abstract_id
stringlengths
10
10
sentences
list
labels
list
confs
list
train_1400
[ "Abs t r ac t .", "The PKZIP program is one of the more widely used archive/ compression programs on personM, computers.", "It also has many compatible variants on other computers~ and is used by most BBS's and ftp sites to compress their archives.", "PKZIP provides a stream cipher which allows users to scramble files with variable length keys (passwords).", "In this paper we describe a known pla.intext attack on this cipher, which can find the internal representation of the key within a few hours on a personal computer using a few hundred bytes of known plaintext.", "In many cases, the actual user keys can also be found from the internal representation.", "We conclude that the PKZIP cipher is weak, and should not be used to protect valuable data." ]
[ 3, 0, 0, 0, 1, 4, 4 ]
[ 0.7894999980926514, 1, 0.6053000092506409, 0.6053000092506409, 0.6053000092506409, 0.39469999074935913, 1 ]
train_1401
[ "Will reading habit influence your life?", "Many say yes.", "Reading fuzzy logic and neural network handbook is a good habit; you can develop this habit to be such interesting way.", "Yeah, reading habit will not only make you have any favourite activity.", "It will be one of guidance of your life.", "When reading has become a habit, you will not make it as disturbing activities or as boring activity.", "You can gain many benefits and importances of reading." ]
[ 0, 0, 2, 1, 1, 4, 4 ]
[ 0.8158000111579895, 0.8158000111579895, 0.421099990606308, 0.5788999795913696, 0.7894999980926514, 0.39469999074935913, 0.421099990606308 ]
train_1402
[ "Dynamic difficulty adjustment (DDA) is a technique for adaptively changing a game to make it easier or harder.", "A common paradigm to achieve DDA is through heuristic prediction and intervention, adjusting game difficulty once undesirable player states (e.g., boredom or frustration) are observed.", "Without quantitative objectives, it is impossible to optimize the strength of intervention and achieve the best effectiveness.", "In this paper, we propose a DDA framework with a global optimization objective of maximizing a player’s engagement throughout the entire game.", "Using level-based games as our example, we model a player’s progression as a probabilistic graph.", "Dynamic difficulty reduces to optimizing transition probabilities to maximize a player’s stay time in the progression graph.", "We have successfully developed a system that applies this technique in multiple games by Electronic Arts, Inc., and have observed up to 9% improvement in player engagement with a neutral impact on monetization." ]
[ 0, 0, 2, 2, 1, 3, 4 ]
[ 0.8278999924659729, 0.5983999967575073, 0.5983999967575073, 0.7705000042915344, 1, 0.22949999570846558, 0.8278999924659729 ]
train_1403
[ "An extensive review on warehouse operation planning problems is presented.", "The problems are classified according to the basic warehouse functions, i.e., receiving, storage, order picking, and shipping.", "The literature in each category is summarized with an emphasis on the characteristics of various decision support models and solution algorithms.", "The purpose is to provide a bridge between academic researchers and warehouse practitioners, explaining what planning models and methods are currently available for warehouse operations, and what are the future research opportunities.", "2006 Elsevier B.V. All rights reserved." ]
[ 0, 2, 1, 2, 3 ]
[ 1, 0.41179999709129333, 0.41179999709129333, 0.5881999731063843, 0.5881999731063843 ]
train_1404
[ "Learning to solve complex sequences of tasks—while both leveraging transfer and avoiding catastrophic forgetting—remains a key obstacle to achieving human-level intelligence.", "The progressive networks approach represents a step forward in this direction: they are immune to forgetting and can leverage prior knowledge via lateral connections to previously learned features.", "We evaluate this architecture extensively on a wide variety of reinforcement learning tasks (Atari and 3D maze games), and show that it outperforms common baselines based on pretraining and finetuning.", "Using a novel sensitivity measure, we demonstrate that transfer occurs at both low-level sensory and high-level control layers of the learned policy." ]
[ 0, 1, 1, 4 ]
[ 0.7778000235557556, 0.44440001249313354, 0.41670000553131104, 0.6111000180244446 ]
train_1405
[ "This paper presents the experimental evaluation of a Bluetooth-based positioning system.", "The method has been implemented in a Bluetooth-capable handheld device.", "Empirical tests of the developed considered positioning system have been realized in different indoor scenarios.", "The range estimation of the positioning system is based on an approximation of the relation between the RSSI (Radio Signal Strength Indicator) and the associated distance between sender and receiver.", "The actual location estimation is carried out by using the triangulation method.", "The implementation of the positioning system in a PDA (Personal Digital Assistant) has been realized by using the Software “Microsoft eMbedded Visual C++ Version 3.0”." ]
[ 0, 0, 1, 1, 1, 4 ]
[ 0.8055999875068665, 0.583299994468689, 0.583299994468689, 0.41670000553131104, 1, 0.6388999819755554 ]
train_1406
[ "Received: 8 February 2006 Revised: 31 March 2006 Accepted: 13 April 2006 Online publication date: 22 June 2006 Abstract", "In this article, Novak's concept mapping technique is compared to three other types of visualization formats, namely mind maps, conceptual diagrams, and visual metaphors.", "The application parameters and the respective advantages and disadvantages of each format for learning and knowledge sharing are reviewed and discussed.", "It is argued that the combination of these four visualization types can play to the strength of each one.", "The article then provides real-life examples from such a use in undergraduate and graduate university teaching.", "The results provide first indications that the different visualization formats can be used in complementary ways to enhance motivation, attention, understanding and recall.", "The implications for a complementary use of these visualization formats in class room and meeting contexts are discussed and a future research agenda in this domain is articulated.", "Information Visualization (2006) 5, 202--210.", "doi:10.1057/palgrave.ivs.9500131" ]
[ 0, 0, 1, 1, 0, 0, 4, 3, 3 ]
[ 0.5896999835968018, 0.3846000134944916, 0.41029998660087585, 0.41029998660087585, 0.5896999835968018, 0.41029998660087585, 0.41029998660087585, 0.5896999835968018, 0.7949000000953674 ]
train_1407
[ "Demand for business intelligence solutions continues to grow in the industry at record rates to combat competitive pressures and to attain business agility.", "Still organizations continue to struggle on how to implement successful business intelligence solutions.", "Despite its growing popularity and maturity as a field, it appears that organizations follow key guidelines that ensure the failure of their business intelligence implementation.", "This paper highlights ten major principles that organizations follow to ensure the failure of their BI solution and in so doing describes how to avoid BI failure in terms of strategy and design, implementation management and communication, and technology and resource investment for BI solutions.", "DOI: 10.4018/978-1-4666-2650-8.ch016" ]
[ 0, 2, 2, 1, 3 ]
[ 0.5896999835968018, 0.6154000163078308, 0.41029998660087585, 0.41029998660087585, 1 ]
train_1408
[ "Mass media sources, specifically the news media, have traditionally informed us of daily events.", "In modern times, social media services such as Twitter provide an enormous amount of user-generated data, which have great potential to contain informative news-related content.", "For these resources to be useful, we must find a way to filter noise and only capture the content that, based on its similarity to the news media, is considered valuable.", "However, even after noise is removed, information overload may still exist in the remaining data—hence, it is convenient to prioritize it for consumption.", "To achieve prioritization, information must be ranked in order of estimated importance considering three factors.", "First, the temporal prevalence of a particular topic in the news media is a factor of importance, and can be considered the media focus (MF) of a topic.", "Second, the temporal prevalence of the topic in social media indicates its user attention (UA).", "Last, the interaction between the social media users who mention this topic indicates the strength of the community discussing it, and can be regarded as the user interaction (UI) toward the topic.", "We propose an unsupervised framework—SociRank—which identifies news topics prevalent in both social media and the news media, and then ranks them by relevance using their degrees of MF, UA, and UI.", "Our experiments show that SociRank improves the quality and variety of automatically identified news topics." ]
[ 0, 0, 0, 2, 1, 1, 1, 1, 1, 4 ]
[ 0.8108000159263611, 0.8108000159263611, 0.6215999722480774, 0.40540000796318054, 1, 1, 1, 1, 0.6215999722480774, 0.8108000159263611 ]
train_1409
[ "Synthesizing high-quality images from text descriptions is a challenging problem in computer vision and has many practical applications.", "Samples generated by existing textto- image approaches can roughly reflect the meaning of the given descriptions, but they fail to contain necessary details and vivid object parts.", "In this paper, we propose Stacked Generative Adversarial Networks (StackGAN) to generate 256.256 photo-realistic images conditioned on text descriptions.", "We decompose the hard problem into more manageable sub-problems through a sketch-refinement process.", "The Stage-I GAN sketches the primitive shape and colors of the object based on the given text description, yielding Stage-I low-resolution images.", "The Stage-II GAN takes Stage-I results and text descriptions as inputs, and generates high-resolution images with photo-realistic details.", "It is able to rectify defects in Stage-I results and add compelling details with the refinement process.", "To improve the diversity of the synthesized images and stabilize the training of the conditional-GAN, we introduce a novel Conditioning Augmentation technique that encourages smoothness in the latent conditioning manifold.", "Extensive experiments and comparisons with state-of-the-arts on benchmark datasets demonstrate that the proposed method achieves significant improvements on generating photo-realistic images conditioned on text descriptions." ]
[ 0, 0, 2, 1, 1, 1, 1, 1, 4 ]
[ 1, 1, 0.7838000059127808, 0.7838000059127808, 0.8108000159263611, 0.8108000159263611, 0.8108000159263611, 0.5946000218391418, 0.7838000059127808 ]
train_1410
[ "We propose a deep learning method for single image super-resolution (SR).", "Our method directly learns an end-to-end mapping between the low/high-resolution images.", "The mapping is represented as a deep convolutional neural network (CNN) that takes the low-resolution image as the input and outputs the high-resolution one.", "We further show that traditional sparse-coding-based SR methods can also be viewed as a deep convolutional network.", "But unlike traditional methods that handle each component separately, our method jointly optimizes all layers.", "Our deep CNN has a lightweight structure, yet demonstrates state-of-the-art restoration quality, and achieves fast speed for practical on-line usage.", "We explore different network structures and parameter settings to achieve trade-offs between performance and speed.", "Moreover, we extend our network to cope with three color channels simultaneously, and show better overall reconstruction quality." ]
[ 1, 1, 1, 1, 1, 2, 4, 4 ]
[ 0.5472000241279602, 0.5472000241279602, 0.4528000056743622, 1, 1, 0.3490999937057495, 0.5755000114440918, 0.6226000189781189 ]
train_1411
[ "We extend continuous assurance research by proposing a novel continuous assurance architecture grounded in information fusion research.", "Existing continuous assurance architectures focus primarily on methods of monitoring assurance clients’ systems to detect anomalous activities and have not addressed the question of how to process the detected anomalies.", "Consequently, actual implementations of these systems typically detect a large number of anomalies, with the resulting information overload leading to suboptimal decision making due to human information processing limitations.", "The proposed architecture addresses these issues by performing anomaly detection, aggregation and evaluation.", "Within the proposed architecture, artifacts developed in prior continuous assurance, ontology, and artificial intelligence research are used to perform the detection, aggregation and evaluation information fusion tasks.", "The architecture contributes to the academic continuous assurance literature and has implications for practitioners involved in the development of more robust and useful continuous assurance systems." ]
[ 0, 0, 1, 0, 1, 1 ]
[ 1, 0.39469999074935913, 0.39469999074935913, 0.39469999074935913, 0.39469999074935913, 0.3684000074863434 ]
train_1412
[ "This paper describes AutoMashUpper, an interactive system for creating music mashups by automatically selecting and mixing multiple songs together.", "Given a userspecified input song, the system first identifies the phraselevel structure and then estimates the “mashability” between each phrase section of the input and songs in the user’s music collection.", "Mashability is calculated based on the harmonic similarity between beat synchronous chromagrams over a user-definable range of allowable key shifts and tempi.", "Once a match in the collection for a given section of the input song has been found, a pitch-shifting and time-stretching algorithm is used to harmonically and temporally align the sections, after which the loudness of the transformed section is modified to ensure a balanced mix.", "AutoMashUpper has a user interface to allow visualisation and manipulation of mashups.", "When creating a mashup, users can specify a list of songs to choose from, modify the mashability parameters and change the granularity of the phrase segmentation.", "Once created, users can also switch, add, or remove sections from the mashup to suit their taste.", "In this way, AutoMashUpper can assist users to actively create new music content by enabling and encouraging them to explore the mashup space." ]
[ 0, 2, 1, 1, 1, 1, 1, 1 ]
[ 0.771399974822998, 0.428600013256073, 0.628600001335144, 0.6571000218391418, 0.800000011920929, 0.571399986743927, 0.4571000039577484, 0.4571000039577484 ]
train_1413
[ "The paper presents a survey and analysis on the current status and concerns of Internet of things (IoT) security.", "The IoT framework aspires to connect anyone with anything at anywhere.", "IoT typically has a three layers architecture consisting of Perception, Network, and Application layers.", "A number of security principles should be enforced at each layer to achieve a secure IoT realization.", "The future of IoT framework can only be ensured if the security issues associated with it are addressed and resolved.", "Many researchers have attempted to address the security concerns specific to IoT layers and devices by implementing corresponding countermeasures.", "This paper presents an overview of security principles, technological and security challenges, proposed countermeasures, and the future directions for securing the IoT." ]
[ 0, 2, 1, 4, 1, 1, 4 ]
[ 0.6105999946594238, 0.39820000529289246, 0.3628000020980835, 0.42480000853538513, 0.5752000212669373, 0.39820000529289246, 0.42480000853538513 ]
train_1414
[ "The rapid growth in IT in the last two decades has led to a growth in the amount of information available online.", "A new style for sharing information is social media.", "Social media is a continuously instantly updated source of information.", "In this position paper, we propose a framework for Information Extraction (IE) from unstructured user generated contents on social media.", "The framework proposes solutions to overcome the IE challenges in this domain such as the short context, the noisy sparse contents and the uncertain contents.", "To overcome the challenges facing IE from social media, State-Of-The-Art approaches need to be adapted to suit the nature of social media posts.", "The key components and aspects of our proposed framework are noisy text filtering, named entity extraction, named entity disambiguation, feedback loops, and uncertainty handling." ]
[ 0, 0, 0, 2, 1, 1, 4 ]
[ 0.7828999757766724, 0.5968999862670898, 0.5968999862670898, 0.8140000104904175, 0.4341000020503998, 0.7828999757766724, 0.4341000020503998 ]
train_1415
[ "Security is one of the principal and continuing concerns that restrict customers and organizations engaging with e-commerce.", "The aim of this paper is to explore the perception of security in e-commerce B2C and C2C websites from both customer and organisational perspectives.", "It explores factors that influence customers- perceptions of security.", "It also highlights conflicts between customer concerns with respect to security and those of an organization; existing research has not highlighted this issue greatly.", "This research provides a better understanding of customer needs and priorities on the subject of security, and enriches the currently available security perception literature, by providing new insights from empirical research conducted in Jordan.", "A qualitative research approach was adopted, since the research seeks an understanding of human (i.e., customer and organisational employee) perceptions." ]
[ 0, 2, 1, 1, 4, 4 ]
[ 1, 0.6111000180244446, 0.44440001249313354, 0.666700005531311, 0.6111000180244446, 0.6111000180244446 ]
train_1416
[ "Case research has commanded respect in the information systems (IS) discipline for at least a decade.", "Notwithstanding the relevance and potential value of case studies, this methodological approach was once considered to be one of the least systematic.", "Toward the end of the 1980s, the issue of whether IS case research was rigorously conducted was first raised.", "Researchers from our field (e.g., Benbasat et al. 1987; Lee 1989) and from other disciplines (e.g., Eisenhardt 1989; Yin 1994) called for more rigor in case research and, through theirrecommendations, contributed to the advancement of the case study methodology.", "Considering these contributions, the present study seeks to determine the extent to which the field of IS has advanced in its operational use of case study method.", "Precisely, it investigates the level of methodological rigor in positivist IS case research conducted over the past decade.", "To fulfill this objective, we identified and coded 183 case articles from seven major IS journals.", "Evaluation attributes or criteria considered in the present review focus on three main areas, namely, design issues, data collection, and data analysis.", "While the level of methodological rigor has experienced modest progress with respect to some specific attributes, the overall assessed rigor is somewhat equivocal and there are still significant areas for improvement.", "One of the keys is to include better documentation particularly regarding issues related to the data collection and" ]
[ 0, 0, 0, 0, 2, 2, 2, 1, 1, 4 ]
[ 1, 1, 0.8158000111579895, 0.8158000111579895, 0.6053000092506409, 0.5160999894142151, 0.6053000092506409, 0.6053000092506409, 0.5160999894142151, 0.8158000111579895 ]
train_1417
[ "Downloading the book in this website lists can give you more advantages.", "It will show you the best book collections and completed collections.", "So many books can be found in this website.", "So, this is not only this multiple view geometry in computer vision.", "However, this book is referred to read because it is an inspiring book to give you more chance to get experiences and also thoughts.", "This is simple, read the soft file of the book and you get it." ]
[ 0, 2, 0, 1, 4, 4 ]
[ 0.6053000092506409, 0.6053000092506409, 0.5788999795913696, 0.3684000074863434, 0.39469999074935913, 0.39469999074935913 ]
train_1418
[ "Traditional approaches to the task of ACE event extraction primarily rely on elaborately designed features and complicated natural language processing (NLP) tools.", "These traditional approaches lack generalization, take a large amount of human effort and are prone to error propagation and data sparsity problems.", "This paper proposes a novel event-extraction method, which aims to automatically extract lexical-level and sentence-level features without using complicated NLP tools.", "We introduce a word-representation model to capture meaningful semantic regularities for words and adopt a framework based on a convolutional neural network (CNN) to capture sentence-level clues.", "However, CNN can only capture the most important information in a sentence and may miss valuable facts when considering multiple-event sentences.", "We propose a dynamic multi-pooling convolutional neural network (DMCNN), which uses a dynamic multi-pooling layer according to event triggers and arguments, to reserve more crucial information.", "The experimental results show that our approach significantly outperforms other state-of-the-art methods." ]
[ 0, 0, 2, 2, 2, 1, 4 ]
[ 1, 0.7894999980926514, 0.5788999795913696, 0.39469999074935913, 0.5, 0.7894999980926514, 0.7894999980926514 ]
train_1419
[ "Test case prioritization involves scheduling test cases in an order that increases their effectiveness in meeting some performance goals.", "One of the common performance goals is to run those test cases that achieve total code coverage at the earliest.", "In this work we propose a model that achieves 100% code coverage optimally during version specific regression testing." ]
[ 1, 2, 1 ]
[ 0.4000000059604645, 0.428600013256073, 0.428600013256073 ]
train_1420
[ "The diagnosis and treatment of malaria infection requires detecting the presence of the malaria parasite in the patient as well as identification of the parasite species.", "We present an image processing-based approach to detect parasites in microscope images of a blood smear and an ontology-based classification of the stage of the parasite for identifying the species of infection.", "This approach is patterned after the diagnosis approach adopted by a pathologist for visual examination, and hence, is expected to deliver similar results.", "We formulate several rules based on the morphology of the basic components of a parasite, namely, chromatin dot(s) and cytoplasm, to identify the parasite stage and species.", "Numerical results are presented for data taken from various patients.", "A sensitivity of 88% and a specificity of 95% is reported by evaluation of the scheme on 55 images." ]
[ 0, 2, 1, 1, 4, 4 ]
[ 0.44440001249313354, 0.44440001249313354, 0.6388999819755554, 0.6388999819755554, 0.41670000553131104, 0.7778000235557556 ]
train_1421
[ "We propose a novel multi-sensor system for accurate and power-efficient dynamic car-driver hand-gesture recognition, using a short-range radar, a color camera, and a depth camera, which together make the system robust against variable lighting conditions.", "We present a procedure to jointly calibrate the radar and depth sensors.", "We employ convolutional deep neural networks to fuse data from multiple sensors and to classify the gestures.", "Our algorithm accurately recognizes 10 different gestures acquired indoors and outdoors in a car during the day and at night.", "It consumes significantly less power than purely vision-based systems." ]
[ 0, 2, 1, 1, 4 ]
[ 0.800000011920929, 0.428600013256073, 0.6571000218391418, 0.628600001335144, 0.4571000039577484 ]
train_1422
[ "Read more and get great!", "That's what the book enPDFd probability and statistics with reliability queuing and computer science applications will give for every reader to read this book.", "This is an on-line book provided in this website.", "Even this book becomes a choice of someone to read, many in the world also loves it so much.", "As what we talk, when you read more every page of this probability and statistics with reliability queuing and computer science applications, what you will obtain is something great." ]
[ 3, 2, 0, 2, 2 ]
[ 0.428600013256073, 0.6000000238418579, 0.6000000238418579, 0.6000000238418579, 0.628600001335144 ]
train_1423
[ "In this paper it is shown that the principal eigenvector is a necessary representation of the priorities derived from a positive reciprocal pairwise comparison judgment matrix A 1⁄4 ðaijÞ when A is a small perturbation of a consistent matrix.", "When providing numerical judgments, an individual attempts to estimate sequentially an underlying ratio scale and its equivalent consistent matrix of ratios.", "Near consistent matrices are essential because when dealing with intangibles, human judgment is of necessity inconsistent, and if with new information one is able to improve inconsistency to near consistency, then that could improve the validity of the priorities of a decision.", "In addition, judgment is much more sensitive and responsive to large rather than to small perturbations, and hence once near consistency is attained, it becomes uncertain which coefficients should be perturbed by small amounts to transform a near consistent matrix to a consistent one.", "If such perturbations were forced, they could be arbitrary and thus distort the validity of the derived priority vector in representing the underlying decision.", "2002 Elsevier Science B.V. All rights reserved." ]
[ 0, 0, 0, 0, 1, 3 ]
[ 0.8072999715805054, 0.8072999715805054, 0.8072999715805054, 0.5871999859809875, 0.6330000162124634, 0.6330000162124634 ]
train_1424
[ "Spatial data mining is the discovery of interesting relationships and characteristics that may exist implicitly in spatial databases.", "To this end, this paper has three main contributions.", "First, we propose a new clustering method called CLARANS, whose aim is to identify spatial structures that may be present in the data.", "Experimental results indicate that, when compared with existing clustering methods, CLARANS is very efficient and effective.", "Second, we investigate how CLARANS can handle not only points objects, but also polygon objects efficiently.", "One of the methods considered, called the IR-approximation, is very efficient in clustering convex and nonconvex polygon objects.", "Third, building on top of CLARANS, we develop two spatial data mining algorithms that aim to discover relationships between spatial and nonspatial attributes.", "Both algorithms can discover knowledge that is difficult to find with existing spatial data mining algorithms." ]
[ 0, 2, 1, 4, 1, 1, 1, 4 ]
[ 0.7838000059127808, 0.5946000218391418, 0.7838000059127808, 0.5171999931335449, 0.8108000159263611, 1, 1, 0.6215999722480774 ]
train_1425
[ "In this work we introduce a novel solution to the semantic image labelling problem, i.e. the task of assigning semantic object class labels to individual pixels in a test image.", "Conventional methods are typically relying on random fields for modelling interactions between neighboring pixels and obtaining smooth labelling results using unary and pairwise cost functions.", "Instead, we consider the labelling problem as a puzzle game, where the final labelling is obtained by assembling discriminatively learned candidate sets of label puzzle pieces, each representing a topological and semantically plausible label configuration.", "The puzzle game is set up by means of a modified random forest classifier, designed to learn the local, topological label-structure and hence the local context associated to the training data.", "To solve the puzzle game we propose an iterative optimization technique that maximizes an agreement function by alternatingly seeking for the best label puzzle piece per pixel and the resulting semantic labelling per image.", "We provide both, theoretical properties of our puzzle solver algorithm as well as experimental results on the challenging MSRC and CamVid databases.", "In a direct comparison with a conditional random field we obtain superior results, indicating the practicability of our proposed method." ]
[ 2, 1, 1, 1, 1, 1, 4 ]
[ 0.5555999875068665, 0.5555999875068665, 0.5555999875068665, 0.7778000235557556, 0.6388999819755554, 0.5555999875068665, 0.7778000235557556 ]
train_1426
[ "Convolutional neural network (CNN) has been widely employed for image recognition because it can achieve high accuracy by emulating behavior of optic nerves in living creatures.", "Recently, rapid growth of modern applications based on deep learning algorithms has further improved research and implementations.", "Especially, various accelerators for deep CNN have been proposed based on FPGA platform because it has advantages of high performance, reconfigurability, and fast development round, etc.", "Although current FPGA accelerators have demonstrated better performance over generic processors, the accelerator design space has not been well exploited.", "One critical problem is that the computation throughput may not well match the memory bandwidth provided an FPGA platform.", "Consequently, existing approaches cannot achieve best performance due to under-utilization of either logic resource or memory bandwidth.", "At the same time, the increasing complexity and scalability of deep learning applications aggravate this problem.", "In order to overcome this problem, we propose an analytical design scheme using the roofline model.", "For any solution of a CNN design, we quantitatively analyze its computing throughput and required memory bandwidth using various optimization techniques, such as loop tiling and transformation.", "Then, with the help of rooine model, we can identify the solution with best performance and lowest FPGA resource requirement." ]
[ 0, 0, 0, 0, 0, 0, 0, 2, 1, 1 ]
[ 1, 0.7894999980926514, 0.7894999980926514, 0.7894999980926514, 0.3684000074863434, 0.3684000074863434, 0.5788999795913696, 0.5788999795913696, 0.5788999795913696, 0.5788999795913696 ]
train_1427
[ "The main contribution of our work is in combining the methods for parametric urban design of highly specialized software such as CityEngine and general-purpose parametric modeling platform such as Grasshopper.", "Our work facilitates and prompts the use of parametric tools by architects and planners for urban design.", "In this paper we present a custom grasshopper component for street network generation and block subdivision.", "The component was developed in C# using the RhinoCommon SDK.", "We used Grasshopper for the development of an urban design proposal at a teaching exercise.", "To meet the requirements of the urban design project, additional functionalities had to be added to the range of existing Grasshopper components.", "In particular, we needed components for street network generation and block subdivision.", "To develop the component we implemented the street expansion strategies described in (Weber et al., 2009) and the methods for block subdivision described in (Vanegas et al., 2009).", "Additionally, we adapted and enhanced the strategies to meet the NURBS modeling capabilities of Rhinoceros." ]
[ 1, 2, 0, 4, 1, 1, 1, 1, 1 ]
[ 0.5676000118255615, 0.2759000062942505, 0.4323999881744385, 0.40540000796318054, 0.5946000218391418, 0.3783999979496002, 0.6215999722480774, 0.7838000059127808, 0.40540000796318054 ]
train_1428
[ "This study aimed to verify whether achieving a dist inctive academic performance is unlikely for students at high risk of smartphone addiction.", "Additionally, it verified whether this phenomenon was equally applicable to male and femal e students.", "After implementing systematic random sampling, 293 university students participated by completing an online survey questionnaire posted on the university’s stu dent information system.", "The survey questionnaire collected demographic information and responses to the Smartphone Addiction Scale-Short Version (SAS-SV) items.", "The results sho wed that male and female university students were equally susceptible to smartphone add iction.", "Additionally, male and female university students were equal in achieving cumulat ive GPAs with distinction or higher within the same levels of smartphone addiction.", "Fur thermore, undergraduate students who were at a high risk of smartphone addiction were le ss likely to achieve cumulative GPAs of distinction or higher." ]
[ 2, 1, 4, 1, 4, 4, 4 ]
[ 0.6154000163078308, 0.5896999835968018, 0.41029998660087585, 0.41029998660087585, 1, 1, 1 ]
train_1429
[ "Cellular systems of the fourth generation (4G) have been optimized to provide high data rates and reliable coverage to mobile users.", "Cellular systems of the next generation will face more diverse application requirements: the demand for higher data rates exceeds 4G capabilities; battery-driven communication sensors need ultra-low power consumption; and control applications require very short response times.", "We envision a unified physical layer waveform, referred to as generalized frequency division multiplexing (GFDM), to address these requirements.", "In this paper, we analyze the main characteristics of the proposed waveform and highlight relevant features.", "After introducing the principles of GFDM, this paper contributes to the following areas: 1) the means for engineering the waveform's spectral properties; 2) analytical analysis of symbol error performance over different channel models; 3) concepts for MIMO-GFDM to achieve diversity; 4) preamble-based synchronization that preserves the excellent spectral properties of the waveform; 5) bit error rate performance for channel coded GFDM transmission using iterative receivers; 6) relevant application scenarios and suitable GFDM parameterizations; and 7) GFDM proof-of-concept and implementation aspects of the prototype using hardware platforms available today.", "In summary, the flexible nature of GFDM makes this waveform a suitable candidate for future 5G networks." ]
[ 0, 0, 0, 2, 0, 4 ]
[ 1, 0.8108000159263611, 0.4323999881744385, 0.6485999822616577, 0.3783999979496002, 0.6215999722480774 ]
train_1430
[ "Compared with depth-based 3D hand pose estimation, it is more challenging to infer 3D hand pose from monocular RGB images, due to substantial depth ambiguity and the difficulty of obtaining fullyannotated training data.", "Different from existing learning-based monocular RGB-input approaches that require accurate 3D annotations for training, we propose to leverage the depth images that can be easily obtained from commodity RGB-D cameras during training, while during testing we take only RGB inputs for 3D joint predictions.", "In this way, we alleviate the burden of the costly 3D annotations in real-world dataset.", "Particularly, we propose a weakly-supervised method, adaptating from fully-annotated synthetic dataset to weakly-labeled real-world dataset with the aid of a depth regularizer, which generates depth maps from predicted 3D pose and serves as weak supervision for 3D pose regression.", "Extensive experiments on benchmark datasets validate the effectiveness of the proposed depth regularizer in both weakly-supervised and fullysupervised settings." ]
[ 0, 0, 2, 2, 4 ]
[ 1, 0.7778000235557556, 0.3889000117778778, 0.33329999446868896, 0.22220000624656677 ]
train_1431
[ "The FlowNet demonstrated that optical flow estimation can be cast as a learning problem.", "However, the state of the art with regard to the quality of the flow has still been defined by traditional methods.", "Particularly on small displacements and real-world data, FlowNet cannot compete with variational methods.", "In this paper, we advance the concept of end-to-end learning of optical flow and make it work really well.", "The large improvements in quality and speed are caused by three major contributions: first, we focus on the training data and show that the schedule of presenting data during training is very important.", "Second, we develop a stacked architecture that includes warping of the second image with intermediate optical flow.", "Third, we elaborate on small displacements by introducing a subnetwork specializing on small motions.", "FlowNet 2.0 is only marginally slower than the original FlowNet but decreases the estimation error by more than 50%.", "It performs on par with state-of-the-art methods, while running at interactive frame rates.", "Moreover, we present faster variants that allow optical flow computation at up to 140fps with accuracy matching the original FlowNet." ]
[ 0, 1, 0, 2, 4, 4, 1, 1, 1, 4 ]
[ 0.7940999865531921, 0.5881999731063843, 0.5881999731063843, 0.6176000237464905, 0.41179999709129333, 0.41179999709129333, 0.41179999709129333, 0.41179999709129333, 0.5881999731063843, 0.5587999820709229 ]
train_1432
[ "This paper presents an FPGA architecture for a new version of the Advanced Encryption Standard (AES) algorithm.", "The efficient hardware that implements the algorithm is also proposed.", "The new algorithm (AES-512) uses input block size and key size of 512-bits which makes it more resistant to cryptanalysis with tolerated area increase.", "AES-512 will be suitable for applications with high security and throughput requirements and with less chip area constrains such as multimedia and satellite communication systems.", "An FPGA architectural for AES-512 was developed using VHDL, and synthesized using Virtix-6 and Virtex-7 chips.", "AES-512 show tremendous throughput increase of 230% when compared with the implementation of the original AES-128." ]
[ 0, 2, 1, 1, 1, 4 ]
[ 0.6413999795913696, 0.7768999934196472, 0.6413999795913696, 0.41830000281333923, 0.41830000281333923, 0.41830000281333923 ]
train_1433
[ "In this paper, we propose STag, a fiducial marker system that provides stable pose estimation.", "The outer square border of the marker is used for detection and pose estimation.", "This is followed by a novel pose refinement step using the inner circular border.", "The refined pose is more stable and robust across viewing conditions compared to the state of the art.", "In addition, the lexicographic generation algorithm is adapted for fiducial markers, and libraries with various sizes are created.", "This makes the system suitable for applications that require many unique markers, or few unique markers with high occlusion resistance.", "The edge segment-based detection algorithm is of low complexity, and returns few false candidates.", "These features are demonstrated with experiments on real images, including comparisons with the state of the art fiducial marker systems." ]
[ 0, 0, 1, 1, 2, 2, 4, 4 ]
[ 0.421099990606308, 0.766700029373169, 0.5788999795913696, 0.6053000092506409, 0.421099990606308, 0.39469999074935913, 0.39469999074935913, 0.8158000111579895 ]
train_1434
[ "A typical bandgap voltage reference based on CSMC 0.35 μm CMOS technology is designed and fabricated.", "The overall bandgap architecture is optimized to achieve high accuracy temperature and power supply independent voltage reference.", "The design consists of the bandgap core circuit, op-amp, and start-up circuit.", "The test results show that the bandgap reference circuit provides reference voltage of 1.2128 V to 1.2175 V with 3.3 V power supply and temperature range from -40°C to 80°C simultaneously, and the temperature coefficient is 32.2ppm/°C.", "The total layout area including dummy structures is 135 um×236 um." ]
[ 2, 1, 2, 4, 4 ]
[ 0.4000000059604645, 0.4000000059604645, 0.5, 0.4000000059604645, 0.800000011920929 ]
train_1435
[ "Deep artificial neural networks (DNNs) are typically trained via gradient-based learning algorithms, namely backpropagation.", "Evolution strategies (ES) can rival backprop-based algorithms such as Q-learning and policy gradients on challenging deep reinforcement learning (RL) problems.", "However, ES can be considered a gradient-based algorithm because it performs stochastic gradient descent via an operation similar to a finite-difference approximation of the gradient.", "That raises the question of whether non-gradient-based evolutionary algorithms can work at DNN scales.", "Here we demonstrate they can: we evolve the weights of a DNN with a simple, gradient-free, population-based genetic algorithm (GA) and it performs well on hard deep RL problems, including Atari and humanoid locomotion.", "The Deep GA successfully evolves networks with over four million free parameters, the largest neural networks ever evolved with a traditional evolutionary algorithm.", "These results (1) expand our sense of the scale at which GAs can operate, (2) suggest intriguingly that in some cases following the gradient is not the best choice for optimizing performance, and (3) make immediately available the multitude of techniques that have been developed in the neuroevolution community to improve performance on RL problems.", "To demonstrate the latter, we show that combining DNNs with novelty search, which was designed to encourage exploration on tasks with deceptive or sparse reward functions, can solve a high-dimensional problem on which reward-maximizing algorithms (e.g. DQN, A3C, ES, and the GA) fail.", "Additionally, the Deep GA parallelizes better than ES, A3C, and DQN, and enables a state-of-the-art compact encoding technique that can represent million-parameter DNNs in thousands of bytes." ]
[ 0, 0, 0, 4, 4, 4, 4, 4, 4 ]
[ 0.8125, 0.5625, 0.5625, 0.5938000082969666, 0.40630000829696655, 0.40630000829696655, 0.8438000082969666, 0.5, 0.5 ]
train_1436
[ "Mechanical devices such as engines, vehicles, aircrafts, etc.", ", are typically instrumented with numerous sensors to capture the behavior and health of the machine.", "However, there are often external factors or variables which are not captured by sensors leading to time-series which are inherently unpredictable.", "For instance, manual controls and/or unmonitored environmental conditions or load may lead to inherently unpredictable time-series.", "Detecting anomalies in such scenarios becomes challenging using standard approaches based on mathematical models that rely on stationarity, or prediction models that utilize prediction errors to detect anomalies.", "We propose a Long Short Term Memory Networks based Encoder-Decoder scheme for Anomaly Detection (EncDec-AD) that learns to reconstruct ‘normal’ time-series behavior, and thereafter uses reconstruction error to detect anomalies.", "We experiment with three publicly available quasi predictable time-series datasets: power demand, space shuttle, and ECG, and two realworld engine datasets with both predictive and unpredictable behavior.", "We show that EncDecAD is robust and can detect anomalies from predictable, unpredictable, periodic, aperiodic, and quasi-periodic time-series.", "Further, we show that EncDec-AD is able to detect anomalies from short time-series (length as small as 30) as well as long time-series (length as large as 500)." ]
[ 0, 0, 0, 0, 1, 1, 1, 1, 4 ]
[ 0.7886999845504761, 0.7886999845504761, 0.6037999987602234, 0.39250001311302185, 0.8188999891281128, 0.8188999891281128, 0.7886999845504761, 0.6037999987602234, 0.6075000166893005 ]
train_1437
[ "The alternative fuel butanol can be produced via acetone-butanol-ethanol (ABE) fermentation from renewable resources, i.e. biomass.", "Expensive feedstocks and the high costs for the separation of ABE from the dilute fermentation broth in the downstream processing have so far prohibited the industrial-scale production of bio-butanol.", "The low productivities and butanol yields of ABE batch fermentation can be increased by continuous fermentation with cell recycle and integrated product removal.", "In order to facilitate an effective and energy-efficient product removal, we suggest to apply a hybrid extraction-distillation process with ABE extraction in an external column.", "The removal of ABE outside the fermenter in an extraction column is favored from an operational point of view.", "By means of computer-aided molecular design (CAMD), mesitylene has been identified as a new solvent for ABE extraction from the fermentation broth.", "The solvent properties of mesitylene are compared to those of oleyl alcohol, which is the most common solvent for ABE extraction.", "Subsequently, we propose a hybrid extraction-distillation downstream process for product removal and purification.", "It is shown that the specific energy demand of this process is significantly lower when mesitylene is used as extraction solvent instead of oleyl alcohol." ]
[ 0, 0, 0, 1, 1, 1, 1, 1, 4 ]
[ 0.7975000143051147, 0.7975000143051147, 0.3840000033378601, 0.6202999949455261, 0.763700008392334, 0.3840000033378601, 0.3797000050544739, 0.41350001096725464, 1 ]
train_1438
[ "Multi-tiered storage, where each tier consists of one type of storage device (e.g., SSD, HDD, or disk arrays), is a commonly used approach to achieve both high performance and cost efficiency in large-scale systems that need to store data with vastly different access characteristics.", "By aligning the access characteristics of the data, either fixed-sized extents or variable-sized files, to the characteristics of the storage devices, a higher performance can be achieved for any given cost.", "This article presents ExaPlan, a method to determine both the data-to-tier assignment and the number of devices in each tier that minimize the system’s mean response time for a given budget and workload.", "In contrast to other methods that constrain or minimize the system load, ExaPlan directly minimizes the system’s mean response time estimated by a queueing model.", "Minimizing the mean response time is typically intractable as the resulting optimization problem is both nonconvex and combinatorial in nature.", "ExaPlan circumvents this intractability by introducing a parameterized data placement approach that makes it a highly scalable method that can be easily applied to exascale systems.", "Through experiments that use parameters from real-world storage systems, such as CERN and LOFAR, it is demonstrated that ExaPlan provides solutions that yield lower mean response times than previous works.", "It supports standalone SSDs and HDDs as well as disk arrays as storage tiers, and although it uses a static workload representation, we provide empirical evidence that underlying dynamic workloads have invariant properties that can be deemed static for the purpose of provisioning a storage system.", "ExaPlan is also effective as a load-balancing tool used for placing data across devices within a tier, resulting in an up to 3.6-fold reduction of response time compared with a traditional load-balancing algorithm, such as the Longest Processing Time heuristic." ]
[ 0, 2, 1, 1, 1, 1, 4, 4, 4 ]
[ 0.6111000180244446, 0.41670000553131104, 0.6111000180244446, 1, 1, 0.583299994468689, 0.22220000624656677, 0.3610999882221222, 1 ]
train_1439
[ "Variable and feature selection have become the focus of much research in areas of application for which datasets with tens or hundreds of thousands of variabl es are available.", "These areas include text processing of internet documents, gene expression arr ay nalysis, and combinatorial chemistry.", "The objective of variable selection is three-fold: improvi ng the prediction performance of the predictors, providing faster and more cost-effective predict ors, and providing a better understanding of the underlying process that generated the data.", "The contrib utions of this special issue cover a wide range of aspects of such problems: providing a better definit ion of the objective function, feature construction, feature ranking, multivariate feature sele ction, efficient search methods, and feature validity assessment methods." ]
[ 0, 0, 2, 2 ]
[ 1, 0.8353999853134155, 0.8353999853134155, 0.4609000086784363 ]
train_1440
[ "We address the problems of contour detection, bottom-up grouping and semantic segmentation using RGB-D data.", "We focus on the challenging setting of cluttered indoor scenes, and evaluate our approach on the recently introduced NYU-Depth V2 (NYUD2) dataset [27].", "We propose algorithms for object boundary detection and hierarchical segmentation that generalize the gPb-ucm approach of [2] by making effective use of depth information.", "We show that our system can label each contour with its type (depth, normal or albedo).", "We also propose a generic method for long-range amodal completion of surfaces and show its effectiveness in grouping.", "We then turn to the problem of semantic segmentation and propose a simple approach that classifies super pixels into the 40 dominant object categories in NYUD2.", "We use both generic and class-specific features to encode the appearance and geometry of objects.", "We also show how our approach can be used for scene classification, and how this contextual information in turn improves object recognition.", "In all of these tasks, we report significant improvements over the state-of-the-art." ]
[ 0, 0, 1, 1, 1, 1, 1, 1, 4 ]
[ 0.4323999881744385, 0.4323999881744385, 0.40540000796318054, 0.5676000118255615, 1, 0.5171999931335449, 0.6215999722480774, 0.6215999722480774, 0.7838000059127808 ]
train_1441
[ "The acceleration in developments in communication technology has led to a consequent increase in the vulnerability of data due to penetration attacks.", "These attacks often came from outside where non-qualified companies develop IT projects.", "Cryptography can offer high levels of security but has recently shown vulnerabilities such as the man-in-the-middle (MITM) attack in areas of key exchange protocols, especially in the Diffie-Hellman (DH) protocol.", "Firstly, this paper presents an overview of MITM attacks targeted at the DH protocol then discusses some of the shortcomings of current defenses.", "A proposed method to secure DH, which helps secure systems against MITM attacks, is then presented.", "This method involves the use of Geffe generation of binary sequences.", "The use of Geffe generator offers high levels of randomness.", "Data hashed and encrypted using this proposed method will be so difficult to intercept and decrypt without the appropriate keys.", "This offers high levels of security and helps prevent MITM attacks." ]
[ 0, 0, 0, 2, 1, 1, 1, 1, 4 ]
[ 1, 1, 0.8205000162124634, 0.5, 0.7949000000953674, 1, 1, 0.5896999835968018, 0.5896999835968018 ]
train_1442
[ "Many CEOs and managers understand the importance of knowledge sharing among their employees and are eager to introduce the knowledge management paradigm in their organizations.", "However little is known about the determinants of the individual’s knowledge sharing behavior.", "The purpose of this study is to develop an understanding of the factors affecting the individual’s knowledge sharing behavior in the organizational context.", "The research model includes various constructs based on social exchange theory, self-efficacy, and theory of reasoned action.", "Research results from the field survey of 467 employees of four large, public organizations show that expected associations and contribution are the major determinants of the individual’s attitude toward knowledge sharing.", "Expected rewards, believed by many as the most important motivating factor for knowledge sharing, are not significantly related to the attitude toward knowledge sharing.", "As expected, positive attitude toward knowledge sharing is found to lead to positive intention to share knowledge and, finally, to actual knowledge sharing behaviors." ]
[ 0, 0, 2, 1, 4, 4, 4 ]
[ 1, 0.5929999947547913, 0.8101000189781189, 0.8101000189781189, 0.5929999947547913, 0.6240000128746033, 0.6240000128746033 ]
train_1443
[ "In this article, a system to detect rooms in architectural floor plan images is described.", "We first present a primitive extraction algorithm for line detection.", "It is based on an original coupling of classical Hough transform with image vectorization in order to perform robust and efficient line detection.", "We show how the lines that satisfy some graphical arrangements are combined into walls.", "We also present the way we detect some door hypothesis thanks to the extraction of arcs.", "Walls and door hypothesis are then used by our room segmentation strategy; it consists in recursively decomposing the image until getting nearly convex regions.", "The notion of convexity is difficult to quantify, and the selection of separation lines between regions can also be rough.", "We take advantage of knowledge associated to architectural floor plans in order to obtain mostly rectangular rooms.", "Qualitative and quantitative evaluations performed on a corpus of real documents show promising results." ]
[ 2, 2, 1, 4, 1, 4, 4, 4, 4 ]
[ 0.41179999709129333, 0.5, 0.7940999865531921, 0.6470999717712402, 0.3824000060558319, 0.44119998812675476, 0.41179999709129333, 0.41179999709129333, 0.5587999820709229 ]
train_1444
[ "Internet and networks applications are growing very fast, so the needs to protect such applications are increased.", "Encryption algorithms play a main role in information security systems.", "On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power.", "This paper provides evaluation of six of the most common encryption algorithms namely: AES (Rijndael), DES, 3DES, RC2, Blowfish, and RC6.", "A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different data types, battery power consumption, different key size and finally encryption/decryption speed.", "Experimental results are given to demonstrate the effectiveness of each algorithm." ]
[ 0, 0, 0, 4, 1, 4 ]
[ 0.7949000000953674, 0.7949000000953674, 0.7949000000953674, 0.41029998660087585, 0.3846000134944916, 0.7949000000953674 ]
train_1445
[ "This paper introduces a generic dynamic programming function for Matlab.", "This function solves discretetime optimal-control problems using Bellman's dynamic programming algorithm.", "The function is implemented such that the user only needs to provide the objective function and the model equations.", "The function includes several options for solving optimal-control problems.", "The model equations can include several state variables and input variables.", "Furthermore, the model equations can be time-variant and include time-variant state and input constraints.", "The syntax of the function is explained using two examples.", "The first is the well-known Lotka-Volterra fishery problem and the second is a parallel hybrid-electric vehicle optimization problem." ]
[ 0, 2, 0, 2, 1, 1, 0, 1 ]
[ 0.7894999980926514, 0.421099990606308, 0.3684000074863434, 0.5788999795913696, 0.631600022315979, 0.421099990606308, 0.421099990606308, 0.631600022315979 ]
train_1446
[ "Current approaches to measuring people's everyday usage of technology-based media and other computer-related activities have proved to be problematic as they use varied outcome measures, fail to measure behavior in a broad range of technology-related domains and do not take into account recently developed types of technology including smartphones.", "In the present study, a wide variety of items, covering a range of up-to-date technology and media usage behaviors.", "Sixty-six items concerning technology and media usage, along with 18 additional items assessing attitudes toward technology, were administered to two independent samples of individuals, comprising 942 participants.", "Factor analyses were used to create 11 usage subscales representing smartphone usage, general social media usage, Internet searching, e-mailing, media sharing, text messaging, video gaming, online friendships, Facebook friendships, phone calling, and watching television in addition to four attitude-based subscales: positive attitudes, negative attitudes, technological anxiety/dependence, and attitudes toward task-switching.", "All subscales showed strong reliabilities and relationships between the subscales and pre-existing measures of daily media usage and Internet addiction were as predicted.", "Given the reliability and validity results, the new Media and Technology Usage and Attitudes Scale was suggested as a method of measuring media and technology involvement across a variety of types of research studies either as a single 60-item scale or any subset of the 15 subscales." ]
[ 0, 0, 1, 2, 2, 4 ]
[ 0.7813000082969666, 0.4375, 0.4375, 0.40630000829696655, 0.4375, 0.8125 ]
train_1447
[ "Roadway traffic safety is a major concern for transportation governing agencies as well as ordinary citizens.", "In order to give safe driving suggestions, careful analysis of roadway traffic data is critical to find out variables that are closely related to fatal accidents.", "In this paper we apply statistics analysis and data mining algorithms on the FARS Fatal Accident dataset as an attempt to address this problem.", "The relationship between fatal rate and other attributes including collision manner, weather, surface condition, light condition, and drunk driver were investigated.", "Association rules were discovered by Apriori algorithm, classification model was built by Naive Bayes classifier, and clusters were formed by simple K-means clustering algorithm.", "Certain safety driving suggestions were made based on statistics, association rules, classification model, and clusters obtained." ]
[ 0, 0, 2, 1, 1, 4 ]
[ 0.8490999937057495, 0.6509000062942505, 0.4244999885559082, 0.4244999885559082, 0.4528000056743622, 0.4244999885559082 ]
train_1448
[ "The ability to recognize emotion is one of the hallmarks of emotional intelligence, an aspect of human intelligence that has been argued to be even more important than mathematical and verbal intelligences.", "This paper proposes that machine intelligence needs to include emotional intelligence and demonstrates results toward this goal: developing a machine's ability to recognize human aaective state given four physiological signals.", "We describe diicult issues unique to obtaining reliable aaective data, and collect a large set of data from a subject trying to elicit and experience each of eight emotional states, daily, over multiple weeks.", "This paper presents and compares multiple algorithms for feature-based recognition of emotional state from this data.", "We analyze four physiological signals that exhibit problematic day-today variations: the features of diierent emotions on the same day tend to cluster more tightly than do the features of the same emotion on diierent days.", "To handle the daily variations, we propose new features and algorithms and compare their performance.", "We nd that the technique of seeding a Fisher Projection with the results of Sequential Floating Forward Search improves the performance of the Fisher Projection, and provides the highest recognition rates reported to date for classiication of aaect from physiology: 81% recognition accuracy on eight classes of emotion, including neutral." ]
[ 0, 2, 1, 1, 1, 1, 4 ]
[ 1, 1, 0.583299994468689, 0.7778000235557556, 0.7778000235557556, 0.7778000235557556, 0.7778000235557556 ]
train_1449
[ "The use of object proposals is an effective recent approach for increasing the computational efficiency of object detection.", "We propose a novel method for generating object bounding box proposals using edges.", "Edges provide a sparse yet informative representation of an image.", "Our main observation is that the number of contours that are wholly contained in a bounding box is indicative of the likelihood of the box containing an object.", "We propose a simple box objectness score that measures the number of edges that exist in the box minus those that are members of contours that overlap the box’s boundary.", "Using efficient data structures, millions of candidate boxes can be evaluated in a fraction of a second, returning a ranked set of a few thousand top-scoring proposals.", "Using standard metrics, we show results that are significantly more accurate than the current state-of-the-art while being faster to compute.", "In particular, given just 1000 proposals we achieve over 96% object recall at overlap threshold of 0.5 and over 75% recall at the more challenging overlap of 0.7.", "Our approach runs in 0.25 seconds and we additionally demonstrate a near real-time variant with only minor loss in accuracy." ]
[ 0, 1, 1, 1, 1, 1, 1, 4, 4 ]
[ 0.8101000189781189, 0.7828999757766724, 0.7828999757766724, 0.7828999757766724, 0.8140000104904175, 0.620199978351593, 0.5929999947547913, 0.5968999862670898, 1 ]
train_1450
[ "Four methods for reviewing a body of research literature – narrative review, descriptive review, vote-counting, and meta-analysis – are compared.", "Meta-analysis as a formalized, systematic review method is discussed in detail in terms of its history, current status, advantages, common analytic methods, and recent developments.", "Meta-analysis is found to be underutilized in IS.", "Suggestions on encouraging the use of metaanalysis in IS research and procedures recommended for meta-analysis are also provided." ]
[ 0, 1, 4, 4 ]
[ 0.5676000118255615, 0.6215999722480774, 0.4323999881744385, 0.4323999881744385 ]
train_1451
[ "Quality uncertainty and high search costs for identifying relevant information from an ocean of information may prevent customers from making purchases.", "Recognizing potential negative impacts of this search cost for quality information and relevant information, firms began to invest in creating a virtual community that enables consumers to share their opinions and experiences to reduce quality uncertainty, and in developing recommendation systems that help customers identify goods in which they might have an interest.", "However, not much is known regarding the effectiveness of these efforts.", "In this paper, we empirically investigate the impacts of recommendations and consumer feedbacks on sales based on data gathered from Amazon.com.", "Our results indicate that more recommendations indeed improve sales at Amazon.com; however, consumer ratings are not found to be related to sales.", "On the other hand, number of consumer reviews is positively associated with sales.", "We also find that recommendations work better for less-popular books than for more-popular books.", "This is consistent with the search cost argument: a consumer’s search cost for less-popular books may be higher, and thus they may rely more on recommendations to locate a product of interest." ]
[ 0, 0, 0, 4, 4, 4, 4, 4 ]
[ 1, 0.6061000227928162, 0.8181999921798706, 0.5454999804496765, 0.33329999446868896, 0.42419999837875366, 0.5357000231742859, 0.4544999897480011 ]
train_1452
[ "Customer reviews are increasingly available online for a wide range of products and services.", "They supplement other information provided by electronic storefronts such as product descriptions, reviews from experts, and personalized advice generated by automated recommendation systems.", "While researchers have demonstrated the benefits of the presence of customer reviews to an online retailer, a largely uninvestigated issue is what makes customer reviews helpful Carol Saunders was the accepting senior editor for this paper.", "Both authors contributed equally to this paper.", "to a consumer in the process of making a purchase decision.", "Drawing on the paradigm of search and experience goods from information economics, we develop and test a model of customer review helpfulness.", "An analysis of 1,587 reviews from Amazon.com across six products indicated that review extremity, review depth, and product type affect the perceived helpfulness of the review.", "Product type moderates the effect of review extremity on the helpfulness of the review.", "For experience goods, reviews with extreme ratings are less helpful than reviews with moderate ratings.", "For both product types, review depth has a positive effect on the helpfulness of the review, but the product type moderates the effect of review depth on the helpfulness of the review." ]
[ 0, 0, 0, 3, 2, 1, 1, 4, 4, 4 ]
[ 1, 1, 1, 0.39469999074935913, 0.39469999074935913, 0.7894999980926514, 0.7894999980926514, 0.39469999074935913, 0.6053000092506409, 0.6053000092506409 ]
train_1453
[ "This paper aims at high-accuracy 3D object detection in autonomous driving scenario.", "We propose Multi-View 3D networks (MV3D), a sensory-fusion framework that takes both LIDAR point cloud and RGB images as input and predicts oriented 3D bounding boxes.", "We encode the sparse 3D point cloud with a compact multi-view representation.", "The network is composed of two subnetworks: one for 3D object proposal generation and another for multi-view feature fusion.", "The proposal network generates 3D candidate boxes efficiently from the birds eye view representation of 3D point cloud.", "We design a deep fusion scheme to combine region-wise features from multiple views and enable interactions between intermediate layers of different paths.", "Experiments on the challenging KITTI benchmark show that our approach outperforms the state-of-the-art by around 25% and 30% AP on the tasks of 3D localization and 3D detection.", "In addition, for 2D detection, our approach obtains 14.9% higher AP than the state-of-the-art on the hard data among the LIDAR-based methods." ]
[ 0, 0, 1, 1, 1, 4, 4, 4 ]
[ 0.567300021648407, 0.567300021648407, 0.23080000281333923, 0.375, 0.567300021648407, 0.4943999946117401, 0.8557999730110168, 0.6538000106811523 ]
train_1454
[ "Time series are recorded values of an interesting phenomenon such as stock prices, household incomes, or patient heart rates over a period of time.", "Time series data mining focuses on discovering interesting patterns in such data.", "This article introduces a wavelet-based time series data analysis to interested readers.", "It provides a systematic survey of various analysis techniques that use discrete wavelet transformation (DWT) in time series data mining, and outlines the benefits of this approach demonstrated by previous studies performed on diverse application domains, including image classification, multimedia retrieval, and computer network anomaly detection." ]
[ 0, 0, 1, 1 ]
[ 0.8158000111579895, 0.8158000111579895, 0.39469999074935913, 0.39469999074935913 ]
train_1455
[ "Whereas the penetration of mobile phones inAsian countries keeps climbing, little research has explored the application of the short message service (SMS) in second language learning.", "This study aims to examine the effectiveness of SMS vocabulary lessons of limited lexical information on the small screens of mobile phones.", "Thirty high school students were randomly distributed into two groups and given two sets of English words either on paper or through SMS messages during two weeks.", "Students recognized more vocabulary during the post-test after reading the regular and brief SMS lessons than they did after reading the relatively more detailed print material.", "Qualitative data from interviews offer information about the learning process as well as the benefits and limitations of m-learning.", "Results of the questionnaires show that students in general hold positive attitudes towards learning vocabulary via mobile phone.", "On the other hand, technological limitations, unfamiliar presentations and learning activities may prevent students from reading SMS lessons." ]
[ 0, 2, 1, 1, 4, 4, 4 ]
[ 0.800000011920929, 1, 0.800000011920929, 0.428600013256073, 0.428600013256073, 1, 1 ]
train_1456
[ "Procedural Content Generation in Games (PCG) is a thriving field of research and application.", "Recent presented examples range from levels, stories and race tracks to complete rulesets for games.", "However, there is not much research to date on procedural 3D modeling of caves, and similar enclosed natural spaces.", "In this paper, we present a modular pipeline to procedurally generate underground caves in realtime, to be used as part of larger landscapes in game worlds.", "We propose a three step approach, which can be fully implemented using General-Purpose Computing on Graphics Processing (GPGPU) technology: 1) an L-System to emulate the expanded cracks and passages which form cave structures in nature, 2) a noise-perturbed metaball approach for virtual 3D carving, and 3) a rendering component for isosurface extraction of the modeled voxel data, and further mesh enhancement through shader programming.", "We demonstrate how the interaction between these components produce results comparable to real world caves, and show that the solution is viable for video game environments.", "For this, we present the findings of a user study we conducted among indie-game developers and players, using our results." ]
[ 0, 0, 0, 2, 1, 4, 4 ]
[ 0.8125, 0.46880000829696655, 1, 0.5938000082969666, 0.46880000829696655, 0.6563000082969666, 1 ]
train_1457
[ "Purpose – To explore the current literature base of critical success factors (CSFs) of ERP implementations, prepare a compilation, and identify any gaps that might exist.", "Design/methodology/approach – Hundreds of journals were searched using key terms identified in a preliminary literature review.", "Successive rounds of article abstract reviews resulted in 45 articles being selected for the compilation.", "CSF constructs were then identified using content analysis methodology and an inductive coding technique.", "A subsequent critical analysis identified gaps in the literature base.", "Findings – The most significant finding is the lack of research that has focused on the identification of CSFs from the perspectives of key stakeholders.", "Additionally, there appears to be much variance with respect to what exactly is encompassed by change management, one of the most widely cited CSFs, and little detail of specific implementation tactics.", "Research limitations/implications – There is a need to focus future research efforts on the study of CSFs as they apply to the perspectives of key stakeholders and to ensure that this stakeholder approach is also comprehensive in its coverage of CSFs.", "As well, there is need to conduct more in-depth research into the concept of change management.", "One key limitation of this research is the occurrence of duplication in the frequency analysis of the success factors." ]
[ 2, 0, 0, 1, 1, 1, 0, 4, 4, 4 ]
[ 0.7037000060081482, 0.6470999717712402, 0.41179999709129333, 1, 0.44119998812675476, 0.41179999709129333, 0.5, 0.6176000237464905, 0.6470999717712402, 0.44119998812675476 ]
train_1458
[ "One long-term goal of machine learning research is to produce methods that are applicable to reasoning and natural language, in particular building an intelligent dialogue agent.", "To measure progress towards that goal, we argue for the usefulness of a set of proxy tasks that evaluate reading comprehension via question answering.", "Our tasks measure understanding in several ways: whether a system is able to answer questions via chaining facts, simple induction, deduction and many more.", "The tasks are designed to be prerequisites for any system that aims to be capable of conversing with a human.", "We believe many existing learning systems can currently not solve them, and hence our aim is to classify these tasks into skill sets, so that researchers can identify (and then rectify) the failings of their systems.", "We also extend and improve the recently introduced Memory Networks model, and show it is able to solve some, but not all, of the tasks." ]
[ 2, 1, 1, 1, 1, 0 ]
[ 0.8234999775886536, 0.6176000237464905, 0.5184999704360962, 0.6176000237464905, 0.3824000060558319, 0.2353000044822693 ]
train_1459
[ "The creation of a labelled dataset for machine learning purposes is a costly process.", "In recent works, it has been shown that a mix of crowdsourcing and active learning approaches can be used to annotate objects at an a↵ordable cost.", "In this paper, we study the gamification of machine learning techniques; in particular, the problem of classification of objects.", "In this first pilot study, we designed a simple game, based on a visual interpretation of probabilistic classifiers, that consists in separating two sets of coloured points on a two-dimensional plane by means of a straight line.", "We present the current results of this first experiment that we used to collect the requirements for the next version of the game and to analyze i) what is the ‘price’ to build a reasonably accurate classifier with a small amount of labelled objects, ii) and compare the accuracy of the player to the state-of-the-art classification algorithms." ]
[ 0, 2, 2, 1, 4 ]
[ 0.6154000163078308, 0.41029998660087585, 0.5896999835968018, 0.6154000163078308, 1 ]
train_1460
[ "Recommender system is a specific type of intelligent systems, which exploits historical user ratings on items and/or auxiliary information to make recommendations on items to the users.", "It plays a critical role in a wide range of online shopping, e-commercial services and social networking applications.", "Collaborative filtering (CF) is the most popular approaches used for recommender systems, but it suffers from complete cold start (CCS) problem where no rating record are available and incomplete cold start (ICS) problem where only a small number of rating records are available for some new items or users in the system.", "In this paper, we propose two recommendation models to solve the CCS and ICS problems for new items, which are based on a framework of tightly coupled CF approach and deep learning neural network.", "A specific deep neural network SADE is used to extract the content features of the items.", "The state of the art CF model, timeSVD++, which models and utilizes temporal dynamics of user preferences and item features, is modified to take the content features into prediction of ratings for cold start items.", "Extensive experiments on a large Netflix rating dataset of movies are performed, which show that our proposed recommendation models largely outperform the baseline models for rating prediction of cold start items.", "The two proposed recommendation models are also evaluated and compared on ICS items, and a flexible scheme of model retraining and switching is proposed to deal with the transition of items from cold start to non-cold start status.", "The experiment results on Netflix movie recommendation show the tight coupling of CF approach and deep learning neural network is feasible and very effective for cold start item recommendation.", "The design is general and can be applied to many other recommender" ]
[ 0, 0, 1, 1, 1, 1, 4, 4, 4, 0 ]
[ 0.800000011920929, 1, 0.6000000238418579, 0.771399974822998, 0.6000000238418579, 0.571399986743927, 0.8285999894142151, 0.428600013256073, 1, 0.571399986743927 ]
train_1461
[ "Size and cost reduction are among the main issues of electric motor design and fabrication.", "This paper proposes an original layout for an axial flux permanent-magnet motor with printed circuit board (PCB) winding.", "In contrast to other axial flux motors of the same type, which are generally made with a three-phase fractional slot winding, the proposed motor has a two-phase wave winding printed on either side of the PCB.", "This configuration allows increasing the number of pole pairs and the supply frequency so to reduce the stator and rotor core widths.", "The winding is also characterized by a large copper percentage on the board, which improves the torque density of the motor.", "The results of the mathematical analysis, of the numerical simulation and of the experiments are compared.", "A method for the computation of the phase inductances is also proposed and validated.", "The main dimensions of the magnets are optimized via the finite-element method.", "The experimental comparison shows the advantages of the proposed motor in comparison to the traditional shaded pole motor for household applications." ]
[ 0, 2, 1, 1, 1, 4, 4, 4, 4 ]
[ 0.5788999795913696, 0.21050000190734863, 0.39469999074935913, 0.39469999074935913, 0.6053000092506409, 0.6053000092506409, 0.6053000092506409, 0.766700029373169, 0.7894999980926514 ]
train_1462
[ "Spatial pyramid pooling module or encode-decoder structure are used in deep neural networks for semantic segmentation task.", "The former networks are able to encode multi-scale contextual information by probing the incoming features with filters or pooling operations at multiple rates and multiple effective fields-of-view, while the latter networks can capture sharper object boundaries by gradually recovering the spatial information.", "In this work, we propose to combine the advantages from both methods.", "Specifically, our proposed model, DeepLabv3+, extends DeepLabv3 by adding a simple yet effective decoder module to refine the segmentation results especially along object boundaries.", "We further explore the Xception model and apply the depthwise separable convolution to both Atrous Spatial Pyramid Pooling and decoder modules, resulting in a faster and stronger encoder-decoder network.", "We demonstrate the effectiveness of the proposed model on PASCAL VOC 2012 and Cityscapes datasets, achieving the test set performance of 89.0% and 82.1% without any post-processing.", "Our paper is accompanied with a publicly available reference implementation of the proposed models in Tensorflow at https: //github.com/tensorflow/models/tree/master/research/deeplab." ]
[ 0, 0, 0, 2, 1, 1, 4 ]
[ 1, 1, 0.421099990606308, 0.421099990606308, 0.421099990606308, 0.421099990606308, 0.631600022315979 ]
train_1463
[ "Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network.", "Similar to Cloud, Fog provides data, compute, storage, and application services to end-users.", "In this article, we elaborate the motivation and advantages of Fog computing, and analyse its applications in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks.", "We discuss the state-of-the-art of Fog computing and similar work under the same umbrella.", "Security and privacy issues are further disclosed according to current Fog computing paradigm.", "As an example, we study a typical attack, man-in-the-middle attack, for the discussion of security in Fog computing.", "We investigate the stealthy features of this attack by examining its CPU and memory consumption on Fog device." ]
[ 0, 0, 1, 1, 1, 4, 4 ]
[ 1, 0.7949000000953674, 0.41029998660087585, 1, 0.41029998660087585, 0.41029998660087585, 0.6154000163078308 ]
train_1464
[ "We present persona-based models for handling the issue of speaker consistency in neural response generation.", "A speaker model encodes personas in distributed embeddings that capture individual characteristics such as background information and speaking style.", "A dyadic speakeraddressee model captures properties of interactions between two interlocutors.", "Our models yield qualitative performance improvements in both perplexity and BLEU scores over baseline sequence-to-sequence models, with similar gains in speaker consistency as measured by human judges." ]
[ 0, 0, 0, 4 ]
[ 0.5555999875068665, 0.44440001249313354, 0.44440001249313354, 0.3889000117778778 ]
train_1465
[ "Organizations use Role-Based Access Control (RBAC) to protect information resources from unauthorized access.", "We propose an approach, based on the Unified Modeling Language (UML), that shows how RBAC policies can be systematically incorporated into an application design.", "We consider an RBAC model to be a pattern which we express using UML diagram templates; RBAC policies for an application conforming to this model can be generated by instantiating these templates with values obtained from the application.", "The constraints of the RBAC model are expressed using the Object Constraint Language (OCL).", "OCL constraints, based on first-order logic, are difficult to understand.", "To alleviate this problem, we show how violation of such constraints can be visually represented using object diagram templates.", "With adequate tool support, developers can use these to demonstrate constraint violations in their applications.", "Our approach is illustrated using a small banking application." ]
[ 0, 2, 2, 1, 1, 1, 4, 4 ]
[ 0.8055999875068665, 0.6388999819755554, 0.41670000553131104, 0.8055999875068665, 1, 0.6111000180244446, 0.7142999768257141, 0.5555999875068665 ]
train_1466
[ "0957-4174/$ see front matter 2012 Elsevier Ltd. A doi:10.1016/j.eswa.2012.02.063 ⇑ Corresponding author.", "E-mail address: michael@mail.tku.edu.tw (S.-H. Li In order to determine how data mining techniques (DMT) and their applications have developed, during the past decade, this paper reviews data mining techniques and their applications and development, through a survey of literature and the classification of articles, from 2000 to 2011.", "Keyword indices and article abstracts were used to identify 216 articles concerning DMT applications, from 159 academic journals (retrieved from five online databases), this paper surveys and classifies DMT, with respect to the following three areas: knowledge types, analysis types, and architecture types, together with their applications in different research and practical domains.", "A discussion deals with the direction of any future developments in DMT methodologies and applications: (1) DMT is finding increasing applications in expertise orientation and the development of applications for DMT is a problem-oriented domain.", "(2) It is suggested that different social science methodologies, such as psychology, cognitive science and human behavior might implement DMT, as an alternative to the methodologies already on offer.", "(3) The ability to continually change and acquire new understanding is a driving force for the application of DMT and this will allow many new future applications.", "2012 Elsevier Ltd. All rights reserved." ]
[ 3, 0, 0, 2, 1, 4, 3 ]
[ 0.7894999980926514, 0.6053000092506409, 0.6053000092506409, 0.631600022315979, 0.5788999795913696, 0.39469999074935913, 1 ]
train_1467
[ "Open data has become an important new direction in information technology.", "Governments are releasing data so as to be more transparent and also claiming that open data has substantial economic value.", "However, there appear to be many issues about open data that are not being discussed.", "This paper uses several practical examples in an attempt to illustrate many of these issues and allied opportunities, and through them to suggest the beginning of a research agenda around open data." ]
[ 0, 0, 0, 2 ]
[ 1, 0.8108000159263611, 0.8108000159263611, 0.4323999881744385 ]
train_1468
[ "Acknowledgements I want to thank Bernhard Steffen for guiding me during the past five years.", "Clearly, this dis-sertation is a result of having being challenged, motivated, and supported in a truly unique environment, created by the persons that gathered at the Chair of Programming Systems to create and cooperate.", "Thus I would also like to thank my colleagues, and in particular Falk Howar, with whom I had the pleasure of sharing an office for three years.", "Hilarity sure ensued, as did pleasant traveling and countless hours of fruitful discussion.", "Last but not least, thanks also go to my family, which was both supportive and patient." ]
[ 0, 0, 0, 1, 0 ]
[ 0.6435999870300293, 0.43560001254081726, 0.6435999870300293, 0.38609999418258667, 0.4059000015258789 ]
train_1469
[ "Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements.", "Please refer to the current edition of the \"Internet Official Protocol Standards\" (STD 1) for the standardization state and status of this protocol.", "Distribution of this memo is unlimited.", "Abstract Modern implementations of TCP contain four intertwined algorithms that have never been fully documented as Internet standards: slow start, congestion avoidance, fast retransmit, and fast recovery.", "[2] and [3] provide some details on these algorithms, [4] provides examples of the algorithms in action, and [5] provides the source code for the 4.4BSD implementation.", "RFC 1122 requires that a TCP must implement slow start and congestion avoidance (Section 4.2.2.15 of [1]), citing [2] as the reference, but fast retransmit and fast recovery were implemented after RFC 1122.", "The purpose of this document is to document these four algorithms for the Internet." ]
[ 0, 0, 3, 1, 1, 4, 2 ]
[ 0.4643000066280365, 0.800000011920929, 0.428600013256073, 0.4000000059604645, 0.428600013256073, 0.571399986743927, 0.428600013256073 ]
train_1470
[ "The present paper focuses on Cyber Security Awareness Campaigns, and aims to identify key factors regarding security which may lead them to failing to appropriately change people’s behaviour.", "Past and current efforts to improve information-security practices and promote a sustainable society have not had the desired impact.", "It is important therefore to critically reflect on the challenges involved in improving information-security behaviours for citizens, consumers and employees.", "In particular, our work considers these challenges from a Psychology perspective, as we believe that understanding how people perceive risks is critical to creating effective awareness campaigns.", "Changing behaviour requires more than providing information about risks and reactive behaviours – firstly, people must be able to understand and apply the advice, and secondly, they must be motivated and willing to do so – and the latter requires changes to attitudes and intentions.", "These antecedents of behaviour change are identified in several psychological models of behaviour.", "We review the suitability of persuasion techniques, including the widely used ‘fear appeals’.", "From this range of literature, we extract essential components for an awareness campaign as well as factors which can lead to a campaign’s success or failure.", "Finally, we present examples of existing awareness campaigns in different cultures (the UK and Africa) and reflect on these." ]
[ 0, 0, 2, 2, 2, 1, 1, 1, 4 ]
[ 0.620199978351593, 0.8101000189781189, 0.5929999947547913, 0.40700000524520874, 0.40700000524520874, 0.40700000524520874, 0.6240000128746033, 0.8101000189781189, 0.4341000020503998 ]
train_1471
[ "Direct Sparse Odometry (DSO) is a visual odometry method based on a novel, highly accurate sparse and direct structure and motion formulation.", "It combines a fully direct probabilistic model (minimizing a photometric error) with consistent, joint optimization of all model parameters, including geometry-represented as inverse depth in a reference frame-and camera motion.", "This is achieved in real time by omitting the smoothness prior used in other direct methods and instead sampling pixels evenly throughout the images.", "Since our method does not depend on keypoint detectors or descriptors, it can naturally sample pixels from across all image regions that have intensity gradient, including edges or smooth intensity variations on essentially featureless walls.", "The proposed model integrates a full photometric calibration, accounting for exposure time, lens vignetting, and non-linear response functions.", "We thoroughly evaluate our method on three different datasets comprising several hours of video.", "The experiments show that the presented approach significantly outperforms state-of-the-art direct and indirect methods in a variety of real-world settings, both in terms of tracking accuracy and robustness." ]
[ 1, 1, 1, 1, 0, 4, 4 ]
[ 0.583299994468689, 0.583299994468689, 0.44440001249313354, 0.666700005531311, 0.41670000553131104, 0.583299994468689, 0.5555999875068665 ]
train_1472
[ "Geometry reasoning and proof form a major and challenging component in the K-121 mathematics curriculum.", "Although several computerized systems exist that help students learn and practice general geometry concepts, they do not target geometry proof problems, which are more advanced and difficult.", "Powerful geometry theorem provers also exist, however they typically employ advanced algebraic methods and generate complex, difficult to understand proofs, and thus do not meet general K-12 students’ educational needs.", "This paper tackles these weaknesses of prior systems by introducing a geometry proof system, iGeoTutor, capable of generating human-readable elementary proofs, i.e. proofs using standard Euclidean axioms.", "We have gathered 77 problems in total from various sources, including ones unsolvable by other systems and from Math competitions.", "iGeoTutor solves all but two problems in under two minutes each, and more importantly, demonstrates a much more effective and intelligent proof search than prior systems.", "We have also conducted a pilot study with 12 high school students, and the results show that iGeoTutor provides a clear benefit in helping students learn geometry proofs.", "We are in active discussions with Khan Academy and local high schools for possible adoption of iGeoTutor in real learning environments.", "Video demo: https://www.youtube.com/watch?v=KL0dUb6hKxU" ]
[ 0, 0, 0, 2, 2, 4, 4, 4, 3 ]
[ 1, 0.8055999875068665, 0.6111000180244446, 1, 0.3889000117778778, 0.41670000553131104, 0.41670000553131104, 0.41670000553131104, 0.8055999875068665 ]
train_1473
[ "Goal: Cataracts are a clouding of the lens and the leading cause of blindness worldwide.", "Assessing the presence and severity of cataracts is essential for diagnosis and progression monitoring, as well as to facilitate clinical research and management of the disease.", "Methods: Existing automatic methods for cataract grading utilize a predefined set of image features that may provide an incomplete, redundant, or even noisy representation.", "In this study, we propose a system to automatically learn features for grading the severity of nuclear cataracts from slit-lamp images.", "Local filters are first acquired through clustering of image patches from lenses within the same grading class.", "The learned filters are fed into a convolutional neural network, followed by a set of recursive neural networks, to further extract higher order features.", "With these features, support vector regression is applied to determine the cataract grade.", "Results: The proposed system is validated on a large population-based dataset of 5378 images, where it outperforms the state of the art by yielding with respect to clinical grading a mean absolute error (ε) of 0.304, a 70.7% exact integral agreement ratio (R0), an 88.4% decimal grading error ≤0.5 (Re0.5), and a 99.0% decimal grading error ≤1.0 (Re1.0).", "Significance: The proposed method is useful for assisting and improving clinical management of the disease in the context of large-population screening and has the potential to be applied to other eye diseases." ]
[ 2, 2, 1, 1, 1, 1, 1, 4, 4 ]
[ 0.631600022315979, 0.421099990606308, 0.8158000111579895, 0.6053000092506409, 0.7894999980926514, 0.6053000092506409, 0.8158000111579895, 0.631600022315979, 0.6053000092506409 ]
train_1474
[ "To date, there is almost no work on the use of adverbs in sentiment analysis, nor has there been any work on the use of adverb-adjective combinations (AACs).", "We propose an AAC-based sentiment analysis technique that uses a linguistic analysis of adverbs of degree.", "We define a set of general axioms (based on a classification of adverbs of degree into five categories) that all adverb scoring techniques must satisfy.", "Instead of aggregating scores of both adverbs and adjectives using simple scoring functions, we propose an axiomatic treatment of AACs based on the linguistic classification of adverbs.", "Three specific AAC scoring methods that satisfy the axioms are presented.", "We describe the results of experiments on an annotated set of 200 news articles (annotated by 10 students) and compare our algorithms with some existing sentiment analysis algorithms.", "We show that our results lead to higher accuracy based on Pearson correlation with human subjects." ]
[ 0, 2, 2, 1, 1, 4, 4 ]
[ 0.8055999875068665, 0.8055999875068665, 0.41670000553131104, 0.3889000117778778, 0.41670000553131104, 0.583299994468689, 1 ]
train_1475
[ "Railway standards prescribe the use of Safety-related Application Conditions (SACs).", "SACs are demands to be observed when using a safety related system or a sub-system.", "The use of SACs can, however, easily be associated with difficulties.", "SACs of sub-systems can imply high efforts regarding their fulfillment at system level.", "Furthermore, SACs at sub-system level may become very obstructive for the user of the sub-system, if the safe application on system level has strong restrictions.", "Additionally, a large number of SACs may be very difficult to manage.", "In this way, SACs may obstruct the introduction of a system or a sub-system into the field.", "Particular hazards could arise from SACs, if they are formulated ambiguously, so that the originally intended safety-related measures are not taken at all.", "This paper presents the objectives and benefits of SACs and depicts difficulties and challenges associated with the use of SACs.", "The paper not only explains what should be the SAC content but also the quality criteria, the conditions for SAC creation and SAC fulfillment are described." ]
[ 0, 0, 0, 1, 0, 1, 1, 1, 1, 1 ]
[ 0.771399974822998, 0.542900025844574, 0.542900025844574, 0.6956999897956848, 0.34290000796318054, 0.428600013256073, 0.428600013256073, 0.428600013256073, 0.428600013256073, 0.428600013256073 ]
train_1476
[ "From the oversexualized characters in fighting games, such as Dead or Alive or Ninja Gaiden, to the overuse of the damsel in distress trope in popular titles, such as the Super Mario series, the under- and misrepresentation of females in video games has been well documented in several content analyses.", "Cultivation theory suggests that long-term exposure to media content can affect perceptions of social realities in a way that they become more similar to the representations in the media and, in turn, impact one's beliefs and attitudes.", "Previous studies on video games and cultivation have often been cross-sectional or experimental, and the limited longitudinal work in this area has only considered time intervals of up to 1 month.", "Additionally, previous work in this area has focused on the effects of violent content and relied on self-selected or convenience samples composed mostly of adolescents or college students.", "Enlisting a 3 year longitudinal design, the present study assessed the relationship between video game use and sexist attitudes, using data from a representative sample of German players aged 14 and older (N=824).", "Controlling for age and education, it was found that sexist attitudes--measured with a brief scale assessing beliefs about gender roles in society--were not related to the amount of daily video game use or preference for specific genres for both female and male players.", "Implications for research on sexism in video games and cultivation effects of video games in general are discussed." ]
[ 0, 0, 0, 0, 1, 1, 4 ]
[ 0.7838000059127808, 1, 0.5946000218391418, 0.40540000796318054, 0.5946000218391418, 0.5946000218391418, 0.8108000159263611 ]
train_1477
[ "In agriculture sector where farmers and agribusinesses have to make innumerable decisions every day and intricate complexities involves the various factors influencing them.", "An essential issue for agricultural planning intention is the accurate yield estimation for the numerous crops involved in the planning.", "Data mining techniques are necessary approach for accomplishing practical and effective solutions for this problem.", "Agriculture has been an obvious target for big data.", "Environmental conditions, variability in soil, input levels, combinations and commodity prices have made it all the more relevant for farmers to use information and get help to make critical farming decisions.", "This paper focuses on the analysis of the agriculture data and finding optimal parameters to maximize the crop production using data mining techniques like PAM, CLARA, DBSCAN and Multiple Linear Regression.", "Mining the large amount of existing crop, soil and climatic data, and analysing new, non-experimental data optimizes the production and makes agriculture more resilient to climatic change." ]
[ 0, 0, 0, 2, 1, 1, 4 ]
[ 1, 1, 0.421099990606308, 0.7894999980926514, 0.421099990606308, 0.5788999795913696, 0.5788999795913696 ]
train_1478
[ "This paper describes a representation of gait appearance for the purpose of person identification and classification.", "This gait representation is based on simple features such as moments extracted from orthogonal view video silhouettes of human walking motion.", "Despite its simplicity, the resulting feature vector contains enough information to perform well on human identification and gender classification tasks.", "We explore the recognition behaviors of two different methods to aggregate features over time under different recognition tasks.", "We demonstrate the accuracy of recognition using gait video sequences collected over different days and times and under varying lighting environments.", "In addition, we show results for gender classification based our gait appearance features using a support-vector machine." ]
[ 2, 0, 1, 1, 1, 4 ]
[ 0.5946000218391418, 0.5946000218391418, 0.40540000796318054, 0.8108000159263611, 0.8108000159263611, 0.8108000159263611 ]
train_1479
[ "Music in India has very ancient roots.", "Indian classical music is considered to be one of the oldest musical traditions in the world but compared to Western music very little work has been done in the areas of genre recognition, classification, automatic tagging, comparative studies etc.", "In this work, we investigate the structural differences between Indian and Western music forms and compare the two forms of music in terms of harmony, rhythm, microtones, timbre and other spectral features.", "To capture the temporal and static structure of the spectrogram, we form a set of global and local frame-wise features for 5genres of each music form.", "We then apply Adaboost classification and GMM based Hidden Markov Models for four types of feature sets and observe that Indian Music performs better as compared to Western Music.", "We have achieved a best accuracy of 98.0% and 77.5% for Indian and Western musical genres respectively.", "Our comparative analysis indicates that features that work well with one form of music may not necessarily perform well with the other form.", "The results obtained on Indian Music Genres are better than the previous state-of-the-art." ]
[ 0, 0, 2, 0, 1, 4, 4, 4 ]
[ 0.7778000235557556, 0.7778000235557556, 0.5555999875068665, 0.44440001249313354, 0.6111000180244446, 0.5555999875068665, 0.5555999875068665, 0.7778000235557556 ]
train_1480
[ "A comprehensive study of ultrahigh-speed current-mode logic (CML) buffers along with the design of novel regenerative CML latches will be illustrated.", "First, a new design procedure to systematically design a chain of tapered CML buffers is proposed.", "Next, two new high-speed regenerative latch circuits capable of operating at ultrahigh-speed data rates will be introduced.", "Experimental results show a higher performance for the new latch architectures compared to the conventional CML latch circuit at ultrahigh-frequencies.", "It is also shown, both through the experiments and by using efficient analytical models, why CML buffers are better than CMOS inverters in high-speed low-voltage applications." ]
[ 1, 2, 1, 4, 4 ]
[ 0.39469999074935913, 0.6053000092506409, 0.6053000092506409, 0.7894999980926514, 0.7894999980926514 ]
train_1481
[ "Mobile augmented reality (mobile AR) enables virtual content such as 3D models, animations and annotations to be placed on top of a real world objects in any context.", "We applied mobile AR to develop the Calory Battle AR exergame to tackle worldwide childhood obesity.", "In this game the player finds and defuses virtual calory bombs in a real world environment.", "Specifically, we present the development of two game versions.", "First prototype was created without a third party game engine and it led to many challenges.", "To explore solutions to these challenges, we created a new version of game with the Unity 3D game engine.", "Using the Unity 3D, the game development process was simplified.", "A mixed-method usability evaluation on children and university students indicated that especially interaction with AR content and user interface clarity were improved in the Unity 3D version.", "This study produced three important contributions: 1) a novel mobile AR exergame to motivate children to move; 2) reimplementation of the game using the Unity 3D; and 3) results of a usability evaluation comparing two game versions.", "We expect that game engines such as the Unity 3D will become essential for AR game development in the future." ]
[ 0, 2, 2, 1, 1, 1, 1, 4, 4, 4 ]
[ 1, 0.6215999722480774, 0.40540000796318054, 0.5946000218391418, 0.6215999722480774, 0.8108000159263611, 0.6215999722480774, 0.7838000059127808, 0.7838000059127808, 0.7838000059127808 ]
train_1482
[ "Computational models of single pacemaker neuron and neural population in the pre-Bötzinger Complex (pBC) were developed based on the previous models by Butera et al. (1999a,b).", "Our modeling study focused on the conditions that could define endogenous bursting vs. tonic activity in single pacemaker neurons and population bursting vs. asynchronous firing in populations of pacemaker neurons.", "We show that both bursting activity in single pacemaker neurons and population bursting activity may be released or suppressed depending on the expression of persistent sodium (I Na P) and delayed-rectifier potassium (I K ) currents.", "Specifically, a transition from asynchronous firing to population bursting could be induced by a reduction of I K via a direct suppression of the potassium conductance or through an elevation of extracellular potassium concentration.", "Similar population bursting activity could be triggered by an augmentation of I Na P.", "These findings are discussed in the context of the possible role of population bursting activity in the pBC in the respiratory rhythm generation in vivo vs. in vitro and during normal breathing in vivo vs. gasping." ]
[ 0, 2, 4, 1, 0, 4 ]
[ 0.7949000000953674, 0.7949000000953674, 0.41029998660087585, 0.7949000000953674, 0.6154000163078308, 0.7949000000953674 ]
train_1483
[ "It is increasingly acknowledged that many threats to an organisation’s computer systems can be attributed to the behaviour of computer users.", "To quantify these human-based information security vulnerabilities, we are developing the Human Aspects of Information Security Questionnaire (HAIS-Q).", "The aim of this paper was twofold.", "The first aim was to outline the conceptual development of the HAIS-Q, including validity and reliability testing.", "The second aim was to examine the relationship between knowledge of policy and procedures, attitude towards policy and procedures and behaviour when using a work computer.", "Results from 500 Australian employees indicate that knowledge of policy and procedures had a stronger influence on attitude towards policy and procedure than selfreported behaviour.", "This finding suggests that training and education will be more effective if it outlines not only what is expected (knowledge) but also provides an understanding of why this is important (attitude).", "Plans for future research to further develop and test the HAIS-Q are outlined.", "Crown Copyright a 2014 Published by Elsevier Ltd.", "All rights reserved." ]
[ 0, 0, 2, 2, 2, 4, 4, 4, 3, 3 ]
[ 1, 0.5788999795913696, 1, 0.8158000111579895, 1, 0.6053000092506409, 1, 0.6053000092506409, 0.8158000111579895, 0.8158000111579895 ]
train_1484
[ "We discuss distributed denial of service attacks in the Internet.", "We were motivated by the widely known February 2000 distributed attacks on Yahoo!, Amazon.com, CNN.com, and other major Web sites.", "A denial of service is characterized by an explicit attempt by an attacker to prevent legitimate users from using resources.", "An attacker may attempt to: “flood” a network and thus reduce a legitimate user’s bandwidth, prevent access to a service, or disrupt service to a specific system or a user.", "We describe methods and techniques used in denial of service attacks, and we list possible defenses.", "In our study, we simulate a distributed denial of service attack using ns-2 network simulator.", "We examine how various queuing algorithms implemented in a network router perform during an attack, and whether legitimate users can obtain desired bandwidth.", "We find that under persistent denial of service attacks, class based queuing algorithms can guarantee bandwidth for certain classes of input flows." ]
[ 0, 0, 0, 0, 1, 1, 4, 4 ]
[ 0.41029998660087585, 0.6154000163078308, 0.6154000163078308, 0.6154000163078308, 0.8205000162124634, 0.5896999835968018, 0.41029998660087585, 0.41029998660087585 ]
train_1485
[ "Predicting trends in stock market prices has been an area of interest for researchers for many years due to its complex and dynamic nature.", "Intrinsic volatility in stock market across the globe makes the task of prediction challenging.", "Forecasting and diffusion modeling, although effective can’t be the panacea to the diverse range of problems encountered in prediction, short-term or otherwise.", "Market risk, strongly correlated with forecasting errors, needs to be minimized to ensure minimal risk in investment.", "The authors propose to minimize forecasting error by treating the forecasting problem as a classification problem, a popular suite of algorithms in Machine learning.", "In this paper, we propose a novel way to minimize the risk of investment in stock market by predicting the returns of a stock using a class of powerful machine learning algorithms known as ensemble learning.", "Some of the technical indicators such as Relative Strength Index (RSI), stochastic oscillator etc are used as inputs to train our model.", "The learning model used is an ensemble of multiple decision trees.", "The algorithm is shown to outperform existing algorithms found in the literature.", "Out of Bag (OOB) error estimates have been found to be encouraging." ]
[ 0, 0, 2, 1, 1, 1, 1, 1, 1, 4 ]
[ 1, 0.6000000238418579, 0.4000000059604645, 0.4000000059604645, 0.6000000238418579, 1, 1, 1, 0.6000000238418579, 0.6000000238418579 ]
train_1486
[ "We present an overview of the last ten years of research on visualizations that support close and distant reading of textual data in the digital humanities.", "We look at various works published within both the visualization and digital humanities communities.", "We provide a taxonomy of applied methods for close and distant reading, and illustrate approaches that combine both reading techniques to provide a multifaceted view of the data.", "Furthermore, we list toolkits and potentially beneficial visualization approaches for research in the digital humanities.", "Finally, we summarize collaboration experiences when developing visualizations for close and distant reading, and give an outlook on future challenges in that research area." ]
[ 0, 2, 1, 1, 4 ]
[ 0.7949000000953674, 0.5896999835968018, 0.8205000162124634, 0.6154000163078308, 1 ]
train_1487
[ "In this paper, we propose an attention-aware deep reinforcement learning (ADRL) method for video face recognition, which aims to discard the misleading and confounding frames and find the focuses of attentions in face videos for person recognition.", "We formulate the process of finding the attentions of videos as a Markov decision process and train the attention model through a deep reinforcement learning framework without using extra labels.", "Unlike existing attention models, our method takes information from both the image space and the feature space as the input to make better use of face information that is discarded in the feature learning process.", "Besides, our approach is attention-aware, which seeks different attentions of videos for the recognition of different pairs of videos.", "Our approach achieves very competitive video face recognition performance on three widely used video face datasets." ]
[ 2, 1, 1, 1, 4 ]
[ 0.428600013256073, 0.771399974822998, 0.771399974822998, 0.6571000218391418, 0.771399974822998 ]
train_1488
[ "This paper presents a comprehensive performance comparison between CUDA and OpenCL.", "We have selected 16 benchmarks ranging from synthetic applications to real-world ones.", "We make an extensive analysis of the performance gaps taking into account programming models, ptimization strategies, architectural details, and underlying compilers.", "Our results show that, for most applications, CUDA performs at most 30\\% better than OpenCL.", "We also show that this difference is due to unfair comparisons: in fact, OpenCL can achieve similar performance to CUDA under a fair comparison.", "Therefore, we define a fair comparison of the two types of applications, providing guidelines for more potential analyses.", "We also investigate OpenCL's portability by running the benchmarks on other prevailing platforms with minor modifications.", "Overall, we conclude that OpenCL's portability does not fundamentally affect its performance, and OpenCL can be a good alternative to CUDA." ]
[ 0, 1, 1, 1, 1, 1, 2, 4 ]
[ 0.6057999730110168, 0.5961999893188477, 0.7980999946594238, 0.5769000053405762, 0.6345999836921692, 0.4327000081539154, 0.40380001068115234, 1 ]
train_1489
[ "Organizational structures are complex and vary according to sector, field, and type of business or service.", "In order to be effective, an organization needs to tailor its activities to the environment in which is it located.", "Based on contingency perspectives, this study is focused on investigating effective ways to design team diversity and maximize team creativity according to task difficulty levels.", "Considering the organizational team member as an agent, the study employed a multi-agent simulation method to understand the progress of creative manifestation, by observing the exploration and exploitation activity of team members over certain periods of time.", "The results first reveal that the level of team diversity influences the amount of creativity manifested by team members’ activities, such as exploration and exploitation.", "Second, managers have to properly facilitate either exploration or exploitation depending on task difficulty by striking a balance between them.", "2014 Elsevier Ltd. All rights reserved." ]
[ 0, 0, 2, 1, 4, 4, 3 ]
[ 1, 0.6229000091552734, 0.8220000267028809, 0.8305000066757202, 0.5551000237464905, 0.5551000237464905, 1 ]
train_1490
[ "Humans use their hands for a large variety of tasks during daily life.", "In this chapter, a discussion of human hand use is presented, including classification schemes for grasping and manipulation behaviors.", "First, a simple classification of the Activities of Daily Living (ADLs) is presented, providing some structure to a terminology that is typically used in an ad hoc manner.", "Next, an overview of work related to classifications and taxonomies of static grasp types is presented, followed by a study investigating the frequency of use of various grasp types by a housekeeper and machinist.", "Finally, a taxonomy classifying hand-based manipulation is presented, providing a hand-centric and motion-centric categorization of hand use.", "These descriptions and classifications of hand use should prove useful to researchers interested in robotic manipulation, prosthetics, rehabilitation, and biomechanics." ]
[ 0, 0, 1, 1, 1, 4 ]
[ 1, 0.6154000163078308, 0.5896999835968018, 0.7949000000953674, 0.5896999835968018, 0.7949000000953674 ]
train_1491
[ "Between June 1985 and January 1987, the Therac-25 medical electron accelerator was involved in six massive radiation overdoses.", "As a result, several people died and others were seriously injured.", "A detailed investigation of the factors involved in the software-related overdoses and attempts by users, manufacturers, and government agencies to deal with the accidents is presented.", "The authors demonstrate the complex nature of accidents and the need to investigate all aspects of system development and operation in order to prevent future accidents.", "The authors also present some lessons learned in terms of system engineering, software engineering, and government regulation of safety-critical systems containing software components.<<ETX>>" ]
[ 0, 0, 0, 1, 1 ]
[ 1, 0.5788999795913696, 0.5788999795913696, 0.421099990606308, 0.421099990606308 ]
train_1492
[ "In recent years, significant progress has been made in solving challenging problems across various domains using deep reinforcement learning (RL).", "Reproducing existing work and accurately judging the improvements offered by novel methods is vital to sustaining this progress.", "Unfortunately, reproducing results for state-of-the-art deep RL methods is seldom straightforward.", "In particular, non-determinism in standard benchmark environments, combined with variance intrinsic to the methods, can make reported results tough to interpret.", "Without significance metrics and tighter standardization of experimental reporting, it is difficult to determine whether improvements over the prior state-of-the-art are meaningful.", "In this paper, we investigate challenges posed by reproducibility, proper experimental techniques, and reporting procedures.", "We illustrate the variability in reported metrics and results when comparing against common baselines and suggest guidelines to make future results in deep RL more reproducible.", "We aim to spur discussion about how to ensure continued progress in the field by minimizing wasted effort stemming from results that are non-reproducible and easily misinterpreted." ]
[ 0, 0, 0, 0, 0, 2, 1, 4 ]
[ 1, 1, 1, 0.8151000142097473, 0.6340000033378601, 0.7886999845504761, 0.8151000142097473, 0.42260000109672546 ]
train_1493
[ "Ranking fraud in the mobile App market refers to fraudulent or deceptive activities which have a purpose of bumping up the Apps in the popularity list.", "Indeed, it becomes more and more frequent for App developers to use shady means, such as inflating their Apps' sales or posting phony App ratings, to commit ranking fraud.", "While the importance of preventing ranking fraud has been widely recognized, there is limited understanding and research in this area.", "To this end, in this paper, we provide a holistic view of ranking fraud and propose a ranking fraud detection system for mobile Apps.", "Specifically, we first propose to accurately locate the ranking fraud by mining the active periods, namely leading sessions, of mobile Apps.", "Such leading sessions can be leveraged for detecting the local anomaly instead of globalanomaly of App rankings.", "Furthermore, we investigate three types of evidences, i.e., ranking based evidences, rating based evidences and review based evidences, by modeling Apps' ranking, rating and review behaviors through statistical hypotheses tests.", "In addition, we propose an optimization based aggregation method to integrate all the evidences for fraud detection.", "Finally, we evaluate the proposed system with real-world App data collected from the iOS App Store for a long time period.", "In the experiments, we validate the effectiveness of the proposed system, and show the scalability of the detection algorithm as well as some regularity of ranking fraud activities." ]
[ 0, 0, 0, 1, 1, 1, 4, 1, 4, 4 ]
[ 0.8019000291824341, 0.8019000291824341, 0.8019000291824341, 0.5755000114440918, 1, 0.8490999937057495, 0.3490999937057495, 0.6509000062942505, 0.8019000291824341, 1 ]
train_1494
[ "We consider the class of iterative shrinkage-thresholding algorithms (ISTA) for solving linear inverse problems arising in signal/image processing.", "This class of methods, which can be viewed as an extension of the classical gradient algorithm, is attractive due to its simplicity and thus is adequate for solving large-scale problems even with dense matrix data.", "However, such methods are also known to converge quite slowly.", "In this paper we present a new fast iterative shrinkage-thresholding algorithm (FISTA) which preserves the computational simplicity of ISTA but with a global rate of convergence which is proven to be significantly better, both theoretically and practically.", "Initial promising numerical results for wavelet-based image deblurring demonstrate the capabilities of FISTA which is shown to be faster than ISTA by several orders of magnitude." ]
[ 0, 0, 1, 1, 4 ]
[ 0.628600001335144, 0.571399986743927, 0.428600013256073, 0.6000000238418579, 0.8285999894142151 ]
train_1495
[ "Video games have dramatically increased in realism over the past several years.", "With an increase in both graphical fidelity and gameplay realism, this increase has been used to further immersion in video games on many levels.", "Video games have been subject to the term “immersion” for many years now, used in both the context of entertainment and marketing.", "This paper explores the effects of realism on immersion in video games, as well as considering what immersion means to a video game and gameplay in general." ]
[ 2, 0, 0, 2 ]
[ 0.41179999709129333, 0.5881999731063843, 0.5881999731063843, 0.6176000237464905 ]
train_1496
[ "The adoption of Smart Grid devices throughout utility networks will effect tremendous change in grid operations and usage of electricity over the next two decades.", "The changes in ways to control loads, coupled with increased penetration of renewable energy sources, offer a new set of challenges in balancing consumption and generation.", "Increased deployment of energy storage devices in the distribution grid will help make this process happen more effectively and improve system performance.", "This paper addresses the new types of storage being utilized for grid support and the ways they are integrated into the grid." ]
[ 0, 0, 2, 1 ]
[ 0.7949000000953674, 0.7949000000953674, 0.41029998660087585, 0.5896999835968018 ]
train_1497
[ "Research proposing the application of blockchain technology in accounting assumes the utilization of decentralized consensus mechanisms based on the exertion of scarce resources (Proof-of-Work; PoW), leading to the validation of transactions without the need of any third party.", "Together with the blockchain, a shared database, PoW is expected to lead to nearly immutable and, therefore, fraud-resistant, real-time financial registers.", "This conclusion must be reconsidered, taking into account recurrent top-management involvement in accounting scandals, often conducted through deliberate exposures of internal and external control systems.", "This paper asserts that blockchain-based accounting using PoW-based consensus paves the way for the suspension of controls by the management, since exerting the majority of computer power is easier than circumventing internal and external control systems in conventional accounting systems.", "Alternatives to PoW must be considered for blockchain-based accounting that prevents the management from conducting fraud and, thereby, qualifies the blockchain for its application in accounting." ]
[ 0, 2, 4, 1, 4 ]
[ 0.6215999722480774, 0.4323999881744385, 0.3783999979496002, 0.40540000796318054, 0.6215999722480774 ]
train_1498
[ "Ensemble methods for classification and regression have focused a great deal of attention in recent years.", "They have shown, both theoretically and empirically, that they are able to perform substantially better than single models in a wide range of tasks.", "We have adapted an ensemble method to the problem of predicting future values of time series using recurrent neural networks (RNNs) as base learners.", "The improvement is made by combining a large number of RNNs, each of which is generated by training on a different set of examples.", "This algorithm is based on the boosting algorithm where difficult points of the time series are concentrated on during the learning process however, unlike the original algorithm, we introduce a new parameter for tuning the boosting influence on available examples.", "We test our boosting algorithm for RNNs on single-step-ahead and multi-step-ahead prediction problems.", "The results are then compared to other regression methods, including those of different local approaches.", "The overall results obtained through our ensemble method are more accurate than those obtained through the standard method, backpropagation through time, on these datasets and perform significantly better even when long-range dependencies play an important role.", "2006 Elsevier B.V. All rights reserved." ]
[ 0, 0, 1, 1, 1, 1, 4, 4, 3 ]
[ 0.8108000159263611, 0.8108000159263611, 0.5946000218391418, 0.8108000159263611, 0.6215999722480774, 0.5946000218391418, 0.5946000218391418, 1, 1 ]
train_1499
[ "User comments are the most popular but also extremely controversial form of communication on YouTube.", "Their public image is very poor; users generally expect that most comments will be of little value or even in thoroughly bad taste.", "Nevertheless, heaps of comments continue to be posted every day.", "We propose an explanation for this contradiction in user attitudes and behaviour based on a new comment classification approach which captures salient aspects of YouTube comments.", "We show that, based on our new classification, we are able to perform very fast lightweight semantic video analysis.", "In addition, our results indicate that users’ video perceptions (Likes and Dislikes) are indeed influenced by the dispersion of valuable and inferior comments." ]
[ 0, 0, 0, 1, 1, 4 ]
[ 0.8234999775886536, 1, 0.8234999775886536, 0.41179999709129333, 0.6470999717712402, 0.8234999775886536 ]