abstract_id
stringlengths
10
10
sentences
list
labels
list
confs
list
train_1200
[ "Social media provides a platform for seeking information from a large user base.", "Information seeking in social media, however, occurs simultaneously with users expressing their viewpoints by making statements.", "Rhetorical questions have the form of a question but serve the function of a statement and might mislead platforms assisting information seeking in social media.", "It becomes difficult to identify rhetorical questions as they are not syntactically different from other questions.", "In this paper, we develop a framework to identify rhetorical questions by modeling the motivations of the users to post them.", "We focus on one motivation of the users drawing from linguistic theories, to implicitly convey a message.", "We develop a framework from this motivation to identify rhetorical questions in social media and evaluate the framework using questions posted on Twitter.", "This is the first framework to model the motivations for posting rhetorical questions to identify them on social" ]
[ 0, 0, 0, 0, 2, 1, 1, 1 ]
[ 1, 1, 0.7778000235557556, 0.5555999875068665, 0.7778000235557556, 0.41670000553131104, 0.7778000235557556, 0.44440001249313354 ]
train_1201
[ "The objective of the tutorial is to introduce attendees to Activity Theory, a general theoretical framework for the analysis of human and communal action in the world.", "After an overview of the theory, focus shifts to how this framework can be utilized in practice.", "Some examples are shown of how this framework can provide a fresh perspective on certain extant problems in the fields of HCI and CSCW.", "Hopefully, participants become more aware of the nature and complexity of current controversies concerning the role of theory in the design of computer artifacts.", "By the end of the tutorial, participants should be able to understand the basic principles of the approach, and to describe their work activities in ways illuminated by this framework" ]
[ 2, 1, 1, 1, 4 ]
[ 1, 0.41029998660087585, 0.6154000163078308, 0.41029998660087585, 0.8205000162124634 ]
train_1202
[ "The increasing integration of the Internet of Everything into the industrial value chain has built the foundation for the next industrial revolution called Industrie 4.0.", "Although Industrie 4.0 is currently a top priority for many companies, research centers, and universities, a generally accepted understanding of the term does not exist.", "As a result, discussing the topic on an academic level is difficult, and so is implementing Industrie 4.0 scenarios.", "Based on a quantitative text analysis and a qualitative literature review, the paper identifies design principles of Industrie 4.0.", "Taking into account these principles, academics may be enabled to further investigate on the topic, while practitioners may find assistance in identifying appropriate scenarios.", "A case study illustrates how the identified design principles support practitioners in identifying Industrie 4.0 scenarios." ]
[ 0, 0, 0, 2, 1, 4 ]
[ 0.8158000111579895, 0.8158000111579895, 0.8158000111579895, 0.39469999074935913, 0.6053000092506409, 0.6053000092506409 ]
train_1203
[ "Optimization problems involving the eigenvalues of symmetric and nonsymmetric matrices present a fascinating mathematical challenge.", "Such problems arise often in theory and practice, particularly in engineering design, and are amenable to a rich blend of classical mathematical techniques and contemporary optimization theory.", "This essay presents a personal choice of some central mathematical ideas, outlined for the broad optimization community.", "I discuss the convex analysis of spectral functions and invariant matrix norms, touching briefly on semidefinite representability, and then outlining two broader algebraic viewpoints based on hyperbolic polynomials and Lie algebra.", "Analogous nonconvex notions lead into eigenvalue perturbation theory.", "The last third of the article concerns stability, for polynomials, matrices, and associated dynamical systems, ending with a section on robustness.", "The powerful and elegant language of nonsmooth analysis appears throughout, as a unifying narrative thread." ]
[ 0, 0, 2, 1, 1, 1, 4 ]
[ 1, 1, 0.7886999845504761, 0.6075000166893005, 0.8188999891281128, 0.3962000012397766, 0.42260000109672546 ]
train_1204
[ "We present a hierarchical model that learns image decompositions via alternating layers of convolutional sparse coding and max pooling.", "When trained on natural images, the layers of our model capture image information in a variety of forms: low-level edges, mid-level edge junctions, high-level object parts and complete objects.", "To build our model we rely on a novel inference scheme that ensures each layer reconstructs the input, rather than just the output of the layer directly beneath, as is common with existing hierarchical approaches.", "This makes it possible to learn multiple layers of representation and we show models with 4 layers, trained on images from the Caltech-101 and 256 datasets.", "When combined with a standard classifier, features extracted from these models outperform SIFT, as well as representations from other feature learning methods." ]
[ 2, 0, 1, 2, 1 ]
[ 0.5881999731063843, 0.4706000089645386, 0.5587999820709229, 0.44119998812675476, 0.5881999731063843 ]
train_1205
[ "We built a research model based on a benefit–risk paradigm, and tested the moderating effects of trust propensity and gender in relationship to the impacts of perceived benefits and risks on user online behavior.", "Results showed that gender moderated the impact of perceived benefit on one’s intention to purchase.", "Trust propensity was found to moderate the relationship between perceived risk and overall satisfaction.", "In addition, we found that the interaction of trust propensity and gender played a significant joint moderating role in affecting the impact of perceived benefit on intention to purchase.", "Men with high trust propensity belief are the most benefit oriented consumer group.", "Implications for both research and practice are discussed.", "2014 Elsevier Ltd.", "All rights reserved." ]
[ 0, 4, 4, 4, 4, 4, 3, 3 ]
[ 0.7949000000953674, 0.7949000000953674, 0.7949000000953674, 0.5896999835968018, 0.4839000105857849, 0.4839000105857849, 0.7949000000953674, 0.7949000000953674 ]
train_1206
[ "In any competitive business, success is based on the ability to make an item more appealing to customers than the competition.", "A number of questions arise in the context of this task: how do we formalize and quantify the competitiveness between two items?", "Who are the main competitors of a given item?", "What are the features of an item that most affect its competitiveness?", "Despite the impact and relevance of this problem to many domains, only a limited amount of work has been devoted toward an effective solution.", "In this paper, we present a formal definition of the competitiveness between two items, based on the market segments that they can both cover.", "Our evaluation of competitiveness utilizes customer reviews, an abundant source of information that is available in a wide range of domains.", "We present efficient methods for evaluating competitiveness in large review datasets and address the natural problem of finding the top-k competitors of a given item.", "Finally, we evaluate the quality of our results and the scalability of our approach using multiple datasets from different domains." ]
[ 0, 0, 0, 0, 0, 1, 1, 1, 4 ]
[ 1, 0.8285999894142151, 0.8285999894142151, 0.6000000238418579, 0.6000000238418579, 0.7240999937057495, 0.6571000218391418, 1, 1 ]
train_1207
[ "The main contribution of this paper is a simple semisupervised pipeline that only uses the original training set without collecting extra data.", "It is challenging in 1) how to obtain more training data only from the training set and 2) how to use the newly generated data.", "In this work, the generative adversarial network (GAN) is used to generate unlabeled samples.", "We propose the label smoothing regularization for outliers (LSRO).", "This method assigns a uniform label distribution to the unlabeled images, which regularizes the supervised model and improves the baseline.", "We verify the proposed method on a practical problem: person re-identification (re-ID).", "This task aims to retrieve a query person from other cameras.", "We adopt the deep convolutional generative adversarial network (DCGAN) for sample generation, and a baseline convolutional neural network (CNN) for representation learning.", "Experiments show that adding the GAN-generated data effectively improves the discriminative ability of learned CNN embeddings.", "On three large-scale datasets, Market- 1501, CUHK03 and DukeMTMC-reID, we obtain +4.37%, +1.6% and +2.46% improvement in rank-1 precision over the baseline CNN, respectively." ]
[ 2, 2, 1, 2, 1, 1, 2, 1, 4, 4 ]
[ 0.833299994468689, 0.44440001249313354, 0.6111000180244446, 0.5555999875068665, 1, 0.6111000180244446, 0.6111000180244446, 0.44440001249313354, 0.6111000180244446, 0.6111000180244446 ]
train_1208
[ "Chatbots are one class of intelligent, conversational software agents activated by natural language input (which can be in the form of text, voice, or both).", "They provide conversational output in response, and if commanded, can sometimes also execute tasks.", "Although chatbot technologies have existed since the 1960’s and have influenced user interface development in games since the early 1980’s, chatbots are now easier to train and implement.", "This is due to plentiful open source code, widely available development platforms, and implementation options via Software as a Service (SaaS).", "In addition to enhancing customer experiences and supporting learning, chatbots can also be used to engineer social harm that is, to spread rumors and misinformation, or attack people for posting their thoughts and opinions online.", "This paper presents a literature review of quality issues and attributes as they relate to the contemporary issue of chatbot development and implementation.", "Finally, quality assessment approaches are reviewed, and a quality assessment method based on these attributes and the Analytic Hierarchy Process (AHP) is proposed and examined." ]
[ 0, 2, 0, 2, 2, 4, 4 ]
[ 0.5938000082969666, 0.40630000829696655, 0.8125, 0.40630000829696655, 0.40630000829696655, 0.375, 0.5625 ]
train_1209
[ "Next month, you will have your final examinations.", "After calculating your average scores for each course, you are sure that you can get high distinctions in almost all courses.", "You have finished reviewing all lecture materials, all tutorial materials, and all textbooks.", "However, there are still four weeks before the examination.", "Since you have extra time available, you plan to buy a book about your major to do some extra preparation." ]
[ 0, 1, 1, 1, 1 ]
[ 0.37139999866485596, 0.4000000059604645, 0.37139999866485596, 0.571399986743927, 0.571399986743927 ]
train_1210
[ "The first needs a lot of data and suffers from covariate shift.", "It’s a supervised learning method when we fit the state-action pair mapping.", "The latter finds a cost function under which the expert is uniquely optimal.", "Compounding error is not a problem here, but IRL is super data inefficiend and requires RL in the inner loop.", "Since we only interested in the final policy, why do we learn the cost function?", "So, GAIL was born." ]
[ 1, 1, 1, 4, 4, 3 ]
[ 0.5896999835968018, 0.5896999835968018, 0.41029998660087585, 0.41029998660087585, 0.3846000134944916, 0.7949000000953674 ]
train_1211
[ "The goal of this paper is not to introduce a single algorithm or method, but to make theoretical steps towards fully understanding the training dynamics of generative adversarial networks.", "In order to substantiate our theoretical analysis, we perform targeted experiments to verify our assumptions, illustrate our claims, and quantify the phenomena.", "This paper is divided into three sections.", "The first section introduces the problem at hand.", "The second section is dedicated to studying and proving rigorously the problems including instability and saturation that arize when training generative adversarial networks.", "The third section examines a practical and theoretically grounded direction towards solving these problems, while introducing new tools to study them." ]
[ 2, 1, 0, 1, 1, 1 ]
[ 0.8108000159263611, 0.3783999979496002, 0.3783999979496002, 0.21619999408721924, 0.8108000159263611, 0.7838000059127808 ]
train_1212
[ "Interest in multimodal optimization function is expanding rapidly since real-world optimization problems often require the location of multiple optima in the search space.", "In this context, fitness sharing has been used widely to maintain population diversity and permit the investigation of many peaks in the feasible domain.", "This paper reviews various strategies of sharing and proposes new recombination schemes to improve its efficiency.", "Some empirical results are presented for high and a limited number of fitness function evaluations.", "Finally, the study compares the sharing method with other niching techniques." ]
[ 0, 0, 2, 4, 4 ]
[ 0.8158000111579895, 0.631600022315979, 0.421099990606308, 0.5788999795913696, 0.5788999795913696 ]
train_1213
[ "The ability to verify the integrity of video files is important for consumer and business applications alike.", "Especially if video files are to be used as evidence in court, the ability to prove that a file existed in a certain state at a specific time and was not altered since is crucial.", "This paper proposes the use of blockchain technology to secure and verify the integrity of video files.", "To demonstrate a specific use case for this concept, we present an application that converts a videocamera enabled smartphone into a cost-effective tamperproof dashboard camera (dash cam).", "If the phone’s built-in sensors detect a collision, the application automatically creates a hash of the relevant video recording.", "This video file’s hash is immediately transmitted to the OriginStamp service, which includes the hash in a transaction made to the Bitcoin network.", "Once the Bitcoin network confirms the transaction, the video file’s hash is permanently secured in the tamperproof decentralized public ledger that is the blockchain.", "Any subsequent attempt to manipulate the video is futile, because the hash of the manipulated footage will not match the hash that was secured in the blockchain.", "Using this approach, the integrity of video evidence cannot be contested.", "The footage of dashboard cameras could become a valid form of evidence in court." ]
[ 0, 0, 2, 1, 1, 0, 1, 1, 0, 0 ]
[ 0.7949000000953674, 0.7949000000953674, 0.41029998660087585, 0.7949000000953674, 0.41029998660087585, 0.5896999835968018, 0.6154000163078308, 0.41029998660087585, 0.41029998660087585, 0.5896999835968018 ]
train_1214
[ "Run-time reconfiguration of FPGAs has been around in academia for more than two decades but it is still applied very seldom in industrial applications.", "This has two main reasons: a lack of killer applications that substantially benefit from run-time reconfiguration and design tools that permit to quickly implement corresponding reconfigurable systems.", "This tutorial gives a survey on state-of-the-art trends on reconfigurable architectures and devices, application specific requirements, and design techniques and tools that are essential for implementing partial run-time reconfiguration on FPGAs.", "This is followed by a demonstration of the floorplanning and constraint generation tool GoAhead.", "Furthermore, the tutorial will reveal several applications that benefit from partial reconfiguration, including network data processing, digital signal processing, cognitive radio, and systems on a reconfigurable chip.", "For these applications, the individual challenges and implementation issues are presented together with the achieved results.", "This tutorial demonstrates that partial FPGA reconfiguration is beneficial and applicable in industrial systems." ]
[ 0, 0, 2, 1, 1, 0, 4 ]
[ 1, 0.6388999819755554, 0.41670000553131104, 0.6111000180244446, 0.44440001249313354, 0.3610999882221222, 0.44440001249313354 ]
train_1215
[ "This paper presents a wearable Internet of Things (IoT) sensor node aimed at monitoring harmful environmental conditions for safety applications via LoRa wireless technology.", "The proposed sensor node is low-power and supports multiple environmental sensors.", "A LoRa based gateway is used to connect sensors to the Internet.", "We mainly focus on monitoring carbon monoxide, carbon dioxide, ultraviolet, and some general environmental parameters.", "Poor environment quality could cause severe health problems to individuals.", "Therefore, surrounding environmental data is gathered by the wearable node in a real-time manner and then transmitted to a remote cloud server.", "The data can then be displayed to authorized users through a web-based application located in the cloud server and the device will give alert to the user via mobile application when an emergency condition occurs.", "The experimental results indicate that our safety monitoring network can work reliably with low power consumption." ]
[ 0, 0, 1, 1, 1, 1, 1, 4 ]
[ 0.6053000092506409, 0.631600022315979, 0.39469999074935913, 0.8158000111579895, 0.39469999074935913, 0.421099990606308, 0.421099990606308, 1 ]
train_1216
[ "We present a novel method for detecting 3D model instances and estimating their 6D poses from RGB data in a single shot.", "To this end, we extend the popular SSD paradigm to cover the full 6D pose space and train on synthetic model data only.", "Our approach competes or surpasses current state-of-the-art methods that leverage RGBD data on multiple challenging datasets.", "Furthermore, our method produces these results at around 10Hz, which is many times faster than the related methods.", "For the sake of reproducibility, we make our trained networks and detection code publicly available." ]
[ 0, 2, 1, 1, 4 ]
[ 0.7778000235557556, 0.44440001249313354, 0.833299994468689, 0.44440001249313354, 0.833299994468689 ]
train_1217
[ "In this paper we present a novel dataset for a critical aspect of autonomous driving, the joint attention that must occur between drivers and of pedestrians, cyclists or other drivers.", "This dataset is produced with the intention of demonstrating the behavioral variability of traffic participants.", "We also show how visual complexity of the behaviors and scene understanding is affected by various factors such as different weather conditions, geographical locations, traffic and demographics of the people involved.", "The ground truth data conveys information regarding the location of participants (bounding boxes), the physical conditions (e.g. lighting and speed) and the behavior of the parties involved." ]
[ 0, 2, 2, 1 ]
[ 0.571399986743927, 0.428600013256073, 0.628600001335144, 0.428600013256073 ]
train_1218
[ "We present and evaluate Deep Private-Feature Extractor (DPFE), a deep model which is trained and evaluated based on information theoretic constraints.", "Using the selective exchange of information between a user’s device and a service provider, DPFE enables the user to prevent certain sensitive information from being shared with a service provider, while allowing them to extract approved information using their model.", "We introduce and utilize the log-rank privacy, a novel measure to assess the effectiveness of DPFE in removing sensitive information and compare different models based on their accuracy-privacy tradeoff.", "We then implement and evaluate the performance of DPFE on smartphones to understand its complexity, resource demands, and efficiency tradeoffs.", "Our results on benchmark image datasets demonstrate that under moderate resource utilization, DPFE can achieve high accuracy for primary tasks while preserving the privacy of sensitive information." ]
[ 4, 1, 4, 4, 4 ]
[ 0.41179999709129333, 1, 0.41179999709129333, 0.6470999717712402, 0.5881999731063843 ]
train_1219
[ "Hydrogen sulfide (H₂S) has attracted attention in biochemical research because it plays an important role in biosystems and has emerged as the third endogenous gaseous signaling compound along with nitric oxide (NO) and carbon monoxide (CO).", "Since H₂S is a kind of gaseous molecule, conventional approaches for H₂S detection are mostly based on the detection of sulfide (S2-) for indirectly reflecting H₂S levels.", "Hence, there is a need for an accurate and reliable assay capable of determining sulfide in physiological systems.", "We report here a colorimetric, economic, and green method for sulfide anion detection using in situ formation of silver nanoparticles (AgNPs) using dopamine as a reducing and protecting agent.", "The changes in the AgNPs absorption response depend linearly on the concentration of Na₂S in the range from 2 to 15 μM, with a detection limit of 0.03 μM. Meanwhile, the morphological changes in AgNPs in the presence of S2- and thiol compounds were characterized by transmission electron microscopy (TEM).", "The as-synthetized AgNPs demonstrate high selectivity, free from interference, especially by other thiol compounds such as cysteine and glutathione.", "Furthermore, the colorimetric sensor developed was applied to the analysis of sulfide in fetal bovine serum and spiked serum samples with good recovery." ]
[ 0, 0, 2, 1, 1, 1, 4 ]
[ 0.800000011920929, 0.6000000238418579, 0.4000000059604645, 0.800000011920929, 0.6000000238418579, 0.4000000059604645, 0.4000000059604645 ]
train_1220
[ "The aptamer database is designed to contain comprehensive sequence information on aptamers and unnatural ribozymes that have been generated by in vitro selection methods.", "Such data are not normally collected in 'natural' sequence databases, such as GenBank.", "Besides serving as a storehouse of sequences that may have diagnostic or therapeutic utility, the database serves as a valuable resource for theoretical biologists who describe and explore fitness landscapes.", "The database is updated monthly and is publicly available at http://aptamer.", "icmb.utexas.edu/." ]
[ 0, 0, 0, 3, 3 ]
[ 0.5946000218391418, 0.5946000218391418, 0.3783999979496002, 0.40540000796318054, 1 ]
train_1221
[ "Modern natural language processing (NLP) research requires writing code.", "Ideally this code would provide a precise definition of the approach, easy repeatability of results, and a basis for extending the research.", "However, many research codebases bury high-level parameters under implementation details, are challenging to run and debug, and are difficult enough to extend that they are more likely to be rewritten.", "This paper describes AllenNLP, a library for applying deep learning methods to NLP research, which addresses these issues with easyto-use command-line tools, declarative configuration-driven experiments, and modular NLP abstractions.", "AllenNLP has already increased the rate of research experimentation and the sharing of NLP components at the Allen Institute for Artificial Intelligence, and we are working to have the same impact across the field." ]
[ 0, 0, 0, 1, 4 ]
[ 0.8125, 0.5, 0.46880000829696655, 0.5938000082969666, 0.46880000829696655 ]
train_1222
[ "Buildings account for nearly 40% of the total energy consumption in the United States, about half of which is used by the HVAC (heating, ventilation, and air conditioning) system.", "Intelligent scheduling of building HVAC systems has the potential to significantly reduce the energy cost.", "However, the traditional rule-based and model-based strategies are often inefficient in practice, due to the complexity in building thermal dynamics and heterogeneous environment disturbances.", "In this work, we develop a data-driven approach that leverages the deep reinforcement learning (DRL) technique, to intelligently learn the effective strategy for operating the building HVAC systems.", "We evaluate the performance of our DRL algorithm through simulations using the widely-adopted EnergyPlus tool.", "Experiments demonstrate that our DRL-based algorithm is more effective in energy cost reduction compared with the traditional rule-based approach, while maintaining the room temperature within desired range." ]
[ 0, 0, 0, 2, 1, 4 ]
[ 0.8205000162124634, 0.6154000163078308, 0.6154000163078308, 0.41029998660087585, 0.41029998660087585, 0.8205000162124634 ]
train_1223
[ "3D shape models are becoming widely available and easier to capture, making available 3D information crucial for progress in object classification.", "Current state-of-theart methods rely on CNNs to address this problem.", "Recently, we witness two types of CNNs being developed: CNNs based upon volumetric representations versus CNNs based upon multi-view representations.", "Empirical results from these two types of CNNs exhibit a large gap, indicating that existing volumetric CNN architectures and approaches are unable to fully exploit the power of 3D representations.", "In this paper, we aim to improve both volumetric CNNs and multi-view CNNs according to extensive analysis of existing approaches.", "To this end, we introduce two distinct network architectures of volumetric CNNs.", "In addition, we examine multi-view CNNs, where we introduce multiresolution filtering in 3D.", "Overall, we are able to outperform current state-of-the-art methods for both volumetric CNNs and multi-view CNNs.", "We provide extensive experiments designed to evaluate underlying design choices, thus providing a better understanding of the space of methods available for object classification on 3D data." ]
[ 0, 1, 0, 4, 4, 1, 1, 1, 4 ]
[ 0.5946000218391418, 0.5676000118255615, 0.4323999881744385, 0.3513999879360199, 0.40540000796318054, 0.5946000218391418, 0.733299970626831, 0.5676000118255615, 0.5946000218391418 ]
train_1224
[ "This paper discusses a method for obtaining accurate 3D measurements using a temporally encoded structured light system.", "An objective of the work was to have a balance in the accuracy of all components in the system.", "This was achieved by including lens distortion in the models for both the camera and projector which comprise the structured light system.", "In addition, substripe estimation was used to estimate projector stripe values as a complement to subpixel estimators used for locating image features.", "Experimental evaluation shows that it is important to use substripe estimation and incorporate lens distortion in the projector model." ]
[ 0, 2, 1, 4, 4 ]
[ 0.6215999722480774, 0.7838000059127808, 1, 0.4323999881744385, 1 ]
train_1225
[ "Aspects of the role of information in strategic decision-making by executives in industry are hardly ever mentioned in management research publications.", "We therefore investigate in this paper the way information is obtained, analysed, judged and applied by executives in industry that have to take strategic decisions.", "We interviewed executives from thirteen companies in The Netherlands and in Germany about the stages in the decision process that they followed in thirty two recent decisions they had to make.", "We found that executives that follow a rational approach collect and use ample information in a structured decision-making process passing through a number of distinct phases in time.", "In this process, information plays a crucial role in reducing uncertainty.", "Over all discussions held, the aspect of the quality of the information used by the board was stressed.", "We could only obtain circumstantial evidence of changes in the decision making process caused by developments in new information acquisition and analysis methods such as use of the Internet becoming common practice.", "But we can affirm that with more relevant information available, discussions in the boardroom on issues affecting the choices and etter alternatives can now be b" ]
[ 0, 2, 1, 0, 0, 1, 4, 4 ]
[ 1, 0.40630000829696655, 0.7200000286102295, 0.4375, 0.4375, 0.6563000082969666, 0.7813000082969666, 0.7813000082969666 ]
train_1226
[ "Spin-transfer torque magnetic random access memory (STT-MRAM) is a novel, magnetic memory technology that leverages the base platform established by an existing 100+nm node memory product called MRAM to enable a scalable nonvolatile memory solution for advanced process nodes.", "STT-MRAM features fast read and write times, small cell sizes of 6F2 and potentially even smaller, and compatibility with existing DRAM and SRAM architecture with relatively small associated cost added.", "STT-MRAM is essentially a magnetic multilayer resistive element cell that is fabricated as an additional metal layer on top of conventional CMOS access transistors.", "In this review we give an overview of the existing STT-MRAM technologies currently in research and development across the world, as well as some specific discussion of results obtained at Grandis and with our foundry partners.", "We will show that in-plane STT-MRAM technology, particularly the DMTJ design, is a mature technology that meets all conventional requirements for an STT-MRAM cell to be a nonvolatile solution matching DRAM and/or SRAM drive circuitry.", "Exciting recent developments in perpendicular STT-MRAM also indicate that this type of STT-MRAM technology may reach maturity faster than expected, allowing even smaller cell size and product introduction at smaller nodes." ]
[ 0, 0, 0, 1, 1, 4 ]
[ 0.5788999795913696, 0.5788999795913696, 0.5788999795913696, 0.421099990606308, 0.6053000092506409, 0.8158000111579895 ]
train_1227
[ "Teenagers are among the most prolific users of social network sites (SNS).", "Emerging studies find that youth spend a considerable portion of their daily life interacting through social media.", "Subsequently, questions and controversies emerge about the effects SNS have on adolescent development.", "This review outlines the theoretical frameworks researchers have used to understand adolescents and SNS.", "It brings together work from disparate fields that examine the relationship between SNS and social capital, privacy, youth safety, psychological well-being, and educational achievement.", "These research strands speak to high-profile concerns and controversies that surround youth participation in these online communities, and offer ripe areas for future research." ]
[ 0, 0, 0, 2, 2, 4 ]
[ 1, 1, 1, 0.5697000026702881, 0.5697000026702881, 0.39750000834465027 ]
train_1228
[ "This research essay outlines a set of guidelines for conducting functional Magnetic Resonance Imaging (fMRI) studies in social science research in general and also, accordingly, in Information Systems research.", "Given the increased interest in using neuroimaging tools across the social sciences, this study aims at specifying the key steps needed to conduct an fMRI study while ensuring that enough detail is provided to evaluate the methods and results.", "The outline of an fMRI study consists of four key steps: (1) formulating the research question, (2) designing the fMRI protocol, (3) analyzing fMRI data, and (4) interpreting and reporting fMRI results.", "These steps are described with an illustrative example of a published fMRI study on trust and distrust in this journal (Dimoka 2010).", "The paper contributes to the methodological literature by (1) providing a set of guidelines for designing and conducting fMRI studies, (2) specifying methodological details that should be included in fMRI studies in academic venues, and (3) illustrating these practices with an exemplar fMRI study.", "Future directions for conducting high-quality fMRI studies in the social sciences are discussed." ]
[ 0, 2, 1, 1, 1, 4 ]
[ 0.5896999835968018, 0.6154000163078308, 1, 0.41029998660087585, 0.41029998660087585, 0.7949000000953674 ]
train_1229
[ "This paper suggests that it may be easier to learn several hard tasks at one time than to learn these same tasks separately.", "In effect, the information provided by the training signal for each task serves as a domain-specific inductive bias for the other tasks.", "Frequently the world gives us clusters of related tasks to learn.", "When it does not, it is often straightforward to create additional tasks.", "For many domains, acquiring inductive bias by collecting additional teaching signal may be more practical than the traditional approach of codifying domain-specific biases acquired from human expertise.", "We call this approach Multitask Learning (MTL).", "Since much of the power of an inductive learner follows directly from its inductive bias, multitask learning may yield more powerful learning.", "An empirical example of multitask connectionist learning is presented where learning improves by training one network on several related tasks at the same time.", "Multitask decision tree induction is also outlined." ]
[ 2, 0, 0, 1, 0, 1, 1, 1, 1 ]
[ 0.6000000238418579, 0.571399986743927, 0.6000000238418579, 0.4000000059604645, 0.4000000059604645, 0.428600013256073, 0.571399986743927, 0.37139999866485596, 0.4000000059604645 ]
train_1230
[ "The benefits of the flipped classroom (FC) model in students’ learning are claimed in many recent studies.", "These benefits are typically accounted to the pedagogically efficient use of classroom time for engaging students in active learning.", "Although there are several relevant studies for the deployment of the FC model in Science, Technology, Engineering and Maths (STEM) subjects, and at Higher Education and/or High School, there are very few works studying FC in social studies and at primary school level.", "This paper presents an action research focused on the implementation of the FC model in teaching social studies in primary school.", "The main scope of this action research, conducted over an entire school year with two different History classes (one representing the experimental group that followed the FC model and the other representing the control group following the traditional lecture based approach) was to compare the use of classroom time for student-centered learning activities and the resulted learning outcomes related to both traditional learning goals of a history course (that is, memorization of historical content) and more ambitious ones such as the cultivation of historical thinking skills (HTS).", "The study revealed that indeed, the classroom based sessions of the experimental group were used for engaging student-centered activities and that this resulted into better learning outcomes in terms of demonstrating critical HTS.", "Thus, this initial action research provides encouraging evidences for the potential benefits of the FC model in primary school social studies courses." ]
[ 0, 2, 0, 2, 1, 4, 4 ]
[ 0.7692000269889832, 0.428600013256073, 0.571399986743927, 0.571399986743927, 0.39559999108314514, 0.8022000193595886, 0.7692000269889832 ]
train_1231
[ "We present a lexicon-based approach to extracting sentiment from text.", "The Semantic Orientation CALculator (SO-CAL) uses dictionaries of words annotated with their semantic orientation (polarity and strength), and incorporates intensification and negation.", "SO-CAL is applied to the polarity classification task, the process of assigning a positive or negative label to a text that captures the text's opinion towards its main subject matter.", "We show that SO-CAL's performance is consistent across domains and in completely unseen data.", "Additionally, we describe the process of dictionary creation, and our use of Mechanical Turk to check dictionaries for consistency and reliability." ]
[ 2, 0, 1, 1, 1 ]
[ 0.4375, 0.5625, 0.8125, 0.5625, 0.4375 ]
train_1232
[ "A new software reliability model is developed that predicts expected failures (and hence related reliability quantities) as well or better than existing software reliability models, and is simpler than any of the models that approach it in predictive validity.", "The model incorporates both execution time and calendar time components, each of which is derived.", "The model is evaluated, using actual data, and compared with other models." ]
[ 0, 0, 0 ]
[ 0.8055999875068665, 0.8055999875068665, 0.44440001249313354 ]
train_1233
[ "Soccer is one of the most successful sports of our times, and for various reasons.", "One such reason is its level of unpredictability: surprising results can occur, and it is still unclear what are the secrets that make a team winning or losing within a single game.", "In this paper we tackle the problem of soccer analysis from a different perspective: we transform every team, together with the playfield, into a network structure (the Team Brain), and we shift perspective, turning soccer games into battles of minds.", "We show how this approach proves to be successful, allowing to better understand what the recipes for the success of a team can be, and also getting a new, somehow surprising, view of what are the really important critical areas of a soccer field." ]
[ 0, 0, 2, 4 ]
[ 0.7778000235557556, 0.7778000235557556, 0.3889000117778778, 0.6111000180244446 ]
train_1234
[ "Deep Learning’s recent successes have mostly relied on Convolutional Networks, which exploit fundamental statistical properties of images, sounds and video data: the local stationarity and multi-scale compositional structure, that allows expressing long range interactions in terms of shorter, localized interactions.", "However, there exist other important examples, such as text documents or bioinformatic data, that may lack some or all of these strong statistical regularities.", "In this paper we consider the general question of how to construct deep architectures with small learning complexity on general non-Euclidean domains, which are typically unknown and need to be estimated from the data.", "In particular, we develop an extension of Spectral Networks which incorporates a Graph Estimation procedure, that we test on large-scale classification problems, matching or improving over Dropout Networks with far less parameters to estimate." ]
[ 0, 0, 2, 1 ]
[ 1, 1, 0.5946000218391418, 0.8108000159263611 ]
train_1235
[ "Recent studies have confirmed the importance of understanding the cognition of users and information systems (IS) professionals.", "These works agree that organizational cognition is far too critical to be ignored as it can impact on IS outcomes.", "While cognition has been considered in a variety of IS contexts, no specific methodology has dominated.", "A theory and method suitable to the study of cognition defined as personal constructs that individuals use to understand IT in organizations is Kelly's (1955) Personal Construct Theory and its cognitive mapping tool known as the repertory grid (RepGrid).", "This article expounds on the potential of this technique to IS researchers by considering the variety of ways the RepGrid may be employed.", "The flexibility of the RepGrid is illustrated by examining published studies in IS.", "The diagnostic qualities of the RepGrid and its mapping outcomes can be used for practical intervention at the individual and organizational levels." ]
[ 0, 0, 0, 1, 1, 0, 4 ]
[ 1, 1, 0.3939000070095062, 0.5454999804496765, 0.6061000227928162, 0.4544999897480011, 0.7878999710083008 ]
train_1236
[ "When answering a question, people often draw upon their rich world knowledge in addition to some task-specific context.", "Recent work has focused primarily on answering questions based on some relevant document or content, and required very little general background.", "To investigate question answering with prior knowledge, we present COMMONSENSEQA: a difficult new dataset for commonsense question answering.", "To capture common sense beyond associations, each question discriminates between three target concepts that all share the same relationship to a single source drawn from CONCEPTNET (Speer et al., 2017).", "This constraint encourages crowd workers to author multiple-choice questions with complex semantics, in which all candidates relate to the subject in a similar way.", "We create 9,500 questions through this procedure and demonstrate the dataset’s difficulty with a large number of strong baselines.", "Our best baseline, the OpenAI GPT (Radford et al., 2018), obtains 54.8% accuracy, well below human performance, which is 95.3%." ]
[ 0, 0, 2, 1, 4, 4, 4 ]
[ 1, 0.6053000092506409, 0.39469999074935913, 0.39469999074935913, 0.421099990606308, 0.6053000092506409, 0.7894999980926514 ]
train_1237
[ "The Personalization of information has taken recommender systems at a very high level.", "With personalization these systems can generate user specific recommendations accurately and efficiently.", "User profiling helps personalization, where information retrieval is done to personalize a scenario which maintains a separate user profile for individual user.", "The main objective of this paper is to explore this field of personalization in context of user profiling, to help researchers make aware of the user profiling.", "Various trends, techniques and Applications have been discussed in paper which will fulfill this motto.", "Index Terms : Personalization, Profiling, User Profiling, Machine Learning, Information Retrieval, Recommender Systems" ]
[ 0, 0, 0, 2, 1, 1 ]
[ 1, 0.8234999775886536, 0.8234999775886536, 1, 0.5587999820709229, 0.41179999709129333 ]
train_1238
[ "Transportation is a necessary infrastructure for our modern society.", "The performance of transportation systems is of crucial importance for individual mobility, commerce, and for the economic growth of all nations.", "In recent years modern society has been facing more traffic jams, higher fuel prices, and an increase in CO2 emissions.", "It is imperative to improve the safety and efficiency of transportation.", "Developing a sustainable intelligent transportation system requires the seamless integration and interoperability with emerging technologies such as connected vehicles, cloud computing, and the Internet of Things.", "In this article we present and discuss some of the integration challenges that must be addressed to enable an intelligent transportation system to address issues facing the transportation sector such as high fuel prices, high levels of CO2 emissions, increasing traffic congestion, and improved road safety." ]
[ 0, 0, 0, 0, 0, 2 ]
[ 0.7838000059127808, 0.6215999722480774, 0.5946000218391418, 0.5946000218391418, 0.5946000218391418, 0.4323999881744385 ]
train_1239
[ "This paper gives a review of the recent developments in deep learning and unsupervised feature learning for time-series problems.", "While these techniques have shown promise for modeling static data, such as computer vision, applying them to time-series data is gaining increasing attention.", "This paper overviews the particular challenges present in time-series data and provides a review of the works that have either applied time-series data to unsupervised feature learning algorithms or alternatively have contributed to modi cations of feature learning algorithms to take into account the challenges present in time-series data." ]
[ 2, 0, 0 ]
[ 0.6111000180244446, 0.5555999875068665, 0.33329999446868896 ]
train_1240
[ "The present research seeks to extend existing theory on self-disclosure to the online arena in higher educational institutions and contribute to the knowledge base and understanding about the use of a popular social networking site (SNS), Facebook, by college students.", "We conducted a non-experimental study to investigate how university students (N = 463) use Facebook, and examined the roles that personality and culture play in disclosure of information in online SNS-based environments.", "Results showed that individuals do disclose differently online vs. in-person, and that both culture and personality matter.", "Specifically, it was found that collectivistic individuals low on extraversion and interacting in an online environment disclosed the least honest and the most audience-relevant information, as compared to others.", "Exploratory analyses also indicate that students use sites such as Facebook primarily to maintain existing personal relationships and selectively used privacy settings to control their self-presentation on SNSs.", "The findings of this study offer insight into understanding college students’ self-disclosure on SNS, add to the literature on personality and self-disclosure, and shape future directions for research and practice on online self-presentation.", "Published by Elsevier Ltd." ]
[ 2, 2, 4, 1, 1, 4, 3 ]
[ 0.6154000163078308, 0.6154000163078308, 0.3846000134944916, 0.41029998660087585, 0.41029998660087585, 0.8205000162124634, 0.5896999835968018 ]
train_1241
[ "Convolutional neural networks (CNNs) achieved impressive recognition rates in image classification tasks recently.", "In order to exploit those capabilities, we trained CNNs on a database of photometric stereo images of metal surface defects, i.e. rail defects.", "Those defects are cavities in the rail surface and are indication for further surface degradation right up to rail break.", "Due to security issues, defects have to be recognized early in order to take countermeasures in time.", "By means of differently colored light-sources illuminating the rail surfaces from different and constant directions, those cavities are made visible in a photometric dark-field setup.", "So far, a model-based approach has been used for image classification, which expressed the expected reflection properties of surface defects in contrast to non-defects.", "In this work, we experimented with classical CNNs trained in pure supervised manner and also explored the impact of regularization methods such as unsupervised layer-wise pre-training and training data-set augmentation.", "The classical CNN already distinctly outperforms the model-based approach.", "Moreover, regularization methods yet yield further improvements." ]
[ 0, 0, 0, 0, 0, 2, 1, 1, 4 ]
[ 0.7778000235557556, 0.5555999875068665, 0.3889000117778778, 0.6111000180244446, 0.3889000117778778, 0.41670000553131104, 0.41670000553131104, 0.6111000180244446, 0.7778000235557556 ]
train_1242
[ "Requirements analysis and general management issues within the development process of new software components are addressed in this paper, focusing on factors that result from requirements elicitation and significantly affect management decisions and development activities.", "A new methodology performing a certain form of requirements identification and collection prior to developing new software components is proposed and demonstrated, the essence of which lays on a three-entity model that describes the relationship between different types of component stakeholders: Developers, reusers and end-users.", "The model is supported by a set of critical factors analysed in the context of three main directions that orient the production of a new component, that is, the generality of the services offered, the management approach and the characteristics of the targeted market.", "The investigation of the three directions produces critical success factors that are closely connected and interdependent.", "Further analysis of the significance of each factor according to the priorities set by component developers can provide a detail picture of potential management implications during the development process and more importantly can support management decisions related to if and how development should proceed." ]
[ 0, 1, 1, 4, 4 ]
[ 0.6037999987602234, 0.5774000287055969, 0.6037999987602234, 0.5774000287055969, 1 ]
train_1243
[ "We present some new results on the nonparametric estimation of entropy and mutual information.", "First, we use an exact local expansion of the entropy function to prove almost sure consistency and central limit theorems for three of the most commonly used discretized information estimators.", "The setup is related to Grenander's method of sieves and places no assumptions on the underlying probability measure generating the data.", "Second, we prove a converse to these consistency theorems, demonstrating that a misapplication of the most common estimation techniques leads to an arbitrarily poor estimate of the true information, even given unlimited data.", "This inconsistency theorem leads to an analytical approximation of the bias, valid in surprisingly small sample regimes and more accurate than the usual formula of Miller and Madow over a large region of parameter space.", "The two most practical implications of these results are negative: (1) information estimates in a certain data regime are likely contaminated by bias, even if bias-corrected estimators are used, and (2) confidence intervals calculated by standard techniques drastically underestimate the error of the most common estimation methods.", "Finally, we note a very useful connection between the bias of entropy estimators and a certain polynomial approximation problem.", "By casting bias calculation problems in this approximation theory framework, we obtain the best possible generalization of known asymptotic bias results.", "More interesting, this framework leads to an estimator with some nice properties: the estimator comes equipped with rigorous bounds on the maximum error over all possible underlying probability distributions, and this maximum error turns out to be surprisingly small.", "We demonstrate the application of this new estimator on both real and simulated data." ]
[ 2, 1, 1, 1, 4, 4, 4, 1, 4, 4 ]
[ 0.41670000553131104, 0.6111000180244446, 0.6111000180244446, 0.41670000553131104, 0.583299994468689, 0.8055999875068665, 0.6111000180244446, 0.583299994468689, 0.6111000180244446, 0.6111000180244446 ]
train_1244
[ "Sorting has been a profound area for the algorithmic researchers and many resources are invested to suggest more works for sorting algorithms.", "For this purpose, many existing sorting algorithms were observed in terms of the efficiency of the algorithmic complexity.", "In this paper we implemented the bubble sort algorithm using multithreading (OpenMP).", "The proposed work tested on two standard datasets (text file) with different size .", "The main idea of the proposed algorithm is distributing the elements of the input datasets into many additional temporary subarrays according to a number of characters in each word.", "The sizes of each of these sub-arrays are decided depending on a number of elements with the same number of characters in the input array.", "We implemented OpenMP using Intel core i7-3610QM ,(8 CPUs),using two approaches (vectores of string and array 3D) .", "Finally, we get the data structure effects on the performance of the algorithm for that we choice the second approach.", "Keywords— Bubble sort, OpemMP, sorting algorithms, parallel computing, Parallelize Bubble algorithm" ]
[ 0, 0, 1, 1, 2, 1, 1, 4, 4 ]
[ 0.7949000000953674, 0.5896999835968018, 0.41029998660087585, 0.5896999835968018, 0.41029998660087585, 0.5896999835968018, 0.7949000000953674, 0.7949000000953674, 0.41029998660087585 ]
train_1245
[ "The two fundamental problems in machine learning (ML) are statistical analysis and algorithm design.", "The former tells us the principles of the mathematical models that we establish from the observation data.", "The latter defines the conditions on which implementation of data models and data sets rely.", "A newly discovered challenge to ML is the Rashomon effect, which means that data are possibly generated from a mixture of heterogeneous sources.", "A simple classification standard can shed light on emerging forms of ML.", "This article is part of a special issue on AI in China." ]
[ 0, 0, 0, 4, 1, 3 ]
[ 1, 0.7894999980926514, 0.6053000092506409, 0.6053000092506409, 0.421099990606308, 0.6053000092506409 ]
train_1246
[ "To help the blind people walk to the destination efficiently and safely in indoor environment, a novel wearable navigation device is presented in this paper.", "The locating, way-finding, route following, and obstacle avoiding modules are the essential components in a navigation system, while it remains a challenging task to consider obstacle avoiding during route following, as the indoor environment is complex, changeable, and possibly with dynamic objects.", "To address this issue, we propose a novel scheme which utilizes a dynamic subgoal selecting strategy to guide the users to the destination and help them bypass obstacles at the same time.", "This scheme serves as the key component of a complete navigation system deployed on a pair of wearable optical see-through glasses for the ease of use of blind people’s daily walks.", "The proposed navigation device has been tested on a collection of individuals and proved to be effective on indoor navigation tasks.", "The sensors embedded are of low cost, small volume, and easy integration, making it possible for the glasses to be widely used as a wearable consumer device." ]
[ 0, 0, 1, 1, 4, 4 ]
[ 0.583299994468689, 0.583299994468689, 0.8055999875068665, 1, 1, 0.8055999875068665 ]
train_1247
[ "Experience replay lets online reinforcement learning agents remember and reuse experiences from the past.", "In prior work, experience transitions were uniformly sampled from a replay memory.", "However, this approach simply replays transitions at the same frequency that they were originally experienced, regardless of their significance.", "In this paper we develop a framework for prioritizing experience, so as to replay important transitions more frequently, and therefore learn more efficiently.", "We use prioritized experience replay in the Deep Q-Network (DQN) algorithm, which achieved human-level performance in Atari games.", "DQN with prioritized experience replay achieves a new state-of-the-art, outperforming DQN with uniform replay on 42 out of 57 games." ]
[ 0, 0, 0, 2, 1, 1 ]
[ 1, 1, 1, 0.6111000180244446, 0.583299994468689, 0.41670000553131104 ]
train_1248
[ "Process capability indices CPU and CPL have been widely used in the microelectronics manufacturing industry as capability measures for processes with one-sided specification limits.", "In this paper, the theory of statistical hypothesis testing is implemented for normal processes, using the uniformly minimum variance unbiased estimators of CPU and CPL.", "Efficient SAS computer programs are provided to calculate the critical values and the p-values required for making decisions.", "Useful critical values for some commonly used capability requirements are tabulated.", "Based on the test a simple but practical step-by-step procedure is developed for in-plant applications.", "An example on the voltage level translator manufacturing process is given to illustrate how the proposed procedure may be applied to test whether the process meets the preset capability requirement.", "2002 Elsevier Science Ltd.", "All rights reserved." ]
[ 0, 1, 1, 1, 1, 4, 3, 3 ]
[ 0.7670000195503235, 0.5339999794960022, 0.6116999983787537, 0.6116999983787537, 0.621399998664856, 0.5339999794960022, 0.7670000195503235, 0.7670000195503235 ]
train_1249
[ "Collaborative filtering has been extensively studied in the context of ratings prediction.", "However, industrial recommender systems often aim at predicting a few items of immediate interest to the user, typically products that (s)he is likely to buy in the near future.", "In a collaborative filtering setting, the prediction may be based on the user's purchase history rather than rating information, which may be unreliable or unavailable.", "In this paper, we present an experimental evaluation of various collaborative filtering algorithms on a real-world dataset of purchase history from customers in a store of a French home improvement and building supplies chain.", "These experiments are part of the development of a prototype recommender system for salespeople in the store.", "We show how different settings for training and applying the models, as well as the introduction of domain knowledge may dramatically influence both the absolute and the relative performances of the different algorithms.", "To the best of our knowledge, the influence of these parameters on the quality of the predictions of recommender systems has rarely been reported in the literature." ]
[ 0, 0, 0, 2, 1, 1, 4 ]
[ 0.37599998712539673, 0.5659000277519226, 0.3797999918460846, 0.3797999918460846, 0.37599998712539673, 0.40310001373291016, 0.40700000524520874 ]
train_1250
[ "A 125 KHz wake-up receiver to receive wake-up signal and a 433MHz data transmitter to transmit temperature and pressure data of the tire to central control module for battery-less TPMS (Tire Pressure Monitoring System) are presented in this paper.", "The receiver adopts dual-channel to improve reliability and logarithmic amplifier to achieve ASK demodulation and dynamic range compression.", "The receiver is implemented in 0.35μm BCD process.", "Maximum data rate is 35Kbps with 0.5mVpp sensitivity and 5μA typical power consumption.", "The transmitter is implemented in 0.18μm process.", "The typical power consumption is 7.3mA with a transmit power of −10 dBm@433.9 MHz, and phase noise of the PLL is − 103dBc/Hz@ 300 KHz with 30Kbps data rate." ]
[ 0, 0, 0, 0, 0, 4 ]
[ 0.43639999628067017, 0.43639999628067017, 0.43639999628067017, 0.43639999628067017, 0.43639999628067017, 0.5636000037193298 ]
train_1251
[ "Computational neuroscience has produced a diversity of software for simulations of networks of spiking neurons, with both negative and positive consequences.", "On the one hand, each simulator uses its own programming or configuration language, leading to considerable difficulty in porting models from one simulator to another.", "This impedes communication between investigators and makes it harder to reproduce and build on the work of others.", "On the other hand, simulation results can be cross-checked between different simulators, giving greater confidence in their correctness, and each simulator has different optimizations, so the most appropriate simulator can be chosen for a given modelling task.", "A common programming interface to multiple simulators would reduce or eliminate the problems of simulator diversity while retaining the benefits.", "PyNN is such an interface, making it possible to write a simulation script once, using the Python programming language, and run it without modification on any supported simulator (currently NEURON, NEST, PCSIM, Brian and the Heidelberg VLSI neuromorphic hardware).", "PyNN increases the productivity of neuronal network modelling by providing high-level abstraction, by promoting code sharing and reuse, and by providing a foundation for simulator-agnostic analysis, visualization and data-management tools.", "PyNN increases the reliability of modelling studies by making it much easier to check results on multiple simulators.", "PyNN is open-source software and is available from http://neuralensemble.org/PyNN." ]
[ 0, 0, 0, 2, 2, 1, 4, 2, 2 ]
[ 1, 0.8055999875068665, 0.666700005531311, 0.44440001249313354, 0.666700005531311, 0.3610999882221222, 0.22220000624656677, 0.41670000553131104, 0.44440001249313354 ]
train_1252
[ "We present a large-scale dataset, ReCoRD, for machine reading comprehension requiring commonsense reasoning.", "Experiments on this dataset demonstrate that the performance of state-of-the-art MRC systems fall far behind human performance.", "ReCoRD represents a challenge for future research to bridge the gap between human and machine commonsense reading comprehension.", "ReCoRD is available at http://nlp.jhu.edu/record." ]
[ 0, 0, 2, 3 ]
[ 0.5788999795913696, 0.5788999795913696, 0.3684000074863434, 0.7894999980926514 ]
train_1253
[ "Convolutional neural networks (CNNs) have been successfully applied to many recognition and learning tasks using a universal recipe; training a deep model on a very large dataset of supervised examples.", "However, this approach is rather restrictive in practice since collecting a large set of labeled images is very expensive.", "One way to ease this problem is coming up with smart ways for choosing images to be labelled from a very large collection (i.e. active learning).", "Our empirical study suggests that many of the active learning heuristics in the literature are not effective when applied to CNNs in batch setting.", "Inspired by these limitations, we define the problem of active learning as core-set selection, i.e. choosing set of points such that a model learned over the selected subset is competitive for the remaining data points.", "We further present a theoretical result characterizing the performance of any selected subset using the geometry of the datapoints.", "As an active learning algorithm, we choose the subset which is expected to yield best result according to our characterization.", "Our experiments show that the proposed method significantly outperforms existing approaches in image classification experiments by a large margin." ]
[ 0, 0, 0, 2, 0, 0, 0, 1 ]
[ 0.7838000059127808, 0.7838000059127808, 0.5676000118255615, 0.4323999881744385, 0.5676000118255615, 0.3783999979496002, 0.3783999979496002, 0.4323999881744385 ]
train_1254
[ "We report a simulation program for indoor visible light communication environment based on MATLAB and Simulink.", "The program considers the positions of the transmitters and the reflections at each wall.", "For visible light communication environment, the illumination light-emitting diode is used not only as a lighting device, but also as a communication device.", "Using the simulation program, the distributions of illuminance and root-mean-square delay spread are analyzed at bottom surface." ]
[ 0, 2, 1, 1 ]
[ 0.7949000000953674, 0.3846000134944916, 0.3846000134944916, 0.5896999835968018 ]
train_1255
[ "In many real-world reinforcement learning problems, an agent needs to control multiple actions simultaneously.", "To learn under this circumstance, previously, each action was commonly treated independently with other.", "However, these multiple actions are rarely independent in applications, and it could be helpful to accelerate the learning if the underlying relationship among the actions is utilized.", "This paper explores multi-action relationship in reinforcement learning.", "We propose to learn the multi-action relationship by enforcing a regularization term capturing the relationship.", "We incorporate the regularization term into the least-square policy-iteration and the temporal-difference methods, which result efficiently solvable convex learning objectives.", "The proposed methods are validated empirically in several domains.", "Experiment results show that incorporating multi-action relationship can effectively improve the learning performance." ]
[ 0, 0, 0, 2, 1, 1, 1, 4 ]
[ 1, 0.583299994468689, 0.583299994468689, 0.6111000180244446, 0.41670000553131104, 0.8055999875068665, 0.583299994468689, 1 ]
train_1256
[ "Simultaneous tracking of multiple persons in real-world environments is an active research field and several approaches have been proposed, based on a variety of features and algorithms.", "Recently, there has been a growing interest in organizing systematic evaluations to compare the various techniques.", "Unfortunately, the lack of common metrics for measuring the performance of multiple object trackers still makes it hard to compare their results.", "In this work, we introduce two intuitive and general metrics to allow for objective comparison of tracker characteristics, focusing on their precision in estimating object locations, their accuracy in recognizing object configurations and their ability to consistently label objects over time.", "These metrics have been extensively used in two large-scale international evaluations, the 2006 and 2007 CLEAR evaluations, to measure and compare the performance of multiple object trackers for a wide variety of tracking tasks.", "Selected performance results are presented and the advantages and drawbacks of the presented metrics are discussed based on the experience gained during the evaluations." ]
[ 0, 0, 2, 2, 1, 4 ]
[ 0.8055999875068665, 0.583299994468689, 0.583299994468689, 0.44440001249313354, 0.44440001249313354, 0.6388999819755554 ]
train_1257
[ "Positive identification (ID) verification of a large number of people (possibly thousands) in a short time, such as when people enter the gates of a manufacturing plant in the morning, can be a daunting task for the security guards.", "Current methods that use a password, card swipe system, proximity card reader system, or combination are slow and vulnerable.", "For example a card can be stolen or a password forgotten, copied or given to an unauthorized person.", "Hence the need for biometric-based access control systems (ACS).", "Many biometric systems address the ID verification problem; however, none provide quick and convenient positive (reliable) ID.", "Fingerprinting is unreliable and requires too much cooperation, face recognition systems (FRS) are unacceptable in a one-to-many application, and iris scan is slow and cumbersome.", "In this paper, we describe a fast access control technology solution (FACTS) system we developed and demonstrated at Honeywell Labs that enables many motorists to enter a secured parking lot without coming to a complete stop.", "The FACTS solution combines radio frequency identification (RFID) tags with FRS, reducing the one-to-many FRS problem by using a one-to-one match for facial verification (FV).", "This solution is dynamic, secure, positive, and hands-free for fast gate access control.", "At the heart of the Honeywell FV system is a unique tri-band imaging (TBI) camera that reliably locates and records the face of an individual or driver in motion while entering a gate." ]
[ 0, 1, 4, 4, 2, 4, 1, 1, 4, 4 ]
[ 0.3846000134944916, 0.8205000162124634, 0.20509999990463257, 0.20509999990463257, 0.41029998660087585, 0.5896999835968018, 0.5896999835968018, 0.5896999835968018, 0.6154000163078308, 0.5896999835968018 ]
train_1258
[ "A key advance in learning generative models is the use of amortized inference distributions that are jointly trained with the models.", "We find that existing training objectives for variational autoencoders can lead to inaccurate amortized inference distributions and, in some cases, improving the objective provably degrades the inference quality.", "In addition, it has been observed that variational autoencoders tend to ignore the latent variables when combined with a decoding distribution that is too flexible.", "We again identify the cause in existing training criteria and propose a new class of objectives (InfoVAE) that mitigate these problems.", "We show that our model can significantly improve the quality of the variational posterior and can make effective use of the latent features regardless of the flexibility of the decoding distribution.", "Through extensive qualitative and quantitative analyses, we demonstrate that our models outperform competing approaches on multiple performance metrics." ]
[ 0, 0, 0, 1, 4, 4 ]
[ 0.7778000235557556, 0.7778000235557556, 0.5555999875068665, 0.44440001249313354, 0.3610999882221222, 0.8055999875068665 ]
train_1259
[ "This paper utilizes agent-based simulation to compare different market making strategies for high frequency traders (HFTs).", "After proposing a model representing HFTs' activities in financial market when they act as market makers, we carry out simulations to explore how different quoting strategies affect their profit.", "The results show that combination of (i) offering prices based on the latest trading price, and (ii) using the information about market volatility and order imbalance, increase market makers' daily returns.", "In addition, other scenarios including the competition environment of increased competitors and decreased latencies are incorporated in the model, in order to find out how these factors change the performance of market making strategy." ]
[ 0, 2, 4, 4 ]
[ 0.6215999722480774, 0.7838000059127808, 0.3783999979496002, 0.6215999722480774 ]
train_1260
[ "The Internet of Things (IoT) is defined as a paradigm in which objects equipped with sensors, actuators, and processors communicate with each other to serve a meaningful purpose.", "In this paper, we survey state-of-the-art methods, protocols, and applications in this new emerging area.", "This survey paper proposes a novel taxonomy for IoT technologies, highlights some of the most important technologies, and profiles some applications that have the potential to make a striking difference in human life, especially for the differently abled and the elderly.", "As compared to similar survey papers in the area, this paper is far more comprehensive in its coverage and exhaustively covers most major technologies spanning from sensors to applications." ]
[ 0, 1, 1, 4 ]
[ 0.44119998812675476, 0.3824000060558319, 0.44119998812675476, 0.44119998812675476 ]
train_1261
[ "Speech activity detection (SAD) is an important first step in speech processing.", "Commonly used methods (e.g., frame-level classification using gaussian mixture models (GMMs)) work well under stationary noise conditions, but do not generalize well to domains such as YouTube, where videos may exhibit a diverse range of environmental conditions.", "One solution is to augment the conventional cepstral features with additional, hand-engineered features (e.g., spectral flux, spectral centroid, multiband spectral entropies) which are robust to changes in environment and recording condition.", "An alternative approach, explored here, is to learn robust features during the course of training using an appropriate architecture such as deep neural networks (DNNs).", "In this paper we demonstrate that a DNN with input consisting of multiple frames of mel frequency cepstral coefficients (MFCCs) yields drastically lower frame-wise error rates (19.6%) on YouTube videos compared to a conventional GMM based system (40%)." ]
[ 0, 1, 2, 2, 4 ]
[ 0.7835000157356262, 0.5669999718666077, 0.40209999680519104, 0.5875999927520752, 0.5360999703407288 ]
train_1262
[ "Reading text from photographs is a challenging problem that has received a significant amount of attention.", "Two key components of most systems are (i) text detection from images and (ii) character recognition, and many recent methods have been proposed to design better feature representations and models for both.", "In this paper, we apply methods recently developed in machine learning -- specifically, large-scale algorithms for learning the features automatically from unlabeled data -- and show that they allow us to construct highly effective classifiers for both detection and recognition to be used in a high accuracy end-to-end system." ]
[ 0, 0, 1 ]
[ 0.7940999865531921, 0.41179999709129333, 0.7940999865531921 ]
train_1263
[ "The two dominant schemes for rule-learning, C4.5 and RIPPER, both operate in two stages.", "First they induce an initial rule set and then they refine it using a rather complex optimization stage that discards (C4.5) or adjusts (RIPPER) individual rules to make them work better together.", "In contrast, this paper shows how good rule sets can be learned one rule at a time, without any need for global optimization.", "We present an algorithm for inferring rules by repeatedly generating partial decision trees, thus combining the two major paradigms for rule generation—creating rules from decision trees and the separate-and-conquer rule-learning technique.", "The algorithm is straightforward and elegant: despite this, experiments on standard datasets show that it produces rule sets that are as accurate as and of similar size to those generated by C4.5, and more accurate than RIPPER’s.", "Moreover, it operates efficiently, and because it avoids postprocessing, does not suffer the extremely slow performance on pathological example sets for which the C4.5 method has been criticized." ]
[ 0, 0, 1, 1, 1, 1 ]
[ 1, 0.666700005531311, 0.44440001249313354, 0.5357000231742859, 0.6388999819755554, 0.44440001249313354 ]
train_1264
[ "We present an attention-based model for recognizing multiple objects in images.", "The proposed model is a deep recurrent neural network trained with reinforcement learning to attend to the most relevant regions of the input image.", "We show that the model learns to both localize and recognize multiple objects despite being given only class labels during training.", "We evaluate the model on the challenging task of transcribing house number sequences from Google Street View images and show that it is both more accurate than the state-of-the-art convolutional networks and uses fewer parameters and less computation." ]
[ 2, 1, 1, 4 ]
[ 0.4016000032424927, 0.6557000279426575, 0.4262000024318695, 0.8278999924659729 ]
train_1265
[ "NTechLAB facenx_large Google FaceNet v8 Beijing Faceall Co. FaceAll_Norm_1600 Beijing Faceall Co.", "FaceAll_1600 large 73.300% 70.496% 64.803% 63.977% 85.081% 86.473% 67.118% 63.960% Barebones_FR cnn NTechLAB facenx_small 3DiVi Company – tdvm6 small 59.363% 58.218% 33.705% 59.036% 66.366% 36.927% model AModel BModel C(Proposed) small 41.863% 57.175% 65.234% 41.297% 69.897% 76.516% Method Protocol Identification Acc.", "(Set 1) Verification Acc.", "(Set 1) For generic object, scene or action recognition.", "The deeply learned features need to be separable.", "Because the classes of the possible testing samples are within the training set, the predicted labels dominate the performance." ]
[ 3, 3, 3, 3, 4, 4 ]
[ 0.6053000092506409, 0.421099990606308, 0.631600022315979, 0.421099990606308, 0.5788999795913696, 0.5788999795913696 ]
train_1266
[ "For urban driving, knowledge of ego-vehicle's position is a critical piece of information that enables advanced driver-assistance systems or self-driving cars to execute safety-related, autonomous driving maneuvers.", "This is because, without knowing the current location, it is very hard to autonomously execute any driving maneuvers for the future.", "The existing solutions for localization rely on a combination of Global Navigation Satellite System (GNSS), an inertial measurement unit, and a digital map.", "However, on urban driving environments, due to poor satellite geometry and disruption of radio signal reception, their longitudinal and lateral errors are too significant to be used to guide an autonomous system.", "To enhance the existing system's localization capability, this work presents an effort of developing a vision-based lateral localization algorithm.", "The algorithm aims at reliably counting, with or without observations of lane-markings, the number road-lanes and identifying the index of the road-lane on the roadway that our vehicle happens to be driving on.", "Testings the proposed algorithms against inter-city and inter-state highway videos showed promising results in terms of counting the number of road-lanes and the indices of the current road-lanes." ]
[ 0, 0, 0, 0, 2, 1, 4 ]
[ 0.800000011920929, 1, 0.6000000238418579, 0.800000011920929, 0.6000000238418579, 0.800000011920929, 0.6000000238418579 ]
train_1267
[ "In this paper we elicit preferences for money-time pairs via experimental techniques.", "We estimate a general specification of discounting that nests exponential and hyperbolic discounting, as well as various forms of present bias, including quasi-hyperbolic discounting.", "Our experimental data do not appear peculiar in any dimension.", "In particular, we find clear evidence for present bias, as most of the previous literature.", "However, no evidence for quasi-hyperbolic discounting is found, and the data strongly favor instead a specification with a small present bias in the form of a fixed cost, of the order of $4 on average across subjects.", "With such a fixed cost the curvature of discounting is imprecisely estimated and exponential discounting is hardly rejected.", "In this specification the present bias tends to vanish for economically relevant monetary rewards." ]
[ 0, 0, 0, 1, 1, 4, 4 ]
[ 0.6154000163078308, 0.6154000163078308, 0.41029998660087585, 0.41029998660087585, 0.41029998660087585, 0.5896999835968018, 0.7949000000953674 ]
train_1268
[ "Discovering sequential patterns is an important problem in data mining with a host of application domains including medicine, telecommunications, and the World Wide Web.", "Conventional mining systems provide users with only a very restricted mechanism (based on minimum support) for specifying patterns of interest.", "In this paper, we propose the use of Regular Expressions (REs) as a flexible constraint specification tool that enables user-controlled focus to be incorporated into the pattern mining process.", "We develop a family of novel algorithms (termed SPIRIT – Sequential Pattern mIning with Regular expressIon consTraints) for mining frequent sequential patterns that also satisfy user-specified RE constraints.", "The main distinguishing factor among the proposed schemes is the degree to which the RE constraints are enforced to prune the search space of patterns during computation.", "Our solutions provide valuable insights into the tradeoffs that arise when constraints that do not subscribe to nice properties (like anti-monotonicity) are integrated into the mining process.", "A quantitative exploration of these tradeoffs is conducted through an extensive experimental study on synthetic and real-life data sets." ]
[ 0, 0, 2, 1, 1, 4, 1 ]
[ 0.5788999795913696, 0.7894999980926514, 0.6053000092506409, 0.7894999980926514, 1, 0.5788999795913696, 0.421099990606308 ]
train_1269
[ "Gradient descent training of neural networks can be done in either a batch or on-line manner.", "A widely held myth in the neural network community is that batch training is as fast or faster and/or more 'correct' than on-line training because it supposedly uses a better approximation of the true gradient for its weight updates.", "This paper explains why batch training is almost always slower than on-line training-often orders of magnitude slower-especially on large training sets.", "The main reason is due to the ability of on-line training to follow curves in the error surface throughout each epoch, which allows it to safely use a larger learning rate and thus converge with less iterations through the training data.", "Empirical results on a large (20,000-instance) speech recognition task and on 26 other learning tasks demonstrate that convergence can be reached significantly faster using on-line training than batch training, with no apparent difference in accuracy." ]
[ 0, 0, 0, 1, 4 ]
[ 1, 0.6111000180244446, 0.3889000117778778, 0.3889000117778778, 0.41670000553131104 ]
train_1270
[ "Social voting is an emerging new feature in online social networks.", "It poses unique challenges and opportunities for recommendation.", "In this paper, we develop a set of matrix-factorization (MF) and nearest-neighbor (NN)-based recommender systems (RSs) that explore user social network and group affiliation information for social voting recommendation.", "Through experiments with real social voting traces, we demonstrate that social network and group affiliation information can significantly improve the accuracy of popularity-based voting recommendation, and social network information dominates group affiliation information in NN-based approaches.", "We also observe that social and group information is much more valuable to cold users than to heavy users.", "In our experiments, simple metapath-based NN models outperform computation-intensive MF models in hot-voting recommendation, while users’ interests for nonhot votings can be better mined by MF models.", "We further propose a hybrid RS, bagging different single approaches to achieve the best top- $k$ hit rate." ]
[ 0, 0, 2, 1, 4, 4, 4 ]
[ 1, 1, 0.5676000118255615, 0.6215999722480774, 0.6485999822616577, 0.6485999822616577, 0.8108000159263611 ]
train_1271
[ "UNLABELLED Electronic patient records (EPRs) contain a wealth of patient-related data and capture clinical problem-solving experiences and decisions.", "Excelicare is such a system which is also a platform for the national generic clinical system in the UK.", "OBJECTIVE This paper presents, ExcelicareCBR, a case-based reasoning (CBR) system which has been developed to complement Excelicare.", "Objective of this work is to integrate CBR to support clinical decision making by harnessing electronic patient records for clinical experience reuse.", "METHODS CBR is a proven problem solving methodology in which past solutions are reused to solve new problems.", "A key challenge that we address in this paper is how to extract and represent a case from an EPR.", "Using an example from the lung cancer domain we demonstrate our generic case representation approach where Excelicare fields are mapped to case features.", "Once the case base is populated with cases containing data from the EPRs database a standard weighted k-nearest neighbour algorithm combined with a genetic algorithm based feature weighting mechanism is used for case retrieval and reuse.", "CONCLUSIONS We conclude that incorporating case authoring functionality and a generic retrieval mechanism were key to successful integration of ExcelicareCBR.", "This paper also demonstrates how the application of CBR can enable sharing of lessons learned through the retrieval and reuse of EPRs captured as cases in a case base." ]
[ 0, 0, 2, 2, 1, 1, 1, 1, 4, 4 ]
[ 1, 1, 1, 1, 1, 0.7778000235557556, 1, 0.5555999875068665, 1, 1 ]
train_1272
[ "CAN bus will be increasingly used in wide range of applications for its superiority, but it couldn’t communicate with computer directly.", "The article describes the design of RS232 and CAN bus protocol converter depending on PIC Microcontroller, which solves the problem that CAN networks can not directly communicate with PC.", "At present, single-chip microcomputer of 51 series with CAN controller SJA1000 are widely used in domestic.", "Considering cost and converter size, the paper will talk about PIC18F2580 with integrated CAN microcontroller designed for RS232 and CAN protocol converters to facilitate the direct communication between computers and CAN bus." ]
[ 0, 0, 0, 4 ]
[ 0.8108000159263611, 0.40540000796318054, 1, 0.40540000796318054 ]
train_1273
[ "Information systems research has been concerned with improving task-related performance.", "The concept of fit is often used to explain how system design results in better performance and overall value.", "So far, the literature focuses mainly on performance evaluation criteria that are based on measures of task efficiency, accuracy, or productivity.", "However, nowadays, productivity gain is no longer the single evaluation criterion.", "In many instances, computer systems are expected to enhance our creativity, reveal opportunities and open new vistas of uncharted frontiers.", "To address this void, we introduce the concept of generativity and develop two corresponding design considerations--\"generative capacity\" that refers to one’s creativity, ingenuity and mental dexterity, and \"generative fit\" that refers to the extent to which an IT artifact is conducive to evoking and enhancing that generative capacity.", "We offer an extended view of the concept of fit and realign the prevailing approaches to humancomputer interaction design with current leading-edge applications and users' expectations.", "Our findings guide systems designers who aim to enhance creative work, unstructured syntheses, serendipitous discoveries, and any other form of computer-aided tasks that involve unexplored outcomes, expect fresh configurations or aim to enhance our ability to boldly go where no one has gone before.", "In this paper, we explore the notion of generativity, review its theoretical background in the context of the social sciences, and argue that it should be included in the evaluation of task-related performance.", "Then, we briefly explore the role of fit in IS research, position “generative fit” in that context, explain its role and impact on performance, and provide key design considerations that enhance generative fit." ]
[ 0, 2, 1, 0, 4, 1, 1, 4, 2, 1 ]
[ 0.5946000218391418, 0.40540000796318054, 0.40540000796318054, 0.3783999979496002, 0.6215999722480774, 0.40540000796318054, 0.40540000796318054, 0.21619999408721924, 0.5946000218391418, 0.5946000218391418 ]
train_1274
[ "As countries become increasingly urbanized, understanding how urban areas are changing within the landscape becomes increasingly important.", "Urbanized areas are often the strongest indicators of human interaction with the environment, and understanding how urban areas develop through remotely sensed data allows for more sustainable practices.", "The Google Earth Engine (GEE) leverages cloud computing services to provide analysis capabilities on over 40 years of Landsat data.", "As a remote sensing platform, its ability to analyze global data rapidly lends itself to being an invaluable tool for studying the growth of urban areas.", "Here we present (i) An approach for the automated extraction of urban areas from Landsat imagery using GEE, validated using higher resolution images, (ii) a novel method of validation of the extracted urban extents using changes in the statistical performance of a high resolution population mapping method.", "Temporally distinct urban extractions were classified from the GEE catalog of Landsat patial demography 5 and 7 data over the Indonesian island of Java by using a Normalized Difference Spectral Vector (NDSV) method.", "Statistical evaluation of all of the tests was performed, and the value of population mapping methods in validating these urban extents was also examined.", "Results showed that the automated classification from GEE produced accurate urban extent maps, and that the integration of GEE-derived urban extents also improved the quality of the population mapping outputs.", "© 2014 Elsevier B.V.", "All rights reserved." ]
[ 0, 0, 0, 2, 1, 1, 4, 4, 3, 3 ]
[ 1, 1, 0.6053000092506409, 0.39469999074935913, 0.6053000092506409, 0.6053000092506409, 0.5788999795913696, 1, 1, 1 ]
train_1275
[ "Over the last ten years the Internet has become an incredibly important media in everyday life of ordinary people.", "By now the World Wide Web is not a foreign concept anymore; millions of people make use of the internet in terms of e-mail, online banking, online shops, etc.", "Companies have realised the necessity of user friendly interfaces and software which even an inexperienced user is able to handle.", "Since the interaction with the Internet becomes ubiquitous, assessing usability of interfaces is a fundamental and necessary part of HCI development.", "Observing the overt behaviour of users, (which button does a user click on, how is the mouse used), retrospective self report, questionnaires and thinking aloud methods are just examples of traditional and quite successful strategies in order to investigate usability problems.", "So, why should there be a need for a new method when conventional methods seem sufficient in optimising usability and what is it’s contribution in the evaluation of how usable a particular design is?", "We will give a short introduction of the eye tracking method in applied marketing research and its benefits.", "Reporting two of our studies we will discuss the limits of traditional usability testing and will show how tracking the eye gaze can fill this gap." ]
[ 0, 0, 0, 0, 1, 2, 1, 4 ]
[ 1, 1, 0.800000011920929, 0.800000011920929, 0.4000000059604645, 0.4000000059604645, 0.800000011920929, 0.6000000238418579 ]
train_1276
[ "The core capabilities of an organization include critical skills of employees, management systems, and norms and values.", "Core capabilities may be transferred fonnally and explicitly.", "However, much knowledge, particularly knowledge with rich tacit dimensions, is transferred informally through processes of socialization and intemaiization.", "We focus on two transfer mechanisms—mentoring and storytelling—that can leverage the knowledge of an organization, particularly its tacit knowledge, to build core capabilities.", "We draw on relevant research in leaming and cognitive psychology to clarify the conditions under which mentoring and storytelling can be most effective as carriers of knowledge.", "Finally, we present recommendations for specific managerial practices that follow from our analysis.", "Journal of Management Information Systems /Summer 200\\, Vol.", "18, No. 1, pp.", "95-114. ©2001 M.E. Sharpe, Inc. 0742-1222 / 2001 $9.50 + 0.00.", "96 SWAP, LEONARD, SHIELDS, AND ABRAMS" ]
[ 0, 0, 0, 2, 1, 1, 3, 3, 3, 3 ]
[ 1, 1, 0.800000011920929, 1, 0.6000000238418579, 0.6000000238418579, 0.6000000238418579, 0.6000000238418579, 0.800000011920929, 1 ]
train_1277
[ "This study addresses ways in which inmates at the only maximum-security prison for women in Neuse City (in the northeastern United States) redefine their social world in order to survive incarceration.", "An aim of the project is to engage in theory building in order to examine the experiences of a world that is “lived in the round.", "”", "A life in the round is a public form of life.", "It is a lifestyle with an enormous degree of imprecision.", "Yet, it is this inexactitude that provides an acceptable level of certainty.", "This way of life sets standards by which one constructs everyday meaning from reality.", "It is a “takenfor-granted,” “business-as-usual” style of being.", "Relying on ethnographic research and interviews with 80 women at the prison, the findings revealed that a life in the round was sustaining a “normative” existence." ]
[ 0, 2, 3, 0, 3, 0, 1, 1, 4 ]
[ 0.8055999875068665, 0.583299994468689, 0.7778000235557556, 0.41670000553131104, 0.583299994468689, 0.41670000553131104, 0.3889000117778778, 0.3889000117778778, 0.583299994468689 ]
train_1278
[ "In this paper we propose a highly detailed map for the field of autonomous driving.", "We introduce the notion of lanelets to represent the drivable environment under both geometrical and topological aspects.", "Lanelets are atomic, interconnected drivable road segments which may carry additional data to describe the static environment.", "We describe the map specification, an example creation process as well as the access library libLanelet which is available for download.", "Based on the map, we briefly describe our behavioural layer (which we call behaviour generation) which is heavily exploiting the proposed map structure.", "Both contributions have been used throughout the autonomous journey of the Mercedes Benz S 500 Intelligent Drive following the Bertha Benz Memorial Route in summer 2013." ]
[ 0, 0, 2, 1, 1, 4 ]
[ 0.8108000159263611, 0.5946000218391418, 0.4323999881744385, 0.7838000059127808, 0.7838000059127808, 0.8378000259399414 ]
train_1279
[ "This paper examines the effect of the freemium strategy on Google Play, an online marketplace for Android mobile apps.", "By analyzing a large panel dataset consisting of 1,597 ranked mobile apps, we found that the freemium strategy is positively associated with increased sales volume and revenue of the paid apps.", "Higher sales rank and review rating of the free version of a mobile app both lead to higher sales rank of its paid version.", "However, only higher review rating of the free app contributes to higher revenue from the paid version, suggesting that although offering a free version is a viable way to improve the visibility of a mobile app, revenue is largely determined by product quality, not product visibility.", "Moreover, we found that the impact of review rating is not significant when the free version is offered, or when the mobile app is a hedonic app." ]
[ 0, 0, 4, 4, 4 ]
[ 0.4323999881744385, 0.40540000796318054, 0.3783999979496002, 0.5946000218391418, 0.5946000218391418 ]
train_1280
[ "This report summarizes the tutorial presented by the author at NIPS 2016 on generative adversarial networks (GANs).", "The tutorial describes: (1) Why generative modeling is a topic worth studying, (2) how generative models work, and how GANs compare to other generative models, (3) the details of how GANs work, (4) research frontiers in GANs, and (5) state-of-the-art image models that combine GANs with other methods.", "Finally, the tutorial contains three exercises for readers to complete, and the solutions to these exercises.", "Introduction This report summarizes the content of the NIPS 2016 tutorial on generative adversarial networks (GANs) (Goodfellow et al., 2014b).", "The tutorial was designed primarily to ensure that it answered most of the questions asked by audience members ahead of time, in order to make sure that the tutorial would be as useful as possible to the audience.", "This tutorial is not intended to be a comprehensive review of the field of GANs; many excellent papers are not described here, simply because they were not relevant to answering the most frequent questions, and because the tutorial was delivered as a two hour oral presentation and did not have unlimited time cover all subjects.", "The tutorial describes: (1) Why generative modeling is a topic worth studying, (2) how generative models work, and how GANs compare to other generative models, (3) the details of how GANs work, (4) research frontiers in GANs, and (5) state-of-the-art image models that combine GANs with other methods.", "Finally, the tutorial contains three exercises for readers to complete, and the solutions to these exercises.", "The slides for the tutorial are available in PDF and Keynote format at the following URLs: http://www.iangoodfellow.com/slides/2016-12-04-NIPS.pdf 1This is the arxiv.org version of this tutorial.", "Some graphics have been compressed to respect arxiv.org’s 10MB limit on paper size, and do not reflect the full image quality." ]
[ 0, 0, 0, 2, 1, 1, 1, 4, 4, 4 ]
[ 0.7838000059127808, 0.7838000059127808, 0.5676000118255615, 0.40540000796318054, 0.8108000159263611, 0.5946000218391418, 0.5946000218391418, 0.3783999979496002, 0.3783999979496002, 0.4323999881744385 ]
train_1281
[ "Blockchain, widely known as one of the disruptive technologies emerged in recent years, is experiencing rapid development and has the full potential of revolutionizing the increasingly centralized intelligent transportation systems (ITS) in applications.", "Blockchain can be utilized to establish a secured, trusted and decentralized autonomous ITS ecosystem, creating better usage of the legacy ITS infrastructure and resources, especially effective for crowdsourcing technology.", "This paper conducts a preliminary study of Blockchain-based ITS (B2ITS).", "We outline an ITS-oriented, seven-layer conceptual model for blockchain, and on this basis address the key research issues in B2ITS.", "We consider that blockchain is one of the secured and trusted architectures for building the newly developed parallel transportation management systems (PtMS) , and thereby discuss the relationship between B2ITS and PtMS.", "Finally, we present a case study for blockchain-based realtime ride-sharing services.", "In our viewpoint, B2ITS represents the future trend of ITS research and practice, and this paper is aimed at stimulating further effort and providing helpful guidance and reference for future research works." ]
[ 0, 0, 2, 1, 1, 4, 4 ]
[ 0.8108000159263611, 0.8108000159263611, 0.40540000796318054, 0.5946000218391418, 0.40540000796318054, 0.40540000796318054, 0.40540000796318054 ]
train_1282
[ "There is an increasing need to bring machine learning to a wide diversity of hardware devices.", "Current frameworks rely on vendor-specific operator libraries and optimize for a narrow range of server-class GPUs.", "Deploying workloads to new platforms such as mobile phones, embedded devices, and accelerators (e.g., FPGAs, ASICs) requires significant manual effort.", "We propose TVM, a compiler that exposes graph-level and operator-level optimizations to provide performance portability to deep learning workloads across diverse hardware back-ends.", "TVM solves optimization challenges specific to deep learning such as high-level operator fusion, mapping to arbitrary hardware primitives, and memory latency hiding.", "TVM also offers automated optimization of lowlevel programs to hardware characteristics by employing a novel learning-based cost modeling method for rapid exploration of code optimizations.", "Experimental results demonstrate that TVM delivers performance across hardware back-ends that are competitive with state-of-the-art hand tuned libraries for low-power CPU, mobile GPU, and server-class GPUs.", "We also demonstrate TVM’s ability to target new accelerator back-ends by targeting an FPGA-based generic deep learning accelerator.", "The system is open sourced and in production use inside several major companies." ]
[ 0, 0, 0, 1, 1, 1, 4, 4, 4 ]
[ 1, 1, 0.5555999875068665, 0.583299994468689, 0.8611000180244446, 0.666700005531311, 1, 1, 1 ]
train_1283
[ "There are many situations in which it is desirable to be able to distinguish spontaneous speech and speech which is non-spontaneous.", "Examples of situations in which this problem may arise include forensic evidence situations, sorting voice-mail responses from voice-mail menus, and automatic segmentation of spontaneous responses from prepared questions.", "The later situation can occur if it is desired to create a database of spontaneous data from data which consists of spontaneous discourse responding to prepared prompts.", "This paper outlines and compares three methods for automatically classifying spontaneous and non-spontaneous speech and presents the cxperimcntal results comparing the performance of the methods.", "All three methods are based on an analysis of the probability distributions of prosodic fcatures extracted from the speech signal.", "The first method uses an expansion of the of the probability distribution in terms of the statistical moments.", "The second method is an application of a modifed Hellinger’s method applied to histograms of signal amplitude and other speech features.", "The third method is based on a measure of the nonGaussianity of the data." ]
[ 0, 0, 0, 1, 1, 1, 1, 1 ]
[ 0.800000011920929, 0.800000011920929, 0.6000000238418579, 0.6000000238418579, 0.8285999894142151, 0.800000011920929, 0.6000000238418579, 0.6000000238418579 ]
train_1284
[ "Recommender systems have the effect of guiding users in a personalized way to interesting objects in a large space of possible options.", "Content-based recommendation systems try to recommend items similar to those a given user has liked in the past.", "Indeed, the basic process performed by a content-based recommender consists in matching up the attributes of a user profile in which preferences and interests are stored, with the attributes of a content object (item), in order to recommend to the user new interesting items.", "This chapter provides an overview of content-based recommender systems, with the aim of imposing a degree of order on the diversity of the different aspects involved in their design and implementation.", "The first part of the chapter presents the basic concepts and terminology of contentbased recommender systems, a high level architecture, and their main advantages and drawbacks.", "The second part of the chapter provides a review of the state of the art of systems adopted in several application domains, by thoroughly describing both classical and advanced techniques for representing items and user profiles.", "The most widely adopted techniques for learning user profiles are also presented.", "The last part of the chapter discusses trends and future research which might lead towards the next generation of systems, by describing the role of User Generated Content as a way for taking into account evolving vocabularies, and the challenge of feeding users with serendipitous recommendations, that is to say surprisingly interesting items that they might not have otherwise discovered.", "Pasquale Lops Department of Computer Science, University of Bari “Aldo Moro”, Via E. Orabona, 4, Bari (Italy) e-mail: lops@di.uniba.it Marco de Gemmis Department of Computer Science, University of Bari “Aldo Moro”, Via E. Orabona, 4, Bari (Italy) e-mail: degemmis@di.uniba.it Giovanni Semeraro Department of Computer Science, University of Bari “Aldo Moro”, Via E. Orabona, 4, Bari (Italy) e-mail: semeraro@di.uniba.it" ]
[ 0, 0, 0, 2, 1, 1, 1, 1, 4 ]
[ 1, 0.5625, 0.40630000829696655, 0.5625, 0.8125, 0.5938000082969666, 0.7813000082969666, 0.5938000082969666, 0.4375 ]
train_1285
[ "The 3GPP has introduced the LTE-M and NB-IoT User Equipment categories and made amendments to LTE release 13 to support the cellular Internet of Things.", "The contribution of this paper is to analyze the coverage probability, the number of supported devices, and the device battery life in networks equipped with either of the newly standardized technologies.", "The study is made for a site specific network deployment of a Danish operator, and the simulation is calibrated using drive test measurements.", "The results show that LTE-M can provide coverage for 99.9 % of outdoor and indoor devices, if the latter is experiencing 10 dB additional loss.", "However, for deep indoor users NB-IoT is required and provides coverage for about 95 % of the users.", "The cost is support for more than 10 times fewer devices and a 2-6 times higher device power consumption.", "Thus both LTE-M and NB- IoT provide extended support for the cellular Internet of Things, but with different trade- offs." ]
[ 0, 2, 1, 4, 4, 4, 4 ]
[ 0.3846000134944916, 0.7949000000953674, 0.5896999835968018, 0.7949000000953674, 0.7949000000953674, 0.7949000000953674, 0.7949000000953674 ]
train_1286
[ "In this paper we review mobile location-based games for learning.", "These games are played in physical space, but at the same time, they are supported by actions and events in an interconnected virtual space.", "Learning in these games is related to issues like the narrative structure, space and game rules and content that define the virtual game space.", "First, we introduce the theoretical and empirical considerations of mobile location based games, and then we discuss an analytical framework of their main characteristics through typical examples.", "In particular, we focus on their narrative structure, the interaction modes that they afford, their use of physical space as prop for action, the way this is linked to virtual space and the possible learning impact the game activities have.", "Finally we conclude with an outline of future trends and possibilities that these kinds of playful activities can have on learning, especially outside school, like in environmental studies and visits in museums and other sites of cultural and historical value." ]
[ 2, 0, 0, 1, 1, 4 ]
[ 0.4323999881744385, 0.7838000059127808, 0.40540000796318054, 0.7838000059127808, 0.7838000059127808, 1 ]
train_1287
[ "ruptures is a Python library for o ine change point detection.", "This package provides methods for the analysis and segmentation of non-stationary signals.", "Implemented algorithms include exact and approximate detection for various parametric and non-parametric models.", "ruptures focuses on ease of use by providing a well-documented and consistent interface.", "In addition, thanks to its modular structure, di erent algorithms and models can be connected and extended within this package." ]
[ 0, 2, 1, 1, 4 ]
[ 0.8151000142097473, 0.42260000109672546, 0.7886999845504761, 0.5774000287055969, 0.42260000109672546 ]
train_1288
[ "Recently, there has been a tremendous increase in demand for mobile data driven by the wide-spread usage of smartphone like devices.", "Besides the efforts of studies that propose ways for operators to handle this huge growth, there is also an emerging research area of analyzing this new type of user data.", "In this paper, we perform an analysis on mobile user data to understand general aggregated user behavior based on several parameters.", "We also investigate the reasons for the user behavior deviating from its general trend.", "Finally, we discuss several ways of utilizing the results of the analysis in this study in solving current problems operators face." ]
[ 0, 0, 2, 1, 4 ]
[ 1, 0.8055999875068665, 0.8055999875068665, 0.6111000180244446, 0.41670000553131104 ]
train_1289
[ "Object co-segmentation aims to segment the common objects in images.", "This paper presents a CNNbased method that is unsupervised and end-to-end trainable to better solve this task.", "Our method is unsupervised in the sense that it does not require any training data in the form of object masks but merely a set of images jointly covering objects of a specific class.", "Our method comprises two collaborative CNN modules, a feature extractor and a co-attention map generator.", "The former module extracts the features of the estimated objects and backgrounds, and is derived based on the proposed co-attention loss, which minimizes interimage object discrepancy while maximizing intraimage figure-ground separation.", "The latter module is learned to generate co-attention maps by which the estimated figure-ground segmentation can better fit the former module.", "Besides the co-attention loss, the mask loss is developed to retain the whole objects and remove noises.", "Experiments show that our method achieves superior results, even outperforming the state-of-the-art, supervised methods." ]
[ 0, 1, 1, 1, 4, 4, 4, 4 ]
[ 0.583299994468689, 0.41670000553131104, 0.41670000553131104, 0.8055999875068665, 0.44440001249313354, 0.44440001249313354, 0.44440001249313354, 0.8055999875068665 ]
train_1290
[ "This work concentrates on vision processing for ADAS and intelligent vehicle applications.", "We propose a color extension to the disparity-based Stixel World method, so that the road can be robustly distinguished from obstacles with respect to erroneous disparity measurements.", "Our extension learns color appearance models for road and obstacle classes in an online and self-supervised fashion.", "The algorithm is tightly integrated within the core of the optimization process of the original Stixel World, allowing for strong fusion of the disparity and color signals.", "We perform an extensive evaluation, including different self-supervised learning strategies and different color models.", "Our newly recorded, publicly available data set is intentionally focused on challenging traffic scenes with many low-texture regions, causing numerous disparity artifacts.", "In this evaluation, we increase the F-score of the drivable distance from 0.86 to 0.97, compared to a tuned version of the state-of-the-art baseline method.", "This clearly shows that our color extension increases the robustness of the Stixel World, by reducing the number of falsely detected obstacles while not deteriorating the detection of true obstacles." ]
[ 2, 0, 1, 1, 4, 4, 4, 4 ]
[ 0.5454999804496765, 0.42419999837875366, 0.8181999921798706, 0.8181999921798706, 0.6363999843597412, 1, 1, 0.8181999921798706 ]
train_1291
[ "The Internet has provided IS researchers with the opportunity to conduct studies with extremely large samples, frequently well over 10,000 observations.", "There are many advantages to large samples, but researchers using statistical inference must be aware of the p-value problem associated with them.", "In very large samples, p-values go quickly to zero, and solely relying on pvalues can lead the researcher to claim support for results of no practical significance.", "In a survey of large sample IS research, we found that a significant number of papers rely on a low pvalue and the sign of a regression coefficient alone to support their hypotheses.", "This research commentary recommends a series of actions the researcher can take to mitigate the p-value problem in large samples and illustrates them with an example of over 300,000 camera sales on eBay.", "We believe that addressing the p-value problem will increase the credibility of large sample IS research as well as provide more insights for readers." ]
[ 0, 0, 0, 1, 4, 4 ]
[ 0.6111000180244446, 0.8055999875068665, 0.6111000180244446, 0.6388999819755554, 0.44440001249313354, 0.6388999819755554 ]
train_1292
[ "Functional magnetic resonance imaging (fMRI) studies of the human brain have suggested that low-frequency fluctuations in resting fMRI data collected using blood oxygen level dependent (BOLD) contrast correspond to functionally relevant resting state networks (RSNs).", "Whether the fluctuations of resting fMRI signal in RSNs are a direct consequence of neocortical neuronal activity or are low-frequency artifacts due to other physiological processes (e.g., autonomically driven fluctuations in cerebral blood flow) is uncertain.", "In order to investigate further these fluctuations, we have characterized their spatial and temporal properties using probabilistic independent component analysis (PICA), a robust approach to RSN identification.", "Here, we provide evidence that: i. RSNs are not caused by signal artifacts due to low sampling rate (aliasing); ii.", "they are localized primarily to the cerebral cortex; iii.", "similar RSNs also can be identified in perfusion fMRI data; and iv.", "at least 5 distinct RSN patterns are reproducible across different subjects.", "The RSNs appear to reflect \"default\" interactions related to functional networks related to those recruited by specific types of cognitive processes.", "RSNs are a major source of non-modeled signal in BOLD fMRI data, so a full understanding of their dynamics will improve the interpretation of functional brain imaging studies more generally.", "Because RSNs reflect interactions in cognitively relevant functional networks, they offer a new approach to the characterization of state changes with pathology and the effects of drugs." ]
[ 0, 0, 2, 1, 4, 4, 4, 4, 4, 4 ]
[ 0.6000000238418579, 0.6000000238418579, 0.4000000059604645, 0.6000000238418579, 0.6000000238418579, 0.6000000238418579, 0.4000000059604645, 0.6000000238418579, 0.5, 0.6000000238418579 ]
train_1293
[ "To each fuzzy subgroup a fuzzy equivalence relation is associated and it is proved that a fuzzy subgroup is normal if and only if the operation of the group is compatible with its associated fuzzy equivalence relation.", "In the de-nition of fuzzy subgroup only the subset is fuzzy whilst the group operation remains crisp.", "In an opposite direction, another structure can be constructed maintaining crisp the basic set X of the group and fuzzifying the group operation.", "When in addition it is imposed to the fuzzy operation to be compatible with a given fuzzy equivalence relation, this structure is called a vague group.", "The results of the paper allow us to associate a vague group to every fuzzy subgroup in such a way that it can be interpreted as the fuzzy quotient group X= .", "Special attention is paid to normal fuzzy groups and vague groups of the additive group (R;+) of the real numbers.", "Two examples related to triangular numbers illustrating the results of the paper are provided.", "c © 2003 Elsevier B.V. All rights reserved." ]
[ 0, 0, 0, 0, 1, 1, 4, 3 ]
[ 0.8140000104904175, 0.5968999862670898, 0.5968999862670898, 0.5929999947547913, 0.6240000128746033, 0.6240000128746033, 0.8140000104904175, 0.5968999862670898 ]
train_1294
[ "Web-based malware is a growing threat to today's Internet security.", "Attacks of this type are prevalent and lead to serious security consequences.", "Millions of malicious URLs are used as distribution channels to propagate malware all over the Web.", "After being infected, victim systems fall in the control of attackers, who can utilize them for various cyber crimes such as stealing credentials, spamming, and distributed denial-of-service attacks.", "Moreover, it has been observed that traditional security technologies such as firewalls and intrusion detection systems have only limited capability to mitigate this new problem.", "In this article, we survey the state-of-the-art research regarding the analysis of—and defense against—Web-based malware attacks.", "First, we study the attack model, the root cause, and the vulnerabilities that enable these attacks.", "Second, we analyze the status quo of the Web-based malware problem.", "Third, three categories of defense mechanisms are discussed in detail: (1) building honeypots with virtual machines or signature-based detection system to discover existing threats; (2) using code analysis and testing techniques to identify the vulnerabilities of Web applications; and (3) constructing reputation-based blacklists or smart sandbox systems to protect end-users from attacks.", "We show that these three categories of approaches form an extensive solution space to the Web-based malware problem." ]
[ 0, 0, 0, 1, 1, 1, 4, 4, 4, 4 ]
[ 1, 0.833299994468689, 1, 0.6111000180244446, 0.7778000235557556, 0.6111000180244446, 0.44440001249313354, 0.6111000180244446, 0.44440001249313354, 0.666700005531311 ]
train_1295
[ "Othello is a recent addition to the collection of games that have been examined within artificial intelligence.", "Advances have been rapid, yielding programs that have reached the level of world-championship play.", "This article describes the current champion Othello program, Iago.", "The work described here includes: (1) a task analysis of Othello; (2) the implemenation of a program based on this analysis and state-of-the-art AI gameplaying techniques; and (3) an evaluation of the program's performance through games played against other programs and comparisons with expert human play.", "This research was sponsored by the Defense Advanced Research Projects Agency (DOD) , ARPA Order N o .", "3597, monitored by the Air Force Avionics Laboratory Under Contract F33615-78-C-1551.", "The views and conclusions contained in this document are those of the author and should not be interpreted as representing the official policies, either expressed or implied, of the Defense Advanced Research Projects Agency or the US Government .", "Table of" ]
[ 0, 0, 2, 2, 1, 1, 4, 3 ]
[ 0.8278999924659729, 0.6310999989509583, 0.6310999989509583, 0.4016000032424927, 0.5983999967575073, 0.5983999967575073, 0.45899999141693115, 0.8278999924659729 ]
train_1296
[ "This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplete information and stochastic elements.", "The resulting game is an adversarial sequential decision making problem played with two agents, the attacker and defender.", "The two agents pit one reinforcement learning technique, like neural networks, Monte Carlo learning and Q-learning, against each other and examine their effectiveness against learning opponents.", "The results showed that Monte Carlo learning with the Softmax exploration strategy is most effective in performing the defender role and also for learning attacking strategies." ]
[ 2, 2, 1, 4 ]
[ 0.571399986743927, 0.4000000059604645, 0.800000011920929, 0.800000011920929 ]
train_1297
[ "We present a new image-based, post-processing antialiasing technique, which offers practical solutions to the common, open problems of existing filter-based real-time antialiasing algorithms.", "Some of the new features include local contrast analysis for more reliable edge detection, and a simple and effective way to handle sharp geometric features and diagonal lines.", "This, along with our accelerated and accurate pattern classification allows for a better reconstruction of silhouettes.", "Our method shows for the first time how to combine morphological antialiasing (MLAA) with additional multi/supersampling strategies (MSAA, SSAA) for accurate subpixel features, and how to couple it with temporal reprojection; always preserving the sharpness of the image.", "All these solutions combine synergies making for a very robust technique,", "yielding results of better overall quality than previous approaches while more closely converging to MSAA/SSAA references but maintaining extremely fast execution times.", "Additionally, we propose different presets to better fit the available resources or particular needs of each scenario." ]
[ 0, 0, 1, 1, 1, 4, 4 ]
[ 0.583299994468689, 0.583299994468689, 0.41670000553131104, 0.7778000235557556, 0.583299994468689, 0.6388999819755554, 0.6388999819755554 ]
train_1298
[ "We present a hybrid neural-network for human face recognition which compares favourably with other methods.", "The system combines local image sampling, a self-organizing map (SOM) neural network, and a convolutional neural network.", "The SOM provides a quantization of the image samples into a topological space where inputs that are nearby in the original space are also nearby in the output space, thereby providing dimensionality reduction and invariance to minor changes in the image sample, and the convolutional neural network provides partial invariance to translation, rotation, scale, and deformation.", "The convolutional network extracts successively larger features in a hierarchical set of layers.", "We present results using the Karhunen-Loeve transform in place of the SOM, and a multilayer perceptron (MLP) in place of the convolutional network for comparison.", "We use a database of 400 images of 40 individuals which contains quite a high degree of variability in expression, pose, and facial details.", "We analyze the computational complexity and discuss how new classes could be added to the trained recognizer." ]
[ 1, 1, 1, 1, 4, 4, 4 ]
[ 0.41670000553131104, 0.6388999819755554, 0.833299994468689, 0.833299994468689, 0.6111000180244446, 0.6111000180244446, 0.7778000235557556 ]
train_1299
[ "In this paper, we presented a real-time 2D human gesture grading system from monocular images based on OpenPose, a library for real-time multi-person keypoint detection.", "After capturing 2D positions of a person's joints and skeleton wireframe of the body, the system computed the equation of motion trajectory for every joint.", "Similarity metric was defined as distance between motion trajectories of standard and real-time videos.", "A modifiable scoring formula was used for simulating the gesture grading scenario.", "Experimental results showed that the system worked efficiently with high real-time performance, low cost of equipment and strong robustness to the interference of noise." ]
[ 0, 1, 4, 1, 4 ]
[ 0.40540000796318054, 0.3783999979496002, 0.40540000796318054, 0.5676000118255615, 0.7838000059127808 ]