abstract_id
stringlengths
10
10
sentences
list
labels
list
confs
list
train_0500
[ "False information can be created and spread easily through the web and social media platforms, resulting in widespread real-world impact.", "Characterizing how false information proliferates on social platforms and why it succeeds in deceiving readers are critical to develop efficient detection algorithms and tools for early detection.", "A recent surge of research in this area has aimed to address the key issues using methods based on feature engineering, graph mining, and information modeling.", "Majority of the research has primarily focused on two broad categories of false information: opinion-based (e.g., fake reviews), and fact-based (e.g., false news and hoaxes).", "Therefore, in this work, we present a comprehensive survey spanning diverse aspects of false information, namely (i) the actors involved in spreading false information, (ii) rationale behind successfully deceiving readers, (iii) quantifying the impact of false information, (iv) measuring its characteristics across different dimensions, and finally, (iv) algorithms developed to detect false information.", "In doing so, we create a unified framework to describe these recent methods and highlight a number of important directions for future research.1" ]
[ 0, 0, 0, 0, 1, 4 ]
[ 1, 0.800000011920929, 0.571399986743927, 0.571399986743927, 0.6000000238418579, 0.6571000218391418 ]
train_0501
[ "The Mouse Genome Database (MGD) is one component of the Mouse Genome Informatics (MGI) system (http://www.informatics.jax.org), a community database resource for the laboratory mouse.", "MGD strives to provide a comprehensive knowledgebase about the mouse with experiments and data annotated from both literature and online sources.", "MGD curates and presents consensus and experimental data representations of genetic, genotype (sequence) and phenotype information including highly detailed reports about genes and gene products.", "Primary foci of integration are through representations of relationships between genes, sequences and phenotypes.", "MGD collaborates with other bioinformatics groups to curate a definitive set of information about the laboratory mouse and to build and implement the data and semantic standards that are essential for comparative genome analysis.", "Recent developments in MGD discussed here include an extensive integration of the mouse sequence data and substantial revisions in the presentation, query and visualization of sequence data." ]
[ 0, 0, 0, 1, 4, 4 ]
[ 0.7778000235557556, 0.583299994468689, 0.583299994468689, 0.6388999819755554, 0.6388999819755554, 1 ]
train_0502
[ "Blockchain technology has shown its considerable adaptability in recent years as a variety of market sectors sought ways of incorporating its abilities into their operations.", "While so far most of the focus has been on the financial services industry, several projects in other service related areas such as healthcare show this is beginning to change.", "Numerous starting points for Blockchain technology in the healthcare industry are the focus of this report.", "With examples for public healthcare management, user-oriented medical research and drug counterfeiting in the pharmaceutical sector, this report aims to illustrate possible influences, goals and potentials connected to this disruptive technology." ]
[ 0, 0, 1, 1 ]
[ 1, 0.7949000000953674, 0.41029998660087585, 0.6154000163078308 ]
train_0503
[ "This paper considers recursive tracking of one mobile emitter using a sequence of time difference of arrival (TDOA) and frequency difference of arrival (FDOA) measurement pairs obtained by one pair of sensors.", "We consider only a single emitter without data association issues (no missed detections or false measurements).", "Each TDOA measurement defines a region of possible emitter locations around a unique hyperbola.", "This likelihood function is approximated by a Gaussian mixture, which leads to a dynamic bank of Kalman filters tracking algorithm.", "The FDOA measurements update relative probabilities and estimates of individual Kalman filters.", "This approach results in a better track state probability density function approximation by a Gaussian mixture, and tracking results near the Cramer-Rao lower bound.", "Proposed algorithm is also applicable in other cases of nonlinear information fusion.", "The performance of proposed Gaussian mixture approach is evaluated using a simulation study, and compared with a bank of EKF filters and the Cramer-Rao lower bound." ]
[ 0, 1, 4, 1, 4, 4, 2, 4 ]
[ 0.6061000227928162, 0.3939000070095062, 0.42419999837875366, 0.6363999843597412, 0.42419999837875366, 0.5758000016212463, 0.42419999837875366, 0.5758000016212463 ]
train_0504
[ "This work presents the evolution of a solution for predictive maintenance to a Big Data environment.", "The proposed adaptation aims for predicting failures on wind turbines using a data-driven solution deployed in the cloud and which is composed by three main modules.", "(i) A predictive model generator which generates predictive models for each monitored wind turbine by means of Random Forest algorithm.", "(ii) A monitoring agent that makes predictions every 10 minutes about failures in wind turbines during the next hour.", "Finally, (iii) a dashboard where given predictions can be visualized.", "To implement the solution Apache Spark, Apache Kafka, Apache Mesos and HDFS have been used.", "Therefore, we have improved the previous work in terms of data process speed, scalability and automation.", "In addition, we have provided fault-tolerant functionality with a centralized access point from where the status of all the wind turbines of a company localized all over the world can be monitored, reducing O&M costs." ]
[ 2, 2, 1, 1, 1, 4, 4, 4 ]
[ 0.40540000796318054, 0.6215999722480774, 0.8108000159263611, 0.8108000159263611, 0.7838000059127808, 0.40540000796318054, 0.4323999881744385, 0.6215999722480774 ]
train_0505
[ "Understanding individual reactions to computing technology is a central concern of information systems research.", "This research seeks to understand these reactions from the perspective of Social Cognitive Theory (Bandura 1977, 1978, 1982, 1986), a widely accepted theory of behavior in Social Psychology and Industrial/Organizational Psychology.", "The theory holds that behavior, environment, and cognitive and other individual factors are engaged in an ongoing reciprocal interaction.", "Two cognitive factors in particular are given prominence in the theory: (1) outcome expectations, or beliefs about the consequences of behavior and (2) self-efficacy, beliefs about one's ability to successfully execute particular behaviors.", "A model of individual reactions to computing technology based on this theory was tested on a sample of 940 Canadian knowledge workers.", "Eleven of the fourteen hypotheses were supported by the analysis.", "Key findings were that self-efficacy, outcome expectations, affect and anxiety all had a direct influence on computer use.", "In addition, outcome expectations and self-efficacy were found to indirectly influence computer use through affect and anxiety.", "Tile behavior and influence of others in the individuals' reference groups was found to exert a small influence on selfefficacy and outcome expectations." ]
[ 0, 2, 1, 1, 1, 1, 4, 4, 4 ]
[ 0.6388999819755554, 0.8611000180244446, 0.583299994468689, 0.8611000180244446, 0.6388999819755554, 0.44440001249313354, 0.7778000235557556, 0.7778000235557556, 1 ]
train_0506
[ "This paper consider the nonlinear state estimate problem for tracking maneuvering targets.", "Two methods are introduced to overcome the difficulty of non-linear model.", "The first method uses Interacting Multiple Model (IMM) which includes 2, 3, 4 and 10 models.", "These models are linear, each model stands for an operation point of the nonlinear model.", "Two model sets are designed using Equal-Distance Model-Set Design for each.", "The effect of increasing the number of models, separation between them and noise effect on the accuracy is introduced.", "The second method uses Second order Extended Kalman Filter (EKF2) which is a single nonlinear filter.", "Both methods are evaluated by simulation using two scenarios.", "A comparison between them is evaluated by computing their accuracy, change of operation range and computational complexity (computational time) at different measurement noise.", "Based on this study for small range of variation of nonlinear parameter, and low noise the EKF2 introduced quick and accurate tracking." ]
[ 0, 1, 1, 1, 1, 1, 1, 4, 4, 4 ]
[ 0.5587999820709229, 0.4706000089645386, 0.7940999865531921, 0.7940999865531921, 0.7646999955177307, 0.7646999955177307, 1, 0.6765000224113464, 0.8529000282287598, 0.4706000089645386 ]
train_0507
[ "We present a new machine learning framework called \"self-taught learning\" for using unlabeled data in supervised classification tasks.", "We do not assume that the unlabeled data follows the same class labels or generative distribution as the labeled data.", "Thus, we would like to use a large number of unlabeled images (or audio samples, or text documents) randomly downloaded from the Internet to improve performance on a given image (or audio, or text) classification task.", "Such unlabeled data is significantly easier to obtain than in typical semi-supervised or transfer learning settings, making self-taught learning widely applicable to many practical learning problems.", "We describe an approach to self-taught learning that uses sparse coding to construct higher-level features using the unlabeled data.", "These features form a succinct input representation and significantly improve classification performance.", "When using an SVM for classification, we further show how a Fisher kernel can be learned for this representation." ]
[ 0, 0, 1, 0, 0, 0, 1 ]
[ 0.7778000235557556, 0.6111000180244446, 0.41670000553131104, 0.41670000553131104, 0.41670000553131104, 0.41670000553131104, 0.3889000117778778 ]
train_0508
[ "The first radar has been patented 110 years ago.", "Meanwhile the applications became numerous and the system concepts have been adopted to the available technologies.", "Typical applications are speed control, air traffic control, synthetic aperture radar, airborne and spaceborne missions, military applications and remote sensing.", "Research for medical radar applications is well progressing for breast cancer detection and tumor localization.", "Automobile radar for save and autonomous driving are meanwhile produced in millions per year.", "In the next years the state-of-the-art radar system concepts will experience almost a revolution.", "Despite the significant advancements, the radar system technology did not develop like communications or other technologies during the last 20 years.", "Some of these new technologies will within a few years penetrate radar and revolutionize radar system concepts.", "This will then allow for new radar features and radar signal processing approaches." ]
[ 0, 0, 1, 2, 0, 2, 2, 0, 4 ]
[ 1, 0.7894999980926514, 0.39469999074935913, 0.39469999074935913, 0.39469999074935913, 0.39469999074935913, 0.39469999074935913, 0.39469999074935913, 0.21050000190734863 ]
train_0509
[ "Yair Weiss School of CS & Engr.", "The Hebrew Univ.", "yweiss@cs.huji.ac.il Despite many empirical successes of spectral clustering methodsalgorithms that cluster points using eigenvectors of matrices derived from the datathere are several unresolved issues.", "First , there are a wide variety of algorithms that use the eigenvectors in slightly different ways.", "Second, many of these algorithms have no proof that they will actually compute a reasonable clustering.", "In this paper, we present a simple spectral clustering algorithm that can be implemented using a few lines of Matlab.", "Using tools from matrix perturbation theory, we analyze the algorithm, and give conditions under which it can be expected to do well.", "We also show surprisingly good experimental results on a number of challenging clustering problems." ]
[ 0, 0, 0, 0, 0, 1, 1, 4 ]
[ 0.8108000159263611, 0.8108000159263611, 0.4323999881744385, 0.40540000796318054, 0.40540000796318054, 0.5946000218391418, 0.8108000159263611, 0.40540000796318054 ]
train_0510
[ "Urban children all over the world seem to acquire computing skills without adult intervention.", "Indeed this form of self-instruction has produced hackers – children who can penetrate high tech security systems.", "Is this kind of learning dependent only on the availability of technology?", "We provided slum children in New Delhi with Internet access in their settlement.", "The paper describes the results obtained in the first month of unsupervised and unguided access.", "It is observed that children seem to understand and use the technology fluently.", "Language and formal education do not seem to make any significant difference." ]
[ 0, 0, 0, 1, 4, 4, 4 ]
[ 0.8234999775886536, 0.6176000237464905, 0.5385000109672546, 0.3824000060558319, 0.8234999775886536, 1, 0.8234999775886536 ]
train_0511
[ "Relationship is one of the most basic needs of human being.", "When our relationship suffers, we tend to turn to online game as an alternative to fulfill our unmet need.", "Massive Multi-user Online Role-playing Games (MMORPGs) environment is an ideal platform for multiple players to interact, to make friends, and to complete a task together.", "Social Learning Theory deposits that behaviors are learned by observing others in a social context.", "Gamers learn to be addicts when they constantly associate with online friends who are game addicts.", "This paper focus on how the offline and online social relationship contribute to online game addiction.", "Examining social relationship factors that lead to online game addiction allows practitioners the opportunity to identify ways to help pathological individuals breaking away from the game addiction.", "Researchers could expand our proposed model to further study what specific relationship factors contribute the most to game addiction." ]
[ 0, 0, 0, 1, 1, 1, 4, 4 ]
[ 1, 0.8055999875068665, 0.8055999875068665, 0.5, 0.583299994468689, 0.583299994468689, 0.7778000235557556, 1 ]
train_0512
[ "Pure sine wave inverters are demand of modern era whenever it comes to utilization of DC power sources for both low and high power applications.", "These invertors not only increase the efficiency of the power system but also prevent the electrical components from damaging.", "Research has been carried out on producing cost-effective and efficient pure sine wave inverter in recent times and this paper proposes a design that is highly useful for low power based applications.", "Paper focuses on utilizing renewable solar energy by incorporating Multi vibrator IC (NE 555), in this case operating in A-stable mode, for the PWM generation technique used to drive pure sine wave inverter.", "It is shown that the design is easy to implement and proves to be cost effective for low power applications." ]
[ 0, 0, 0, 1, 4 ]
[ 1, 0.7778000235557556, 0.583299994468689, 0.8055999875068665, 0.6111000180244446 ]
train_0513
[ "This paper reports on our research towards an economic analysis of money laundering schemes utilizing cryptocurrencies, which are convertible decentralized virtual currencies based on cryptographic operations.", "They gain ground as means to offer enterprises and its customers new payment methods, investing opportunities and some are even intended as substitutes for centrally controlled governmentissued fiat currencies.", "Our starting point is the observation that their increasing popularity attracts the attention of practitioners and scholars, particularly because of raising anti-money laundering concerns.", "Consequently, work has already been conducted in this area, mainly focusing on implications on anti-money laundering efforts.", "However, we argue that the potential benefits for criminal individuals are an important, yet neglected factor in the dissemination of cryptocurrencies as money laundering instrument.", "Addressing this issue, the paper firstly presents the structure of the money laundering process and introduces prevailing anti money-laundering controls.", "This forms the basis for the subsequent analysis of contextual and transactional factors with respect to their influence on the incentives of criminals to utilize cryptocurrencies for money laundering.", "This aims at providing an answer to the open question, whether cryptocurrencies constitute a driver for money laundering." ]
[ 0, 0, 1, 0, 1, 2, 4, 4 ]
[ 0.583299994468689, 0.6111000180244446, 0.44440001249313354, 0.6111000180244446, 0.44440001249313354, 0.41670000553131104, 0.41670000553131104, 0.6111000180244446 ]
train_0514
[ "In this paper we describe a database that consists of handwritten English sentences.", "It is based on the Lancaster-Oslo/Bergen (LOB) corpus.", "This corpus is a collection of texts that comprise about one million word instances.", "The database includes 1,066 forms produced by approximately 400 different writers.", "A total of 82,227 word instances out of a vocabulary of 10,841 words occur in the collection.", "The database consists of full English sentences.", "It can serve as a basis for a variety of handwriting recognition tasks.", "However, it is expected that the database would be particularly useful for recognition tasks where linguistic knowledge beyond the lexicon level is used, because this knowledge can be automatically derived from the underlying corpus.", "The database also includes a few image-processing procedures for extracting the handwritten text from the forms and the segmentation of the text into lines and words." ]
[ 0, 2, 2, 0, 0, 4, 4, 4, 4 ]
[ 0.6053000092506409, 0.421099990606308, 0.421099990606308, 0.39469999074935913, 0.39469999074935913, 0.39469999074935913, 0.39469999074935913, 0.39469999074935913, 0.3684000074863434 ]
train_0515
[ "This paper investigates important problems involved in the design of a CML buffer as well as a chain of tapered CML buffers.", "A new design procedure to systematically design a chain of tapered CML buffers is proposed.", "The differential architecture of a CML buffer makes it functionally robust in the presence of environmental noise sources (e.g., crosstalk, power/ground noise).", "The circuit design issues in regard to the CML buffer are compared with those in a conventional CMOS inverter.", "It is shown, both through the experiments and by using efficient analytical models, why CML buffers are better than CMOS inverters in high-speed lowvoltage applications." ]
[ 0, 1, 0, 1, 0 ]
[ 0.5788999795913696, 0.39469999074935913, 0.421099990606308, 0.6053000092506409, 0.421099990606308 ]
train_0516
[ "We introduce the author-topic model, a generative model for documents that extends Latent Dirichlet Allocation (LDA; Blei, Ng, & Jordan, 2003) to include authorship information.", "Each author is associated with a multinomial distribution over topics and each topic is associated with a multinomial distribution over words.", "A document with multiple authors is modeled as a distribution over topics that is a mixture of the distributions associated with the authors.", "We apply the model to a collection of 1,700 NIPS conference papers and 160,000 CiteSeer abstracts.", "Exact inference is intractable for these datasets and we use Gibbs sampling to estimate the topic and author distributions.", "We compare the performance with two other generative models for documents, which are special cases of the author-topic model: LDA (a topic model) and a simple author model in which each author is associated with a distribution over words rather than a distribution over topics.", "We show topics recovered by the authortopic model, and demonstrate applications to computing similarity between authors and entropy of author output." ]
[ 2, 2, 1, 1, 1, 4, 4 ]
[ 0.6176000237464905, 0.3824000060558319, 0.6176000237464905, 0.7940999865531921, 0.6176000237464905, 0.7646999955177307, 0.5881999731063843 ]
train_0517
[ "We propose a novel deep network structure called “Network In Network”(NIN) to enhance model discriminability for local patches within the receptive field.", "The conventional convolutional layer uses linear filters followed by a nonlinear activation function to scan the input.", "Instead, we build micro neural networks with more complex structures to abstract the data within the receptive field.", "We instantiate the micro neural network with a multilayer perceptron, which is a potent function approximator.", "The feature maps are obtained by sliding the micro networks over the input in a similar manner as CNN; they are then fed into the next layer.", "Deep NIN can be implemented by stacking mutiple of the above described structure.", "With enhanced local modeling via the micro network, we are able to utilize global average pooling over feature maps in the classification layer, which is easier to interpret and less prone to overfitting than traditional fully connected layers.", "We demonstrated the state-of-the-art classification performances with NIN on CIFAR-10 and CIFAR-100, and reasonable performances on SVHN and MNIST datasets." ]
[ 2, 0, 1, 1, 1, 1, 1, 4 ]
[ 0.6075000166893005, 0.5774000287055969, 0.6075000166893005, 0.8188999891281128, 0.7778000235557556, 0.8151000142097473, 0.7886999845504761, 0.8151000142097473 ]
train_0518
[ "Database management systems are today’s most reliable mean to organize data into collections that can be searched and updated.", "However, many DBMS systems are available on the market each having their pros and cons in terms of reliability, usability, security, and performance.", "This paper presents a comparative study on the performance of the top DBMS systems.", "They are mainly MS SQL Server 2008, Oracle 11g, IBM DB2, MySQL 5.5, and MS Access 2010.", "The testing is aimed at executing different SQL queries with different level of complexities over the different five DBMSs under test.", "This would pave the way to build a head-to-head comparative evaluation that shows the average execution time, memory usage, and CPU utilization of each DBMS after completion of the test." ]
[ 0, 0, 0, 0, 2, 2 ]
[ 1, 0.771399974822998, 0.428600013256073, 0.428600013256073, 0.6000000238418579, 0.4000000059604645 ]
train_0519
[ "The multi-scan resting state fMRI (rs-fMRI) dataset was recently released; thus the test-retest (TRT) reliability of rs-fMRI measures can be assessed.", "However, because this dataset was acquired only from a single group under a single condition, we cannot directly evaluate whether the rs-fMRI measures can generate reproducible between-condition or between-group results.", "Because the modulation of resting state activity has gained increasing attention, it is important to know whether one rs-fMRI metric can reliably detect the alteration of the resting activity.", "Here, we shared a public Eyes-Open (EO)/Eyes-Closed (EC) dataset for evaluating the split-half reproducibility of the rs-fMRI measures in detecting changes of the resting state activity between EO and EC.", "As examples, we assessed the split-half reproducibility of three widely applied rs-fMRI metrics: amplitude of low frequency fluctuation, regional homogeneity, and seed-based correlation analysis.", "Our results demonstrated that reproducible patterns of EO-EC differences can be detected by all three measures, suggesting the feasibility of the EO/EC dataset for performing reproducibility assessment for other rs-fMRI measures." ]
[ 4, 4, 1, 4, 4, 4 ]
[ 0.8158000111579895, 0.421099990606308, 0.39469999074935913, 0.8158000111579895, 0.8158000111579895, 0.8158000111579895 ]
train_0520
[ "We evaluate whether features extracted from the activation of a deep convolutional network trained in a fully supervised fashion on a large, fixed set of object recognition tasks can be repurposed to novel generic tasks.", "Our generic tasks may differ significantly from the originally trained tasks and there may be insufficient labeled or unlabeled data to conventionally train or adapt a deep architecture to the new tasks.", "We investigate and visualize the semantic clustering of deep convolutional features with respect to a variety of such tasks, including scene recognition, domain adaptation, and fine-grained recognition challenges.", "We compare the efficacy of relying on various network levels to define a fixed feature, and report novel results that significantly outperform the state-of-the-art on several important vision challenges.", "We are releasing DeCAF, an open-source implementation of these deep convolutional activation features, along with all associated network parameters to enable vision researchers to be able to conduct experimentation with deep representations across a range of visual concept learning paradigms." ]
[ 0, 0, 0, 1, 4 ]
[ 0.6388999819755554, 0.6388999819755554, 0.41670000553131104, 0.41670000553131104, 0.6388999819755554 ]
train_0521
[ "We propose a new equilibrium enforcing method paired with a loss derived from the Wasserstein distance for training auto-encoder based Generative Adversarial Networks.", "This method balances the generator and discriminator during training.", "Additionally, it provides a new approximate convergence measure, fast and stable training and high visual quality.", "We also derive a way of controlling the trade-off between image diversity and visual quality.", "We focus on the image generation task, setting a new milestone in visual quality, even at higher resolutions.", "This is achieved while using a relatively simple model architecture and a standard training procedure." ]
[ 1, 1, 1, 1, 1, 1 ]
[ 0.5676000118255615, 0.7838000059127808, 0.3783999979496002, 0.6215999722480774, 0.6215999722480774, 0.5676000118255615 ]
train_0522
[ "Summary form only given.", "The emerging concept of semantic Web services aims at more sophisticated Web Service technologies: on basis of semantic description frameworks, intelligent mechanisms are envisioned for discovery, composition, and contracting of Web services.", "The tutorial explains the current state of the art in semantic Web services on basis of the Web service modeling ontology WSMO and related initiatives.", "Commencing from the vision and arising challenges for semantic Web services, the tutorial in detail explains the specifications of recent frameworks for semantic Web services and presents the Web service execution environment WSMX as the WSMO reference implementation.", "The tutorial consists of three main sections that subsequently provide a complete overview of semantic Web services and the latest status of WSMO.", "The tutorial addresses academic as well as industrial researches and developers that are working with Web services and are interested in semantic Web services." ]
[ 0, 0, 1, 1, 1, 1 ]
[ 0.6000000238418579, 0.771399974822998, 0.6571000218391418, 0.571399986743927, 1, 0.628600001335144 ]
train_0523
[ "Although considerable work has been done in recent years to drive the state of the art in facial recognition towards operation on fully unconstrained imagery, research has always been restricted by a lack of datasets in the public domain.", "In addition, traditional biometrics experiments such as single image verification and closed set recognition do not adequately evaluate the ways in which unconstrained face recognition systems are used in practice.", "The IARPA Janus Benchmark–C (IJB-C) face dataset advances the goal of robust unconstrained face recognition, improving upon the previous public domain IJB-B dataset, by increasing dataset size and variability, and by introducing end-to-end protocols that more closely model operational face recognition use cases.", "IJB-C adds 1,661 new subjects to the 1,870 subjects released in IJB-B, with increased emphasis on occlusion and diversity of subject occupation and geographic origin with the goal of improving representation of the global population.", "Annotations on IJB-C imagery have been expanded to allow for further covariate analysis, including a spatial occlusion grid to standardize analysis of occlusion.", "Due to these enhancements, the IJB-C dataset is significantly more challenging than other datasets in the public domain and will advance the state of the art in unconstrained face recognition." ]
[ 0, 0, 1, 2, 4, 4 ]
[ 1, 1, 0.39469999074935913, 0.39469999074935913, 0.39469999074935913, 0.8158000111579895 ]
train_0524
[ "We describe several software side-channel attacks based on inter-process leakage through the state of the CPU’s memory cache.", "This leakage reveals memory access patterns, which can be used for cryptanalysis of cryptographic primitives that employ data-dependent table lookups.", "The attacks allow an unprivileged process to attack other processes running in parallel on the same processor, despite partitioning methods such as memory protection, sandboxing and virtualization.", "Some of our methods require only the ability to trigger services that perform encryption or MAC using the unknown key, such as encrypted disk partitions or secure network links.", "Moreover, we demonstrate an extremely strong type of attack, which requires knowledge of neither the specific plaintexts nor ciphertexts, and works by merely monitoring the effect of the cryptographic process on the cache.", "We discuss in detail several such attacks on AES, and experimentally demonstrate their applicability to real systems, such as OpenSSL and Linux’s dm-crypt encrypted partitions (in the latter case, the full key can be recovered after just 800 writes to the partition, taking 65 milliseconds).", "Finally, we describe several countermeasures which can be used to mitigate such attacks." ]
[ 0, 0, 0, 1, 1, 4, 4 ]
[ 0.4706000089645386, 0.4706000089645386, 0.6765000224113464, 1, 0.75, 0.6765000224113464, 0.6765000224113464 ]
train_0525
[ "Conversational agents are exploding in popularity.", "However, much work remains in the area of non goal-oriented conversations, despite significant growth in research interest over recent years.", "To advance the state of the art in conversational AI, Amazon launched the Alexa Prize, a 2.5-million dollar university competition where sixteen selected university teams built conversational agents to deliver the best social conversational experience.", "Alexa Prize provided the academic community with the unique opportunity to perform research with a live system used by millions of users.", "The subjectivity associated with evaluating conversations is key element underlying the challenge of building non-goal oriented dialogue systems.", "In this paper, we propose a comprehensive evaluation strategy with multiple metrics designed to reduce subjectivity by selecting metrics which correlate well with human judgement.", "The proposed metrics provide granular analysis of the conversational agents, which is not captured in human ratings.", "We show that these metrics can be used as a reasonable proxy for human judgment.", "We provide a mechanism to unify the metrics for selecting the top performing agents, which has also been applied throughout the Alexa Prize competition.", "To our knowledge, to date it is the largest setting for evaluating agents with millions of conversations and hundreds of thousands of ratings from users." ]
[ 0, 0, 0, 0, 2, 4, 4, 4, 2, 1 ]
[ 0.40540000796318054, 0.7838000059127808, 0.8378000259399414, 0.7838000059127808, 0.3783999979496002, 0.4323999881744385, 0.4323999881744385, 0.4828000068664551, 0.40540000796318054, 0.40540000796318054 ]
train_0526
[ "In this work we present an end-to-end system for text spotting—localising and recognising text in natural scene images—and text based image retrieval.", "This system is based on a region proposal mechanism for detection and deep convolutional neural networks for recognition.", "Our pipeline uses a novel combination of complementary proposal generation techniques to ensure high recall, and a fast subsequent filtering stage for improving precision.", "For the recognition and ranking of proposals, we train very large convolutional neural networks to perform word recognition on the whole proposal region at the same time, departing from the character classifier based systems of the past.", "These networks are trained solely on data produced by a synthetic text generation engine, requiring no human labelled data.", "Analysing the stages of our pipeline, we show state-of-the-art performance throughout.", "We perform rigorous experiments across a number of standard end-to-end text spotting benchmarks and text-based image retrieval datasets, showing a large improvement over all previous methods.", "Finally, we demonstrate a real-world application of our text spotting system to allow thousands of hours of news footage to be instantly searchable via a text query." ]
[ 0, 0, 1, 1, 1, 4, 4, 4 ]
[ 0.800000011920929, 0.6000000238418579, 0.4000000059604645, 0.6000000238418579, 0.6000000238418579, 0.4000000059604645, 0.6000000238418579, 0.800000011920929 ]
train_0527
[ "No wonder you activities are, reading will be always needed.", "It is not only to fulfil the duties that you need to finish in deadline time.", "Reading will encourage your mind and thoughts.", "Of course, reading will greatly develop your experiences about everything.", "Reading computational geometry algorithms and applications is also a way as one of the collective books that gives many advantages.", "The advantages are not only for you, but for the other peoples with those meaningful benefits." ]
[ 0, 0, 2, 1, 4, 4 ]
[ 0.7838000059127808, 0.5676000118255615, 0.40540000796318054, 0.4323999881744385, 0.6215999722480774, 0.6215999722480774 ]
train_0528
[ "Facial makeup transfer aims to translate the makeup style from a given reference makeup face image to another non-makeup one while preserving face identity.", "Such an instance-level transfer problem is more challenging than conventional domain-level transfer tasks, especially when paired data is unavailable.", "Makeup style is also different from global styles (e.g., paintings) in that it consists of several local styles/cosmetics, including eye shadow, lipstick, foundation, and so on.", "Extracting and transferring such local and delicate makeup information is infeasible for existing style transfer methods.", "We address the issue by incorporating both global domain-level loss and local instance-level loss in an dual input/output Generative Adversarial Network, called BeautyGAN.", "Specifically, the domain-level transfer is ensured by discriminators that distinguish generated images from domains' real samples.", "The instance-level loss is calculated by pixel-level histogram loss on separate local facial regions.", "We further introduce perceptual loss and cycle consistency loss to generate high quality faces and preserve identity.", "The overall objective function enables the network to learn translation on instance-level through unsupervised adversarial learning.", "We also build up a new makeup dataset that consists of 3834 high-resolution face images." ]
[ 2, 0, 0, 1, 1, 1, 1, 1, 1, 4 ]
[ 0.6265000104904175, 0.7821000218391418, 0.7821000218391418, 0.40860000252723694, 0.5914000272750854, 0.7821000218391418, 0.7821000218391418, 0.8093000054359436, 0.4357999861240387, 0.40860000252723694 ]
train_0529
[ "We propose ClausIE, a novel, clause-based approach to open information extraction, which extracts relations and their arguments from natural language text.", "ClausIE fundamentally differs from previous approaches in that it separates the detection of ``useful'' pieces of information expressed in a sentence from their representation in terms of extractions.", "In more detail, ClausIE exploits linguistic knowledge about the grammar of the English language to first detect clauses in an input sentence and to subsequently identify the type of each clause according to the grammatical function of its constituents.", "Based on this information, ClausIE is able to generate high-precision extractions; the representation of these extractions can be flexibly customized to the underlying application.", "ClausIE is based on dependency parsing and a small set of domain-independent lexica, operates sentence by sentence without any post-processing, and requires no training data (whether labeled or unlabeled).", "Our experimental study on various real-world datasets suggests that ClausIE obtains higher recall and higher precision than existing approaches, both on high-quality text as well as on noisy text as found in the web." ]
[ 0, 2, 1, 1, 1, 4 ]
[ 0.666700005531311, 0.42419999837875366, 0.5454999804496765, 1, 0.7576000094413757, 1 ]
train_0530
[ "This paper presents DXR, a toolkit for building immersive data visualizations based on the Unity development platform.", "Over the past years, immersive data visualizations in augmented and virtual reality (AR, VR) have been emerging as a promising medium for data sense-making beyond the desktop.", "However, creating immersive visualizations remains challenging, and often require complex low-level programming and tedious manual encoding of data attributes to geometric and visual properties.", "These can hinder the iterative idea-to-prototype process, especially for developers without experience in 3D graphics, AR, and VR programming.", "With DXR, developers can efficiently specify visualization designs using a concise declarative visualization grammar inspired by Vega-Lite.", "DXR further provides a GUI for easy and quick edits and previews of visualization designs in-situ, i.e., while immersed in the virtual world.", "DXR also provides reusable templates and customizable graphical marks, enabling unique and engaging visualizations.", "We demonstrate the flexibility of DXR through several examples spanning a wide range of applications." ]
[ 0, 0, 2, 1, 1, 1, 1, 4 ]
[ 0.6111000180244446, 1, 0.44440001249313354, 0.3889000117778778, 0.7778000235557556, 0.6111000180244446, 0.6111000180244446, 0.833299994468689 ]
train_0531
[ "Neural networks are known to be vulnerable to adversarial examples, inputs that have been intentionally perturbed to remain visually similar to the source input, but cause a misclassification.", "Until now, black-box attacks against neural networks have relied on transferability of adversarial examples.", "White-box attacks are used to generate adversarial examples on a substitute model and then transferred to the black-box target model.", "In this paper, we introduce a direct attack against black-box neural networks, that uses another attacker neural network to learn to craft adversarial examples.", "We show that our attack is capable of crafting adversarial examples that are indistinguishable from the source input and are misclassified with overwhelming probability reducing accuracy of the black-box neural network from 99.4% to 0.77% on the MNIST dataset, and from 91.4% to 6.8% on the CIFAR-10 dataset.", "Our attack can adapt and reduce the effectiveness of proposed defenses against adversarial examples, requires very little training data, and produces adversarial examples that can transfer to different machine learning models such as Random Forest, SVM, and K-Nearest Neighbor.", "To demonstrate the practicality of our attack, we launch a live attack against a target black-box model hosted online by Amazon: the crafted adversarial examples reduce its accuracy from 91.8% to 61.3%.", "Additionally, we show attacks proposed in the literature have unique, identifiable distributions.", "We use this information to train a classifier that is robust against such attacks." ]
[ 0, 0, 0, 1, 1, 1, 1, 4, 4 ]
[ 1, 0.8108000159263611, 0.6215999722480774, 0.40540000796318054, 0.5676000118255615, 0.5676000118255615, 0.6215999722480774, 0.4323999881744385, 0.6215999722480774 ]
train_0532
[ "The objective of this study is to examine all aspects of fraud triangle using the data mining techniques and employ the available and public information to proxy variables to evaluate such attributes as pressure/incentive, opportunity, and attitude/rationalization, based on the findings from prior studies in this subject field and also the Statement on Auditing Standards.", "The second objective is to discuss whether or not the suggestion of the experts agrees with the results obtained from adopting those novel techniques.", "In specific, this study uses both expert questionnaires and data mining techniques to sort out the different fraud factors and then rank the importance of them.", "The data mining methods employed in this research include Logistic Regression, Decision Trees (CART), and Artificial Neural Networks (ANNs).", "Empirically, the ANNs and CART approaches work with the training and testing samples in a correct classification rate of 91.2% (ANNs) & 90.4% (CART) and 92.8% (ANNs) & 90.3% (CART), respectively, which is more accurate than the logistic model that only reaches 83.7% and 88.5% of the correct classification in assessing the fraud presence.", "In addition, type II error of ANNs drops significantly to 23.9% from 43.3% and 27.8% compared to the ones using CART and logistic models.", "Finally, the differences between different data mining tools and expert judgments are also compared to provide more insights as a research contribution.", "2015 Elsevier B.V. All rights reserved." ]
[ 2, 2, 1, 1, 1, 1, 4, 3 ]
[ 0.8158000111579895, 0.8158000111579895, 0.6053000092506409, 0.631600022315979, 0.8158000111579895, 0.421099990606308, 1, 0.421099990606308 ]
train_0533
[ "This paper presents a general trainable framework for object detection in static images of cluttered scenes.", "The detection technique we develop is based on a wavelet representation of an object class derived from a statistical analysis of the class instances.", "By learning an object class in terms of a subset of an overcomplete dictionary of wavelet basis functions, we derive a compact representation of an object class which is used as an input to a suppori vector machine classifier.", "This representation overcomes both the problem of in-class variability and provides a low false detection rate in unconstrained environments.", "We demonstrate the capabilities of the technique i n two domains whose inherent information content differs significantly.", "The first system is face detection and the second is the domain of people which, in contrast to faces, vary greatly in color, texture, and patterns.", "Unlike previous approaches, this system learns from examples and does not rely on any a priori (handcrafted) models or motion-based segmentation.", "The paper also presents a motion-based extension to enhance the performance of the detection algorithm over video sequences.", "The results presented here suggest that this architecture may well be quite general." ]
[ 0, 1, 2, 1, 4, 4, 4, 4, 4 ]
[ 0.7894999980926514, 0.421099990606308, 0.5788999795913696, 0.631600022315979, 0.5788999795913696, 0.421099990606308, 0.631600022315979, 0.5788999795913696, 1 ]
train_0534
[ "This paper addresses two significant proximity effects, well proximity and STI stress, as they relate to analog circuit design.", "Device performance is impacted by layout features located near, but not part of the device.", "This adds new complexities to analog design.", "In either case, bias points can shift by 20-30%, causing potentially catastrophic failures in circuits.", "We show, for the first time, that a MOSFET placed close to a well-edge creates a graded channel" ]
[ 2, 2, 1, 4, 4 ]
[ 0.5896999835968018, 0.41029998660087585, 0.41029998660087585, 0.3846000134944916, 0.7949000000953674 ]
train_0535
[ "Named Entity Recognition (NER) is a key component in NLP systems for question answering, information retrieval, relation extraction, etc.", "NER systems have been studied and developed widely for decades, but accurate systems using deep neural networks (NN) have only been introduced in the last few years.", "We present a comprehensive survey of deep neural network architectures for NER, and contrast them with previous approaches to NER based on feature engineering and other supervised or semi-supervised learning algorithms.", "Our results highlight the improvements achieved by neural networks, and show how incorporating some of the lessons learned from past work on feature-based NER systems can yield further improvements." ]
[ 0, 0, 0, 4 ]
[ 0.800000011920929, 0.571399986743927, 0.4000000059604645, 0.771399974822998 ]
train_0536
[ "After establishing of various possibilities of abstraction in HDLs (on values, time, and structure) many years ago, SystemVerilog as a combined HDVL offers a new approach to support also abstraction on ports.", "This interface concept extends the feasibilities for encapsulation when designing, connecting, and verifying the numerous interfaces in modern SoC designs.", "This can be done on an abstract, non-synthesizable level but also on RT level.", "The introduction of interfaces into SystemVerilog allows a more effective methodology for the implementation and verification of designs.", "First, an interface can be designed independently on the subblocks, which should be connected later.", "It contains not only the protocols for the transfers but also assertions derived from the specification to check all these transfers.", "Then, BFMs can be implemented using the interfaces and can be verified against the interface assertions.", "After implementation of the RTL code, this RTL code can be verified by using the BFMs and the assertions.", "Later, sub-designs are connected hierarchically whereby the assertion and the BFMs are used as the lowest level of the testbench hierarchy.", "SystemVerilog has a lot of benefits against traditional HDLs as VHDL or Verilog and also against HVLs, as it combines many well-known concepts in a pragmatic way." ]
[ 0, 0, 0, 1, 1, 1, 1, 1, 1, 4 ]
[ 1, 0.5625, 0.7813000082969666, 0.625, 0.8125, 0.625, 0.625, 0.625, 0.625, 0.625 ]
train_0537
[ "In this paper, we propose the Self-Attention Generative Adversarial Network (SAGAN) which allows attention-driven, long-range dependency modeling for image generation tasks.", "Traditional convolutional GANs generate high-resolution details as a function of only spatially local points in lower-resolution feature maps.", "In SAGAN, details can be generated using cues from all feature locations.", "Moreover, the discriminator can check that highly detailed features in distant portions of the image are consistent with each other.", "Furthermore, recent work has shown that generator conditioning affects GAN performance.", "Leveraging this insight, we apply spectral normalization to the GAN generator and find that this improves training dynamics.", "The proposed SAGAN achieves the state-ofthe-art results, boosting the best published Inception score from 36.8 to 52.52 and reducing Fréchet Inception distance from 27.62 to 18.65 on the challenging ImageNet dataset.", "Visualization of the attention layers shows that the generator leverages neighborhoods that correspond to object shapes rather than local regions of fixed shape." ]
[ 1, 2, 1, 1, 4, 4, 4, 4 ]
[ 0.41029998660087585, 0.41029998660087585, 0.7949000000953674, 0.5896999835968018, 0.7949000000953674, 0.6154000163078308, 0.6154000163078308, 1 ]
train_0538
[ "In the recent years, different web knowledge graphs, both free and commercial, have been created, with DBpedia, YAGO, and Freebase being among the most prominent ones.", "Those graphs are often constructed from semi-structured knowledge, such as Wikipedia, or harvested from the web with a combination of statistical and NLP methods.", "The result are large-scale knowledge graphs that try to make a good trade-off between completeness and correctness.", "In order to further increase the utility of knowledge graphs, various refinement methods have been proposed, which try to infer and add missing knowledge to the graph, or identify erroneous pieces of information.", "In this article, we provide a survey of such knowledge graph refinement approaches, with a dual look at both the methods being proposed as well as the evaluation methodologies used." ]
[ 0, 1, 4, 1, 1 ]
[ 1, 0.44119998812675476, 0.3824000060558319, 0.41179999709129333, 0.5881999731063843 ]
train_0539
[ "We propose an approach for traffic sign detection based on Convolutional Neural Networks (CNN).", "We first transform the original image into the gray scale image by using support vector machines, then use convolutional neural networks with fixed and learnable layers for detection and recognition.", "The fixed layer can reduce the amount of interest areas to detect, and crop the boundaries very close to the borders of traffic signs.", "The learnable layers can increase the accuracy of detection significantly.", "Besides, we use bootstrap methods to improve the accuracy and avoid overfitting problem.", "In the German Traffic Sign Detection Benchmark, we obtained competitive results, with an area under the precision-recall curve(AUC) of 99.73% in the category “Danger”, and an AUC of 97.62% in the category “Mandatory”." ]
[ 2, 1, 1, 0, 1, 4 ]
[ 0.5806000232696533, 1, 0.41940000653266907, 0.41940000653266907, 1, 0.838699996471405 ]
train_0540
[ "We present a state-of-the-art speech recognition system developed using end-toend deep learning.", "Our architecture is significantly simpler than traditional speech systems, which rely on laboriously engineered processing pipelines; these traditional systems also tend to perform poorly when used in noisy environments.", "In contrast, our system does not need hand-designed components to model background noise, reverberation, or speaker variation, but instead directly learns a function that is robust to such effects.", "We do not need a phoneme dictionary, nor even the concept of a “phoneme.", "”", "Key to our approach is a well-optimized RNN training system that uses multiple GPUs, as well as a set of novel data synthesis techniques that allow us to efficiently obtain a large amount of varied data for training.", "Our system, called Deep Speech, outperforms previously published results on the widely studied Switchboard Hub5’00, achieving 16.0% error on the full test set.", "Deep Speech also handles challenging noisy environments better than widely used, state-of-the-art commercial speech systems." ]
[ 0, 2, 1, 1, 3, 1, 4, 4 ]
[ 0.8055999875068665, 0.41670000553131104, 0.3889000117778778, 0.8055999875068665, 0.6111000180244446, 0.583299994468689, 0.41670000553131104, 0.41670000553131104 ]
train_0541
[ "With the rapid growth of the Web, users easily get lost in the rich hyper structure.", "Providing the relevant information to users to cater to their needs is the primary goal of Website owners.", "Therefore, finding the content of the Web and retrieving the users' interests and needs from their behavior have become increasingly important.", "Web mining is used to categorize users and pages by analyzing user behavior, the content of the pages, and the order of the URLs that tend to be accessed.", "Web structure mining plays an important role in this approach.", "Two page ranking algorithms, HITS and PageRank, are commonly used in Web structure mining.", "Both algorithms treat all links equally when distributing rank scores.", "Several algorithms have been developed to improve the performance of these methods.", "The weighted PageRank algorithm (WPR), an extension to the standard PageRank algorithm, is introduced.", "WPR takes into account the importance of both the inlinks and the outlinks of the pages and distributes rank scores based on the popularity of the pages." ]
[ 0, 0, 0, 0, 0, 1, 1, 1, 1, 1 ]
[ 1, 0.7894999980926514, 0.6053000092506409, 0.5788999795913696, 0.6053000092506409, 0.7894999980926514, 0.6053000092506409, 0.8158000111579895, 0.6053000092506409, 0.6053000092506409 ]
train_0542
[ "Scene parsing is challenging for unrestricted open vocabulary and diverse scenes.", "In this paper, we exploit the capability of global context information by different-region-based context aggregation through our pyramid pooling module together with the proposed pyramid scene parsing network (PSPNet).", "Our global prior representation is effective to produce good quality results on the scene parsing task, while PSPNet provides a superior framework for pixel-level prediction.", "The proposed approach achieves state-of-the-art performance on various datasets.", "It came first in ImageNet scene parsing challenge 2016, PASCAL VOC 2012 benchmark and Cityscapes benchmark.", "A single PSPNet yields the new record of mIoU accuracy 85.4% on PASCAL VOC 2012 and accuracy 80.2% on Cityscapes." ]
[ 0, 0, 0, 2, 4, 4 ]
[ 1, 0.6000000238418579, 0.428600013256073, 0.4000000059604645, 0.22859999537467957, 0.571399986743927 ]
train_0543
[ "A recommender system aims to provide users with personalized online product or service recommendations to handle the increasing online information overload problem and improve customer relationship management.", "Various recommender system techniques have been proposed since the mid-1990s, and many sorts of recommender system software have been developed recently for a variety of applications.", "Researchers and managers recognize that recommender systems offer great opportunities and challenges for business, government, education, and other domains, with more recent successful developments of recommender systems for real-world applications becoming apparent.", "It is thus vital that a high quality, instructive review of current trends should be conducted, not only of the theoretical research results but more importantly of the practical developments in recommender systems.", "This paper therefore reviews up-to-date application developments of recommender systems, clusters their applications into eight main categories: e-government, e-business, e-commerce/e-shopping, e-library, e-learning, e-tourism, e-resource services and e-group activities, and summarizes the related recommendation techniques used in each category.", "It systematically examines the reported recommender systems through four dimensions: recommendation methods (such as CF), recommender systems software (such as BizSeeker), real-world application domains (such as e-business) and application platforms (such as mobile-based platforms).", "Some significant new topics are identified and listed as new directions.", "By providing a state-of-the-art knowledge, this survey will directly support researchers and practical professionals in their understanding of developments in recommender system applications." ]
[ 2, 0, 0, 1, 1, 1, 1, 4 ]
[ 0.6215999722480774, 0.5946000218391418, 0.5946000218391418, 0.40540000796318054, 0.8108000159263611, 1, 0.5676000118255615, 0.5946000218391418 ]
train_0544
[ "Time series clustering has been shown effective in providing useful information in various domains.", "There seems to be an increased interest in time series clustering as part of the effort in temporal data mining research.", "To provide an overview, this paper surveys and summarizes previous works that investigated the clustering of time series data in various application domains.", "The basics of time series clustering are presented, including general-purpose clustering algorithms commonly used in time series clustering studies, the criteria for evaluating the performance of the clustering results, and the measures to determine the similarity/dissimilarity between two time series being compared, either in the forms of raw data, extracted features, or some model parameters.", "The past researchs are organized into three groups depending upon whether they work directly with the raw data either in the time or frequency domain, indirectly with features extracted from the raw data, or indirectly with models built from the raw data.", "The uniqueness and limitation of previous research are discussed and several possible topics for future research are identified.", "Moreover, the areas that time series clustering have been applied to are also summarized, including the sources of data used.", "It is hoped that this review will serve as the steppingstone for those interested in advancing this area of research.", "2005 Pattern Recognition Society.", "Published by Elsevier Ltd." ]
[ 0, 0, 1, 1, 1, 1, 1, 4, 3, 3 ]
[ 1, 0.7778000235557556, 0.666700005531311, 0.666700005531311, 0.44440001249313354, 0.666700005531311, 0.44440001249313354, 0.8611000180244446, 0.7778000235557556, 0.7778000235557556 ]
train_0545
[ "In this work, we revisit atrous convolution, a powerful tool to explicitly adjust filter’s field-of-view as well as control the resolution of feature responses computed by Deep Convolutional Neural Networks, in the application of semantic image segmentation.", "To handle the problem of segmenting objects at multiple scales, we design modules which employ atrous convolution in cascade or in parallel to capture multi-scale context by adopting multiple atrous rates.", "Furthermore, we propose to augment our previously proposed Atrous Spatial Pyramid Pooling module, which probes convolutional features at multiple scales, with image-level features encoding global context and further boost performance.", "We also elaborate on implementation details and share our experience on training our system.", "The proposed ‘DeepLabv3’ system significantly improves over our previous DeepLab versions without DenseCRF post-processing and attains comparable performance with other state-of-art models on the PASCAL VOC 2012 semantic image segmentation benchmark." ]
[ 0, 2, 1, 1, 4 ]
[ 0.3889000117778778, 0.5, 0.3889000117778778, 0.41670000553131104, 0.3889000117778778 ]
train_0546
[ "After a decade of fundamental interdisciplinary research in machine learning, the spadework in this field has been done; the 1990s should see the widespread exploitation of knowledge discovery as an aid to assembling knowledge bases.", "The contributors to the AAAI Press book Knowledge Discovery in Databases were excited at the potential benefits of this research.", "The editors hope that some of this excitement will communicate itself to \"AI Magazine readers of this article." ]
[ 4, 4, 4 ]
[ 0.4000000059604645, 0.4000000059604645, 0.4000000059604645 ]
train_0547
[ "Autoregressive integrated moving average (ARIMA) is one of the popular linear models in time series forecasting during the past three decades.", "Recent research activities in forecasting with arti/cial neural networks (ANNs) suggest that ANNs can be a promising alternative to the traditional linear methods.", "ARIMA models and ANNs are often compared with mixed conclusions in terms of the superiority in forecasting performance.", "In this paper, a hybrid methodology that combines both ARIMA and ANN models is proposed to take advantage of the unique strength of ARIMA and ANN models in linear and nonlinear modeling.", "Experimental results with real data sets indicate that the combined model can be an e5ective way to improve forecasting accuracy achieved by either of the models used separately.", "c © 2002 Elsevier Science B.V.", "All rights reserved." ]
[ 0, 0, 0, 2, 4, 3, 3 ]
[ 0.7813000082969666, 0.5938000082969666, 0.40630000829696655, 0.375, 0.8125, 0.8125, 0.8125 ]
train_0548
[ "In this paper, high-voltage (HV)-tolerant level shifters with combinational functionality are proposed based on differential cascode voltage switch logic (DCVSL).", "These level shifters are tolerant to supply voltages higher than the process limit for individual CMOS transistors.", "The proposed HV DCVSL level shifters are particularly useful when it is mandatory to constrain the output using a logic function during out of the normal mode periods (power-up, power-down, reset, etc.).", "These HV-tolerant logic circuits were used in the power block of a buck converter designed in a standard 3.3-V 0.13-mum CMOS process, powered by an input voltage range from 2.7 to 4.2 V. Simulation and experimental results of the buck are analyzed, and the topology is evaluated." ]
[ 2, 0, 1, 4 ]
[ 0.4000000059604645, 0.800000011920929, 0.4000000059604645, 0.4000000059604645 ]
train_0549
[ "Link prediction is an important task for analying social networks which also has applications in other domains like, information retrieval, bioinformatics and e-commerce.", "There exist a variety of techniques for link prediction, ranging from feature-based classi cation and kernel-based method to matrix factorization and probabilistic graphical models.", "These methods differ from each other with respect to model complexity, prediction performance, scalability, and generalization ability.", "In this article, we survey some representative link prediction methods by categorizing them by the type of the models.", "We largely consider three types of models: rst, the traditional (non-Bayesian) models which extract a set of features to train a binary classi cation model.", "Second, the probabilistic approaches which model the joint-probability among the entities in a network by Bayesian graphical models.", "And, nally the linear algebraic approach which computes the similarity between the nodes in a network by rank-reduced similarity matrices.", "We discuss various existing link prediction models that fall in these broad categories and analyze their strength and weakness.", "We conclude the survey with a discussion on recent developments and future research direction." ]
[ 2, 1, 1, 1, 1, 1, 4, 1, 4 ]
[ 0.4205999970436096, 0.5888000130653381, 0.7756999731063843, 0.7756999731063843, 0.7756999731063843, 0.5794000029563904, 0.39250001311302185, 0.5888000130653381, 1 ]
train_0550
[ "The Self-Organizing Map (SOM) algorithm has attracted an ever increasing amount of interest among researches and practitioners in a wide variety of elds.", "The SOM and a variant of it, the LVQ, have been analyzed extensively, a number of variants of them have been developed and, perhaps most notably, they have been applied extensively within elds ranging from engineering sciences to medicine, biology, and economics.", "We have collected a comprehensive list of 3343 scienti c papers that use the algorithms, have bene ted from them, or contain analyses of them.", "The list is intended to serve as a source for literature surveys.", "We have provided both a thematic and a keyword index to help nding articles of interest." ]
[ 0, 0, 1, 1, 4 ]
[ 1, 0.800000011920929, 0.6000000238418579, 0.800000011920929, 0.800000011920929 ]
train_0551
[ "MapReduce environments offer great scalability by restricting the programming model to only map and reduce operators.", "This abstraction simplifies many difficult problems occuring in generic dis-ion simplifies many difficult problems occuring in generic distributed computations like fault tolerance and synchronization, hiding them from the programmer.", "There are, however, algorithms that cannot be easily or efficiently expressed in MapReduce, such as recursive functions.", "In this paper we extend the Apache Spark runtime so that it can support recursive queries.", "We also introduce a new parallel and more lightweight scheduling mechanism, ideal for scheduling a very large set of tiny tasks.", "We implemented the aformentioned scheduler and found that it simplifies the code for recursive computation and can perform up to 2.1× faster than the default Spark scheduler." ]
[ 0, 0, 0, 1, 1, 1 ]
[ 1, 1, 0.7894999980926514, 0.5, 1, 0.6053000092506409 ]
train_0552
[ "Presently, educational institutions compile and store huge volumes of data, such as student enrolment and attendance records, as well as their examination results.", "Mining such data yields stimulating information that serves its handlers well.", "Rapid growth in educational data points to the fact that distilling massive amounts of data requires a more sophisticated set of algorithms.", "This issue led to the emergence of the field of educational data mining (EDM).", "Traditional data mining algorithms cannot be directly applied to educational problems, as they may have a specific objective and function.", "This implies that a preprocessing algorithm has to be enforced first and only then some specific data mining methods can be applied to the problems.", "One such preprocessing algorithm in EDM is clustering.", "Many studies on EDM have focused on the application of various data mining algorithms to educational attributes.", "Therefore, this paper provides over three decades long (1983–2016) systematic literature review on clustering algorithm and its applicability and usability in the context of EDM.", "Future insights are outlined based on the literature reviewed, and avenues for further research are identified." ]
[ 0, 0, 0, 0, 1, 1, 4, 1, 4, 4 ]
[ 0.8378000259399414, 0.4323999881744385, 0.4323999881744385, 0.4323999881744385, 0.4323999881744385, 1, 0.5676000118255615, 0.4323999881744385, 0.6485999822616577, 1 ]
train_0553
[ "A long landing is one type of flight incident that will multiply the risk of a runway excursion.", "It occurs frequently but receives little attention in research due to difficulty in obtaining the real flight data.", "The aim of this paper is to discover key flight parameter features of long landing incidents by analyzing Quick Access Recorder (QAR) data and put forward prevention measures from the perspective of pilot operation at the same time.", "First, 73 flight performance parameter variables and 4 operation parameter variables were defined, covering major landing stages from 1500 ft to touchdown.", "Then 128 cases of selected QAR data were divided into two groups according to the threshold of identifying normal and long landing.", "Second, each flight parameter variable of these 128 flights was compared between groups and then the logistic and linear regression models were developed respectively to further examine the links between touchdown distance and these flight parameter variables.", "Third, potential flight operation causing performance difference of long landing incidents was also analyzed.", "Finally results indicate that the period of 200 ft to touchdown is the key stage of landing and flare is the most critical operation affecting touchdown distance.", "It is suggested that the pilot should inspect the ratio of descent rate and groundspeed carefully at the height of 50 ft and pilot's faster and steady pulling up columns is probably helpful for an excellent flare and landing.", "The findings are expected to be applied into flight operation practice for further preventing long landing incidents and even the runway excursion accidents." ]
[ 0, 0, 2, 1, 4, 1, 1, 1, 4, 4 ]
[ 1, 1, 0.5946000218391418, 0.5676000118255615, 0.5946000218391418, 0.5676000118255615, 0.5676000118255615, 0.40540000796318054, 0.5946000218391418, 0.7838000059127808 ]
train_0554
[ "Prior work on criminal incident prediction has relied primarily on the historical crime record and various geospatial and demographic information sources.", "Although promising, these models do not take into account the rich and rapidly expanding social media context that surrounds incidents of interest.", "This paper presents a preliminary investigation of Twitter-based criminal incident prediction.", "Our approach is based on the automatic semantic analysis and understanding of natural language Twitter posts, combined with dimensionality reduction via latent Dirichlet allocation and prediction via linear modeling.", "We tested our model on the task of predicting future hit-and-run crimes.", "Evaluation results indicate that the model comfortably outperforms a baseline model that predicts hit-and-run incidents uniformly across all days." ]
[ 0, 0, 4, 4, 1, 4 ]
[ 0.5946000218391418, 0.40540000796318054, 0.40540000796318054, 0.40540000796318054, 0.5676000118255615, 1 ]
train_0555
[ "“Industry 4.0” is recognized as the future of industrial production in which concepts as Smart Factory and Decentralized Decision", "Making are fundamental.", "This paper proposes a novel strategy to support decentralized decision, whilst identifying opportunities and challenges of Industry 4.0 contextualizing the potential that represents industrial digitalization and how technological advances can contribute for a new perspective on manufacturing production.", "It is analysed a set of barriers to the full implementation of Industry 4.0 vision, identifying areas in which decision support is vital.", "Then, for each of the identified areas, the authors propose a strategy, characterizing it together with the level of complexity that is involved in the different processes.", "The strategies proposed are derived from the needs of two of Industry 4.0 main characteristics: horizontal integration and vertical integration.", "For each case, decision approaches are proposed concerning the type of decision required (strategic, tactical, operational and real-time).", "Validation results are provided together with a discussion on the main challenges that might be an obstacle for a successful decision strategy." ]
[ 0, 2, 2, 1, 1, 1, 1, 4 ]
[ 0.7949000000953674, 0.5896999835968018, 0.5896999835968018, 0.6154000163078308, 0.6154000163078308, 0.6154000163078308, 0.6154000163078308, 1 ]
train_0556
[ "Lifelong Machine Learning, or LML, considers systems that can learn many tasks from one or more domains over its lifetime.", "The goal is to sequentially retain learned knowledge and to selectively transfer that knowledge when learning a new task so as to develop more accurate hypotheses or policies.", "Following a review of prior work on LML, we propose that it is now appropriate for the AI community to move beyond learning algorithms to more seriously consider the nature of systems that are capable of learning over a lifetime.", "Reasons for our position are presented and potential counter-arguments are discussed.", "The remainder of the paper contributes by defining LML, presenting a reference framework that considers all forms of machine learning, and listing several key challenges for and benefits from LML research.", "We conclude with ideas for next steps to advance the field." ]
[ 0, 2, 2, 2, 3, 4 ]
[ 0.763700008392334, 1, 0.35440000891685486, 0.35440000891685486, 0.2363000065088272, 0.4092999994754791 ]
train_0557
[ "Receiver operating characteristics (ROC) graphs are useful for organizing classifiers and visualizing their performance.", "ROC graphs are commonly used in medical decision making, and in recent years have been used increasingly in machine learning and data mining research.", "Although ROC graphs are apparently simple, there are some common misconceptions and pitfalls when using them in practice.", "The purpose of this article is to serve as an introduction to ROC graphs and as a guide for using them in research.", "2005 Elsevier B.V. All rights reserved." ]
[ 0, 0, 0, 2, 3 ]
[ 0.5946000218391418, 0.5946000218391418, 0.5946000218391418, 0.5946000218391418, 0.8108000159263611 ]
train_0558
[ "Aspect-level sentiment classification is a finegrained task in sentiment analysis.", "Since it provides more complete and in-depth results, aspect-level sentiment analysis has received much attention these years.", "In this paper, we reveal that the sentiment polarity of a sentence is not only determined by the content but is also highly related to the concerned aspect.", "For instance, “The appetizers are ok, but the service is slow.”, for aspect taste, the polarity is positive while for service, the polarity is negative.", "Therefore, it is worthwhile to explore the connection between an aspect and the content of a sentence.", "To this end, we propose an Attention-based Long Short-Term Memory Network for aspect-level sentiment classification.", "The attention mechanism can concentrate on different parts of a sentence when different aspects are taken as input.", "We experiment on the SemEval 2014 dataset and results show that our model achieves state-ofthe-art performance on aspect-level sentiment classification." ]
[ 0, 0, 2, 0, 1, 1, 0, 4 ]
[ 0.7778000235557556, 0.7778000235557556, 0.3889000117778778, 0.583299994468689, 0.3889000117778778, 0.5555999875068665, 0.41670000553131104, 0.583299994468689 ]
train_0559
[ "Much of previous attention on decision trees focuses on the splitting criteria and optimization of tree sizes.", "The dilemma between overfitting and achieving maximum accuracy is seldom resolved.", "A method to construct a decision tree based classifier is proposed that maintains highest accuracy on training data and improves on generalization accuracy as it grows in complexity.", "The classifier consists of multiple trees constructed systematically by pseudorandomly selecting subsets of components of the feature vector, that is, trees constructed in randomly chosen subspaces.", "The subspace method is compared to single-tree classifiers and other forest construction methods by experiments on publicly available datasets, where the method’s superiority is demonstrated.", "We also discuss independence between trees in a forest and relate that to the combined classification accuracy." ]
[ 0, 0, 2, 1, 1, 4 ]
[ 1, 0.7778000235557556, 0.583299994468689, 0.583299994468689, 1, 0.6388999819755554 ]
train_0560
[ "Flexpad is an interactive system that combines a depth camera and a projector to transform sheets of plain paper or foam into flexible, highly deformable, and spatially aware handheld displays.", "We present a novel approach for tracking deformed surfaces from depth images in real time.", "It captures deformations in high detail, is very robust to occlusions created by the user's hands and fingers, and does not require any kind of markers or visible texture.", "As a result, the display is considerably more deformable than in previous work on flexible handheld displays, enabling novel applications that leverage the high expressiveness of detailed deformation.", "We illustrate these unique capabilities through three application examples: curved cross-cuts in volumetric images, deforming virtual paper characters, and slicing through time in videos.", "Results from two user studies show that our system is capable of detecting complex deformations and that users are able to perform them quickly and precisely." ]
[ 0, 2, 2, 2, 1, 4 ]
[ 1, 0.5799999833106995, 0.41999998688697815, 0.2240000069141388, 0.41999998688697815, 0.8399999737739563 ]
train_0561
[ "Research in machine learning, statistics and related fields has produced a wide variety of algorithms for classification.", "However, most of these algorithms assume that all errors have the same cost, which is seldom the case in KDD problems.", "Individually making each classification learner costsensitive is laborious, and often non-trivial.", "In this paper we propose a principled method for making an arbitrary classifier cost-sensitive by wrapping a cost-minimizing procedure around it.", "This procedure, called MetaCost, treats the underlying classifier as a black box, requiring no knowledge of its functioning or change to it.", "Unlike stratification, MetaCost, is applicable to any number of classes and to arbitrary cost matrices.", "Empirical trials on a large suite of benchmark databases show that MetaCost almost always produces large cost reductions compared to the cost-blind classifier used (C4.5RULES) and to two forms of stratification.", "Further tests identify the key components of MetaCost and those that can be varied without substantial loss.", "Experiments on a larger database indicate that MetaCost scales well." ]
[ 0, 0, 0, 2, 1, 1, 4, 4, 4 ]
[ 1, 1, 1, 0.8108000159263611, 0.5946000218391418, 0.7838000059127808, 0.3783999979496002, 0.7838000059127808, 0.8108000159263611 ]
train_0562
[ "We introduce a new text-indexing data structure, the String B-Tree, that can be seen as a link between some traditional external-memory and string-matching data structures.", "In a short phrase, it is a combination of B-trees and Patricia tries for internal-node indices that is made more effective by adding extra pointers to speed up search and update operations.", "Consequently, the String B-Tree overcomes the theoretical limitations of inverted files, B-trees, prefix B-trees, suffix arrays, compacted tries and suffix trees.", "String B-trees have the same worst-case performance as B-trees but they manage unbounded-length strings and perform much more powerful search operations such as the ones supported by suffix trees.", "String B-trees are also effective in main memory (RAM model) because they improve the online suffix tree search on a dynamic set of strings.", "They also can be successfully applied to database indexing and software duplication." ]
[ 0, 0, 0, 1, 4, 2 ]
[ 0.6571000218391418, 0.6571000218391418, 0.428600013256073, 0.428600013256073, 0.34290000796318054, 0.4571000039577484 ]
train_0563
[ "Digital forensics have become increasingly important as an approach to investigate cyber- and computer-assisted crime.", "Whilst many tools exist and much research is being undertaken, many questions exist regarding the future of the domain.", "Indeed, prior literature has widely published the challenges that exist within the domain, from the increasing volume of data (e.g. SANs, hard drive capacities, databases) to the varying technology platforms and systems that exist (e.g. tablets, mobile phones, embedded systems, cloud computing).", "However, little effort has focused upon understanding the reality of these challenges.", "The paper presents research that seeks to identify, quantify and prioritise these challenges so that future efforts can be concentrated on the issues that actually affect the domain.", "The study undertook a survey of researchers and practitioners (both law enforcement and organisational) to examine the real-challenges from the perceived challenges and to understand what effect the future will have upon the digital forensic domain.", "A total of 42 participants undertook the study with 55% having 3 or more years of of experience.", "45% were academic researchers, 16% law enforcement and 31% had a forensic role within an organisation.", "Overwhelmingly, 93% of participants felt that the number and complexity of investigations would increase in the future.", "Apart from the plethora of findings elaborated in the paper, the principal future challenge priorities included cloud computing, anti-forensics and encryption." ]
[ 0, 0, 0, 0, 2, 2, 4, 4, 1, 1 ]
[ 1, 1, 0.8205000162124634, 0.6154000163078308, 0.7949000000953674, 0.5896999835968018, 0.5896999835968018, 0.5896999835968018, 0.41029998660087585, 0.3846000134944916 ]
train_0564
[ "Information technology and the Internet have had a dramatic effect on business operations.", "Companies are making large investments in e-commerce applications but are hard pressed to evaluate the success of their e-commerce systems.", "The DeLone & McLean Information Systems Success Model can be adapted to the measurement challenges of the new e-commerce world.", "The six dimensions of the updated model are a parsimonious framework for organizing the e-commerce success metrics identified in the literature.", "Two case examples demonstrate how the model can be used to guide the identification and specification of e-commerce success metrics." ]
[ 0, 0, 0, 1, 4 ]
[ 1, 1, 0.8230000138282776, 0.6018000245094299, 0.42480000853538513 ]
train_0565
[ "Partially observable Markov decision processes (pomdp's) model decision problems in which an agent tries to maximize its reward in the face of limited and/or noisy sensor feedback.", "While the study of pomdp's is motivated by a need to address realistic problems, existing techniques for nding optimal behavior do not appear to scale well and have been unable to nd satisfactory policies for problems with more than a dozen states.", "After a brief review of pomdp's, this paper discusses several simple solution methods and shows that all are capable of nding near-optimal policies for a selection of extremely small pomdp's taken from the learning literature.", "In contrast, we show that none are able to solve a slightly larger and noisier problem based on robot navigation.", "We nd that a combination of two novel approaches performs well on these problems and suggest methods for scaling to even larger and more complicated domains." ]
[ 0, 0, 1, 1, 1 ]
[ 0.5946000218391418, 0.40540000796318054, 0.6215999722480774, 0.3783999979496002, 0.40540000796318054 ]
train_0566
[ "We present a route planning technique solely based on the concept of node contraction.", "We contract or remove one node at a time out of the graph and add shortcut edges to the remaining graph to preserve shortest paths distances.", "The resulting contraction hierarchy (CH), the original graph plus shortcuts, also defines an order of “importance” among all nodes through the node selection.", "We apply a modified bidirectional Dijkstra algorithm that takes advantage of this node order to obtain shortest paths.", "The search space is reduced by relaxing only edges leading to more important nodes in the forward search and edges coming from more important nodes in the backward search.", "Both search scopes eventually meet at the most important node on a shortest path.", "We use a simple but extensible heuristic to obtain the node order: a priority queue whose priority function for each node is a linear combination of several terms, e.g. one term weights nodes depending on the sparsity of the remaining graph after the contraction.", "Another term regards the already contracted nodes to allow a more uniform contraction.", "Depending on the application we can select the combination of the priority terms to obtain the required hierarchy.", "We have five times lower query times than the best previous hierarchical Dijkstra-based speedup techniques and a negative space overhead, i.e., the data structure for distance computation needs less space than the input graph." ]
[ 0, 0, 0, 1, 1, 1, 1, 4, 4, 3 ]
[ 1, 0.75, 0.7878999710083008, 0.8485000133514404, 0.6061000227928162, 0.821399986743927, 0.4544999897480011, 0.5454999804496765, 0.6061000227928162, 0.3939000070095062 ]
train_0567
[ "The past decade has witnessed the rapid evolution in blockchain technologies, which has attracted tremendous interests from both the research communities and industries.", "The blockchain network was originated from the Internet financial sector as a decentralized, immutable ledger system for transactional data ordering.", "Nowadays, it is envisioned as a powerful backbone/framework for decentralized data processing and datadriven self-organization in flat, open-access networks.", "In particular, the plausible characteristics of decentralization, immutability and self-organization are primarily owing to the unique decentralized consensus mechanisms introduced by blockchain networks.", "This survey is motivated by the lack of a comprehensive literature review on the development of decentralized consensus mechanisms in blockchain networks.", "In this survey, we provide a systematic vision of the organization of blockchain networks.", "By emphasizing the unique characteristics of incentivized consensus in blockchain networks, our in-depth review of the state-ofthe-art consensus protocols is focused on both the perspective of distributed consensus system design and the perspective of incentive mechanism design.", "From a game-theoretic point of view, we also provide a thorough review on the strategy adoption for self-organization by the individual nodes in the blockchain backbone networks.", "Consequently, we provide a comprehensive survey on the emerging applications of the blockchain networks in a wide range of areas.", "We highlight our special interest in how the consensus mechanisms impact these applications." ]
[ 0, 0, 0, 0, 2, 2, 1, 1, 1, 2 ]
[ 1, 1, 1, 0.8108000159263611, 0.5946000218391418, 0.5946000218391418, 0.8108000159263611, 0.8108000159263611, 0.5946000218391418, 0.40540000796318054 ]
train_0568
[ "Generative adversarial networks have gained a lot of attention in general computer vision community due to their capability of data generation without explicitly modelling the probability density function and robustness to overfitting.", "The adversarial loss brought by the discriminator provides a clever way of incorporating unlabeled samples into the training and imposing higher order consistency that is proven to be useful in many cases, such as in domain adaptation, data augmentation, and image-to-image translation.", "These nice properties have attracted researcher in the medical imaging community and we have seen quick adoptions in many traditional tasks and some novel applications.", "This trend will continue to grow based on our observation therefore we conducted a review of the recent advances in medical imaging using the adversarial training scheme in the hope of benefiting researchers that are interested in this technique." ]
[ 0, 0, 0, 1 ]
[ 1, 0.7949000000953674, 1, 0.41029998660087585 ]
train_0569
[ "We develop a novel cross-modality generation framework that learns to generate predicted modalities from given modalities in MR images without real acquisition.", "Our proposed method performs image-to-image translation by means of a deep learning model that leverages conditional generative adversarial networks (cGANs).", "Our framework jointly exploits the low-level features (pixel-wise information) and high-level representations (e.g. brain tumors, brain structure like gray matter, etc.) between cross modalities which are important for resolving the challenging complexity in brain structures.", "Based on our proposed framework, we first propose a method for cross-modality registration by fusing the deformation fields to adopt the cross-modality information from predicted modalities.", "Second, we propose an approach for MRI segmentation, translated multichannel segmentation (TMS), where given modalities, along with predicted modalities, are segmented by fully convolutional networks (FCN) in a multi∗These four authors contribute equally to the study ∗∗Corresponding author Email addresses:", "QianyeYang@buaa.edu.cn (Qianye Yang), nannanli@buaa.edu.cn (Nannan Li), zixuzhao1218@gmail.com (Zixu Zhao), xingyu.fan02@gmail.com (Xingyu Fan), echang@microsoft.com (Eric I-Chao Chang), xuyan04@gmail.com (Yan Xu) Preprint submitted to Medical Image Analysis January 23, 2018 ar X iv :1 80 1.", "06 94 0v 1 [ cs .C V ] 2 2 Ja n 20 18 channel manner.", "Both these two methods successfully adopt the cross-modality information to improve the performance without adding any extra data.", "Experiments demonstrate that our proposed framework advances the state-of-the-art on five MRI datasets.", "We also observe encouraging results in cross-modality registration and segmentation on some widely adopted datasets." ]
[ 2, 1, 1, 1, 1, 3, 3, 1, 4, 4 ]
[ 0.6215999722480774, 0.7838000059127808, 0.5676000118255615, 1, 0.5946000218391418, 0.7838000059127808, 0.7838000059127808, 0.8108000159263611, 0.40540000796318054, 0.5946000218391418 ]
train_0570
[ "As has been extensively shown, acoustic features for speech recognition can be learned from neural networks with multiple hidden layers.", "However, the learned transformations may not sufficiently generalize to test sets that have a significant mismatch to the training data.", "Gabor features, on the other hand, are generated from spectro-temporal filters designed to model human auditory processing.", "In previous work, these features are used as inputs to neural networks, which improved word accuracy for speech recognition in the presence of noise.", "Here we propose a neural network architecture called a Gabor Convolutional Neural Network (GCNN) that incorporates Gabor functions into convolutional filter kernels.", "In this architecture, a variety of Gabor features served as the multiple feature maps of the convolutional layer.", "The filter coefficients are further tuned by back-propagation training.", "Experiments used two noisy versions of the WSJ corpus: Aurora 4, and RATS re-noised WSJ.", "In both cases, the proposed architecture performs better than other noise-robust features that we have tried, namely, ETSI-AFE, PNCC, Gabor features without the CNN-based approach, and our best neural network features that don’t incorporate Gabor functions." ]
[ 0, 0, 1, 1, 2, 1, 1, 1, 4 ]
[ 0.428600013256073, 0.428600013256073, 0.800000011920929, 0.6000000238418579, 0.771399974822998, 0.6000000238418579, 0.6000000238418579, 0.571399986743927, 0.6000000238418579 ]
train_0571
[ "Digital communication techniques make the process of modulating a message feasible for transmission.", "However, a common problem with commonly used techniques, such as Pulse Coded Modulation (PCM) and Linear Delta Modulation (LDM), is that they negatively affect the communication process by causing quantization error, slope overload distortion, and granular noise.", "This paper discusses the implementation of two modulation systems, Adaptive Delta Modulation (ADM) and Differential Pulse Coded Modulation (DPCM), in order to solve the aforementioned problems.", "The latter solves the quantization error faced by the PCM and the former solves the slope overload distortion and granular noise faced by LDM.", "These two systems are implemented using Simulink (The Math Works, Inc., Natick, MA, USA) on a multithreaded processor computer, are tested in real-time, and are subjected to different kinds of noise." ]
[ 0, 0, 2, 1, 1 ]
[ 0.8158000111579895, 0.6053000092506409, 0.7894999980926514, 0.5788999795913696, 0.8158000111579895 ]
train_0572
[ "HomeNetToo is a longitudinal field study designed to examine the antecedents and consequences of home Internet use in low-income families (http://www.HomeNetToo.org).", "The study was done between December 2000 and June 2002.", "Among the consequences considered was children's academic performance.", "Participants were 140 children, mostly African American (83%), mostly boys (58%), and most living in single-parent households (75%) in which the median annual income was 15,000 (U.S. dollars) or less.", "Average age was 13.8 years.", "Ages ranged between 10 and 18 years, Internet use was continuously recorded, and multiple measures of academic performance were obtained during the 16-month trial.", "Findings indicated that children who used the Internet more had higher scores on standardized tests of reading achievement and higher grade point averages 6 months, 1 year, and 16 months later than did children who used it less.", "Older children used the Internet more than did younger children, but age had no effect on the nature or the academic performance benefits of Internet use.", "Implications for the digital \"use\" divide are discussed." ]
[ 0, 0, 0, 1, 4, 1, 4, 4, 3 ]
[ 0.7940999865531921, 0.5881999731063843, 0.5881999731063843, 0.41179999709129333, 0.41179999709129333, 0.41179999709129333, 0.8234999775886536, 0.8234999775886536, 0.6176000237464905 ]
train_0573
[ "This paper presents the top 10 data mining algorithms identified by the IEEE International Conference on Data Mining (ICDM) in December 2006: C4.5, k-Means, SVM, Apriori, EM, PageRank, AdaBoost, kNN, Naive Bayes, and CART.", "These top 10 algorithms are among the most influential data mining algorithms in the research community.", "With each algorithm, we provide a description of the algorithm, discuss the impact of the algorithm, and review current and further research on the algorithm.", "These 10 algorithms cover classification, clustering, statistical learning, association analysis, and link mining, which are all among the most important topics in data mining research and development." ]
[ 0, 0, 1, 1 ]
[ 0.7949000000953674, 0.7949000000953674, 0.6154000163078308, 0.5896999835968018 ]
train_0574
[ "Gamification, the application of game elements to non-game settings, continues to grow in popularity as a method to increase student engagement in the classroom.", "We tested students across two courses, measuring their motivation, social comparison, effort, satisfaction, learner empowerment, and academic performance at four points during a 16-week semester.", "One course received a gamified curriculum, featuring a leaderboard and badges, whereas the other course received the same curriculum without the gamified elements.", "Our results found that students in the gamified course showed less motivation, satisfaction, and empowerment over time than those in the non-gamified class.", "The effect of course type on students' final exam scores was mediated by students' levels of intrinsic motivation, with students in the gamified course showing less motivation and lower final exam scores than the non-gamified class.", "This suggests that some care should be taken when applying certain gamification mechanics to educational settings.", "© 2014 Elsevier Ltd.", "All rights reserved." ]
[ 1, 1, 1, 4, 4, 4, 3, 3 ]
[ 0.41670000553131104, 0.5555999875068665, 0.8611000180244446, 0.7778000235557556, 0.7778000235557556, 0.5555999875068665, 0.7778000235557556, 0.7778000235557556 ]
train_0575
[ "First Fit Decreasing is a classical bin packing algorithm: the items are ordered into their nonincreasing order, and then in this order the next item is always packed into the first bin where it fits.", "For an instance I let FFD(I) and OPT (I) denote the number of the used bins by algorithm FFD, and an optimal algorithm, respectively.", "We show in this paper that FFD(I) ≤ 11/9OPT (I) + 6/9, (1) and that this bound is tight.", "The tight bound of the additive constant was an open question for many years." ]
[ 0, 4, 4, 4 ]
[ 0.6053000092506409, 0.39469999074935913, 0.6053000092506409, 0.421099990606308 ]
train_0576
[ "Medical professionals diagnose depression by interpreting the responses of individuals to a variety of questions, probing lifestyle changes and ongoing thoughts.", "Like professionals, an effective automated agent must understand that responses to queries have varying prognostic value.", "In this study we demonstrate an automated depression-detection algorithm that models interviews between an individual and agent and learns from sequences of questions and answers without the need to perform explicit topic modeling of the content.", "We utilized data of 142 individuals undergoing depression screening, and modeled the interactions with audio and text features in a Long-Short Term Memory (LSTM) neural network model to detect depression.", "Our results were comparable to methods that explicitly modeled the topics of the questions and answers which suggests that depression can be detected through sequential modeling of an interaction, with minimal information on the structure of the interview." ]
[ 0, 0, 1, 1, 4 ]
[ 1, 0.8611000180244446, 0.41670000553131104, 0.41670000553131104, 0.7778000235557556 ]
train_0577
[ "This paper proposes a system architecture based on deep convolutional neural network (CNN) for road detection and segmentation from aerial images.", "These images are acquired by an unmanned aerial vehicle implemented by the authors.", "The algorithm for image segmentation has two phases: the learning phase and the operating phase.", "The input aerial images are decomposed in their color components, preprocessed in Matlab on Hue channel and next partitioned in small boxes of dimension 33 × 33 pixels using a sliding box algorithm.", "These boxes are considered as inputs into a deep CNN.", "The CNN was designed using MatConvNet and has the following structure: four convolutional layers, four pooling layers, one ReLu layer, one full connected layer, and a Softmax layer.", "The whole network was trained using a number of 2,000 boxes.", "The CNN was implemented using programming in MATLAB on GPU and the results are promising.", "The proposed system has the advantage of processing speed and simplicity." ]
[ 0, 0, 1, 1, 0, 0, 1, 4, 4 ]
[ 0.7838000059127808, 0.7838000059127808, 0.4323999881744385, 0.5946000218391418, 0.40540000796318054, 0.40540000796318054, 0.40540000796318054, 0.5946000218391418, 0.5946000218391418 ]
train_0578
[ "Given a state-of-the-art deep neural network classifier, we show the existence of a universal (image-agnostic) and very small perturbation vector that causes natural images to be misclassified with high probability.", "We propose a systematic algorithm for computing universal perturbations, and show that state-of-the-art deep neural networks are highly vulnerable to such perturbations, albeit being quasi-imperceptible to the human eye.", "We further empirically analyze these universal perturbations and show, in particular, that they generalize very well across neural networks.", "The surprising existence of universal perturbations reveals important geometric correlations among the high-dimensional decision boundary of classifiers.", "It further outlines potential security breaches with the existence of single directions in the input space that adversaries can possibly exploit to break a classifier on most natural images." ]
[ 0, 1, 1, 4, 4 ]
[ 0.39469999074935913, 0.5788999795913696, 0.5788999795913696, 0.39469999074935913, 0.7894999980926514 ]
train_0579
[ "ÐWe describe a real-time computer vision and machine learning system for modeling and recognizing human behaviors in a visual surveillance task [1].", "The system is particularly concerned with detecting when interactions between people occur and classifying the type of interaction.", "Examples of interesting interaction behaviors include following another person, altering one's path to meet another, and so forth.", "Our system combines top-down with bottom-up information in a closed feedback loop, with both components employing a statistical Bayesian approach [2].", "We propose and compare two different state-based learning architectures, namely, HMMs and CHMMs for modeling behaviors and interactions.", "The CHMM model is shown to work much more efficiently and accurately.", "Finally, to deal with the problem of limited training data, a synthetic aAlife-styleo training system is used to develop flexible prior models for recognizing human interactions.", "We demonstrate the ability to use these a priori models to accurately classify real human behaviors and interactions with no additional tuning or training.", "Index TermsÐVisual surveillance, people detection, tracking, human behavior recognition, Hidden Markov Models." ]
[ 0, 2, 0, 1, 1, 1, 1, 4, 4 ]
[ 0.8285999894142151, 0.628600001335144, 0.542900025844574, 0.7857000231742859, 0.628600001335144, 0.4000000059604645, 0.571399986743927, 0.6000000238418579, 0.8285999894142151 ]
train_0580
[ "one component of intelligent transportation systems, IV systems use sensing and intelligent algorithms to understand the vehicle’s immediate environment, either assisting the driver or fully controlling the vehicle.", "Following the success of information-oriented systems, IV systems will likely be the “next wave” for ITS, functioning at the control layer to enable the driver–vehicle “subsystem” to operate more effectively.", "This column provides a broad overview of applications and selected activities in this field.", "IV application areas" ]
[ 0, 1, 1, 3 ]
[ 1, 0.421099990606308, 0.6053000092506409, 0.631600022315979 ]
train_0581
[ "To stand up for the brands they support, members of brand communities develop “oppositional brand loyalty” towards other rival brands.", "This study identifies how the interaction characteristics of brand community affect the perceived benefits of community members, and whether the perceived benefits cause members to develop community commitment, as well as the relationship between community commitment and oppositional brand loyalty.", "This study examined members of online automobile communities in Taiwan, and obtained a total of 283 valid samples.", "The analytical results reveal that interaction characteristics of brand community make members perceive many benefits, with “brand community engagement” being the most noticeable.", "Furthermore, hedonic, social, and learning benefits are the main factors to form community commitments.", "When members have community commitments, they will form oppositional brand loyalty to other rival brands.", "Based on the analytical results, this study provides suggestions to enterprises regarding online brand community operations.", "© 2013 Elsevier Ltd.", "All rights reserved." ]
[ 0, 2, 4, 4, 2, 4, 4, 3, 3 ]
[ 0.7949000000953674, 0.41029998660087585, 0.41029998660087585, 0.5896999835968018, 0.4839000105857849, 0.6154000163078308, 0.6154000163078308, 1, 1 ]
train_0582
[ "The purpose of this paper is to analyze shifts in the producer– consumer relationship resulting from the increased use of digital technologies.", "In this study, we aim to understand how this relationship is fundamentally changing and the role of digital technologies in such a change.", "Therefore, we provide a state-of-the-art review of information systems and management literature using analysis techniques borrowed from the method of grounded theory.", "The results of our study indicate that the constructs of digital density, digital interconnectedness, and consumer-centricity are key drivers of changes in the producer–consumer relationship.", "With the growing role of digital technologies in both society and organizations, our study contributes with implications for information technology and business managers, offering them insights on how to deal with this phenomenon.", "Finally, our study provides a useful framework for future interdisciplinary research in this field." ]
[ 2, 2, 1, 4, 4, 4 ]
[ 0.421099990606308, 0.631600022315979, 0.631600022315979, 0.8421000242233276, 0.8421000242233276, 0.8421000242233276 ]
train_0583
[ "Paleness or pallor is a manifestation of blood loss or low hemoglobin concentrations in the human blood that can be caused by pathologies such as anemia.", "This work presents the first automated screening system that utilizes pallor site images, segments, and extracts color and intensity-based features for multi-class classification of patients with high pallor due to anemia-like pathologies, normal patients and patients with other abnormalities.", "This work analyzes the pallor sites of conjunctiva and tongue for anemia screening purposes.", "First, for the eye pallor site images, the sclera and conjunctiva regions are automatically segmented for regions of interest.", "Similarly, for the tongue pallor site images, the inner and outer tongue regions are segmented.", "Then, color-plane based feature extraction is performed followed by machine learning algorithms for feature reduction and image level classification for anemia.", "In this work, a suite of classification algorithms image-level classifications for normal (class 0), pallor (class 1) and other abnormalities (class 2).", "The proposed method achieves 86% accuracy, 85% precision and 67% recall in eye pallor site images and 98.2% accuracy and precision with 100% recall in tongue pallor site images for classification of images with pallor.", "The proposed pallor screening system can be further fine-tuned to detect the severity of anemia-like pathologies using controlled set of local images that can then be used for future benchmarking purposes." ]
[ 0, 0, 2, 2, 2, 1, 1, 1, 4 ]
[ 0.7838000059127808, 0.40540000796318054, 0.40540000796318054, 0.40540000796318054, 0.40540000796318054, 0.6215999722480774, 0.6215999722480774, 0.5946000218391418, 0.6215999722480774 ]
train_0584
[ "This work presents a new efficient method for fitting ellipses to scattered data.", "Previous algorithms either fitted general conics or were computationally expensive.", "By minimizing the algebraic distance subject to the constraint 4 2 1 the new method incorporates the ellipticity constraint into the normalization factor.", "The new method combines several advantages: (i) It is ellipse-specific so that even bad data will always return an ellipse; (ii) It can be solved naturally by a generalized eigensystem and (iii) it is extremely robust, efficient and easy to implement.", "We compare the proposed method to other approaches and show its robustness on several examples in which other non-ellipse-specific approaches would fail or require computationally expensive iterative refinements.", "Source code for the algorithm is supplied and a demonstration is available on ! \"", "!", "$#% '& () \"*) & +, ./10 0 32, . 4) \"*) \"*) % 5* 0" ]
[ 2, 0, 1, 1, 1, 3, 3, 3 ]
[ 0.6000000238418579, 0.800000011920929, 0.800000011920929, 0.800000011920929, 0.6000000238418579, 0.4000000059604645, 0.800000011920929, 0.800000011920929 ]
train_0585
[ "A new method for automatic indexing and retrieval is described.", "The approach is to take advantage of implicit higher-order structure in the association of terms with documents (“semantic structure”) in order to improve the detection of relevant documents on the basis of terms found in queries.", "The particular technique used is singular-value decomposition, in which a large term by document matrix is decomposed into a set of ca.", "100 orthogonal factors from which the original matrix can be approximated by linear combination.", "Documents are represented by ca.", "100 item vectors of factor weights.", "Queries are represented as pseudo-document vectors formed from weighted combinations of terms, and documents with supra-threshold cosine values are returned.", "initial tests find this completely automatic method for retrieval to be promising." ]
[ 1, 1, 1, 1, 1, 4, 1, 4 ]
[ 0.6025000214576721, 0.4302999973297119, 0.6025000214576721, 0.4016000032424927, 0.4302999973297119, 0.4016000032424927, 0.6310999989509583, 0.5697000026702881 ]
train_0586
[ "A supervised learning algorithm (Scaled Conjugate Gradient, SCG) with superlinear convergence rate is introduced.", "The algorithm is based upon a class of optimization techniques well known in numerical analysis as the Conjugate Gradient Methods.", "SCG uses second order information from the neural network but requires only O(N) memory usage, where N is the number of weights in the network.", "The performance of SCG is benchmarked against the performance of the standard backpropagation algorithm (BP) [13], the conjugate gradient backpropagation (CGB) [6] and the one-step Broyden-Fletcher-Goldfarb-Shanno memoryless quasi-Newton algorithm (BFGS) [1].", "SCG yields a speed-up of at least an order of magnitude relative to BP.", "The speed-up depends on the convergence criterion, i.e., the bigger demand for reduction in error the bigger the speed-up.", "SCG is fully automated including no user dependent parameters and avoids a time consuming line-search, which CGB and BFGS uses in each iteration in order to determine an appropriate step size.", "Incorporating problem dependent structural information in the architecture of a neural network often lowers the overall complexity.", "The smaller the complexity of the neural network relative to the problem domain, the bigger the possibility that the weight space contains long ravines characterized by sharp curvature.", "While BP is inefficient on these ravine phenomena, it is shown that SCG handles them effectively." ]
[ 0, 0, 2, 1, 2, 2, 1, 0, 4, 4 ]
[ 0.5881999731063843, 0.44119998812675476, 0.2962999939918518, 0.6176000237464905, 0.2353000044822693, 0.4706000089645386, 0.571399986743927, 0.5881999731063843, 0.41179999709129333, 0.41179999709129333 ]
train_0587
[ "People are reciprocal if they reward kind actions and punish unkind ones.", "In this paper we a formal theory of reciprocity.", "It takes into account that people evaluate the kindness of an act only by its consequences but also by its underlying intention.", "The theory is in line with the re stylized facts of a wide range of experimental games, such as the ultimatum game, the gift-ex game, a reduced best-shot game, the dictator game, the prisoner’s dilemma, and public good Furthermore, it predicts that identical consequences trigger different reciprocal responses in d environments.", "Finally, the theory explains why outcomes tend to be fair in bilateral intera whereas extremely unfair distributions may arise in competitive markets.", " 2005 Elsevier Inc. All rights reserved.", "JEL classification:C7; C91; C92; D64; H41" ]
[ 0, 0, 0, 1, 4, 3, 3 ]
[ 1, 1, 0.41029998660087585, 0.5160999894142151, 0.5896999835968018, 0.5896999835968018, 1 ]
train_0588
[ "During the past decades, the virtual reality community has based its development on a synthesis of earlier work in interactive 3D graphics, user interfaces, and visual simulation.", "Currently, the VR field is transitioning into work influenced by video games.", "Because much of the research and development being conducted in the games community parallels the VR community's efforts, it has the potential to affect a greater audience.", "Given these trends, VR researchers who want their work to remain relevant must realign to focus on game research and development.", "Leveraging technology from the visual simulation and virtual reality communities, serious games provide a delivery system for organizational video game instruction and training." ]
[ 0, 0, 0, 2, 2 ]
[ 1, 1, 1, 0.5788999795913696, 0.5788999795913696 ]
train_0589
[ "Virtualized Radio Access Network (vRAN) architectures constitute a promising solution for the densification needs of 5G networks, as they decouple Base Stations (BUs) functions from Radio Units (RUs) allowing the processing power to be pooled at cost-efficient Central Units (CUs).", "vRAN facilitates the flexible function relocation (split selection), and therefore enables splits with less stringent network requirements compared to state-of-the-art fully Centralized (C-RAN) systems.", "In this paper, we study the important and challenging vRAN design problem.", "We propose a novel modeling approach and a rigorous analytical framework, FluidRAN, that minimizes RAN costs by jointly selecting the splits and the RUs-CUs routing paths.", "We also consider the increasingly relevant scenario where the RAN needs to support multi-access edge computing (MEC) services, that naturally favor distributed RAN (D-RAN) architectures.", "Our framework provides a joint vRAN/MEC solution that minimizes operational costs while satisfying the MEC needs.", "We follow a data-driven evaluation method, using topologies of 3 operational networks.", "Our results reveal that (i) pure C-RAN is rarely a feasible upgrade solution for existing infrastructure, (ii) FluidRAN achieves significant cost savings compared to D-RAN systems, and (iii) MEC can increase substantially the operator's cost as it pushes vRAN function placement back to RUs." ]
[ 0, 0, 2, 1, 1, 1, 1, 4 ]
[ 0.833299994468689, 0.833299994468689, 0.8055999875068665, 0.41670000553131104, 0.583299994468689, 0.583299994468689, 0.41670000553131104, 1 ]
train_0590
[ "This paper presents the modeling of the light-weight BioRob robot arm with series elastic actuation for simulation and controller design.", "We describe the kinematic coupling introduced by the cable actuation and the robot arm dynamics including the elastic actuator and motor and gear model.", "We show how the inverse dynamics model derived from these equations can be used as a basis for a position tracking controller that is able to sufficiently damp the oscillations caused by the high, nonlinear joint elasticity.", "We presents results from simulation and briefly describe the implementation for a real world application." ]
[ 0, 1, 1, 4 ]
[ 0.5946000218391418, 0.5946000218391418, 0.40540000796318054, 1 ]
train_0591
[ "Motivated by machine learning problems over large data sets and distributed optimization over networks, we develop and analyze a new method called incremental Newton method for minimizing the sum of a large number of strongly convex functions.", "We show that our method is globally convergent for a variable stepsize rule.", "We further show that under a gradient growth condition, convergence rate is linear for both variable and constant stepsize rules.", "By means of an example, we show that without the gradient growth condition, incremental Newton method cannot achieve linear convergence.", "Our analysis can be extended to study other incremental methods: in particular, we obtain a linear convergence rate result for the incremental Gauss-Newton algorithm under a variable stepsize rule." ]
[ 0, 0, 4, 1, 4 ]
[ 0.44440001249313354, 0.44440001249313354, 0.22220000624656677, 0.44440001249313354, 0.666700005531311 ]
train_0592
[ "Core Insurance Service Layer (CISL) is a project to create a common but extensible service layer catalog for insurance processes.", "It follows the REST principles to define services and a datamodel which are exposed by new or existing insurance backends and that can easily be consumed by front end applications.", "The project provides a REST Meta-Model and tools to facilitate the adaption of CISL and the reuse across organizational units within Allianz." ]
[ 0, 0, 0 ]
[ 0.5752000212669373, 0.39820000529289246, 0.39820000529289246 ]
train_0593
[ "While social Virtual Reality (VR) applications such as Facebook Spaces are becoming popular, they are not compatible with classic mobile-or cloud-based solutions due to their processing of tremendous data and exchange of delay-sensitive metadata.", "Edge computing may fulfill these demands better, but it is still an open problem to deploy social VR applications in an edge infrastructure while supporting economic operations of the edge clouds and satisfactory quality-of-service for the users.", "This paper presents the first formal study of this problem.", "We model and formulate a combinatorial optimization problem that captures all intertwined goals.", "We propose ITEM, an iterative algorithm with fast and big “moves” where in each iteration, we construct a graph to encode all the costs and convert the cost optimization into a graph cut problem.", "By obtaining the minimum s-t cut via existing max-flow algorithms, we can simultaneously determine the placement of multiple service entities, and thus, the original problem can be addressed by solving a series of graph cuts.", "Our evaluations with large-scale, real-world data traces demonstrate that ITEM converges fast and outperforms baseline approaches by more than 2 × in one-shot placement and around 1.3 × in dynamic, online scenarios where users move arbitrarily in the system." ]
[ 0, 0, 2, 1, 1, 1, 4 ]
[ 0.8055999875068665, 0.8055999875068665, 0.6388999819755554, 0.5555999875068665, 0.6111000180244446, 0.6388999819755554, 0.833299994468689 ]
train_0594
[ "The multidisciplinary field of quantum computing strives to exploit some of the uncanny aspects of quantum mechanics to expand our computational horizons.", "Quantum Computing for Computer Scientists takes readers on a tour of this fascinating area of cutting-edge research.", "Written in an accessible yet rigorous fashion, this book employs ideas and techniques familiar to every student of computer science.", "The reader is not expected to have any advanced mathematics or physics background.", "After presenting the necessary prerequisites, the material is organized to look at different aspects of quantum computing from the specific standpoint of computer science.", "There are chapters on computer architecture, algorithms, programming languages, theoretical computer science, cryptography, information theory, and hardware.", "The text has step-by-step examples, more than two hundred exercises with solutions, and programming drills that bring the ideas of quantum computing alive for today’s computer science students and researchers." ]
[ 0, 0, 0, 1, 1, 1, 4 ]
[ 0.7940999865531921, 0.7407000064849854, 0.5881999731063843, 0.41179999709129333, 0.8234999775886536, 0.6176000237464905, 0.6176000237464905 ]
train_0595
[ "Automotive radars, along with other sensors such as lidar, (which stands for \"light detection and ranging\"), ultrasound, and cameras, form the backbone of self-driving cars and advanced driver assistant systems (ADASs).", "These technological advancements are enabled by extremely complex systems with a long signal processing path from radars/sensors to the controller.", "Automotive radar systems are responsible for the detection of objects and obstacles, their position, and speed relative to the vehicle.", "The development of signal processing techniques along with progress in the millimeter-wave (mm-wave) semiconductor technology plays a key role in automotive radar systems.", "Various signal processing techniques have been developed to provide better resolution and estimation performance in all measurement dimensions: range, azimuth-elevation angles, and velocity of the targets surrounding the vehicles.", "This article summarizes various aspects of automotive radar signal processing techniques, including waveform design, possible radar architectures, estimation algorithms, implementation complexity-resolution trade off, and adaptive processing for complex environments, as well as unique problems associated with automotive radars such as pedestrian detection.", "We believe that this review article will combine the several contributions scattered in the literature to serve as a primary starting point to new researchers and to give a bird's-eye view to the existing research community." ]
[ 0, 0, 0, 1, 1, 1, 2 ]
[ 0.8285999894142151, 1, 0.628600001335144, 0.771399974822998, 1, 0.428600013256073, 0.37139999866485596 ]
train_0596
[ "0 7 4 0 7 4 5 9 / 0 3 / $ 1 7 .", "0 0 © 2 0 0 3 I E E E After initial salvage attempts, the ship was largely forgotten until Anders Franzen located it in 1956.1 In 1961, 333 years after it sank, the Vasa was raised; it was so well preserved that it could float after the gun portals were sealed and water and mud were pumped from it.", "The sheltered harbor had protected the ship from storms, and the Baltic Sea’s low salinity prevented worms from infesting and destroying the wooden vessel.", "Today it is housed in the Vasa Museum (www.vasamuseet.se), near the site where it foundered.2 Figures 1 and 2 show the restored ship and a recreation of its sinking.", "Researchers have extensively analyzed the Vasa and examined historical records concerning its construction.", "It sank, of course, because it was unstable.", "The reasons it was unstable, and launched when known to be unstable, are numerous and varied.", "Although we may never know the exact details surrounding the Vasa, this article depicts our “most probable scenario” based on the extensive and remarkably well-preserved documents of the time, evidence collected during visits to the Vasa Museum, information from the referenced Web sites, and publications by those who have investigated the circumstances of the Vasa’s sinking.", "The problems encountered are as relevant to our modernday attempts to build large, complex software systems as they were to the 17th-century art and craft of building warships." ]
[ 3, 0, 0, 0, 4, 4, 4, 4, 4 ]
[ 0.8205000162124634, 0.8205000162124634, 0.7742000222206116, 0.6154000163078308, 0.41029998660087585, 0.41029998660087585, 0.41029998660087585, 0.41029998660087585, 0.8205000162124634 ]
train_0597
[ "This paper examines the literature on computer games and serious games in regard to the potential positive impacts of gaming on users aged 14 years or above, especially with respect to learning, skill enhancement and engagement.", "Search terms identified 129 papers reporting empirical evidence about the impacts and outcomes of computer games and serious games with respect to learning and engagement and a multidimensional approach to categorizing games was developed.", "The findings revealed that playing computer games is linked to a range of perceptual, cognitive, behavioural, affective and motivational impacts and outcomes.", "The most frequently occurring outcomes and impacts were knowledge acquisition/content understanding and affective and motivational outcomes.", "The range of indicators and measures used in the included papers are discussed, together with methodological limitations and recommendations for further work in this area.", "2012 Published by Elsevier Ltd." ]
[ 2, 2, 4, 4, 1, 3 ]
[ 0.39750000834465027, 0.5983999967575073, 0.5983999967575073, 0.5983999967575073, 0.4302999973297119, 0.7991999983787537 ]
train_0598
[ "Most classifiers work well when the class distribution in the response variable of the dataset is well balanced.", "Problems arise when the dataset is imbalanced.", "This paper applied four methods: Oversampling, Undersampling, Bagging and Boosting in handling imbalanced datasets.", "The cardiac surgery dataset has a binary response variable (1=Died, 0=Alive).", "The sample size is 4976 cases with 4.2% (Died) and 95.8% (Alive) cases.", "CART, C5 and CHAID were chosen as the classifiers.", "In classification problems, the accuracy rate of the predictive model is not an appropriate measure when there is imbalanced problem due to the fact that it will be biased towards the majority class.", "Thus, the performance of the classifier is measured using sensitivity and precision Oversampling and undersampling are found to work well in improving the classification for the imbalanced dataset using decision tree.", "Meanwhile, boosting and bagging did not improve the Decision Tree performance.", "KeywordsBagging, Boosting, Oversampling, Undersampling, Imbalanced data" ]
[ 0, 0, 1, 4, 4, 4, 4, 4, 4, 3 ]
[ 0.5946000218391418, 0.5946000218391418, 0.6215999722480774, 0.3783999979496002, 0.4323999881744385, 0.4323999881744385, 0.5946000218391418, 0.5946000218391418, 0.8108000159263611, 0.6485999822616577 ]
train_0599
[ "Previous studies showed the effects of psychological variables such as depression and loneliness on game addiction.", "Likewise, the effect of aggression on game addiction has also been reported.", "However, little research has empirically proved the role of aggression between the psychological variables and game addiction.", "In addition, in the context of game addiction, few studies have investigated their relationships in an integrated model using sub-factors of each construct.", "With survey data of 789 subjects, focused on the psychosocial variables (e.g., aggression, depression, and loneliness), the current study analyzed a path model to examine 1) the effects of loneliness and depression on aggression, 2) the psychosocial variables' effect on game addiction, and 3) mediation role of aggression between psychological variables (e.g., depression and loneliness) and game addiction.", "Results showed the important roles of aggression in the model.", "Aggression was significantly affected by both loneliness and depression, and in turn, aggression was the strongest determinant on game addiction among the three variables.", "Notably, aggression played a mediation role between depression and game addiction.", "Results and implications were discussed." ]
[ 0, 0, 0, 0, 4, 4, 4, 2, 4 ]
[ 0.8205000162124634, 0.8205000162124634, 0.41029998660087585, 0.41029998660087585, 0.2581000030040741, 0.41029998660087585, 0.41029998660087585, 0.3846000134944916, 0.5896999835968018 ]