abstract_id
stringlengths
10
10
sentences
list
labels
list
confs
list
train_1500
[ "This electronic document is a \"live\" template.", "The various components of your paper [title, text, heads, etc.]", "are Abstract—Object detection in natural scenes has been widely researched in the past decade, and many deep learning based methods have achieved good performance on this task.", "This paper focuses on how to transfer and refine those object detection approaches from natural scene images to documents images, and proposes a deep learning-based page object (e.g., tables, formulae, figures) detection method.", "On the basis of traditional Convolutional Neural Network (CNN) based object detection methods, we redesign the region proposal method, the training strategy, the network structure and replace the Non-Maximum Suppression (NMS) with a dynamic programming algorithm.", "The experimental results show that it is essential to adjust some modules of the natural scene object detection approaches in order to better process the document images.", "The proposed method also achieved better performance compared with existing page object detection methods." ]
[ 0, 0, 2, 1, 1, 4, 4 ]
[ 0.6176000237464905, 0.8234999775886536, 0.3824000060558319, 0.6470999717712402, 0.5881999731063843, 1, 1 ]
train_1501
[ "Much has been written about the explosion of data, also known as the “data deluge”.", "Similarly, much of today's research and decision making are based on the de facto acceptance that knowledge and insight can be gained from analyzing and contextualizing the vast (and growing) amount of “open” or “raw” data.", "The concept that the large number of data sources available today facilitates analyses on combinations of heterogeneous information that would not be achievable via “siloed” data maintained in warehouses is very powerful.", "The term data lake has been coined to convey the concept of a centralized repository containing virtually inexhaustible amounts of raw (or minimally curated) data that is readily made available anytime to anyone authorized to perform analytical activities.", "The often unstated premise of a data lake is that it relieves users from dealing with data acquisition and maintenance issues, and guarantees fast access to local, accurate and updated data without incurring development costs (in terms of time and money) typically associated with structured data warehouses.", "However appealing this premise, practically speaking, it is our experience, and that of our customers, that “raw” data is logistically difficult to obtain, quite challenging to interpret and describe, and tedious to maintain.", "Furthermore, these challenges multiply as the number of sources grows, thus increasing the need to thoroughly describe and curate the data in order to make it consumable.", "In this paper, we present and describe some of the challenges inherent in creating, filling, maintaining, and governing a data lake, a set of processes that collectively define the actions of data wrangling, and we propose that what is really needed is a curated data lake, where the lake contents have undergone a curation process that enable its use and deliver the promise of ad-hoc data accessibility to users beyond the enterprise IT staff." ]
[ 0, 0, 0, 0, 0, 0, 0, 4 ]
[ 0.7894999980926514, 0.5788999795913696, 0.5788999795913696, 0.3684000074863434, 0.3684000074863434, 0.3684000074863434, 0.3684000074863434, 0.421099990606308 ]
train_1502
[ "Let A be a linear bounded operator in a Hilbert space H, N(A) and R(A) its null-space and range, and A∗ its adjoint.", "The operator A is called Fredholm iff dim N(A) = dim N(A∗) := n < ∞ and R(A) and R(A∗) are closed subspaces of H. A simple and short proof is given of the following known result: A is Fredholm", "iff A = B + F , where B is an isomorphism and F is a finite-rank operator.", "The proof consists in reduction to a finite-dimensional linear algebraic system which is equivalent to the equation Au = f in the case of Fredholm operators." ]
[ 0, 0, 1, 4 ]
[ 0.41670000553131104, 0.41670000553131104, 0.3889000117778778, 0.583299994468689 ]
train_1503
[ "This paper surveys the eld of reinforcement learning from a computer-science perspective.", "It is written to be accessible to researchers familiar with machine learning.", "Both the historical basis of the eld and a broad selection of current work are summarized.", "Reinforcement learning is the problem faced by an agent that learns behavior through trial-and-error interactions with a dynamic environment.", "The work described here has a resemblance to work in psychology, but di ers considerably in the details and in the use of the word \\neinforcement.", "\" The paper discusses central issues of reinforcement learning, including trading o exploration and exploitation, establishing the foundations of the eld via Markov decision theory, learning from delayed reinforcement, constructing empirical models to accelerate learning, making use of generalization and hierarchy, and coping with hidden state.", "It concludes with a survey of some implemented systems and an assessment of the practical utility of current methods for reinforcement learning." ]
[ 2, 2, 2, 1, 1, 1, 4 ]
[ 1, 1, 0.7940999865531921, 0.5881999731063843, 0.5881999731063843, 0.6176000237464905, 1 ]
train_1504
[ "This paper presents Conflux, a fast, scalable and decentralized blockchain system that optimistically process concurrent blocks without discarding any as forks.", "The Conflux consensus protocol represents relationships between blocks as a direct acyclic graph and achieves consensus on a total order of the blocks.", "Conflux then, from the block order, deterministically derives a transaction total order as the blockchain ledger.", "We evaluated Conflux on Amazon EC2 clusters with up to 20k full nodes.", "Conflux achieves a transaction throughput of 5.76GB/h while confirming transactions in 4.5-7.4 minutes.", "The throughput is equivalent to 6400 transactions per second for typical Bitcoin transactions.", "Our results also indicate that when running Conflux, the consensus protocol is no longer the throughput bottleneck.", "The bottleneck is instead at the processing capability of individual nodes." ]
[ 0, 0, 1, 4, 4, 4, 4, 4 ]
[ 0.583299994468689, 0.583299994468689, 0.41670000553131104, 0.22220000624656677, 0.22220000624656677, 0.22220000624656677, 0.8611000180244446, 0.8611000180244446 ]
train_1505
[ "In recent years, theoretical and computational linguistics has paid much attention to linguistic items that form scales.", "In NLP, much research has focused on ordering adjectives by intensity (tiny < small).", "Here, we address the task of automatically ordering English adverbs by their intensifying or diminishing effect on adjectives (e.g. extremely small < very small).", "We experiment with 4 different methods: 1) using the association strength between adverbs and adjectives; 2) exploiting scalar patterns (such as not only X but Y); 3) using the metadata of product reviews; 4) clustering.", "The method that performs best is based on the use of metadata and ranks adverbs by their scaling factor relative to unmodified adjectives." ]
[ 0, 0, 2, 1, 4 ]
[ 0.7940999865531921, 0.41179999709129333, 0.41179999709129333, 1, 0.8234999775886536 ]
train_1506
[ "Twitter as a new form of social media can potentially contain much useful information, but content analysis on Twitter has not been well studied.", "In particular, it is not clear whether as an information source Twitter can be simply regarded as a faster news feed that covers mostly the same information as traditional news media.", "In This paper we empirically compare the content of Twitter with a traditional news medium, New York Times, using unsupervised topic modeling.", "We use a Twitter-LDA model to discover topics from a representative sample of the entire Twitter.", "We then use text mining techniques to compare these Twitter topics with topics from New York Times, taking into consideration topic categories and types.", "We also study the relation between the proportions of opinionated tweets and retweets and topic categories and types.", "Our comparisons show interesting and useful findings for downstream IR or DM applications." ]
[ 0, 0, 1, 1, 1, 1, 4 ]
[ 1, 1, 0.5, 0.6215999722480774, 0.8108000159263611, 0.6215999722480774, 0.7838000059127808 ]
train_1507
[ "The purpose of this article is to develop a design theory of blended learning curriculum in ways of establishing a model for designing such a curriculum and a model for designing an activity in a blended learning curriculum as well as demonstrating how these models can be utilized in a curriculum design.", "It first attempts to define what the essence of blended learning is by drawing on definitions of previous studies.", "Then, it goes on to identify the characteristics and rationales of blended learning.", "Finally, it exemplifies the devised BLC activity model, which is supported by the BLC design model and the BLC process model." ]
[ 2, 1, 1, 4 ]
[ 0.583299994468689, 0.41670000553131104, 0.41670000553131104, 0.44440001249313354 ]
train_1508
[ "The Bitcoin cryptocurrency records its transactions in a public log called the blockchain.", "Its security rests critically on the distributed protocol that maintains the blockchain, run by participants called miners.", "Conventional wisdom asserts that the mining protocol is incentive-compatible and secure against colluding minority groups, that is, it incentivizes miners to follow the protocol as prescribed.", "We show that the Bitcoin mining protocol is not incentive-compatible.", "We present an attack with which colluding miners' revenue is larger than their fair share.", "The attack can have significant consequences for Bitcoin: Rational miners will prefer to join the attackers, and the colluding group will increase in size until it becomes a majority.", "At this point, the Bitcoin system ceases to be a decentralized currency.", "Unless certain assumptions are made, selfish mining may be feasible for any coalition size of colluding miners.", "We propose a practical modification to the Bitcoin protocol that protects Bitcoin in the general case.", "It prohibits selfish mining by a coalition that command less than 1/4 of the resources." ]
[ 0, 0, 0, 0, 1, 1, 4, 1, 1, 4 ]
[ 1, 1, 1, 0.4706000089645386, 0.5587999820709229, 0.4706000089645386, 0.3824000060558319, 0.6470999717712402, 0.5293999910354614, 0.6765000224113464 ]
train_1509
[ "Gate current in metal–oxide–semiconductor (MOS) devices, caused by carriers tunneling through a classically forbidden energy barrier, is studied in this paper.", "The physical mechanisms of tunneling in an MOS structure are reviewed, along with the particularities of tunneling in modern MOS transistors, including effects such as direct tunneling, polysilicon depletion, hole tunneling and valence band tunneling and gate current partitioning.", "The modeling approach to gate current used in several compact MOS models is presented and compared.", "Also, some of the effects of this gate current in the performance of digital, analog and RF circuits is discussed, and it is shown how new effects and considerations will come into play when designing circuits that use MOSFETs with ultra-thin oxides.", "2006 Published by Elsevier Ltd." ]
[ 2, 1, 1, 1, 3 ]
[ 0.421099990606308, 0.6053000092506409, 0.8158000111579895, 0.6053000092506409, 0.8158000111579895 ]
train_1510
[ "Information technology practitioners are required to make calls of judgement in both a technical and a professional capacity.", "Professional codes of conduct and codes of ethics are intended to provide guidance in making such calls of judgement.", "This paper looks at the Australian Computer Society code of ethics in the light of the information technology strategies employed by the Australian telecommunications company One.", "Tel Limited.", "The failure of the company can be seen at least partly as an information systems failure, in particular the failure of its billing system, and we examine where IT practice at One.", "Tel might have deviated from the ACS code of ethics and discuss issues concerning this deviance." ]
[ 0, 0, 1, 4, 4, 4 ]
[ 0.5676000118255615, 0.5676000118255615, 0.40540000796318054, 0.5160999894142151, 0.7838000059127808, 0.7838000059127808 ]
train_1511
[ "We present Fashion-MNIST, a new dataset comprising of 28 × 28 grayscale images of 70, 000 fashion products from 10 categories, with 7, 000 images per category.", "The training set has 60, 000 images and the test set has 10, 000 images.", "Fashion-MNIST is intended to serve as a direct dropin replacement for the original MNIST dataset for benchmarking machine learning algorithms, as it shares the same image size, data format and the structure of training and testing splits.", "The dataset is freely available at https://github.com/zalandoresearch/fashion-mnist." ]
[ 2, 0, 2, 4 ]
[ 0.421099990606308, 0.421099990606308, 0.631600022315979, 0.421099990606308 ]
train_1512
[ "This article describes MATLAB/Simulink realization of open-circuit and short-circuit tests of transformers that are performed to identify equivalent circuit parameters.", "These simulation models are developed to support and enhance electric machinery education at the undergraduate level.", "The proposed tests have been successfully integrated into electric machinery courses at Drexel University, Philadelphia, PA and Nigde University, Nigde, Turkey.", "2006 Wiley Periodicals, Inc. Comput Appl Eng Educ 14: 142 150, 2006; Published online in Wiley InterScience (www.interscience.wiley.com); DOI 10.1002/cae.20077" ]
[ 0, 0, 0, 4 ]
[ 0.6053000092506409, 0.7894999980926514, 0.421099990606308, 0.7894999980926514 ]
train_1513
[ "Stock market or equity market have a profound impact in today's economy.", "A rise or fall in the share price has an important role in determining the investor's gain.", "The existing forecasting methods make use of both linear (AR, MA, ARIMA) and non-linear algorithms (ARCH, GARCH, Neural Networks), but they focus on predicting the stock index movement or price forecasting for a single company using the daily closing price.", "The proposed method is a model independent approach.", "Here we are not fitting the data to a specific model, rather we are identifying the latent dynamics existing in the data using deep learning architectures.", "In this work we use three different deep learning architectures for the price prediction of NSE listed companies and compares their performance.", "We are applying a sliding window approach for predicting future values on a short term basis.", "The performance of the models were quantified using percentage error." ]
[ 0, 0, 1, 1, 1, 1, 1, 2 ]
[ 1, 0.5368000268936157, 0.3788999915122986, 0.7894999980926514, 0.6000000238418579, 0.44209998846054077, 0.44209998846054077, 0.2526000142097473 ]
train_1514
[ "A technique for syntactic error correction, called pattern mapping, is developed.", "A pattern is used to describe how to map or change one string into another.", "Using a preconstructed list of patterns, for each detected error, the first pattern with successful mapping is found and a correction is made based on this pattern." ]
[ 0, 1, 4 ]
[ 0.7894999980926514, 0.7894999980926514, 0.39469999074935913 ]
train_1515
[ "Business models that rely on social media and user-generated content have shifted from the more traditional business model, where value for the organization is derived from the one-way delivery of products and/or services, to the provision of intangible value based on user engagement.", "This research builds a model that hypothesizes that the user experiences from social interactions among users, operationalized as personalization, transparency, access to social resources, critical mass of social acquaintances, and risk, as well as with the technical features of the social media platform, operationalized as the completeness, flexibility, integration, and evolvability, influence user engagement and subsequent usage behavior.", "Using survey responses from 408 social media users, findings suggest that both social and technical factors impact user engagement and ultimately usage with additional direct impacts on usage by perceptions of the critical mass of social acquaintances and risk.", "KEywORdS Social Interactions, Social Media, Social Networking, Technical Features, Use, User Engagement, User Experience" ]
[ 0, 2, 1, 4 ]
[ 1, 0.6388999819755554, 0.3889000117778778, 0.6111000180244446 ]
train_1516
[ "In recent years, communication in public social media increasingly affected enterprises.", "Internet users began to share information about products, brands, and companies.", "Research currently focuses on investigating this form of communication by using quantitative methods in order to get a better understanding of it and of its relevance for companies and society.", "However, little is known about how enterprises themselves spread information in social media and how stakeholders talk about brands and products.", "In our work, we investigate communication genres directed from stakeholderto-stakeholder, from business-to-stakeholder, and from stakeholder-to-business.", "By doing this, we were able to broadly analyze the content of communication in social media.", "In our research, we focus on the company adidas, an international manufacturer of sports clothes.", "We concentrate on the awareness aspect and adapted a theoretical model in order to evaluate companyrelated communication in Twitter.", "Our case study includes 289,513 tweets which were collected on 60 consecutive days.", "In order to identify genres and to answer the research questions, we manually analyzed 500 randomly chosen tweets as well as all those tweets published by official corporate accounts." ]
[ 0, 0, 2, 0, 4, 4, 4, 1, 4, 4 ]
[ 0.7813000082969666, 0.7813000082969666, 0.375, 0.3125, 0.375, 0.375, 0.625, 0.4375, 0.5313000082969666, 0.625 ]
train_1517
[ "This article surveys the current state of security issues and available defense mechanisms regarding popular online social networks.", "It covers a wide variety of attacks and the corresponding defense mechanisms, if available.", "The authors organize these attacks into four categories - privacy breaches, viral marketing, network structural attacks, and malware attacks - and focus primarily on privacy concerns.", "They offer an in-depth discussion of each category and analyze the connections among the different security issues involved." ]
[ 0, 0, 1, 4 ]
[ 0.6182000041007996, 0.5636000037193298, 0.6182000041007996, 0.6000000238418579 ]
train_1518
[ "Summarization based on text extraction is inherently limited, but generation-style abstractive methods have proven challenging to build.", "In this work, we propose a fully data-driven approach to abstractive sentence summarization.", "Our method utilizes a local attention-based model that generates each word of the summary conditioned on the input sentence.", "While the model is structurally simple, it can easily be trained end-to-end and scales to a large amount of training data.", "The model shows significant performance gains on the DUC-2004 shared task compared with several strong baselines." ]
[ 0, 2, 1, 4, 4 ]
[ 0.6075000166893005, 0.8317999839782715, 0.7756999731063843, 0.3831999897956848, 0.3644999861717224 ]
train_1519
[ "The ever increasing gap between processor and memory speeds on one side and disk systems on the other side has exposed the I/O subsystems as a bottleneck for the applications with intensive I/O requirements.", "Consequently, file systems, as low-level managers of storage resources, have to offer flexible and efficient services in order to allow a high utilization of disks.", "A storage device is typically seen by users as a contiguous linear space that can be accessed in blocks of fixed length.", "It is obvious that this simple uniform interface can not address the requirements of complex multi-user, multi-process or distributed environments.", "Therefore, file systems have been created as a layer of software that implements a more sophisticated disk management.", "The most important tasks of file systems are:" ]
[ 0, 0, 0, 0, 0, 3 ]
[ 1, 0.7940999865531921, 0.5881999731063843, 0.5881999731063843, 0.3824000060558319, 0.5881999731063843 ]
train_1520
[ "Supply Chain Risk Management has increasingly becoming a more popular research area recently.", "Various papers, with different focus and approaches, have been published.", "This paper aims to survey supply chain risk management (SCRM) literature.", "Paper published in relevant journals from 2000 to 2006 will be analyzed and classified into five categories: conceptual, descriptive, empirical, exploratory cross-sectional, and exploratory longitudinal.", "The literature review will provide the basis for outlining future research opportunities in this field." ]
[ 0, 0, 2, 1, 0 ]
[ 1, 0.6391000151634216, 0.7912999987602234, 0.5435000061988831, 0.5478000044822693 ]
train_1521
[ "In response to rapid change and fierce competition, creativity is an imperative factor to develop and implement innovation.", "Hence, most firms have pursued diverse strategies to promote individual and team creativity in the workplace.", "Shared leadership is a voluntarily, informally emergent structure beyond vertical leadership.", "A team is composed of individual members, and shared leadership and demographic diversity exist within the team, influencing team creativity.", "In this respect, we introduced shared leadership as a social network perspective as well as diversity into a team creativity model.", "In sum, we examined the influence of shared leadership and diversity on knowledge sharing and the subsequent effects on team creativity.", "Our results showed that role diversity directly influences team creativity, with shared leadership and knowledge sharing positively contributing to team creativity.", "Thus, knowledge sharing had a partially mediating role between shared leadership and team creativity.", "Apart from our hypotheses, the present results implied that if gender diversity (as a differentiated factor) is not a minority status, knowledge sharing may have a fully mediating effect between gender diversity and team creativity.", "2014 Elsevier Ltd. All rights reserved." ]
[ 0, 0, 0, 0, 1, 4, 4, 4, 4, 3 ]
[ 0.6222000122070312, 0.6222000122070312, 0.4431999921798706, 0.4431999921798706, 0.6165000200271606, 0.5568000078201294, 0.6165000200271606, 0.6165000200271606, 0.6420000195503235, 0.6165000200271606 ]
train_1522
[ "While “big data” has become a highlighted buzzword since last year, “big data mining”, i.e., mining from big data, has almost immediately followed up as an emerging, interrelated research area.", "This paper provides an overview of big data mining and discusses the related challenges and the new opportunities.", "The discussion includes a review of state-of-the-art frameworks and platforms for processing and managing big data as well as the efforts expected on big data mining.", "We address broad issues related to big data and/or big data mining, and point out opportunities and research topics as they shall duly flesh out.", "We hope our effort will help reshape the subject area of today’s data mining technology toward solving tomorrow’s bigger challenges emerging in accordance with big data." ]
[ 0, 0, 1, 1, 4 ]
[ 1, 0.3824000060558319, 0.41179999709129333, 0.2353000044822693, 0.3824000060558319 ]
train_1523
[ "Since the Software Engineering Institute has launch ed the Capability Maturity Model almost twenty years ago, hundreds of maturity models have been pr oposed by researchers and practitioners across multiple application domains.", "With process orientat ion being a central paradigm of organizational design and continuous process improvement taking to p positions on CIO agendas, maturity models are also prospering in business process management.", "Although the application of maturity models is increasing in quantity and breadth, the concept of maturity models is frequently subject to criticism.", "Indeed, numerous shortcomings have been disclosed r ef rring to both maturity models as design products and the process of maturity model design.", "Whereas research has already substantiated the design process, there is no holistic understanding of the principles of form and function – that is, t he design principles – maturity models should meet.", "We therefore propose a pragmatic, yet well-founded framework of general design principles justified by existing literature and grouped according to typical purposes of use.", "The framework is demonstrated using an exemplary set of maturity models related to business process management.", "We finally give a b rief outlook on implications and topics for further research." ]
[ 0, 0, 0, 0, 0, 2, 1, 4 ]
[ 1, 0.8205000162124634, 0.8205000162124634, 0.6154000163078308, 0.41029998660087585, 0.41029998660087585, 0.6154000163078308, 0.6154000163078308 ]
train_1524
[ "We present and discuss several novel applications of deep learning for the physical layer.", "By interpreting a communications system as an autoencoder, we develop a fundamental new way to think about communications system design as an end-to-end reconstruction task that seeks to jointly optimize transmitter and receiver components in a single process.", "We show how this idea can be extended to networks of multiple transmitters and receivers and present the concept of radio transformer networks as a means to incorporate expert domain knowledge in the machine learning model.", "Lastly, we demonstrate the application of convolutional neural networks on raw IQ samples for modulation classification which achieves competitive accuracy with respect to traditional schemes relying on expert features.", "This paper is concluded with a discussion of open challenges and areas for future investigation." ]
[ 0, 2, 1, 4, 4 ]
[ 1, 0.4106999933719635, 0.4068000018596649, 0.6297000050544739, 0.6297000050544739 ]
train_1525
[ "Programming is more than just coding, for, it exposes students to computational thinking which involves problem-solving using computer science concepts like abstraction and decomposition.", "Even for non-computing majors, computational thinking is applicable and useful in their daily lives.", "The three dimensions of computational thinking are computational concepts, computational practices and computational perspectives.", "In recent years, the availability of free and user-friendly programming languages has fuelled the interest of researchers and educators to explore how computational thinking can be introduced in K-12 contexts.", "Through an analysis of 27 available intervention studies, this paper presents the current trends of empirical research in the development of computational thinking through programming and suggests possible research and instructional implications.", "From the review, we propose that more K-12 intervention studies centering on computational practices and computational perspectives could be conducted in the regular classroom.", "To better examine these two dimensions, students could be asked to verbalize their thought process using think aloud protocol while programming and their on-screen programming activity could be captured and analyzed.", "Predetermined categories based on both past and recent programming studies could be used to guide the analysis of the qualitative data.", "As for the instructional implication, it is proposed that a constructionism-based problem-solving learning environment, with information processing, scaffolding and reflection activities, could be designed to foster computational practices and computational perspectives.", "2014 Elsevier Ltd. All rights reserved." ]
[ 0, 0, 0, 2, 2, 1, 1, 4, 4, 3 ]
[ 0.8055999875068665, 0.41670000553131104, 0.8055999875068665, 0.41670000553131104, 0.41670000553131104, 0.8055999875068665, 0.6111000180244446, 0.6111000180244446, 0.6111000180244446, 0.8055999875068665 ]
train_1526
[ "Double dispatch is the ability of selecting dynamically a method not only according to the run-time type of the receiver (single dispatch), but also to the run-time type of the argument.", "This mechanism unleashes the power of dynamic binding in object-oriented languages, so enhancing re-usability and separation of responsibilities.", "However, many mainstream languages, such as, e.g., C++ and Java, do not provide it, resorting to only single dispatch.", "In this paper we propose an extension of C++ (applicable also to other OO languages) that enables double dispatch as a language feature.", "This yields dynamic overloading and covariant specialization of methods.", "We define a translation from the new constructs to standard C++ and we present the preprocessor implementing this translation, called doublecpp.", "The translated code enjoys static type safety and implements the semantics of double dispatch by using only standard mechanisms of static overloading and dynamic binding, with minimal impact on the performance of the program." ]
[ 0, 2, 0, 1, 0, 1, 1 ]
[ 0.800000011920929, 0.4000000059604645, 0.8285999894142151, 0.628600001335144, 0.4000000059604645, 0.8285999894142151, 1 ]
train_1527
[ "A new compensation technique known as tail compensation is applied to a two-stage CMOS operational amplifier.", "The compensation is established by a capacitor connected between the output node and the source node of the differential amplifier.", "For the selected opamp topology, tail compensation allows better performance in terms of bandwidth and power supply rejection ratio (PSRR) when compared to Miller and cascode compensation.", "Operational amplifiers using Miller, cascode and tail compensation were fabricated in a 0.5-μm 2P3M CMOS process.", "The circuits operate at a total quiescent current of 90 μA with ±1.5V power supplies.", "Experimental results show that tail compensation increases the unity-gain frequency by 60% and 25% and improves PSRR from the positive rail by 22 dB and 26 dB over a frequency range from 23 kHz to 3.0 MHz compared to Miller and cascode compensation, respectively." ]
[ 0, 0, 0, 1, 1, 4 ]
[ 1, 0.6176000237464905, 0.7940999865531921, 0.5881999731063843, 0.5881999731063843, 0.5881999731063843 ]
train_1528
[ "In this paper, we provide an introduction to machine learning tasks that address important problems in genomic medicine.", "One of the goals of genomic medicine is to determine how variations in the DNA of individuals can affect the risk of different diseases, and to find causal explanations so that targeted therapies can be designed.", "Here we focus on how machine learning can help to model the relationship between DNA and the quantities of key molecules in the cell, with the premise that these quantities, which we refer to as cell variables, may be associated with disease risks.", "Modern biology allows high-throughput measurement of many such cell variables, including gene expression, splicing, and proteins binding to nucleic acids, which can all be treated as training targets for predictive models.", "With the growing availability of large-scale data sets and advanced computational techniques such as deep learning, researchers can help to usher in a new era of effective genomic medicine." ]
[ 2, 2, 2, 1, 3 ]
[ 0.41029998660087585, 0.41029998660087585, 0.6154000163078308, 0.3846000134944916, 0.3846000134944916 ]
train_1529
[ "We explore using Convolutional Neural Networks (CNNs) for a small-footprint keyword spotting (KWS) task.", "CNNs are attractive for KWS since they have been shown to outperform DNNs with far fewer parameters.", "We consider two different applications in our work, one where we limit the number of multiplications of the KWS system, and another where we limit the number of parameters.", "We present new CNN architectures to address the constraints of each applications.", "We find that the CNN architectures offer between a 27-44% relative improvement in false reject rate compared to a DNN, while fitting into the constraints of each application." ]
[ 0, 2, 4, 1, 4 ]
[ 0.40540000796318054, 0.21619999408721924, 0.40540000796318054, 0.5946000218391418, 0.4323999881744385 ]
train_1530
[ "Information technology applications that support decision-making processes and problem-solving activities have proliferated and evolved.", "Distributing used cars to various automobile auctions is a complicated problem with multiple variables.", "We developed a software system to address these complexities and implemented it on a real distribution problem for a large car manufacturer.", "The system detects data trends in a dynamic environment, incorporates optimization modules to recommend a near-optimum decision, and includes self-learning modules to improve future recommendations.", "A software system that combines prediction, optimization, and adaptation techniques has generated impressive profits for a large auto manufacturer." ]
[ 0, 0, 4, 1, 4 ]
[ 0.7878999710083008, 0.7878999710083008, 0.3635999858379364, 0.3939000070095062, 0.42419999837875366 ]
train_1531
[ "Cryptographic standards serve two important goals: making different implementations interoperable and avoiding various known pitfalls in commonly used schemes.", "This chapter discusses Public-Key Cryptography Standards (PKCS) which have significant impact on the use of public key cryptography in practice.", "PKCS standards are a set of standards, called PKCS #1 through #15.", "These standards cover RSA encryption, RSA signature, password-based encryption, cryptographic message syntax, private-key information syntax, selected object classes and attribute types, certification request syntax, cryptographic token interface, personal information exchange syntax, and cryptographic token information syntax.", "The PKCS standards are published by RSA Laboratories.", "Though RSA Laboratories solicits public opinions and advice for PKCS standards, RSA Laboratories retain sole decision-making authority on all aspects of PKCS standards.", "PKCS has been the basis for many other standards such as S/MIME." ]
[ 2, 2, 1, 1, 0, 4, 3 ]
[ 0.40540000796318054, 0.40540000796318054, 0.5946000218391418, 0.5946000218391418, 0.40540000796318054, 0.40540000796318054, 0.40540000796318054 ]
train_1532
[ "Steganography involves hiding of text, image or any sensitive information inside another image, video or audio in such a way that an attacker will not be able to detect its presence.", "Steganography is, many times, confused with cryptography as both the techniques are used to secure information.", "The difference lies in the fact that steganography hides the data so that nothing appears out of ordinary while cryptography encrypts the text, making it difficult for an outsider to infer anything from it even if they do attain the encrypted text.", "Both of them are combined to increase the security against various malicious attacks.", "Image Steganography uses an image as the cover media to hide the secret message.", "In this paper, we propose an image steganography method which clusters the image into various segments and hides data in each of the segment.", "Various clustering algorithms can be used for image segmentation.", "Segmentation involves huge set of data in the form of pixels, where each pixel further has three components namely red, green and blue.", "K-means clustering technique is used to get accurate results.", "Therefore, we use K-means clustering technique to get accurate results in a small time period." ]
[ 0, 0, 0, 2, 4, 2, 1, 1, 1, 4 ]
[ 0.6000000238418579, 0.771399974822998, 0.542900025844574, 0.22859999537467957, 0.4000000059604645, 0.4000000059604645, 0.771399974822998, 0.6000000238418579, 0.4571000039577484, 0.37139999866485596 ]
train_1533
[ "Recent years have seen a major push for face recognition technology due to the large expansion of image sharing on social networks.", "In this paper, we consider the difficult task of determining parent-offspring resemblance using deep learning to answer the question \"Who do I look like?\"", "Although humans can perform this job at a rate higher than chance, it is not clear how they do it [2].", "However, recent studies in anthropology [24] have determined which features tend to be the most discriminative.", "In this study, we aim to not only create an accurate system for resemblance detection, but bridge the gap between studies in anthropology with computer vision techniques.", "Further, we aim to answer two key questions: 1) Do offspring resemble their parents?", "and 2) Do offspring resemble one parent more than the other?", "We propose an algorithm that fuses the features and metrics discovered via gated autoencoders with a discriminative neural network layer that learns the optimal, or what we call genetic, features to delineate parent-offspring relationships.", "We further analyze the correlation between our automatically detected features and those found in anthropological studies.", "Meanwhile, our method outperforms the state-of-the-art in kinship verification by 3-10% depending on the relationship using specific (father-son, mother-daughter, etc.) and generic models." ]
[ 0, 0, 0, 0, 2, 2, 2, 1, 1, 1 ]
[ 0.8108000159263611, 0.6215999722480774, 0.8108000159263611, 0.8108000159263611, 0.40540000796318054, 0.8108000159263611, 0.40540000796318054, 0.6215999722480774, 0.6215999722480774, 0.5946000218391418 ]
train_1534
[ "We consider the problem of learning from examples in layered linear feed-forward neural networks using optimization methods, such as back propagation, with respect to the usual quadratic error function E of the connection weights.", "Our main result is a complete description of the landscape attached to E in terms of principal component analysis.", "We show that E has a unique minimum corresponding to the projection onto the subspace generated by the first principal vectors of a covariance matrix associated with the training patterns.", "All the additional critical points of E are saddle points (corresponding to projections onto subspaces generated by higher order vectors).", "The auto-associative case is examined in detail.", "Extensions and implications for the learning algorithms are discussed." ]
[ 0, 4, 4, 1, 1, 1 ]
[ 0.5152000188827515, 0.5152000188827515, 0.5152000188827515, 0.5152000188827515, 0.4544999897480011, 0.4544999897480011 ]
train_1535
[ "The backbone of the information age is digital information which may be searched, accessed, and transferred instantaneously.", "Therefore the digitization of paper documents is extremely interesting.", "This chapter describes approaches for document structure recognition detecting the hierarchy of physical components in images of documents, such as pages, paragraphs, and figures, and transforms this into a hierarchy of logical components, such as titles, authors, and sections.", "This structural information improves readability and is useful for indexing and retrieving information contained in documents.", "First we present a rule-based system segmenting the document image and estimating the logical role of these zones.", "It is extensively used for processing newspaper collections showing world-class performance.", "In the second part we introduce several machine learning approaches exploring large numbers of interrelated features.", "They can be adapted to geometrical models of the document structure, which may be set up as a linear sequence or a general graph.", "These advanced models require far more computational resources but show a better performance than simpler alternatives and might be used in future." ]
[ 0, 0, 2, 1, 1, 1, 1, 1, 4 ]
[ 1, 0.7940999865531921, 0.7940999865531921, 0.5184999704360962, 0.6176000237464905, 1, 1, 0.7940999865531921, 0.6176000237464905 ]
train_1536
[ "Due to the high number and cost of interruptions at work, several approaches have been suggested to reduce this cost for knowledge workers.", "These approaches predominantly focus either on a manual and physical indicator, such as headphones or a closed office door, or on the automatic measure of a worker's interruptibilty in combination with a computer-based indicator.", "Little is known about the combination of a physical indicator with an automatic interruptibility measure and its long-term impact in the workplace.", "In our research, we developed the FlowLight, that combines a physical traffic-light like LED with an automatic interruptibility measure based on computer interaction data.", "In a large-scale and long-term field study with 449 participants from 12 countries, we found, amongst other results, that the FlowLight reduced the interruptions of participants by 46%, increased their awareness on the potential disruptiveness of interruptions and most participants never stopped using it." ]
[ 0, 0, 0, 1, 4 ]
[ 0.8205000162124634, 0.7949000000953674, 0.41029998660087585, 0.5896999835968018, 0.7949000000953674 ]
train_1537
[ "This paper drew upon a recent book (Rethinking Education in the Age of Technology) to summarize a number of prospects and challenges arising from the appropriation of digital technology into learning and educational practice.", "Tensions between traditional models of schooling and the affordances of digital media were noted, while the promise of these technologies for shaping a new system of education was reviewed.", "It was argued that new technology brings radical opportunities but also significant challenges.", "The urgency of seeking a coherent model for the future of education in a technological age was stressed." ]
[ 0, 0, 0, 4 ]
[ 0.7983999848365784, 0.3950999975204468, 0.49480000138282776, 0.4032999873161316 ]
train_1538
[ "As we are moving towards the Internet of Things (IoT), the number of sensors deployed around the world is growing at a rapid pace.", "Market research has shown a significant growth of sensor deployments over the past decade and has predicted a significant increment of the growth rate in the future.", "These sensors continuously generate enormous amounts of data.", "However, in order to add value to raw sensor data we need to understand it.", "Collection, modelling, reasoning, and distribution of context in relation to sensor data plays critical role in this challenge.", "Context-aware computing has proven to be successful in understanding sensor data.", "In this paper, we survey context awareness from an IoT perspective.", "We present the necessary background by introducing the IoT paradigm and context-aware fundamentals at the beginning.", "Then we provide an in-depth analysis of context life cycle.", "We evaluate a subset of projects (50) which represent the majority of research and commercial solutions proposed in the field of context-aware computing conducted over the last decade (2001-2011) based on our own taxonomy." ]
[ 0, 0, 0, 0, 0, 0, 4, 1, 1, 4 ]
[ 1, 1, 0.7894999980926514, 0.7894999980926514, 0.7894999980926514, 0.5788999795913696, 0.39469999074935913, 0.5788999795913696, 0.3684000074863434, 0.3684000074863434 ]
train_1539
[ "Few prior works study deep learning on point sets.", "PointNet [20] is a pioneer in this direction.", "However, by design PointNet does not capture local structures induced by the metric space points live in, limiting its ability to recognize fine-grained patterns and generalizability to complex scenes.", "In this work, we introduce a hierarchical neural network that applies PointNet recursively on a nested partitioning of the input point set.", "By exploiting metric space distances, our network is able to learn local features with increasing contextual scales.", "With further observation that point sets are usually sampled with varying densities, which results in greatly decreased performance for networks trained on uniform densities, we propose novel set learning layers to adaptively combine features from multiple scales.", "Experiments show that our network called PointNet++ is able to learn deep point set features efficiently and robustly.", "In particular, results significantly better than state-of-the-art have been obtained on challenging benchmarks of 3D point clouds." ]
[ 0, 0, 0, 2, 1, 4, 4, 4 ]
[ 1, 1, 1, 0.5676000118255615, 0.7838000059127808, 0.40540000796318054, 1, 1 ]
train_1540
[ "Default logic is one of the most prominent approaches to nonmonotonic reasoning, and allows one to make plausible conjectures when faced with incomplete information about the problem at hand.", "Default rules prevail in many application domains such as medical and legal reasoning.", "Several variants have been developed over the past year, either to overcome some perceived deficiencies of the original presentation, or to realize somewhat different intuitions.", "This paper provides a tutorial-style introduction to some important approaches of Default Logic.", "The presentation is based on operational models for these approaches, thus making them easily accessible to a broader audience, and more easily usable in practical applications." ]
[ 0, 1, 1, 1, 1 ]
[ 0.5946000218391418, 0.40540000796318054, 0.5946000218391418, 0.3783999979496002, 0.8108000159263611 ]
train_1541
[ "We study the question of feature sets for robust visual object recognition; adopting linear SVM based human detection as a test case.", "After reviewing existing edge and gradient based descriptors, we show experimentally that grids of histograms of oriented gradient (HOG) descriptors significantly outperform existing feature sets for human detection.", "We study the influence of each stage of the computation on performance, concluding that fine-scale gradients, fine orientation binning, relatively coarse spatial binning, and high-quality local contrast normalization in overlapping descriptor blocks are all important for good results.", "The new approach gives near-perfect separation on the original MIT pedestrian database, so we introduce a more challenging dataset containing over 1800 annotated human images with a large range of pose variations and backgrounds." ]
[ 0, 1, 0, 4 ]
[ 0.583299994468689, 0.6111000180244446, 0.583299994468689, 0.6111000180244446 ]
train_1542
[ "In this paper an eco-driving assistance system for reducing the energy consumption in electric vehcles is proposed.", "An accurate electric vehicle model is developed and an optimal control problem is formulated.", "The optimal control problem is solved based on dynamic programming.", "As a result an energy-optimal speed profile is obtained.", "This speed profile is displayed to the driver for eco-drving assistance.", "Experiments indicate that the speed profile can be tracked well by the driver and that the energy consumption can be reduced substantially." ]
[ 0, 0, 1, 4, 4, 4 ]
[ 0.6226000189781189, 0.6226000189781189, 0.4666999876499176, 0.4528000056743622, 0.4528000056743622, 0.6791999936103821 ]
train_1543
[ "A momentum term is usually included in the simulations of connectionist learning algorithms.", "Although it is well known that such a term greatly improves the speed of learning, there have been few rigorous studies of its mechanisms.", "In this paper, I show that in the limit of continuous time, the momentum parameter is analogous to the mass of Newtonian particles that move through a viscous medium in a conservative force field.", "The behavior of the system near a local minimum is equivalent to a set of coupled and damped harmonic oscillators.", "The momentum term improves the speed of convergence by bringing some eigen components of the system closer to critical damping.", "Similar results can be obtained for the discrete time case used in computer simulations.", "In particular, I derive the bounds for convergence on learning-rate and momentum parameters, and demonstrate that the momentum term can increase the range of learning rate over which the system converges.", "The optimal condition for convergence is also analyzed." ]
[ 0, 0, 1, 1, 1, 4, 4, 4 ]
[ 0.8181999921798706, 1, 0.4544999897480011, 0.4544999897480011, 0.6061000227928162, 0.6061000227928162, 0.6061000227928162, 0.3939000070095062 ]
train_1544
[ "In this paper we consider a periodic review, reorder point, order-up-to-level system, a type commonly used in practice.", "Motivated by a specific practical context, we present a novel approach to determining the reorder point and order-up-to-level (for a given review interval) so as to target desired values of i) customer fill rate and ii) average time between consecutive replenishments.", "Specifically, by using a diffusion model (producing normally distributed demand) we convert a periodic review, constant lead time setting into one having continuous review and a random lead time.", "The method is simple to implement and produces quite reasonable results." ]
[ 0, 2, 1, 1 ]
[ 0.8108000159263611, 0.3783999979496002, 0.5676000118255615, 0.3513999879360199 ]
train_1545
[ "A robust adaptive control approach is proposed to solve the consensus problem of multiagent systems.", "Compared with the previous work, the agent's dynamics includes the uncertainties and external disturbances, which is more practical in real-world applications.", "Due to the approximation capability of neural networks, the uncertain dynamics is compensated by the adaptive neural network scheme.", "The effects of the approximation error and external disturbances are counteracted by employing the robustness signal.", "The proposed algorithm is decentralized because the controller for each agent only utilizes the information of its neighbor agents.", "By the theoretical analysis, it is proved that the consensus error can be reduced as small as desired.", "The proposed method is then extended to two cases: agents form a prescribed formation, and agents have the higher order dynamics.", "Finally, simulation examples are given to demonstrate the satisfactory performance of the proposed method." ]
[ 2, 1, 2, 1, 1, 1, 4, 4 ]
[ 0.6154000163078308, 0.41029998660087585, 0.41029998660087585, 0.41029998660087585, 0.41029998660087585, 0.41029998660087585, 0.41029998660087585, 1 ]
train_1546
[ "We investigate the numerical approximation of the semiconductor Boltzmann transport equation using an expansion of the distribution function in spherical harmonics.", "A complexity analysis shows that traditional implementations of higher order spherical harmonics expansions suffer from huge memory requirements, especially for two and three dimensional devices.", "To overcome these complexity limitations, a compressed matrix storage scheme using Kronecker products is proposed, which reduces the memory requirements for the storage of the system matrix significantly.", "Furthermore, the total memory requirements are asymptotically dominated only by the memory required for the unknowns.", "We discuss the increased importance of the selection of an appropriate linear solver and show that execution times for matrix-vector multiplications using the compressed matrix scheme are even smaller than those for an uncompressed system matrix.", "Numerical results demonstrate the applicability of our method and confirm our theoretical results." ]
[ 0, 1, 1, 1, 1, 4 ]
[ 0.41940000653266907, 0.41940000653266907, 0.5806000232696533, 0.5806000232696533, 0.41940000653266907, 0.3547999858856201 ]
train_1547
[ "This study investigated how celebrities' self-disclosure on personal social media accounts, particularly Twitter, affects fans' perceptions.", "An online survey was utilized among a sample of 429 celebrity followers on Twitter.", "Results demonstrated that celebrities' professional self-disclosure (e.g., sharing their work-related life), personal self-disclosure (e.g., sharing their personal life such as friends and family), and fans' retweeting behavior, enhanced fans’ feeling of social presence, thereby positively affecting parasocial interaction with celebrities.", "Further, the study found that the effects of self-disclosure and retweeting on parasocial interaction were mediated by social presence.", "Implications and future research directions are provided.", "© 2016 Elsevier Ltd.", "All rights reserved." ]
[ 0, 0, 4, 1, 1, 3, 3 ]
[ 0.5881999731063843, 0.5293999910354614, 0.4706000089645386, 0.3528999984264374, 0.3528999984264374, 0.6470999717712402, 0.6470999717712402 ]
train_1548
[ "How can a machine learn from experience?", "Probabilistic modelling provides a framework for understanding what learning is, and has therefore emerged as one of the principal theoretical and practical approaches for designing machines that learn from data acquired through experience.", "The probabilistic framework, which describes how to represent and manipulate uncertainty about models and predictions, has a central role in scientific data analysis, machine learning, robotics, cognitive science and artificial intelligence.", "This Review provides an introduction to this framework, and discusses some of the state-of-the-art advances in the field, namely, probabilistic programming, Bayesian optimization, data compression and automatic model discovery." ]
[ 3, 1, 1, 4 ]
[ 0.421099990606308, 0.421099990606308, 0.421099990606308, 0.421099990606308 ]
train_1549
[ "The purpose of this study is to identify several areas of forensic interest within the Yahoo!", "Messenger application, which are of forensic significance.", "This study focuses on new areas of interest within the file structure of Windows Vista and Windows 7.", "One of the main issues with this topic is that little research has been previously conducted on the new Windows platforms.", "Previously conducted research indicates the evidence found on older file structures, such as Windows XP, as well as outdated versions of Yahoo!", "Messenger.", "Several differences were found within the Yahoo Messenger’s registry keys and directory structure on Windows Vista and Windows 7 as compared to Windows XP." ]
[ 2, 2, 2, 0, 4, 3, 4 ]
[ 0.771399974822998, 0.542900025844574, 0.571399986743927, 0.34290000796318054, 0.542900025844574, 0.771399974822998, 0.571399986743927 ]
train_1550
[ "This research analyses the suburban expansion in the metropolitan area of Tehran, Iran.", "A hybrid model consisting of logistic regression model, Markov chain (MC), and cellular automata (CA) was designed to improve the performance of the standard logistic regression model.", "Environmental and socio-economic variables dealing with urban sprawl were operationalised to create a probability surface of spatiotemporal states of built-up land use for the years 2006, 2016, and 2026.", "For validation, the model was evaluated by means of relative operating characteristic values for different sets of variables.", "The approach was arkov chain ellular automata ehran calibrated for 2006 by cross comparing of actual and simulated land use maps.", "The achieved outcomes represent a match of 89% between simulated and actual maps of 2006, which was satisfactory to approve the calibration process.", "Thereafter, the calibrated hybrid approach was implemented for forthcoming years.", "Finally, future land use maps for 2016 and 2026 were predicted by means of this hybrid approach.", "The simulated maps illustrate a new wave of suburban development in the vicinity of Tehran at the tropo western border of the me" ]
[ 0, 1, 0, 1, 1, 4, 4, 0, 4 ]
[ 0.5676000118255615, 0.4323999881744385, 0.3783999979496002, 0.5946000218391418, 0.8108000159263611, 0.7838000059127808, 0.3513999879360199, 0.4323999881744385, 0.3783999979496002 ]
train_1551
[ "Five years of experimenting with Personal Health Records has not yielded the results that big companies like Google and Microsoft expected.", "Whereas Google pulled the plug on its product offering, Microsoft struggles to reach sufficient critical mass.", "This study adopts a user perspective (51 interviews) in conjunction with grounded theory, to offer explanations why Google Health failed and predictions relative to Microsoft's ability to reach a tipping point with respect to product/service viability.", "Noteworthy, vendors ignore relevance, or perceived usefulness when designing PHRs.", "Moreover, low trust and high risks do not bode well for long-term success, with the widely used information systems success models often neglecting the latter two critical dimensions." ]
[ 0, 0, 0, 0, 4 ]
[ 0.8055999875068665, 0.8055999875068665, 0.44440001249313354, 0.6388999819755554, 0.583299994468689 ]
train_1552
[ "This study is designed to determine the most important project management core competencies, including both hard skills and soft skills.", "The study determines the importance of these competencies to job success, and the current performance of project managers with respect to these core competencies.", "The gaps between importance and performance represent opportunities for professional development courses and programs." ]
[ 0, 0, 1 ]
[ 0.8093000054359436, 0.8093000054359436, 0.40860000252723694 ]
train_1553
[ "It is not—unless it triggers feelings of envy.", "This study uses the framework of social rank theory of depression and conceptualizes Facebook envy as a possible link between Facebook surveillance use and depression among college students.", "Using a survey of 736 college students, we found that the effect of surveillance use of Facebook on depression is mediated by Facebook envy.", "However, when Facebook envy is controlled for, Facebook use actually lessens depression.", "2014 Elsevier Ltd.", "All rights reserved." ]
[ 0, 1, 1, 4, 3, 3 ]
[ 0.7838000059127808, 0.40540000796318054, 0.6215999722480774, 0.5946000218391418, 0.6215999722480774, 0.7838000059127808 ]
train_1554
[ "The paper deals with trajectory tracking of the differential drive robot with a mathematical model governing dynamics and kinematics.", "Motor dynamics and chassis dynamics are considered for deriving a linear state-space dynamic model.", "Basic nonlinear kinematic equations are linearized into a successively linearized state-space model.", "The dynamic and kinematic models are augmented to derive a single state-space linear model.", "The deviation variables are reference variables which are variables of an ideal robot following a reference trajectory which can be pre-calculated.", "Reference tracking is achieved by model predictive control of supply voltage of both the drive motors by considering constraints on controlled variables and manipulated variables.", "Simulation results are provided to demonstrate the performance of proposed control strategy in the MATLAB simulation environment." ]
[ 0, 2, 2, 0, 1, 1, 4 ]
[ 1, 0.4205999970436096, 0.4205999970436096, 0.39250001311302185, 0.6075000166893005, 1, 0.8130999803543091 ]
train_1555
[ "This paper presents a method of learning qualitatively interpretable models in object detection using popular two-stage region-based ConvNet detection systems (i.e., R-CNN) [22, 61, 9, 26].", "R-CNN consists of a region proposal network and a RoI (Region-of-Interest) prediction network.", "By interpretable models, we focus on weaklysupervised extractive rationale generation, that is learning to unfold latent discriminative part configurations of object instances automatically and simultaneously in detection without using any supervision for part configurations.", "We utilize a top-down hierarchical and compositional grammar model embedded in a directed acyclic AND-OR Graph (AOG) to explore and unfold the space of latent part configurations of RoIs.", "We propose an AOGParsing operator to substitute the RoIPooling operator widely used in RCNN, so the proposed method is applicable to many stateof-the-art ConvNet based detection systems.", "The AOGParsing operator aims to harness both the explainable rigor of top-down hierarchical and compositional grammar models and the discriminative power of bottom-up deep neural networks through end-to-end training.", "In detection, a bounding box is interpreted by the best parse tree derived from the AOG on-the-fly, which is treated as the extractive rationale generated for interpreting detection.", "In learning, we propose a folding-unfolding method to train the AOG and ConvNet end-to-end.", "In experiments, we build on top of the R-FCN [9] and test the proposed method on the PASCAL VOC 2007 and 2012 datasets with performance comparable to state-of-the-art methods." ]
[ 0, 0, 2, 1, 1, 1, 4, 4, 4 ]
[ 0.6571000218391418, 0.6571000218391418, 0.428600013256073, 0.771399974822998, 0.8285999894142151, 0.4571000039577484, 0.6571000218391418, 0.428600013256073, 0.6571000218391418 ]
train_1556
[ "Multi-objective formulations are realistic models for many complex engineering optimization problems.", "In many real-life problems, objectives under consideration conflict with each other, and optimizing a particular solution with respect to a single objective can result in unacceptable results with respect to the other objectives.", "A reasonable solution to a multi-objective problem is to investigate a set of solutions, each of which satisfies the objectives at an acceptable level without being dominated by any other solution.", "In this paper, an overview and tutorial is presented describing genetic algorithms (GA) developed specifically for problems with multiple objectives.", "They differ primarily from traditional GA by using specialized fitness functions and introducing methods to promote solution diversity.", "r 2005 Elsevier Ltd.", "All rights reserved." ]
[ 0, 0, 0, 2, 1, 3, 3 ]
[ 0.8019000291824341, 0.4244999885559082, 0.6226000189781189, 0.4244999885559082, 0.8490999937057495, 0.6509000062942505, 0.6509000062942505 ]
train_1557
[ "In the feature subset selection problem, a learning algorithm is faced with the problem of selecting a relevant subset of features upon which to focus its attention, while ignoring the rest.", "To achieve the best possible performance with a particular learning algorithm on a particular training set, a feature subset selection method should consider how the algorithm and the training set interact.", "We explore the relation between optimal feature subset selection and relevance.", "Our wrapper method searches for an optimal feature subset tailored to a particular algorithm and a domain.", "We study the strengths and weaknesses of the wrapper approach and show a series of improved designs.", "We compare the wrapper approach to induction without feature subset selection and to Relief, a filter approach to feature subset selection.", "Significant improvement in accuracy is achieved for some datasets for the two families of induction algorithms used: decision trees and Naive-Bayes.", "@ 1997 Elsevier Science B.V." ]
[ 0, 0, 2, 1, 1, 1, 4, 3 ]
[ 0.7894999980926514, 0.7894999980926514, 0.421099990606308, 0.8158000111579895, 1, 0.8158000111579895, 0.8158000111579895, 0.8158000111579895 ]
train_1558
[ "Augmented reality (AR) as an emerging technology in the mobile computing domain is becoming mature enough to engender publicly available applications for end users.", "Various commercial applications have recently been emerging in the mobile consumer domain at an increasing pace — Layar, Junaio, Google Goggles, and Wikitude are perhaps the most prominent ones.", "However, the research community lacks an understanding of how well such timely applications have been accepted, what kind of user experiences they have evoked, and what the users perceive as the weaknesses of the various applications overall.", "During the spring of 2011 we conducted an online survey to study the overall acceptance and user experience of the mobile AR-like consumer applications currently existing on the market.", "This paper reports the first analyses of the qualitative and quantitative survey data of 90 respondents.", "We highlight an extensive set of user-oriented issues to be considered in developing the applications further, as well as in directing future user research in AR.", "The results indicate that the experiences have been inconsistent: generally positive evaluations are overshadowed by mentions of applications' pragmatic uselessness in everyday life and technical unreliability, as well as excessive or limited and irrelevant content." ]
[ 0, 0, 0, 1, 1, 4, 4 ]
[ 1, 1, 0.7894999980926514, 0.421099990606308, 0.421099990606308, 0.21050000190734863, 0.5788999795913696 ]
train_1559
[ "Assessing the relatedness of documents is at the core of many applications such as document retrieval and recommendation.", "Most similarity approaches operate on word-distribution-based document representations fast to compute, but problematic when documents differ in language, vocabulary or type, and neglecting the rich relational knowledge available in Knowledge Graphs.", "In contrast, graph-based document models can leverage valuable knowledge about relations between entities however, due to expensive graph operations, similarity assessments tend to become infeasible in many applications.", "This paper presents an efficient semantic similarity approach exploiting explicit hierarchical and transversal relations.", "We show in our experiments that (i) our similarity measure provides a significantly higher correlation with human notions of document similarity than comparable measures, (ii) this also holds for short documents with few annotations, (iii) document similarity can be calculated efficiently compared to other graph-traversal based approaches." ]
[ 0, 0, 0, 1, 1 ]
[ 0.7894999980926514, 1, 0.7894999980926514, 0.421099990606308, 0.5788999795913696 ]
train_1560
[ "Leveraging large historical data in electronic health record (EHR), we developed Doctor AI, a generic predictive model that covers observed medical conditions and medication uses.", "Doctor AI is a temporal model using recurrent neural networks (RNN) and was developed and applied to longitudinal time stamped EHR data from 260K patients over 8 years.", "Encounter records (e.g. diagnosis codes, medication codes or procedure codes) were input to RNN to predict (all) the diagnosis and medication categories for a subsequent visit.", "Doctor AI assesses the history of patients to make multilabel predictions (one label for each diagnosis or medication category).", "Based on separate blind test set evaluation, Doctor AI can perform differential diagnosis with up to 79% recall@30, significantly higher than several baselines.", "Moreover, we demonstrate great generalizability of Doctor AI by adapting the resulting models from one institution to another without losing substantial accuracy." ]
[ 0, 1, 1, 1, 1, 4 ]
[ 0.7949000000953674, 0.5896999835968018, 0.41029998660087585, 0.5896999835968018, 0.41029998660087585, 0.7949000000953674 ]
train_1561
[ "The problem of arbitrary object tracking has traditionally been tackled by learning a model of the object’s appearance exclusively online, using as sole training data the video itself.", "Despite the success of these methods, their online-only approach inherently limits the richness of the model they can learn.", "Recently, several attempts have been made to exploit the expressive power of deep convolutional networks.", "However, when the object to track is not known beforehand, it is necessary to perform Stochastic Gradient Descent online to adapt the weights of the network, severely compromising the speed of the system.", "In this paper we equip a basic tracking algorithm with a novel fully-convolutional Siamese network trained end-to-end on the ILSVRC15 dataset for object detection in video.", "Our tracker operates at frame-rates beyond real-time and, despite its extreme simplicity, achieves state-of-the-art performance in multiple benchmarks." ]
[ 0, 0, 0, 0, 4, 4 ]
[ 1, 1, 0.800000011920929, 0.6000000238418579, 0.4000000059604645, 0.6000000238418579 ]
train_1562
[ "In this paper, we discuss the method of Bayesian regression and its efficacy for predicting price variation of Bitcoin, a recently popularized virtual, cryptographic currency.", "Bayesian regression refers to utilizing empirical data as proxy to perform Bayesian inference.", "We utilize Bayesian regression for the so-called “latent source model”.", "The Bayesian regression for “latent source model” was introduced and discussed by Chen, Nikolov and Shah [1] and Bresler, Chen and Shah [2] for the purpose of binary classification.", "They established theoretical as well as empirical efficacy of the method for the setting of binary classification.", "In this paper, instead we utilize it for predicting real-valued quantity, the price of Bitcoin.", "Based on this price prediction method, we devise a simple strategy for trading Bitcoin.", "The strategy is able to nearly double the investment in less than 60 day period when run against real data trace." ]
[ 0, 0, 1, 1, 1, 4, 4, 4 ]
[ 0.7940999865531921, 0.7940999865531921, 0.41179999709129333, 0.3824000060558319, 0.5881999731063843, 0.5881999731063843, 0.41179999709129333, 0.6176000237464905 ]
train_1563
[ "The Raven’s Progressive Matrices (RPM) test is a commonly used test of general human intelligence.", "The RPM is somewhat unique as a general intelligence test in that it focuses on visual problem solving, and in particular, on visual similarity and analogy.", "We are developing a small set of methods for problem solving in the RPM which use propositional, imagistic, and multimodal representations, respectively, to investigate how different representations can contribute to visual problem solving and how the effects of their use might emerge in behavior." ]
[ 0, 0, 1 ]
[ 0.8421000242233276, 0.421099990606308, 0.5788999795913696 ]
train_1564
[ "Time series is an important class of temporal data objects and it can be easily obtained from scientific and financial applications.", "A time series is a collection of observations made chronologically.", "The nature of time series data includes: large in data size, high dimensionality and necessary to update continuously.", "Moreover time series data, which is characterized by its numerical and continuous nature, is always considered as a whole instead of individual numerical field.", "The increasing use of time series data has initiated a great deal of research and development attempts in the field of data mining.", "The abundant research on time series data mining in the last decade could hamper the entry of interested researchers, due to its complexity.", "In this paper, a comprehensive revision on the existing time series data mining research is given.", "They are generally categorized into representation and indexing, similarity measure, segmentation, visualization and mining.", "Moreover state-of-the-art research issues are also highlighted.", "The primary objective of this paper is to serve as a glossary for interested researchers to have an overall picture on the current time series data mining development and identify their potential research direction to further investigation." ]
[ 0, 0, 0, 0, 0, 0, 2, 1, 1, 2 ]
[ 0.8158000111579895, 0.8158000111579895, 0.6053000092506409, 0.6053000092506409, 0.6053000092506409, 0.6053000092506409, 0.39469999074935913, 0.631600022315979, 0.631600022315979, 1 ]
train_1565
[ "One of the most used methods to forecast price volatility is the generalized autoregressive conditional heteroskedasticity (GARCH) model.", "Nonetheless, the errors in prediction using this approach are often quite high.", "Hence, continued research is conducted to improve forecasting models employing a variety of techniques.", "In this paper, we extend the field of expert systems, forecasting, and model by applying an Artificial Neural Network (ANN) to the GARCH method generating an ANN–GARCH.", "The hybrid ANN–GARCH model is applied to forecast the gold price volatility (spot and future).", "The results show an overall improvement in forecasting using the ANN–GARCH as compared to a GARCH method alone.", "An overall reduction of 25% in the mean average percent error was realized using the ANN–GARCH.", "The results are realized using the Euro/Dollar and Yen/Dollar exchange rates, the DJI and FTSE stock market indexes, and the oil price return as inputs.", "We discuss the implications of the study within the context of the discipline as well as practical applications.", "2015 Elsevier Ltd." ]
[ 0, 0, 0, 1, 1, 4, 4, 4, 4, 3 ]
[ 0.800000011920929, 0.800000011920929, 0.628600001335144, 0.6000000238418579, 0.771399974822998, 0.428600013256073, 0.4000000059604645, 0.800000011920929, 0.571399986743927, 0.8285999894142151 ]
train_1566
[ "Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs.", "State-of-the-art malware analyzers discover code guarded by triggers via multiple path exploration, symbolic execution, or forced conditional execution, all without knowing the trigger inputs.", "We present a malware obfuscation technique that automatically conceals specific trigger-based behavior from these malware analyzers.", "Our technique automatically transforms a program by encrypting code that is conditionally dependent on an input value with a key derived from the input and then removing the key from the program.", "We have implemented a compiler-level tool that takes a malware source program and automatically generates an obfuscated binary.", "Experiments on various existing malware samples show that our tool can hide a significant portion of trigger based code.", "We provide insight into the strengths, weaknesses, and possible ways to strengthen current analysis approaches in order to defeat this malware obfuscation technique." ]
[ 0, 0, 2, 1, 1, 4, 4 ]
[ 1, 0.8108000159263611, 0.6215999722480774, 0.5946000218391418, 0.5946000218391418, 0.6215999722480774, 1 ]
train_1567
[ "Requirements engineering (RE) has attracted a great deal of attention from researchers and practitioners in recent years.", "Requirements engineering education (REE) is therefore an important undertaking if the field is to have professionals who are capable of successfully accomplishing software projects.", "This increasing interest demands that academia should provide software engineering students with a solid foundation in the subject matter.", "This paper aims to identify and to present the current research on REE that is available at present, and to select useful approaches and needs for future research.", "A systematic mapping study was therefore performed to classify the selected studies into five classification criteria: research type, empirical type, contribution type, RE activity, and curricula.", "A total of 79 papers were selected and classified according to these criteria.", "The results of this systematic mapping study are discussed, and a list of advice obtained from the REE literature for instructors is provided." ]
[ 0, 2, 2, 2, 1, 1, 4 ]
[ 0.39469999074935913, 0.39469999074935913, 0.5788999795913696, 0.39469999074935913, 0.5788999795913696, 0.6053000092506409, 0.5788999795913696 ]
train_1568
[ "Neural network models are capable of generating extremely natural sounding conversational interactions.", "However, these models have been mostly applied to casual scenarios (e.g., as “chatbots”) and have yet to demonstrate they can serve in more useful conversational applications.", "This paper presents a novel, fully data-driven, and knowledge-grounded neural conversation model aimed at producing more contentful responses.", "We generalize the widely-used Sequence-toSequence (SEQ2SEQ) approach by conditioning responses on both conversation history and external “facts”, allowing the model to be versatile and applicable in an open-domain setting.", "Our approach yields significant improvements over a competitive SEQ2SEQ baseline.", "Human judges found that our outputs are significantly more informative." ]
[ 0, 0, 0, 1, 1, 4 ]
[ 1, 1, 0.4000000059604645, 0.6000000238418579, 0.4571000039577484, 0.628600001335144 ]
train_1569
[ "Harmonic and cycloid drives are both compact, high ratio transmissions appropriate for use in anthropomorphic robots, although cycloid drives are rarely used in the field.", "This paper describes the design parameters for cycloid drives and shows the results of six cycloid models designed to match corresponding harmonic drives.", "Cycloid drive models were compared with manufacturing data from corresponding harmonic drives with respect to maximum gear ratio, transmission thickness, efficiency, backlash/gear ratio ripple, and reflected inertia.", "Cycloid drive designs were found to be thinner, more efficient, and to have lower reflected inertia than corresponding harmonic drives.", "However, the cycloid designs had larger gear ratio ripple and substantial backlash, and they could not meet the maximum gear ratio provided by the corresponding harmonic drives in two out of six models for equal applied torques.", "Two cycloid drives were manufactured to confirm efficiency predictions and demonstrated moderate to high efficiency across a range of output torques.", "Cycloid drives should be considered for robotic and prosthetic applications where smaller thickness/higher efficiency requirements dominate over low backlash/gear ratio ripple considerations." ]
[ 0, 2, 1, 1, 1, 1, 4 ]
[ 1, 0.6215999722480774, 0.6215999722480774, 0.6215999722480774, 0.4323999881744385, 0.5946000218391418, 0.40540000796318054 ]
train_1570
[ "Facial/voice-based authentication is becoming increasingly popular (e.g., already adopted by MasterCard and AliPay), because it is easy to use.", "In particular, users can now authenticate themselves to online services by using their mobile phone to show themselves performing simple tasks like blinking or smiling in front of its built-in camera.", "Our study shows that many of the publicly available facial/voice recognition services (e.g. Microsoft Cognitive Services or Amazon Rekognition) are vulnerable to even the most primitive attacks.", "Furthermore, recent work on modeling a person’s face/voice (e.g. Face2Face [1]) allows an adversary to create very authentic video/audio of any target victim to impersonate that target.", "All it takes to launch such attacks are a few pictures and voice samples of a victim, which can all be obtained by either abusing the camera and microphone of the victim’s phone, or through the victim’s social media account.", "In this work, we propose the Real Time Captcha (rtCaptcha) system, which stops/slows down such an attack by turning the adversary’s task from creating authentic video/audio of the target victim performing known authentication tasks (e.g., smile, blink) to figuring out what is the authentication task, which is encoded as a Captcha.", "Specifically, when a user tries to authenticate using rtCaptcha, they will be presented a Captcha and will be asked to take a “selfie” video while announcing the answer to the Captcha.", "As such, the security guarantee of our system comes from the strength of Captcha, and not how well we can distinguish real faces/voices from synthesized ones.", "To demonstrate the usability and security of rtCaptcha, we conducted a user study to measure human response times to the most popular Captcha schemes.", "Our experiments show that, thanks to the humans’ speed of solving Captchas, adversaries will have to solve Captchas in less than 2 seconds in order to appear live/human and defeat rtCaptcha, which is not possible for the best settings on the attack side." ]
[ 0, 0, 0, 1, 1, 1, 1, 1, 1, 4 ]
[ 1, 1, 0.6053000092506409, 0.6053000092506409, 0.5788999795913696, 0.5788999795913696, 1, 1, 0.631600022315979, 1 ]
train_1571
[ "Biometric identification has become increasingly popular in recent years.", "With the development of cloud computing, database owners are motivated to outsource the large size of biometric data and identification tasks to the cloud to get rid of the expensive storage and computation costs, which, however, brings potential threats to users’ privacy.", "In this paper, we propose an efficient and privacy-preserving biometric identification outsourcing scheme.", "Specifically, the biometric To execute a biometric identification, the database owner encrypts the query data and submits it to the cloud.", "The cloud performs identification operations over the encrypted database and returns the result to the database owner.", "A thorough security analysis indicates that the proposed scheme is secure even if attackers can forge identification requests and collude with the cloud.", "Compared with previous protocols, experimental results show that the proposed scheme achieves a better performance in both preparation and identification procedures." ]
[ 0, 0, 2, 1, 1, 4, 4 ]
[ 0.7838000059127808, 0.7838000059127808, 0.5946000218391418, 0.6215999722480774, 0.40540000796318054, 0.5946000218391418, 0.5946000218391418 ]
train_1572
[ "This paper presents the construction of a multimodal dataset for deception detection, including physiological, thermal, and visual responses of human subjects under three deceptive scenarios.", "We present the experimental protocol, as well as the data acquisition process.", "To evaluate the usefulness of the dataset for the task of deception detection, we present a statistical analysis of the physiological and thermal modalities associated with the deceptive and truthful conditions.", "Initial results show that physiological and thermal responses can differentiate between deceptive and truthful states." ]
[ 0, 1, 1, 4 ]
[ 0.5788999795913696, 0.421099990606308, 0.5788999795913696, 0.7894999980926514 ]
train_1573
[ "The increasing influence of social media and enormous participation of users creates new opportunities to study human social behavior along with the capability to analyze large amount of data streams.", "One of the interesting problems is to distinguish between different kinds of users, for example users who are leaders and introduce new issues and discussions on social media.", "Furthermore, positive or negative attitudes can also be inferred from those discussions.", "Such problems require a formal interpretation of social media logs and unit of information that can spread from person to person through the social network.", "Once the social media data such as user messages are parsed and network relationships are identified, data mining techniques can be applied to group different types of communities.", "However, the appropriate granularity of user communities and their behavior is hardly captured by existing methods.", "In this paper, we present a framework for the novel task of detecting communities by clustering messages from large streams of social data.", "Our framework uses K-Means clustering algorithm along with Genetic algorithm and Optimized Cluster Distance (OCD) method to cluster data.", "The goal of our proposed framework is twofold that is to overcome the problem of general K-Means for choosing best initial centroids using Genetic algorithm, as well as to maximize the distance between clusters by pairwise clustering using OCD to get an accurate clusters.", "We used various cluster validation metrics to evaluate the performance of our algorithm." ]
[ 0, 0, 0, 0, 1, 1, 1, 1, 2, 1 ]
[ 1, 0.8108000159263611, 0.8108000159263611, 0.8108000159263611, 0.5676000118255615, 0.5676000118255615, 0.3783999979496002, 0.3513999879360199, 0.4323999881744385, 0.5946000218391418 ]
train_1574
[ "Patent (on behalf of Nokia Siemens Networks)", "“An adaptive Mechanism for Dynamic Reconfiguration of Wireless Mesh to Conserve Power,” Sudhir Dixit and Suman Sarkar [Filed on October, 2007, Granted].", "“Cascaded Source-driven Node Wake-up and Routing in Wireless Mesh,” Sudhir Dixit and Suman Sarkar [Filed on October, 2007, pending].", "“", "A method and Apparatus to Minimize Power/Battery Consumption in Wireless Mesh,” Suman Sarkar, et al. [Filed on November, 2007, pending]." ]
[ 0, 2, 1, 3, 1 ]
[ 0.6176000237464905, 0.4706000089645386, 0.6765000224113464, 1, 0.7646999955177307 ]
train_1575
[ "As global virtual teams become more common, the need to better understand how groups composed of individuals from different cultural backgrounds perform has never been more pressing.", "This study compares groups from the same cultural background with groups from varied cultural backgrounds when they used two different communication media (face-to-face and an asynchronous conferencing system).", "Data was collected on 46 groups, which included a total of 268 subjects representing 39 countries.", "Research questions regarding group process and consensus were addressed specifically as they relate to cross-cultural group work.", "The results of this study suggest that distributed, asynchronous GSS may be effectively used by mixed cultural groups facing a value-based cognitive conflict (negotiation) task." ]
[ 0, 1, 0, 1, 4 ]
[ 0.6215999722480774, 0.3783999979496002, 0.40540000796318054, 0.5946000218391418, 0.8108000159263611 ]
train_1576
[ "Information theory is rapidly approaching its 70th birthday.", "What are promising future directions for research in information theory?", "Where will information theory be having the most impact in 10–20 years?", "What new and emerging areas are ripe for the most impact, of the sort that information theory has had on the telecommunications industry over the last 60 years?", "How should the IEEE Information Theory Society promote high-risk new research directions and broaden the reach of information theory, while continuing to be true to its ideals and insisting on the intellectual rigor that makes its breakthroughs so powerful?", "These are some of the questions that an ad hoc committee (composed of the present authors) explored over the past two years.", "We have discussed and debated these questions, and solicited detailed inputs from experts in fields including genomics, biology, economics, and neuroscience.", "This report is the result of these discussions." ]
[ 4, 0, 2, 4, 4, 2, 1, 4 ]
[ 0.4000000059604645, 0.4000000059604645, 0.4000000059604645, 0.20000000298023224, 0.20000000298023224, 0.4000000059604645, 0.6000000238418579, 0.800000011920929 ]
train_1577
[ "The Internet of Things (IoT) is aimed at enabling the interconnection and integration of the physical world and the cyber space.", "It represents the trend of future networking, and leads the third wave of the IT industry revolution.", "In this article, we first introduce some background and related technologies of IoT and discuss the concepts and objectives of IoT. Then, we present the challenges and key scientific problems involved in IoT development.", "Moreover, we introduce the current research project supported by the National Basic Research Program of China (973 Program).", "Finally, we outline future research directions." ]
[ 0, 0, 2, 1, 4 ]
[ 0.7949000000953674, 1, 0.7949000000953674, 0.41029998660087585, 0.5896999835968018 ]
train_1578
[ "The goal of Risk Management activities is to define prevention and control mechanisms to address the risks attached to specify activities and valuable assets.", "Many Risk Management efforts operate in silos with narrowly focused, functionally driven, and disjointed activities.", "That fact leads to a fragmented view of risks, where each activity uses its own language, customs and metrics.", "The lack of interconnection and holistic view of risks limits an organization-wide perception of risks, where interdependent risks are not anticipated, controlled or managed.", "In order to address the Risk Management interoperability and standardization issues, this paper proposes an alignment between Risk Management, Governance and Enterprise Architecture activities, providing a systematic support to map and trace identified risks to enterprise artifacts modeled within the Enterprise Architecture, supporting the overall strategy of any organization.", "We discuss the main relationships between Risk Management and Enterprise Architecture and propose an architecture to integrate risks concerns into the overall organization environment." ]
[ 2, 0, 2, 0, 2, 1 ]
[ 0.6154000163078308, 0.5896999835968018, 0.41029998660087585, 0.5896999835968018, 0.5896999835968018, 0.5896999835968018 ]
train_1579
[ "With the ever-increasing cost for healthcare and increased health insurance premiums, there is a need for proactive healthcare and wellness.", "In addition, the new wave of digitizing medical records has seen a paradigm shift in the healthcare industry.", "As a result, the healthcare industry is witnessing an increase in sheer volume of data in terms of complexity, diversity and timeliness.", "As healthcare experts look for every possible way to lower costs while improving care process, delivery and management, big data emerges as a plausible solution with the promise to transform the healthcare industry.", "This paradigm shift from reactive to proactive healthcare can result in an overall decrease in healthcare costs and eventually lead to economic growth.", "While the healthcare industry harnesses the power of big data, security and privacy issues are at the focal point as emerging threats and vulnerabilities continue to grow.", "In this paper, we present the state-of-the-art security and privacy issues in big data as applied to healthcare industry." ]
[ 0, 0, 0, 0, 1, 1, 4 ]
[ 0.7949000000953674, 0.7949000000953674, 0.7949000000953674, 0.5896999835968018, 0.3846000134944916, 0.3846000134944916, 0.3846000134944916 ]
train_1580
[ "Strategic alignment focuses on the activities that management performs to achieve cohesive goals across the IT (Information Technology) and other functional organizations (e.g., finance, marketing, H/R, manufacturing).", "Therefore, alignment addresses both how IT is in harmony with the business, and how the business should, or could be in harmony with IT.", "Alignment evolves into a relationship where the function of IT and other business functions adapt their strategies together.", "Achieving alignment is evolutionary and dynamic.", "It requires strong support from senior management, good working relationships, strong leadership, appropriate prioritization, trust, and effective communication, as well as a thorough understanding of the business and technical environments.", "Achieving and sustaining alignment demands focusing on maximizing the enablers and minimizing the inhibitors that cultivate alignment.", "The strategic alignment maturity assessment provides organizations with a vehicle to evaluate these activities.", "Knowing the maturity of its strategic choices and alignment practices make it possible for a firm to see where it stands and how it can improve.", "This paper discusses an approach for assessing the maturity of the business-IT alignment.", "Once maturity is understood, an organization can identify opportunities for enhancing the harmonious relationship of business and IT." ]
[ 0, 0, 0, 4, 4, 4, 1, 1, 1, 4 ]
[ 0.8205000162124634, 0.6154000163078308, 0.6154000163078308, 0.41029998660087585, 0.41029998660087585, 0.41029998660087585, 0.5160999894142151, 0.6154000163078308, 0.5896999835968018, 0.6154000163078308 ]
train_1581
[ "In recent years, organizations have invested heavily in e-procurement technology solutions.", "However, an estimation of the value of the technology-enabled procurement process is often lacking.", "Our paper presents a rigorous methodological approach to the analysis of e-procurement benefits.", "Business process simulations are used to analyze the benefits of both technological and organizational changes related to e-procurement.", "The approach enables an estimation of both the average and variability of procurement costs and benefits, workload, and lead times.", "In addition, the approach enables optimization of a procurement strategy (e.g., approval levels).", "Finally, an innovative approach to estimation of value at risk is shown." ]
[ 0, 0, 2, 2, 2, 2, 4 ]
[ 0.7894999980926514, 0.7894999980926514, 0.8158000111579895, 0.631600022315979, 0.8158000111579895, 0.421099990606308, 0.5788999795913696 ]
train_1582
[ "Much research has been done to understand the motivations of consumers to choose among online retailers and the retailer factors driving customer satisfaction (e.g., Kim et al. 2009; Kotha et al. 2004; Pan et al. 2002; Qu", "et al. 2008; Smith et al. 2000; Wolfinbarger and Gilly 2003).", "Concentrating on e-tailing service quality, Wolfinbarger and Gilly (2003) argue that four factors—website design, fulfillment/reliability, privacy/security, and customer service—strongly predict customer satisfaction.", "Kotha et al. (2004) study the role of online buying experience as a competitive advantage along five dimensions: website usability, customer confidence in the web business, the selection of goods and services on the site, the effectiveness of relationship services such as virtual community building and site personalization, and the extent of price leadership.", "They conclude that website usability and product selection can be easily competed away via imitation, while superior customer service can lead to a sustainable competitive advantage.", "Devaraj et al. (2002) find that the usefulness and ease-of-use of online shopping, together with high service quality, are factors affecting consumer satisfaction and, subsequently, their channel preference.", "Price can also play a role in customer satisfaction.", "Because online stores are only a mouse click away, many studies have argued that price is an important factor in a customer’s decision-making process (Lee and Overby 2004).", "Using BizRate data, Jiang and Rosenbloom (2005) find that after-delivery satisfaction and price perception have a stronger impact on customer satisfaction than at-checkout satisfaction.", "Combining the aforementioned studies while integrating their similar dimensions, we review three retailer characteristics, namely website design, customer service, and pricing, and we provide theoretical background for this research." ]
[ 0, 3, 0, 0, 4, 4, 0, 0, 4, 4 ]
[ 0.7838000059127808, 0.5171999931335449, 0.5946000218391418, 0.40540000796318054, 0.7838000059127808, 0.7838000059127808, 0.40540000796318054, 0.40540000796318054, 0.8108000159263611, 0.5946000218391418 ]
train_1583
[ "Researchers have previously examined the technology acceptance model (TAM) in many contexts, including the Internet.", "More recently TAM has been enhanced to include a hedonic component of enjoyment but the effect has rarely been investigated in a mobile commerce context.", "In addition, specific antecedents of TAM related to design aesthetics have not been examined within the mobile domain.", "Our research filled these gaps, and discovered that visual design aesthetics did significantly impact perceived usefulness, ease of use, and enjoyment, all of which ultimately influenced users’ loyalty intentions towards a mobile service.", "# 2006 Elsevier B.V. All rights reserved." ]
[ 0, 0, 0, 4, 3 ]
[ 0.8055999875068665, 1, 0.6111000180244446, 0.3889000117778778, 0.583299994468689 ]
train_1584
[ "Security and privacy are huge challenges in Internet of Things (IoT) environments, but unfortunately, the harmonization of the IoT-related standards and protocols is hardly and slowly widespread.", "In this paper, we propose a new framework for access control in IoT based on the blockchain technology.", "Our first contribution consists in providing a reference model for our proposed framework within the Objectives, Models, Architecture and Mechanism specification in IoT. In addition, we introduce FairAccess as a fully decentralized pseudonymous and privacy preserving authorization management framework that enables users to own and control their data.", "To implement our model, we use and adapt the blockchain into a decentralized access control manager.", "Unlike financial bitcoin transactions, FairAccess introduces new types of transactions that are used to grant, get, delegate, and revoke access.", "As a proof of concept, we establish an initial implementation with a Raspberry PI device and local blockchain.", "Finally, we discuss some limitations and propose further opportunities.", "Copyright © 2017 John Wiley & Sons, Ltd." ]
[ 0, 0, 2, 1, 1, 1, 4, 4 ]
[ 1, 0.6000000238418579, 0.6000000238418579, 0.6000000238418579, 0.800000011920929, 0.6000000238418579, 0.800000011920929, 0.6000000238418579 ]
train_1585
[ "Find loads of the can system engineering from theory to practical applications book catalogues in this site as the choice of you visiting this page.", "You can also join to the website book library that will show you numerous books from any types.", "Literature, science, politics, and many more catalogues are presented to offer you the best book to find.", "The book that really makes you feels satisfied.", "Or that's the book that will save you from your job deadline." ]
[ 0, 0, 0, 3, 3 ]
[ 0.6053000092506409, 0.6053000092506409, 0.421099990606308, 0.6053000092506409, 0.6053000092506409 ]
train_1586
[ "Fraud detection is of great importance to financial institutions.", "This paper is concerned with the problem of finding outliers in time series financial data using Peer Group Analysis (PGA), which is an unsupervised technique for fraud detection.", "The objective of PGA is to characterize the expected pattern of behavior around the target sequence in terms of the behavior of similar objects, and then to detect any difference in evolution between the expected pattern and the target.", "The tool has been applied to the stock market data, which has been collected from Bangladesh Stock Exchange to assess its performance in stock fraud detection.", "We observed PGA can detect those brokers who suddenly start selling the stock in a different way to other brokers to whom they were previously similar.", "We also applied t-statistics to find the deviations effectively." ]
[ 0, 2, 2, 1, 1, 4 ]
[ 1, 0.5946000218391418, 1, 0.40540000796318054, 0.5946000218391418, 0.5946000218391418 ]
train_1587
[ "White LED offers advantageous properties such as high brightness, reliability, lower power consumption and long lifetime.", "White LEDs are expected to serve in the next generation of lamps.", "An indoor visible-light communication system utilizing white LED lights has been proposed from our laboratory.", "In the proposed system, these devices are used not only for illuminating rooms but also for an optical wireless communication system.", "Generally, plural lights are installed in our room.", "So, their optical path difference must be considered.", "In this paper, we discuss about the influence of interference and reflection.", "Based on numerical analyses, we show that the system is expected to be the indoor communication of the next generation." ]
[ 0, 2, 1, 1, 1, 4, 4, 4 ]
[ 0.8529000282287598, 0.5587999820709229, 0.6470999717712402, 0.6470999717712402, 0.5881999731063843, 0.6765000224113464, 0.6765000224113464, 0.8234999775886536 ]
train_1588
[ "Most collaborative robots use high-power motors for a good weight-to-payload ratio, thus leading to not only an increase in manufacturing cost but also possibility of injury at a collision between a human and a robot.", "To maintain high-performance with low-power driving units, a spring-based counterbalance mechanism (CBM) and a robot arm based on these CBMs were developed in our previous study.", "In this study, a 6-DOF collaborative robot equipped with a multi-DOF CBM is proposed.", "A double parallelogram linkage and a slider-crank mechanism are employed for a compact and durable design of a multi-DOF CBM.", "Unlike the previous prototypes in which some portions of CBMs were protruded out of the robot body due to their large volume, the proposed CBMs can be embedded inside the robot links.", "The performance of the developed CBM and collaborative robot were verified based on simulations using dynamic simulation software.", "Simulation results show that the proposed CBMs can effectively reduce the joint torques required to operate the robot.", "This reduction in the torque enables low-power motors to be used in a collaborative robot, thus significantly improving collision safety and energy efficiency." ]
[ 0, 2, 4, 1, 1, 4, 4, 4 ]
[ 0.6176000237464905, 0.4814999997615814, 0.41179999709129333, 0.8234999775886536, 0.41179999709129333, 0.41179999709129333, 0.41179999709129333, 0.6176000237464905 ]
train_1589
[ "The weighted linear combination (WLC) technique is a decision rule for deriving composite maps using GIS.", "It is one of the most often used decision models in GIS.", "The method, however, is frequently applied without full understanding of the assumptions underling this approach.", "In many case studies, the WLC model has been applied incorrectly and with dubious results because analysts (decision makers) have ignored or been unaware of the assumptions.", "This paper provides a critical overview of the current practice with respect to GIS/WLC and suggests the best practice approach." ]
[ 0, 0, 1, 0, 2 ]
[ 0.7894999980926514, 0.7894999980926514, 0.6053000092506409, 0.5788999795913696, 0.5788999795913696 ]
train_1590
[ "Floating-point computing with more than one TFLOP of peak performance is already a reality in recent Field-Programmable Gate Arrays (FPGA).", "General-Purpose Graphics Processing Units (GPGPU) and recent many-core CPUs have also taken advantage of the recent technological innovations in integrated circuit (IC) design and had also dramatically improved their peak performances.", "In this paper, we compare the trends of these computing architectures for high-performance computing and survey these platforms in the execution of algorithms belonging to different scientific application domains.", "Trends in peak performance, power consumption and sustained performances, for particular applications, show that FPGAs are increasing the gap to GPUs and many-core CPUs moving them away from high-performance computing with intensive floating-point calculations.", "FPGAs become competitive for custom floating-point or fixed-point representations, for smaller input sizes of certain algorithms, for combinational logic problems and parallel map-reduce problems." ]
[ 0, 0, 2, 4, 4 ]
[ 0.7949000000953674, 0.7949000000953674, 0.5896999835968018, 0.5896999835968018, 0.5896999835968018 ]
train_1591
[ "In order to compete successfully, operations in any type of firm need to be strategically aligned to the market requirements.", "This concerns both manufacturing and supply chain operations.", "The customer order decoupling point (CODP) is getting increasing attention as an important input to the design of manufacturing operations as well as supply chains.", "This paper investigates the impact of the position and role of the CODP on issues of concern for production and supply chain management.", "The focus is on the design and strategic planning aspects of the supply chain, and the design of manufacturing planning and control systems.", "The paper proposes a dual design approach for production and supply chain planning systems; one type of system for operations upstream the CODP and another type of system for downstream operations in order to fully support the characteristics and objectives of each respective part of the supply chain.", "2010 Elsevier B.V. All rights reserved.", "* Tel.", ": +46 13 281000; fax: +46 13 281101.", "E-mail address: jan.olhager@liu.se." ]
[ 0, 0, 0, 2, 2, 1, 3, 3, 3, 3 ]
[ 0.7894999980926514, 0.7894999980926514, 0.5788999795913696, 0.7894999980926514, 0.5788999795913696, 0.631600022315979, 0.5788999795913696, 0.5788999795913696, 0.5788999795913696, 0.7894999980926514 ]
train_1592
[ "The success of machine learning algorithms generally depends on data representation, and we hypothesize that this is because different representations can entangle and hide more or less the different explanatory factors of variation behind the data.", "Although domain knowledge can be used to help design representations, learning can also be used, and the quest for AI is motivating the design of more powerful representation-learning algorithms.", "This paper reviews recent work in the area of unsupervised feature learning and deep learning, covering advances in probabilistic models, manifold learning, and deep learning.", "This motivates longer-term unanswered questions about the appropriate objectives for learning good representations, for computing representations (i.e., inference), and the geometrical connections between representation learning, density estimation and manifold learning." ]
[ 1, 2, 4, 4 ]
[ 0.41179999709129333, 0.3824000060558319, 0.44119998812675476, 0.41179999709129333 ]
train_1593
[ "—Authentication establishes the identity of one party to another.", "Most commonly authentication establishes the identity of a user to some part of the system, typically by means of a password.", "More generally, authentication can be computer-to-computer or process-toprocess and mutual in both directions.", "—Access control determines what one party will allow another to do with respect to resources and objects mediated by the former.", "Access control usually requires authentication as a prerequisite.", "—The audit process gathers data about activity in the system and analyzes it to discover security violations or diagnose their cause.", "Analysis can occur offline after the fact or online in real time.", "In the latter case, the process is usually called intrusion detection." ]
[ 0, 0, 1, 1, 1, 2, 4, 4 ]
[ 0.6053000092506409, 0.6053000092506409, 0.6053000092506409, 0.7894999980926514, 0.5788999795913696, 0.421099990606308, 0.5788999795913696, 0.5788999795913696 ]
train_1594
[ "We consider topic detection without any prior knowledge of category structure or possible categories.", "Keywords are extracted and clustered based on different similarity measures using the induced k-bisecting clustering algorithm.", "Evaluation on Wikipedia articles shows that clusters of keywords correlate strongly with the Wikipedia categories of the articles.", "In addition, we find that a distance measure based on the Jensen-Shannon divergence of probability distributions outperforms the cosine similarity.", "In particular, a newly proposed term distribution taking co-occurrence of terms into account gives best results." ]
[ 0, 1, 1, 1, 4 ]
[ 0.7838000059127808, 0.8108000159263611, 0.40540000796318054, 0.40540000796318054, 1 ]
train_1595
[ "Literature reviews play an important role in the development of knowledge.", "Yet, we observe a lack of theoretical underpinning of and epistemological insights into how literature reviews can contribute to knowledge creation and have actually contributed in the IS discipline.", "To address these theoretical and empirical research gaps, we suggest a novel epistemological model of literature reviews.", "This model allows us to align different contributions of literature reviews with their underlying knowledge conversions thereby building a bridge between the previously largely unconnected fields of literature reviews and epistemology.", "We evaluate the appropriateness of the model by conducting an empirical analysis of 173 IS literature reviews which were published in 39 pertinent IS journals between 2000 and 2014.", "Based on this analysis, we derive an epistemological taxonomy of IS literature reviews, which complements previously suggested typologies." ]
[ 0, 0, 1, 1, 4, 4 ]
[ 0.583299994468689, 0.583299994468689, 0.6111000180244446, 0.7585999965667725, 0.41670000553131104, 1 ]
train_1596
[ "This paper surveys the current state of the art in Natural Language Generation (nlg), defined as the task of generating text or speech from non-linguistic input.", "A survey of nlg is timely in view of the changes that the field has undergone over the past two decades, especially in relation to new (usually data-driven) methods, as well as new applications of nlg technology.", "This survey therefore aims to (a) give an up-to-date synthesis of research on the core tasks in nlg and the architectures adopted in which such tasks are organised; (b) highlight a number of recent research topics that have arisen partly as a result of growing synergies between nlg and other areas of artificial intelligence; (c) draw attention to the challenges in nlg evaluation, relating them to similar challenges faced in other areas of nlp, with an emphasis on different evaluation methods and the relationships between them." ]
[ 2, 1, 4 ]
[ 0.7949000000953674, 0.6154000163078308, 0.5896999835968018 ]
train_1597
[ "The purpose of this article is to propose a fruitful analytical framework for data supposedly related to the concept of the socalled “digital divide.", "”", "The extent and the nature of this divide depend on the kind of access defined.", "Considering the possession of hardware, growing divides among different categories of income, employment, education, age, and ethnicity can be proved to have existed in the 1980s and 1990s according to official American and Dutch statistics.", "If only by effects of saturation, these gaps will more or less close.", "However, it is shown that differential access of skills and usage is likely to increase.", "The growth of a usage gap is projected.", "Multivariate analyses of Dutch official statistics reveal the striking effect of age and gender as compared to education.", "The usage gap is related to the evolution of the information and network society.", "Finally, policy perspectives are discussed." ]
[ 2, 3, 0, 0, 0, 0, 2, 4, 0, 4 ]
[ 0.7778000235557556, 1, 0.833299994468689, 0.8055999875068665, 0.7778000235557556, 0.3610999882221222, 0.44440001249313354, 0.3889000117778778, 0.41670000553131104, 1 ]
train_1598
[ "Text categorization (also known as text classification, or topic spotting) is the task of automatically sorting a set of documents into categories from a predefined set.", "This task has several applications, including automated indexing of scientific articles according to predefined thesauri of technical terms, filing patents into patent directories, selective dissemination of information to information consumers, automated population of hierarchical catalogues of Web resources, spam filtering, identification of document genre, authorship attribution, survey coding, and even automated essay grading.", "Automated text classification is attractive because it frees organizations from the need of manually organizing document bases, which can be too expensive, or simply infeasible given the time constraints of the application or the number of documents involved.", "The accuracy of modern text classification systems rivals that of trained human professionals, thanks to a combination of information retrieval (IR) technology and machine learning (ML) technology.", "This will outline the fundamental traits of the technologies involved, of the applications that can feasibly be tackled through text classification, and of the tools and resources that are available to the researcher and developer wishing to take up these technologies for deploying real-world applications." ]
[ 0, 0, 0, 0, 4 ]
[ 0.8158000111579895, 0.6053000092506409, 0.6053000092506409, 0.421099990606308, 0.3684000074863434 ]
train_1599
[ "With today‘s ubiquity and popularity of social network applications, the ability to analyze and understand large networks in an ef cient manner becomes critically important.", "However, as networks become larger and more complex, reasoning about social dynamics via simple statistics is not a feasible option.", "To overcome these limitations, we can rely on visual metaphors.", "Visualization nowadays is no longer a passive process that produces images from a set of numbers.", "Recent years have witnessed a convergence of social network analytics and visualization, coupled with interaction, that is changing the way analysts understand and characterize social networks.", "In this chapter, we discuss the main goal of visualization and how different metaphors are aimed towards elucidating different aspects of social networks, such as structure and semantics.", "We also describe a number of methods where analytics and visualization are interwoven towards providing a better comprehension of social structure and dynamics." ]
[ 0, 0, 0, 1, 0, 2, 1 ]
[ 0.7949000000953674, 0.7949000000953674, 0.5896999835968018, 0.41029998660087585, 0.5896999835968018, 0.5896999835968018, 0.5896999835968018 ]