologic and forensic investigations 1 .Their morphometry is known to be influenced by cultural, environmental and racial factors. The variations in tooth form are a common occurrence & these can be studied by measurements. Out of the two proportionswidth and length, the former is considered to be more important 2 . Tooth size standards can be used in age and sex determination 3 . Whenever it is possible to predict the sex, identification is simplified because then only missing persons of one sex need to be considered. In this sense identification of sex takes precedence over age 4 . Various features like tooth morphology and crown size are characteristic for males and females 5 .The present study on the maxillary arch takes into account the premolar arch width, molar arch width and the combined width of the maxillary central incisors in both the sexes. Pont's established constant ratio's between tooth sizes and arch widths in French population which came to be known as premolar and molar indices 6 .In the ideal dental arch he concluded that the ratio of combined incisor width to transverse arch width was .80 in the premolar area and .64 in the molar area. There has been a recent resurgence of interest in the clinical use of premolar and molar indices for establishing dental arch development objectives 7 . The present study was conducted to ascertain whether or not Pont's Index can be used reliably on north Indians and to establish the norms for the same. MATERIAL AND METHODS SELECTION CRITERIA One hundred subjects, fifty males and fifty females in the age group of 17-21 years were selected for the study as attrition is considered to be minimal for this age group. The study was conducted on the students of Sudha Rustagi College of Dental Sciences & Research, Faridabad, Haryana. INCLUSION CRITERIA Healthy state of gingival and peridontium.",
"title": ""
},
{
"docid": "bf85be55fefe866d6cf35161bfa08836",
"text": "Today, video distribution platforms use adaptive video streaming to deliver the maximum Quality of Experience to a wide range of devices connected to the Internet through different access networks. Among the techniques employed to implement video adaptivity, the stream-switching over HTTP is getting a wide acceptance due to its deployment and implementation simplicity. Recently it has been shown that the client-side algorithms proposed so far generate an on-off traffic pattern that may lead to unfairness and underutilization when many video flows share a bottleneck. In this paper we propose ELASTIC (fEedback Linearization Adaptive STreamIng Controller), a client-side controller designed using feedback control theory that does not generate an on-off traffic pattern. By employing a controlled testbed, allowing bandwidth capacity and delays to be set, we compare ELASTIC with other client-side controllers proposed in the literature. In particular, we have checked to what extent the considered algorithms are able to: 1) fully utilize the bottleneck, 2) fairly share the bottleneck, 3) obtain a fair share when TCP greedy flows share the bottleneck with video flows. The obtained results show that ELASTIC achieves a very high fairness and is able to get the fair share when coexisting with TCP greedy flows.",
"title": ""
},
{
"docid": "7490197babcd735c48e1c42af03c8473",
"text": "Clustering is one of the most fundamental tasks in data analysis and machine learning. It is central to many data-driven applications that aim to separate the data into groups with similar patterns. Moreover, clustering is a complex procedure that is affected significantly by the choice of the data representation method. Recent research has demonstrated encouraging clustering results by learning effectively these representations. In most of these works a deep auto-encoder is initially pre-trained to minimize a reconstruction loss, and then jointly optimized with clustering centroids in order to improve the clustering objective. Those works focus mainly on the clustering phase of the procedure, while not utilizing the potential benefit out of the initial phase. In this paper we propose to optimize an auto-encoder with respect to a discriminative pairwise loss function during the auto-encoder pre-training phase. We demonstrate the high accuracy obtained by the proposed method as well as its rapid convergence (e.g. reaching above 92% accuracy on MNIST during the pre-training phase, in less than 50 epochs), even with small networks.",
"title": ""
},
{
"docid": "ec3661f09e857568d32c6452bd8c4445",
"text": "User identification and differentiation have implications in many application domains, including security, personalization, and co-located multiuser systems. In response, dozens of approaches have been developed, from fingerprint and retinal scans, to hand gestures and RFID tags. In this work, we propose CapAuth, a technique that uses existing, low-level touchscreen data, combined with machine learning classifiers, to provide real-time authentication and even identification of users. As a proof-of-concept, we ran our software on an off-the-shelf Nexus 5 smartphone. Our user study demonstrates twenty-participant authentication accuracies of 99.6%. For twenty-user identification, our software achieved 94.0% accuracy and 98.2% on groups of four, simulating family use.",
"title": ""
},
{
"docid": "5f89aac70e93b9fcf4c37d119770f747",
"text": "Partial differential equations (PDEs) play a prominent role in many disciplines of science and engineering. PDEs are commonly derived based on empirical observations. However, with the rapid development of sensors, computational power, and data storage in the past decade, huge quantities of data can be easily collected and efficiently stored. Such vast quantity of data offers new opportunities for data-driven discovery of physical laws. Inspired by the latest development of neural network designs in deep learning, we propose a new feed-forward deep network, called PDENet, to fulfill two objectives at the same time: to accurately predict dynamics of complex systems and to uncover the underlying hidden PDE models. Comparing with existing approaches, our approach has the most flexibility by learning both differential operators and the nonlinear response function of the underlying PDE model. A special feature of the proposed PDE-Net is that all filters are properly constrained, which enables us to easily identify the governing PDE models while still maintaining the expressive and predictive power of the network. These constrains are carefully designed by fully exploiting the relation between the orders of differential operators and the orders of sum rules of filters (an important concept originated from wavelet theory). Numerical experiments show that the PDE-Net has the potential to uncover the hidden PDE of the observed dynamics, and predict the dynamical behavior for a relatively long time, even in a noisy environment. Equal contribution School of Mathematical Sciences, Peking University, Beijing, China Beijing Computational Science Research Center, Beijing, China Beijing International Center for Mathematical Research, Peking University, Beijing, China Center for Data Science, Peking University Laboratory for Biomedical Image Analysis, Beijing Institute of Big Data Research. Correspondence to: Bin Dong <dongbin@math.pku.edu.cn>. Proceedings of the 35 th International Conference on Machine Learning, Stockholm, Sweden, PMLR 80, 2018. Copyright 2018 by the author(s).",
"title": ""
},
{
"docid": "1168c9e6ce258851b15b7e689f60e218",
"text": "Modern deep learning architectures produce highly accurate results on many challenging semantic segmentation datasets. State-of-the-art methods are, however, not directly transferable to real-time applications or embedded devices, since naïve adaptation of such systems to reduce computational cost (speed, memory and energy) causes a significant drop in accuracy. We propose ContextNet, a new deep neural network architecture which builds on factorized convolution, network compression and pyramid representation to produce competitive semantic segmentation in real-time with low memory requirement. ContextNet combines a deep network branch at low resolution that captures global context information efficiently with a shallow branch that focuses on highresolution segmentation details. We analyse our network in a thorough ablation study and present results on the Cityscapes dataset, achieving 66.1% accuracy at 18.3 frames per second at full (1024× 2048) resolution (23.2 fps with pipelined computations for streamed data).",
"title": ""
},
{
"docid": "e0696dfe3d01003197516adbabeac67d",
"text": "The incidence of rectal foreign bodies is increasing by the day, though not as common as that of upper gastrointestinal foreign bodies. Various methods for removal of foreign bodies have been reported. Removal during endoscopy using endoscopic devices is simple and safe, but if the foreign body is too large to be removed by this method, other methods are required. We report two cases of rectal foreign body removal by a relatively simple and inexpensive technique. A 42-year-old man with a vibrator in the rectum was admitted due to inability to remove it by himself and various endoscopic methods failed. Finally, the vibrator was removed successfully by using tenaculum forceps under endoscopic assistance. Similarly, a 59-year-old man with a carrot in the rectum was admitted. The carrot was removed easily by using the same method as that in the previous case. The use of tenaculum forceps under endoscopic guidance may be a useful method for removal of rectal foreign bodies.",
"title": ""
}
] | scidocsrr |
8609b11d7280df07ab594d71f7496450 | Weakly Supervised Learning for Whole Slide Lung Cancer Image Classification | [
{
"docid": "f1cd96ddd519f35cf3ddc19f84d232cf",
"text": "This paper presents a deep learning approach for automatic detection and visual analysis of invasive ductal carcinoma (IDC) tissue regions in whole slide images (WSI) of breast cancer (BCa). Deep learning approaches are learn-from-data methods involving computational modeling of the learning process. This approach is similar to how human brain works using different interpretation levels or layers of most representative and useful features resulting into a hierarchical learned representation. These methods have been shown to outpace traditional approaches of most challenging problems in several areas such as speech recognition and object detection. Invasive breast cancer detection is a time consuming and challenging task primarily because it involves a pathologist scanning large swathes of benign regions to ultimately identify the areas of malignancy. Precise delineation of IDC in WSI is crucial to the subsequent estimation of grading tumor aggressiveness and predicting patient outcome. DL approaches are particularly adept at handling these types of problems, especially if a large number of samples are available for training, which would also ensure the generalizability of the learned features and classifier. The DL framework in this paper extends a number of convolutional neural networks (CNN) for visual semantic analysis of tumor regions for diagnosis support. The CNN is trained over a large amount of image patches (tissue regions) from WSI to learn a hierarchical part-based representation. The method was evaluated over a WSI dataset from 162 patients diagnosed with IDC. 113 slides were selected for training and 49 slides were held out for independent testing. Ground truth for quantitative evaluation was provided via expert delineation of the region of cancer by an expert pathologist on the digitized slides. The experimental evaluation was designed to measure classifier accuracy in detecting IDC tissue regions in WSI. Our method yielded the best quantitative results for automatic detection of IDC regions in WSI in terms of F-measure and balanced accuracy (71.80%, 84.23%), in comparison with an approach using handcrafted image features (color, texture and edges, nuclear textural and architecture), and a machine learning classifier for invasive tumor classification using a Random Forest. The best performing handcrafted features were fuzzy color histogram (67.53%, 78.74%) and RGB histogram (66.64%, 77.24%). Our results also suggest that at least some of the tissue classification mistakes (false positives and false negatives) were less due to any fundamental problems associated with the approach, than the inherent limitations in obtaining a very highly granular annotation of the diseased area of interest by an expert pathologist.",
"title": ""
},
{
"docid": "ec90e30c0ae657f25600378721b82427",
"text": "We use deep max-pooling convolutional neural networks to detect mitosis in breast histology images. The networks are trained to classify each pixel in the images, using as context a patch centered on the pixel. Simple postprocessing is then applied to the network output. Our approach won the ICPR 2012 mitosis detection competition, outperforming other contestants by a significant margin.",
"title": ""
},
{
"docid": "625b96d21cb9ff05785aa34c98c567ff",
"text": "The number of mitoses per tissue area gives an important aggressiveness indication of the invasive breast carcinoma. However, automatic mitosis detection in histology images remains a challenging problem. Traditional methods either employ hand-crafted features to discriminate mitoses from other cells or construct a pixel-wise classifier to label every pixel in a sliding window way. While the former suffers from the large shape variation of mitoses and the existence of many mimics with similar appearance, the slow speed of the later prohibits its use in clinical practice. In order to overcome these shortcomings, we propose a fast and accurate method to detect mitosis by designing a novel deep cascaded convolutional neural network, which is composed of two components. First, by leveraging the fully convolutional neural network, we propose a coarse retrieval model to identify and locate the candidates of mitosis while preserving a high sensitivity. Based on these candidates, a fine discrimination model utilizing knowledge transferred from cross-domain is developed to further single out mitoses from hard mimics. Our approach outperformed other methods by a large margin in 2014 ICPR MITOS-ATYPIA challenge in terms of detection accuracy. When compared with the state-of-the-art methods on the 2012 ICPR MITOSIS data (a smaller and less challenging dataset), our method achieved comparable or better results with a roughly 60 times faster speed.",
"title": ""
}
] | [
{
"docid": "a1d9fef7fda8a547df136565afd5a443",
"text": "The authors proposed a circular-polarized array antenna by using hexagonal radiating apertures in the 60 GHz-band. The hexagonal radiating aperture is designed, and the good axial ratio characteristics are achieved in the boresight. We analyze the full structure of the 16×16-element array that combines the 2×2-element subarrays and a 64-way divider. The reflection is less than −14dB over 4.9% bandwidth where the axial ratio is less than 2.5dB. High antenna efficiency of 88.7% is obtained at 61.5GHz with the antenna gain of 33.3dBi including losses. The 1dB-down gain bandwidth is 6.8%.",
"title": ""
},
{
"docid": "6a757e3bb48be08ce6a56a08a3fc84d4",
"text": "The completion of a high-quality, comprehensive sequence of the human genome, in this fiftieth anniversary year of the discovery of the double-helical structure of DNA, is a landmark event. The genomic era is now a reality. In contemplating a vision for the future of genomics research,it is appropriate to consider the remarkable path that has brought us here. The rollfold (Figure 1) shows a timeline of landmark accomplishments in genetics and genomics, beginning with Gregor Mendel’s discovery of the laws of heredity and their rediscovery in the early days of the twentieth century.Recognition of DNA as the hereditary material, determination of its structure, elucidation of the genetic code, development of recombinant DNA technologies, and establishment of increasingly automatable methods for DNA sequencing set the stage for the Human Genome Project (HGP) to begin in 1990 (see also www.nature.com/nature/DNA50). Thanks to the vision of the original planners, and the creativity and determination of a legion of talented scientists who decided to make this project their overarching focus, all of the initial objectives of the HGP have now been achieved at least two years ahead of expectation, and a revolution in biological research has begun. The project’s new research strategies and experimental technologies have generated a steady stream of ever-larger and more complex genomic data sets that have poured into public databases and have transformed the study of virtually all life processes. The genomic approach of technology development and large-scale generation of community resource data sets has introduced an important new dimension into biological and biomedical research. Interwoven advances in genetics, comparative genomics, highthroughput biochemistry and bioinformatics",
"title": ""
},
{
"docid": "39cf15285321c7d56904c8c59b3e1373",
"text": "J. Naidoo1*, D. B. Page2, B. T. Li3, L. C. Connell3, K. Schindler4, M. E. Lacouture5,6, M. A. Postow3,6 & J. D. Wolchok3,6 Sidney Kimmel Comprehensive Cancer Center, Johns Hopkins University, Baltimore; Providence Portland Medical Center and Earl A. Chiles Research Institute, Portland; Department of Medicine and Ludwig Center, Memorial Sloan Kettering Cancer Center, New York, USA; Department of Dermatology, Medical University of Vienna, Vienna, Austria; Dermatology Service, Memorial Sloan Kettering Cancer Center, New York; Department of Medicine, Weill Cornell Medical College, New York, USA",
"title": ""
},
{
"docid": "edfadb9f9812914e7a527022630ad015",
"text": "This department is about building software with security in mind. Since it began in 2004, it has focused on the kinds of activities that constitute a secure development life cycle. As of to day, we're broadening that charter to include all the essential ingredients of a sustained soft ware security initiative. Instead of focusing on one turn of the crank that yields one new piece of software, we'll consider the ongoing organizational commitments necessary to facilitate se cure software development.",
"title": ""
},
{
"docid": "199df544c19711fbee2dd49e60956243",
"text": "Languages vary strikingly in how they encode motion events. In some languages (e.g. English), manner of motion is typically encoded within the verb, while direction of motion information appears in modifiers. In other languages (e.g. Greek), the verb usually encodes the direction of motion, while the manner information is often omitted, or encoded in modifiers. We designed two studies to investigate whether these language-specific patterns affect speakers' reasoning about motion. We compared the performance of English and Greek children and adults (a) in nonlinguistic (memory and categorization) tasks involving motion events, and (b) in their linguistic descriptions of these same motion events. Even though the two linguistic groups differed significantly in terms of their linguistic preferences, their performance in the nonlinguistic tasks was identical. More surprisingly, the linguistic descriptions given by subjects within language also failed to correlate consistently with their memory and categorization performance in the relevant regards. For the domain studied, these results are consistent with the view that conceptual development and organization are largely independent of language-specific labeling practices. The discussion emphasizes that the necessarily sketchy nature of language use assures that it will be at best a crude index of thought.",
"title": ""
},
{
"docid": "71da7722f6ce892261134bd60ca93ab7",
"text": "Semantically annotated data, using markup languages like RDFa and Microdata, has become more and more publicly available in the Web, especially in the area of e-commerce. Thus, a large amount of structured product descriptions are freely available and can be used for various applications, such as product search or recommendation. However, little efforts have been made to analyze the categories of the available product descriptions. Although some products have an explicit category assigned, the categorization schemes vary a lot, as the products originate from thousands of different sites. This heterogeneity makes the use of supervised methods, which have been proposed by most previous works, hard to apply. Therefore, in this paper, we explain how distantly supervised approaches can be used to exploit the heterogeneous category information in order to map the products to set of target categories from an existing product catalogue. Our results show that, even though this task is by far not trivial, we can reach almost 56% accuracy for classifying products into 37 categories.",
"title": ""
},
{
"docid": "ee72a297c05a438a49e86a45b81db17f",
"text": "Screening for cyclodextrin glycosyltransferase (CGTase)-producing alkaliphilic bacteria from samples collected from hyper saline soda lakes (Wadi Natrun Valley, Egypt), resulted in isolation of potent CGTase producing alkaliphilic bacterium, termed NPST-10. 16S rDNA sequence analysis identified the isolate as Amphibacillus sp. CGTase was purified to homogeneity up to 22.1 fold by starch adsorption and anion exchange chromatography with a yield of 44.7%. The purified enzyme was a monomeric protein with an estimated molecular weight of 92 kDa using SDS-PAGE. Catalytic activities of the enzyme were found to be 88.8 U mg(-1) protein, 20.0 U mg(-1) protein and 11.0 U mg(-1) protein for cyclization, coupling and hydrolytic activities, respectively. The enzyme was stable over a wide pH range from pH 5.0 to 11.0, with a maximal activity at pH 8.0. CGTase exhibited activity over a wide temperature range from 45 °C to 70 °C, with maximal activity at 50 °C and was stable at 30 °C to 55 °C for at least 1 h. Thermal stability of the purified enzyme could be significantly improved in the presence of CaCl(2). K(m) and V(max) values were estimated using soluble starch as a substrate to be 1.7 ± 0.15 mg/mL and 100 ± 2.0 μmol/min, respectively. CGTase was significantly inhibited in the presence of Co(2+), Zn(2+), Cu(2+), Hg(2+), Ba(2+), Cd(2+), and 2-mercaptoethanol. To the best of our knowledge, this is the first report of CGTase production by Amphibacillus sp. The achieved high conversion of insoluble raw corn starch into cyclodextrins (67.2%) with production of mainly β-CD (86.4%), makes Amphibacillus sp. NPST-10 desirable for the cyclodextrin production industry.",
"title": ""
},
{
"docid": "a4154317f6bb6af635edb1b2ef012d09",
"text": "The pulp industry in Taiwan discharges tons of wood waste and pulp sludge (i.e., wastewater-derived secondary sludge) per year. The mixture of these two bio-wastes, denoted as wood waste with pulp sludge (WPS), has been commonly converted to organic fertilizers for agriculture application or to soil conditioners. However, due to energy demand, the WPS can be utilized in a beneficial way to mitigate an energy shortage. This study elucidated the performance of applying torrefaction, a bio-waste to energy method, to transform the WPS into solid bio-fuel. Two batches of the tested WPS (i.e., WPS1 and WPS2) were generated from a virgin pulp factory in eastern Taiwan. The WPS1 and WPS2 samples contained a large amount of organics and had high heating values (HHV) on a dry-basis (HHD) of 18.30 and 15.72 MJ/kg, respectively, exhibiting a potential for their use as a solid bio-fuel. However, the wet WPS as received bears high water and volatile matter content and required de-watering, drying, and upgrading. After a 20 min torrefaction time (tT), the HHD of torrefied WPS1 (WPST1) can be enhanced to 27.49 MJ/kg at a torrefaction temperature (TT) of 573 K, while that of torrefied WPS2 (WPST2) increased to 19.74 MJ/kg at a TT of 593 K. The corresponding values of the energy densification ratio of torrefied solid bio-fuels of WPST1 and WPST2 can respectively rise to 1.50 and 1.25 times that of the raw bio-waste. The HHD of WPST1 of 27.49 MJ/kg is within the range of 24–35 MJ/kg for bituminous coal. In addition, the wet-basis HHV of WPST1 with an equilibrium moisture content of 5.91 wt % is 25.87 MJ/kg, which satisfies the Quality D coal specification of the Taiwan Power Co., requiring a value of above 20.92 MJ/kg.",
"title": ""
},
{
"docid": "7dde3558e82d37109d6d4d9b84f14e74",
"text": "Background/Objectives:The contemporary American diet figures centrally in the pathogenesis of numerous chronic diseases– 'diseases of civilization'–such as obesity and diabetes. We investigated in type 2 diabetes whether a diet similar to that consumed by our pre-agricultural hunter-gatherer ancestors ('Paleolithic' type diet) confers health benefits.Subjects/Methods:We performed an outpatient, metabolically controlled diet study in type 2 diabetes patients. We compared the findings in 14 participants consuming a Paleo diet comprising lean meat, fruits, vegetables and nuts, and excluding added salt, and non-Paleolithic-type foods comprising cereal grains, dairy or legumes, with 10 participants on a diet based on recommendations by the American Diabetes Association (ADA) containing moderate salt intake, low-fat dairy, whole grains and legumes. There were three ramp-up diets for 7 days, then 14 days of the test diet. Outcomes included the following: mean arterial blood pressure; 24-h urine electrolytes; hemoglobin A1c and fructosamine levels; insulin resistance by euglycemic hyperinsulinemic clamp and lipid levels.Results:Both groups had improvements in metabolic measures, but the Paleo diet group had greater benefits on glucose control and lipid profiles. Also, on the Paleo diet, the most insulin-resistant subjects had a significant improvement in insulin sensitivity (r=0.40, P=0.02), but no such effect was seen in the most insulin-resistant subjects on the ADA diet (r= 0.39, P=0.3).Conclusions:Even short-term consumption of a Paleolithic-type diet improved glucose control and lipid profiles in people with type 2 diabetes compared with a conventional diet containing moderate salt intake, low-fat dairy, whole grains and legumes.",
"title": ""
},
{
"docid": "4930e09f069eee618e8e0ad100cd5505",
"text": "While constraint-induced movement therapy (CIMT) is one of the most promising techniques for upper limb rehabilitation after stroke, it requires high residual function to start with. Robotic device, on the other hand, can provide intention-driven assistance and is proven capable to complement conventional therapy. However, with many robotic devices focus on more proximal joints like shoulder and elbow, recovery of hand and fingers functions have become a challenge. Here we propose the use of robotic device to assist hand and fingers functions training and we aim to evaluate the potential efficacy of intention-driven robot-assisted fingers training. Participants (6 to 24 months post-stroke) were randomly assigned into two groups: robot-assisted (robot) and non-assisted (control) fingers training groups. Each participant underwent 20-session training. Action Research Arm Test (ARAT) was used as the primary outcome measure, while, Wolf Motor Function Test (WMFT) score, its functional tasks (WMFT-FT) sub-score, Fugl-Meyer Assessment (FMA), its shoulder and elbow (FMA-SE) sub-score, and finger individuation index (FII) served as secondary outcome measures. Nineteen patients completed the 20-session training (Trial Registration: HKClinicalTrials.com HKCTR-1554); eighteen of them came back for a 6-month follow-up. Significant improvements (p < 0.05) were found in the clinical scores for both robot and control group after training. However, only robot group maintained the significant difference in the ARAT and FMA-SE six months after the training. The WMFT-FT score and time post-training improvements of robot group were significantly better than those of the control group. This study showed the potential efficacy of robot-assisted fingers training for hand and fingers rehabilitation and its feasibility to facilitate early rehabilitation for a wider population of stroke survivors; and hence, can be used to complement CIMT.",
"title": ""
},
{
"docid": "7f82573c3fe0a7195ddd138b1425b80c",
"text": "Introduction: Holoprosencephaly with unfused thalami is a rare malformation involving the forebrain and the face. The epidemiology of the disease is poorly known due to paucity of population based studies. Case Report: A 32-year-old grand multipara at 27th week gestation found on routine ultrasound examination to have a single live fetus with the fetal head showing dilated single cerebral ventricle, with no evidence of anterior midline echo (falx, inter hemispheric cistern and septum pellucidum). The thalami appear relatively small but not fused with a thin midline linear echoic septum separating them. Two subsequent sonograms at 30th and 33rd weeks of pregnancy, including coronal sonograms of the fetal head, correctly identified a dilated single cerebral ventricle. There was no history of diabetes mellitus, hypertension or previously affected child. Pregnancy termination was done on the couple’s request, because of the poor fetal prognosis. Postmortem clinical examination revealed a female newborn with normal body structure. The couple declined consent for autopsy. Conclusion: Alobar holoprosencephaly with unfused thalami is a rare and severe variety of holoprosencephaly with poorly understood aetiology and poor prognosis. (This page in not part of the published article.) International Journal of Case Reports and Images, Vol. 5 No. 11, November 2014. ISSN – [0976-3198] Int J Case Rep Images 2014;5(11):756–760. www.ijcasereportsandimages.com Ibrahim et al. 756 CASE REPORT OPEN ACCESS Alobar holoprosencephaly with unfused thalami: A rare variety of holoprosencephaly Abubakar A., Sanusi Mohammed Ibrahim, Ahidjo A., Tahir A.",
"title": ""
},
{
"docid": "3d4707bd4b113569f07c0b3aa95364d3",
"text": "This paper presents a new solution for choosing the K parameter in the k-nearest neighbor (KNN) algorithm, the solution depending on the idea of ensemble learning, in which a weak KNN classifier is used each time with a different K, starting from one to the square root of the size of the training set. The results of the weak classifiers are combined using the weighted sum rule. The proposed solution was tested and compared to other solutions using a group of experiments in real life problems. The experimental results show that the proposed classifier outperforms the traditional KNN classifier that uses a different number of neighbors, is competitive with other classifiers, and is a promising classifier with strong potential for a wide range of applications. KeywordsKNN; supervised learning; machine learning; ensemble learning; nearest neighbor;",
"title": ""
},
{
"docid": "ddb0a3bc0a9367a592403d0fc0cec0a5",
"text": "Fluorescence microscopy is a powerful quantitative tool for exploring regulatory networks in single cells. However, the number of molecular species that can be measured simultaneously is limited by the spectral overlap between fluorophores. Here we demonstrate a simple but general strategy to drastically increase the capacity for multiplex detection of molecules in single cells by using optical super-resolution microscopy (SRM) and combinatorial labeling. As a proof of principle, we labeled mRNAs with unique combinations of fluorophores using fluorescence in situ hybridization (FISH), and resolved the sequences and combinations of fluorophores with SRM. We measured mRNA levels of 32 genes simultaneously in single Saccharomyces cerevisiae cells. These experiments demonstrate that combinatorial labeling and super-resolution imaging of single cells is a natural approach to bring systems biology into single cells.",
"title": ""
},
{
"docid": "a4b6b6a8ea8fc48d90576f641febf5fb",
"text": "The recent introduction of the diagnostic category developmental coordination disorder (DCD) (American Psychiatric Association [APA], 1987, 1994), has generated confusion among researchers and clinicians in many fields, including occupational therapy. Although the diagnostic criteria appear to be similar to those used to define clumsy children, children with developmental dyspraxia, or children with sensory integrative dysfunction, we are left with the question: Are children who receive the diagnosis of DCD the same as those who receive the other diagnoses, a subgroup, or an entirely distinct group of children? This article will examine the theoretical and empirical literature and use the results to support the thesis that these terms are not interchangeable and yet are not being used in the literature in a way that clearly defines each subgroup of children. Clear definitions and characteristic features need to be identified and associated with each term to guide occupational therapy assessment and intervention and clinical research.",
"title": ""
},
{
"docid": "19f1f1156ca9464759169dd2d4005bf6",
"text": "We first consider the problem of partitioning the edges of a graph ~ into bipartite cliques such that the total order of the cliques is minimized, where the order of a clique is the number of vertices in it. It is shown that the problem is NP-complete. We then prove the existence of a partition of small total order in a sufficiently dense graph and devise an efilcient algorithm to compute such a partition. It turns out that our algorithm exhibits a trade-off between the total order of the partition and the running time. Next, we define the notion of a compression of a graph ~ and use the result on graph partitioning to efficiently compute an optimal compression for graphs of a given size. An interesting application of the graph compression result arises from the fact that several graph algorithms can be adapted to work with the compressed rep~esentation of the input graph, thereby improving the bound on their running times particularly on dense graphs. This makes use of the trade-off result we obtain from our partitioning algorithm. The algorithms analyzed include those for matchings, vertex connectivity, edge connectivity and shortest paths. In each case, we improve upon the running times of the best-known algorithms for these problems.",
"title": ""
},
{
"docid": "3988a78bd37adaed9dc8af87c7e1266b",
"text": "Current R&D project was the development of a software platform designed to be an advanced research testbed for the prototyping of Haskell based novel technologies in Cryo-EM Methodologies. Focused upon software architecture concepts and frameworks involving Haskell image processing libraries. Cryo-EM is an important tool to probe nano-bio systems.A number of hi-tech firms are implementing BIG-DATA analysis using Haskell especially in the domains of Pharma,Bio-informatics etc. Hence current research paper is one of the pioneering attempts made by the author to encourage advanced data analysis in the Cryo-EM domain to probe important aspects of nano-bio applications.",
"title": ""
},
{
"docid": "d3b5569b268a78ad8a1ffb6c903758d3",
"text": "Can robots in classroom reshape K-12 STEM education, and foster new ways of learning? To sketch an answer, this article reviews, side-by-side, existing literature on robot-based learning activities featuring mathematics and physics (purposefully putting aside the well-studied field of “robots to teach robotics”) and existing robot platforms and toolkits suited for classroom environment (in terms of cost, ease of use, orchestration load for the teacher, etc.). Our survey suggests that the use of robots in classroom has indeed moved from purely technology to education, to encompass new didactic fields. We however identified several shortcomings, in terms of robotic platforms and teaching environments, that contribute to the limited presence of robotics in existing curricula; the lack of specific teacher training being likely pivotal. Finally, we propose an educational framework merging the tangibility of robots with the advanced visibility of augmented reality.",
"title": ""
},
{
"docid": "ecc01f7058fa872f67cb247e79a06e6b",
"text": "The collection and storage of fingerprint profiles and DNA samples in the field of forensic science for nonviolent crimes is highly controversial. While biometric techniques such as fingerprinting have been used in law enforcement since the early 1900s, DNA presents a more invasive and contentious technique as most sampling is of an intimate nature (e.g. buccal swab). A fingerprint is a pattern residing on the surface of the skin while a DNA sample needs to be extracted in the vast majority of cases (e.g. at times extraction even implying the breaking of the skin). This paper aims to balance the need to collect DNA samples where direct evidence is lacking in violent crimes, versus the systematic collection of DNA from citizens who have committed acts such as petty crimes. The legal, ethical and social issues surrounding the proliferation of DNA collection and storage are explored, with a view to outlining the threats that such a regime may pose to citizens in the not-to-distant future, especially persons belonging to ethnic minority groups.",
"title": ""
},
{
"docid": "945dea6576c6131fc33cd14e5a2a0be8",
"text": "■ This article recounts the development of radar signal processing at Lincoln Laboratory. The Laboratory’s significant efforts in this field were initially driven by the need to provide detected and processed signals for air and ballistic missile defense systems. The first processing work was on the Semi-Automatic Ground Environment (SAGE) air-defense system, which led to algorithms and techniques for detection of aircraft in the presence of clutter. This work was quickly followed by processing efforts in ballistic missile defense, first in surface-acoustic-wave technology, in concurrence with the initiation of radar measurements at the Kwajalein Missile Range, and then by exploitation of the newly evolving technology of digital signal processing, which led to important contributions for ballistic missile defense and Federal Aviation Administration applications. More recently, the Laboratory has pursued the computationally challenging application of adaptive processing for the suppression of jamming and clutter signals. This article discusses several important programs in these areas.",
"title": ""
},
{
"docid": "8a31704d12d042618dd9e69f0aebd813",
"text": "a r t i c l e i n f o Keywords: Antisocial personality disorder Psychopathy Amygdala Orbitofrontal cortex Monoamine oxidase SNAP proteins Psychopathy is perhaps one of the most misused terms in the American public, which is in no small part due to our obsession with those who have no conscience, and our boldness to try and profile others with this disorder. Here, I present how psychopathy is seen today, before discussing the classification of psychopathy. I also explore the neurological differences in the brains of those with psychopathy, before finally taking a look at genetic risk factors. I conclude by raising some questions about potential treatment.",
"title": ""
}
] | scidocsrr |
4cb70dbe54b21485773023fd942ae7de | Service-Dominant Strategic Sourcing: Value Creation Versus Cost Saving | [
{
"docid": "dd62fd669d40571cc11d64789314dba1",
"text": "It took the author 30 years to develop the Viable System Model, which sets out to explain how systems are viable – that is, capable of independent existence. He wanted to elucidate the laws of viability in order to facilitate the management task, and did so in a stream of papers and three (of his ten) books. Much misunderstanding about the VSM and its use seems to exist; especially its methodological foundations have been largely forgotten, while its major results have hardly been noted. This paper reflects on the history, nature and present status of the VSM, without seeking once again to expound the model in detail or to demonstrate its validity. It does, however, provide a synopsis, present the methodology and confront some highly contentious issues about both the managerial and scientific paradigms.",
"title": ""
}
] | [
{
"docid": "9b0f286b03b3d81942747a98ac0e8817",
"text": "Automated recommendations for next tracks to listen to or to include in a playlist are a common feature on modern music platforms. Correspondingly, a variety of algorithmic approaches for determining tracks to recommend have been proposed in academic research. The most sophisticated among them are often based on conceptually complex learning techniques which can also require substantial computational resources or special-purpose hardware like GPUs. Recent research, however, showed that conceptually more simple techniques, e.g., based on nearest-neighbor schemes, can represent a viable alternative to such techniques in practice.\n In this paper, we describe a hybrid technique for next-track recommendation, which was evaluated in the context of the ACM RecSys 2018 Challenge. A combination of nearest-neighbor techniques, a standard matrix factorization algorithm, and a small set of heuristics led our team KAENEN to the 3rd place in the \"creative\" track and the 7th one in the \"main\" track, with accuracy results only a few percent below the winning teams. Given that offline prediction accuracy is only one of several possible quality factors in music recommendation, practitioners have to validate if slight accuracy improvements truly justify the use of highly complex algorithms in real-world applications.",
"title": ""
},
{
"docid": "4174c1d49ff8755c6b82c2b453918d29",
"text": "Top-k error is currently a popular performance measure on large scale image classification benchmarks such as ImageNet and Places. Despite its wide acceptance, our understanding of this metric is limited as most of the previous research is focused on its special case, the top-1 error. In this work, we explore two directions that shed more light on the top-k error. First, we provide an in-depth analysis of established and recently proposed single-label multiclass methods along with a detailed account of efficient optimization algorithms for them. Our results indicate that the softmax loss and the smooth multiclass SVM are surprisingly competitive in top-k error uniformly across all k, which can be explained by our analysis of multiclass top-k calibration. Further improvements for a specific k are possible with a number of proposed top-k loss functions. Second, we use the top-k methods to explore the transition from multiclass to multilabel learning. In particular, we find that it is possible to obtain effective multilabel classifiers on Pascal VOC using a single label per image for training, while the gap between multiclass and multilabel methods on MS COCO is more significant. Finally, our contribution of efficient algorithms for training with the considered top-k and multilabel loss functions is of independent interest.",
"title": ""
},
{
"docid": "e6dcc8f80b5b6528531b7f6e617cd633",
"text": "Over 2 million military and civilian personnel per year (over 1 million in the United States) are occupationally exposed, respectively, to jet propulsion fuel-8 (JP-8), JP-8 +100 or JP-5, or to the civil aviation equivalents Jet A or Jet A-1. Approximately 60 billion gallon of these kerosene-based jet fuels are annually consumed worldwide (26 billion gallon in the United States), including over 5 billion gallon of JP-8 by the militaries of the United States and other NATO countries. JP-8, for example, represents the largest single chemical exposure in the U.S. military (2.53 billion gallon in 2000), while Jet A and A-1 are among the most common sources of nonmilitary occupational chemical exposure. Although more recent figures were not available, approximately 4.06 billion gallon of kerosene per se were consumed in the United States in 1990 (IARC, 1992). These exposures may occur repeatedly to raw fuel, vapor phase, aerosol phase, or fuel combustion exhaust by dermal absorption, pulmonary inhalation, or oral ingestion routes. Additionally, the public may be repeatedly exposed to lower levels of jet fuel vapor/aerosol or to fuel combustion products through atmospheric contamination, or to raw fuel constituents by contact with contaminated groundwater or soil. Kerosene-based hydrocarbon fuels are complex mixtures of up to 260+ aliphatic and aromatic hydrocarbon compounds (C(6) -C(17+); possibly 2000+ isomeric forms), including varying concentrations of potential toxicants such as benzene, n-hexane, toluene, xylenes, trimethylpentane, methoxyethanol, naphthalenes (including polycyclic aromatic hydrocarbons [PAHs], and certain other C(9)-C(12) fractions (i.e., n-propylbenzene, trimethylbenzene isomers). While hydrocarbon fuel exposures occur typically at concentrations below current permissible exposure limits (PELs) for the parent fuel or its constituent chemicals, it is unknown whether additive or synergistic interactions among hydrocarbon constituents, up to six performance additives, and other environmental exposure factors may result in unpredicted toxicity. While there is little epidemiological evidence for fuel-induced death, cancer, or other serious organic disease in fuel-exposed workers, large numbers of self-reported health complaints in this cohort appear to justify study of more subtle health consequences. A number of recently published studies reported acute or persisting biological or health effects from acute, subchronic, or chronic exposure of humans or animals to kerosene-based hydrocarbon fuels, to constituent chemicals of these fuels, or to fuel combustion products. This review provides an in-depth summary of human, animal, and in vitro studies of biological or health effects from exposure to JP-8, JP-8 +100, JP-5, Jet A, Jet A-1, or kerosene.",
"title": ""
},
{
"docid": "79079ee1e352b997785dc0a85efed5e4",
"text": "Automatic recognition of the historical letters (XI-XVIII centuries) carved on the stoned walls of St.Sophia cathedral in Kyiv (Ukraine) was demonstrated by means of capsule deep learning neural network. It was applied to the image dataset of the carved Glagolitic and Cyrillic letters (CGCL), which was assembled and pre-processed recently for recognition and prediction by machine learning methods. CGCL dataset contains >4000 images for glyphs of 34 letters which are hardly recognized by experts even in contrast to notMNIST dataset with the better images of 10 letters taken from different fonts. The capsule network was applied for both datasets in three regimes: without data augmentation, with lossless data augmentation, and lossy data augmentation. Despite the much worse quality of CGCL dataset and extremely low number of samples (in comparison to notMNIST dataset) the capsule network model demonstrated much better results than the previously used convolutional neural network (CNN). The training rate for capsule network model was 5-6 times higher than for CNN. The validation accuracy (and validation loss) was higher (lower) for capsule network model than for CNN without data augmentation even. The area under curve (AUC) values for receiver operating characteristic (ROC) were also higher for the capsule network model than for CNN model: 0.88-0.93 (capsule network) and 0.50 (CNN) without data augmentation, 0.91-0.95 (capsule network) and 0.51 (CNN) with lossless data augmentation, and similar results of 0.91-0.93 (capsule network) and 0.9 (CNN) in the regime of lossless data augmentation only. The confusion matrixes were much better for capsule network than for CNN model and gave the much lower type I (false positive) and type II (false negative) values in all three regimes of data augmentation. These results supports the previous claims that capsule-like networks allow to reduce error rates not only on MNIST digit dataset, but on the other notMNIST letter dataset and the more complex CGCL handwriting graffiti letter dataset also. Moreover, capsule-like networks allow to reduce training set sizes to 180 images even like in this work, and they are considerably better than CNNs on the highly distorted and incomplete letters even like CGCL handwriting graffiti. Keywords— machine learning, deep learning, capsule neural network, stone carving dataset, notMNIST, data augmentation",
"title": ""
},
{
"docid": "5ec1cff52a55c5bd873b5d0d25e0456b",
"text": "This study presents a novel approach to the problem of system portability across different domains: a sentiment annotation system that integrates a corpus-based classifier trained on a small set of annotated in-domain data and a lexicon-based system trained on WordNet. The paper explores the challenges of system portability across domains and text genres (movie reviews, news, blogs, and product reviews), highlights the factors affecting system performance on out-of-domain and smallset in-domain data, and presents a new system consisting of the ensemble of two classifiers with precision-based vote weighting, that provides significant gains in accuracy and recall over the corpus-based classifier and the lexicon-based system taken individually.",
"title": ""
},
{
"docid": "0a58aa0c5dff94efa183fcf6fb7952f6",
"text": "When people explore new environments they often use landmarks as reference points to help navigate and orientate themselves. This research paper examines how spatial datasets can be used to build a system for use in an urban environment which functions as a city guide, announcing Features of Interest (FoI) as they become visible to the user (not just proximal), as the user moves freely around the city. Visibility calculations for the FoIs were pre-calculated based on a digital surface model derived from LIDAR (Light Detection and Ranging) data. The results were stored in a textbased relational database management system (RDBMS) for rapid retrieval. All interaction between the user and the system was via a speech-based interface, allowing the user to record and request further information on any of the announced FoI. A prototype system, called Edinburgh Augmented Reality System (EARS) , was designed, implemented and field tested in order to assess the effectiveness of these ideas. The application proved to be an innovating, ‘non-invasive’ approach to augmenting the user’s reality",
"title": ""
},
{
"docid": "4d1be9aebf7534cce625b95bde4696c6",
"text": "BlockChain (BC) has attracted tremendous attention due to its immutable nature and the associated security and privacy benefits. BC has the potential to overcome security and privacy challenges of Internet of Things (IoT). However, BC is computationally expensive, has limited scalability and incurs significant bandwidth overheads and delays which are not suited to the IoT context. We propose a tiered Lightweight Scalable BC (LSB) that is optimized for IoT requirements. We explore LSB in a smart home setting as a representative example for broader IoT applications. Low resource devices in a smart home benefit from a centralized manager that establishes shared keys for communication and processes all incoming and outgoing requests. LSB achieves decentralization by forming an overlay network where high resource devices jointly manage a public BC that ensures end-to-end privacy and security. The overlay is organized as distinct clusters to reduce overheads and the cluster heads are responsible for managing the public BC. LSB incorporates several optimizations which include algorithms for lightweight consensus, distributed trust and throughput management. Qualitative arguments demonstrate that LSB is resilient to several security attacks. Extensive simulations show that LSB decreases packet overhead and delay and increases BC scalability compared to relevant baselines.",
"title": ""
},
{
"docid": "5c29083624be58efa82b4315976f8dc2",
"text": "This paper presents a structured ordinal measure method for video-based face recognition that simultaneously lear ns ordinal filters and structured ordinal features. The problem is posed as a non-convex integer program problem that includes two parts. The first part learns stable ordinal filters to project video data into a large-margin ordinal space . The second seeks self-correcting and discrete codes by balancing the projected data and a rank-one ordinal matrix in a structured low-rank way. Unsupervised and supervised structures are considered for the ordinal matrix. In addition, as a complement to hierarchical structures, deep feature representations are integrated into our method to enhance coding stability. An alternating minimization metho d is employed to handle the discrete and low-rank constraints , yielding high-quality codes that capture prior structures well. Experimental results on three commonly used face video databases show that our method with a simple voting classifier can achieve state-of-the-art recognition ra tes using fewer features and samples.",
"title": ""
},
{
"docid": "471af6726ec78126fcf46f4e42b666aa",
"text": "A new thermal tuning circuit for optical ring modulators enables demonstration of an optical chip-to-chip link for the first time with monolithically integrated photonic devices in a commercial 45nm SOI process, without any process changes. The tuning circuit uses independent 1/0 level-tracking and 1/0 bit counting to remain resilient against laser self-heating transients caused by non-DC-balanced transmit data. A 30fJ/bit transmitter and 374fJ/bit receiver with 6μApk-pk photocurrent sensitivity complete the 5Gb/s link. The thermal tuner consumes 275fJ/bit and achieves a 600 GHz tuning range with a heater tuning efficiency of 3.8μW/GHz.",
"title": ""
},
{
"docid": "24a10176ec2367a6a0b5333d57b894b8",
"text": "Automated classification of biological cells according to their 3D morphology is highly desired in a flow cytometer setting. We have investigated this possibility experimentally and numerically using a diffraction imaging approach. A fast image analysis software based on the gray level co-occurrence matrix (GLCM) algorithm has been developed to extract feature parameters from measured diffraction images. The results of GLCM analysis and subsequent classification demonstrate the potential for rapid classification among six types of cultured cells. Combined with numerical results we show that the method of diffraction imaging flow cytometry has the capacity as a platform for high-throughput and label-free classification of biological cells.",
"title": ""
},
{
"docid": "9edfedc5a1b17481ee8c16151cf42c88",
"text": "Nevus comedonicus is considered a genodermatosis characterized by the presence of multiple groups of dilated pilosebaceous orifices filled with black keratin plugs, with sharply unilateral distribution mostly on the face, neck, trunk, upper arms. Lesions can appear at any age, frequently before the age of 10 years, but they are usually present at birth. We present a 2.7-year-old girl with a very severe form of nevus comedonicus. She exhibited lesions located initially at the left side of the body with a linear characteristic, following Blascko lines T1/T2, T5, T7, S1 /S2, but progressively developed lesions on the right side of the scalp and left gluteal area.",
"title": ""
},
{
"docid": "bdbd3d65c79e4f22d2e85ac4137ee67a",
"text": "With the advances in new-generation information technologies, especially big data and digital twin, smart manufacturing is becoming the focus of global manufacturing transformation and upgrading. Intelligence comes from data. Integrated analysis for the manufacturing big data is beneficial to all aspects of manufacturing. Besides, the digital twin paves a way for the cyber-physical integration of manufacturing, which is an important bottleneck to achieve smart manufacturing. In this paper, the big data and digital twin in manufacturing are reviewed, including their concept as well as their applications in product design, production planning, manufacturing, and predictive maintenance. On this basis, the similarities and differences between big data and digital twin are compared from the general and data perspectives. Since the big data and digital twin can be complementary, how they can be integrated to promote smart manufacturing are discussed.",
"title": ""
},
{
"docid": "3e9a214856235ef36a4dd2e9684543b7",
"text": "Leaf area index (LAI) is a key biophysical variable that can be used to derive agronomic information for field management and yield prediction. In the context of applying broadband and high spatial resolution satellite sensor data to agricultural applications at the field scale, an improved method was developed to evaluate commonly used broadband vegetation indices (VIs) for the estimation of LAI with VI–LAI relationships. The evaluation was based on direct measurement of corn and potato canopies and on QuickBird multispectral images acquired in three growing seasons. The selected VIs were correlated strongly with LAI but with different efficiencies for LAI estimation as a result of the differences in the stabilities, the sensitivities, and the dynamic ranges. Analysis of error propagation showed that LAI noise inherent in each VI–LAI function generally increased with increasing LAI and the efficiency of most VIs was low at high LAI levels. Among selected VIs, the modified soil-adjusted vegetation index (MSAVI) was the best LAI estimator with the largest dynamic range and the highest sensitivity and overall efficiency for both crops. QuickBird image-estimated LAI with MSAVI–LAI relationships agreed well with ground-measured LAI with the root-mean-square-error of 0.63 and 0.79 for corn and potato canopies, respectively. LAI estimated from the high spatial resolution pixel data exhibited spatial variability similar to the ground plot measurements. For field scale agricultural applications, MSAVI–LAI relationships are easy-to-apply and reasonably accurate for estimating LAI. # 2007 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "2848635e59cf2a41871d79748822c176",
"text": "The ventral pathway is involved in primate visual object recognition. In humans, a central stage in this pathway is an occipito–temporal region termed the lateral occipital complex (LOC), which is preferentially activated by visual objects compared to scrambled images or textures. However, objects have characteristic attributes (such as three-dimensional shape) that can be perceived both visually and haptically. Therefore, object-related brain areas may hold a representation of objects in both modalities. Using fMRI to map object-related brain regions, we found robust and consistent somatosensory activation in the occipito–temporal cortex. This region showed clear preference for objects compared to textures in both modalities. Most somatosensory object-selective voxels overlapped a part of the visual object-related region LOC. Thus, we suggest that neuronal populations in the occipito–temporal cortex may constitute a multimodal object-related network.",
"title": ""
},
{
"docid": "9960d17cb019350a279e4daccccb8e87",
"text": "Deep learning with neural networks is applied by an increasing number of people outside of classic research environments, due to the vast success of the methodology on a wide range of machine perception tasks. While this interest is fueled by beautiful success stories, practical work in deep learning on novel tasks without existing baselines remains challenging. This paper explores the specific challenges arising in the realm of real world tasks, based on case studies from research & development in conjunction with industry, and extracts lessons learned from them. It thus fills a gap between the publication of latest algorithmic and methodical developments, and the usually omitted nitty-gritty of how to make them work. Specifically, we give insight into deep learning projects on face matching, print media monitoring, industrial quality control, music scanning, strategy game playing, and automated machine learning, thereby providing best practices for deep learning in practice.",
"title": ""
},
{
"docid": "a2e0163aebb348d3bfab7ebac119e0c0",
"text": "Herein we report the first study of the oxygen reduction reaction (ORR) catalyzed by a cofacial porphyrin scaffold accessed in high yield (overall 53%) using coordination-driven self-assembly with no chromatographic purification steps. The ORR activity was investigated using chemical and electrochemical techniques on monomeric cobalt(II) tetra(meso-4-pyridyl)porphyrinate (CoTPyP) and its cofacial analogue [Ru8(η6-iPrC6H4Me)8(dhbq)4(CoTPyP)2][OTf]8 (Co Prism) (dhbq = 2,5-dihydroxy-1,4-benzoquinato, OTf = triflate) as homogeneous oxygen reduction catalysts. Co Prism is obtained in one self-assembly step that organizes six total building blocks, two CoTPyP units and four arene-Ru clips, into a cofacial motif previously demonstrated with free-base, Zn(II), and Ni(II) porphyrins. Turnover frequencies (TOFs) from chemical reduction (66 vs 6 h-1) and rate constants of overall homogeneous catalysis (kobs) determined from rotating ring-disk experiments (1.1 vs 0.05 h-1) establish a cofacial enhancement upon comparison of the activities of Co Prism and CoTPyP, respectively. Cyclic voltammetry was used to initially probe the electrochemical catalytic behavior. Rotating ring-disk electrode studies were completed to probe the Faradaic efficiency and obtain an estimate of the rate constant associated with the ORR.",
"title": ""
},
{
"docid": "c1632ead357d08c3e019bb12ff75e756",
"text": "Learning the representations of nodes in a network can benefit various analysis tasks such as node classification, link prediction, clustering, and anomaly detection. Such a representation learning problem is referred to as network embedding, and it has attracted significant attention in recent years. In this article, we briefly review the existing network embedding methods by two taxonomies. The technical taxonomy focuses on the specific techniques used and divides the existing network embedding methods into two stages, i.e., context construction and objective design. The non-technical taxonomy focuses on the problem setting aspect and categorizes existing work based on whether to preserve special network properties, to consider special network types, or to incorporate additional inputs. Finally, we summarize the main findings based on the two taxonomies, analyze their usefulness, and discuss future directions in this area.",
"title": ""
},
{
"docid": "a34825f20b645a146857c1544c08e66e",
"text": "1. The midterm will have about 5-6 long questions, and about 8-10 short questions. Space will be provided on the actual midterm for you to write your answers. 2. The midterm is meant to be educational, and as such some questions could be quite challenging. Use your time wisely to answer as much as you can! 3. For additional practice, please see CS 229 extra problem sets available at 1. [13 points] Generalized Linear Models Recall that generalized linear models assume that the response variable y (conditioned on x) is distributed according to a member of the exponential family: p(y; η) = b(y) exp(ηT (y) − a(η)), where η = θ T x. For this problem, we will assume η ∈ R. (a) [10 points] Given a training set {(x (i) , y (i))} m i=1 , the loglikelihood is given by (θ) = m i=1 log p(y (i) | x (i) ; θ). Give a set of conditions on b(y), T (y), and a(η) which ensure that the loglikelihood is a concave function of θ (and thus has a unique maximum). Your conditions must be reasonable, and should be as weak as possible. (E.g., the answer \" any b(y), T (y), and a(η) so that (θ) is concave \" is not reasonable. Similarly, overly narrow conditions, including ones that apply only to specific GLMs, are also not reasonable.) (b) [3 points] When the response variable is distributed according to a Normal distribution (with unit variance), we have b(y) = 1 √ 2π e −y 2 2 , T (y) = y, and a(η) = η 2 2. Verify that the condition(s) you gave in part (a) hold for this setting.",
"title": ""
},
{
"docid": "e3823047ccc723783cf05f24ca60d449",
"text": "Social science studies have acknowledged that the social influence of individuals is not identical. Social networks structure and shared text can reveal immense information about users, their interests, and topic-based influence. Although some studies have considered measuring user influence, less has been on measuring and estimating topic-based user influence. In this paper, we propose an approach that incorporates network structure, user-generated content for topic-based influence measurement, and user’s interactions in the network. We perform experimental analysis on Twitter data and show that our proposed approach can effectively measure topic-based user influence.",
"title": ""
},
{
"docid": "ec9eb309dd9d6f72bd7286580e75d36d",
"text": "This paper describes SONDY, a tool for analysis of trends and dynamics in online social network data. SONDY addresses two audiences: (i) end-users who want to explore social activity and (ii) researchers who want to experiment and compare mining techniques on social data. SONDY helps end-users like media analysts or journalists understand social network users interests and activity by providing emerging topics and events detection as well as network analysis functionalities. To this end, the application proposes visualizations such as interactive time-lines that summarize information and colored user graphs that reflect the structure of the network. SONDY also provides researchers an easy way to compare and evaluate recent techniques to mine social data, implement new algorithms and extend the application without being concerned with how to make it accessible. In the demo, participants will be invited to explore information from several datasets of various sizes and origins (such as a dataset consisting of 7,874,772 messages published by 1,697,759 Twitter users during a period of 7 days) and apply the different functionalities of the platform in real-time.",
"title": ""
}
] | scidocsrr |
a785601f50bad4ed3744ee1442d8116e | A Unit Selection Methodology for Music Generation Using Deep Neural Networks | [
{
"docid": "8f47dc7401999924dba5cb3003194071",
"text": "Few types of signal streams are as ubiquitous as music. Here we consider the problem of extracting essential ingredients of music signals, such as well-defined global temporal structure in the form of nested periodicities (or meter). Can we construct an adaptive signal processing device that learns by example how to generate new instances of a given musical style? Because recurrent neural networks can in principle learn the temporal structure of a signal, they are good candidates for such a task. Unfortunately, music composed by standard recurrent neural networks (RNNs) often lacks global coherence. The reason for this failure seems to be that RNNs cannot keep track of temporally distant events that indicate global music structure. Long Short-Term Memory (LSTM) has succeeded in similar domains where other RNNs have failed, such as timing & counting and learning of context sensitive languages. In the current study we show that LSTM is also a good mechanism for learning to compose music. We present experimental results showing that LSTM successfully learns a form of blues music and is able to compose novel (and we believe pleasing) melodies in that style. Remarkably, once the network has found the relevant structure it does not drift from it: LSTM is able to play the blues with good timing and proper structure as long as one is willing to listen.",
"title": ""
},
{
"docid": "67b5bd59689c325365ac765a17886169",
"text": "L-Systems have traditionally been used as a popular method for the modelling of spacefilling curves, biological systems and morphogenesis. In this paper, we adapt string rewriting grammars based on L-Systems into a system for music composition. Representation of pitch, duration and timbre are encoded as grammar symbols, upon which a series of re-writing rules are applied. Parametric extensions to the grammar allow the specification of continuous data for the purposes of modulation and control. Such continuous data is also under control of the grammar. Using non-deterministic grammars with context sensitivity allows the simulation of Nth-order Markov models with a more economical representation than transition matrices and greater flexibility than previous composition models based on finite state automata or Petri nets. Using symbols in the grammar to represent relationships between notes, (rather than absolute notes) in combination with a hierarchical grammar representation, permits the emergence of complex music compositions from a relatively simple grammars.",
"title": ""
},
{
"docid": "9198e035c77e8798462dd97426ed0e67",
"text": "In this paper, we propose a generic technique to model temporal dependencies and sequences using a combination of a recurrent neural network and a Deep Belief Network. Our technique, RNN-DBN, is an amalgamation of the memory state of the RNN that allows it to provide temporal information and a multi-layer DBN that helps in high level representation of the data. This makes RNN-DBNs ideal for sequence generation. Further, the use of a DBN in conjunction with the RNN makes this model capable of significantly more complex data representation than an RBM. We apply this technique to the task of polyphonic music generation.",
"title": ""
},
{
"docid": "b7ddc52ae897720f50d3f092d8cfbdab",
"text": "Markov chains are a well known tool to model temporal properties of many phenomena, from text structure to fluctuations in economics. Because they are easy to generate, Markovian sequences, i.e. temporal sequences having the Markov property, are also used for content generation applications such as text or music generation that imitate a given style. However, Markov sequences are traditionally generated using greedy, left-to-right algorithms. While this approach is computationally cheap, it is fundamentally unsuited for interactive control. This paper addresses the issue of generating steerable Markovian sequences. We target interactive applications such as games, in which users want to control, through simple input devices, the way the system generates a Markovian sequence, such as a text, a musical sequence or a drawing. To this aim, we propose to revisit Markov sequence generation as a branch and bound constraint satisfaction problem (CSP). We propose a CSP formulation of the basic Markovian hypothesis as elementary Markov Constraints (EMC). We propose algorithms that achieve domain-consistency for the propagators of EMCs, in an event-based implementation of CSP. We show how EMCs can be combined to estimate the global Markovian probability of a whole sequence, and accommodate for different species of Markov generation such as fixed order, variable-order, or smoothing. Such a formulation, although more costly than traditional greedy generation algorithms, yields the immense advantage of being naturally steerable, since control specifications can be represented by arbitrary additional constraints, without any modification of the generation algorithm. We illustrate our approach on simple yet combinatorial chord sequence and melody generation problems and give some performance results.",
"title": ""
}
] | [
{
"docid": "785a0d51c9d105532a2e571afccd957b",
"text": "Facial recognition, one of the basic topics in computer vision and pattern recognition, has received substantial attention in recent years. However, for those traditional facial recognition algorithms, the facial images are reshaped to a long vector, thereby losing part of the original spatial constraints of each pixel. In this paper, a new tensor-based feature extraction algorithm termed tensor rank preserving discriminant analysis (TRPDA) for facial image recognition is proposed; the proposed method involves two stages: in the first stage, the low-dimensional tensor subspace of the original input tensor samples was obtained; in the second stage, discriminative locality alignment was utilized to obtain the ultimate vector feature representation for subsequent facial recognition. On the one hand, the proposed TRPDA algorithm fully utilizes the natural structure of the input samples, and it applies an optimization criterion that can directly handle the tensor spectral analysis problem, thereby decreasing the computation cost compared those traditional tensor-based feature selection algorithms. On the other hand, the proposed TRPDA algorithm extracts feature by finding a tensor subspace that preserves most of the rank order information of the intra-class input samples. Experiments on the three facial databases are performed here to determine the effectiveness of the proposed TRPDA algorithm.",
"title": ""
},
{
"docid": "a7665a6c0955b5d4ca2c4c8cdc183974",
"text": "Deep learning has recently helped AI systems to achieve human-level performance in several domains, including speech recognition, object classification, and playing several types of games. The major benefit of deep learning is that it enables end-to-end learning of representations of the data on several levels of abstraction. However, the overall network architecture and the learning algorithms’ sensitive hyperparameters still need to be set manually by human experts. In this talk, I will discuss extensions of Bayesian optimization for handling this problem effectively, thereby paving the way to fully automated end-to-end learning. I will focus on speeding up Bayesian optimization by reasoning over data subsets and initial learning curves, sometimes resulting in 100-fold speedups in finding good hyperparameter settings. I will also show competition-winning practical systems for automated machine learning (AutoML) and briefly show related applications to the end-to-end optimization of algorithms for solving hard combinatorial problems. Bio. Frank Hutter is an Emmy Noether Research Group Lead (eq. Asst. Prof.) at the Computer Science Department of the University of Freiburg (Germany). He received his PhD from the University of British Columbia (2009). Frank’s main research interests span artificial intelligence, machine learning, combinatorial optimization, and automated algorithm design. He received a doctoral dissertation award from the Canadian Artificial Intelligence Association and, with his coauthors, several best paper awards (including from JAIR and IJCAI) and prizes in international competitions on machine learning, SAT solving, and AI planning. In 2016 he received an ERC Starting Grant for a project on automating deep learning based on Bayesian optimization, Bayesian neural networks, and deep reinforcement learning. Frontiers in Recurrent Neural Network Research",
"title": ""
},
{
"docid": "6db5f103fa479fc7c7c33ea67d7950f6",
"text": "Problem statement: To design, implement, and test an algorithm for so lving the square jigsaw puzzle problem, which has many applications in image processing, pattern recognition, and computer vision such as restoration of archeologica l artifacts and image descrambling. Approach: The algorithm used the gray level profiles of border pi xels for local matching of the puzzle pieces, which was performed using dynamic programming to facilita te non-rigid alignment of pixels of two gray level profiles. Unlike the classical best-first sea rch, the algorithm simultaneously located the neigh bors of a puzzle piece during the search using the wellknown Hungarian procedure, which is an optimal assignment procedure. To improve the search for a g lobal solution, every puzzle piece was considered as starting piece at various starting locations. Results: Experiments using four well-known images demonstrated the effectiveness of the proposed appr o ch over the classical piece-by-piece matching approach. The performance evaluation was based on a new precision performance measure. For all four test images, the proposed algorithm achieved 1 00% precision rate for puzzles up to 8×8. Conclusion: The proposed search mechanism based on simultaneou s all cation of puzzle pieces using the Hungarian procedure provided better performance than piece-by-piece used in classical methods.",
"title": ""
},
{
"docid": "0084d9c69d79a971e7139ab9720dd846",
"text": "ÐRetrieving images from large and varied collections using image content as a key is a challenging and important problem. We present a new image representation that provides a transformation from the raw pixel data to a small set of image regions that are coherent in color and texture. This aBlobworldo representation is created by clustering pixels in a joint color-texture-position feature space. The segmentation algorithm is fully automatic and has been run on a collection of 10,000 natural images. We describe a system that uses the Blobworld representation to retrieve images from this collection. An important aspect of the system is that the user is allowed to view the internal representation of the submitted image and the query results. Similar systems do not offer the user this view into the workings of the system; consequently, query results from these systems can be inexplicable, despite the availability of knobs for adjusting the similarity metrics. By finding image regions that roughly correspond to objects, we allow querying at the level of objects rather than global image properties. We present results indicating that querying for images using Blobworld produces higher precision than does querying using color and texture histograms of the entire image in cases where the image contains distinctive objects. Index TermsÐSegmentation and grouping, image retrieval, image querying, clustering, Expectation-Maximization.",
"title": ""
},
{
"docid": "29f6917a8eaf7958ffa3408a41e981a4",
"text": "Reconstruction and rehabilitation following rhinectomy remains controversial and presents a complex problem. Although reconstruction with local and microvascular flaps is a valid option, the aesthetic results may not always be satisfactory. The aesthetic results achieved with a nasal prosthesis are excellent; however patient acceptance relies on a secure method of retention. The technique used and results obtained in a large series of patients undergoing rhinectomy and receiving zygomatic implants for the retention of a nasal prosthesis are described here. A total of 56 zygomatic implants (28 patients) were placed, providing excellent retention and durability with the loss of only one implant in 15 years.",
"title": ""
},
{
"docid": "1b5bf2ef58a5f12e09f66e91d6472e56",
"text": "High quality upsampling of sparse 3D point clouds is critically useful for a wide range of geometric operations such as reconstruction, rendering, meshing, and analysis. In this paper, we propose a data-driven algorithm that enables an upsampling of 3D point clouds without the need for hard-coded rules. Our approach uses a deep network with Chamfer distance as the loss function, capable of learning the latent features in point clouds belonging to different object categories. We evaluate our algorithm across different amplification factors, with upsampling learned and performed on objects belonging to the same category as well as different categories. We also explore the desirable characteristics of input point clouds as a function of the distribution of the point samples. Finally, we demonstrate the performance of our algorithm in single-category training versus multi-category training scenarios. The final proposed model is compared against a baseline, optimization-based upsampling method. The results indicate that our algorithm is capable of generating more accurate upsamplings with less Chamfer loss.",
"title": ""
},
{
"docid": "4bf485a218fca405a4d8655bc2a2be86",
"text": "In today’s competitive business environment, companies are facing challenges in dealing with big data issues for rapid decision making for improved productivity. Many manufacturing systems are not ready to manage big data due to the lack of smart analytics tools. Germany is leading a transformation toward 4th Generation Industrial Revolution (Industry 4.0) based on Cyber-Physical System based manufacturing and service innovation. As more software and embedded intelligence are integrated in industrial products and systems, predictive technologies can further intertwine intelligent algorithms with electronics and tether-free intelligence to predict product performance degradation and autonomously manage and optimize product service needs. This article addresses the trends of industrial transformation in big data environment as well as the readiness of smart predictive informatics tools to manage big data to achieve transparency and productivity. Keywords—Industry 4.0; Cyber Physical Systems; Prognostics and Health Management; Big Data;",
"title": ""
},
{
"docid": "c843f4ba35aee9ef2ac7e852a1d489c4",
"text": "We investigate the effect of a corporate culture of sustainability on multiple facets of corporate behavior and performance outcomes. Using a matched sample of 180 companies, we find that corporations that voluntarily adopted environmental and social policies many years ago termed as High Sustainability companies exhibit fundamentally different characteristics from a matched sample of firms that adopted almost none of these policies termed as Low Sustainability companies. In particular, we find that the boards of directors of these companies are more likely to be responsible for sustainability and top executive incentives are more likely to be a function of sustainability metrics. Moreover, they are more likely to have organized procedures for stakeholder engagement, to be more long-term oriented, and to exhibit more measurement and disclosure of nonfinancial information. Finally, we provide evidence that High Sustainability companies significantly outperform their counterparts over the long-term, both in terms of stock market and accounting performance. The outperformance is stronger in sectors where the customers are individual consumers instead of companies, companies compete on the basis of brands and reputations, and products significantly depend upon extracting large amounts of natural resources. Robert G. Eccles is a Professor of Management Practice at Harvard Business School. Ioannis Ioannou is an Assistant Professor of Strategic and International Management at London Business School. George Serafeim is an Assistant Professor of Business Administration at Harvard Business School, contact email: gserafeim@hbs.edu. Robert Eccles and George Serafeim gratefully acknowledge financial support from the Division of Faculty Research and Development of the Harvard Business School. We would like to thank Christopher Greenwald for supplying us with the ASSET4 data. Moreover, we would like to thank Cecile Churet and Iordanis Chatziprodromou from Sustainable Asset Management for giving us access to their proprietary data. We are grateful to Chris Allen, Jeff Cronin, Christine Rivera, and James Zeitler for research assistance. We thank Ben Esty, Joshua Margolis, Costas Markides, Catherine Thomas and seminar participants at Boston College for helpful comments. We are solely responsible for any errors in this manuscript.",
"title": ""
},
{
"docid": "a1ef2bce061c11a2d29536d7685a56db",
"text": "This paper presents stacked attention networks (SANs) that learn to answer natural language questions from images. SANs use semantic representation of a question as query to search for the regions in an image that are related to the answer. We argue that image question answering (QA) often requires multiple steps of reasoning. Thus, we develop a multiple-layer SAN in which we query an image multiple times to infer the answer progressively. Experiments conducted on four image QA data sets demonstrate that the proposed SANs significantly outperform previous state-of-the-art approaches. The visualization of the attention layers illustrates the progress that the SAN locates the relevant visual clues that lead to the answer of the question layer-by-layer.",
"title": ""
},
{
"docid": "99e4a4619e20bf0612c0db4249952874",
"text": "Today, machine learning based on neural networks has become mainstream, in many application domains. A small subset of machine learning algorithms, called Convolutional Neural Networks (CNN), are considered as state-ofthe- art for many applications (e.g. video/audio classification). The main challenge in implementing the CNNs, in embedded systems, is their large computation, memory, and bandwidth requirements. To meet these demands, dedicated hardware accelerators have been proposed. Since memory is the major cost in CNNs, recent accelerators focus on reducing the memory accesses. In particular, they exploit data locality using either tiling, layer merging or intra/inter feature map parallelism to reduce the memory footprint. However, they lack the flexibility to interleave or cascade these optimizations. Moreover, most of the existing accelerators do not exploit compression that can simultaneously reduce memory requirements, increase the throughput, and enhance the energy efficiency. To tackle these limitations, we present a flexible accelerator called MOCHA. MOCHA has three features that differentiate it from the state-of-the-art: (i) the ability to compress input/ kernels, (ii) the flexibility to interleave various optimizations, and (iii) intelligence to automatically interleave and cascade the optimizations, depending on the dimension of a specific CNN layer and available resources. Post layout Synthesis results reveal that MOCHA provides up to 63% higher energy efficiency, up to 42% higher throughput, and up to 30% less storage, compared to the next best accelerator, at the cost of 26-35% additional area.",
"title": ""
},
{
"docid": "d361dd8eaea9c8fa8d0a74e8f2161f4b",
"text": "Gamification is commonly employed in designing interactive systems to enhance user engagement and motivations, or to trigger behavior change processes. Although some quantitative studies have been recently conducted aiming at measuring the effects of gamification on users’ behaviors and motivations, there is a shortage of qualitative studies able to capture the subjective experiences of users, when using gamified systems. The authors propose to investigate how users are engaged by the most common gamification techniques, by conducting a diary study followed by a series of six focus groups. From the findings gathered, they conclude the paper identifying some implications for the design of interactive systems that aim at supporting intrinsic motivations to engage their users. A Qualitative Investigation of Gamification: Motivational Factors in Online Gamified Services and Applications",
"title": ""
},
{
"docid": "81919bc432dd70ed3e48a0122d91b9e4",
"text": "Artemisinin resistance in Plasmodium falciparum has emerged as a major threat for malaria control and elimination worldwide. Mutations in the Kelch propeller domain of PfK13 are the only known molecular markers for artemisinin resistance in this parasite. Over 100 non-synonymous mutations have been identified in PfK13 from various malaria endemic regions. This study aimed to investigate the genetic diversity of PvK12, the Plasmodium vivax ortholog of PfK13, in parasite populations from Southeast Asia, where artemisinin resistance in P. falciparum has emerged. The PvK12 sequences in 120 P. vivax isolates collected from Thailand (22), Myanmar (32) and China (66) between 2004 and 2008 were obtained and 353 PvK12 sequences from worldwide populations were retrieved for further analysis. These PvK12 sequences revealed a very low level of genetic diversity (π = 0.00003) with only three single nucleotide polymorphisms (SNPs). Of these three SNPs, only G581R is nonsynonymous. The synonymous mutation S88S is present in 3% (1/32) of the Myanmar samples, while G704G and G581R are present in 1.5% (1/66) and 3% (2/66) of the samples from China, respectively. None of the mutations observed in the P. vivax samples were associated with artemisinin resistance in P. falciparum. Furthermore, analysis of 473 PvK12 sequences from twelve worldwide P. vivax populations confirmed the very limited polymorphism in this gene and detected only five distinct haplotypes. The PvK12 sequences from global P. vivax populations displayed very limited genetic diversity indicating low levels of baseline polymorphisms of PvK12 in these areas.",
"title": ""
},
{
"docid": "48b3ee93758294ffa7b24584c53cbda1",
"text": "Engineering design problems requiring the construction of a cheap-to-evaluate 'surrogate' model f that emulates the expensive response of some black box f come in a variety of forms, but they can generally be distilled down to the following template. Here ffx is some continuous quality, cost or performance metric of a product or process defined by a k-vector of design variables x ∈ D ⊂ R k. In what follows we shall refer to D as the design space or design domain. Beyond the assumption of continuity, the only insight we can gain into f is through discrete observations or samples x ii → y ii = ffx ii i = 1 n. These are expensive to obtain and therefore must be used sparingly. The task is to use this sparse set of samples to construct an approximation f , which can then be used to make a cheap performance prediction for any design x ∈ D. Much of this book is made up of recipes for constructing f , given a set of samples. Excepting a few pathological cases, the mathematical formulations of these modelling approaches are well-posed, regardless of how the sampling plan X = x 1 x 2 x nn determines the spatial arrangement of the observations we have built them upon. Some models do require a minimum number n of data points but, once we have passed this threshold, we can use them to build an unequivocally defined surrogate. However, a well-posed model does not necessarily generalize well, that is it may still be poor at predicting unseen data, and this feature does depend on the sampling plan X. For example, measuring the performance of a design at the extreme values of its parameters may leave a great deal of interesting behaviour undiscovered, say, in the centre of the design space. Equally, spraying points liberally in certain parts of the inside of the domain, forcing the surrogate model to make far-reaching extrapolations elsewhere, may lead us to (false) global conclusions based on patchy, local knowledge of the objective landscape. Of course, we do not always have a choice in the matter. We may be using data obtained by someone else for some other purpose or the available observations may come from a variety of external sources and we may not be able to add to them. The latter situation often occurs in conceptual design, where we …",
"title": ""
},
{
"docid": "472e9807c2f4ed6d1e763dd304f22c64",
"text": "Commercial analytical database systems suffer from a high \"time-to-first-analysis\": before data can be processed, it must be modeled and schematized (a human effort), transferred into the database's storage layer, and optionally clustered and indexed (a computational effort). For many types of structured data, this upfront effort is unjustifiable, so the data are processed directly over the file system using the Hadoop framework, despite the cumulative performance benefits of processing this data in an analytical database system. In this paper we describe a system that achieves the immediate gratification of running MapReduce jobs directly over a file system, while still making progress towards the long-term performance benefits of database systems. The basic idea is to piggyback on MapReduce jobs, leverage their parsing and tuple extraction operations to incrementally load and organize tuples into a database system, while simultaneously processing the file system data. We call this scheme Invisible Loading, as we load fractions of data at a time at almost no marginal cost in query latency, but still allow future queries to run much faster.",
"title": ""
},
{
"docid": "2e6e46a1224041ed2080395f82b7c49c",
"text": "The image processing techniques are very useful for many applications such as biology, security, satellite imagery, personal photo, medicine, etc. The procedures of image processing such as image enhancement, image segmentation and feature extraction are used for fracture detection system.This paper uses Canny edge detection method for segmentation.Canny method produces perfect information from the bone image. The main aim of this research is to detect human lower leg bone fracture from X-Ray images. The proposed system has three steps, namely, preprocessing, segmentation, and fracture detection. In feature extraction step, this paper uses Hough transform technique for line detection in the image. Feature extraction is the main task of the system. The results from various experiments show that the proposed system is very accurate and efficient.",
"title": ""
},
{
"docid": "c61107e9c5213ddb8c5e3b1b14dca661",
"text": "In advanced driving assistance systems, it is important to be able to detect the region covered by the road in the images. This paper proposes a method for estimating the road region in images captured by a vehicle-mounted monocular camera. Our proposed method first estimates all of relevant parameters for the camera motion and the 3D road plane from correspondence points between successive images. By calculating a homography matrix from the estimated camera motion and the estimated road plane parameters, and then warping the image at the previous frame, the road region can be determined. To achieve robustness in various road scenes, our method selects the threshold for determining the road region adaptively and incorporates the assumption of a simple road region boundary. In our experiments, it has been shown that the proposed method is able to estimate the road region in real road environments.",
"title": ""
},
{
"docid": "8a9076c9212442e3f52b828ad96f7fe7",
"text": "The building industry uses great quantities of raw materials that also involve high energy consumption. Choosing materials with high content in embodied energy entails an initial high level of energy consumption in the building production stage but also determines future energy consumption in order to fulfil heating, ventilation and air conditioning demands. This paper presents the results of an LCA study comparing the most commonly used building materials with some eco-materials using three different impact categories. The aim is to deepen the knowledge of energy and environmental specifications of building materials, analysing their possibilities for improvement and providing guidelines for materials selection in the eco-design of new buildings and rehabilitation of existing buildings. The study proves that the impact of construction products can be significantly reduced by promoting the use of the best techniques available and eco-innovation in production plants, substituting the use of finite natural resources for waste generated in other production processes, preferably available locally. This would stimulate competition between manufacturers to launch more eco-efficient products and encourage the use of the Environmental Product Declarations. This paper has been developed within the framework of the “LoRe-LCA Project” co-financed by the European Commission’s Intelligent Energy for Europe Program and the “PSE CICLOPE Project” co-financed by the Spanish Ministry of Science and Technology and the European Regional Development Fund. 2010 Elsevier Ltd. All rights reserved.",
"title": ""
},
{
"docid": "3d5bbe4dcdc3ad787e57583f7b621e36",
"text": "A miniaturized antenna employing a negative index metamaterial with modified split-ring resonator (SRR) and capacitance-loaded strip (CLS) unit cells is presented for Ultra wideband (UWB) microwave imaging applications. Four left-handed (LH) metamaterial (MTM) unit cells are located along one axis of the antenna as the radiating element. Each left-handed metamaterial unit cell combines a modified split-ring resonator (SRR) with a capacitance-loaded strip (CLS) to obtain a design architecture that simultaneously exhibits both negative permittivity and negative permeability, which ensures a stable negative refractive index to improve the antenna performance for microwave imaging. The antenna structure, with dimension of 16 × 21 × 1.6 mm³, is printed on a low dielectric FR4 material with a slotted ground plane and a microstrip feed. The measured reflection coefficient demonstrates that this antenna attains 114.5% bandwidth covering the frequency band of 3.4-12.5 GHz for a voltage standing wave ratio of less than 2 with a maximum gain of 5.16 dBi at 10.15 GHz. There is a stable harmony between the simulated and measured results that indicate improved nearly omni-directional radiation characteristics within the operational frequency band. The stable surface current distribution, negative refractive index characteristic, considerable gain and radiation properties make this proposed negative index metamaterial antenna optimal for UWB microwave imaging applications.",
"title": ""
},
{
"docid": "baf9e931df45d010c44083973d1281fd",
"text": "Error vector magnitude (EVM) is one of the widely accepted figure of merits used to evaluate the quality of communication systems. In the literature, EVM has been related to signal-to-noise ratio (SNR) for data-aided receivers, where preamble sequences or pilots are used to measure the EVM, or under the assumption of high SNR values. In this paper, this relation is examined for nondata-aided receivers and is shown to perform poorly, especially for low SNR values or high modulation orders. The EVM for nondata-aided receivers is then evaluated and its value is related to the SNR for quadrature amplitude modulation (QAM) and pulse amplitude modulation (PAM) signals over additive white Gaussian noise (AWGN) channels and Rayleigh fading channels, and for systems with IQ imbalances. The results show that derived equations can be used to reliably estimate SNR values using EVM measurements that are made based on detected data symbols. Thus, presented work can be quite useful for measurement devices such as vector signal analyzers (VSA), where EVM measurements are readily available.",
"title": ""
},
{
"docid": "082e747ab9f93771a71e2b6147d253b2",
"text": "Social networks are often grounded in spatial locality where individuals form relationships with those they meet nearby. However, the location of individuals in online social networking platforms is often unknown. Prior approaches have tried to infer individuals’ locations from the content they produce online or their online relations, but often are limited by the available location-related data. We propose a new method for social networks that accurately infers locations for nearly all of individuals by spatially propagating location assignments through the social network, using only a small number of initial locations. In five experiments, we demonstrate the effectiveness in multiple social networking platforms, using both precise and noisy data to start the inference, and present heuristics for improving performance. In one experiment, we demonstrate the ability to infer the locations of a group of users who generate over 74% of the daily Twitter message volume with an estimated median location error of 10km. Our results open the possibility of gathering large quantities of location-annotated data from social media platforms.",
"title": ""
}
] | scidocsrr |
901fbc60be4ba1bc1ae7b59755786123 | CIPA: A collaborative intrusion prevention architecture for programmable network and SDN | [
{
"docid": "a9b20ad74b3a448fbc1555b27c4dcac9",
"text": "A new learning algorithm for multilayer feedforward networks, RPROP, is proposed. To overcome the inherent disadvantages of pure gradient-descent, RPROP performs a local adaptation of the weight-updates according to the behaviour of the errorfunction. In substantial difference to other adaptive techniques, the effect of the RPROP adaptation process is not blurred by the unforseeable influence of the size of the derivative but only dependent on the temporal behaviour of its sign. This leads to an efficient and transparent adaptation process. The promising capabilities of RPROP are shown in comparison to other wellknown adaptive techniques.",
"title": ""
}
] | [
{
"docid": "e19445c2ea8e19002a85ec9ace463990",
"text": "In this paper we propose a system that takes attendance of student and maintaining its records in an academic institute automatically. Manually taking the attendance and maintaining it for a long time makes it difficult task as well as wastes a lot of time. For this reason an efficient system is designed. This system takes attendance with the help of a fingerprint sensor module and all the records are saved on a computer. Fingerprint sensor module and LCD screen are dynamic which can move in the room. In order to mark the attendance, student has to place his/her finger on the fingerprint sensor module. On identification of particular student, his attendance record is updated in the database and he/she is notified through LCD screen. In this system we are going to generate Microsoft excel attendance report on computer. This report will generate automatically after 15 days (depends upon user). This report will be sent to the respected HOD, teacher and student’s parents email Id.",
"title": ""
},
{
"docid": "cecc2950741d12045d9ba3ebad1fc69f",
"text": "Learning to read is extremely difficult for about 10% of children; they are affected by a neurodevelopmental disorder called dyslexia [1, 2]. The neurocognitive causes of dyslexia are still hotly debated [3-12]. Dyslexia remediation is far from being fully achieved [13], and the current treatments demand high levels of resources [1]. Here, we demonstrate that only 12 hr of playing action video games-not involving any direct phonological or orthographic training-drastically improve the reading abilities of children with dyslexia. We tested reading, phonological, and attentional skills in two matched groups of children with dyslexia before and after they played action or nonaction video games for nine sessions of 80 min per day. We found that only playing action video games improved children's reading speed, without any cost in accuracy, more so than 1 year of spontaneous reading development and more than or equal to highly demanding traditional reading treatments. Attentional skills also improved during action video game training. It has been demonstrated that action video games efficiently improve attention abilities [14, 15]; our results showed that this attention improvement can directly translate into better reading abilities, providing a new, fast, fun remediation of dyslexia that has theoretical relevance in unveiling the causal role of attention in reading acquisition.",
"title": ""
},
{
"docid": "5c4c265df2d24350340eb956191417ae",
"text": "When a remotely sited wind farm is connected to the utility power system through a distribution line, the overcurrent relay at the common coupling point needs a directional feature. This paper presents a method for estimating the direction of fault in such radial distribution systems using phase change in current. The difference in phase angle between the positive-sequence component of the current during fault and prefault conditions has been found to be a good indicator of the fault direction in a three-phase system. A rule base formed for the purpose decides the location of fault with respect to the relay in a distribution system. Such a strategy reduces the cost of the voltage sensor and/or connection for a protection scheme which is of relevance in emerging distributed-generation systems. The algorithm has been tested through simulation for different radial distribution systems.",
"title": ""
},
{
"docid": "b1d2ff76f8b4437a731ef5ccdb46429f",
"text": "Form, function and the relationship between the two are notions that have served a crucial role in design science. Within architectural design, key aspects of the anticipated function of buildings, or of spatial environments in general, are supposed to be determined by their structural form, i.e., their shape, layout, or connectivity. Whereas the philosophy of form and function is a well-researched topic, the practical relations and dependencies between form and function are only known implicitly by designers and architects. Specifically, the formal modelling of structural form and resulting artefactual function within design and design assistance systems remains elusive. In our work, we aim at making these definitions explicit by the ontological modelling of domain entities, their properties and related constraints. We thus have to particularly focus on formal interpretation of the terms “(structural) form” and “(artefactual) function”. We put these notions into practice by formalising ontological specifications accordingly by using modularly constructed ontologies for the architectural design domain. A key aspect of our modelling approach is the use of formal qualitative spatial calculi and conceptual requirements as a link between the structural form of a design and the differing functional capabilities that it affords or leads to. We demonstrate the manner in which our ontological modelling reflects notions of architectural form and function, and how it facilitates the conceptual modelling of requirement constraints for architectural design.",
"title": ""
},
{
"docid": "15b8b0f3682e2eb7c1b1a62be65d6327",
"text": "Data augmentation is widely used to train deep neural networks for image classification tasks. Simply flipping images can help learning by increasing the number of training images by a factor of two. However, data augmentation in natural language processing is much less studied. Here, we describe two methods for data augmentation for Visual Question Answering (VQA). The first uses existing semantic annotations to generate new questions. The second method is a generative approach using recurrent neural networks. Experiments show the proposed schemes improve performance of baseline and state-of-the-art VQA algorithms.",
"title": ""
},
{
"docid": "aeb578582a6c612e0640449e12000a21",
"text": "Intelligent Tutoring Systems (ITS) generate a wealth of finegrained student interaction data. Although it seems likely that teachers could benefit from access to advanced analytics generated from these data, ITSs do not typically come with dashboards designed for teachers’ needs. In this project, we follow a user-centered design approach to create a dashboard for teachers using ITSs.",
"title": ""
},
{
"docid": "e1d0c07f9886d3258f0c5de9dd372e17",
"text": "strategies and tools must be based on some theory of learning and cognition. Of course, crafting well-articulated views that clearly answer the major epistemological questions of human learning has exercised psychologists and educators for centuries. What is a mind? What does it mean to know something? How is our knowledge represented and manifested? Many educators prefer an eclectic approach, selecting “principles and techniques from the many theoretical perspectives in much the same way we might select international dishes from a smorgasbord, choosing those we like best and ending up with a meal which represents no nationality exclusively and a design technology based on no single theoretical base” (Bednar et al., 1995, p. 100). It is certainly the case that research within collaborative educational learning tools has drawn upon behavioral, cognitive information processing, humanistic, and sociocultural theory, among others, for inspiration and justification. Problems arise, however, when tools developed in the service of one epistemology, say cognitive information processing, are integrated within instructional systems designed to promote learning goals inconsistent with it. When concepts, strategies, and tools are abstracted from the theoretical viewpoint that spawned them, they are too often stripped of meaning and utility. In this chapter, we embed our discussion in learner-centered, constructivist, and sociocultural perspectives on collaborative technology, with a bias toward the third. The principles of these perspectives, in fact, provide the theoretical rationale for much of the research and ideas presented in this book. 2",
"title": ""
},
{
"docid": "42d755dbb843d9e5ba4bae4b492c2b8e",
"text": "Context: The management of software development productivity is a key issue in software organizations, where the major drivers are lower cost and shorter time-to-market. Agile methods, including Extreme Programming and Scrum, have evolved as “light” approaches that simplify the software development process, potentially leading to increased team productivity. However, little empirical research has examined which factors do have an impact on productivity and in what way, when using agile methods. Objective: Our objective is to provide a better understanding of the factors and mediators that impact agile team productivity. Method: We have conducted a multiple-case study for six months in three large Brazilian companies that have been using agile methods for over two years. We have focused on the main productivity factors perceived by team members through interviews, documentation from retrospectives, and non-participant observation. Results: We developed a novel conceptual framework, using thematic analysis to understand the possible mechanisms behind such productivity factors. Agile team management was found to be the most influential factor in achieving agile team productivity. At the intra-team level, the main productivity factors were team design (structure and work allocation) and member turnover. At the inter-team level, the main productivity factors were how well teams could be effectively coordinated by proper interfaces and other dependencies and avoiding delays in providing promised software to dependent teams. Conclusion: Teams should be aware of the influence and magnitude of turnover, which has been shown negative for agile team productivity. Team design choices remain an important factor impacting team productivity, even more pronounced on agile teams that rely on teamwork and people factors. The intra-team coordination processes must be adjusted to enable productive work by considering priorities and pace between teams. Finally, the revised conceptual framework for agile team productivity supports further tests through confirmatory studies.",
"title": ""
},
{
"docid": "e70425a0b9d14ff4223f3553de52c046",
"text": "CUDA is a new general-purpose C language interface to GPU developed by NVIDIA. It makes full use of parallel of GPU and has been widely used now. 3D model reconstruction is a traditional and common technique which has been widely used in engineering experiments, CAD and computer graphics. In this paper, we present an algorithm of CUDA-based Poisson surface reconstruction. Our algorithm makes full use of parallel of GPU and runs entirely on GPU and is ten times faster than previous CPU algorithm.",
"title": ""
},
{
"docid": "599d814fd3b3a758f3b2459b74aeb92c",
"text": "Relation classification is a crucial ingredient in numerous information extraction systems seeking to mine structured facts from text. We propose a novel convolutional neural network architecture for this task, relying on two levels of attention in order to better discern patterns in heterogeneous contexts. This architecture enables endto-end learning from task-specific labeled data, forgoing the need for external knowledge such as explicit dependency structures. Experiments show that our model outperforms previous state-of-the-art methods, including those relying on much richer forms of prior knowledge.",
"title": ""
},
{
"docid": "f9c8209fcecbbed99aa29761dffc8e25",
"text": "ImageNet is a large-scale database of object classes with millions of images. Unfortunately only a small fraction of them is manually annotated with bounding-boxes. This prevents useful developments, such as learning reliable object detectors for thousands of classes. In this paper we propose to automatically populate ImageNet with many more bounding-boxes, by leveraging existing manual annotations. The key idea is to localize objects of a target class for which annotations are not available, by transferring knowledge from related source classes with available annotations. We distinguish two kinds of source classes: ancestors and siblings. Each source provides knowledge about the plausible location, appearance and context of the target objects, which induces a probability distribution over windows in images of the target class. We learn to combine these distributions so as to maximize the location accuracy of the most probable window. Finally, we employ the combined distribution in a procedure to jointly localize objects in all images of the target class. Through experiments on 0.5 million images from 219 classes we show that our technique (i) annotates a wide range of classes with bounding-boxes; (ii) effectively exploits the hierarchical structure of ImageNet, since all sources and types of knowledge we propose contribute to the results; (iii) scales efficiently.",
"title": ""
},
{
"docid": "987024b9cca47797813f27da08d9a7c6",
"text": "Image segmentation plays a crucial role in many medical imaging applications by automating or facilitating the delineation of anatomical structures and other regions of interest. We present herein a critical appraisal of the current status of semi-automated and automated methods for the segmentation of anatomical medical images. Current segmentation approaches are reviewed with an emphasis placed on revealing the advantages and disadvantages of these methods for medical imaging applications. The use of image segmentation in different imaging modalities is also described along with the difficulties encountered in each modality. We conclude with a discussion on the future of image segmentation methods in biomedical research.",
"title": ""
},
{
"docid": "79f691668b5e1d13cd1bfa70dfa33384",
"text": "Reported speech in the form of direct and indirect reported speech is an important indicator of evidentiality in traditional newspaper texts, but also increasingly in the new media that rely heavily on citation and quotation of previous postings, as for instance in blogs or newsgroups. This paper details the basic processing steps for reported speech analysis and reports on performance of an implementation in form of a GATE resource.",
"title": ""
},
{
"docid": "3f11c629670d986b8a266bae08e8a8d0",
"text": "SURVIVAL ANALYSIS APPROACH FOR EARLY PREDICTION OF STUDENT DROPOUT by SATTAR AMERI December 2015 Advisor: Dr. Chandan Reddy Major: Computer Science Degree: Master of Science Retention of students at colleges and universities has long been a concern for educators for many decades. The consequences of student attrition are significant for both students, academic staffs and the overall institution. Thus, increasing student retention is a long term goal of any academic institution. The most vulnerable students at all institutions of higher education are the freshman students, who are at the highest risk of dropping out at the beginning of their study. Consequently, the early identification of “at-risk” students is a crucial task that needs to be addressed precisely. In this thesis, we develop a framework for early prediction of student success using survival analysis approach. We propose time-dependent Cox (TD-Cox), which is based on the Cox proportional hazard regression model and also captures time-varying factors to address the challenge of predicting dropout students as well as the semester that the dropout will occur, to enable proactive interventions. This is critical in student retention problem because not only correctly classifying whether student is going to dropout is important but also when this is going to happen is crucial to investigate. We evaluate our method on real student data collected at Wayne State University. The results show that the proposed Cox-based framework can predict the student dropout and the semester of dropout with high accuracy and precision compared to the other alternative state-of-the-art methods.",
"title": ""
},
{
"docid": "4de2c6422d8357e6cb00cce21e703370",
"text": "OBJECTIVE\nFalls and fall-related injuries are leading problems in residential aged care facilities. The objective of this study was to provide descriptive data about falls in nursing homes.\n\n\nDESIGN/SETTING/PARTICIPANTS\nProspective recording of all falls over 1 year covering all residents from 528 nursing homes in Bavaria, Germany.\n\n\nMEASUREMENTS\nFalls were reported on a standardized form that included a facility identification code, date, time of the day, sex, age, degree of care need, location of the fall, and activity leading to the fall. Data detailing homes' bed capacities and occupancy levels were used to estimate total person-years under exposure and to calculate fall rates. All analyses were stratified by residents' degree of care need.\n\n\nRESULTS\nMore than 70,000 falls were recorded during 42,843 person-years. The fall rate was higher in men than in women (2.18 and 1.49 falls per person-year, respectively). Fall risk differed by degree of care need with lower fall risks both in the least and highest care categories. About 75% of all falls occurred in the residents' rooms or in the bathrooms and only 22% were reported within the common areas. Transfers and walking were responsible for 41% and 36% of all falls respectively. Fall risk varied during the day. Most falls were observed between 10 am and midday and between 2 pm and 8 pm.\n\n\nCONCLUSION\nThe differing fall risk patterns in specific subgroups may help to target preventive measures.",
"title": ""
},
{
"docid": "f85fb22836663d713074efcc9b1d3991",
"text": "Drawing annotations with 3D hand gestures in augmented reality are useful for creating visual and spatial references in the real world, especially when these gestures can be issued from a distance. Different techniques exist for highlighting physical objects with hand-drawn circle and arrow annotations from a distance, assuming an approximate 3D scene model (e.g., as provided by the Microsoft HoloLens). However, little is known about user preference and performance of such methods for annotating real-world 3D environments. In this paper, we compare different annotation methods using the HoloLens augmented reality development platform: Surface-Drawing and Air-Drawing, with either raw but smoothed or interpreted and beautified gesture input. For the Surface-Drawing method, users control a cursor that is projected onto the world model, allowing gesture input to occur directly on the surfaces of real-world objects. For the Air-Drawing method, gesture drawing occurs at the user's fingertip and is projected onto the world model on release. The methods have different characteristics regarding necessitated vergence switches and afforded cursor control. We performed an experiment in which users draw on two different real-world objects at different distances using the different methods. Results indicate that Surface-Drawing is more accurate than Air-Drawing and Beautified annotations are drawn faster than Non-Beautified; participants also preferred Surface-Drawing and Beautified.",
"title": ""
},
{
"docid": "9600f488c41b5574766067d32004400e",
"text": "A conversational agent, capable to have a ldquosense of humourrdquo is presented. The agent can both generate humorous sentences and recognize humoristic expressions introduced by the user during the dialogue. Humorist Bot makes use of well founded techniques of computational humor and it has been implemented using the ALICE framework embedded into an Yahoo! Messenger client. It includes also an avatar that changes the face expression according to humoristic content of the dialogue.",
"title": ""
},
{
"docid": "ef55470ed9fa3a1b792e347f5bddedbe",
"text": "Rechargeable lithium-ion batteries are promising candidates for building grid-level storage systems because of their high energy and power density, low discharge rate, and decreasing cost. A vital aspect in energy storage planning and operations is to accurately model the aging cost of battery cells, especially in irregular cycling operations. This paper proposes a semi-empirical lithium-ion battery degradation model that assesses battery cell life loss from operating profiles. We formulate the model by combining fundamental theories of battery degradation and our observations in battery aging test results. The model is adaptable to different types of lithium-ion batteries, and methods for tuning the model coefficients based on manufacturer's data are presented. A cycle-counting method is incorporated to identify stress cycles from irregular operations, allowing the degradation model to be applied to any battery energy storage (BES) applications. The usefulness of this model is demonstrated through an assessment of the degradation that a BES would incur by providing frequency control in the PJM regulation market.",
"title": ""
},
{
"docid": "48b88774957a6d30ae9d0a97b9643647",
"text": "The defect detection on manufactures is extremely important in the optimization of industrial processes; particularly, the visual inspection plays a fundamental role. The visual inspection is often carried out by a human expert. However, new technology features have made this inspection unreliable. For this reason, many researchers have been engaged to develop automatic analysis processes of manufactures and automatic optical inspections in the industrial production of printed circuit boards. Among the defects that could arise in this industrial process, those of the solder joints are very important, because they can lead to an incorrect functioning of the board; moreover, the amount of the solder paste can give some information on the quality of the industrial process. In this paper, a neural network-based automatic optical inspection system for the diagnosis of solder joint defects on printed circuit boards assembled in surface mounting technology is presented. The diagnosis is handled as a pattern recognition problem with a neural network approach. Five types of solder joints have been classified in respect to the amount of solder paste in order to perform the diagnosis with a high recognition rate and a detailed classification able to give information on the quality of the manufacturing process. The images of the boards under test are acquired and then preprocessed to extract the region of interest for the diagnosis. Three types of feature vectors are evaluated from each region of interest, which are the images of the solder joints under test, by exploiting the properties of the wavelet transform and the geometrical characteristics of the preprocessed images. The performances of three different classifiers which are a multilayer perceptron, a linear vector quantization, and a K-nearest neighbor classifier are compared. The n-fold cross-validation has been exploited to select the best architecture for the neural classifiers, while a number of experiments have been devoted to estimating the best value of K in the K-NN. The results have proved that the MLP network fed with the GW-features has the best recognition rate. This approach allows to carry out the diagnosis burden on image processing, feature extraction, and classification algorithms, reducing the cost and the complexity of the acquisition system. In fact, the experimental results suggest that the reason for the high recognition rate in the solder joint classification is due to the proper preprocessing steps followed as well as to the information contents of the features",
"title": ""
},
{
"docid": "e31ea6b8c4a5df049782b463abc602ea",
"text": "Nature plays a very important role to solve problems in a very effective and well-organized way. Few researchers are trying to create computational methods that can assist human to solve difficult problems. Nature inspired techniques like swarm intelligence, bio-inspired, physics/chemistry and many more have helped in solving difficult problems and also provide most favourable solution. Nature inspired techniques are wellmatched for soft computing application because parallel, dynamic and self organising behaviour. These algorithms motivated from the working group of social agents like ants, bees and insect. This paper is a complete survey of nature inspired techniques.",
"title": ""
}
] | scidocsrr |
1f2250209a2472bb1d660be549649ffe | Adversarial Learning of Structure-Aware Fully Convolutional Networks for Landmark Localization | [
{
"docid": "2670c9d261edfb771d7e9673a282ea0b",
"text": "In this paper a method is proposed to recover and interpret the 3D body structures of a person from a single view, provided that (1) at least six feature points on the head and a set of body joints are available on the image plane, and (2) the geometry of head and lengths of body segments formed by joints are known. First of all, the feature points on the head in the head-centered coordinate system and their image projections are used to determine a transformation matrix. Then, the camera position and orientations are extracted from the matrix. Finally, the 3D coordinates of the head points expressed in the camera-centered coordinate system are obtained. Starting from the coordinates of the neck, which is a head feature point, the 3D coordinates of other joints one-by-one are determined under the assumption of the fixed lengths of the body segments. A binary interpretation tree is used to represent the 2”-’ possible body structures, if a human body has n joints. To determine the final feasible body structures, physical and motion constraints are used to prune the interpretation tree. Formulas and rules required for the tree pruning are formulated. Experiments are used to illustrate the pruning powers of these constraints. In the two cases of input data chosen, a unique or nearly unique solution of the body structure is obtained. e 1985 Academic PI~SS, IIIC.",
"title": ""
},
{
"docid": "8a1ba356c34935a2f3a14656138f0414",
"text": "We propose an efficient approach to exploiting motion information from consecutive frames of a video sequence to recover the 3D pose of people. Previous approaches typically compute candidate poses in individual frames and then link them in a post-processing step to resolve ambiguities. By contrast, we directly regress from a spatio-temporal volume of bounding boxes to a 3D pose in the central frame. We further show that, for this approach to achieve its full potential, it is essential to compensate for the motion in consecutive frames so that the subject remains centered. This then allows us to effectively overcome ambiguities and improve upon the state-of-the-art by a large margin on the Human3.6m, HumanEva, and KTH Multiview Football 3D human pose estimation benchmarks.",
"title": ""
}
] | [
{
"docid": "f4e6c5c5c7fccbf0f72ff681cd3a8762",
"text": "Program specifications are important for many tasks during software design, development, and maintenance. Among these, temporal specifications are particularly useful. They express formal correctness requirements of an application's ordering of specific actions and events during execution, such as the strict alternation of acquisition and release of locks. Despite their importance, temporal specifications are often missing, incomplete, or described only informally. Many techniques have been proposed that mine such specifications from execution traces or program source code. However, existing techniques mine only simple patterns, or they mine a single complex pattern that is restricted to a particular set of manually selected events. There is no practical, automatic technique that can mine general temporal properties from execution traces.\n In this paper, we present Javert, the first general specification mining framework that can learn, fully automatically, complex temporal properties from execution traces. The key insight behind Javert is that real, complex specifications can be formed by composing instances of small generic patterns, such as the alternating pattern ((ab)) and the resource usage pattern ((ab c)). In particular, Javert learns simple generic patterns and composes them using sound rules to construct large, complex specifications. We have implemented the algorithm in a practical tool and conducted an extensive empirical evaluation on several open source software projects. Our results are promising; they show that Javert is scalable, general, and precise. It discovered many interesting, nontrivial specifications in real-world code that are beyond the reach of existing automatic techniques.",
"title": ""
},
{
"docid": "6b5455a7e5b93cd754c0ad90a7181a4d",
"text": "This paper reports an exploration of the concept of social intelligence in the context of designing home dialogue systems for an Ambient Intelligence home. It describes a Wizard of Oz experiment involving a robotic interface capable of simulating several human social behaviours. Our results show that endowing a home dialogue system with some social intelligence will: (a) create a positive bias in the user’s perception of technology in the home environment, (b) enhance user acceptance for the home dialogue system, and (c) trigger social behaviours by the user in relation to the home dialogue system. q 2005 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "61662cfd286c06970243bc13d5eff566",
"text": "This paper develops a theoretical learning model of text classification for Support Vector Machines (SVMs). It connects the statistical properties of text-classification tasks with the generalization performance of a SVM in a quantitative way. Unlike conventional approaches to learning text classifiers, which rely primarily on empirical evidence, this model explains why and when SVMs perform well for text classification. In particular, it addresses the following questions: Why can support vector machines handle the large feature spaces in text classification effectively? How is this related to the statistical properties of text? What are sufficient conditions for applying SVMs to text-classification problems successfully?",
"title": ""
},
{
"docid": "f3dc6ab7d2d66604353f60fe1d7bd45a",
"text": "Establishing end-to-end authentication between devices and applications in Internet of Things (IoT) is a challenging task. Due to heterogeneity in terms of devices, topology, communication and different security protocols used in IoT, existing authentication mechanisms are vulnerable to security threats and can disrupt the progress of IoT in realizing Smart City, Smart Home and Smart Infrastructure, etc. To achieve end-to-end authentication between IoT devices/applications, the existing authentication schemes and security protocols require a two-factor authentication mechanism. Therefore, as part of this paper we review the suitability of an authentication scheme based on One Time Password (OTP) for IoT and proposed a scalable, efficient and robust OTP scheme. Our proposed scheme uses the principles of lightweight Identity Based Elliptic Curve Cryptography scheme and Lamport's OTP algorithm. We evaluate analytically and experimentally the performance of our scheme and observe that our scheme with a smaller key size and lesser infrastructure performs on par with the existing OTP schemes without compromising the security level. Our proposed scheme can be implemented in real-time IoT networks and is the right candidate for two-factor authentication among devices, applications and their communications in IoT.",
"title": ""
},
{
"docid": "f1d1a73f21dcd1d27da4e9d4a93c5581",
"text": "Movements of interfaces can be analysed in terms of whether they are sensible, sensable and desirable. Sensible movements are those that users naturally perform; sensable are those that can be measured by a computer; and desirable movements are those that are required by a given application. We show how a systematic comparison of sensible, sensable and desirable movements, especially with regard to how they do not precisely overlap, can reveal potential problems with an interface and also inspire new features. We describe how this approach has been applied to the design of three interfaces: the Augurscope II, a mobile augmented reality interface for outdoors; the Drift Table, an item of furniture that uses load sensing to control the display of aerial photographs; and pointing flashlights at walls and posters in order to play sounds.",
"title": ""
},
{
"docid": "78d7c61f7ca169a05e9ae1393712cd69",
"text": "Designing an automatic solver for math word problems has been considered as a crucial step towards general AI, with the ability of natural language understanding and logical inference. The state-of-the-art performance was achieved by enumerating all the possible expressions from the quantities in the text and customizing a scoring function to identify the one with the maximum probability. However, it incurs exponential search space with the number of quantities and beam search has to be applied to trade accuracy for efficiency. In this paper, we make the first attempt of applying deep reinforcement learning to solve arithmetic word problems. The motivation is that deep Q-network has witnessed success in solving various problems with big search space and achieves promising performance in terms of both accuracy and running time. To fit the math problem scenario, we propose our MathDQN that is customized from the general deep reinforcement learning framework. Technically, we design the states, actions, reward function, together with a feed-forward neural network as the deep Q-network. Extensive experimental results validate our superiority over state-ofthe-art methods. Our MathDQN yields remarkable improvement on most of datasets and boosts the average precision among all the benchmark datasets by 15%.",
"title": ""
},
{
"docid": "aaba5dc8efc9b6a62255139965b6f98d",
"text": "The interaction of an autonomous mobile robot with the real world critically depends on the robots morphology and on its environment. Building a model of these aspects is extremely complex, making simulation insu cient for accurate validation of control algorithms. If simulation environments are often very e cient, the tools for experimenting with real robots are often inadequate. The traditional programming languages and tools seldom provide enought support for realtime experiments, thus hindering the understanding of the control algorithms and making the experimentation complex and time-consuming. A miniature robot is presented: it has a cylindrical shape measuring 55 mm in diameter and 30 mm in height. Due to its small size, experiments can be performed quickly and cost-e ectively in a small working area. Small peripherals can be designed and connected to the basic module and can take advantage of a versatile communication scheme. A serial-link is provided to run control algorithms on a workstation during debugging, thereby giving the user the opportunity of employing all available graphical tools. Once debugged, the algorithm can be downloaded to the robot and run on its own processor. Experimentation with groups of robots is hardly possible with commercially available hardware. The size and the price of the described robot open the way to cost-e ective investigations into collective behaviour. This aspect of research drives the design of the robot described in this paper. Experiments with some twenty units are planned for the near future.",
"title": ""
},
{
"docid": "ffdddba343bb0aa47fc101696ab3696d",
"text": "The meaning of a sentence in a document is more easily determined if its constituent words exhibit cohesion with respect to their individual semantics. This paper explores the degree of cohesion among a document's words using lexical chains as a semantic representation of its meaning. Using a combination of diverse types of lexical chains, we develop a text document representation that can be used for semantic document retrieval. For our approach, we develop two kinds of lexical chains: (i) a multilevel flexible chain representation of the extracted semantic values, which is used to construct a fixed segmentation of these chains and constituent words in the text; and (ii) a fixed lexical chain obtained directly from the initial semantic representation from a document. The extraction and processing of concepts is performed using WordNet as a lexical database. The segmentation then uses these lexical chains to model the dispersion of concepts in the document. Representing each document as a high-dimensional vector, we use spherical k-means clustering to demonstrate that our approach performs better than previ-",
"title": ""
},
{
"docid": "69275ddc999036a415b339a0a0219978",
"text": "BACKGROUND\nDeveloping countries, including Ethiopia are experiencing a double burden of malnutrition. There is limited information about prevalence of overweight/obesity among school aged children in Ethiopia particularly in Bahir Dar city. Hence this study aimed to assess the prevalence of overweight/obesity and associated factors among school children aged 6-12 years at Bahir Dar City, Northwest Ethiopia.\n\n\nMETHODS\nA school based cross-sectional study was carried out. A total of 634 children were included in the study. Multi stage systematic random sampling technique was used. A multivariable logistic regression analysis was used to identify factors associated with overweight/obesity. The association between dependent and independent variables were assessed using odds ratio with 95% confidence interval and p-value ≤0.05 was considered statistically significant.\n\n\nRESULTS\nThe overall prevalence of overweight and/or obesity was 11.9% (95% CI, 9.3, 14.4) (out of which 8.8% were overweight and 3.1% were obese). Higher wealth status[adjusted OR = 3.14, 95% CI:1.17, 8.46], being a private school student [AOR = 2.21, 95% CI:1.09, 4.49], use of transportation to and from school [AOR = 2.53, 95% CI: 1.26,5.06], fast food intake [AOR = 3.88, 95% CI: 1.42,10.55], lack of moderate physical activity [AOR = 2.87, 95% CI: 1.21,6.82], low intake of fruit and vegetable [AOR = 6.45, 95% CI:3.19,13.06] were significant factors associated with overweight and obesity.\n\n\nCONCLUSION\nThis study revealed that prevalence of overweight/obesity among school aged children in Bahir Dar city is high. Thus, promoting healthy dietary habit, particularly improving fruit and vegetable intake is essential to reduce the burden of overweight and obesity. Furthermore, it is important to strengthen nutrition education about avoiding junk food consumption and encouraging regular physical activity.",
"title": ""
},
{
"docid": "f847a04cb60bbbe5a2cd1ec1c4c9be6f",
"text": "This letter presents a wideband patch antenna on a low-temperature cofired ceramic substrate for Local Multipoint Distribution Service band applications. Conventional rectangular patch antennas have a narrow bandwidth. The proposed via-wall structure enhances the electric field coupling between the stacked patches to achieve wideband characteristics. We designed same-side and opposite-side feeding configurations and report on the fabrication of an experimental 28-GHz antenna used to validate the design concept. Measurements correlate well with the simulation results, achieving a 10-dB impedance bandwidth of 25.4% (23.4-30.2 GHz).",
"title": ""
},
{
"docid": "ea9e392bdca32154b95b2b0b424229c3",
"text": "Multi-person pose estimation in images and videos is an important yet challenging task with many applications. Despite the large improvements in human pose estimation enabled by the development of convolutional neural networks, there still exist a lot of difficult cases where even the state-of-the-art models fail to correctly localize all body joints. This motivates the need for an additional refinement step that addresses these challenging cases and can be easily applied on top of any existing method. In this work, we introduce a pose refinement network (PoseRefiner) which takes as input both the image and a given pose estimate and learns to directly predict a refined pose by jointly reasoning about the input-output space. In order for the network to learn to refine incorrect body joint predictions, we employ a novel data augmentation scheme for training, where we model \"hard\" human pose cases. We evaluate our approach on four popular large-scale pose estimation benchmarks such as MPII Single- and Multi-Person Pose Estimation, PoseTrack Pose Estimation, and PoseTrack Pose Tracking, and report systematic improvement over the state of the art.",
"title": ""
},
{
"docid": "cf7eff6c24f333b6bcf30ef8cd8686e0",
"text": "For 4 decades, vigorous efforts have been based on the premise that early intervention for children of poverty and, more recently, for children with developmental disabilities can yield significant improvements in cognitive, academic, and social outcomes. The history of these efforts is briefly summarized and a conceptual framework presented to understand the design, research, and policy relevance of these early interventions. This framework, biosocial developmental contextualism, derives from social ecology, developmental systems theory, developmental epidemiology, and developmental neurobiology. This integrative perspective predicts that fragmented, weak efforts in early intervention are not likely to succeed, whereas intensive, high-quality, ecologically pervasive interventions can and do. Relevant evidence is summarized in 6 principles about efficacy of early intervention. The public policy challenge in early intervention is to contain costs by more precisely targeting early interventions to those who most need and benefit from these interventions. The empirical evidence on biobehavioral effects of early experience and early intervention has direct relevance to federal and state policy development and resource allocation.",
"title": ""
},
{
"docid": "b7094d555b9b4c7197822027510a65aa",
"text": "Vegetation indices have been used extensively to estimate the vegetation density from satellite and airborne images for many years. In this paper, we focus on one of the most popular of such indices, the normalized difference vegetation index (NDVI), and we introduce a statistical framework to analyze it. As the degree of vegetation increases, the corresponding NDVI values begin to saturate and cannot represent highly vegetated regions reliably. By adopting the statistical viewpoint, we show how to obtain a linearized and more reliable measure. While the NDVI uses only red and near-infrared bands, we use the statistical framework to introduce new indices using the blue and green bands as well. We compare these indices with that obtained by linearizing the NDVI with extensive experimental results on real IKONOS multispectral images.",
"title": ""
},
{
"docid": "204a2331af6c32a502005d5d19f4fc10",
"text": "This paper presents a detailed comparative study of spoke type brushless dc (SPOKE-BLDC) motors due to the operating conditions and designs a new type SPOKE-BLDC with flux barriers for high torque applications, such as tractions. The current dynamic analysis method considering the local magnetic saturation of the rotor and the instantaneous current by pwm driving circuit is developed based on the coupled finite element analysis with rotor dynamic equations. From this analysis, several new structures using the flux barriers are designed and the characteristics are compared in order to reduce the large torque ripple and improve the average torque of SPOKE-BLDC. From these results, it is confirmed that the flux barriers, which are inserted on the optimized position of the rotor, have made remarkable improvement for the torque characteristics of the SPOKE-BLDC.",
"title": ""
},
{
"docid": "0cc665089be9aa8217baac32f0385f41",
"text": "Deep neural networks have achieved near-human accuracy levels in various types of classification and prediction tasks including images, text, speech, and video data. However, the networks continue to be treated mostly as black-box function approximators, mapping a given input to a classification output. The next step in this human-machine evolutionary process — incorporating these networks into mission critical processes such as medical diagnosis, planning and control — requires a level of trust association with the machine output. Typically, statistical metrics are used to quantify the uncertainty of an output. However, the notion of trust also depends on the visibility that a human has into the working of the machine. In other words, the neural network should provide human-understandable justifications for its output leading to insights about the inner workings. We call such models as interpretable deep networks. Interpretability is not a monolithic notion. In fact, the subjectivity of an interpretation, due to different levels of human understanding, implies that there must be a multitude of dimensions that together constitute interpretability. In addition, the interpretation itself can be provided either in terms of the low-level network parameters, or in terms of input features used by the model. In this paper, we outline some of the dimensions that are useful for model interpretability, and categorize prior work along those dimensions. In the process, we perform a gap analysis of what needs to be done to improve model interpretability.",
"title": ""
},
{
"docid": "e3b3e4e75580f3dad0f2fb2b9e28fff4",
"text": "The present study introduced an integrated method for the production of biodiesel from microalgal oil. Heterotrophic growth of Chlorella protothecoides resulted in the accumulation of high lipid content (55%) in cells. Large amount of microalgal oil was efficiently extracted from these heterotrophic cells by using n-hexane. Biodiesel comparable to conventional diesel was obtained from heterotrophic microalgal oil by acidic transesterification. The best process combination was 100% catalyst quantity (based on oil weight) with 56:1 molar ratio of methanol to oil at temperature of 30 degrees C, which reduced product specific gravity from an initial value of 0.912 to a final value of 0.8637 in about 4h of reaction time. The results suggested that the new process, which combined bioengineering and transesterification, was a feasible and effective method for the production of high quality biodiesel from microalgal oil.",
"title": ""
},
{
"docid": "80ba326570f2e492eff3515ddcc2b3cf",
"text": "Automatic program transformation tools can be valuable for programmers to help them with refactoring tasks, and for Computer Science students in the form of tutoring systems that suggest repairs to programming assignments. However, manually creating catalogs of transformations is complex and time-consuming. In this paper, we present REFAZER, a technique for automatically learning program transformations. REFAZER builds on the observation that code edits performed by developers can be used as input-output examples for learning program transformations. Example edits may share the same structure but involve different variables and subexpressions, which must be generalized in a transformation at the right level of abstraction. To learn transformations, REFAZER leverages state-of-the-art programming-by-example methodology using the following key components: (a) a novel domain-specific language (DSL) for describing program transformations, (b) domain-specific deductive algorithms for efficiently synthesizing transformations in the DSL, and (c) functions for ranking the synthesized transformations. We instantiate and evaluate REFAZER in two domains. First, given examples of code edits used by students to fix incorrect programming assignment submissions, we learn program transformations that can fix other students' submissions with similar faults. In our evaluation conducted on 4 programming tasks performed by 720 students, our technique helped to fix incorrect submissions for 87% of the students. In the second domain, we use repetitive code edits applied by developers to the same project to synthesize a program transformation that applies these edits to other locations in the code. In our evaluation conducted on 56 scenarios of repetitive edits taken from three large C# open-source projects, REFAZER learns the intended program transformation in 84% of the cases using only 2.9 examples on average.",
"title": ""
},
{
"docid": "d83ecee8e5f59ee8e6a603c65f952c22",
"text": "PredPatt is a pattern-based framework for predicate-argument extraction. While it works across languages and provides a well-formed syntax-semantics interface for NLP tasks, a large-scale and reproducible evaluation has been lacking, which prevents comparisons between PredPatt and other related systems, and inhibits the updates of the patterns in PredPatt. In this work, we improve and evaluate PredPatt by introducing a large set of high-quality annotations converted from PropBank, which can also be used as a benchmark for other predicate-argument extraction systems. We compare PredPatt with other prominent systems and shows that PredPatt achieves the best precision and recall.",
"title": ""
},
{
"docid": "23ba216f846eab3ff8c394ad29b507bf",
"text": "The emergence of large-scale freeform shapes in architecture poses big challenges to the fabrication of such structures. A key problem is the approximation of the design surface by a union of patches, so-called panels, that can be manufactured with a selected technology at reasonable cost, while meeting the design intent and achieving the desired aesthetic quality of panel layout and surface smoothness. The production of curved panels is mostly based on molds. Since the cost of mold fabrication often dominates the panel cost, there is strong incentive to use the same mold for multiple panels. We cast the major practical requirements for architectural surface paneling, including mold reuse, into a global optimization framework that interleaves discrete and continuous optimization steps to minimize production cost while meeting user-specified quality constraints. The search space for optimization is mainly generated through controlled deviation from the design surface and tolerances on positional and normal continuity between neighboring panels. A novel 6-dimensional metric space allows us to quickly compute approximate inter-panel distances, which dramatically improves the performance of the optimization and enables the handling of complex arrangements with thousands of panels. The practical relevance of our system is demonstrated by paneling solutions for real, cutting-edge architectural freeform design projects.",
"title": ""
}
] | scidocsrr |
05a499f4c2859ddecc610df78bf9cdf3 | Classifying imbalanced data sets using similarity based hierarchical decomposition | [
{
"docid": "2990de2e037498b22fb66b3ddc635d49",
"text": "Class imbalance is a problem that is common to many application domains. When examples of one class in a training data set vastly outnumber examples of the other class(es), traditional data mining algorithms tend to create suboptimal classification models. Several techniques have been used to alleviate the problem of class imbalance, including data sampling and boosting. In this paper, we present a new hybrid sampling/boosting algorithm, called RUSBoost, for learning from skewed training data. This algorithm provides a simpler and faster alternative to SMOTEBoost, which is another algorithm that combines boosting and data sampling. This paper evaluates the performances of RUSBoost and SMOTEBoost, as well as their individual components (random undersampling, synthetic minority oversampling technique, and AdaBoost). We conduct experiments using 15 data sets from various application domains, four base learners, and four evaluation metrics. RUSBoost and SMOTEBoost both outperform the other procedures, and RUSBoost performs comparably to (and often better than) SMOTEBoost while being a simpler and faster technique. Given these experimental results, we highly recommend RUSBoost as an attractive alternative for improving the classification performance of learners built using imbalanced data.",
"title": ""
}
] | [
{
"docid": "ac4627c8dbacfc24ae45c6e1596f1079",
"text": "Obtaining accurate and automated lung field segmentation is a challenging step in the development of Computer-Aided Diagnosis (CAD) system. In this paper, fully automatic lung field segmentation is proposed. Initially, novel features are extracted by considering spatial interaction of the neighbouring pixels. Then constrained non-negative matrix factorization (CNMF) factorized the data matrix obtained from the visual appearance model into basis and coefficient matrices. Initial lung segmentation is achieved by applying unsupervised learning on the coefficient matrix. 2-D region growing operation removes trachea and bronchi appearing in the initial lung segmentation. The experimental results on different database shows that the proposed method produces significant DSC 0.973 as compared to the existing lung segmentation algorithms.",
"title": ""
},
{
"docid": "cc8e52fdb69a9c9f3111287905f02bfc",
"text": "We present a new methodology for exploring and analyzing navigation patterns on a web site. The patterns that can be analyzed consist of sequences of URL categories traversed by users. In our approach, we first partition site users into clusters such that users with similar navigation paths through the site are placed into the same cluster. Then, for each cluster, we display these paths for users within that cluster. The clustering approach we employ is model-based (as opposed to distance-based) and partitions users according to the order in which they request web pages. In particular, we cluster users by learning a mixture of first-order Markov models using the Expectation-Maximization algorithm. The runtime of our algorithm scales linearly with the number of clusters and with the size of the data; and our implementation easily handles hundreds of thousands of user sessions in memory. In the paper, we describe the details of our method and a visualization tool based on it called WebCANVAS. We illustrate the use of our approach on user-traffic data from msnbc.com.",
"title": ""
},
{
"docid": "64d4776be8e2dbb0fa3b30d6efe5876c",
"text": "This paper presents a novel method for hierarchically organizing large face databases, with application to efficient identity-based face retrieval. The method relies on metric learning with local binary pattern (LBP) features. On one hand, LBP features have proved to be highly resilient to various appearance changes due to illumination and contrast variations while being extremely efficient to calculate. On the other hand, metric learning (ML) approaches have been proved very successful for face verification ‘in the wild’, i.e. in uncontrolled face images with large amounts of variations in pose, expression, appearances, lighting, etc. While such ML based approaches compress high dimensional features into low dimensional spaces using discriminatively learned projections, the complexity of retrieval is still significant for large scale databases (with millions of faces). The present paper shows that learning such discriminative projections locally while organizing the database hierarchically leads to a more accurate and efficient system. The proposed method is validated on the standard Labeled Faces in the Wild (LFW) benchmark dataset with millions of additional distracting face images collected from photos on the internet.",
"title": ""
},
{
"docid": "0a9bfd72a12dcddfd27d982c8b27b9d5",
"text": "A novel concept of a series feeding network of a microstrip antenna array has been shown. The proposed feeding network utilizes a four-port slot coupler as a three-way power divider, which is composed of two microstrip lines appropriately coupled through a slot within a common ground plane. The proposed power divider is used for simultaneous power distribution between two consecutive linear subarrays and between two 4 × 1 linear arrays constituting a single 8 × 1 linear subarray, where equal-amplitude and out-of-phase signals are required. Such a solution allows for realization of antenna arrays, in which all linear subarrays designed with the use of the “through-element” series feeding technique are fed at their centers from single transmission lines. The theoretical analysis as well as measurement results of the 8 × 8 antenna array operating within 10.5-GHz frequency range are shown.",
"title": ""
},
{
"docid": "d076cb1cf48cf0a9e7eb5fee749ed10e",
"text": "Cats have protractible claws to fold their tips to keep them sharp. They protract claws while hunting and pawing on slippery surfaces. Protracted claws by tendons and muscles of toes can help cats anchoring themselves steady while their locomotion trends to slip and releasing the hold while they retract claws intentionally. This research proposes a kind of modularized self-adaptive toe mechanism inspired by cat claws to improve the extremities' contact performance for legged robot. The mechanism is constructed with four-bar linkage actuated by contact reaction force and retracted by applied spring tension. A feasible mechanical design based on several essential parameters is introduced and an integrated Sole-Toe prototype is built for experimental evaluation. Mechanical self-adaption and actual contact performance on specific surface have been evaluated respectively on a biped walking platform and a bench-top mechanical testing.",
"title": ""
},
{
"docid": "31cec57cc62759852a6500d9b0102333",
"text": "Migraine is a common disease throughout the world. Not only does it affect the life of people tremendously, but it also leads to high costs, e.g. due to inability to work or various required drug-taking cycles for finding the best drug for a patient. Solving the latter aspect could help to improve the life of patients and decrease the impact of the other consequences. Therefore, in this paper, we present an approach for a drug recommendation system based on the highly scalable native graph database Neo4J. The presented system uses simulated patient data to help physicians gain more transparency about which drug fits a migraine patient best considering her individual features. Our evaluation shows that the proposed system works as intended. This means that only drugs with highest relevance scores and no interactions with the patient's diseases, drugs or pregnancy are recommended.",
"title": ""
},
{
"docid": "1dbb04e806b1fd2a8be99633807d9f4d",
"text": "Realistically animated fluids can add substantial realism to interactive applications such as virtual surgery simulators or computer games. In this paper we propose an interactive method based on Smoothed Particle Hydrodynamics (SPH) to simulate fluids with free surfaces. The method is an extension of the SPH-based technique by Desbrun to animate highly deformable bodies. We gear the method towards fluid simulation by deriving the force density fields directly from the Navier-Stokes equation and by adding a term to model surface tension effects. In contrast to Eulerian grid-based approaches, the particle-based approach makes mass conservation equations and convection terms dispensable which reduces the complexity of the simulation. In addition, the particles can directly be used to render the surface of the fluid. We propose methods to track and visualize the free surface using point splatting and marching cubes-based surface reconstruction. Our animation method is fast enough to be used in interactive systems and to allow for user interaction with models consisting of up to 5000 particles.",
"title": ""
},
{
"docid": "0d966c39aabe4f51181b1e8cf520cae3",
"text": "The deflated surfaces of the alluvial fans in Saheki crater reveal the most detailed 28 record of fan stratigraphy and evolution found, to date, on Mars. During deposition of at least the 29 uppermost 100 m of fan deposits, discharges from the source basin consisted of channelized 30 flows transporting sediment (which we infer to be primarily sandand gravel-sized) as bedload 31 coupled with extensive overbank mud-rich flows depositing planar beds of sand-sized or finer 32 sediment. Flow events are inferred to have been of modest magnitude (probably less than ~60 33 m 3 /s), of short duration, and probably occupied only a few distributaries during any individual 34 flow event. Occasional channel avulsions resulted in the distribution of sediment across the 35 entire fan. A comparison with fine-grained alluvial fans in Chile’s Atacama Desert provides 36 insights into the processes responsible for constructing the Saheki crater fans: sediment is 37 deposited by channelized flows (transporting sand through boulder-sized material) and overbank 38 mudflows (sand size and finer) and wind erosion leaves channels expressed in inverted 39 topographic relief. The most likely source of water was snowmelt released after annual or 40 epochal accumulation of snow in the headwater source basin on the interior crater rim during the 41 Hesperian to Amazonian periods. We infer the Saheki fans to have been constructed by many 42 hundreds of separate flow events, and accumulation of the necessary snow and release of 43 meltwater may have required favorable orbital configurations or transient global warming. 44",
"title": ""
},
{
"docid": "3ec9107c5d389425e1a89086948ea0c7",
"text": "BACKGROUND\nA reduction in the reported incidence of malignant degeneration within nevus sebaceus has led many physicians to recommend serial clinical evaluation and biopsy of suspicious areas rather than prophylactic surgical excision. Unfortunately, no well-defined inclusion criteria, including lesion size and location, have been described for the management of nevus sebaceus.\n\n\nMETHODS\nTo assess whether the incidence or timing of malignant degeneration contraindicates surgical excision, the authors performed a PubMed literature search for any studies, excluding case reports, related to malignant change within nevus sebaceus since 1990. They then defined giant nevus sebaceus to consist of lesions greater than 20 cm or greater than 1 percent of the total body surface area and retrospectively examined their experience and outcomes treating giant nevus sebaceus.\n\n\nRESULTS\nData were pooled from six large retrospective institutional studies (2520 patients). The cumulative incidence of benign and malignant tumors was 6.1 and 0.5 percent, respectively. Of the authors' 195 patients with giant congenital nevi, only six (3.0 percent) met the definition of giant nevus sebaceus. All patients required tissue expansion for reconstruction, and two patients required concomitant skin grafting. Two complications required operative intervention.\n\n\nCONCLUSIONS\nEarly malignant degeneration within nevus sebaceus is rare. Management, however, must account for complex monitoring, particularly for lesions within the scalp, associated alopecia, involvement of multiple facial aesthetic subunits, and postpubertal transformation affecting both appearance and monitoring of the lesions. The latter considerations, rather than the reported incidence of malignant transformation, should form the bases for surgical intervention in giant nevus sebaceus.\n\n\nCLINICAL QUESTION/LEVEL OF EVIDENCE\nTherapeutic, V.",
"title": ""
},
{
"docid": "97aab319e3d38d755860b141c5a4fa38",
"text": "Automatically generating a natural language description of an image has attracted interests recently both because of its importance in practical applications and because it connects two major artificial intelligence fields: computer vision and natural language processing. Existing approaches are either top-down, which start from a gist of an image and convert it into words, or bottom-up, which come up with words describing various aspects of an image and then combine them. In this paper, we propose a new algorithm that combines both approaches through a model of semantic attention. Our algorithm learns to selectively attend to semantic concept proposals and fuse them into hidden states and outputs of recurrent neural networks. The selection and fusion form a feedback connecting the top-down and bottom-up computation. We evaluate our algorithm on two public benchmarks: Microsoft COCO and Flickr30K. Experimental results show that our algorithm significantly outperforms the state-of-the-art approaches consistently across different evaluation metrics.",
"title": ""
},
{
"docid": "f2f43e7087d3506a848849b64b062954",
"text": "We present an Adaptive User Interface (AUI) for online courses in higher education as a method for solving the challenges posed by the different knowledge levels in a heterogeneous group of students. The scenario described in this paper is an online beginners' course in Mathematics which is extended by an adaptive course layout to better fit the needs of every individual student. The course offers an entry-level test to check each student's prior knowledge and skills. The results are used to automatically determine which parts of the course are relevant for the student and which ones can be hidden, based on parameters set by the course teachers. Initial results are promising; the new adaptive learning platform in mathematics is leading to higher student satisfaction and better performance.",
"title": ""
},
{
"docid": "1e25eeed661e6b9ed6e74ee8ae5beec7",
"text": "In this paper, different electric motors are studied and compared to see the benefits of each motor and the one that is more suitable to be used in the electric vehicle (EV) applications. There are five main electric motor types, DC, induction, permanent magnet synchronous, switched reluctance and brushless DC motors are studied. It is concluded that although the induction motors technology is more mature than others, for the EV applications the brushless DC and permanent magnet motors are more suitable than others. The use of these motors will result in less pollution, less fuel consumption and higher power to volume ratio. The reducing prices of the permanent magnet materials and the trend of increasing efficiency in the permanent magnet and brushless DC motors make them more and more attractive for the EV applications.",
"title": ""
},
{
"docid": "f262e911b5254ad4d4419ed7114b8a4f",
"text": "User Satisfaction is one of the most extensively used dimensions for Information Systems (IS) success evaluation with a large body of literature and standardized instruments of User Satisfaction. Despite the extensive literature on User Satisfaction, there exist much controversy over the measures of User Satisfaction and the adequacy of User Satisfaction measures to gauge the level of success in complex, contemporary IS. Recent studies in IS have suggested treating User Satisfaction as an overarching construct of success, rather than a measure of success. Further perplexity is introduced over the alleged overlaps between User Satisfaction measures and the measures of IS success (e.g. system quality, information quality) suggested in the literature. The following study attempts to clarify the aforementioned confusions by gathering data from 310 Enterprise System users and analyzing 16 User Satisfaction instruments. The statistical analysis of the 310 responses and the content analysis of the 16 instruments suggest the appropriateness of treating User Satisfaction as an overarching measure of success rather a dimension of success.",
"title": ""
},
{
"docid": "5d2ab1a4f28aa9286a3ef19c2c822af1",
"text": "Stray current control is essential in direct current (DC) mass transit systems where the rail insulation is not of sufficient quality to prevent a corrosion risk to the rails, supporting and third-party infrastructure. This paper details the principles behind the need for stray current control and examines the relationship between the stray current collection system design and its efficiency. The use of floating return rails is shown to provide a reduction in stray current level in comparison to a grounded system, significantly reducing the corrosion level of the traction system running rails. An increase in conductivity of the stray current collection system or a reduction in the soil resistivity surrounding the traction system is shown to decrease the corrosion risk to the supporting and third party infrastructure.",
"title": ""
},
{
"docid": "73bfd9bca8a111e66a35f5d94dcbaa98",
"text": "Most previous work in household energy conservation has focused on rule-based home automation to achieve energy savings, with relatively few researchers focusing on context-aware technologies. As a result, user comfort is often disregarded and few solutions handle decision conflicts caused by multiple activities undertaken by multiple users. The main contribution of this work is twofold. First, a comprehensive human-centric and context-aware comfort index is proposed to evaluate how users feel under particular environmental conditions with regard to thermal, illumination, and appliance-usage preferences. Second, the energy savings is formulated into an optimization problem to minimize the total energy consumption, even under multiple user comfort constraints. Short-term evaluation in our simulated home environment resulted in energy savings of at least 28.98%. Long-term evaluation using a home simulator resulted in energy savings of 33.7%. Most importantly, the energy savings in both situations was achieved under multiple user comfort constraints, representing a truly human-centric living environment.",
"title": ""
},
{
"docid": "f140a58cc600916b9b272491e0e65d79",
"text": "Person identification across nonoverlapping cameras, also known as person reidentification, aims to match people at different times and locations. Reidentifying people is of great importance in crucial applications such as wide-area surveillance and visual tracking. Due to the appearance variations in pose, illumination, and occlusion in different camera views, person reidentification is inherently difficult. To address these challenges, a reference-based method is proposed for person reidentification across different cameras. Instead of directly matching people by their appearance, the matching is conducted in a reference space where the descriptor for a person is translated from the original color or texture descriptors to similarity measures between this person and the exemplars in the reference set. A subspace is first learned in which the correlations of the reference data from different cameras are maximized using regularized canonical correlation analysis (RCCA). For reidentification, the gallery data and the probe data are projected onto this RCCA subspace and the reference descriptors (RDs) of the gallery and probe are generated by computing the similarity between them and the reference data. The identity of a probe is determined by comparing the RD of the probe and the RDs of the gallery. A reranking step is added to further improve the results using a saliency-based matching scheme. Experiments on publicly available datasets show that the proposed method outperforms most of the state-of-the-art approaches.",
"title": ""
},
{
"docid": "a245aca07bd707ee645cf5cb283e7c5e",
"text": "The paradox of blunted parathormone (PTH) secretion in patients with severe hypomagnesemia has been known for more than 20 years, but the underlying mechanism is not deciphered. We determined the effect of low magnesium on in vitro PTH release and on the signals triggered by activation of the calcium-sensing receptor (CaSR). Analogous to the in vivo situation, PTH release from dispersed parathyroid cells was suppressed under low magnesium. In parallel, the two major signaling pathways responsible for CaSR-triggered block of PTH secretion, the generation of inositol phosphates, and the inhibition of cAMP were enhanced. Desensitization or pertussis toxin-mediated inhibition of CaSR-stimulated signaling suppressed the effect of low magnesium, further confirming that magnesium acts within the axis CaSR-G-protein. However, the magnesium binding site responsible for inhibition of PTH secretion is not identical with the extracellular ion binding site of the CaSR, because the magnesium deficiency-dependent signal enhancement was not altered on CaSR receptor mutants with increased or decreased affinity for calcium and magnesium. By contrast, when the magnesium affinity of the G alpha subunit was decreased, CaSR activation was no longer affected by magnesium. Thus, the paradoxical block of PTH release under magnesium deficiency seems to be mediated through a novel mechanism involving an increase in the activity of G alpha subunits of heterotrimeric G-proteins.",
"title": ""
},
{
"docid": "94f8ebb84705e0d6c7a87bb6515fd710",
"text": "We describe here our approaches and results on the WAT 2017 shared translation tasks. Motivated by the good results we obtained with Neural Machine Translation in the previous shared task, we continued to explore this approach this year, with incremental improvements in models and training methods. We focused on the ASPEC dataset and could improve the stateof-the-art results for Chinese-to-Japanese and Japanese-to-Chinese translations.",
"title": ""
},
{
"docid": "9cb28706a45251e3d2fb5af64dd9351f",
"text": "This article proposes an informational perspective on comparison consequences in social judgment. It is argued that to understand the variable consequences of comparison, one has to examine what target knowledge is activated during the comparison process. These informational underpinnings are conceptualized in a selective accessibility model that distinguishes 2 fundamental comparison processes. Similarity testing selectively makes accessible knowledge indicating target-standard similarity, whereas dissimilarity testing selectively makes accessible knowledge indicating target-standard dissimilarity. These respective subsets of target knowledge build the basis for subsequent target evaluations, so that similarity testing typically leads to assimilation whereas dissimilarity testing typically leads to contrast. The model is proposed as a unifying conceptual framework that integrates diverse findings on comparison consequences in social judgment.",
"title": ""
}
] | scidocsrr |
d205f14331a9113a5eadee7947a3254e | Building Better Quality Predictors Using "$\epsilon$-Dominance" | [
{
"docid": "6e675e8a57574daf83ab78cea25688f5",
"text": "Collecting quality data from software projects can be time-consuming and expensive. Hence, some researchers explore âunsupervisedâ approaches to quality prediction that does not require labelled data. An alternate technique is to use âsupervisedâ approaches that learn models from project data labelled with, say, âdefectiveâ or ânot-defectiveâ. Most researchers use these supervised models since, it is argued, they can exploit more knowledge of the projects. \nAt FSEâ16, Yang et al. reported startling results where unsupervised defect predictors outperformed supervised predictors for effort-aware just-in-time defect prediction. If confirmed, these results would lead to a dramatic simplification of a seemingly complex task (data mining) that is widely explored in the software engineering literature. \nThis paper repeats and refutes those results as follows. (1) There is much variability in the efficacy of the Yang et al. predictors so even with their approach, some supervised data is required to prune weaker predictors away. (2) Their findings were grouped across N projects. When we repeat their analysis on a project-by-project basis, supervised predictors are seen to work better. \nEven though this paper rejects the specific conclusions of Yang et al., we still endorse their general goal. In our our experiments, supervised predictors did not perform outstandingly better than unsupervised ones for effort-aware just-in-time defect prediction. Hence, they may indeed be some combination of unsupervised learners to achieve comparable performance to supervised ones. We therefore encourage others to work in this promising area.",
"title": ""
},
{
"docid": "66bf2c7d6af4e2e7eec279888df23125",
"text": "Defect prediction on projects with limited historical data has attracted great interest from both researchers and practitioners. Cross-project defect prediction has been the main area of progress by reusing classifiers from other projects. However, existing approaches require some degree of homogeneity (e.g., a similar distribution of metric values) between the training projects and the target project. Satisfying the homogeneity requirement often requires significant effort (currently a very active area of research).\n An unsupervised classifier does not require any training data, therefore the heterogeneity challenge is no longer an issue. In this paper, we examine two types of unsupervised classifiers: a) distance-based classifiers (e.g., k-means); and b) connectivity-based classifiers. While distance-based unsupervised classifiers have been previously used in the defect prediction literature with disappointing performance, connectivity-based classifiers have never been explored before in our community.\n We compare the performance of unsupervised classifiers versus supervised classifiers using data from 26 projects from three publicly available datasets (i.e., AEEEM, NASA, and PROMISE). In the cross-project setting, our proposed connectivity-based classifier (via spectral clustering) ranks as one of the top classifiers among five widely-used supervised classifiers (i.e., random forest, naive Bayes, logistic regression, decision tree, and logistic model tree) and five unsupervised classifiers (i.e., k-means, partition around medoids, fuzzy C-means, neural-gas, and spectral clustering). In the within-project setting (i.e., models are built and applied on the same project), our spectral classifier ranks in the second tier, while only random forest ranks in the first tier. Hence, connectivity-based unsupervised classifiers offer a viable solution for cross and within project defect predictions.",
"title": ""
},
{
"docid": "752e6d6f34ffc638e9a0d984a62db184",
"text": "Defect prediction models are classifiers that are trained to identify defect-prone software modules. Such classifiers have configurable parameters that control their characteristics (e.g., the number of trees in a random forest classifier). Recent studies show that these classifiers may underperform due to the use of suboptimal default parameter settings. However, it is impractical to assess all of the possible settings in the parameter spaces. In this paper, we investigate the performance of defect prediction models where Caret --- an automated parameter optimization technique --- has been applied. Through a case study of 18 datasets from systems that span both proprietary and open source domains, we find that (1) Caret improves the AUC performance of defect prediction models by as much as 40 percentage points; (2) Caret-optimized classifiers are at least as stable as (with 35% of them being more stable than) classifiers that are trained using the default settings; and (3) Caret increases the likelihood of producing a top-performing classifier by as much as 83%. Hence, we conclude that parameter settings can indeed have a large impact on the performance of defect prediction models, suggesting that researchers should experiment with the parameters of the classification techniques. Since automated parameter optimization techniques like Caret yield substantially benefits in terms of performance improvement and stability, while incurring a manageable additional computational cost, they should be included in future defect prediction studies.",
"title": ""
},
{
"docid": "f1cbd60e1bd721e185bbbd12c133ad91",
"text": "Defect prediction models are a well-known technique for identifying defect-prone files or packages such that practitioners can allocate their quality assurance efforts (e.g., testing and code reviews). However, once the critical files or packages have been identified, developers still need to spend considerable time drilling down to the functions or even code snippets that should be reviewed or tested. This makes the approach too time consuming and impractical for large software systems. Instead, we consider defect prediction models that focus on identifying defect-prone (“risky”) software changes instead of files or packages. We refer to this type of quality assurance activity as “Just-In-Time Quality Assurance,” because developers can review and test these risky changes while they are still fresh in their minds (i.e., at check-in time). To build a change risk model, we use a wide range of factors based on the characteristics of a software change, such as the number of added lines, and developer experience. A large-scale study of six open source and five commercial projects from multiple domains shows that our models can predict whether or not a change will lead to a defect with an average accuracy of 68 percent and an average recall of 64 percent. Furthermore, when considering the effort needed to review changes, we find that using only 20 percent of the effort it would take to inspect all changes, we can identify 35 percent of all defect-inducing changes. Our findings indicate that “Just-In-Time Quality Assurance” may provide an effort-reducing way to focus on the most risky changes and thus reduce the costs of developing high-quality software.",
"title": ""
},
{
"docid": "2b010823e217e64e8e56b835cef40a1a",
"text": "Software defect prediction, which predicts defective code regions, can help developers find bugs and prioritize their testing efforts. To build accurate prediction models, previous studies focus on manually designing features that encode the characteristics of programs and exploring different machine learning algorithms. Existing traditional features often fail to capture the semantic differences of programs, and such a capability is needed for building accurate prediction models.\n To bridge the gap between programs' semantics and defect prediction features, this paper proposes to leverage a powerful representation-learning algorithm, deep learning, to learn semantic representation of programs automatically from source code. Specifically, we leverage Deep Belief Network (DBN) to automatically learn semantic features from token vectors extracted from programs' Abstract Syntax Trees (ASTs).\n Our evaluation on ten open source projects shows that our automatically learned semantic features significantly improve both within-project defect prediction (WPDP) and cross-project defect prediction (CPDP) compared to traditional features. Our semantic features improve WPDP on average by 14.7% in precision, 11.5% in recall, and 14.2% in F1. For CPDP, our semantic features based approach outperforms the state-of-the-art technique TCA+ with traditional features by 8.9% in F1.",
"title": ""
}
] | [
{
"docid": "a6459555eb54297f623800bcdf10dcc6",
"text": "Phishing causes billions of dollars in damage every year and poses a serious threat to the Internet economy. Email is still the most commonly used medium to launch phishing attacks [1]. In this paper, we present a comprehensive natural language based scheme to detect phishing emails using features that are invariant and fundamentally characterize phishing. Our scheme utilizes all the information present in an email, namely, the header, the links and the text in the body. Although it is obvious that a phishing email is designed to elicit an action from the intended victim, none of the existing detection schemes use this fact to identify phishing emails. Our detection protocol is designed specifically to distinguish between “actionable” and “informational” emails. To this end, we incorporate natural language techniques in phishing detection. We also utilize contextual information, when available, to detect phishing: we study the problem of phishing detection within the contextual confines of the user’s email box and demonstrate that context plays an important role in detection. To the best of our knowledge, this is the first scheme that utilizes natural language techniques and contextual information to detect phishing. We show that our scheme outperforms existing phishing detection schemes. Finally, our protocol detects phishing at the email level rather than detecting masqueraded websites. This is crucial to prevent the victim from clicking any harmful links in the email. Our implementation called PhishNet-NLP, operates between a user’s mail transfer agent (MTA) and mail user agent (MUA) and processes each arriving email for phishing attacks even before reaching the",
"title": ""
},
{
"docid": "3b2376110b0e6949379697b7ba6730b5",
"text": "............................................................................................................................... i Acknowledgments............................................................................................................... ii Table of",
"title": ""
},
{
"docid": "c9748c67c2ab17cfead44fe3b486883d",
"text": "Entropy coding is an integral part of most data compression systems. Huffman coding (HC) and arithmetic coding (AC) are two of the most widely used coding methods. HC can process a large symbol alphabet at each step allowing for fast encoding and decoding. However, HC typically provides suboptimal data rates due to its inherent approximation of symbol probabilities to powers of 1 over 2. In contrast, AC uses nearly accurate symbol probabilities, hence generally providing better compression ratios. However, AC relies on relatively slow arithmetic operations making the implementation computationally demanding. In this paper we discuss asymmetric numeral systems (ANS) as a new approach to entropy coding. While maintaining theoretical connections with AC, the proposed ANS-based coding can be implemented with much less computational complexity. While AC operates on a state defined by two numbers specifying a range, an ANS-based coder operates on a state defined by a single natural number such that the x ∈ ℕ state contains ≈ log2(x) bits of information. This property allows to have the entire behavior for a large alphabet summarized in the form of a relatively small table (e.g. a few kilobytes for a 256 size alphabet). The proposed approach can be interpreted as an equivalent to adding fractional bits to a Huffman coder to combine the speed of HC and the accuracy offered by AC. Additionally, ANS can simultaneously encrypt a message encoded this way. Experimental results demonstrate effectiveness of the proposed entropy coder.",
"title": ""
},
{
"docid": "a986826041730d953dfbf9fbc1b115a6",
"text": "This article presents a general class of associative reinforcement learning algorithms for connectionist networks containing stochastic units. These algorithms, called REINFORCE algorithms, are shown to make weight adjustments in a direction that lies along the gradient of expected reinforcement in both immediate-reinforcement tasks and certain limited forms of delayed-reinforcement tasks, and they do this without explicitly computing gradient estimates or even storing information from which such estimates could be computed. Specific examples of such algorithms are presented, some of which bear a close relationship to certain existing algorithms while others are novel but potentially interesting in their own right. Also given are results that show how such algorithms can be naturally integrated with backpropagation. We close with a brief discussion of a number of additional issues surrounding the use of such algorithms, including what is known about their limiting behaviors as well as further considerations that might be used to help develop similar but potentially more powerful reinforcement learning algorithms.",
"title": ""
},
{
"docid": "f83a16d393c78d6ba0e65a4659446e7e",
"text": "Temporal action localization is an important yet challenging problem. Given a long, untrimmed video consisting of multiple action instances and complex background contents, we need not only to recognize their action categories, but also to localize the start time and end time of each instance. Many state-of-the-art systems use segment-level classifiers to select and rank proposal segments of pre-determined boundaries. However, a desirable model should move beyond segment-level and make dense predictions at a fine granularity in time to determine precise temporal boundaries. To this end, we design a novel Convolutional-De-Convolutional (CDC) network that places CDC filters on top of 3D ConvNets, which have been shown to be effective for abstracting action semantics but reduce the temporal length of the input data. The proposed CDC filter performs the required temporal upsampling and spatial downsampling operations simultaneously to predict actions at the frame-level granularity. It is unique in jointly modeling action semantics in space-time and fine-grained temporal dynamics. We train the CDC network in an end-to-end manner efficiently. Our model not only achieves superior performance in detecting actions in every frame, but also significantly boosts the precision of localizing temporal boundaries. Finally, the CDC network demonstrates a very high efficiency with the ability to process 500 frames per second on a single GPU server. Source code and trained models are available online at https://bitbucket.org/columbiadvmm/cdc.",
"title": ""
},
{
"docid": "f6dd10d4b400234a28b221d0527e71c0",
"text": "Existing approaches to neural machine translation condition each output word on previously generated outputs. We introduce a model that avoids this autoregressive property and produces its outputs in parallel, allowing an order of magnitude lower latency during inference. Through knowledge distillation, the use of input token fertilities as a latent variable, and policy gradient fine-tuning, we achieve this at a cost of as little as 2.0 BLEU points relative to the autoregressive Transformer network used as a teacher. We demonstrate substantial cumulative improvements associated with each of the three aspects of our training strategy, and validate our approach on IWSLT 2016 English–German and two WMT language pairs. By sampling fertilities in parallel at inference time, our non-autoregressive model achieves near-state-of-the-art performance of 29.8 BLEU on WMT 2016 English– Romanian.",
"title": ""
},
{
"docid": "68420190120449343006879e23be8789",
"text": "Recent findings suggest that consolidation of emotional memories is influenced by menstrual phase in women. In contrast to other phases, in the mid-luteal phase when progesterone levels are elevated, cortisol levels are increased and correlated with emotional memory. This study examined the impact of progesterone on cortisol and memory consolidation of threatening stimuli under stressful conditions. Thirty women were recruited for the high progesterone group (in the mid-luteal phase) and 26 for the low progesterone group (in non-luteal phases of the menstrual cycle). Women were shown a series of 20 neutral or threatening images followed immediately by either a stressor (cold pressor task) or control condition. Participants returned two days later for a surprise free recall test of the images and salivary cortisol responses were monitored. High progesterone levels were associated with higher baseline and stress-evoked cortisol levels, and enhanced memory of negative images when stress was received. A positive correlation was found between stress-induced cortisol levels and memory recall of threatening images. These findings suggest that progesterone mediates cortisol responses to stress and subsequently predicts memory recall for emotionally arousing stimuli.",
"title": ""
},
{
"docid": "ec52b4c078c14a0d564577438846f178",
"text": "Millions of students across the United States cannot benefit fully from a traditional educational program because they have a disability that impairs their ability to participate in a typical classroom environment. For these students, computer-based technologies can play an especially important role. Not only can computer technology facilitate a broader range of educational activities to meet a variety of needs for students with mild learning disorders, but adaptive technology now exists than can enable even those students with severe disabilities to become active learners in the classroom alongside their peers who do not have disabilities. This article provides an overview of the role computer technology can play in promoting the education of children with special needs within the regular classroom. For example, use of computer technology for word processing, communication, research, and multimedia projects can help the three million students with specific learning and emotional disorders keep up with their nondisabled peers. Computer technology has also enhanced the development of sophisticated devices that can assist the two million students with more severe disabilities in overcoming a wide range of limitations that hinder classroom participation--from speech and hearing impairments to blindness and severe physical disabilities. However, many teachers are not adequately trained on how to use technology effectively in their classrooms, and the cost of the technology is a serious consideration for all schools. Thus, although computer technology has the potential to act as an equalizer by freeing many students from their disabilities, the barriers of inadequate training and cost must first be overcome before more widespread use can become a reality.",
"title": ""
},
{
"docid": "ef787cfc1b00c9d05ec9293ff802f172",
"text": "High Definition (HD) maps play an important role in modern traffic scenes. However, the development of HD maps coverage grows slowly because of the cost limitation. To efficiently model HD maps, we proposed a convolutional neural network with a novel prediction layer and a zoom module, called LineNet. It is designed for state-of-the-art lane detection in an unordered crowdsourced image dataset. And we introduced TTLane, a dataset for efficient lane detection in urban road modeling applications. Combining LineNet and TTLane, we proposed a pipeline to model HD maps with crowdsourced data for the first time. And the maps can be constructed precisely even with inaccurate crowdsourced data.",
"title": ""
},
{
"docid": "2f2291baa6c8a74744a16f27df7231d2",
"text": "Malicious programs, such as viruses and worms, are frequently related to previous programs through evolutionary relationships. Discovering those relationships and constructing a phylogeny model is expected to be helpful for analyzing new malware and for establishing a principled naming scheme. Matching permutations of code may help build better models in cases where malware evolution does not keep things in the same order. We describe methods for constructing phylogeny models that uses features called n-perms to match possibly permuted codes. An experiment was performed to compare the relative effectiveness of vector similarity measures using n-perms and n-grams when comparing permuted variants of programs. The similarity measures using n-perms maintained a greater separation between the similarity scores of permuted families of specimens versus unrelated specimens. A subsequent study using a tree generated through n-perms suggests that phylogeny models based on n-perms may help forensic analysts investigate new specimens, and assist in reconciling malware naming inconsistencies Škodlivé programy, jako viry a červy (malware), jsou zřídka psány narychlo, jen tak. Obvykle jsou výsledkem svých evolučních vztahů. Zjištěním těchto vztahů a tvorby v přesné fylogenezi se předpokládá užitečná pomoc v analýze nového malware a ve vytvoření zásad pojmenovacího schématu. Porovnávání permutací kódu uvnitř malware mů že nabídnout výhody pro fylogenní generování, protože evoluční kroky implementované autory malware nemohou uchovat posloupnosti ve sdíleném kódu. Popisujeme rodinu fylogenních generátorů, které provádějí clustering pomocí PQ stromově založených extrakčních vlastností. Byl vykonán experiment v němž výstup stromu z těchto generátorů byl vyhodnocen vzhledem k fylogenezím generovaným pomocí vážených n-gramů. Výsledky ukazují výhody přístupu založeného na permutacích ve fylogenním generování malware. Les codes malveillants, tels que les virus et les vers, sont rarement écrits de zéro; en conséquence, il existe des relations de nature évolutive entre ces différents codes. Etablir ces relations et construire une phylogénie précise permet d’espérer une meilleure capacité d’analyse de nouveaux codes malveillants et de disposer d’une méthode de fait de nommage de ces codes. La concordance de permutations de code avec des parties de codes malveillants sont susceptibles d’être très intéressante dans l’établissement d’une phylogénie, dans la mesure où les étapes évolutives réalisées par les auteurs de codes malveillants ne conservent généralement pas l’ordre des instructions présentes dans le code commun. Nous décrivons ici une famille de générateurs phylogénétiques réalisant des regroupements à l’aide de caractéristiques extraites d’arbres PQ. Une expérience a été réalisée, dans laquelle l’arbre produit par ces générateurs est évalué d’une part en le comparant avec les classificiations de références utilisées par les antivirus par scannage, et d’autre part en le comparant aux phylogénies produites à l’aide de polygrammes de taille n (n-grammes), pondérés. Les résultats démontrent l’intérêt de l’approche utilisant les permutations dans la génération phylogénétique des codes malveillants. Haitalliset ohjelmat, kuten tietokonevirukset ja -madot, kirjoitetaan harvoin alusta alkaen. Tämän seurauksena niistä on löydettävissä evoluution kaltaista samankaltaisuutta. Samankaltaisuuksien löytämisellä sekä rakentamalla tarkka evoluutioon perustuva malli voidaan helpottaa uusien haitallisten ohjelmien analysointia sekä toteuttaa nimeämiskäytäntöjä. Permutaatioiden etsiminen koodista saattaa antaa etuja evoluutiomallin muodostamiseen, koska haitallisten ohjelmien kirjoittajien evolutionääriset askeleet eivät välttämättä säilytä jaksoittaisuutta ohjelmakoodissa. Kuvaamme joukon evoluutiomallin muodostajia, jotka toteuttavat klusterionnin käyttämällä PQ-puuhun perustuvia ominaisuuksia. Teimme myös kokeen, jossa puun tulosjoukkoa verrattiin virustentorjuntaohjelman muodostamaan viitejoukkoon sekä evoluutiomalleihin, jotka oli muodostettu painotetuilla n-grammeilla. Tulokset viittaavat siihen, että permutaatioon perustuvaa lähestymistapaa voidaan menestyksekkäästi käyttää evoluutiomallien muodostamineen. Maliziöse Programme, wie z.B. Viren und Würmer, werden nur in den seltensten Fällen komplett neu geschrieben; als Ergebnis können zwischen verschiedenen maliziösen Codes Abhängigkeiten gefunden werden. Im Hinblick auf Klassifizierung und wissenschaftlichen Aufarbeitung neuer maliziöser Codes kann es sehr hilfreich erweisen, Abhängigkeiten zu bestehenden maliziösen Codes darzulegen und somit einen Stammbaum zu erstellen. In dem Artikel wird u.a. auf moderne Ansätze innerhalb der Staumbaumgenerierung anhand ausgewählter Win32 Viren eingegangen. I programmi maligni, quali virus e worm, sono raramente scritti da zero; questo significa che vi sono delle relazioni di evoluzione tra di loro. Scoprire queste relazioni e costruire una filogenia accurata puo’aiutare sia nell’analisi di nuovi programmi di questo tipo, sia per stabilire una nomenclatura avente una base solida. Cercare permutazioni di codice tra vari programmi puo’ dare un vantaggio per la generazione delle filogenie, dal momento che i passaggi evolutivi implementati dagli autori possono non aver preservato la sequenzialita’ del codice originario. In questo articolo descriviamo una famiglia di generatori di filogenie che effettuano clustering usando feature basate su alberi PQ. In un esperimento l’albero di output dei generatori viene confrontato con una classificazione di rifetimento ottenuta da un programma anti-virus, e con delle filogenie generate usando n-grammi pesati. I risultati indicano i risultati positivi dell’approccio basato su permutazioni nella generazione delle filogenie del malware. ",
"title": ""
},
{
"docid": "63b2bc943743d5b8ef9220fd672df84f",
"text": "In multiagent systems, we often have a set of agents each of which have a preference ordering over a set of items and one would like to know these preference orderings for various tasks, for example, data analysis, preference aggregation, voting etc. However, we often have a large number of items which makes it impractical to ask the agents for their complete preference ordering. In such scenarios, we usually elicit these agents’ preferences by asking (a hopefully small number of) comparison queries — asking an agent to compare two items. Prior works on preference elicitation focus on unrestricted domain and the domain of single peaked preferences and show that the preferences in single peaked domain can be elicited by much less number of queries compared to unrestricted domain. We extend this line of research and study preference elicitation for single peaked preferences on trees which is a strict superset of the domain of single peaked preferences. We show that the query complexity crucially depends on the number of leaves, the path cover number, and the distance from path of the underlying single peaked tree, whereas the other natural parameters like maximum degree, diameter, pathwidth do not play any direct role in determining query complexity. We then investigate the query complexity for finding a weak Condorcet winner for preferences single peaked on a tree and show that this task has much less query complexity than preference elicitation. Here again we observe that the number of leaves in the underlying single peaked tree and the path cover number of the tree influence the query complexity of the problem.",
"title": ""
},
{
"docid": "86d58f4196ceb48e29cb143e6a157c22",
"text": "In this paper, we challenge a form of paragraph-to-question generation task. We propose a question generation system which can generate a set of comprehensive questions from a body of text. Besides the tree kernel functions to assess the grammatically of the generated questions, our goal is to rank them by using community-based question answering systems to calculate the importance of the generated questions. The main assumption behind our work is that each body of text is related to a topic of interest and it has a comprehensive information about the topic.",
"title": ""
},
{
"docid": "75b0a7b0fa0320a3666fb147471dd45f",
"text": "Maximum power densities by air-driven microbial fuel cells (MFCs) are considerably influenced by cathode performance. We show here that application of successive polytetrafluoroethylene (PTFE) layers (DLs), on a carbon/PTFE base layer, to the air-side of the cathode in a single chamber MFC significantly improved coulombic efficiencies (CEs), maximum power densities, and reduced water loss (through the cathode). Electrochemical tests using carbon cloth electrodes coated with different numbers of DLs indicated an optimum increase in the cathode potential of 117 mV with four-DLs, compared to a <10 mV increase due to the carbon base layer alone. In MFC tests, four-DLs was also found to be the optimum number of coatings, resulting in a 171% increase in the CE (from 19.1% to 32%), a 42% increase in the maximum power density (from 538 to 766 mW m ), and measurable water loss was prevented. The increase in CE due is believed to result from the increased power output and the increased operation time (due to a reduction in aerobic degradation of substrate sustained by oxygen diffusion through the cathode). 2006 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "615e43e2dc7c12c38c87a4a6649407c0",
"text": "BACKGROUND\nThe management of chronic pain is a complex challenge worldwide. Cannabis-based medicines (CBMs) have proven to be efficient in reducing chronic pain, although the topic remains highly controversial in this field.\n\n\nOBJECTIVES\nThis study's aim is to conduct a conclusive review and meta-analysis, which incorporates all randomized controlled trials (RCTs) in order to update clinicians' and researchers' knowledge regarding the efficacy and adverse events (AEs) of CBMs for chronic and postoperative pain treatment.\n\n\nSTUDY DESIGN\nA systematic review and meta-analysis.\n\n\nMETHODS\nAn electronic search was conducted using Medline/Pubmed and Google Scholar with the use of Medical Subject Heading (MeSH) terms on all literature published up to July 2015. A follow-up manual search was conducted and included a complete cross-check of the relevant studies. The included studies were RCTs which compared the analgesic effects of CBMs to placebo. Hedges's g scores were calculated for each of the studies. A study quality assessment was performed utilizing the Jadad scale. A meta-analysis was performed utilizing random-effects models and heterogeneity between studies was statistically computed using I² statistic and tau² test.\n\n\nRESULTS\nThe results of 43 RCTs (a total of 2,437 patients) were included in this review, of which 24 RCTs (a total of 1,334 patients) were eligible for meta-analysis. This analysis showed limited evidence showing more pain reduction in chronic pain -0.61 (-0.78 to -0.43, P < 0.0001), especially by inhalation -0.93 (-1.51 to -0.35, P = 0.001) compared to placebo. Moreover, even though this review consisted of some RCTs that showed a clinically significant improvement with a decrease of pain scores of 2 points or more, 30% or 50% or more, the majority of the studies did not show an effect. Consequently, although the primary analysis showed that the results were favorable to CBMs over placebo, the clinical significance of these findings is uncertain. The most prominent AEs were related to the central nervous and the gastrointestinal (GI) systems.\n\n\nLIMITATIONS\nPublication limitation could have been present due to the inclusion of English-only published studies. Additionally, the included studies were extremely heterogeneous. Only 7 studies reported on the patients' history of prior consumption of CBMs. Furthermore, since cannabinoids are surrounded by considerable controversy in the media and society, cannabinoids have marked effects, so that inadequate blinding of the placebo could constitute an important source of limitation in these types of studies.\n\n\nCONCLUSIONS\nThe current systematic review suggests that CBMs might be effective for chronic pain treatment, based on limited evidence, primarily for neuropathic pain (NP) patients. Additionally, GI AEs occurred more frequently when CBMs were administered via oral/oromucosal routes than by inhalation.Key words: Cannabis, CBMs, chronic pain, postoperative pain, review, meta-analysis.",
"title": ""
},
{
"docid": "d1aa525575e33c587d86e89566c21a49",
"text": "This paper investigates the problem of fault detection for nonlinear discrete-time networked systems under an event-triggered scheme. A polynomial fuzzy fault detection filter is designed to generate a residual signal and detect faults in the system. A novel polynomial event-triggered scheme is proposed to determine the transmission of the signal. A fault detection filter is designed to guarantee that the residual system is asymptotically stable and satisfies the desired performance. Polynomial approximated membership functions obtained by Taylor series are employed for filtering analysis. Furthermore, sufficient conditions are represented in terms of sum of squares (SOSs) and can be solved by SOS tools in MATLAB environment. A numerical example is provided to demonstrate the effectiveness of the proposed results.",
"title": ""
},
{
"docid": "7f47253095756d9640e8286a08ce3b74",
"text": "A speaker’s intentions can be represented by domain actions (domainindependent speech act and domain-dependent concept sequence pairs). Therefore, it is essential that domain actions be determined when implementing dialogue systems because a dialogue system should determine users’ intentions from their utterances and should create counterpart intentions to the users’ intentions. In this paper, a neural network model is proposed for classifying a user’s domain actions and planning a system’s domain actions. An integrated neural network model is proposed for simultaneously determining user and system domain actions using the same framework. The proposed model performed better than previous non-integrated models in an experiment using a goal-oriented dialogue corpus. This result shows that the proposed integration method contributes to improving domain action determination performance. Keywords—Domain Action, Speech Act, Concept Sequence, Neural Network",
"title": ""
},
{
"docid": "af3e8e26ec6f56a8cd40e731894f5993",
"text": "Probiotic bacteria are sold mainly in fermented foods, and dairy products play a predominant role as carriers of probiotics. These foods are well suited to promoting the positive health image of probiotics for several reasons: 1) fermented foods, and dairy products in particular, already have a positive health image; 2) consumers are familiar with the fact that fermented foods contain living microorganisms (bacteria); and 3) probiotics used as starter organisms combine the positive images of fermentation and probiotic cultures. When probiotics are added to fermented foods, several factors must be considered that may influence the ability of the probiotics to survive in the product and become active when entering the consumer's gastrointestinal tract. These factors include 1) the physiologic state of the probiotic organisms added (whether the cells are from the logarithmic or the stationary growth phase), 2) the physical conditions of product storage (eg, temperature), 3) the chemical composition of the product to which the probiotics are added (eg, acidity, available carbohydrate content, nitrogen sources, mineral content, water activity, and oxygen content), and 4) possible interactions of the probiotics with the starter cultures (eg, bacteriocin production, antagonism, and synergism). The interactions of probiotics with either the food matrix or the starter culture may be even more intensive when probiotics are used as a component of the starter culture. Some of these aspects are discussed in this article, with an emphasis on dairy products such as milk, yogurt, and cheese.",
"title": ""
},
{
"docid": "8eb0f822b4e8288a6b78abf0bf3aecbb",
"text": "Cloud computing enables access to the widespread services and resources in cloud datacenters for mitigating resource limitations in low-potential client devices. Computational cloud is an attractive platform for computational offloading due to the attributes of scalability and availability of resources. Therefore, mobile cloud computing (MCC) leverages the application processing services of computational clouds for enabling computational-intensive and ubiquitous mobile applications on smart mobile devices (SMDs). Computational offloading frameworks focus on offloading intensive mobile applications at different granularity levels which involve resource-intensive mechanism of application profiling and partitioning at runtime. As a result, the energy consumption cost (ECC) and turnaround time of the application is increased. This paper proposes an active service migration (ASM) framework for computational offloading to cloud datacenters, which employs lightweight procedure for the deployment of runtime distributed platform. The proposed framework employs coarse granularity level and simple developmental and deployment procedures for computational offloading in MCC. ASM is evaluated by benchmarking prototype application on the Android devices in the real MCC environment. It is found that the turnaround time of the application reduces up to 45 % and ECC of the application reduces up to 33 % in ASM-based computational offloading as compared to traditional offloading techniques which shows the lightweight nature of the proposed framework for computational offloading.",
"title": ""
},
{
"docid": "e731c10f822aa74b37263bee92a73be2",
"text": "Multitask Learning is an approach to inductive transfer that improves generalization by using the domain information contained in the training signals of related tasks as an inductive bias. It does this by learning tasks in parallel while using a shared representation; what is learned for each task can help other tasks be learned better. This paper reviews prior work on MTL, presents new evidence that MTL in backprop nets discovers task relatedness without the need of supervisory signals, and presents new results for MTL with k-nearest neighbor and kernel regression. In this paper we demonstrate multitask learning in three domains. We explain how multitask learning works, and show that there are many opportunities for multitask learning in real domains. We present an algorithm and results for multitask learning with case-based methods like k-nearest neighbor and kernel regression, and sketch an algorithm for multitask learning in decision trees. Because multitask learning works, can be applied to many different kinds of domains, and can be used with different learning algorithms, we conjecture there will be many opportunities for its use on real-world problems.",
"title": ""
},
{
"docid": "815f6ee1be0244b3815903d97742bf5f",
"text": "To evaluate the short- and long-term results after a modified Chevrel technique for midline incisional hernia repair, regarding surgical technique, hospital stay, wound complications, recurrence rate, and postoperative quality of life. These results will be compared to the literature derived reference values regarding the original and modified Chevrel techniques. In this large retrospective, single surgeon, single centre cohort all modified Chevrel hernia repairs between 2000 and 2012 were identified. Results were obtained by reviewing patients’ medical charts. Postoperative quality of life was measured using the Carolina Comfort Scale. A multi-database literature search was conducted to compare the results of our series to the literature based reference values. One hundred and fifty-five patients (84 male, 71 female) were included. Eighty patients (52%) had a large incisional hernia (width ≥ 10 cm) according the definition of the European Hernia Society. Fourteen patients (9%) underwent a concomitant procedure. Median length-of-stay was 5 days. Within 30 days postoperative 36 patients (23.2%) had 39 postoperative complications of which 30 were mild (CDC I–II), and nine severe (CDC III–IV). Thirty-one surgical site occurrences were observed in thirty patients (19.4%) of which the majority were seroma (16 patients 10.3%). There was no hernia-related mortality during follow-up. Recurrence rate was 1.8% after a median follow-up of 52 months (12–128 months). Postoperative quality of life was rated excellent. The modified Chevrel technique for midline ventral hernias results in a moderate complication rate, low recurrence rate and high rated postoperative quality of life.",
"title": ""
}
] | scidocsrr |
7f905cac740516a87c460e9988988718 | Automatic detection of cyber-recruitment by violent extremists | [
{
"docid": "e07cb04e3000607d4a3f99d47f72a906",
"text": "As part of the NSF-funded Dark Web research project, this paper presents an exploratory study of cyber extremism on the Web 2.0 media: blogs, YouTube, and Second Life. We examine international Jihadist extremist groups that use each of these media. We observe that these new, interactive, multimedia-rich forms of communication provide effective means for extremists to promote their ideas, share resources, and communicate among each other. The development of automated collection and analysis tools for Web 2.0 can help policy makers, intelligence analysts, and researchers to better understand extremistspsila ideas and communication patterns, which may lead to strategies that can counter the threats posed by extremists in the second-generation Web.",
"title": ""
},
{
"docid": "4d791fa53f7ed8660df26cd4dbe9063a",
"text": "The Internet is a powerful political instrument, wh ich is increasingly employed by terrorists to forward their goals. The fiv most prominent contemporary terrorist uses of the Net are information provision , fi ancing, networking, recruitment, and information gathering. This article describes a nd explains each of these uses and follows up with examples. The final section of the paper describes the responses of government, law enforcement, intelligence agencies, and others to the terrorism-Internet nexus. There is a particular emphasis within the te xt on the UK experience, although examples from other jurisdictions are also employed . ___________________________________________________________________ “Terrorists use the Internet just like everybody el se” Richard Clarke (2004) 1 ___________________________________________________________________",
"title": ""
}
] | [
{
"docid": "126b62a0ae62c76b43b4fb49f1bf05cd",
"text": "OBJECTIVE\nThe aim of the study was to evaluate efficacy of fractional CO2 vaginal laser treatment (Laser, L) and compare it to local estrogen therapy (Estriol, E) and the combination of both treatments (Laser + Estriol, LE) in the treatment of vulvovaginal atrophy (VVA).\n\n\nMETHODS\nA total of 45 postmenopausal women meeting inclusion criteria were randomized in L, E, or LE groups. Assessments at baseline, 8 and 20 weeks, were conducted using Vaginal Health Index (VHI), Visual Analog Scale for VVA symptoms (dyspareunia, dryness, and burning), Female Sexual Function Index, and maturation value (MV) of Meisels.\n\n\nRESULTS\nForty-five women were included and 3 women were lost to follow-up. VHI average score was significantly higher at weeks 8 and 20 in all study arms. At week 20, the LE arm also showed incremental improvement of VHI score (P = 0.01). L and LE groups showed a significant improvement of dyspareunia, burning, and dryness, and the E arm only of dryness (P < 0.001). LE group presented significant improvement of total Female Sex Function Index (FSFI) score (P = 0.02) and individual domains of pain, desire, and lubrication. In contrast, the L group showed significant worsening of pain domain in FSFI (P = 0.04), but FSFI total scores were comparable in all treatment arms at week 20.\n\n\nCONCLUSIONS\nCO2 vaginal laser alone or in combination with topical estriol is a good treatment option for VVA symptoms. Sexual-related pain with vaginal laser treatment might be of concern.",
"title": ""
},
{
"docid": "96e56dcf3d38c8282b5fc5c8ae747a66",
"text": "The solid-state transformer (SST) was conceived as a replacement for the conventional power transformer, with both lower volume and weight. The smart transformer (ST) is an SST that provides ancillary services to the distribution and transmission grids to optimize their performance. Hence, the focus shifts from hardware advantages to functionalities. One of the most desired functionalities is the dc connectivity to enable a hybrid distribution system. For this reason, the ST architecture shall be composed of at least two power stages. The standard design procedure for this kind of system is to design each power stage for the maximum load. However, this design approach might limit additional services, like the reactive power compensation on the medium voltage (MV) side, and it does not consider the load regulation capability of the ST on the low voltage (LV) side. If the SST is tailored to the services that it shall provide, different stages will have different designs, so that the ST is no longer a mere application of the SST but an entirely new subject.",
"title": ""
},
{
"docid": "a21513f9cf4d5a0e6445772941e9fba2",
"text": "Superficial dorsal penile vein thrombosis was diagnosed 8 times in 7 patients between 19 and 40 years old (mean age 27 years). All patients related the onset of the thrombosis to vigorous sexual intercourse. No other etiological medications, drugs or constricting devices were implicated. Three patients were treated acutely with anti-inflammatory medications, while 4 were managed expectantly. The mean interval to resolution of symptoms was 7 weeks. Followup ranged from 3 to 30 months (mean 11) at which time all patients noticed normal erectile function. Only 1 patient had recurrent thrombosis 3 months after the initial episode, again related to intercourse. We conclude that this is a benign self-limited condition. Anti-inflammatory agents are useful for acute discomfort but they do not affect the rate of resolution.",
"title": ""
},
{
"docid": "688ee7a4bde400a6afbd6972d729fad4",
"text": "Learning-to-Rank ( LtR ) techniques leverage machine learning algorithms and large amounts of training data to induce high-quality ranking functions. Given a set of documents and a user query, these functions are able to precisely predict a score for each of the documents, in turn exploited to effectively rank them. Although the scoring efficiency of LtR models is critical in several applications – e.g., it directly impacts on response time and throughput of Web query processing – it has received relatively little attention so far. The goal of this work is to experimentally investigate the scoring efficiency of LtR models along with their ranking quality. Specifically, we show that machine-learned ranking models exhibit a quality versus efficiency trade-off. For example, each family of LtR algorithms has tuning parameters that can influence both effectiveness and efficiency, where higher ranking quality is generally obtained with more complex and expensive models. Moreover, LtR algorithms that learn complex models, such as those based on forests of regression trees, are generally more expensive and more effective than other algorithms that induce simpler models like linear combination of features. We extensively analyze the quality versus efficiency trade-off of a wide spectrum of stateof-the-art LtR , and we propose a sound methodology to devise the most effective ranker given a time budget. To guarantee reproducibility, we used publicly available datasets and we contribute an open source C++ framework providing optimized, multi-threaded implementations of the most effective tree-based learners: Gradient Boosted Regression Trees ( GBRT ), Lambda-Mart ( λ-MART ), and the first public-domain implementation of Oblivious Lambda-Mart ( λ-MART ), an algorithm that induces forests of oblivious regression trees. We investigate how the different training parameters impact on the quality versus efficiency trade-off, and provide a thorough comparison of several algorithms in the qualitycost space. The experiments conducted show that there is not an overall best algorithm, but the optimal choice depends on the time budget. © 2016 Elsevier Ltd. All rights reserved. ∗ Corresponding author. E-mail addresses: gabriele.capannini@mdh.se (G. Capannini), claudio.lucchese@isti.cnr.it , c.lucchese@isti.cnr.it (C. Lucchese), f.nardini@isti.cnr.it (F.M. Nardini), orlando@unive.it (S. Orlando), r.perego@isti.cnr.it (R. Perego), n.tonellotto@isti.cnr.it (N. Tonellotto). http://dx.doi.org/10.1016/j.ipm.2016.05.004 0306-4573/© 2016 Elsevier Ltd. All rights reserved. Please cite this article as: G. Capannini et al., Quality versus efficiency in document scoring with learning-to-rank models, Information Processing and Management (2016), http://dx.doi.org/10.1016/j.ipm.2016.05.004 2 G. Capannini et al. / Information Processing and Management 0 0 0 (2016) 1–17 ARTICLE IN PRESS JID: IPM [m3Gsc; May 17, 2016;19:28 ] Document Index Base Ranker Top Ranker Features Learning to Rank Algorithm Query First step Second step N docs K docs 1. ............ 2. ............ 3. ............ K. ............ ... ... Results Page(s) Fig. 1. The architecture of a generic machine-learned ranking pipeline.",
"title": ""
},
{
"docid": "350137bf3c493b23aa6d355df946440f",
"text": "Given the increasing popularity of wearable devices, this paper explores the potential to use wearables for steering and driver tracking. Such capability would enable novel classes of mobile safety applications without relying on information or sensors in the vehicle. In particular, we study how wrist-mounted inertial sensors, such as those in smart watches and fitness trackers, can track steering wheel usage and angle. In particular, tracking steering wheel usage and turning angle provide fundamental techniques to improve driving detection, enhance vehicle motion tracking by mobile devices and help identify unsafe driving. The approach relies on motion features that allow distinguishing steering from other confounding hand movements. Once steering wheel usage is detected, it further uses wrist rotation measurements to infer steering wheel turning angles. Our on-road experiments show that the technique is 99% accurate in detecting steering wheel usage and can estimate turning angles with an average error within 3.4 degrees.",
"title": ""
},
{
"docid": "bccb8e4cf7639dbcd3896e356aceec8d",
"text": "Over 50 million people worldwide suffer from epilepsy. Traditional diagnosis of epilepsy relies on tedious visual screening by highly trained clinicians from lengthy EEG recording that contains the presence of seizure (ictal) activities. Nowadays, there are many automatic systems that can recognize seizure-related EEG signals to help the diagnosis. However, it is very costly and inconvenient to obtain long-term EEG data with seizure activities, especially in areas short of medical resources. We demonstrate in this paper that we can use the interictal scalp EEG data, which is much easier to collect than the ictal data, to automatically diagnose whether a person is epileptic. In our automated EEG recognition system, we extract three classes of features from the EEG data and build Probabilistic Neural Networks (PNNs) fed with these features. We optimize the feature extraction parameters and combine these PNNs through a voting mechanism. As a result, our system achieves an impressive 94.07% accuracy.",
"title": ""
},
{
"docid": "866b9d88e90a93357ca6caa4979ef2d7",
"text": "This paper describes a new speech corpus, the RSR2015 database designed for text-dependent speaker recognition with scenario based on fixed pass-phrases. This database consists of over 71 hours of speech recorded from English speakers covering the diversity of accents spoken in Singapore. Acquisition has been done using a set of six portable devices including smart phones and tablets. The pool of speakers consists of 300 participants (143 female and 157 male speakers) from 17 to 42 years old. We propose a protocol for the case of user-dependent pass-phrases in text-dependent speaker recognition and we also report speaker recognition experiments on RSR2015 database.",
"title": ""
},
{
"docid": "d95cc1187827e91601cb5711dbdb1550",
"text": "As data sparsity remains a significant challenge for collaborative filtering (CF, we conjecture that predicted ratings based on imputed data may be more accurate than those based on the originally very sparse rating data. In this paper, we propose a framework of imputation-boosted collaborative filtering (IBCF), which first uses an imputation technique, or perhaps machine learned classifier, to fill-in the sparse user-item rating matrix, then runs a traditional Pearson correlation-based CF algorithm on this matrix to predict a novel rating. Empirical results show that IBCF using machine learning classifiers can improve predictive accuracy of CF tasks. In particular, IBCF using a classifier capable of dealing well with missing data, such as naïve Bayes, can outperform the content-boosted CF (a representative hybrid CF algorithm) and IBCF using PMM (predictive mean matching, a state-of-the-art imputation technique), without using external content information.",
"title": ""
},
{
"docid": "0e68120ea21beb2fdaff6538aa342aa5",
"text": "The development of a truly non-invasive continuous glucose sensor is an elusive goal. We describe the rise and fall of the Pendra device. In 2000 the company Pendragon Medical introduced a truly non-invasive continuous glucose-monitoring device. This system was supposed to work through so-called impedance spectroscopy. Pendra was Conformité Européenne (CE) approved in May 2003. For a short time the Pendra was available on the Dutch direct-to-consumer market. A post-marketing reliability study was performed in six type 1 diabetes patients. Mean absolute difference between Pendra glucose values and values obtained through self-monitoring of blood glucose was 52%; the Pearson’s correlation coefficient was 35.1%; and a Clarke error grid showed 4.3% of the Pendra readings in the potentially dangerous zone E. We argue that the CE certification process for continuous glucose sensors should be made more transparent, and that a consensus on specific requirements for continuous glucose sensors is needed to prevent patient exposure to potentially dangerous situations.",
"title": ""
},
{
"docid": "b47127a755d7bef1c5baf89253af46e7",
"text": "In an effort to explain pro-environmental behavior, environmental sociologists often study environmental attitudes. While much of this work is atheoretical, the focus on attitudes suggests that researchers are implicitly drawing upon attitude theory in psychology. The present research brings sociological theory to environmental sociology by drawing on identity theory to understand environmentally responsive behavior. We develop an environment identity model of environmental behavior that includes not only the meanings of the environment identity, but also the prominence and salience of the environment identity and commitment to the environment identity. We examine the identity process as it relates to behavior, though not to the exclusion of examining the effects of environmental attitudes. The findings reveal that individual agency is important in influencing environmentally responsive behavior, but this agency is largely through identity processes, rather than attitude processes. This provides an important theoretical and empirical advance over earlier work in environmental sociology.",
"title": ""
},
{
"docid": "284c056db69549efe956b81d5316ac6d",
"text": "PURPOSE\nThe aim of this study was to identify the effects of a differential-learning program, embedded in small-sided games, on the creative and tactical behavior of youth soccer players. Forty players from under-13 (U13) and under-15 (U15) were allocated into control and experimental groups and were tested using a randomized pretest to posttest design using small-sided games situations.\n\n\nMETHOD\nThe experimental group participated in a 5-month differential-learning program embodied in small-sided games situations, while the control group participated in a typical small-sided games training program. In-game creativity was assessed through notational analyses of the creative components, and the players' positional data were used to compute tactical-derived variables.\n\n\nRESULTS\nThe findings suggested that differential learning facilitated the development of creative components, mainly concerning attempts (U13, small; U15, small), versatility (U13, moderate; U15, small), and originality (U13, unclear; U15, small) of players' actions. Likewise, the differential-learning approach provided a decrease in fails during the game in both experimental groups (moderate). Moreover, differential learning seemed to favor regularity in pitch-positioning behavior for the distance between players' dyads (U13, small; U15, small), the distance to the team target (U13, moderate; U15, small), and the distance to the opponent target (U13, moderate; U15, small).\n\n\nCONCLUSIONS\nThe differential-learning program stressed creative and positional behavior in both age groups with a distinct magnitude of effects, with the U13 players demonstrating higher improvements over the U15 players. Overall, these findings confirmed that the technical variability promoted by differential learning nurtures regularity of positioning behavior.",
"title": ""
},
{
"docid": "883c37c54b86cea09d04657426a96f97",
"text": "temporal relations tend to emerge later in development than simple comparatives. 2.4.7. Spatial Relations A large number of relations deal with the arrangement of objects or aspects of objects in space, relative to each other, such as in-out, front-back, over-under and so on. These spatial relations are like comparative relations, but often they imply or specify frames of reference that make them quite specific. For example, if you are told that house A faces the back of house B, you could order the front and back doors of both houses into a linear sequence (back door of A, front door of A, back door of B, front door of B). This is because front and back doors are relative to each individual house, and knowing the orientation of the two houses implies the more detailed information. 2.4.8. Conditionality and Causality Conditionality and causality share features with both hierarchical relations and comparative relations. Forexample, if a listener is told, “A causes B and B causes C,” s/he may simply derive, via a frame of comparison, that “A caused C and C was caused by A.” Hierarchical class membership is involved, however, if the listener derives “B was caused by A alone, but C was caused by both A and B.” That is, the listener constructs a precise hierarchy of causeeffect relations, and therefore such relational responding extends beyond the basic frame of comparison. The same type of analysis may be applied to conditional relations such as “ifthen.” The constructed nature of this relation is more obvious than with temporal relations, particularly as one begins to attribute cause to conditional properties. Events are said to cause events based on many features: sequences, contiguity, manipulability, practical exigencies, cultural beliefs, and so on. Causality itself is not a physical dimension of any event. 2.4.9. Deictic Relations By deictic relations we mean those that specify a relation in terms of the perspective of the speaker such as left-right; I-you (and all of its correlates, such as “mine”); here-there; and now-then (see Barnes and Roche, 1997a; Hayes, 1984). Some relations may or may not be deictic, such as front-back or above-below, depending on the perspective applied. For example, the sentence “the back door of my house is in front of me” contains both spatial and deictic forms of “front-back.” Deictic relations seem to be a particularly important family of relational frames that may be critical for perspective-taking. Consider, for example, the three frames of I and YOU, HERE and THERE, and NOW and THEN (when it seems contextually useful, we will capitalize relational terms if they refer to specific relational frames). These frames are unlike DERIVED RELATIONAL RESPONDING AS LEARNED BEHAVIOR 39 the others mentioned previously in that they do not appear to have any formal or nonarbitrary counterparts. Coordination, for instance, is based on formal identity or sameness, while “bigger than” is based on relative size. Temporal frames are more inherently verbal in that they are based on the nonarbitrary experience of change, but the dimensional nature of that experience must be verbally constructed. Frames that depend on perspective, however, cannot be traced to formal dimensions in the environment at all. Instead, the relationship between the individual and other events serves as the constant variable upon which these frames are based. Learning to respond appropriately to (and ask) the following kinds of questions appears to be critical in establishing these kinds of relational frames: “What are you doing now?” “What did you do then?” “What are you doing here?” “What are you doing there?” “What am I doing now?” “What did I do then?” “What am I doing here?” “What will I do there?” Each time one or more of these questions is asked or answered, the physical environment will likely be different. The only constant across all of the questions are the relational properties of I versus You, Here versus There, and Now versus Then. These properties appear to be abstracted through learning to talk about one’s own perspective in relation to other perspectives. For example, I is always from this perspective here, not from someone else’s perspective there. Clearly, a speaker must learn to respond in accordance with these relational frames. For example, if Peter is asked, “What did you do when you got there?” he should not simply describe what someone else is doing now (unless he wishes to hide what he actually did, or annoy and confuse the questioner). We shall consider the relational frames of perspective in greater detail in subsequent chapters. 2.4.10. Interactions Among Relational Frames At the present time very little is known about the effects of learning to respond in accordance with one type of frame on other framing activities. We have seen evidence in our research of such effects. For example, training in SAME may make OPPOSITION easier; training in deictic relations may make appreciation of contingencies easier and so on. One fairly clear prediction from RFT is that there should be some generalization of relational responding, particularly within families of relational frames. For example, an individual who learns to respond in accordance with sameness, may learn to respond in accordance with similarity (or opposition, since sameness is a combinatorially entailed aspect of opposition) more rapidly than, say, comparison. Similarly, learning across more closely associated families of relations may be more expected than learning across more distinct families. For example, to frame in accordance with comparison may facilitate hierarchical framing more readily than a frame of coordination. For the time being, however, such issues will have to await systematic empirical investigation. 40 RELATIONAL FRAME THEORY 2.4.11. Relational Frames: A Caveat In listing the foregoing families of relational frames, we are not suggesting that they are somehow final or absolute. If RFT is correct, the number of relational frames is limited only by the creativity of the social/verbal community that trains them. Some frames, such as coordination, have been the subject of many empirical analyses. Others such as opposition and more-than/less-than have also been studied experimentally, but the relevant database is much smaller than for coordination. Many of the frames listed, however, have not been analyzed empirically, or have only been subjected to the most preliminary of experimental analyses. Thus the list we have presented is to some degree tentative in that some of the relational frames we have identified are based on our preliminary, non-experimental analyses of human language. For example, TIME and CAUSALITY can be thought of as one or two types of relations. It is not yet clear if thinking of them as separate or related may be the most useful. Thus, while the generic concept of a relational frame is foundational to RFT, the concept of any particular relational frame is not. Our aim in presenting this list is to provide a set of conceptual tools, some more firmly grounded in data than others, that may be modified and refined as subsequent empirical analyses are conducted. 2.5. COMPLEX RELATIONAL NETWORKS It is possible to create relational networks from mixtures of various relational frames and to relate entire relational classes with other relational classes. Forexample, if one equivalence class is the opposite of another equivalence class, then normally each member of the first class is the opposite of all members of the second and vice versa. This can continue to virtually any level of complexity. For example, consider the relations that surround a given word, such as “car.” It is part of many hierarchical classes, such as the class “noun,” or the class “vehicles.” Other terms are in a hierarchical relation with it, such as “windshield” or “wheel.” It enters into many comparisons: it is faster then a snail, bigger than a breadbox, heavier than a book. It is the same as “automobile,” but different than a house, and so on. The participation of the word “car” in these relations is part of the training required for the verbal community to use the stimulus “car” in the way that it does. Even the simplest verbal concept quickly becomes the focus of a complex network of stimulus relations in natural language use. We will deal with this in detail in the next three chapters because this is a crucial form of relational responding in such activities as problem-solving, reasoning, and thinking. The generative implications of this process are spectacular. A single specified relation between two sets of relata might give rise to myriad derived relations in an instant. Entire sets of relations can change in an instant. This kind of phenomenon seems to be part of what is being described with terms like “insight.” 2.6. EMPIRICAL EVIDENCE FOR RELATIONAL FRAMES AS OPERANTS Operant behavior can be originated, maintained, modified, or eliminated in the laboratory and it is relatively easy to identify operants in that context. Many naturally occurring DERIVED RELATIONAL RESPONDING AS LEARNED BEHAVIOR 41 behaviors, however, are difficult to bring into the laboratory in such a highly controlled fashion. Nevertheless, we can examine the characteristics of these naturalistic behaviors to see if they have some of the properties characteristic of operants. Four such properties seem most relevant: first, they should develop over time rather than emerging in whole cloth; second, they should have flexible form; third, they should be under antecedent stimulus control; and fourth, they should be under consequential control. If derived stimulus relations are based upon operant behavior, they should show these four characteristics. Although much work remains to be done, there is some supporting evidence for each of them.",
"title": ""
},
{
"docid": "1d0ca28334542ed2978f986cd3550150",
"text": "Recent success of deep learning models for the task of extractive Question Answering (QA) is hinged on the availability of large annotated corpora. However, large domain specific annotated corpora are limited and expensive to construct. In this work, we envision a system where the end user specifies a set of base documents and only a few labelled examples. Our system exploits the document structure to create cloze-style questions from these base documents; pre-trains a powerful neural network on the cloze style questions; and further finetunes the model on the labeled examples. We evaluate our proposed system across three diverse datasets from different domains, and find it to be highly effective with very little labeled data. We attain more than 50% F1 score on SQuAD and TriviaQA with less than a thousand labelled examples. We are also releasing a set of 3.2M cloze-style questions for practitioners to use while building QA systems1.",
"title": ""
},
{
"docid": "802280cdb72ad33987ad57772d932537",
"text": "It is usually believed that drugs of abuse are smuggled into the United States or are clandestinely produced for illicit distribution. Less well known is that many hallucinogens and dissociative agents can be obtained from plants and fungi growing wild or in gardens. Some of these botanical sources can be located throughout the United States; others have a more narrow distribution. This article reviews plants containing N,N-dimethyltryptamine, reversible type A monoamine oxidase inhibitors (MAOI), lysergic acid amide, the anticholinergic drugs atropine and scopolamine, or the diterpene salvinorin-A (Salvia divinorum). Also reviewed are mescaline-containing cacti, psilocybin/psilocin-containing mushrooms, and the Amanita muscaria and Amanita pantherina mushrooms that contain muscimol and ibotenic acid. Dangerous misidentification is most common with the mushrooms, but even a novice forager can quickly learn how to properly identify and prepare for ingestion many of these plants. Moreover, through the ever-expanding dissemination of information via the Internet, this knowledge is being obtained and acted upon by more and more individuals. This general overview includes information on the geographical range, drug content, preparation, intoxication, and the special health risks associated with some of these plants. Information is also offered on the unique issue of when bona fide religions use such plants as sacraments in the United States. In addition to the Native American Church's (NAC) longstanding right to peyote, two religions of Brazilian origin, the Santo Daime and the Uniao do Vegetal (UDV), are seeking legal protection in the United States for their use of sacramental dimethyltryptamine-containing \"ayahuasca.\"",
"title": ""
},
{
"docid": "8976eea8c39d9cb9dea21c42bae8ebea",
"text": "Continuously monitoring schizophrenia patients’ psychiatric symptoms is crucial for in-time intervention and treatment adjustment. The Brief Psychiatric Rating Scale (BPRS) is a survey administered by clinicians to evaluate symptom severity in schizophrenia. The CrossCheck symptom prediction system is capable of tracking schizophrenia symptoms based on BPRS using passive sensing from mobile phones. We present results from an ongoing randomized control trial, where passive sensing data, self-reports, and clinician administered 7-item BPRS surveys are collected from 36 outpatients with schizophrenia recently discharged from hospital over a period ranging from 2-12 months. We show that our system can predict a symptom scale score based on a 7-item BPRS within ±1.45 error on average using automatically tracked behavioral features from phones (e.g., mobility, conversation, activity, smartphone usage, the ambient acoustic environment) and user supplied self-reports. Importantly, we show our system is also capable of predicting an individual BPRS score within ±1.59 error purely based on passive sensing from phones without any self-reported information from outpatients. Finally, we discuss how well our predictive system reflects symptoms experienced by patients by reviewing a number of case studies.",
"title": ""
},
{
"docid": "e9c383d71839547d41829348bebaabcf",
"text": "Receiver operating characteristic (ROC) analysis, which yields indices of accuracy such as the area under the curve (AUC), is increasingly being used to evaluate the performances of diagnostic tests that produce results on continuous scales. Both parametric and nonparametric ROC approaches are available to assess the discriminant capacity of such tests, but there are no clear guidelines as to the merits of each, particularly with non-binormal data. Investigators may worry that when data are non-Gaussian, estimates of diagnostic accuracy based on a binormal model may be distorted. The authors conducted a Monte Carlo simulation study to compare the bias and sampling variability in the estimates of the AUCs derived from parametric and nonparametric procedures. Each approach was assessed in data sets generated from various configurations of pairs of overlapping distributions; these included the binormal model and non-binormal pairs of distributions where one or both pair members were mixtures of Gaussian (MG) distributions with different degrees of departures from binormality. The biases in the estimates of the AUCs were found to be very small for both parametric and nonparametric procedures. The two approaches yielded very close estimates of the AUCs and the corresponding sampling variability even when data were generated from non-binormal models. Thus, for a wide range of distributions, concern about bias or imprecision of the estimates of the AUC should not be a major factor in choosing between the nonparametric and parametric approaches.",
"title": ""
},
{
"docid": "063598613ce313e2ad6d2b0697e0c708",
"text": "Contour shape descriptors are among the important shape description methods. Fourier descriptors (FD) and curvature scale space descriptors (CSSD) are widely used as contour shape descriptors for image retrieval in the literature. In MPEG-7, CSSD has been proposed as one of the contour-based shape descriptors. However, no comprehensive comparison has been made between these two shape descriptors. In this paper we study and compare FD and CSSD using standard principles and standard database. The study targets image retrieval application. Our experimental results show that FD outperforms CSSD in terms of robustness, low computation, hierarchical representation, retrieval performance and suitability for efficient indexing.",
"title": ""
},
{
"docid": "e881c2ab6abc91aa8e7cbe54d861d36d",
"text": "Tracing traffic using commodity hardware in contemporary highspeed access or aggregation networks such as 10-Gigabit Ethernet is an increasingly common yet challenging task. In this paper we investigate if today’s commodity hardware and software is in principle able to capture traffic from a fully loaded Ethernet. We find that this is only possible for data rates up to 1 Gigabit/s without reverting to using special hardware due to, e. g., limitations with the current PC buses. Therefore, we propose a novel way for monitoring higher speed interfaces (e. g., 10-Gigabit) by distributing their traffic across a set of lower speed interfaces (e. g., 1-Gigabit). This opens the next question: which system configuration is capable of monitoring one such 1-Gigabit/s interface? To answer this question we present a methodology for evaluating the performance impact of different system components including different CPU architectures and different operating system. Our results indicate that the combination of AMD Opteron with FreeBSD outperforms all others, independently of running in singleor multi-processor mode. Moreover, the impact of packet filtering, running multiple capturing applications, adding per packet analysis load, saving the captured packets to disk, and using 64-bit OSes is investigated.",
"title": ""
},
{
"docid": "df5aaa0492fc07b76eb7f8da97ebf08e",
"text": "The aim of the present case report is to describe the orthodontic-surgical treatment of a 17-year-and-9-month-old female patient with a Class III malocclusion, poor facial esthetics, and mandibular and chin protrusion. She had significant anteroposterior and transverse discrepancies, a concave profile, and strained lip closure. Intraorally, she had a negative overjet of 5 mm and an overbite of 5 mm. The treatment objectives were to correct the malocclusion, and facial esthetic and also return the correct function. The surgical procedures included a Le Fort I osteotomy for expansion, advancement, impaction, and rotation of the maxilla to correct the occlusal plane inclination. There was 2 mm of impaction of the anterior portion of the maxilla and 5 mm of extrusion in the posterior region. A bilateral sagittal split osteotomy was performed in order to allow counterclockwise rotation of the mandible and anterior projection of the chin, accompanying the maxillary occlusal plane. Rigid internal fixation was used without any intermaxillary fixation. It was concluded that these procedures were very effective in producing a pleasing facial esthetic result, showing stability 7 years posttreatment.",
"title": ""
},
{
"docid": "9c6f2a1eb23fc35e5a3a2b54c5dcb0c4",
"text": "Some of the current assembly issues of fine-pitch chip-on-flex (COF) packages for LCD applications are reviewed. Traditional underfill material, anisotropic conductive adhesive (ACA), and nonconductive adhesive (NCA) are considered in conjunction with two applicable bonding methods including thermal and laser bonding. Advantages and disadvantages of each material/process combination are identified. Their applicability is further investigated to identify a process most suitable to the next-generation fine-pitch packages (less than 35 mum). Numerical results and subsequent testing results indicate that the NCA/laser bonding process is advantageous for preventing both lead crack and excessive misalignment compared to the conventional bonding process",
"title": ""
}
] | scidocsrr |
676750cc6699250834bbba06c106c5c6 | Cyber-Physical-Social Based Security Architecture for Future Internet of Things | [
{
"docid": "de8e9537d6b50467d014451dcaae6c0e",
"text": "With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect their systems from intrusion and computer-virus attacks. Such protection must detect anomalous patterns by exploiting known signatures while monitoring normal computer programs and network usage for abnormalities. Current antivirus and network intrusion detection (ID) solutions can become overwhelmed by the burden of capturing and classifying new viral stains and intrusion patterns. To overcome this problem, a self-adaptive distributed agent-based defense immune system based on biological strategies is developed within a hierarchical layered architecture. A prototype interactive system is designed, implemented in Java, and tested. The results validate the use of a distributed-agent biological-system approach toward the computer-security problems of virus elimination and ID.",
"title": ""
},
{
"docid": "e33dd9c497488747f93cfcc1aa6fee36",
"text": "The phrase Internet of Things (IoT) heralds a vision of the future Internet where connecting physical things, from banknotes to bicycles, through a network will let them take an active part in the Internet, exchanging information about themselves and their surroundings. This will give immediate access to information about the physical world and the objects in it leading to innovative services and increase in efficiency and productivity. This paper studies the state-of-the-art of IoT and presents the key technological drivers, potential applications, challenges and future research areas in the domain of IoT. IoT definitions from different perspective in academic and industry communities are also discussed and compared. Finally some major issues of future research in IoT are identified and discussed briefly.",
"title": ""
}
] | [
{
"docid": "bc5b77c532c384281af64633fcf697a3",
"text": "The purpose of this study was to investigate the effects of a 12-week resistance-training program on muscle strength and mass in older adults. Thirty-three inactive participants (60-74 years old) were assigned to 1 of 3 groups: high-resistance training (HT), moderate-resistance training (MT), and control. After the training period, both HT and MT significantly increased 1-RM body strength, the peak torque of knee extensors and flexors, and the midthigh cross-sectional area of the total muscle. In addition, both HT and MT significantly decreased the abdominal circumference. HT was more effective in increasing 1-RM strength, muscle mass, and peak knee-flexor torque than was MT. These data suggest that muscle strength and mass can be improved in the elderly with both high- and moderate-intensity resistance training, but high-resistance training can lead to greater strength gains and hypertrophy than can moderate-resistance training.",
"title": ""
},
{
"docid": "fd4bd9edcaff84867b6e667401aa3124",
"text": "We give suggestions for the presentation of research results from frequentist, information-theoretic, and Bayesian analysis paradigms, followed by several general suggestions. The information-theoretic and Bayesian methods offer alternative approaches to data analysis and inference compared to traditionally used methods. Guidance is lacking on the presentation of results under these alternative procedures and on nontesting aspects of classical frequentist methods of statistical analysis. Null hypothesis testing has come under intense criticism. We recommend less reporting of the results of statistical tests of null hypotheses in cases where the null is surely false anyway, or where the null hypothesis is of little interest to science or management. JOURNAL OF WILDLIFE MANAGEMENT 65(3):373-378",
"title": ""
},
{
"docid": "5c819727ba80894e72531a62e402f0c4",
"text": "omega-3 fatty acids, alpha-tocopherol, ascorbic acid, beta-carotene and glutathione determined in leaves of purslane (Portulaca oleracea), grown in both a controlled growth chamber and in the wild, were compared in composition to spinach. Leaves from both samples of purslane contained higher amounts of alpha-linolenic acid (18:3w3) than did leaves of spinach. Chamber-grown purslane contained the highest amount of 18:3w3. Samples from the two kinds of purslane contained higher leaves of alpha-tocopherol, ascorbic acid and glutathione than did spinach. Chamber-grown purslane was richer in all three and the amount of alpha-tocopherol was seven times higher than that found in spinach, whereas spinach was slightly higher in beta-carotene. One hundred grams of fresh purslane leaves (one serving) contain about 300-400 mg of 18:3w3; 12.2 mg of alpha-tocopherol; 26.6 mg of ascorbic acid; 1.9 mg of beta-carotene; and 14.8 mg of glutathione. We confirm that purslane is a nutritious food rich in omega-3 fatty acids and antioxidants.",
"title": ""
},
{
"docid": "ede12c734b2fb65b427b3d47e1f3c3d8",
"text": "Battery management systems in hybrid-electric-vehicle battery packs must estimate values descriptive of the pack’s present operating condition. These include: battery state-of-charge, power fade, capacity fade, and instantaneous available power. The estimation mechanism must adapt to changing cell characteristics as cells age and therefore provide accurate estimates over the lifetime of the pack. In a series of three papers, we propose methods, based on extended Kalman filtering (EKF), that are able to accomplish these goals for a lithium ion polymer battery pack. We expect that they will also work well on other battery chemistries. These papers cover the required mathematical background, cell modeling and system identification requirements, and the final solution, together with results. This third paper concludes the series by presenting five additional applications where either an EKF or results from EKF may be used in typical BMS algorithms: initializing state estimates after the vehicle has been idle for some time; estimating state-of-charge with dynamic error bounds on the estimate; estimating pack available dis/charge power; tracking changing pack parameters (including power fade and capacity fade) as the pack ages, and therefore providing a quantitative estimate of state-of-health; and determining which cells must be equalized. Results from pack tests are presented. © 2004 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "e4e26cc61b326f8d60dc3f32909d340c",
"text": "We propose two secure protocols namely private equality test (PET) for single comparison and private batch equality test (PriBET) for batch comparisons of l-bit integers. We ensure the security of these secure protocols using somewhat homomorphic encryption (SwHE) based on ring learning with errors (ring-LWE) problem in the semi-honest model. In the PET protocol, we take two private integers input and produce the output denoting their equality or non-equality. Here the PriBET protocol is an extension of the PET protocol. So in the PriBET protocol, we take single private integer and another set of private integers as inputs and produce the output denoting whether single integer equals at least one integer in the set of integers or not. To serve this purpose, we also propose a new packing method for doing the batch equality test using few homomorphic multiplications of depth one. Here we have done our experiments at the 140-bit security level. For the lattice dimension 2048, our experiments show that the PET protocol is capable of doing any equality test of 8-bit to 2048-bit that require at most 107 milliseconds. Moreover, the PriBET protocol is capable of doing about 600 (resp., 300) equality comparisons per second for 32-bit (resp., 64-bit) integers. In addition, our experiments also show that the PriBET protocol can do more computations within the same time if the data size is smaller like 8-bit or 16-bit.",
"title": ""
},
{
"docid": "1cc4048067cc93c2f1e836c77c2e06dc",
"text": "Recent advances in microscope automation provide new opportunities for high-throughput cell biology, such as image-based screening. High-complex image analysis tasks often make the implementation of static and predefined processing rules a cumbersome effort. Machine-learning methods, instead, seek to use intrinsic data structure, as well as the expert annotations of biologists to infer models that can be used to solve versatile data analysis tasks. Here, we explain how machine-learning methods work and what needs to be considered for their successful application in cell biology. We outline how microscopy images can be converted into a data representation suitable for machine learning, and then introduce various state-of-the-art machine-learning algorithms, highlighting recent applications in image-based screening. Our Commentary aims to provide the biologist with a guide to the application of machine learning to microscopy assays and we therefore include extensive discussion on how to optimize experimental workflow as well as the data analysis pipeline.",
"title": ""
},
{
"docid": "440436a887f73c599452dc57c689dc9d",
"text": "This paper will explore the process of desalination by reverse osmosis (RO) and the benefits that it can contribute to society. RO may offer a sustainable solution to the water crisis, a global problem that is not going away without severe interference and innovation. This paper will go into depth on the processes involved with RO and how contaminants are removed from sea-water. Additionally, the use of significant pressures to force water through the semipermeable membranes, which only allow water to pass through them, will be investigated. Throughout the paper, the topics of environmental and economic sustainability will be covered. Subsequently, the two primary methods of desalination, RO and multi-stage flash distillation (MSF), will be compared. It will become clear that RO is a better method of desalination when compared to MSF. This paper will study examples of RO in action, including; the Carlsbad Plant, the Sorek Plant, and applications beyond the potable water industry. It will be shown that The Claude \"Bud\" Lewis Carlsbad Desalination Plant (Carlsbad), located in San Diego, California is a vital resource in the water economy of the area. The impact of the Sorek Plant, located in Tel Aviv, Israel will also be explained. Both plants produce millions of gallons of fresh, drinkable water and are vital resources for the people that live there.",
"title": ""
},
{
"docid": "10496d5427035670d89f72a64b68047f",
"text": "A challenge for human-computer interaction researchers and user interf ace designers is to construct information technologies that support creativity. This ambitious goal can be attained by building on an adequate understanding of creative processes. This article offers a four-phase framework for creativity that might assist designers in providing effective tools for users: (1)Collect: learn from provious works stored in libraries, the Web, etc.; (2) Relate: consult with peers and mentors at early, middle, and late stages, (3)Create: explore, compose, evaluate possible solutions; and (4) Donate: disseminate the results and contribute to the libraries. Within this integrated framework, this article proposes eight activities that require human-computer interaction research and advanced user interface design. A scenario about an architect illustrates the process of creative work within such an environment.",
"title": ""
},
{
"docid": "c19b63a2c109c098c22877bcba8690ae",
"text": "A monolithic current-mode pulse width modulation (PWM) step-down dc-dc converter with 96.7% peak efficiency and advanced control and protection circuits is presented in this paper. The high efficiency is achieved by \"dynamic partial shutdown strategy\" which enhances circuit speed with less power consumption. Automatic PWM and \"pulse frequency modulation\" switching boosts conversion efficiency during light load operation. The modified current sensing circuit and slope compensation circuit simplify the current-mode control circuit and enhance the response speed. A simple high-speed over-current protection circuit is proposed with the modified current sensing circuit. The new on-chip soft-start circuit prevents the power on inrush current without additional off-chip components. The dc-dc converter has been fabricated with a 0.6 mum CMOS process and measured 1.35 mm2 with the controller measured 0.27 mm2. Experimental results show that the novel on-chip soft-start circuit with longer than 1.5 ms soft-start time suppresses the power-on inrush current. This converter can operate at 1.1 MHz with supply voltage from 2.2 to 6.0 V. Measured power efficiency is 88.5-96.7% for 0.9 to 800 mA output current and over 85.5% for 1000 mA output current.",
"title": ""
},
{
"docid": "cc5f814338606b92c92aa6caf2f4a3f5",
"text": "The purpose of this study was to report the outcome of infants with antenatal hydronephrosis. Between May 1999 and June 2006, all patients diagnosed with isolated fetal renal pelvic dilatation (RPD) were prospectively followed. The events of interest were: presence of uropathy, need for surgical intervention, RPD resolution, urinary tract infection (UTI), and hypertension. RPD was classified as mild (5–9.9 mm), moderate (10–14.9 mm) or severe (≥15 mm). A total of 192 patients was included in the analysis; 114 were assigned to the group of non-significant findings (59.4%) and 78 to the group of significant uropathy (40.6%). Of 89 patients with mild dilatation, 16 (18%) presented uropathy. Median follow-up time was 24 months. Twenty-seven patients (15%) required surgical intervention. During follow-up, UTI occurred in 27 (14%) children. Of 89 patients with mild dilatation, seven (7.8%) presented UTI during follow-up. Renal function, blood pressure, and somatic growth were within normal range at last visit. The majority of patients with mild fetal RPD have no significant findings during infancy. Nevertheless, our prospective study has shown that 18% of these patients presented uropathy and 7.8% had UTI during a medium-term follow-up time. Our findings suggested that, in contrast to patients with moderate/severe RPD, infants with mild RPD do not require invasive diagnostic procedures but need strict clinical surveillance for UTI and progression of RPD.",
"title": ""
},
{
"docid": "2f3bb54596bba8cd7a073ef91964842c",
"text": "BACKGROUND AND PURPOSE\nRecent meta-analyses have suggested similar wound infection rates when using single- or multiple-dose antibiotic prophylaxis in the operative management of closed long bone fractures. In order to assist clinicians in choosing the optimal prophylaxis strategy, we performed a cost-effectiveness analysis comparing single- and multiple-dose prophylaxis.\n\n\nMETHODS\nA cost-effectiveness analysis comparing the two prophylactic strategies was performed using time horizons of 60 days and 1 year. Infection probabilities, costs, and quality-adjusted life days (QALD) for each strategy were estimated from the literature. All costs were reported in 2007 US dollars. A base case analysis was performed for the surgical treatment of a closed ankle fracture. Sensitivity analysis was performed for all variables, including probabilistic sensitivity analysis using Monte Carlo simulation.\n\n\nRESULTS\nSingle-dose prophylaxis results in lower cost and a similar amount of quality-adjusted life days gained. The single-dose strategy had an average cost of $2,576 for an average gain of 272 QALD. Multiple doses had an average cost of $2,596 for 272 QALD gained. These results are sensitive to the incidence of surgical site infection and deep wound infection for the single-dose treatment arm. Probabilistic sensitivity analysis using all model variables also demonstrated preference for the single-dose strategy.\n\n\nINTERPRETATION\nAssuming similar infection rates between the prophylactic groups, our results suggest that single-dose prophylaxis is slightly more cost-effective than multiple-dose regimens for the treatment of closed fractures. Extensive sensitivity analysis demonstrates these results to be stable using published meta-analysis infection rates.",
"title": ""
},
{
"docid": "3aa58539c69d6706bc0a9ca0256cdf80",
"text": "BACKGROUND\nAcne vulgaris is a prevalent skin disorder impairing both physical and psychosocial health. This study was designed to investigate the effectiveness of photodynamic therapy (PDT) combined with minocycline in moderate to severe facial acne and influence on quality of life (QOL).\n\n\nMETHODS\nNinety-five patients with moderate to severe facial acne (Investigator Global Assessment [IGA] score 3-4) were randomly treated with PDT and minocycline (n = 48) or minocycline alone (n = 47). All patients took minocycline hydrochloride 100 mg/d for 4 weeks, whereas patients in the minocycline plus PDT group also received 4 times PDT treatment 1 week apart. IGA score, lesion counts, Dermatology Life Quality Index (DLQI), and safety evaluation were performed before treatment and at 2, 4, 6, and 8 weeks after enrolment.\n\n\nRESULTS\nThere were no statistically significant differences in characteristics between 2 treatment groups at baseline. Minocycline plus PDT treatment led to a greater mean percentage reduction from baseline in lesion counts versus minocycline alone at 8 weeks for both inflammatory (-74.4% vs -53.3%; P < .001) and noninflammatory lesions (-61.7% vs -42.4%; P < .001). More patients treated with minocycline plus PDT achieved IGA score <2 at study end (week 8: 30/48 vs 20/47; P < .05). Patients treated with minocycline plus PDT got significant lower DLQI at 8 weeks (4.4 vs 6.3; P < .001). Adverse events were mild and manageable.\n\n\nCONCLUSIONS\nCompared with minocycline alone, the combination of PDT with minocycline significantly improved clinical efficacy and QOL in moderate to severe facial acne patients.",
"title": ""
},
{
"docid": "bf4a991dbb32ec1091a535750637dbd7",
"text": "As cutting-edge experiments display ever more extreme forms of non-classical behavior, the prevailing view on the interpretation of quantum mechanics appears to be gradually changing. A (highly unscientific) poll taken at the 1997 UMBC quantum mechanics workshop gave the once alldominant Copenhagen interpretation less than half of the votes. The Many Worlds interpretation (MWI) scored second, comfortably ahead of the Consistent Histories and Bohm interpretations. It is argued that since all the above-mentioned approaches to nonrelativistic quantum mechanics give identical cookbook prescriptions for how to calculate things in practice, practical-minded experimentalists, who have traditionally adopted the “shut-up-and-calculate interpretation”, typically show little interest in whether cozy classical concepts are in fact real in some untestable metaphysical sense or merely the way we subjectively perceive a mathematically simpler world where the Schrödinger equation describes everything — and that they are therefore becoming less bothered by a profusion of worlds than by a profusion of words. Common objections to the MWI are discussed. It is argued that when environment-induced decoherence is taken into account, the experimental predictions of the MWI are identical to those of the Copenhagen interpretation except for an experiment involving a Byzantine form of “quantum suicide”. This makes the choice between them purely a matter of taste, roughly equivalent to whether one believes mathematical language or human language to be more fundamental.",
"title": ""
},
{
"docid": "f274062a188fb717b8645e4d2352072a",
"text": "CPU-FPGA heterogeneous acceleration platforms have shown great potential for continued performance and energy efficiency improvement for modern data centers, and have captured great attention from both academia and industry. However, it is nontrivial for users to choose the right platform among various PCIe and QPI based CPU-FPGA platforms from different vendors. This paper aims to find out what microarchitectural characteristics affect the performance, and how. We conduct our quantitative comparison and in-depth analysis on two representative platforms: QPI-based Intel-Altera HARP with coherent shared memory, and PCIe-based Alpha Data board with private device memory. We provide multiple insights for both application developers and platform designers.",
"title": ""
},
{
"docid": "c9c29c091c9851920315c4d4b38b4c9f",
"text": "BACKGROUND\nThe presence of six or more café au lait (CAL) spots is a criterion for the diagnosis of neurofibromatosis type 1 (NF-1). Children with multiple CAL spots are often referred to dermatologists for NF-1 screening. The objective of this case series is to characterize a subset of fair-complected children with red or blond hair and multiple feathery CAL spots who did not meet the criteria for NF-1 at the time of their last evaluation.\n\n\nMETHODS\nWe conducted a chart review of eight patients seen in our pediatric dermatology clinic who were previously identified as having multiple CAL spots and no other signs or symptoms of NF-1.\n\n\nRESULTS\nWe describe eight patients ages 2 to 9 years old with multiple, irregular CAL spots with feathery borders and no other signs or symptoms of NF-1. Most of these patients had red or blond hair and were fair complected. All patients were evaluated in our pediatric dermatology clinic, some with a geneticist. The number of CAL spots per patient ranged from 5 to 15 (mean 9.4, median 9).\n\n\nCONCLUSION\nA subset of children, many with fair complexions and red or blond hair, has an increased number of feathery CAL spots and appears unlikely to develop NF-1, although genetic testing was not conducted. It is important to recognize the benign nature of CAL spots in these patients so that appropriate screening and follow-up recommendations may be made.",
"title": ""
},
{
"docid": "fc07af4d49f7b359e484381a0a88aff7",
"text": "In this paper, we develop the idea of a universal anytime intelligence test. The meaning of the terms “universal” and “anytime” is manifold here: the test should be able to measure the intelligence of any biological or artificial system that exists at this time or in the future. It should also be able to evaluate both inept and brilliant systems (any intelligence level) as well as very slow to very fast systems (any time scale). Also, the test may be interrupted at any time, producing an approximation to the intelligence score, in such a way that the more time is left for the test, the better the assessment will be. In order to do this, our test proposal is based on previous works on the measurement of machine intelligence based on Kolmogorov Complexity and universal distributions, which were developed in the late 1990s (C-tests and compression-enhanced Turing tests). It is also based on the more recent idea of measuring intelligence through dynamic/interactive tests held against a universal distribution of environments. We discuss some of these tests and highlight their limitations since we want to construct a test that is both general and practical. Consequently, we introduce many new ideas that develop early “compression tests” and the more recent definition of “universal intelligence” in order to design new “universal intelligence tests”, where a feasible implementation has been a design requirement. One of these tests is the “anytime intelligence test”, which adapts to the examinee’s level of intelligence in order to obtain an intelligence score within a limited time.",
"title": ""
},
{
"docid": "0cd2da131bf78526c890dae72514a8f0",
"text": "This paper presents a research model to explicate that the level of consumers’ participation on companies’ brand microblogs is influenced by their brand attachment process. That is, self-congruence and partner quality affect consumers’ trust and commitment toward companies’ brands, which in turn influence participation on brand microblogs. Further, we propose that gender has important moderating effects in our research model. We empirically test the research hypotheses through an online survey. The findings illustrate that self-congruence and partner quality have positive effects on trust and commitment. Trust affects commitment and participation, while participation is also influenced by commitment. More importantly, the effects of self-congruence on trust and commitment are found to be stronger for male consumers than females. In contrast, the effects of partner quality on trust and commitment are stronger for female consumers than males. Trust posits stronger effects on commitment and participation for males, while commitment has a stronger effect on participation for females. We believe that our findings contribute to the literature on consumer participation behavior and gender differences on brand microblogs. Companies can also apply our findings to strengthen their brand building and participation level of different consumers on their microblogs. 2014 Elsevier Ltd. All rights reserved.",
"title": ""
},
{
"docid": "1ec62f70be9d006b7e1295ef8d9cb1e3",
"text": "The aim of this research is to explore social media and its benefits especially from business-to-business innovation and related customer interface perspective, and to create a more comprehensive picture of the possibilities of social media for the business-to-business sector. Business-to-business context was chosen because it is in many ways a very different environment for social media than business-to-consumer context, and is currently very little academically studied. A systematic literature review on B2B use of social media and achieved benefits in the inn ovation con text was performed to answer the questions above and achieve the research goals. The study clearly demonstrates that not merely B2C's, as commonly believed, but also B2B's can benefit from the use of social media in a variety of ways. Concerning the broader classes of innovation --related benefits, the reported benefits of social media use referred to increased customer focus and understanding, increased level of customer service, and decreased time-to-market. The study contributes to the existing social media --related literature, because there were no found earlier comprehensive academic studies on the use of social media in the innovation process in the context of B2B customer interface.",
"title": ""
},
{
"docid": "97c162261666f145da6e81d2aa9a8343",
"text": "Shape optimization is a growing field of interest in many areas of academic research, marine design, and manufacturing. As part of the CREATE Ships Hydromechanics Product, an effort is underway to develop a computational tool set and process framework that can aid the ship designer in making informed decisions regarding the influence of the planned hull shape on its hydrodynamic characteristics, even at the earliest stages where decisions can have significant cost implications. The major goal of this effort is to utilize the increasing experience gained in using these methods to assess shape optimization techniques and how they might impact design for current and future naval ships. Additionally, this effort is aimed at establishing an optimization framework within the bounds of a collaborative design environment that will result in improved performance and better understanding of preliminary ship designs at an early stage. The initial effort demonstrated here is aimed at ship resistance, and examples are shown for full ship and localized bow dome shaping related to the Joint High Speed Sealift (JHSS) hull concept. Introduction Any ship design inherently involves optimization, as competing requirements and design parameters force the design to evolve, and as designers strive to deliver the most effective and efficient platform possible within the constraints of time, budget, and performance requirements. A significant number of applications of computational fluid dynamics (CFD) tools to hydrodynamic optimization, mostly for reducing calm-water drag and wave patterns, demonstrate a growing interest in optimization. In addition, more recent ship design programs within the US Navy illustrate some fundamental changes in mission and performance requirements, and future ship designs may be radically different from current ships in the fleet. One difficulty with designing such new concepts is the lack of experience from which to draw from when performing design studies; thus, optimization techniques may be particularly useful. These issues point to a need for greater fidelity, robustness, and ease of use in the tools used in early stage ship design. The Computational Research and Engineering Acquisition Tools and Environments (CREATE) program attempts to address this in its plan to develop and deploy sets of computational engineering design and analysis tools. It is expected that advances in computers will allow for highly accurate design and analyses studies that can be carried out throughout the design process. In order to evaluate candidate designs and explore the design space more thoroughly shape optimization is an important component of the CREATE Ships Hydromechanics Product. The current program development plan includes fast parameterized codes to bound the design space and more accurate Reynolds-Averaged Navier-Stokes (RANS) codes to better define the geometry and performance of the specified hull forms. The potential for hydrodynamic shape optimization has been demonstrated for a variety of different hull forms, including multi-hulls, in related efforts (see e.g., Wilson et al, 2009, Stern et al, Report Documentation Page Form Approved",
"title": ""
},
{
"docid": "7a8a98b91680cbc63594cd898c3052c8",
"text": "Policy-based access control is a technology that achieves separation of concerns through evaluating an externalized policy at each access attempt. While this approach has been well-established for request-response applications, it is not supported for database queries of data-driven applications, especially for attribute-based policies. In particular, search operations for such applications involve poor scalability with regard to the data set size for this approach, because they are influenced by dynamic runtime conditions. This paper proposes a scalable application-level middleware solution that performs runtime injection of the appropriate rules into the original search query, so that the result set of the search includes only items to which the subject is entitled. Our evaluation shows that our method scales far better than current state of practice approach that supports policy-based access control.",
"title": ""
}
] | scidocsrr |
b5058bb2c8ad7534f010c04fa0032c83 | SurroundSense: mobile phone localization via ambience fingerprinting | [
{
"docid": "ed9e22167d3e9e695f67e208b891b698",
"text": "ÐIn k-means clustering, we are given a set of n data points in d-dimensional space R and an integer k and the problem is to determine a set of k points in R, called centers, so as to minimize the mean squared distance from each data point to its nearest center. A popular heuristic for k-means clustering is Lloyd's algorithm. In this paper, we present a simple and efficient implementation of Lloyd's k-means clustering algorithm, which we call the filtering algorithm. This algorithm is easy to implement, requiring a kd-tree as the only major data structure. We establish the practical efficiency of the filtering algorithm in two ways. First, we present a data-sensitive analysis of the algorithm's running time, which shows that the algorithm runs faster as the separation between clusters increases. Second, we present a number of empirical studies both on synthetically generated data and on real data sets from applications in color quantization, data compression, and image segmentation. Index TermsÐPattern recognition, machine learning, data mining, k-means clustering, nearest-neighbor searching, k-d tree, computational geometry, knowledge discovery.",
"title": ""
},
{
"docid": "8718d91f37d12b8ff7658723a937ea84",
"text": "We consider the problem of monitoring road and traffic conditions in a city. Prior work in this area has required the deployment of dedicated sensors on vehicles and/or on the roadside, or the tracking of mobile phones by service providers. Furthermore, prior work has largely focused on the developed world, with its relatively simple traffic flow patterns. In fact, traffic flow in cities of the developing regions, which comprise much of the world, tends to be much more complex owing to varied road conditions (e.g., potholed roads), chaotic traffic (e.g., a lot of braking and honking), and a heterogeneous mix of vehicles (2-wheelers, 3-wheelers, cars, buses, etc.).\n To monitor road and traffic conditions in such a setting, we present Nericell, a system that performs rich sensing by piggybacking on smartphones that users carry with them in normal course. In this paper, we focus specifically on the sensing component, which uses the accelerometer, microphone, GSM radio, and/or GPS sensors in these phones to detect potholes, bumps, braking, and honking. Nericell addresses several challenges including virtually reorienting the accelerometer on a phone that is at an arbitrary orientation, and performing honk detection and localization in an energy efficient manner. We also touch upon the idea of triggered sensing, where dissimilar sensors are used in tandem to conserve energy. We evaluate the effectiveness of the sensing functions in Nericell based on experiments conducted on the roads of Bangalore, with promising results.",
"title": ""
}
] | [
{
"docid": "a5ed1ebf973e3ed7ea106e55795e3249",
"text": "The variable reluctance (VR) resolver is generally used instead of an optical encoder as a position sensor on motors for hybrid electric vehicles or electric vehicles owing to its reliability, low cost, and ease of installation. The commonly used conventional winding method for the VR resolver has disadvantages, such as complicated winding and unsuitability for mass production. This paper proposes an improved winding method that leads to simpler winding and better suitability for mass production than the conventional method. In this paper, through the design and finite element analysis for two types of output winding methods, the advantages and disadvantages of each method are presented, and the validity of the proposed winding method is verified. In addition, experiments with the VR resolver using the proposed winding method have been performed to verify its performance.",
"title": ""
},
{
"docid": "cbde86d9b73371332a924392ae1f10d0",
"text": "The difficulty to solve multiple objective combinatorial optimization problems with traditional techniques has urged researchers to look for alternative, better performing approaches for them. Recently, several algorithms have been proposed which are based on the Ant Colony Optimization metaheuristic. In this contribution, the existing algorithms of this kind are reviewed and experimentally tested in several instances of the bi-objective traveling salesman problem, comparing their performance with that of two well-known multi-objective genetic algorithms.",
"title": ""
},
{
"docid": "446af0ad077943a77ac4a38fd84df900",
"text": "We investigate the manufacturability of 20-nm double-gate and FinFET devices in integrated circuits by projecting process tolerances. Two important factors affecting the sensitivity of device electrical parameters to physical variations were quantitatively considered. The quantum effect was computed using the density gradient method and the sensitivity of threshold voltage to random dopant fluctuation was studied by Monte Carlo simulation. Our results show the 3 value ofVT variation caused by discrete impurity fluctuation can be greater than 100%. Thus, engineering the work function of gate materials and maintaining a nearly intrinsic channel is more desirable. Based on a design with an intrinsic channel and ideal gate work function, we analyzed the sensitivity of device electrical parameters to several important physical fluctuations such as the variations in gate length, body thickness, and gate dielectric thickness. We found that quantum effects have great impact on the performance of devices. As a result, the device electrical behavior is sensitive to small variations of body thickness. The effect dominates over the effects produced by other physical fluctuations. To achieve a relative variation of electrical parameters comparable to present practice in industry, we face a challenge of fin width control (less than 1 nm 3 value of variation) for the 20-nm FinFET devices. The constraint of the gate length variation is about 10 15%. We estimate a tolerance of 1 2 A 3 value of oxide thickness variation and up to 30% front-back oxide thickness mismatch.",
"title": ""
},
{
"docid": "de0d2808f949723f1c0ee8e87052f889",
"text": "The notion of Cloud computing has not only reshaped the field of distributed systems but also fundamentally changed how businesses utilize computing today. While Cloud computing provides many advanced features, it still has some shortcomings such as the relatively high operating cost for both public and private Clouds. The area of Green computing is also becoming increasingly important in a world with limited energy resources and an ever-rising demand for more computational power. In this paper a new framework is presented that provides efficient green enhancements within a scalable Cloud computing architecture. Using power-aware scheduling techniques, variable resource management, live migration, and a minimal virtual machine design, overall system efficiency will be vastly improved in a data center based Cloud with minimal performance overhead.",
"title": ""
},
{
"docid": "e0d6212e77cbd54b54db5d38eca29814",
"text": "Summarization aims to represent source documents by a shortened passage. Existing methods focus on the extraction of key information, but often neglect coherence. Hence the generated summaries suffer from a lack of readability. To address this problem, we have developed a graph-based method by exploring the links between text to produce coherent summaries. Our approach involves finding a sequence of sentences that best represent the key information in a coherent way. In contrast to the previous methods that focus only on salience, the proposed method addresses both coherence and informativeness based on textual linkages. We conduct experiments on the DUC2004 summarization task data set. A performance comparison reveals that the summaries generated by the proposed system achieve comparable results in terms of the ROUGE metric, and show improvements in readability by human evaluation.",
"title": ""
},
{
"docid": "d9b19dd523fd28712df61384252d331c",
"text": "Purpose – The purpose of this paper is to examine the ways in which governments build social media and information and communication technologies (ICTs) into e-government transparency initiatives, to promote collaboration with members of the public and the ways in members of the public are able to employ the same social media to monitor government activities. Design/methodology/approach – This study used an iterative strategy that involved conducting a literature review, content analysis, and web site analysis, offering multiple perspectives on government transparency efforts, the role of ICTs and social media in these efforts, and the ability of e-government initiatives to foster collaborative transparency through embedded ICTs and social media. Findings – The paper identifies key initiatives, potential impacts, and future challenges for collaborative e-government as a means of transparency. Originality/value – The paper is one of the first to examine the interrelationships between ICTs, social media, and collaborative e-government to facilitate transparency.",
"title": ""
},
{
"docid": "d7c27413eb3f379618d1aafd85a43d3f",
"text": "This paper presents a tool Altair that automatically generates API function cross-references, which emphasizes reliable structural measures and does not depend on specific client code. Altair ranks related API functions for a given query according to pair-wise overlap, i.e., how they share state, and clusters tightly related ones into meaningful modules.\n Experiments against several popular C software packages show that Altair recommends related API functions for a given query with remarkably more precise and complete results than previous tools, that it can extract modules from moderate-sized software (e.g., Apache with 1000+ functions) at high precision and recall rates (e.g., both exceeding 70% for two modules in Apache), and that the computation can finish within a few seconds.",
"title": ""
},
{
"docid": "44b7ed6c8297b6f269c8b872b0fd6266",
"text": "vii",
"title": ""
},
{
"docid": "ee18a820614aac64d26474796464b518",
"text": "Recommender systems have already proved to be valuable for coping with the information overload problem in several application domains. They provide people with suggestions for items which are likely to be of interest for them; hence, a primary function of recommender systems is to help people make good choices and decisions. However, most previous research has focused on recommendation techniques and algorithms, and less attention has been devoted to the decision making processes adopted by the users and possibly supported by the system. There is still a gap between the importance that the community gives to the assessment of recommendation algorithms and the current range of ongoing research activities concerning human decision making. Different decision-psychological phenomena can influence the decision making of users of recommender systems, and research along these lines is becoming increasingly important and popular. This special issue highlights how the coupling of recommendation algorithms with the understanding of human choice and decision making theory has the potential to benefit research and practice on recommender systems and to enable users to achieve a good balance between decision accuracy and decision effort.",
"title": ""
},
{
"docid": "dd1e7bb3ba33c5ea711c0d066db53fa9",
"text": "This paper presents the development and test of a flexible control strategy for an 11-kW wind turbine with a back-to-back power converter capable of working in both stand-alone and grid-connection mode. The stand-alone control is featured with a complex output voltage controller capable of handling nonlinear load and excess or deficit of generated power. Grid-connection mode with current control is also enabled for the case of isolated local grid involving other dispersed power generators such as other wind turbines or diesel generators. A novel automatic mode switch method based on a phase-locked loop controller is developed in order to detect the grid failure or recovery and switch the operation mode accordingly. A flexible digital signal processor (DSP) system that allows user-friendly code development and online tuning is used to implement and test the different control strategies. The back-to-back power conversion configuration is chosen where the generator converter uses a built-in standard flux vector control to control the speed of the turbine shaft while the grid-side converter uses a standard pulse-width modulation active rectifier control strategy implemented in a DSP controller. The design of the longitudinal conversion loss filter and of the involved PI-controllers are described in detail. Test results show the proposed methods works properly.",
"title": ""
},
{
"docid": "79287d0ca833605430fefe4b9ab1fd92",
"text": "Passwords are frequently used in data encryption and user authentication. Since people incline to choose meaningful words or numbers as their passwords, lots of passwords are easy to guess. This paper introduces a password guessing method based on Long Short-Term Memory recurrent neural networks. After training our LSTM neural network with 30 million passwords from leaked Rockyou dataset, the generated 3.35 billion passwords could cover 81.52% of the remaining Rockyou dataset. Compared with PCFG and Markov methods, this method shows higher coverage rate.",
"title": ""
},
{
"docid": "27ffdb0d427d2e281ffe84e219e6ed72",
"text": "UNLABELLED\nHitherto, noncarious cervical lesions (NCCLs) of teeth have been generally ascribed to either toothbrush-dentifrice abrasion or acid \"erosion.\" The last two decades have provided a plethora of new studies concerning such lesions. The most significant studies are reviewed and integrated into a practical approach to the understanding and designation of these lesions. A paradigm shift is suggested regarding use of the term \"biocorrosion\" to supplant \"erosion\" as it continues to be misused in the United States and many other countries of the world. Biocorrosion embraces the chemical, biochemical, and electrochemical degradation of tooth substance caused by endogenous and exogenous acids, proteolytic agents, as well as the piezoelectric effects only on dentin. Abfraction, representing the microstructural loss of tooth substance in areas of stress concentration, should not be used to designate all NCCLs because these lesions are commonly multifactorial in origin. Appropriate designation of a particular NCCL depends upon the interplay of the specific combination of three major mechanisms: stress, friction, and biocorrosion, unique to that individual case. Modifying factors, such as saliva, tongue action, and tooth form, composition, microstructure, mobility, and positional prominence are elucidated.\n\n\nCLINICAL SIGNIFICANCE\nBy performing a comprehensive medical and dental history, using precise terms and concepts, and utilizing the Revised Schema of Pathodynamic Mechanisms, the dentist may successfully identify and treat the etiology of root surface lesions. Preventive measures may be instituted if the causative factors are detected and their modifying factors are considered.",
"title": ""
},
{
"docid": "598dd39ec35921242b94f17e24b30389",
"text": "In this paper, we present a study on the characterization and the classification of textures. This study is performed using a set of values obtained by the computation of indexes. To obtain these indexes, we extract a set of data with two techniques: the computation of matrices which are statistical representations of the texture and the computation of \"measures\". These matrices and measures are subsequently used as parameters of a function bringing real or discrete values which give information about texture features. A model of texture characterization is built based on this numerical information, for example to classify textures. An application is proposed to classify cells nuclei in order to diagnose patients affected by the Progeria disease.",
"title": ""
},
{
"docid": "159e040b0e74ad1b6124907c28e53daf",
"text": "People (pedestrians, drivers, passengers in public transport) use different services on small mobile gadgets on a daily basis. So far, mobile applications don't react to context changes. Running services should adapt to the changing environment and new services should be installed and deployed automatically. We propose a classification of context elements that influence the behavior of the mobile services, focusing on the challenges of the transportation domain. Malware Detection on Mobile Devices Asaf Shabtai*, Ben-Gurion University, Israel Abstract: We present various approaches for mitigating malware on mobile devices which we have implemented and evaluated on Google Android. Our work is divided into the following three segments: a host-based intrusion detection framework; an implementation of SELinux in Android; and static analysis of Android application files. We present various approaches for mitigating malware on mobile devices which we have implemented and evaluated on Google Android. Our work is divided into the following three segments: a host-based intrusion detection framework; an implementation of SELinux in Android; and static analysis of Android application files. Dynamic Approximative Data Caching in Wireless Sensor Networks Nils Hoeller*, IFIS, University of Luebeck Abstract: Communication in Wireless Sensor Networks generally is the most energy consuming task. Retrieving query results from deep within the sensor network therefore consumes a lot of energy and hence shortens the network's lifetime. In this work optimizations Communication in Wireless Sensor Networks generally is the most energy consuming task. Retrieving query results from deep within the sensor network therefore consumes a lot of energy and hence shortens the network's lifetime. In this work optimizations for processing queries by using adaptive caching structures are discussed. Results can be retrieved from caches that are placed nearer to the query source. As a result the communication demand is reduced and hence energy is saved by using the cached results. To verify cache coherence in networks with non-reliable communication channels, an approximate update policy is presented. A degree of result quality can be defined for a query to find the adequate cache adaptively. Gossip-based Data Fusion Framework for Radio Resource Map Jin Yang*, Ilmenau University of Technology Abstract: In disaster scenarios, sensor networks are used to detect changes and estimate resource availability to further support the system recovery and rescue process. In this PhD thesis, sensor networks are used to detect available radio resources in order to form a global view of the radio resource map, based on locally sensed and measured data. Data fusion and harvesting techniques are employed for the generation and maintenance of this “radio resource map.” In order to guarantee the flexibility and fault tolerance goals of disaster scenarios, a gossip protocol is used to exchange information. The radio propagation field knowledge is closely coupled to harvesting and fusion protocols in order to achieve efficient fusing of radio measurement data. For the evaluation, simulations will be used to measure the efficiency and robustness in relation to time critical applications and various deployment densities. Actual radio data measurements within the Ilmenau area are being collected for further analysis of the map quality and in order to verify simulation results. In disaster scenarios, sensor networks are used to detect changes and estimate resource availability to further support the system recovery and rescue process. In this PhD thesis, sensor networks are used to detect available radio resources in order to form a global view of the radio resource map, based on locally sensed and measured data. Data fusion and harvesting techniques are employed for the generation and maintenance of this “radio resource map.” In order to guarantee the flexibility and fault tolerance goals of disaster scenarios, a gossip protocol is used to exchange information. The radio propagation field knowledge is closely coupled to harvesting and fusion protocols in order to achieve efficient fusing of radio measurement data. For the evaluation, simulations will be used to measure the efficiency and robustness in relation to time critical applications and various deployment densities. Actual radio data measurements within the Ilmenau area are being collected for further analysis of the map quality and in order to verify simulation results. Dynamic Social Grouping Based Routing in a Mobile Ad-Hoc Network Roy Cabaniss*, Missouri S&T Abstract: Trotta, University of Missouri, Kansas City, Srinivasa Vulli, Missouri University S&T The patterns of movement used by Mobile Ad-Hoc networks are application specific, in the sense that networks use nodes which travel in different paths. When these nodes are used in experiments involving social patterns, such as wildlife tracking, algorithms which detect and use these patterns can be used to improve routing efficiency. The intent of this paper is to introduce a routing algorithm which forms a series of social groups which accurately indicate a node’s regular contact patterns while dynamically shifting to represent changes to the social environment. With the social groups formed, a probabilistic routing schema is used to effectively identify which social groups have consistent contact with the base station, and route accordingly. The algorithm can be implemented dynamically, in the sense that the nodes initially have no awareness of their environment, and works to reduce overhead and message traffic while maintaining high delivery ratio. Trotta, University of Missouri, Kansas City, Srinivasa Vulli, Missouri University S&T The patterns of movement used by Mobile Ad-Hoc networks are application specific, in the sense that networks use nodes which travel in different paths. When these nodes are used in experiments involving social patterns, such as wildlife tracking, algorithms which detect and use these patterns can be used to improve routing efficiency. The intent of this paper is to introduce a routing algorithm which forms a series of social groups which accurately indicate a node’s regular contact patterns while dynamically shifting to represent changes to the social environment. With the social groups formed, a probabilistic routing schema is used to effectively identify which social groups have consistent contact with the base station, and route accordingly. The algorithm can be implemented dynamically, in the sense that the nodes initially have no awareness of their environment, and works to reduce overhead and message traffic while maintaining high delivery ratio. MobileSOA framework for Context-Aware Mobile Applications Aaratee Shrestha*, University of Leipzig Abstract: Mobile application development is more challenging when context-awareness is taken into account. This research introduces the benefit of implementing a Mobile Service Oriented Architecture (SOA). A robust mobile SOA framework is designed for building and operating lightweight and flexible Context-Aware Mobile Application (CAMA). We develop a lightweight and flexible CAMA to show dynamic integration of the systems, where all operations run smoothly in response to the rapidly changing environment using local and remote services. Keywords-service oriented architecture (SOA); mobile service; context-awareness; contextaware mobile application (CAMA). Mobile application development is more challenging when context-awareness is taken into account. This research introduces the benefit of implementing a Mobile Service Oriented Architecture (SOA). A robust mobile SOA framework is designed for building and operating lightweight and flexible Context-Aware Mobile Application (CAMA). We develop a lightweight and flexible CAMA to show dynamic integration of the systems, where all operations run smoothly in response to the rapidly changing environment using local and remote services. Keywords-service oriented architecture (SOA); mobile service; context-awareness; contextaware mobile application (CAMA). Performance Analysis of Secure Hierarchical Data Aggregation in Wireless Sensor Networks Vimal Kumar*, Missouri S&T Abstract: Data aggregation is a technique used to conserve battery power in wireless sensor networks (WSN). While providing security in such a scenario it is also important that we minimize the number of security operations as they are computationally expensive, without compromising on the security. In this paper we evaluate the performance of such an end to end security algorithm. We provide our results from the implementation of the algorithm on mica2 motes and conclude how it is better than traditional hop by hop security. Data aggregation is a technique used to conserve battery power in wireless sensor networks (WSN). While providing security in such a scenario it is also important that we minimize the number of security operations as they are computationally expensive, without compromising on the security. In this paper we evaluate the performance of such an end to end security algorithm. We provide our results from the implementation of the algorithm on mica2 motes and conclude how it is better than traditional hop by hop security. A Communication Efficient Framework for Finding Outliers in Wireless Sensor Networks Dylan McDonald*, MS&T Abstract: Outlier detection is a well studied problem in various fields. The unique challenges of wireless sensor networks make this problem especially challenging. Sensors can detect outliers for a plethora of reasons and these reasons need to be inferred in real time. Here, we present a new communication technique to find outliers in a wireless sensor network. Communication is minimized through controlling sensor when sensors are allowed to communicate. At the same time, minimal assumptions are made about the nature of the data set as to ",
"title": ""
},
{
"docid": "b142873eed364bd471fbe231cd19c27d",
"text": "Robotics have long sought an actuation technology comparable to or as capable as biological muscle tissue. Natural muscles exhibit a high power-to-weight ratio, inherent compliance and damping, fast action, and a high dynamic range. They also produce joint displacements and forces without the need for gearing or additional hardware. Recently, supercoiled commercially available polymer threads (sewing thread or nylon fishing lines) have been used to create significant mechanical power in a muscle-like form factor. Heating and cooling the polymer threads causes contraction and expansion, which can be utilized for actuation. In this paper, we describe the working principle of supercoiled polymer (SCP) actuation and explore the controllability and properties of these threads. We show that under appropriate environmental conditions, the threads are suitable as a building block for a controllable artificial muscle. We leverage off-the-shelf silver-coated threads to enable rapid electrical heating while the low thermal mass allows for rapid cooling. We utilize both thermal and thermomechanical models for feed-forward and feedback control. The resulting SCP actuator regulates to desired force levels in as little as 28 ms. Together with its inherent stiffness and damping, this is sufficient for a position controller to execute large step movements in under 100 ms. This controllability, high performance, the mechanical properties, and the extremely low material cost are indicative of a viable artificial muscle.",
"title": ""
},
{
"docid": "2cb0c74e57dea6fead692d35f8a8fac6",
"text": "Matching local image descriptors is a key step in many computer vision applications. For more than a decade, hand-crafted descriptors such as SIFT have been used for this task. Recently, multiple new descriptors learned from data have been proposed and shown to improve on SIFT in terms of discriminative power. This paper is dedicated to an extensive experimental evaluation of learned local features to establish a single evaluation protocol that ensures comparable results. In terms of matching performance, we evaluate the different descriptors regarding standard criteria. However, considering matching performance in isolation only provides an incomplete measure of a descriptors quality. For example, finding additional correct matches between similar images does not necessarily lead to a better performance when trying to match images under extreme viewpoint or illumination changes. Besides pure descriptor matching, we thus also evaluate the different descriptors in the context of image-based reconstruction. This enables us to study the descriptor performance on a set of more practical criteria including image retrieval, the ability to register images under strong viewpoint and illumination changes, and the accuracy and completeness of the reconstructed cameras and scenes. To facilitate future research, the full evaluation pipeline is made publicly available.",
"title": ""
},
{
"docid": "7e4c00d8f17166cbfb3bdac8d5e5ad09",
"text": "Twitter is now used to distribute substantive content such as breaking news, increasing the importance of assessing the credibility of tweets. As users increasingly access tweets through search, they have less information on which to base credibility judgments as compared to consuming content from direct social network connections. We present survey results regarding users' perceptions of tweet credibility. We find a disparity between features users consider relevant to credibility assessment and those currently revealed by search engines. We then conducted two experiments in which we systematically manipulated several features of tweets to assess their impact on credibility ratings. We show that users are poor judges of truthfulness based on content alone, and instead are influenced by heuristics such as user name when making credibility assessments. Based on these findings, we discuss strategies tweet authors can use to enhance their credibility with readers (and strategies astute readers should be aware of!). We propose design improvements for displaying social search results so as to better convey credibility.",
"title": ""
},
{
"docid": "e39ad8ee1d913cba1707b6aafafceefb",
"text": "Thoracic Outlet Syndrome (TOS) is the constellation of symptoms caused by compression of neurovascular structures at the superior aperture of the thorax, properly the thoracic inlet! The diagnosis and treatment is contentious and some even question its existence. Symptoms are often confused with distal compression neuropathies or cervical",
"title": ""
},
{
"docid": "f56c5a623b29b88f42bf5d6913b2823e",
"text": "We describe a novel interface for composition of polygonal meshes based around two artist-oriented tools: Geometry Drag-and-Drop and Mesh Clone Brush. Our drag-and-drop interface allows a complex surface part to be selected and interactively dragged to a new location. We automatically fill the hole left behind and smoothly deform the part to conform to the target surface. The artist may increase the boundary rigidity of this deformation, in which case a fair transition surface is automatically computed. Our clone brush allows for transfer of surface details with precise spatial control. These tools support an interaction style that has not previously been demonstrated for 3D surfaces, allowing detailed 3D models to be quickly assembled from arbitrary input meshes. We evaluated this interface by distributing a basic tool to computer graphics hobbyists and professionals, and based on their feedback, describe potential workflows which could utilize our techniques.",
"title": ""
},
{
"docid": "863ec0a6a06ce9b3cc46c85b09a7af69",
"text": "Apollonian circle packings arise by repeatedly filling the interstices between mutually tangent circles with further tangent circles. It is possible for every circle in such a packing to have integer radius of curvature, and we call such a packing an integral Apollonian circle packing. This paper studies number-theoretic properties of the set of integer curvatures appearing in such packings. Each Descartes quadruple of four tangent circles in the packing gives an integer solution to the Descartes equation, which relates the radii of curvature of four mutually tangent circles: x2 + y2 + z2 + w2 = 12(x + y + z + w) 2. Each integral Apollonian circle packing is classified by a certain root quadruple of integers that satisfies the Descartes equation, and that corresponds to a particular quadruple of circles appearing in the packing. We express the number of root quadruples with fixed minimal element −n as a class number, and give an exact formula for it. We study which integers occur in a given integer packing, and determine congruence restrictions which sometimes apply. We present evidence suggesting that the set of integer radii of curvatures that appear in an integral Apollonian circle packing has positive density, and in fact represents all sufficiently large integers not excluded by congruence conditions. Finally, we discuss asymptotic properties of the set of curvatures obtained as the packing is recursively constructed from a root quadruple.",
"title": ""
}
] | scidocsrr |
1916caa83f81c9e0d9b79c11b423b711 | The metabolic cost of neural information | [
{
"docid": "ec93b4c61694916dd494e9376102726b",
"text": "In 1969 Barlow introduced the phrase economy of impulses to express the tendency for successive neural systems to use lower and lower levels of cell firings to produce equivalent encodings. From this viewpoint, the ultimate economy of impulses is a neural code of minimal redundancy. The hypothesis motivating our research is that energy expenditures, e.g., the metabolic cost of recovering from an action potential relative to the cost of inactivity, should also be factored into the economy of impulses. In fact, coding schemes with the largest representational capacity are not, in general, optimal when energy expenditures are taken into account. We show that for both binary and analog neurons, increased energy expenditure per neuron implies a decrease in average firing rate if energy efficient information transmission is to be maintained.",
"title": ""
},
{
"docid": "6d2903f82ec382b4214d9322e545e71f",
"text": "We review the pros and cons of analog and digital computation. We propose that computation that is most efficient in its use of resources is neither analog computation nor digital computation but, rather, a mixture of the two forms. For maximum efficiency, the information and information-processing resources of the hybrid form must be distributed over many wires, with an optimal signal-to-noise ratio per wire. Our results suggest that it is likely that the brain computes in a hybrid fashion and that an underappreciated and important reason for the efficiency of the human brain, which consumes only 12 W, is the hybrid and distributed nature of its architecture.",
"title": ""
}
] | [
{
"docid": "abb748541b980385e4b8bc477c5adc0e",
"text": "Spin–orbit torque, a torque brought about by in-plane current via the spin–orbit interactions in heavy-metal/ferromagnet nanostructures, provides a new pathway to switch the magnetization direction. Although there are many recent studies, they all build on one of two structures that have the easy axis of a nanomagnet lying orthogonal to the current, that is, along the z or y axes. Here, we present a new structure with the third geometry, that is, with the easy axis collinear with the current (along the x axis). We fabricate a three-terminal device with a Ta/CoFeB/MgO-based stack and demonstrate the switching operation driven by the spin–orbit torque due to Ta with a negative spin Hall angle. Comparisons with different geometries highlight the previously unknown mechanisms of spin–orbit torque switching. Our work offers a new avenue for exploring the physics of spin–orbit torque switching and its application to spintronics devices.",
"title": ""
},
{
"docid": "bdda2074b0ab2e12047d0702acb4d20a",
"text": "Ferroptosis has emerged as a new form of regulated necrosis that is implicated in various human diseases. However, the mechanisms of ferroptosis are not well defined. This study reports the discovery of multiple molecular components of ferroptosis and its intimate interplay with cellular metabolism and redox machinery. Nutrient starvation often leads to sporadic apoptosis. Strikingly, we found that upon deprivation of amino acids, a more rapid and potent necrosis process can be induced in a serum-dependent manner, which was subsequently determined to be ferroptosis. Two serum factors, the iron-carrier protein transferrin and amino acid glutamine, were identified as the inducers of ferroptosis. We further found that the cell surface transferrin receptor and the glutamine-fueled intracellular metabolic pathway, glutaminolysis, played crucial roles in the death process. Inhibition of glutaminolysis, the essential component of ferroptosis, can reduce heart injury triggered by ischemia/reperfusion, suggesting a potential therapeutic approach for treating related diseases.",
"title": ""
},
{
"docid": "a7317f06cf34e501cb169bdf805e7e34",
"text": "It's natural to promote your best and brightest, especially when you think they may leave for greener pastures if you don't continually offer them new challenges and rewards. But promoting smart, ambitious young managers too quickly often robs them of the chance to develop the emotional competencies that come with time and experience--competencies like the ability to negotiate with peers, regulate emotions in times of crisis, and win support for change. Indeed, at some point in a manager's career--usually at the vice president level--raw talent and ambition become less important than the ability to influence and persuade, and that's the point at which the emotionally immature manager will lose his effectiveness. This article argues that delaying a promotion can sometimes be the best thing a senior executive can do for a junior manager. The inexperienced manager who is given time to develop his emotional competencies may be better prepared for the interpersonal demands of top-level leadership. The authors recommend that senior executives employ these strategies to help boost their protégés' people skills: sharpen the 360-degree feedback process, give managers cross-functional assignments to improve their negotiation skills, make the development of emotional competencies mandatory, make emotional competencies a performance measure, and encourage managers to develop informal learning partnerships with peers and mentors. Delaying a promotion can be difficult given the steadfast ambitions of many junior executives and the hectic pace of organizational life. It may mean going against the norm of promoting people almost exclusively on smarts and business results. It may also mean contending with the disappointment of an esteemed subordinate. But taking the time to build people's emotional competencies isn't an extravagance; it's critical to developing effective leaders.",
"title": ""
},
{
"docid": "dd0bbc039e1bbc9e36ffe087e105cf56",
"text": "Using a comparative analysis approach, this article examines the development, characteristics and issues concerning the discourse of modern Asian art in the twentieth century, with the aim of bringing into picture the place of Asia in the history of modernism. The wide recognition of the Western modernist canon as centre and universal displaces the contribution and significance of the non-Western world in the modern movement. From a cross-cultural perspective, this article demonstrates that modernism in the field of visual arts in Asia, while has had been complex and problematic, nevertheless emerged. Rather than treating Asian art as a generalized subject, this article argues that, with their subtly different notions of culture, identity and nationhood, the modernisms that emerged from various nations in this region are diverse and culturally specific. Through the comparison of various art-historical contexts in this region (namely China, India, Japan and Korea), this article attempts to map out some similarities as well as differences in their pursuit of an autonomous modernist representation.",
"title": ""
},
{
"docid": "65580dfc9bdf73ef72b6a133ab19ccdd",
"text": "A rotary piezoelectric motor design with simple structural components and the potential for miniaturization using a pretwisted beam stator is demonstrated in this paper. The beam acts as a vibration converter to transform axial vibration input from a piezoelectric element into combined axial-torsional vibration. The axial vibration of the stator modulates the torsional friction forces transmitted to the rotor. Prototype stators measuring 6.5 times 6.5 times 67.5 mm were constructed using aluminum (2024-T6) twisted beams with rectangular cross-section and multilayer piezoelectric actuators. The stall torque and no-load speed attained for a rectangular beam with an aspect ratio of 1.44 and pretwist helix angle of 17.7deg were 0.17 mNm and 840 rpm with inputs of 184.4 kHz and 149 mW, respectively. Operation in both clockwise and counterclockwise directions was obtained by choosing either 70.37 or 184.4 kHz for the operating frequency. The effects of rotor preload and power input on motor performance were investigated experimentally. The results suggest that motor efficiency is higher at low power input, and that efficiency increases with preload to a maximum beyond which it begins to drop.",
"title": ""
},
{
"docid": "456b7ad01115d9bc04ca378f1eb6d7f2",
"text": "Article history: Received 13 October 2007 Received in revised form 12 June 2008 Accepted 31 July 2008",
"title": ""
},
{
"docid": "1c5f53fe8d663047a3a8240742ba47e4",
"text": "Spatial data mining is the discovery of interesting relationships and characteristics that may exist implicitly in spatial databases. In this paper, we explore whether clustering methods have a role to play in spatial data mining. To this end, we develop a new clustering method called CLAHANS which is based on randomized search. We also develop two spatial data mining algorithms that use CLAHANS. Our analysis and experiments show that with the assistance of CLAHANS, these two algorithms are very effective and can lead to discoveries that are difficult to find with current spatial data mining algorithms. Furthermore, experiments conducted to compare the performance of CLAHANS with that of existing clustering methods show that CLAHANS is the most efficient.",
"title": ""
},
{
"docid": "068321516540ed9f5f05638bdfb7235a",
"text": "Cloud of Things (CoT) is a computing model that combines the widely popular cloud computing with Internet of Things (IoT). One of the major problems with CoT is the latency of accessing distant cloud resources from the devices, where the data is captured. To address this problem, paradigms such as fog computing and Cloudlets have been proposed to interpose another layer of computing between the clouds and devices. Such a three-layered cloud-fog-device computing architecture is touted as the most suitable approach for deploying many next generation ubiquitous computing applications. Programming applications to run on such a platform is quite challenging because disconnections between the different layers are bound to happen in a large-scale CoT system, where the devices can be mobile. This paper presents a programming language and system for a three-layered CoT system. We illustrate how our language and system addresses some of the key challenges in the three-layered CoT. A proof-of-concept prototype compiler and runtime have been implemented and several example applications are developed using it.",
"title": ""
},
{
"docid": "cfad1e8941f0a60f6978493c999a5850",
"text": "We propose SecVisor, a tiny hypervisor that ensures code integrity for commodity OS kernels. In particular, SecVisor ensures that only user-approved code can execute in kernel mode over the entire system lifetime. This protects the kernel against code injection attacks, such as kernel rootkits. SecVisor can achieve this propertyeven against an attacker who controls everything but the CPU, the memory controller, and system memory chips. Further, SecVisor can even defend against attackers with knowledge of zero-day kernel exploits.\n Our goal is to make SecVisor amenable to formal verificationand manual audit, thereby making it possible to rule out known classes of vulnerabilities. To this end, SecVisor offers small code size and small external interface. We rely on memory virtualization to build SecVisor and implement two versions, one using software memory virtualization and the other using CPU-supported memory virtualization. The code sizes of the runtime portions of these versions are 1739 and 1112 lines, respectively. The size of the external interface for both versions of SecVisor is 2 hypercalls. It is easy to port OS kernels to SecVisor. We port the Linux kernel version 2.6.20 by adding 12 lines and deleting 81 lines, out of a total of approximately 4.3 million lines of code in the kernel.",
"title": ""
},
{
"docid": "a88c0d45ca7859c050e5e76379f171e6",
"text": "Cancer and other chronic diseases have constituted (and will do so at an increasing pace) a significant portion of healthcare costs in the United States in recent years. Although prior research has shown that diagnostic and treatment recommendations might be altered based on the severity of comorbidities, chronic diseases are still being investigated in isolation from one another in most cases. To illustrate the significance of concurrent chronic diseases in the course of treatment, this study uses SEER’s cancer data to create two comorbid data sets: one for breast and female genital cancers and another for prostate and urinal cancers. Several popular machine learning techniques are then applied to the resultant data sets to build predictive models. Comparison of the results shows that having more information about comorbid conditions of patients can improve models’ predictive power, which in turn, can help practitioners make better diagnostic and treatment decisions. Therefore, proper identification, recording, and use of patients’ comorbidity status can potentially lower treatment costs and ease the healthcare related economic challenges.",
"title": ""
},
{
"docid": "b1f98cbb045f8c15f53d284c9fa9d881",
"text": "If the pace of increase in life expectancy in developed countries over the past two centuries continues through the 21st century, most babies born since 2000 in France, Germany, Italy, the UK, the USA, Canada, Japan, and other countries with long life expectancies will celebrate their 100th birthdays. Although trends differ between countries, populations of nearly all such countries are ageing as a result of low fertility, low immigration, and long lives. A key question is: are increases in life expectancy accompanied by a concurrent postponement of functional limitations and disability? The answer is still open, but research suggests that ageing processes are modifiable and that people are living longer without severe disability. This finding, together with technological and medical development and redistribution of work, will be important for our chances to meet the challenges of ageing populations.",
"title": ""
},
{
"docid": "556c0c1662a64f484aff9d7556b2d0b5",
"text": "In this paper, we investigate the Chinese calligraphy synthesis problem: synthesizing Chinese calligraphy images with specified style from standard font(eg. Hei font) images (Fig. 1(a)). Recent works mostly follow the stroke extraction and assemble pipeline which is complex in the process and limited by the effect of stroke extraction. In this work we treat the calligraphy synthesis problem as an image-to-image translation problem and propose a deep neural network based model which can generate calligraphy images from standard font images directly. Besides, we also construct a large scale benchmark that contains various styles for Chinese calligraphy synthesis. We evaluate our method as well as some baseline methods on the proposed dataset, and the experimental results demonstrate the effectiveness of our proposed model.",
"title": ""
},
{
"docid": "f7bdf07ef7a45c3e261e4631743c1882",
"text": "Deep reinforcement learning (RL) methods have significant potential for dialogue policy optimisation. However, they suffer from a poor performance in the early stages of learning. This is especially problematic for on-line learning with real users. Two approaches are introduced to tackle this problem. Firstly, to speed up the learning process, two sampleefficient neural networks algorithms: trust region actor-critic with experience replay (TRACER) and episodic natural actorcritic with experience replay (eNACER) are presented. For TRACER, the trust region helps to control the learning step size and avoid catastrophic model changes. For eNACER, the natural gradient identifies the steepest ascent direction in policy space to speed up the convergence. Both models employ off-policy learning with experience replay to improve sampleefficiency. Secondly, to mitigate the cold start issue, a corpus of demonstration data is utilised to pre-train the models prior to on-line reinforcement learning. Combining these two approaches, we demonstrate a practical approach to learning deep RLbased dialogue policies and demonstrate their effectiveness in a task-oriented information seeking domain.",
"title": ""
},
{
"docid": "3ee021ed227247981e91566c2df4ac26",
"text": "Particle filters have been applied with great success to various state estimation problems in robotics. However, particle filters often require extensive parameter tweaking in order to work well in practice. This is based on two observations. First, particle filters typically rely on independence assumptions such as \"the beams in a laser scan are independent given the robot's location in a map\". Second, even when the noise parameters of the dynamical system are perfectly known, the sample-based approximation can result in poor filter performance. In this paper we introduce CRF-filters, a novel variant of particle filtering for sequential state estimation. CRF-filters are based on conditional random fields, which are discriminative models that can handle arbitrary dependencies between observations. We show how to learn the parameters of CRF-filters based on labeled training data. Experiments using a robot equipped with a laser range-finder demonstrate that our technique is able to learn parameters of the robot's motion and sensor models that result in good localization performance, without the need of additional parameter tweaking.",
"title": ""
},
{
"docid": "ab97caed9c596430c3d76ebda55d5e6e",
"text": "A 1.5 GHz low noise amplifier for a Global Positioning System (GPS) receiver has been implemented in a 0.6 /spl mu/m CMOS process. This amplifier provides a forward gain of 22 dB with a noise figure of only 3.5 dB while drawing 30 mW from a 1.5 V supply. To the authors' knowledge, this represents the lowest noise figure reported to date for a CMOS amplifier operating above 1 GHz.",
"title": ""
},
{
"docid": "91f89990f9d41d3a92cbff38efc56b57",
"text": "ID3 algorithm was a classic classification of data mining. It always selected the attribute with many values. The attribute with many values wasn't the correct one, and it always created wrong classification. In the application of intrusion detection system, it would created fault alarm and omission alarm. To this fault, an improved decision tree algorithm was proposed. Though improvement of information gain formula, the correct attribute would be got. The decision tree was created after the data collected classified correctly. The tree would be not high and has a few of branches. The rule set would be got based on the decision tree. Experimental results showed the effectiveness of the algorithm, false alarm rate and omission rate decreased, increasing the detection rate and reducing the space consumption.",
"title": ""
},
{
"docid": "f136f8249bf597db706806a795ee8791",
"text": "Automotive systems are constantly increasing in complexity and size. Beside the increase of requirements specifications and related test specification due to new systems and higher system interaction, we observe an increase of redundant specifications. As the predominant specification language (both for requirements and test cases) is still natural text, it is not easy to detect these redundancies. In principle, to detect these redundancies, each statement has to be compared to all others. This proves to be difficult because of number and informal expression of statements. In this paper we propose a solution to the problem of detecting redundant specification and test statements described in structured natural language. We propose a formalization process for requirements specification and test statements, allowing us to detect redundant statements and thus reduce the efforts for specification and validation. Specification Pattern Systems and Linear Temporal Logic provide the base for our process. We did evaluate the method in the context of Mercedes-Benz Passenger Car Development. The results show that for the investigated sample set of test statements, we could detect about 30% of test steps as redundant. This indicates the savings potential of our approach.",
"title": ""
},
{
"docid": "e09dcb9cdd7f9a8d1c0a0449fd9b11f8",
"text": "Radio-frequency identification (RFID) is being widely used in supply chain and logistics applications for wireless identification and the tracking and tracing of goods, with excellent performance for the long-range interrogation of tagged pallets and cases (up to 4-6 m, with passive tags). Item-level tagging (ILT) has also received much attention, especially in the pharmaceutical and retail industries. Low-frequency (125-134 KHz) and high-frequency (HF) (13.56 MHz) RFID systems have traditionally been used for ILT applications, where the radio-frequency (RF) power from the reader is delivered to the passive tags by inductive coupling. Recently, ultra-HF (UHF) (840-960 MHz) near-field (NF) RFID systems [1] have attracted increasing attention because of the merits of the much higher reading speed and capability to detect a larger number of tags (bulk reading). A UHF NF RFID system is a valuable solution to implement a reliable short-range wireless link (up to a few tens of centimeters) for ILT applications. Because the tags can be made smaller, RFID-based applications can be extended to extremely minuscule items (e.g., retail apparel, jewelry, drugs, rented apparel) as well as the successful implementation of RFID-based storage spaces, smart conveyor belts, and shopping carts.",
"title": ""
},
{
"docid": "227bbb2341b1c28b69d38fcf0a22b604",
"text": "The growth in low-cost, low-power sensing and communication technologies is creating a pervasive network infrastructure called the Internet of Things (IoT), which enables a wide range of physical objects and environments to be monitored in fine spatial and temporal detail. The detailed, dynamic data that can be collected from these devices provide the basis for new business and government applications in areas such as public safety, transport logistics and environmental management. There has been growing interest in the IoT for realising smart cities, in order to maximise the productivity and reliability of urban infrastructure, such as minimising road congestion and making better use of the limited car parking facilities. In this work, we consider two smart car parking scenarios based on real-time car parking information that has been collected and disseminated by the City of San Francisco, USA and the City of Melbourne, Australia. We present a prediction mechanism for the parking occupancy rate using three feature sets with selected parameters to illustrate the utility of these features. Furthermore, we analyse the relative strengths of different machine learning methods in using these features for prediction.",
"title": ""
},
{
"docid": "ee9ca88d092538a399d192cf1b9e9df6",
"text": "The new user problem in recommender systems is still challenging, and there is not yet a unique solution that can be applied in any domain or situation. In this paper we analyze viable solutions to the new user problem in collaborative filtering (CF) that are based on the exploitation of user personality information: (a) personality-based CF, which directly improves the recommendation prediction model by incorporating user personality information, (b) personality-based active learning, which utilizes personality information for identifying additional useful preference data in the target recommendation domain to be elicited from the user, and (c) personality-based cross-domain recommendation, which exploits personality information to better use user preference data from auxiliary domains which can be used to compensate the lack of user preference data in the target domain. We benchmark the effectiveness of these methods on large datasets that span several domains, namely movies, music and books. Our results show that personality-aware methods achieve performance improvements that range from 6 to 94 % for users completely new to the system, while increasing the novelty of the recommended items by 3–40 % with respect to the non-personalized popularity baseline. We also discuss the limitations of our approach and the situations in which the proposed methods can be better applied, hence providing guidelines for researchers and practitioners in the field.",
"title": ""
}
] | scidocsrr |
79cb18a6c5404c79bc16669f06645b43 | Machine Learning algorithms : a study on noise sensitivity | [
{
"docid": "cc1ae8daa1c1c4ee2b3b4a65ef48b6f5",
"text": "The use of entropy as a distance measure has several benefits. Amongst other things it provides a consistent approach to handling of symbolic attributes, real valued attributes and missing values. The approach of taking all possible transformation paths is discussed. We describe K*, an instance-based learner which uses such a measure, and results are presented which compare favourably with several machine learning algorithms.",
"title": ""
}
] | [
{
"docid": "1e7f603d0452cc81f2d460645a656ea2",
"text": "5G, the next generation of wireless communications, is focusing on modern antenna technologies like massive MIMO, phased arrays and mm-wave band to obtain data rates up to 10 Gbps. In this paper, we have proposed a new 64 element, 8×8 phased series fed patch antenna array, for 28 GHz, mm-wave band 5G mobile base station antennas. The phased array steers its beam along the horizontal axis to provide the coverage to the users in different directions. The 8×8 array contains eight 8-element series fed arrays. The series fed array is designed in such a way that it shows a mixed standing wave and travelling wave behaviour. The initial seven elements of the series fed array show a standing wave behaviour, while the eighth element shows a travelling wave behaviour. It is due to the provision of the matched inset feeding, to effectively radiate the maximum power arriving at this element. The array is operating from 27.9 GHz to 28.4 GHz with a 500 MHz impedance bandwidth. The gain of the array is 24.25 dBi while the suppression of the side lobes is −14 dB. The half power beamwidth of the array is 11.5°. The beam steering is performed which shows a stable side lobe level. The array shows a stable array gain throughout the impedance bandwidth without any beam tilting due to the variations in the frequency. The simulations are performed using both CST Microwave Studio Suite 2015 and Ansys Electromagnetics Suite 17.0 simulation packages.",
"title": ""
},
{
"docid": "34d0b8d4b1c25b4be30ad0c15435f407",
"text": "Cranioplasty using alternate alloplastic bone substitutes instead of autologous bone grafting is inevitable in the clinical field. The authors present their experiences with cranial reshaping using methyl methacrylate (MMA) and describe technical tips that are keys to a successful procedure. A retrospective chart review of patients who underwent cranioplasty with MMA between April 2007 and July 2010 was performed. For 20 patients, MMA was used for cranioplasty after craniofacial trauma (n = 16), tumor resection (n = 2), and a vascular procedure (n = 2). The patients were divided into two groups. In group 1, MMA was used in full-thickness inlay fashion (n = 3), and in group 2, MMA was applied in partial-thickness onlay fashion (n = 17). The locations of reconstruction included the frontotemporal region (n = 5), the frontoparietotemporal region (n = 5), the frontal region (n = 9), and the vertex region (n = 1). The size of cranioplasty varied from 30 to 144 cm2. The amount of MMA used ranged from 20 to 70 g. This biomaterial was applied without difficulty, and no intraoperative complications were linked to the applied material. The patients were followed for 6 months to 4 years (mean, 2 years) after MMA implantation. None of the patients showed any evidence of implant infection, exposure, or extrusion. Moreover, the construct appeared to be structurally stable over time in all the patients. Methyl methacrylate is a useful adjunct for treating deficiencies of the cranial skeleton. It provides rapid and reliable correction of bony defects and contour deformities. Although MMA is alloplastic, appropriate surgical procedures can avoid problems such as infection and extrusion. An acceptable overlying soft tissue envelope should be maintained together with minimal contamination of the operative site. This journal requires that authors assign a level of evidence to each article. For a full description of these Evidence-Based Medicine ratings, please refer to the Table of Contents or the online Instructions to Authors www.springer.com/00266 .",
"title": ""
},
{
"docid": "3b755e81c28ccb3dcd95d3cbdb84c736",
"text": "The goal of rootkit is often to hide malicious software running on a compromised machine. While there has been significant amount of research done on different rootkits, we describe a new type of rootkit that is kernel-independent – i.e., no aspect of the kernel is modified and no code is added to the kernel address space to install the rootkit. In this work, we present PIkit – Processor-Interconnect rootkit that exploits the vulnerable hardware features within multi-socket servers that are commonly used in datacenters and high-performance computing. In particular, PIkit exploits the DRAM address mapping table structure that determines the destination node of a memory request packet in the processorinterconnect. By modifying this mapping table appropriately, PIkit enables access to victim’s memory address region without proper permission. Once PIkit is installed, only user-level code or payload is needed to carry out malicious activities. The malicious payload mostly consists of memory read and/or write instructions that appear like “normal” user-space memory accesses and it becomes very difficult to detect such malicious payload. We describe the design and implementation of PIkit on both an AMD and an Intel x86 multi-socket servers that are commonly used. We discuss different malicious activities possible with PIkit and limitations of PIkit, as well as possible software and hardware solutions to PIkit.",
"title": ""
},
{
"docid": "a3227034d28c2f2a0f858e1a233ecbc4",
"text": "With the persistent shift towards multi-sourcing, the complexity of service delivery is continuously increasing. This presents new challenges for clients who now have to integrate interdependent services from multiple providers. As other functions, service integration is subject to make-or-buy decisions: clients can either build the required capabilities themselves or delegate service integration to external functions. To define detailed organizational models, one requires understanding of specific tasks and how to allocate them. Based on a qualitative and quantitative expert study, we analyze generic organizational models, and identify key service integration tasks. The allocation of these tasks to clients or their providers generates a set of granular organizational structures. We analyze drivers for delegating these tasks, and develop typical allocations in practice. Our work contributes to expanding the theoretical foundations of service integration. Moreover, our findings will assist clients to design their service integration organization, and to build more effective multi-sourcing solutions.",
"title": ""
},
{
"docid": "dbdc0a429784aa085c571b7c01e3399f",
"text": "A large number of deaths are caused by Traffic accidents worldwide. The global crisis of road safety can be seen by observing the significant number of deaths and injuries that are caused by road traffic accidents. In many situations the family members or emergency services are not informed in time. This results in delayed emergency service response time, which can lead to an individual’s death or cause severe injury. The purpose of this work is to reduce the response time of emergency services in situations like traffic accidents or other emergencies such as fire, theft/robberies and medical emergencies. By utilizing onboard sensors of a smartphone to detect vehicular accidents and report it to the nearest emergency responder available and provide real time location tracking for responders and emergency victims, will drastically increase the chances of survival for emergency victims, and also help save emergency services time and resources. Keywords—Traffic accidents; accident detection; on-board sensor; accelerometer; android smartphones; real-time tracking; emergency services; emergency responder; emergency victim; SOSafe; SOSafe Go; firebase",
"title": ""
},
{
"docid": "e2a1c8dfae27d56faf2fee494ffbae28",
"text": "Quantitative structure-activity relationship (QSAR) modeling pertains to the construction of predictive models of biological activities as a function of structural and molecular information of a compound library. The concept of QSAR has typically been used for drug discovery and development and has gained wide applicability for correlating molecular information with not only biological activities but also with other physicochemical properties, which has therefore been termed quantitative structure-property relationship (QSPR). Typical molecular parameters that are used to account for electronic properties, hydrophobicity, steric effects, and topology can be determined empirically through experimentation or theoretically via computational chemistry. A given compilation of data sets is then subjected to data pre-processing and data modeling through the use of statistical and/or machine learning techniques. This review aims to cover the essential concepts and techniques that are relevant for performing QSAR/QSPR studies through the use of selected examples from our previous work.",
"title": ""
},
{
"docid": "5f89dba01f03d4e7fbb2baa8877e0dff",
"text": "The basic aim of a biometric identification system is to discriminate automatically between subjects in a reliable and dependable way, according to a specific-target application. Multimodal biometric identification systems aim to fuse two or more physical or behavioral traits to provide optimal False Acceptance Rate (FAR) and False Rejection Rate (FRR), thus improving system accuracy and dependability. In this paper, an innovative multimodal biometric identification system based on iris and fingerprint traits is proposed. The paper is a state-of-the-art advancement of multibiometrics, offering an innovative perspective on features fusion. In greater detail, a frequency-based approach results in a homogeneous biometric vector, integrating iris and fingerprint data. Successively, a hamming-distance-based matching algorithm deals with the unified homogenous biometric vector. The proposed multimodal system achieves interesting results with several commonly used databases. For example, we have obtained an interesting working point with FAR = 0% and FRR = 5.71% using the entire fingerprint verification competition (FVC) 2002 DB2B database and a randomly extracted same-size subset of the BATH database. At the same time, considering the BATH database and the FVC2002 DB2A database, we have obtained a further interesting working point with FAR = 0% and FRR = 7.28% ÷ 9.7%.",
"title": ""
},
{
"docid": "dc94e340ceb76a0c9fda47bac4be9920",
"text": "Mobile health (mHealth) apps are an ideal tool for monitoring and tracking long-term health conditions; they are becoming incredibly popular despite posing risks to personal data privacy and security. In this paper, we propose a testing method for Android mHealth apps which is designed using a threat analysis, considering possible attack scenarios and vulnerabilities specific to the domain. To demonstrate the method, we have applied it to apps for managing hypertension and diabetes, discovering a number of serious vulnerabilities in the most popular applications. Here we summarise the results of that case study, and discuss the experience of using a testing method dedicated to the domain, rather than out-of-the-box Android security testing methods. We hope that details presented here will help design further, more automated, mHealth security testing tools and methods.",
"title": ""
},
{
"docid": "33ef3a8f8f218ef38dce647bf232a3a7",
"text": "Network traffic monitoring and analysis-related research has struggled to scale for massive amounts of data in real time. Some of the vertical scaling solutions provide good implementation of signature based detection. Unfortunately these approaches treat network flows across different subnets and cannot apply anomaly-based classification if attacks originate from multiple machines at a lower speed, like the scenario of Peer-to-Peer Botnets. In this paper the authors build up on the progress of open source tools like Hadoop, Hive and Mahout to provide a scalable implementation of quasi-real-time intrusion detection system. The implementation is used to detect Peer-to-Peer Botnet attacks using machine learning approach. The contributions of this paper are as follows: (1) Building a distributed framework using Hive for sniffing and processing network traces enabling extraction of dynamic network features; (2) Using the parallel processing power of Mahout to build Random Forest based Decision Tree model which is applied to the problem of Peer-to-Peer Botnet detection in quasi-real-time. The implementation setup and performance metrics are presented as initial observations and future extensions are proposed. 2014 Elsevier Inc. All rights reserved.",
"title": ""
},
{
"docid": "76ecd4ba20333333af4d09b894ff29fc",
"text": "This study is an application of social identity theory to feminist consciousness and activism. For women, strong gender identifications may enhance support for equality struggles, whereas for men, they may contribute to backlashes against feminism. University students (N � 276), primarily Euroamerican, completed a measure of gender self-esteem (GSE, that part of one’s selfconcept derived from one’s gender), and two measures of feminism. High GSE in women and low GSE in men were related to support for feminism. Consistent with past research, women were more supportive of feminism than men, and in both genders, support for feminist ideas was greater than self-identification as a feminist.",
"title": ""
},
{
"docid": "046c9eaa6fc9a6516982477e1a02f6d0",
"text": "Imperfections in healthcare revenue cycle management systems cause discrepancies between submitted claims and received payments. This paper presents a method for deriving attributional rules that can be used to support the preparation and screening of claims prior to their submission to payers. The method starts with unsupervised analysis of past payments to determine normal levels of payments for services. Then, supervised machine learning is used to derive sets of attributional rules for predicting potential discrepancies in claims. New claims can be then classified using the created models. The method was tested on a subset of Obstetrics claims for payment submitted by one hospital to Medicaid. One year of data was used to create models, which were tested using the following year's data. Results indicate that rule-based models are able to detect abnormal claims prior to their submission.",
"title": ""
},
{
"docid": "7148408c07e6caee0b8f7cb1ff95443b",
"text": "Kefir is a fermented milk drink produced by the actions of bacteria and yeasts contained in kefir grains, and is reported to have a unique taste and unique properties. During fermentation, peptides and exopolysaccharides are formed that have been shown to have bioactive properties. Moreover, in vitro and animal trials have shown kefir and its constituents to have anticarcinogenic, antimutagenic, antiviral and antifungal properties. Although kefir has been produced and consumed in Eastern Europe for a long period of time, few clinical trials are found in the scientific literature to support the health claims attributed to kefir. The large number of microorganisms in kefir, the variety of possible bioactive compounds that could be formed during fermentation, and the long list of reputed benefits of eating kefir make this fermented dairy product a complex",
"title": ""
},
{
"docid": "c67fd84601a528ea951fcf9952f46316",
"text": "Electric vehicles make use of permanent-magnet (PM) synchronous traction motors for their high torque density and efficiency. A comparison between interior PM and surface-mounted PM (SPM) motors is carried out, in terms of performance at given inverter ratings. The results of the analysis, based on a simplified analytical model and confirmed by finite element (FE) analysis, show that the two motors have similar rated power but that the SPM motor has barely no overload capability, independently of the available inverter current. Moreover, the loss behavior of the two motors is rather different in the various operating ranges with the SPM one better at low speed due to short end connections but penalized at high speed by the need of a significant deexcitation current. The analysis is validated through FE simulation of two actual motor designs.",
"title": ""
},
{
"docid": "0ec1a33be6e06b4dbff7c906ccf970f0",
"text": "Free/Open Source Software (F/OSS) projects are people-oriented and knowledge intensive software development environments. Many researchers focused on mailing lists to study coding activities of software developers. How expert software developers interact with each other and with non-developers in the use of community products have received little attention. This paper discusses the altruistic sharing of knowledge between knowledge providers and knowledge seekers in the Developer and User mailing lists of the Debian project. We analyze the posting and replying activities of the participants by counting the number of email messages they posted to the lists and the number of replies they made to questions others posted. We found out that participants interact and share their knowledge a lot, their positing activity is fairly highly correlated with their replying activity, the characteristics of posting and replying activities are different for different kinds of lists, and the knowledge sharing activity of self-organizing Free/Open Source communities could best be explained in terms of what we called ‘‘Fractal Cubic Distribution’’ rather than the power-law distribution mostly reported in the literature. The paper also proposes what could be researched in knowledge sharing activities in F/OSS projects mailing list and for what purpose. The research findings add to our understanding of knowledge sharing activities in F/OSS projects. 2007 Elsevier Inc. All rights reserved.",
"title": ""
},
{
"docid": "92374e1c04f36046669aacb2982324de",
"text": "Nine totally sleep deprived (TSD) and nine control subjects were evaluated with a complete battery for attention and memory performance. Frontal and temporal EEGs (5 min, eyes closed) were also recorded before and after the night. TSD subjects exhibited three performance deficits: learning the Pursuit Rotor Task, implicit recall of paired words, and distractibility on the Brown-Peterson Test. Relative to evening recordings, control subjects showed decreased morning absolute powers in all electrodes for all frequencies except for Frontal delta; TSD subjects showed increased Frontal and Temporal theta and Frontal beta. These results show that motor procedural, implicit memory, and working memory are sensitive to one night of TSD, and that Frontal and Temporal theta spectral power seem to discriminate between a night with sleep from a night without.",
"title": ""
},
{
"docid": "b49e61ecb2afbaa8c3b469238181ec26",
"text": "Stylistic variations of language, such as formality, carry speakers’ intention beyond literal meaning and should be conveyed adequately in translation. We propose to use lexical formality models to control the formality level of machine translation output. We demonstrate the effectiveness of our approach in empirical evaluations, as measured by automatic metrics and human assessments.",
"title": ""
},
{
"docid": "708a69b49a1a7f32ee5cc501c033d2ce",
"text": "Differential auction–barter (DAB) model augments the well-known double auction (DA) model with barter bids so that besides the usual purchase and sale activities, bidders can also carry out direct bartering of items. The DAB model also provides a mechanism for making or receiving a differential money payment as part of the direct bartering of items, hence, allowing bartering of different valued items. In this paper, we propose an extension to the DAB model, called the multi-unit differential auction–barter (MUDAB) model for e-marketplaces in which multiple instances of commodities are exchanged. Furthermore, a more powerful and flexible bidding language is designed which allows bidders to express their complex preferences of purchase, sell and exchange requests, and hence increases the allocative efficiency of the market compared to the DAB. The winner determination problem of the MUDAB model is formally defined, and a fast polynomial-time network flow based algorithm is proposed for solving the problem. The fast performance of the algorithm is also demonstrated on various test cases containing up to one million bids. Thus, the proposed model can be used in large-scale online auctions without worrying about the running times of the solver. 2010 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "02781a25d8fb7ed69480f944d63b56ae",
"text": "Technology-supported learning systems have proved to be helpful in many learning situations. These systems require an appropriate representation of the knowledge to be learned, the Domain Module. The authoring of the Domain Module is cost and labor intensive, but its development cost might be lightened by profiting from semiautomatic Domain Module authoring techniques and promoting knowledge reuse. DOM-Sortze is a system that uses natural language processing techniques, heuristic reasoning, and ontologies for the semiautomatic construction of the Domain Module from electronic textbooks. To determine how it might help in the Domain Module authoring process, it has been tested with an electronic textbook, and the gathered knowledge has been compared with the Domain Module that instructional designers developed manually. This paper presents DOM-Sortze and describes the experiment carried out.",
"title": ""
},
{
"docid": "65cc9459269fb23dd97ec25ffad4f041",
"text": "Most of the existing literature on CRM value chain creation has focused on the effect of customer satisfaction and customer loyalty on customer profitability. In contrast, little has been studied about the CRM value creation chain at individual customer level and the role of self-construal (i.e., independent self-construal and interdependent self-construal) in such a chain. This research aims to construct the chain from customer value to organization value (i.e., customer satisfaction ? customer loyalty ? patronage behavior) and investigate the moderating effect of self-construal. To test the hypotheses suggested by our conceptual framework, we collected 846 data points from China in the context of mobile data services. The results show that customer’s self-construal can moderate the relationship chain from customer satisfaction to customer loyalty to relationship maintenance and development. This implies firms should tailor their customer strategies based on different self-construal features. 2014 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "678a4872dfe753bac26bff2b29ac26b0",
"text": "Cyber-physical systems (CPS), such as automotive systems, are starting to include sophisticated machine learning (ML) components. Their correctness, therefore, depends on properties of the inner ML modules. While learning algorithms aim to generalize from examples, they are only as good as the examples provided, and recent efforts have shown that they can produce inconsistent output under small adversarial perturbations. This raises the question: can the output from learning components can lead to a failure of the entire CPS? In this work, we address this question by formulating it as a problem of falsifying signal temporal logic (STL) specifications for CPS with ML components. We propose a compositional falsification framework where a temporal logic falsifier and a machine learning analyzer cooperate with the aim of finding falsifying executions of the considered model. The efficacy of the proposed technique is shown on an automatic emergency braking system model with a perception component based on deep neural networks.",
"title": ""
}
] | scidocsrr |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.