abstract_id
stringlengths
10
10
sentences
list
labels
list
confs
list
train_0800
[ "Small object segmentation is a common task in medical image analysis.", "Traditional feature-based methods require human intervention while methods based on deep learning train the neural network automatically.", "However, it is still error prone when applying deep learning methods for small objects.", "In this paper, Focal FCN was proposed for small object segmentation with limited training data.", "Firstly, Fully-weighted FCN was proposed to apply an initialization for Focal FCN by adding weights to the background and foreground loss.", "Secondly, focal loss was applied to make the training focus on wrongly-classified pixels and hence achieve good performance on small object segmentation.", "Comparisons between FCN, Weighted FCN, Fully-weighted FCN and Focal FCN were tested on customized stent graft marker segmentation." ]
[ 0, 0, 1, 1, 1, 1, 4 ]
[ 0.5946000218391418, 0.5946000218391418, 0.40540000796318054, 0.40540000796318054, 0.7838000059127808, 0.5676000118255615, 0.7838000059127808 ]
train_0801
[ "Relational machine learning studies methods for the statistical analysis of relational, or graph-structured, data.", "In this paper, we provide a review of how such statistical models can be “trained” on large knowledge graphs, and then used to predict new facts about the world (which is equivalent to predicting new edges in the graph).", "In particular, we discuss two fundamentally different kinds of statistical relational models, both of which can scale to massive data sets.", "The first is based on latent feature models such as tensor factorization and multiway neural networks.", "The second is based on mining observable patterns in the graph.", "We also show how to combine these latent and observable models to get improved modeling power at decreased computational cost.", "Finally, we discuss how such statistical models of graphs can be combined with text-based information extraction methods for automatically constructing knowledge graphs from the Web.", "To this end, we also discuss Google's knowledge vault project as an example of such combination." ]
[ 0, 2, 2, 1, 1, 1, 1, 4 ]
[ 1, 0.7894999980926514, 0.39469999074935913, 1, 1, 0.7894999980926514, 0.5788999795913696, 0.6053000092506409 ]
train_0802
[ "Information technology (IT) has long been applied to support the exchange of goods, services and information between organizations.", "It is with the advent of Internet-based e-procurement systems and businessto-business (B2B) electronic markets that the real opportunities for online transactions have opened up across space and over time.", "In this paper, we draw on IS and economics theory to investigate the motivation for the various online business models, and the adoption requirements of purchasing firms, through the examination of a set of mini-cases.", "Our exploratory study finds that private aggregating and negotiating mechanisms are being adopted for large quantity business supply purchases, while public market mechanisms are more often adopted when firms face uncertain and high variance demand.", "Moreover, market facilitation, expertise sharing and collaboration are gradually attracting more attention, and call for future investigation." ]
[ 0, 0, 2, 2, 4 ]
[ 1, 0.7949000000953674, 0.7419000267982483, 0.41029998660087585, 0.3846000134944916 ]
train_0803
[ "Since the early 1990s, there has been a significant research activity in efficient parallel algorithms and novel computer architectures for problems that have been already solved sequentially (sorting, maximum flow, searching, etc).", "In this handout, we are interested in parallel algorithms and we avoid particular hardware details.", "The primary architectural model for our algorithms is a simplified machine called Parallel RAM (or PRAM).", "In essence, the PRAM model consists of a number p of processors that can read and/or write on a shared “global” memory in parallel (i.e., at the same time).", "The processors can also perform various arithmetic and logical operations in parallel." ]
[ 0, 2, 1, 0, 0 ]
[ 1, 0.7778000235557556, 0.7778000235557556, 0.44440001249313354, 0.44440001249313354 ]
train_0804
[ "Using SQL has not been considered an efficient and feasible way to implement data mining algorithms.", "Although this is true for many data mining, machine learning and statistical algorithms, this work shows it is feasible to get an efficient SQL implementation of the well-known K-means clustering algorithm that can work on top of a relational DBMS.", "The article emphasizes both correctness and performance.", "From a correctness point of view the article explains how to compute Euclidean distance, nearest-cluster queries and updating clustering results in SQL.", "From a performance point of view it is explained how to cluster large data sets defining and indexing tables to store and retrieve intermediate and final results, optimizing and avoiding joins, optimizing and simplifying clustering aggregations, and taking advantage of sufficient statistics.", "Experiments evaluate scalability with synthetic data sets varying size and dimensionality.", "The proposed K-means implementation can cluster large data sets and exhibits linear scalability." ]
[ 0, 0, 0, 2, 1, 4, 4 ]
[ 1, 0.8108000159263611, 0.6215999722480774, 0.5676000118255615, 0.40540000796318054, 0.5946000218391418, 0.6215999722480774 ]
train_0805
[ "This paper examines and optimizes parameters that affect the air cooling of a Lithium-Ion (Li-Ion) battery, used in Electric Vehicles (EVs).", "A battery pack containing 150 cylindrical type Li-Ion battery cells in a PVC casing is investigated.", "An equal number of tubes are used in the pack as a medium to cool the battery by using a fan when the vehicle is stationary or with ambient air when in motion.", "The parameters affecting the air cooling of battery are studied and optimized by considering their practical constraints.", "The objective function and Number of Transfer Unit (NTU) are developed.", "Finally, a genetic algorithm method is employed to optimize the decision variables.", "Analysing the results shows that NTU can be maximized by increasing the diameter of tubes on the battery and keeping the air velocity in a certain range." ]
[ 0, 0, 1, 1, 1, 1, 4 ]
[ 0.6111000180244446, 0.3889000117778778, 0.7778000235557556, 0.5555999875068665, 0.33329999446868896, 0.733299970626831, 0.833299994468689 ]
train_0806
[ "• Current neural network models.", "– They have drawbacks • Solution: – Deep reinforcement learning.", "CISC850 Cyber Analytics" ]
[ 0, 3, 3 ]
[ 0.7940999865531921, 0.3528999984264374, 0.7940999865531921 ]
train_0807
[ "Twitter, a 140-character microblogging social networking service, has garnered attention from researchers and practitioners due to its considerable potential for information diffusion.", "Prior studies on Twitter typically focused on how user traits or relationships in a network affect information diffusion.", "However, few studies have been conducted on how posted messages in the service influence this phenomenon.", "Thus, this paper focuses on posted messages (a.k.a.", "“tweets”) and how they affect individuals’ information sharing behaviors on Twitter.", "A model for investigating tweet sharing behavior on Twitter is proposed based on dual-process theory and on social cognitive theory.", "Results from a preliminary test show that individuals’ perceptions of the argument quality and source credibility of a received tweet play a major role in their information sharing behavior via the perceived level of usefulness of the information and self-efficacy in regard to the sharing of a received tweet.", "Additionally, the existence of external links in a tweet moderates the impact of argument quality on users’ attitudes toward received tweets." ]
[ 0, 0, 0, 4, 1, 1, 4, 4 ]
[ 0.8055999875068665, 0.6111000180244446, 0.44440001249313354, 0.3610999882221222, 0.22220000624656677, 0.6388999819755554, 0.8055999875068665, 1 ]
train_0808
[ "Embedded systems are the driving force for technological development in many domains such as automotive, healthcare, and industrial control in the emerging post-PC era.", "As more and more computational and networked devices are integrated into all aspects of our lives in a pervasive and “invisible” way, security becomes critical for the dependability of all smart or intelligent systems built upon these embedded systems.", "In this paper, we conduct a systematic review of the existing threats and vulnerabilities in embedded systems based on public available data.", "Moreover, based on the information, we derive an attack taxonomy for embedded systems.", "We envision that the findings in this paper provide a valuable insight of the threat landscape facing embedded systems.", "The knowledge can be used for a better understanding and the identification of security risks in system analysis and design." ]
[ 0, 0, 2, 1, 4, 4 ]
[ 0.771399974822998, 0.771399974822998, 0.37139999866485596, 0.542900025844574, 0.571399986743927, 0.44830000400543213 ]
train_0809
[ "Natural languages are full of collocations, recurrent combinations of words that co-occur more often than expected by chance and that correspond to arbitrary word usages.", "Recent work in lexicography indicates that collocations are pervasive in English; apparently, they are common in all types of writing, including both technical and nontechnical genres.", "Several approaches have been proposed to retrieve various types of collocations from the analysis of large samples of textual data.", "These techniques automatically produce large numbers of collocations along with statistical figures intended to reflect the relevance of the associations.", "However, noue of these techniques provides functional information along with the collocation.", "Also, the results produced often contained improper word associations reflecting some spurious aspect of the training corpus that did not stand for true collocations.", "In this paper, we describe a set of techniques based on statistical methods for retrieving and identifying collocations from large textual corpora.", "These techniques produce a wide range of collocations and are based on some original filtering methods that allow the production of richer and higher-precision output.", "These techniques have been implemented and resulted in a lexicographic tool, Xtract.", "The techniques are described and some results are presented on a 10 million-word corpus of stock market news reports." ]
[ 0, 0, 0, 0, 0, 0, 1, 1, 1, 1 ]
[ 1, 1, 0.631600022315979, 0.421099990606308, 0.421099990606308, 0.631600022315979, 0.3684000074863434, 0.5788999795913696, 1, 0.5788999795913696 ]
train_0810
[ "This paper presents a 64-bit lightweight block cipherTWINE supporting 80 and 128-bit keys.", "TWINE realizes quite small hardware implementation similar to the previous lightweight block cipher proposals, yet enables efficient software implementations on various CPUs, from micro-controllers to high-end CPUs.", "This characteristic is obtained by the use of generalized Feistel combined with an improved block shuffle, introduced at FSE 2010." ]
[ 0, 1, 1 ]
[ 0.41029998660087585, 0.3846000134944916, 0.5896999835968018 ]
train_0811
[ "A Particle Swarm Optimization Toolbox (PSOt) for use with the Matlab scientific programming environment has been developed.", "PSO is introduced briefly and then the use of the toolbox is explained with some examples.", "A link to downloadable code is provided.", "I. GENERAL INFORMATION A. Particle Swarm Optimization Toolbox (PSOt), Summary of Included Files Main files: 1) PSO – finds min/max of arbitrary MISO functions using PSO 2) trainPSO – Function to train neural nets using PSO 3) tpso1,2,3 – called by trainPSO for training 0 hidden layer, 1 hidden layer, and 2 hidden layer ANNs respectively.", "Support files: 4) wrapmat – convert vector(s) into matrix(ces) 5)", "unwrapmat – convert any 2d matrix(ces) into a row vector(s) 6) normalize – takes a 2D matrix and reformats it to any specified range 7) goplotpso – called by trainpso for graphical display during training Demo and miscellaneous files: 8) DemoTrainPSO – shows an example of using PSO to train a neural net to the XOR function 9) f6 – Schaffer’s f6 function 10) hypara – 4 dimensional hyperbolic paraboloid function 11) hypara2 – 8 dimensional hyperbolic paraboloid function The toolbox may be downloaded freely as a self extracting zipfile from: http://www4.ncsu.edu/~bkbirge/PSO/PSOt.exe" ]
[ 0, 0, 1, 4, 4, 4 ]
[ 0.8108000159263611, 0.5946000218391418, 0.7838000059127808, 0.40540000796318054, 0.40540000796318054, 0.40540000796318054 ]
train_0812
[ "In this paper, a novel approach for automatic segmentation and classification of skin lesions is proposed.", "Initially, skin images are filtered to remove unwanted hairs and noise and then the segmentation process is carried out to extract lesion areas.", "For segmentation, a region growing method is applied by automatic initialization of seed points.", "The segmentation performance is measured with different well known measures and the results are appreciable.", "Subsequently, the extracted lesion areas are represented by color and texture features.", "SVM and k-NN classifiers are used along with their fusion for the classification using the extracted features.", "The performance of the system is tested on our own dataset of 726 samples from 141 images consisting of 5 different classes of diseases.", "The results are very promising with 46.71% and 34% of F-measure using SVM and k-NN classifier respectively and with 61% of F-measure for fusion of SVM and k-NN.", "© 2015 The Authors.", "Published by Elsevier B.V. Peer-review under responsibility of scientific committee of International Conference on Advanced Computing Technologies and Applications (ICACTA-2015)." ]
[ 2, 1, 1, 1, 1, 1, 4, 4, 3, 3 ]
[ 0.5788999795913696, 0.5788999795913696, 0.7894999980926514, 0.6053000092506409, 0.6053000092506409, 0.6053000092506409, 0.6053000092506409, 1, 1, 0.7894999980926514 ]
train_0813
[ "Deep learning is at the heart of the current rise of artificial intelligence.", "In the field of computer vision, it has become the workhorse for applications ranging from self-driving cars to surveillance and security.", "Whereas, deep neural networks have demonstrated phenomenal success (often beyond human capabilities) in solving complex problems, recent studies show that they are vulnerable to adversarial attacks in the form of subtle perturbations to inputs that lead a model to predict incorrect outputs.", "For images, such perturbations are often too small to be perceptible, yet they completely fool the deep learning models.", "Adversarial attacks pose a serious threat to the success of deep learning in practice.", "This fact has recently led to a large influx of contributions in this direction.", "This paper presents the first comprehensive survey on adversarial attacks on deep learning in computer vision.", "We review the works that design adversarial attacks, analyze the existence of such attacks and propose defenses against them.", "To emphasize that adversarial attacks are possible in practical conditions, we separately review the contributions that evaluate adversarial attacks in the real-world scenarios.", "Finally, drawing on the reviewed literature, we provide a broader outlook of this research direction." ]
[ 0, 0, 0, 0, 0, 0, 2, 1, 1, 4 ]
[ 1, 1, 1, 0.6470999717712402, 0.5587999820709229, 0.5587999820709229, 0.3824000060558319, 0.44119998812675476, 0.5587999820709229, 0.8234999775886536 ]
train_0814
[ "In the last two decades, we have witnessed that Interval Type-2 Fuzzy Logic Systems (IT2-FLSs) have been successfully implemented in various engineering areas.", "In this paper, we will introduce a free open source Mat lab/Simulink toolbox for the development of IT2-FLSs for a wider accessibility to users beyond the type-2 fuzzy logic community.", "The presented IT2-FLS toolbox allows intuitive implementation of IT2-FLSs where it is capable to cover all the phases of its design.", "In order to allow users to easily construct IT2-FISs, a GUI is developed which is similar to that of Matlab® Fuzzy Logic Toolbox.", "We have embedded various Type Reduction (TR) methods in the toolbox since the TR method is the most important operation that must be taken into consideration.", "This gives the opportunity to the user to examine the performance of his/her IT2-FLS design with respect to the TR methods.", "We have also developed an IT2-FLS Simulink library so that the designer can perform various simulation analyses and can also investigate the effect of TR method on the performance of the IT2-FLS.", "Moreover, the developed IT2-FLS Mat lab/Simulink toolbox contains an automatic connection between Matlab and Simulink environments.", "Once the user has finished the design of the IT2-FLS via the GUI, it is possible to export his/her design directly to Simulink via an automatic Simulink file generation.", "We believe that the availability of the developed free and open-source IT2-FLS Mat lab/Simulink toolbox will be an important step for a wider deployment and development of IT2-FLSs." ]
[ 0, 0, 2, 0, 1, 1, 1, 1, 1, 4 ]
[ 0.6111000180244446, 0.41670000553131104, 0.3889000117778778, 0.3889000117778778, 0.6111000180244446, 0.6111000180244446, 0.6111000180244446, 0.6111000180244446, 0.41670000553131104, 0.3889000117778778 ]
train_0815
[ "This survey paper describes a focused literature survey of machine learning (ML) and data mining (DM) methods for cyber analytics in support of intrusion detection.", "Short tutorial descriptions of each ML/DM method are provided.", "Based on the number of citations or the relevance of an emerging method, papers representing each method were identified, read, and summarized.", "Because data are so important in ML/DM approaches, some well-known cyber data sets used in ML/DM are described.", "The complexity of ML/DM algorithms is addressed, discussion of challenges for using ML/DM for cyber security is presented, and some recommendations on when to use a given method are provided." ]
[ 0, 1, 1, 4, 4 ]
[ 0.5676000118255615, 0.3783999979496002, 0.3783999979496002, 0.3783999979496002, 0.21619999408721924 ]
train_0816
[ "It has long been realized that in pulse-code modulation (PCM), with a given ensemble of signals to handle, the quantum values should be spaced more closely in the voltage regions where the signal amplitude is more likely to fall.", "It has been shown by Panter and Dite that, in the limit as the number of quanta becomes infinite, the asymptotic fractional density of quanta per unit voltage should vary as the one-third power of the probability density per unit voltage of signal amplitudes.", "In this paper the corresponding result for any finite number of quanta is derived; that is, necessary conditions are found that the quanta and associated quantization intervals of an optimum finite quantization scheme must satisfy.", "The optimization criterion used is that the average quantization noise power be a minimum.", "It is shown that the result obtained here goes over into the Panter and Dite result as the number of quanta become large.", "The optimum quantization schemes for 26 quanta, b = 1,2, t ,7, are given numerically for Gaussian and for Laplacian distribution of signal amplitudes." ]
[ 0, 0, 2, 1, 4, 4 ]
[ 1, 0.628600001335144, 0.628600001335144, 0.771399974822998, 0.800000011920929, 0.428600013256073 ]
train_0817
[ "This paper focuses on a fleet management problem that arises in container trucking industry.", "From the container transportation company perspective, the present and future operating costs to minimize can be divided in three components: the routing costs, the resource (i.e., driver and truck) assignment costs and the container repositioning costs (i.e., the costs of restoring a given container fleet distribution over the serviced territory, as requested by the shippers that own the containers).", "This real-world problem has been modeled as an integer programming problem.", "The proposed solution approach is based on the decomposition of this problem in three simpler sub-problems associated to each of the costs considered above.", "Numerical experiments on randomly generated instances, as well as on a real-world data set of an Italian container trucking company, are presented.", "2004 Elsevier B.V. All rights reserved." ]
[ 0, 2, 0, 1, 1, 3 ]
[ 0.5929999947547913, 0.5968999862670898, 0.40310001373291016, 0.4341000020503998, 0.6240000128746033, 1 ]
train_0818
[ "Transmission of IPv6 packets over Low-power Wireless Personal Area Networks (6LoWPAN) was considered nearly impractical once.", "The size of IPv6 packets is much larger than the packet size of the IEEE 802.15.4 data link layer.", "6LoWPAN implements an adaptation layer between network and data link layers.", "Main purpose of the adaptation layer is to fragment and reassemble IPv6 packets.", "Implementation of the adaptation layer enhances the routing/forwarding decision of packets both network and adaptation layers.", "We can divide the routing scheme in 6LoWPAN into two categories: the mesh-under and the route-over, based on the routing decision taken on adaptation layer or network layer respectively.", "In this paper we perform an analytical comparison between these two schemes in terms of the packet/fragment arrival probability, the total number of transmissions and the total delay between source and destination.", "We also compare the selective fragment retransmission mechanism between mesh-under and route-over schemes." ]
[ 0, 0, 0, 2, 4, 4, 1, 1 ]
[ 0.5788999795913696, 0.5788999795913696, 0.3684000074863434, 0.421099990606308, 0.3684000074863434, 0.21050000190734863, 0.631600022315979, 0.631600022315979 ]
train_0819
[ "Understanding entailment and contradiction is fundamental to understanding natural language, and inference about entailment and contradiction is a valuable testing ground for the development of semantic representations.", "However, machine learning research in this area has been dramatically limited by the lack of large-scale resources.", "To address this, we introduce the Stanford Natural Language Inference corpus, a new, freely available collection of labeled sentence pairs, written by humans doing a novel grounded task based on image captioning.", "At 570K pairs, it is two orders of magnitude larger than all other resources of its type.", "This increase in scale allows lexicalized classifiers to outperform some sophisticated existing entailment models, and it allows a neural network-based model to perform competitively on natural language inference benchmarks for the first time." ]
[ 0, 0, 0, 0, 0 ]
[ 0.7838000059127808, 0.7838000059127808, 0.40540000796318054, 0.40540000796318054, 0.40540000796318054 ]
train_0820
[ "Materials that possess a negative Poisson's ratio are called Auxetics.", "They are characterized by the counterintuitive behavior of expanding in tension and contracting in compression.", "To justify this deformation behavior, there have been developed theoretical modelations like the reentrant and bowtie models.", "However, the most generalized models are based on geometries that possess rigid trusses and hinging nodes.", "This does not portrait the reality of the application of these models.", "In this study, there have been performed simulations, using kinematic analysis to characterize the auxetic behavior of the theoretical rigid/hinging models and finite element analysis to characterize elastic models that represent real bodies.", "There were determined and compared the Poisson's ratios of the theoretical and elastic reentrant and bowtie.", "Additionally it was shown that there is a significant difference between the results.", "In conclusion the theoretical models predict lower values of Poisson's ratio, while the elastic models that simulate a real body show less auxetic behavior." ]
[ 0, 0, 2, 1, 1, 4, 1, 4, 4 ]
[ 1, 0.800000011920929, 0.4000000059604645, 0.4000000059604645, 0.4000000059604645, 0.4000000059604645, 0.75, 1, 0.6000000238418579 ]
train_0821
[ "Researchers investigated the impact of podcasting on student motivation in the online environment during fall 2008 and spring 2009.", "Data were collected from students enrolled in fourteen online courses at a research university in the United States.", "One hundred and ninety-one students completed a modified version of the Instructional Materials Motivation Survey (Keller, 2006); it has four subscales: attention, relevance, confidence, and satisfaction.", "Strong positive relationships between all subscales were detected.", "Results indicate students were moderately motivated by the use of podcasts in their online courses.", "Statistically significant differences in student motivation based on gender, class standing, and prior online learning experience were found.", "Benefits of using podcasts and recommendations for improvement of the multimedia files were offered by users.", "2010 Elsevier Ltd. All rights reserved." ]
[ 0, 1, 4, 0, 4, 4, 4, 3 ]
[ 0.8378000259399414, 0.4323999881744385, 0.6215999722480774, 0.5160999894142151, 0.8378000259399414, 0.7838000059127808, 0.6215999722480774, 1 ]
train_0822
[ "Clustering nodes in a graph is a useful general technique in data mining of large network data sets.", "In this context, Newman and Girvan [9] recently proposed an objective function for graph clustering called the Q function which allows automatic selection of the number of clusters.", "Empirically, higher values of the Q function have been shown to correlate well with good graph clusterings.", "In this paper we show how optimizing the Q function can be reformulated as a spectral relaxation problem and propose two new spectral clustering algorithms that seek to maximize Q. Experimental results indicate that the new algorithms are efficient and effective at finding both good clusterings and the appropriate number of clusters across a variety of real-world graph data sets.", "In addition, the spectral algorithms are much faster for large sparse graphs, scaling roughly linearly with the number of nodes n in the graph, compared to O(n) for previous clustering algorithms using the Q function." ]
[ 0, 2, 0, 4, 4 ]
[ 0.800000011920929, 0.4000000059604645, 0.4000000059604645, 0.4000000059604645, 0.8285999894142151 ]
train_0823
[ "With the advent of new, low-cost 3D sensing hardware such as the Kinect, and continued efforts in advanced point cloud processing, 3D perception gains more and more importance in robotics, as well as other fields.", "In this paper we present one of our most recent initiatives in the areas of point cloud perception: PCL (Point Cloud Library - http://pointclouds.org).", "PCL presents an advanced and extensive approach to the subject of 3D perception, and it's meant to provide support for all the common 3D building blocks that applications need.", "The library contains state-of-the art algorithms for: filtering, feature estimation, surface reconstruction, registration, model fitting and segmentation.", "PCL is supported by an international community of robotics and perception researchers.", "We provide a brief walkthrough of PCL including its algorithmic capabilities and implementation strategies." ]
[ 0, 2, 1, 1, 4, 4 ]
[ 0.7894999980926514, 0.7894999980926514, 0.5788999795913696, 0.6053000092506409, 0.6053000092506409, 0.6053000092506409 ]
train_0824
[ "This contribution presents a novel approach for nonlinear time-optimal model predictive control (MPC) based on Timed-Elastic-Bands (TEB).", "The TEB merges the states, control inputs and time intervals into a joint trajectory representation which enables planning of time-optimal trajectories in the context of model predictive control.", "Model predictive control integrates the planning of the optimal trajectory with state feedback in the control loop.", "The TEB approach formulates the fixed horizon optimal control problem for point-to-point transitions as a nonlinear program.", "The comparative analysis of the TEB approach with state-of-the-art approaches demonstrates its computational efficiency.", "The TEB approach generates a trajectory that approximates the analytical time-optimal trajectory in few iterations.", "This efficiency enables the refinement of the planned state and control sequence within the underlying closed-loop control during runtime." ]
[ 0, 1, 1, 1, 4, 1, 4 ]
[ 0.7894999980926514, 0.6053000092506409, 1, 0.7894999980926514, 0.421099990606308, 0.5788999795913696, 0.7894999980926514 ]
train_0825
[ "We describe a number of applications of digital watermarking and the examine the common properties of robustness, tamper resistance, fidelity, computational cost and false positive rate.", "We observe that these properties vary greatly depending on the application.", "Consequently, we conclude that evaluation of a watermarking algorithm is difficult without first indicating the context in which it is to" ]
[ 0, 4, 4 ]
[ 0.41179999709129333, 0.41179999709129333, 0.3824000060558319 ]
train_0826
[ "In this paper, we explore academic data center utilization rates from an energy management perspective with the broader goal of providing decision support for green computing.", "The utilization rate is defined as the overall extent to which data center servers are being used and is usually recorded as a percentage.", "Recent literature states that utilization rates at many data centers are quite low resulting in poor usage of resources such as energy and labor.", "Based on our study we attribute these lower utilization rates to not fully taking advantage of virtualization and cloud technology.", "This paper describes our research including energy data analysis with our proposed equations for performance measurement and forecasting, corroborated by evaluation with real data in a university setting.", "We suggest that future data centers will need to increase their utilization rates and thus shift more towards the cloud in order to lower costs and increase services despite current concerns for security of cloud technology." ]
[ 2, 4, 1, 1, 4, 4 ]
[ 0.42419999837875366, 0.3077000081539154, 0.42419999837875366, 0.6061000227928162, 0.3939000070095062, 0.3939000070095062 ]
train_0827
[ "A number of probabilistic methods such as LDA, hidden Markov models, Markov random fields have arisen in recent years for probabilistic analysis of text data.", "This chapter provides an overview of a variety of probabilistic models for text mining.", "The chapter focuses more on the fundamental probabilistic techniques, and also covers their various applications to different text mining problems.", "Some examples of such applications include topic modeling, language modeling, document classification, document clustering, and information extraction." ]
[ 0, 0, 2, 0 ]
[ 0.7940999865531921, 0.41179999709129333, 0.41179999709129333, 0.6176000237464905 ]
train_0828
[ "A process model of hypertext reading was used to generate predictions about the effects of hypertext features on cognitive processing during text navigation and comprehension.", "We evaluated the predictions of the model with respect to the extant literature, focusing on studies in which versions of hypertexts were compared.", "Consistent with our predictions, the increased demands of decisionmaking and visual processing in hypertext impaired reading performance.", "Individual differences in readers, such as working memory capacity and prior knowledge, mediated the impact of hypertext features.", "For example, readers with low working memory and low prior knowledge were usually disadvantaged in hypertext.", "Some benefits were observed for learners with low prior knowledge, however, if the hypertext structure was hierarchical and consistent with that of the knowledge domain.", "We also surveyed the effectiveness of structural features designed to reduce cognitive load, including graphical overviews, restricted access to links, and visible link types.", "Complex graphical overviews did not reliably enable learning and navigation, whereas navigational support from restricted access and visible link types were helpful.", "We identified gaps in the empirical literature and suggested future studies to investigate cognitive processes in hypertext reading.", "2005 Elsevier Ltd." ]
[ 0, 1, 0, 0, 0, 4, 1, 4, 4, 3 ]
[ 0.5946000218391418, 0.766700029373169, 0.40540000796318054, 0.5946000218391418, 0.5946000218391418, 0.5946000218391418, 0.5946000218391418, 0.5946000218391418, 0.8108000159263611, 1 ]
train_0829
[ "We present the design of a novel performance-oriented serverless computing platform implemented in.", "NET, deployed in Microsoft Azure, and utilizing Windows containers as function execution environments.", "Implementation challenges such as function scaling and container discovery, lifecycle, and reuse are discussed in detail.", "We propose metrics to evaluate the execution performance of serverless platforms and conduct tests on our prototype as well as AWS Lambda, Azure Functions, Google Cloud Functions, and IBM's deployment of Apache OpenWhisk.", "Our measurements show the prototype achieving greater throughput than other platforms at most concurrency levels, and we examine the scaling and instance expiration trends in the implementations.", "Additionally, we discuss the gaps and limitations in our current design, propose possible solutions, and highlight future research." ]
[ 0, 2, 2, 1, 1, 4 ]
[ 0.631600022315979, 0.421099990606308, 0.5788999795913696, 0.631600022315979, 0.421099990606308, 0.631600022315979 ]
train_0830
[ "We have built and tested a decision tool which will help organisations properly select one business process maturity model (BPMM) over another.", "This prototype consists of a novel questionnaire with decision criteria for BPMM selection, linked to a unique data set of 69 BPMMs.", "Fourteen criteria (questions) were elicited from an international Delphi study, and weighed by the analytical hierarchy process.", "Case studies have shown (non-)profit and academic applications.", "Our purpose was to describe criteria that enable an informed BPMM choice (conform to decision-making theories, rather than ad hoc).", "Moreover, we propose a design process for building BPMM decision tools.", "2013 Elsevier B.V. All rights reserved." ]
[ 2, 1, 0, 4, 2, 1, 3 ]
[ 0.5925999879837036, 0.4074000120162964, 0.4074000120162964, 0.8148000240325928, 0.7778000235557556, 0.5925999879837036, 1 ]
train_0831
[ "From history to the present day, especially in the field of technology is provided a wide range of developments.", "The most important of these developments has achieved the realization of the industrial revolution, has led to play a leading role in the production is done by human beings.", "The effects on production of industry 4.0 emerging with this mind is very important.", "The qualified employees should be trained to make the necessary preparations for the company in this period, it is experiencing the fourth industrial revolution.", "Therefore, the impacts on higher education of industry 4.0 are examined in this paper.", "The importance in education of industry 4.0 has revealed with statistical data presented in this study." ]
[ 2, 1, 0, 0, 0, 4 ]
[ 0.41670000553131104, 0.22220000624656677, 0.3889000117778778, 0.3889000117778778, 0.41670000553131104, 0.41670000553131104 ]
train_0832
[ "In this paper, we survey the basic paradigms and notions of secure multiparty computation and discuss their relevance to the field of privacy-preserving data mining.", "In addition to reviewing definitions and constructions for secure multiparty computation, we discuss the issue of efficiency and demonstrate the difficulties involved in constructing highly efficient protocols.", "We also present common errors that are prevalent in the literature when secure multiparty computation techniques are applied to privacy-preserving data mining.", "Finally, we discuss the relationship between secure multiparty computation and privacy-preserving data mining, and show which problems it solves and which problems it does not." ]
[ 0, 1, 1, 1 ]
[ 0.800000011920929, 0.4571000039577484, 0.8285999894142151, 0.6000000238418579 ]
train_0833
[ "The Internet is evolving rapidly toward the future Internet of Things (IoT) which will potentially connect billions or even trillions of edge devices which could generate huge amount of data at a very high speed and some of the applications may require very low latency.", "The traditional cloud infrastructure will run into a series of difficulties due to centralized computation, storage, and networking in a small number of datacenters, and due to the relative long distance between the edge devices and the remote datacenters.", "To tackle this challenge, edge cloud and edge computing seem to be a promising possibility which provides resources closer to the resource-poor edge IoT devices and potentially can nurture a new IoT innovation ecosystem.", "Such prospect is enabled by a series of emerging technologies, including network function virtualization and software defined networking.", "In this survey paper, we investigate the key rationale, the state-of-the-art efforts, the key enabling technologies and research topics, and typical IoT applications benefiting from edge cloud.", "We aim to draw an overall picture of both ongoing research efforts and future possible research directions through comprehensive discussions." ]
[ 0, 0, 0, 0, 2, 2 ]
[ 0.5676000118255615, 0.5676000118255615, 0.5676000118255615, 0.5676000118255615, 0.40540000796318054, 0.40540000796318054 ]
train_0834
[ "Genetic Algorithm is a search heuristic that mimics the process of evaluation.", "Genetic Algorithms can be applied to process controllers for their optimization using natural operators.", "This paper discusses the concept and design procedure of Genetic Algorithm as an optimization tool.", "Further, this paper explores the well established methodologies of the literature to realize the workability and applicability of genetic algorithms for process control applications.", "Genetic Algorithms are applied to direct torque control of induction motor drive, speed control of gas turbine, speed control of DC servo motor for the optimization of control parameters in this work.", "The simulations were carried out in simulink package of MATLAB.", "The simulation results show better optimization of hybrid genetic algorithm controllers than fuzzy standalone and conventional controllers." ]
[ 0, 0, 2, 1, 1, 1, 4 ]
[ 1, 0.6053000092506409, 0.6053000092506409, 0.5788999795913696, 0.421099990606308, 0.421099990606308, 1 ]
train_0835
[ "Insufficient sleep is a known trigger of anxiety.", "Nevertheless, not everyone experiences these effects to the same extent.", "One determining factor is sex, wherein women experience a greater anxiogenic impact in response to sleep loss than men.", "However, the underlying brain mechanism(s) governing this sleep-loss-induced anxiety increase, including the markedly different reaction in women and men, is unclear.", "Here, we tested the hypothesis that structural brain morphology in a discrete network of emotion-relevant regions represents one such explanatory factor.", "Healthy participants were assessed across sleep-rested and sleep-deprived conditions, with brain structure quantified using gray matter volume measures.", "Sleep loss triggered greater levels of anxiety in women compared with men.", "Reduced gray matter volume in the anterior insula and lateral orbitofrontal cortex predicted the anxiogenic impact of sleep loss in women, yet predicted resilience in men, and did so with high discrimination accuracy.", "In contrast, gray matter volume in ventromedial prefrontal cortex predicted the anxiogenic impact of sleep loss in both men and women.", "Structural human brain morphology therefore appears to represent one mechanistic pathway (and possible biomarker) determining anxiety vulnerability to sleep loss—a discovery that may help explain the higher prevalence of sleep disruption and anxiety in women." ]
[ 0, 0, 0, 0, 1, 2, 4, 4, 4, 4 ]
[ 1, 0.6111000180244446, 0.6111000180244446, 0.7585999965667725, 0.583299994468689, 0.2759000062942505, 0.583299994468689, 0.3889000117778778, 0.8055999875068665, 1 ]
train_0836
[ "In this paper we introduce a low-latency monaural source separation framework using a Convolutional Neural Network (CNN).", "We use a CNN to estimate time-frequency soft masks which are applied for source separation.", "We evaluate the performance of the neural network on a database comprising of musical mixtures of three instruments: voice, drums, bass as well as other instruments which vary from song to song.", "The proposed architecture is compared to a Multilayer Perceptron (MLP), achieving on-par results and a significant improvement in processing time.", "The algorithm was submitted to source separation evaluation campaigns to test efficiency, and achieved competitive results." ]
[ 2, 1, 4, 4, 4 ]
[ 0.6154000163078308, 1, 0.5896999835968018, 0.6154000163078308, 0.8205000162124634 ]
train_0837
[ "Recent advances in clothes recognition have been driven by the construction of clothes datasets.", "Existing datasets are limited in the amount of annotations and are difficult to cope with the various challenges in real-world applications.", "In this work, we introduce DeepFashion1, a large-scale clothes dataset with comprehensive annotations.", "It contains over 800,000 images, which are richly annotated with massive attributes, clothing landmarks, and correspondence of images taken under different scenarios including store, street snapshot, and consumer.", "Such rich annotations enable the development of powerful algorithms in clothes recognition and facilitating future researches.", "To demonstrate the advantages of DeepFashion, we propose a new deep model, namely FashionNet, which learns clothing features by jointly predicting clothing attributes and landmarks.", "The estimated landmarks are then employed to pool or gate the learned features.", "It is optimized in an iterative manner.", "Extensive experiments demonstrate the effectiveness of FashionNet and the usefulness of DeepFashion." ]
[ 0, 0, 4, 1, 4, 4, 1, 4, 1 ]
[ 0.5881999731063843, 0.41179999709129333, 0.3824000060558319, 0.6176000237464905, 0.3824000060558319, 0.44119998812675476, 0.3824000060558319, 0.5881999731063843, 0.44119998812675476 ]
train_0838
[ "This paper investigates two fundamental problems in computer vision: contour detection and image segmentation.", "We present state-of-the-art algorithms for both of these tasks.", "Our contour detector combines multiple local cues into a globalization framework based on spectral clustering.", "Our segmentation algorithm consists of generic machinery for transforming the output of any contour detector into a hierarchical region tree.", "In this manner, we reduce the problem of image segmentation to that of contour detection.", "Extensive experimental evaluation demonstrates that both our contour detection and segmentation methods significantly outperform competing algorithms.", "The automatically generated hierarchical segmentations can be interactively refined by user-specified annotations.", "Computation at multiple image resolutions provides a means of coupling our system to recognition applications." ]
[ 2, 1, 1, 1, 1, 1, 1, 3 ]
[ 0.7838000059127808, 0.5946000218391418, 0.5946000218391418, 1, 0.7838000059127808, 0.40540000796318054, 0.40540000796318054, 0.4323999881744385 ]
train_0839
[ "Despite their different perspectives, artificial intelligence (AI) and the disciplines of decision science have common roots and strive for similar goals.", "This paper surveys the potential for addressing problems in representation, inference, knowledge engineering, and explanation within the decision-theoretic framework.", "Recent analyses of the restrictions of several traditional A I reasoning techniques, coupled with the development of more tractable and expressive decision-theoretic representation and inference strategies, have stimulated renewed interest in decision theory and decision analysis.", "We describe early experience with simple probabilistic schemes for automated reasoning, review the dominant expert-system paradigm, and survey some recent research at the crossroads of A I and decision science.", "In particular, we present the belief network and influence diagram representations.", "Finally, we discuss issues that have not been studied in detail within the expert-systems setting, yet are crucial for developing theoretical methods and computational architectures for automated reasoners.", "K E Y W O R D S : artificial intelligence, belief networks, decision analysis, decision theory, explanation, influence diagrams, knowledge engineering, operations research, probability, uncertainty" ]
[ 2, 1, 1, 1, 1, 4, 4 ]
[ 0.5676000118255615, 0.6485999822616577, 0.6215999722480774, 0.4323999881744385, 0.6485999822616577, 0.40540000796318054, 0.4323999881744385 ]
train_0840
[ "Neural Networks are formally hard to train.", "How can we circumvent hardness results?", "• Over specified networks: While over specification seems to speedup training , formally hardness results are valid in the improper model.", "• Changing the activation function: While changing the activation function from sigmoid to ReLu has lead to faster convergence of SGD methods, formally these networks are still hard." ]
[ 0, 1, 1, 1 ]
[ 0.7838000059127808, 0.4323999881744385, 0.6485999822616577, 0.6485999822616577 ]
train_0841
[ "The most exciting development in parallel computer architecture is the convergence of traditionally disparate approaches on a common machine structure.", "This book explains the forces behind this convergence of shared-memory, message-passing, data parallel, and data-driven computing architectures.", "It then examines the design issues that are critical to all parallel architecture across the full range of modern design, covering data access, communication performance, coordination of cooperative work, and correct implementation of useful semantics.", "It not only describes the hardware and software techniques for addressing each of these issues but also explores how these techniques interact in the same system.", "Examining architecture from an application-driven perspective, it provides comprehensive discussions of parallel programming for high performance and of workload-driven evaluation, based on understanding hardware-software interactions." ]
[ 0, 2, 2, 1, 4 ]
[ 1, 0.6000000238418579, 0.628600001335144, 0.428600013256073, 0.800000011920929 ]
train_0842
[ "Fall detection is a major challenge in the public health care domain, especially for the elderly, and reliable surveillance is a necessity to mitigate the effects of falls.", "The technology and products related to fall detection have always been in high demand within the security and the health-care industries.", "An effective fall detection system is required to provide urgent support and to significantly reduce the medical care costs associated with falls.", "In this paper, we give a comprehensive survey of different systems for fall detection and their underlying algorithms.", "Fall detection approaches are divided into three main categories: wearable device based, ambience device based and vision based.", "These approaches are summarised and compared with each other and a conclusion is derived with some discussions on possible future work.", "& 2012 Elsevier B.V. All rights reserved." ]
[ 0, 0, 0, 2, 1, 2, 3 ]
[ 0.7894999980926514, 0.7894999980926514, 0.6053000092506409, 0.39469999074935913, 0.6053000092506409, 0.6053000092506409, 0.7894999980926514 ]
train_0843
[ "Artificial neural networks (ANNs) are very popular as classification or regression mechanisms in medical decision support systems despite the fact that they are unstable predictors.", "This instability means that small changes in the training data used to build the model (i.e. train the ANN) may result in very different models.", "A central implication of this is that different sets of training data may produce models with very different generalisation accuracies.", "In this paper, we show in detail how this can happen in a prediction system for use in in-vitro fertilisation.", "We argue that claims for the generalisation performance of ANNs used in such a scenario should only be based on k-fold cross-validation tests.", "We also show how the accuracy of such a predictor can be improved by aggregating the output of several predictors." ]
[ 0, 0, 2, 2, 4, 4 ]
[ 1, 0.800000011920929, 0.6000000238418579, 0.4000000059604645, 0.4000000059604645, 0.6000000238418579 ]
train_0844
[ "Deep Convolutional Neural Networks (DCNNs) have recently shown state of the art performance in high level vision tasks, such as image classification and object detection.", "This work brings together methods from DCNNs and probabilistic graphical models for addressing the task of pixel-level classification (also called ”semantic image segmentation”).", "We show that responses at the final layer of DCNNs are not sufficiently localized for accurate object segmentation.", "This is due to the very invariance properties that make DCNNs good for high level tasks.", "We overcome this poor localization property of deep networks by combining the responses at the final DCNN layer with a fully connected Conditional Random Field (CRF).", "Qualitatively, our “DeepLab” system is able to localize segment boundaries at a level of accuracy which is beyond previous methods.", "Quantitatively, our method sets the new state-of-art at the PASCAL VOC-2012 semantic image segmentation task, reaching 71.6% IOU accuracy in the test set.", "We show how these results can be obtained efficiently: Careful network re-purposing and a novel application of the ’hole’ algorithm from the wavelet community allow dense computation of neural net responses at 8 frames per second on a modern GPU." ]
[ 0, 2, 2, 2, 1, 1, 1, 4 ]
[ 1, 0.6154000163078308, 0.41029998660087585, 0.5, 0.5160999894142151, 0.41029998660087585, 0.5896999835968018, 1 ]
train_0845
[ "Baseline wandering can mask some important features of the Electrocardiogram (ECG) signal hence it is desirable to remove this noise for proper analysis and display of the ECG signal.", "This paper presents the implementation and evaluation of different methods to remove this noise.", "The parameters i. e. Power Spectral density (PSD), average Power & Signal to noise ratio (SNR) are calculated of signals to compare the performance of different filtering methods.", "IIR zero phase filtering has been proved efficient method for the removal of Baseline wander from ECG signal.", "The results have been concluded using Matlab software and MIT-BIH arrhythmia database." ]
[ 0, 0, 1, 1, 4 ]
[ 0.7821000218391418, 0.4357999861240387, 0.40860000252723694, 0.8443999886512756, 0.40860000252723694 ]
train_0846
[ "This paper re-examines the concept of ‘‘meme’’ in the context of digital culture.", "Defined as cultural units that spread from person to person, memes were debated long before the digital era.", "Yet the Internet turned the spread of memes into a highly visible practice, and the term has become an integral part of the netizen vernacular.", "After evaluating the promises and pitfalls of memes for understanding digital culture, I address the problem of defining memes by charting a communication-oriented typology of 3 memetic dimensions: content, form, and stance.", "To illustrate the utility of the typology, I apply it to analyze the video meme ‘‘Leave Britney Alone.", "’’", "Finally, I chart possible paths for further meme-oriented analysis of digital content." ]
[ 2, 0, 0, 1, 4, 3, 4 ]
[ 0.8108000159263611, 0.5946000218391418, 0.5946000218391418, 0.5946000218391418, 0.40540000796318054, 1, 0.5676000118255615 ]
train_0847
[ "In traditional customer service support of a manufacturing environment, a customer service database usually stores two types of service information: (1) unstructured customer service reports record machine problems and its remedial actions and (2) structured data on sales, employees, and customers for day-to-day management operations.", "This paper investigates how to apply data mining techniques to extract knowledge from the database to support two kinds of customer service activities: decision support and machine fault diagnosis.", "A data mining process, based on the data mining tool DBMiner, was investigated to provide structured management data for decision support.", "In addition, a data mining technique that integrates neural network, case-based reasoning, and rule-based reasoning is proposed; it would search the unstructured customer service records for machine fault diagnosis.", "The proposed technique has been implemented to support intelligent fault diagnosis over the World Wide Web.", "# 2000 Elsevier Science B.V. All rights reserved." ]
[ 0, 2, 1, 1, 1, 3 ]
[ 0.7894999980926514, 0.5788999795913696, 0.7894999980926514, 1, 0.7894999980926514, 0.7894999980926514 ]
train_0848
[ "We consider the problem of face swapping in images, where an input identity is transformed into a target identity while preserving pose, facial expression and lighting.", "To perform this mapping, we use convolutional neural networks trained to capture the appearance of the target identity from an unstructured collection of his/her photographs.", "This approach is enabled by framing the face swapping problem in terms of style transfer, where the goal is to render an image in the style of another one.", "Building on recent advances in this area, we devise a new loss function that enables the network to produce highly photorealistic results.", "By combining neural networks with simple pre- and post-processing steps, we aim at making face swap work in real-time with no input from the user." ]
[ 0, 1, 1, 4, 2 ]
[ 0.8285999894142151, 0.628600001335144, 0.4000000059604645, 0.4000000059604645, 0.4000000059604645 ]
train_0849
[ "Clustering is a division of data into groups of similar objects.", "Representing the data by fewer clusters necessarily loses certain fine details, but achieves simplification.", "It models data by its clusters.", "Data modeling puts clustering in a historical perspective rooted in mathematics, statistics, and numerical analysis.", "From a machine learning perspective clusters correspond to hidden patterns, the search for clusters is unsupervised learning, and the resulting system represents a data concept.", "From a practical perspective clustering plays an outstanding role in data mining applications such as scientific data exploration, information retrieval and text mining, spatial database applications, Web analysis, CRM, marketing, medical diagnostics, computational biology, and many others." ]
[ 0, 0, 4, 1, 4, 4 ]
[ 0.421099990606308, 0.421099990606308, 0.3684000074863434, 0.6053000092506409, 0.421099990606308, 0.631600022315979 ]
train_0850
[ "Tic-Tac-Toe game can be played by two players where the square block (3 x 3) can be filled with a cross (X) or a circle (O).", "The game will toggle between the players by giving the chance for each player to mark their move.", "When one of the players make a combination of 3 same markers in a horizontal, vertical or diagonal line the program will display which player has won, whether X or O. In this paper, we implement a 3x3 tic-tac-toe game in LabVIEW.", "The game is designed so that two players can play tic-tac-toe using LabVIEW software.", "The program will contain a display function and a select function to place the symbol as well as toggle between the symbols allowing each player a turn to play the game.", "The program will update after each player makes their move and check for the conditions of game as it goes on.", "Overall program works without any bugs and is able to use" ]
[ 0, 0, 0, 2, 1, 1, 4 ]
[ 1, 1, 0.7940999865531921, 0.5587999820709229, 0.8234999775886536, 0.6176000237464905, 0.6176000237464905 ]
train_0851
[ "Neuromorphic computing has come to refer to a variety of brain-inspired computers, devices, and models that contrast the pervasive von Neumann computer architecture.", "This biologically inspired approach has created highly connected synthetic neurons and synapses that can be used to model neuroscience theories as well as solve challenging machine learning problems.", "The promise of the technology is to create a brainlike ability to learn and adapt, but the technical challenges are significant, starting with an accurate neuroscience model of how the brain works, to finding materials and engineering breakthroughs to build devices to support these models, to creating a programming framework so the systems can learn, to creating applications with brain-like capabilities.", "In this work, we provide a comprehensive survey of the research and motivations for neuromorphic computing over its history.", "We begin with a 35-year review of the motivations and drivers of neuromorphic computing, then look at the major research areas of the field, which we define as neuro-inspired models, algorithms and learning approaches, hardware and devices, supporting systems, and finally applications.", "We conclude with a broad discussion on the major research topics that need to be addressed in the coming years to see the promise of neuromorphic computing fulfilled.", "The goals of this work are to provide an exhaustive review of the research conducted in neuromorphic computing since the inception of the term, and to motivate further work by illuminating gaps in the field where new research is needed." ]
[ 0, 0, 2, 1, 1, 4, 2 ]
[ 1, 0.8285999894142151, 0.4000000059604645, 0.428600013256073, 0.6000000238418579, 0.22859999537467957, 0.6000000238418579 ]
train_0852
[ "Technology adoption models specify a pathway of technology acceptance from external variables to beliefs, intentions, adoption and actual usage.", "Mobile phone adoption has been studied from a variety of perspectives, including sociology, computer-supported cooperative work and human-computer interaction.", "What is lacking is a model integrating all these factors influencing mobile phone adoption.", "This paper investigates technology adoption models as a strategy to match mobile phone design to user's technological needs and expectations.", "Based on the literature study we integrate three existing technology adoption models and then evaluate the proposed model with interviews and a survey.", "The contribution of this paper is a model for representing the factors that influence mobile phone adoption." ]
[ 0, 0, 2, 2, 1, 4 ]
[ 0.8205000162124634, 0.8205000162124634, 0.41029998660087585, 0.41029998660087585, 0.8205000162124634, 0.7949000000953674 ]
train_0853
[ "Web single sign-on (SSO) systems enable users to authenticate themselves to multiple online services with one authentication credential and mechanism offered by an identity provider.", "The topic is widely studied and many solutions exist.", "However, logging out of a service using SSO has received less attention.", "While previous studies note that users want single logout when using SSO, most of the existing services do not offer it, and the identity providers do not even keep track of the open sessions.", "This article describes challenges related to logout in federated identity management and analyzes unexpected behavior in logout situations.", "The examples are from the Shibboleth SSO system.", "Based on the analysis, we give guidelines for implementing reliable logout and describe a polling-based solution for creating a system-wide logout mechanisms that only requires minor changes to the existing code and does not burden the identity provider excessively.", "In addition to the system-wide logout, our solution gives users the option to log out of only one service.", "A usability test was conducted to evaluate the solution.", "The results show that the users liked the ability to choose between the two logout options, but they did not understand the words used to describe them." ]
[ 0, 0, 0, 0, 0, 1, 2, 4, 4, 4 ]
[ 0.8140000104904175, 0.8140000104904175, 0.8140000104904175, 0.5968999862670898, 0.40700000524520874, 0.40310001373291016, 0.3797999918460846, 0.40700000524520874, 0.5929999947547913, 0.8140000104904175 ]
train_0854
[ "To describe the log-likelihood computation in our model, let us consider a two scale pyramid for the moment.", "Given a (vectorized) j × j image I , denote by l = d(I) the coarsened image, and h = I − u(d(I)) to be the high pass.", "In this section, to simplify the computations, we use a slightly different u operator than the one used to generate the images displayed in Figure 3 of the paper.", "Namely, here we take d(I) to be the mean over each disjoint block of 2× 2 pixels, and take u to be the operator that removes the mean from each 2× 2 block.", "Since u has rank 3d/4, in this section, we write h in an orthonormal basis of the range of u, then the (linear) mapping from I to (l, h) is unitary.", "We now build a probability density p on Rd2 by p(I) = q0(l, h)q1(l) = q0(d(I), h(I))q1(d(I)); in a moment we will carefully define the functions qi.", "For now, suppose that qi ≥ 0, ∫ q1(l) dl = 1, and for each fixed l, ∫ q0(l, h) dh = 1.", "Then we can check that p has unit integral: ∫" ]
[ 2, 1, 1, 1, 1, 1, 1, 4 ]
[ 0.4138000011444092, 0.5861999988555908, 0.5861999988555908, 0.7930999994277954, 0.7930999994277954, 0.7930999994277954, 0.5217000246047974, 0.7930999994277954 ]
train_0855
[ "Human activities are inherently translation invariant and hierarchical.", "Human activity recognition (HAR), a field that has garnered a lot of attention in recent years due to its high demand in various application domains, makes use of time-series sensor data to infer activities.", "In this paper, a deep convolutional neural network (convnet) is proposed to perform efficient and effective HAR using smartphone sensors by exploiting the inherent characteristics of activities and 1D time-series signals, at the same time providing a way to automatically and data-adaptively extract robust features from raw data.", "Experiments show that convnets indeed derive relevant and more complex features with every additional layer, although difference of feature complexity level decreases with every additional layer.", "A wider time span of temporal local correlation can be exploited (1x9~1x14) and a low pooling size (1x2~1x3) is shown to be beneficial.", "Convnets also achieved an almost perfect classification on moving activities, especially very similar ones which were previously perceived to be very difficult to classify.", "Lastly, convnets outperform other state-of-the-art data mining techniques in HAR for the benchmark dataset collected from 30 volunteer subjects, achieving an overall performance of 94.79% on the test set with raw sensor data, and 95.75% with additional information of temporal fast Fourier transform of the HAR data set." ]
[ 0, 0, 2, 4, 1, 4, 4 ]
[ 1, 1, 1, 0.628600001335144, 1, 0.428600013256073, 0.800000011920929 ]
train_0856
[ "Recent advances in deep domain adaptation reveal that adversarial learning can be embedded into deep networks to learn transferable features that reduce distribution discrepancy between the source and target domains.", "Existing domain adversarial adaptation methods based on single domain discriminator only align the source and target data distributions without exploiting the complex multimode structures.", "In this paper, we present a multi-adversarial domain adaptation (MADA) approach, which captures multimode structures to enable fine-grained alignment of different data distributions based on multiple domain discriminators.", "The adaptation can be achieved by stochastic gradient descent with the gradients computed by back-propagation in linear-time.", "Empirical evidence demonstrates that the proposed model outperforms state of the art methods on standard domain adaptation datasets." ]
[ 0, 0, 1, 1, 4 ]
[ 0.7949000000953674, 0.5896999835968018, 0.6154000163078308, 0.5896999835968018, 0.6154000163078308 ]
train_0857
[ "Fake websites have become increasingly pervasive, generating billions of dollars in fraudulent revenue at the expense of unsuspecting Internet users.", "The design and appearance of these 5 websites makes it difficult for users to manually identify them as fake.", "Automated detection systems have emerged as a mechanism for combating fake websites, however most are fairly simplistic in terms of their fraud cues and detection methods employed.", "Consequently, existing systems are susceptible to the myriad of obfuscation tactics used by fraudsters, resulting in highly ineffective fake website detection performance.", "In light of these deficiencies, we propose 10 the development of a new class of fake website detection systems that are based on statistical learning theory (SLT).", "Using a design science approach, a prototype system was developed to demonstrate the potential utility of this class of systems.", "We conducted a series of experiments, comparing the proposed system against several existing fake website detection systems on a test bed encompassing 900 websites.", "The results indicate that systems grounded in SLT can more 15 accurately detect various categories of fake websites by utilizing richer sets of fraud cues in combination with problem-specific knowledge.", "Given the hefty cost exacted by fake websites, the results have important implications for e-commerce and online security." ]
[ 0, 0, 2, 0, 1, 1, 1, 4, 4 ]
[ 1, 0.8158000111579895, 0.39469999074935913, 0.39469999074935913, 0.21050000190734863, 0.6053000092506409, 0.6053000092506409, 1, 1 ]
train_0858
[ "In this paper, we implement a reticle seeker missile simulator on MATLAB-SIMULINK to analyze the jamming effect of the spin-scan and conscan reticle seeker.", "The DIRCM (Directed Infrared Countermeasures) system uses the pulsing flashes of infrared (IR) energy and its frequency and intensity have influence on the missile guidance system.", "Our simulation results show that jamming effect is indicated significantly when jammer frequency and reticle frequency are similar and present a 3D trajectory of missile motions by jamming." ]
[ 4, 1, 4 ]
[ 0.40540000796318054, 0.5946000218391418, 1 ]
train_0859
[ "Convolutional Neural Networks (CNNs) have been recently employed to solve problems from both the computer vision and medical image analysis fields.", "Despite their popularity, most approaches are only able to process 2D images while most medical data used in clinical practice consists of 3D volumes.", "In this work we propose an approach to 3D image segmentation based on a volumetric, fully convolutional, neural network.", "Our CNN is trained end-to-end on MRI volumes depicting prostate, and learns to predict segmentation for the whole volume at once.", "We introduce a novel objective function, that we optimise during training, based on Dice coefficient.", "In this way we can deal with situations where there is a strong imbalance between the number of foreground and background voxels.", "To cope with the limited number of annotated volumes available for training, we augment the data applying random non-linear transformations and histogram matching.", "We show in our experimental evaluation that our approach achieves good performances on challenging test data while requiring only a fraction of the processing time needed by other previous methods." ]
[ 1, 0, 1, 1, 1, 1, 1, 4 ]
[ 0.428600013256073, 0.6000000238418579, 0.428600013256073, 0.428600013256073, 0.800000011920929, 0.22859999537467957, 0.6571000218391418, 0.8571000099182129 ]
train_0860
[ "Let B(N) denote the set of all binary trees that have N nodes.", "A procedure for randomly generating the trees in B(N) such that each tree is equally likely to occur, that is an unbiased random generator, is given which runs in O(N) time, requires very little storage, and uses a system of arithmetic no larger than is required to represent the number U itself.", "Previous unbiased random binary tree generators, based on inverse rank functions, ran in O(N log N) time and required multiple precision arithmetic capable of handling numbers of the order of magnitude of the cardinality of B(N)." ]
[ 0, 1, 1 ]
[ 1, 0.41670000553131104, 0.583299994468689 ]
train_0861
[ "Although not commonly used, correlation filters can track complex objects through rotations, occlusions and other distractions at over 20 times the rate of current state-of-the-art techniques.", "The oldest and simplest correlation filters use simple templates and generally fail when applied to tracking.", "More modern approaches such as ASEF and UMACE perform better, but their training needs are poorly suited to tracking.", "Visual tracking requires robust filters to be trained from a single frame and dynamically adapted as the appearance of the target object changes.", "This paper presents a new type of correlation filter, a Minimum Output Sum of Squared Error (MOSSE) filter, which produces stable correlation filters when initialized using a single frame.", "A tracker based upon MOSSE filters is robust to variations in lighting, scale, pose, and nonrigid deformations while operating at 669 frames per second.", "Occlusion is detected based upon the peak-to-sidelobe ratio, which enables the tracker to pause and resume where it left off when the object reappears." ]
[ 0, 0, 4, 1, 1, 1, 4 ]
[ 0.8158000111579895, 0.6053000092506409, 0.21050000190734863, 0.6053000092506409, 0.7894999980926514, 0.39469999074935913, 0.7894999980926514 ]
train_0862
[ "Information communication technologies (ICTs) have significantly revolutionized travel industry in the last decade.", "With an increasing number of travel companies participating in the Internet market, low price has become a minimum qualification to compete in the Internet market.", "As a result, e-service quality is becoming even more critical for companies to retain and attract customers in the digital age.", "This study focuses on e-service quality dimensions in the Internet market with an empirical study on online travel service.", "The purpose of this study is to develop a scale to evaluate e-service quality from the perspectives of both online companies and customers, which provides fresh insight into the dimensions of e-service quality.", "The results in this study indicate that trust from the perspective of customer and ease of use from the perspective of online company are the most critical and important facets in customers’ perception of online travel service quality, while reliability, system availability and responsiveness have influence on customer’s perception of online travel service quality as well, but the influence is not so strong as that of trust and ease of use.", "Online travel service companies should pay attention to the facets of reliability, system availability and responsiveness while focusing on the facets of ease of use and trust in order to improve their online travel service quality to customers." ]
[ 0, 0, 0, 2, 2, 1, 4 ]
[ 0.800000011920929, 0.800000011920929, 0.6000000238418579, 0.6000000238418579, 0.6000000238418579, 0.571399986743927, 0.8285999894142151 ]
train_0863
[ "This article revisits the concept of autopoiesis and examines its relation to cognition and life.", "We present a mathematical model of a 3D tesselation automaton, considered as a minimal example of autopoiesis.", "This leads us to a thesis T1: An autopoietic system can be described as a random dynamical system, which is defined only within its organized autopoietic domain.", "We propose a modified definition of autopoiesis: An autopoietic system is a network of processes that produces the components that reproduce the network, and that also regulates the boundary conditions necessary for its ongoing existence as a network.", "We also propose a definition of cognition: A system is cognitive if and only if sensory inputs serve to trigger actions in a specific way, so as to satisfy a viability constraint.", "It follows from these definitions that the concepts of autopoiesis and cognition, although deeply related in their connection with the regulation of the boundary conditions of the system, are not immediately identical: a system can be autopoietic without being cognitive, and cognitive without being autopoietic.", "Finally, we propose a thesis T2: A system that is both autopoietic and cognitive is a living system." ]
[ 0, 0, 0, 0, 1, 0, 2 ]
[ 0.5922999978065491, 0.387800008058548, 0.41339999437332153, 0.41339999437332153, 0.5922999978065491, 0.41339999437332153, 0.20880000293254852 ]
train_0864
[ "In today's society, social media have become an almost indispensable part of daily life, particularly among university students, who are generally heavy social media users.", "Social media multitasking has also been increasingly prevalent.", "Little, however, is known about how social media usage and social media multitasking influence the academic performance of university students.", "This study examined whether and how these two behaviors predict academic performance among university students.", "From a sample of 348 undergraduate students at a comprehensive university in Hong Kong, this study found that using social media for academic purposes was not a significant predictor of academic performance as measured by cumulative grade point average, whereas using social media for nonacademic purposes (video gaming in particular) and social media multitasking significantly negatively predicted academic performance.", "© 2016 Elsevier Ltd.", "All rights reserved." ]
[ 0, 0, 0, 2, 4, 3, 3 ]
[ 0.7949000000953674, 0.7949000000953674, 0.5896999835968018, 0.3846000134944916, 0.7419000267982483, 0.7949000000953674, 0.7949000000953674 ]
train_0865
[ "A new architecture for controlling mobile robots is described.", "Layers of control system are built to let the robot operate at increasing levels of competence.", "Layers are made up of asynchronous modules that communicate over low-bandwidth channels.", "Each module is an instance of a fairly simple computational machine.", "Higher-level layers can subsume the roles of lower levels by suppressing their outputs.", "However, lower levels continue to function as higher levels are added.", "The result is a robust and flexible robot control system.", "The system has been used to control a mobile robot wandering around unconstrained laboratory areas and computer machine rooms.", "Eventually it is intended to control a robot that wanders the office areas of our laboratory, building maps of its surroundings using an onboard arm to perform simple tasks." ]
[ 0, 0, 0, 0, 1, 1, 4, 1, 1 ]
[ 0.6053000092506409, 0.6053000092506409, 0.7894999980926514, 0.6053000092506409, 0.39469999074935913, 0.39469999074935913, 0.7894999980926514, 1, 0.6053000092506409 ]
train_0866
[ "The time taken performing fitness calculations can dominate the total computational time when applying Particle Swarm Optimisation (PSO) to complex real life problems.", "This paper describes a method of estimating fitness, and the reliability of that estimation, that can be used as an alternative to performing some true fitness calculations.", "The fitness estimation is always made, but, should the reliability of this fitness estimation drop below a user specified threshold, the estimate is discarded and a true fitness evaluation performed.", "Results are presented for three problems that show that the number of true fitness evaluations can be significantly reduced by this method without degrading the performance of PSO.", "Further the value used for the threshold, the only new parameter introduced, is shown not to be sensitive, at least on these test problems.", "Provided that the time to perform a true fitness evaluation is far longer than the time for the fitness and reliability calculations, a substantial amount of computing time can be saved while still achieving the same end result." ]
[ 0, 1, 0, 4, 4, 4 ]
[ 1, 0.550000011920929, 0.41999998688697815, 1, 0.7073000073432922, 0.7900000214576721 ]
train_0867
[ "Effective training of neural networks requires much data.", "In the low-data regime, parameters are underdetermined, and learnt networks generalise poorly.", "Data Augmentation (Krizhevsky et al., 2012) alleviates this by using existing data more effectively.", "However standard data augmentation produces only limited plausible alternative data.", "Given there is potential to generate a much broader set of augmentations, we design and train a generative model to do data augmentation.", "The model, based on image conditional Generative Adversarial Networks, takes data from a source domain and learns to take any data item and generalise it to generate other within-class data items.", "As this generative process does not depend on the classes themselves, it can be applied to novel unseen classes of data.", "We show that a Data Augmentation Generative Adversarial Network (DAGAN) augments standard vanilla classifiers well.", "We also show a DAGAN can enhance few-shot learning systems such as Matching Networks.", "We demonstrate these approaches on Omniglot, on EMNIST having learnt the DAGAN on Omniglot, and VGG-Face data." ]
[ 0, 0, 0, 0, 1, 1, 1, 4, 4, 4 ]
[ 1, 1, 0.7778000235557556, 0.7778000235557556, 0.833299994468689, 0.6111000180244446, 0.5555999875068665, 0.6111000180244446, 0.6111000180244446, 0.6111000180244446 ]
train_0868
[ "We introduce a new model, the Recurrent Entity Network (EntNet).", "It is equipped with a dynamic long-term memory which allows it to maintain and update a representation of the state of the world as it receives new data.", "For language understanding tasks, it can reason on-the-fly as it reads text, not just when it is required to answer a question or respond as is the case for a Memory Network (Sukhbaatar et al., 2015).", "Like a Neural Turing Machine or Differentiable Neural Computer (Graves et al., 2014; 2016) it maintains a fixed size memory and can learn to perform location and content-based read and write operations.", "However, unlike those models it has a simple parallel architecture in which several memory locations can be updated simultaneously.", "The EntNet sets a new state-of-the-art on the bAbI tasks, and is the first method to solve all the tasks in the 10k training examples setting.", "We also demonstrate that it can solve a reasoning task which requires a large number of supporting facts, which other methods are not able to solve, and can generalize past its training horizon.", "It can also be practically used on large scale datasets such as Children’s Book Test, where it obtains competitive performance, reading the story in a single pass." ]
[ 2, 2, 1, 1, 1, 1, 1, 4 ]
[ 0.8205000162124634, 0.6154000163078308, 0.41029998660087585, 0.41029998660087585, 0.8205000162124634, 1, 0.7949000000953674, 0.5896999835968018 ]
train_0869
[ "Learning based methods have shown very promising results for the task of depth estimation in single images.", "However, most existing approaches treat depth prediction as a supervised regression problem and as a result, require vast quantities of corresponding ground truth depth data for training.", "Just recording quality depth data in a range of environments is a challenging problem.", "In this paper, we innovate beyond existing approaches, replacing the use of explicit depth data during training with easier-to-obtain binocular stereo footage.", "We propose a novel training objective that enables our convolutional neural network to learn to perform single image depth estimation, despite the absence of ground truth depth data.", "Ex-ploiting epipolar geometry constraints, we generate disparity images by training our network with an image reconstruction loss.", "We show that solving for image reconstruction alone results in poor quality depth images.", "To overcome this problem, we propose a novel training loss that enforces consistency between the disparities produced relative to both the left and right images, leading to improved performance and robustness compared to existing approaches.", "Our method produces state of the art results for monocular depth estimation on the KITTI driving dataset, even outperforming supervised methods that have been trained with ground truth depth." ]
[ 0, 0, 0, 2, 1, 1, 1, 1, 4 ]
[ 1, 0.5788999795913696, 0.5788999795913696, 0.5788999795913696, 0.631600022315979, 1, 0.631600022315979, 0.7894999980926514, 0.7894999980926514 ]
train_0870
[ "The vergence-accommodation conflict (VAC) remains a major problem in head-mounted displays for virtual and augmented reality (VR and AR).", "In this review, I discuss why this problem is pivotal for nearby tasks in VR and AR, present a comprehensive taxonomy of potential solutions, address advantages and shortfalls of each design, and cover various ways to better evaluate the solutions.", "The review describes how VAC is addressed in monocular, stereoscopic, and multiscopic HMDs, including retinal scanning and accommodation-free displays.", "Eye-tracking-based approaches that do not provide natural focal cues-gaze-guided blur and dynamic stereoscopy-are also covered.", "Promising future research directions in this area are identified." ]
[ 0, 2, 1, 1, 4 ]
[ 1, 0.41029998660087585, 0.41029998660087585, 0.7949000000953674, 0.5896999835968018 ]
train_0871
[ "Ninety organizations were surveyed in an exploratory investigation of the organizational impact of knowledge management (KM).", "A search of the literature revealed 12 KM practices.", "Results indicated that these KM practices were directly related to organizational performance which, in turn, was directly related to financial performance.", "In addition, a different set of KM practices were associated with specific value disciplines (i.e., customer intimacy, product development and operational excellence).", "Interestingly, a significant gap exists between the KM practices that firms believe to be important and those that turned out to be directly related to organizational performance.", "The implications of this study are significant for both practitioners and academics.", "Suggestions are offered for future work in this area." ]
[ 0, 1, 4, 4, 4, 4, 1 ]
[ 0.800000011920929, 0.4000000059604645, 0.4000000059604645, 0.4000000059604645, 0.4000000059604645, 0.4000000059604645, 0.4000000059604645 ]
train_0872
[ "The three-inputTOFFOLI gate is the workhorse of circuit synthesis for classical log ic operations on quantum data, e.g., reversible arithmetic ci rcuits.", "In physical implementations, however,TOFFOLI gates are decomposed into six CNOT gates and several one-qubit gates.", "Though this decomposition has been known for at least 10 years, we provide here the first demonstration of its CNOT-optimality.", "We study three-qubit circuits which contain less than six CNOT gates and implement a block-diagonal operator, then show that they implicitly d escribe the cosine-sine decomposition of a related operator.", "Leveraging the canonicity o f such decompositions to limit one-qubit gates appearing in respective circuits, we prove that then-qubit analogue of the TOFFOLI requires at least 2 n CNOT gates.", "Additionally, our results offer a complete classification of three-qubit diagonal operators by their CNOT-cost, which holds even if ancilla qubits are available.", "∗Department of Mathematics, Princeton University, Princet on, NJ 08544.", "†Department of EECS, University of Michigan, Ann Arbor, MI 48 109." ]
[ 0, 0, 0, 1, 1, 4, 3, 3 ]
[ 0.833299994468689, 0.833299994468689, 0.6111000180244446, 0.833299994468689, 0.833299994468689, 0.8055999875068665, 0.44440001249313354, 0.6111000180244446 ]
train_0873
[ "For more than a decade e-Commerce and e-Government applications have made major impacts in their respective sectors, private and public.", "Some time ago, we presented early insights from a comparative study of the two phenomena.", "This paper reports on more robust findings from an ongoing empirical investigation and deepens our understanding of similarities and differences between e-Commerce and e-Government.", "The findings show that despite major similarities the two phenomena follow quite separate and distinct trajectories." ]
[ 0, 0, 1, 4 ]
[ 1, 0.8108000159263611, 0.40540000796318054, 0.5676000118255615 ]
train_0874
[ "Recurrent neural network architectures have been shown to efficiently model long term temporal dependencies between acoustic events.", "However the training time of recurrent networks is higher than feedforward networks due to the sequential nature of the learning algorithm.", "In this paper we propose a time delay neural network architecture which models long term temporal dependencies with training times comparable to standard feed-forward DNNs.", "The network uses sub-sampling to reduce computation during training.", "On the Switchboard task we show a relative improvement of 6% over the baseline DNN model.", "We present results on several LVCSR tasks with training data ranging from 3 to 1800 hours to show the effectiveness of the TDNN architecture in learning wider temporal dependencies in both small and large data scenarios." ]
[ 0, 0, 1, 1, 1, 4 ]
[ 1, 1, 0.5896999835968018, 0.5896999835968018, 0.5896999835968018, 0.7949000000953674 ]
train_0875
[ "This paper describes a method of implementing two factor authentication using mobile phones.", "The proposed method guarantees that authenticating to services, such as online banking or ATM machines, is done in a very secure manner.", "The proposed system involves using a mobile phone as a software token for One Time Password generation.", "The generated One Time Password is valid for only a short user-defined period of time and is generated by factors that are unique to both, the user and the mobile device itself.", "Additionally, an SMS-based mechanism is implemented as both a backup mechanism for retrieving the password and as a possible mean of synchronization.", "The proposed method has been implemented and tested.", "Initial results show the success of the proposed method." ]
[ 2, 1, 1, 1, 1, 1, 4 ]
[ 0.40540000796318054, 0.8108000159263611, 0.8108000159263611, 0.8108000159263611, 0.8108000159263611, 0.5676000118255615, 0.8108000159263611 ]
train_0876
[ "The last few years have seen the emergence of several open access options in scholarly communication which can broadly be grouped into two areas referred to as ‘gold’ and ‘green’ open access (OA).", "In this article we review the literature examining the relationship between OA status and citation counts of scholarly articles.", "Early studies showed a correlation between the free online availability or OA status of articles and higher citation counts, and implied causality without due consideration of potential confounding factors.", "More recent investigations have dissected the nature of the relationship between article OA status and citations.", "Three non-exclusive postulates have been proposed to account for the observed citation differences between OA and non-OA articles: an open access postulate, a selection bias postulate, and an early view postulate.", "The most rigorous study to date (in condensed matter physics) showed that, after controlling for the early view postulate, the remaining difference in citation counts between OA and non-OA articles is explained by the selection bias postulate.", "No evidence was found to support the OA postulate per se; i.e. article OA status alone has little or no effect on citations.", "Further studies using a similarly rigorous approach are required to determine the generality of this finding.", "© 2007 Elsevier Ltd.", "All rights reserved." ]
[ 0, 2, 1, 1, 1, 1, 4, 4, 3, 3 ]
[ 1, 0.428600013256073, 0.428600013256073, 0.428600013256073, 0.628600001335144, 1, 0.6000000238418579, 0.628600001335144, 0.6000000238418579, 0.6000000238418579 ]
train_0877
[ "Developing hardware, algorithms and protocols, as well as collecting data in sensor networks are all important challenges in building good systems.", "We describe a vertical system integration of a sensor node and a toolkit of machine learning algorithms.", "Based on a dataset that combines sensor data with additional introduced data we predict the number of persons in a closed space.", "We analyze the dataset and evaluate the performance of two types of machine learning algorithms on this dataset: classification and regression." ]
[ 0, 0, 1, 4 ]
[ 1, 0.4000000059604645, 0.6000000238418579, 0.8285999894142151 ]
train_0878
[ "Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information.", "Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet.", "For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points.", "Different applications have different requirements of the steganography technique used.", "For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden.", "This paper intends to give an overview of image steganography, its uses and techniques.", "It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications." ]
[ 0, 0, 0, 0, 1, 2, 4 ]
[ 0.7949000000953674, 0.7949000000953674, 0.5896999835968018, 0.5896999835968018, 0.41029998660087585, 0.5896999835968018, 0.41029998660087585 ]
train_0879
[ "Excerpted from:Boyan, Justin.", "Learning Evaluation Functions for Global Op timization.", "Ph.D. thesis, Carnegie Mellon University, August 1998.", "(Available as Technical Report CMU-CS-98-152.", ") TD( ) is a popular family of algorithms for approximate policy eva luation in large MDPs.", "TD( ) works by incrementally updating the value function after each observed transition.", "It has two major dr awbacks: it makes inefficient use of data, and it requires the user to manu ally tune a stepsize schedule for good performance.", "For the case of lin ear value function approximations and = 0, the Least-Squares TD (LSTD) algorithm of Bradtke and Barto [5] eliminates all stepsize par ameters and improves data efficiency.", "This paper extends Bradtke and Barto’s work in three signific ant ways.", "First, it presents a simpler derivation of the LSTD algorith m. Second, it generalizes from = 0 to arbitrary values of ; at the extreme of = 1, the resulting algorithm is shown to be a practical formulati on of supervised linear regression." ]
[ 0, 0, 0, 3, 1, 0, 0, 1, 2, 1 ]
[ 0.7838000059127808, 0.40540000796318054, 0.40540000796318054, 0.40540000796318054, 0.4323999881744385, 0.5676000118255615, 0.40540000796318054, 0.4323999881744385, 0.40540000796318054, 0.6215999722480774 ]
train_0880
[ "Visualization: The use of computer-supported, interactive, visual representations of data to amplify cognition.", "(6) Cognition is the acquisition or use of knowledge.", "This definition has the virtue of focusing as much on the purpose of visualization as the means.", "Hamming (1973) saud, “the purpose of computation is insight, not numbers.", "”", "Likewise for visualization, “the purpose of visualization is insight not pictures.", "”", "The main goals of this insight are discovery, decision making, and explanation.", "(6)" ]
[ 0, 1, 2, 2, 3, 4, 3, 4, 3 ]
[ 0.800000011920929, 0.4000000059604645, 0.4000000059604645, 0.4000000059604645, 0.6000000238418579, 0.20000000298023224, 0.6000000238418579, 0.5, 0.6000000238418579 ]
train_0881
[ "Emotion recognition is a challenging task because of the emotional gap between subjective emotion and the low-level audio-visual features.", "Inspired by the recent success of deep learning in bridging the semantic gap, this paper proposes to bridge the emotional gap based on a multimodal Deep Convolution Neural Network (DCNN), which fuses the audio and visual cues in a deep model.", "This multimodal DCNN is trained with two stages.", "First, two DCNN models pre-trained on large-scale image data are fine-tuned to perform audio and visual emotion recognition tasks respectively on the corresponding labeled speech and face data.", "Second, the outputs of these two DCNNs are integrated in a fusion network constructed by a number of fully-connected layers.", "The fusion network is trained to obtain a joint audio-visual feature representation for emotion recognition.", "Experimental results on the RML audio-visual database demonstrates the promising performance of the proposed method.", "To the best of our knowledge, this is an early work fusing audio and visual cues in DCNN for emotion recognition.", "Its success guarantees further research in this direction." ]
[ 0, 0, 1, 1, 2, 2, 2, 4, 4 ]
[ 1, 0.7760000228881836, 0.3919999897480011, 0.3919999897480011, 0.47760000824928284, 0.3840000033378601, 0.2240000069141388, 0.41999998688697815, 0.41999998688697815 ]
train_0882
[ "Authors present the stock price prediction algorithm by using Bayesian network.", "The present algorithm uses the network twice.", "First, the network is determined from the daily stock price and then, it is applied for predicting the daily stock price which was already observed.", "The prediction error is evaluated from the daily stock price and its prediction.", "Second, the network is determined again from both the daily stock price and the daily prediction error and then, it is applied for the future stock price prediction.", "The present algorithm is applied for predicting NIKKEI stock average and Toyota motor corporation stock price.", "Numerical results show that the maximum prediction error of the present algorithm is 30% in NIKKEI stock average and 20% in Toyota Motor Corporation below that of the time-series prediction algorithms such as AR, MA, ARMA and ARCH models." ]
[ 0, 2, 0, 0, 4, 4, 4 ]
[ 1, 0.3939000070095062, 0.5758000016212463, 0.5758000016212463, 0.3077000081539154, 0.4544999897480011, 0.3939000070095062 ]
train_0883
[ "There is considerable pressure to define the key requirements of 5G, develop 5G standards, and perform technology trials as quickly as possible.", "Normally, these activities are best done in series but there is a desire to complete these tasks in parallel so that commercial deployments of 5G can begin by 2020.", "5G will not be an incremental improvement over its predecessors; it aims to be a revolutionary leap forward in terms of data rates, latency, massive connectivity, network reliability, and energy efficiency.", "These capabilities are targeted at realizing high-speed connectivity, the Internet of Things, augmented virtual reality, the tactile internet, and so on.", "The requirements of 5G are expected to be met by new spectrum in the microwave bands (3.3–4.2 GHz), and utilizing large bandwidths available in mm-wave bands, increasing spatial degrees of freedom via large antenna arrays and 3-D MIMO, network densification, and new waveforms that provide scalability and flexibility to meet the varying demands of 5G services.", "Unlike the one size fits all 4G core networks, the 5G core network must be flexible and adaptable and is expected to simultaneously provide optimized support for the diverse 5G use case categories.", "In this paper, we provide an overview of 5G research, standardization trials, and deployment challenges.", "Due to the enormous scope of 5G systems, it is necessary to provide some direction in a tutorial article, and in this overview, the focus is largely user centric, rather than device centric.", "In addition to surveying the state of play in the area, we identify leading technologies, evaluating their strengths and weaknesses, and outline the key challenges ahead, with research test beds delivering promising performance but pre-commercial trials lagging behind the desired 5G targets." ]
[ 0, 0, 1, 2, 1, 1, 4, 0, 1 ]
[ 0.6176000237464905, 0.7940999865531921, 0.8234999775886536, 0.7940999865531921, 0.6176000237464905, 0.44119998812675476, 0.2353000044822693, 0.3528999984264374, 0.2353000044822693 ]
train_0884
[ "This paper describes a user-friendly software for the calculation of general piping system networks composed of virtually any parallel and series pipe arrangement.", "Solution of the network is made with recourse to the iterative method of Hardy Cross.", "Solution is provided for pressure and flow-rate in each branch.", "Dimensioning problems, where pump characteristics or a pipe diameter are sought for achieving a pre-specified flow-rate condition, may also be tackled.", "2004 Wiley Periodicals, Inc. Comput Appl Eng Educ 12: 117 125, 2004; Published online in Wiley InterScience (www.interscience.wiley.com); DOI 10.1002/cae.20006" ]
[ 0, 1, 1, 4, 4 ]
[ 0.6000000238418579, 0.4000000059604645, 0.6000000238418579, 0.4000000059604645, 0.4000000059604645 ]
train_0885
[ "Combination strategies are test case selection methods that identify test cases by combining values of the different test object input parameters based on some combinatorial strategy.", "This survey presents 16 different combination strategies, covering more than 40 papers that focus on one or several combination strategies.", "This collection represents most of the existing work performed on combination strategies.", "This survey describes the basic algorithms used by the combination strategies.", "Some properties of combination strategies, including coverage criteria and theoretical bounds on the size of test suites, are also included in this description.", "This survey paper also includes a subsumption hierarchy that attempts to relate the various coverage criteria associated with the identified combination strategies." ]
[ 0, 1, 1, 1, 1, 1 ]
[ 0.5846999883651733, 0.6524999737739563, 0.8220000267028809, 0.6524999737739563, 0.6524999737739563, 0.6524999737739563 ]
train_0886
[ "Dengue is a life threatening disease prevalent in several developed as well as developing countries like India.", "This is a virus born disease caused by breeding of Aedes mosquito.", "Datasets that are available for dengue describe information about the patients suffering with dengue disease and without dengue disease along with their symptoms like: Fever Temperature, WBC, Platelets, Severe Headache, Vomiting, Metallic Taste, Joint Pain, Appetite, Diarrhea, Hematocrit, Hemoglobin, and how many days suffer in different city.", "In this paper we discuss various algorithm approaches of data mining that have been utilized for dengue disease prediction.", "Data mining is a well known technique used by health organizations for classification of diseases such as dengue, diabetes and cancer in bioinformatics research.", "In the proposed approach we have used WEKA with 10 cross validation to evaluate data and compare results.", "Weka has an extensive collection of different machine learning and data mining algorithms.", "In this paper we have firstly classified the dengue data set and then compared the different data mining techniques in weka through Explorer, knowledge flow and Experimenter interfaces.", "Furthermore in order to validate our approach we have used a dengue dataset with 108 instances but weka used 99 rows and 18 attributes to determine the prediction of disease and their accuracy using classifications of different algorithms to find out the best performance.", "The main objective of this paper is to classify data and assist the users in extracting useful information from data and easily identify a suitable algorithm for accurate predictive model from it." ]
[ 0, 0, 4, 2, 1, 1, 1, 1, 4, 2 ]
[ 1, 1, 0.800000011920929, 0.4000000059604645, 0.771399974822998, 0.628600001335144, 0.771399974822998, 0.542900025844574, 0.571399986743927, 0.571399986743927 ]
train_0887
[ "The excessive level of construction business failures and their association with financial difficulties has placed financial management in the forefront of many business imperatives.", "This has highlighted the importance of cash flow forecasting and management which has given rise to the development of several forecasting models.", "The traditional approach to the use of project financial models has been largely project-oriented perspective.", "However, the dominating role of ‘project economics’ in shaping ‘corporate economics’ tends to place the corporate strategy at the mercy of the projects.", "This paper approaches the concept of cash flow forecasting and management from a fresh perspective.", "Here, the use of forecasting models is extended beyond their traditional role as a guideline for monitoring and control of progress.", "They are regarded as tools for driving the project in the direction of corporate goals.", "The work is based on the premise that the main parties could negotiate the terms" ]
[ 0, 0, 0, 0, 0, 2, 1, 4 ]
[ 0.8087999820709229, 0.8087999820709229, 0.41830000281333923, 0.6413999795913696, 0.44620001316070557, 0.41429999470710754, 0.36250001192092896, 0.22310000658035278 ]
train_0888
[ "Face detection and alignment in unconstrained environment are challenging due to various poses, illuminations, and occlusions.", "Recent studies show that deep learning approaches can achieve impressive performance on these two tasks.", "In this letter, we propose a deep cascaded multitask framework that exploits the inherent correlation between detection and alignment to boost up their performance.", "In particular, our framework leverages a cascaded architecture with three stages of carefully designed deep convolutional networks to predict face and landmark location in a coarse-to-fine manner.", "In addition, we propose a new online hard sample mining strategy that further improves the performance in practice.", "Our method achieves superior accuracy over the state-of-the-art techniques on the challenging face detection dataset and benchmark and WIDER FACE benchmarks for face detection, and annotated facial landmarks in the wild benchmark for face alignment, while keeps real-time performance." ]
[ 0, 0, 1, 1, 1, 4 ]
[ 1, 1, 0.5946000218391418, 0.8108000159263611, 0.4323999881744385, 0.6485999822616577 ]
train_0889
[ "We present a new deep learning architecture Bi-CNN-MI for paraphrase identification (PI).", "Based on the insight that PI requires comparing two sentences on multiple levels of granularity, we learn multigranular sentence representations using convolutional neural network (CNN) and model interaction features at each level.", "These features are then the input to a logistic classifier for PI.", "All parameters of the model (for embeddings, convolution and classification) are directly optimized for PI.", "To address the lack of training data, we pretrain the network in a novel way using a language modeling task.", "Results on the MSRP corpus surpass that of previous NN competitors." ]
[ 0, 1, 1, 4, 1, 4 ]
[ 0.428600013256073, 0.34290000796318054, 0.4000000059604645, 0.428600013256073, 0.628600001335144, 0.8285999894142151 ]
train_0890
[ "Video indexing is an important problem that has occupied recent research efforts.", "The text appearing in video can provide semantic information about the scene content.", "Detecting and recognizing text events can provide indices into the video for content-based querying.", "We describe a system for detecting, tracking, and extracting artificial and scene text in MPEG–1 video.", "Preliminary results are presented." ]
[ 0, 0, 0, 1, 4 ]
[ 1, 0.800000011920929, 0.428600013256073, 0.6000000238418579, 0.8285999894142151 ]
train_0891
[ "For more than one decade, time series similarity search has been given a great deal of attention by data mining researchers.", "As a result, many time series representations and distance measures have been proposed.", "However, most existing work on time series similarity search focuses on finding shape-based similarity.", "While some of the existing approaches work well for short time series data, they typically fail to produce satisfactory results when the sequence is long.", "For long sequences, it is more appropriate to consider the similarity based on the higher-level structures.", "In this work, we present a histogram-based representation for time series data, similar to the “bag of words” approach that is widely accepted by the text mining and information retrieval communities.", "We show that our approach outperforms the existing methods in clustering, classification, and anomaly detection on several real datasets." ]
[ 0, 0, 0, 0, 0, 2, 4 ]
[ 1, 1, 1, 0.7828999757766724, 0.7828999757766724, 0.7828999757766724, 0.40700000524520874 ]
train_0892
[ "A range of court cases and forensic investigations have involved thumbnail pictures contained within operating system files, such as thumbcache and thumbs.db.", "In many of these cases, the thumbnail image has been the evidence presented to a court.", "Further analysis may locate additional information relating to thumbnail pictures, such as being able to link a thumbnail to a picture file on storage media, or locating information relating to the original file used to create the thumbnail, such as the full path and original file name.", "Using real-world law enforcement and test data, we demonstrate the application of our proposed operational methodology to conduct analysis of thumbcache files.", "We also propose a reporting and visualisation methodology to present the evidence to investigators, legal counsel, and court, which then forms the basis of our software prototype.", "Insider threat cases which involve pictures of intellectual property can potentially benefit from our proposed method." ]
[ 0, 0, 1, 1, 4, 4 ]
[ 0.8285999894142151, 1, 0.628600001335144, 0.7857000231742859, 0.4000000059604645, 0.8285999894142151 ]
train_0893
[ "Recurrent Neural Networks (RNNs) have the ability to retain memory and learn data sequences.", "Due to the recurrent nature of RNNs, it is sometimes hard to parallelize all its computations on conventional hardware.", "CPUs do not currently offer large parallelism, while GPUs offer limited parallelism due to sequential components of RNN models.", "In this paper we present a hardware implementation of Long-Short Term Memory (LSTM) recurrent network on the programmable logic Zynq 7020 FPGA from Xilinx.", "We implemented a RNN with 2 layers and 128 hidden units in hardware and it has been tested using a character level language model.", "The implementation is more than 21× faster than the ARM Cortex-A9 CPU embedded on the Zynq 7020 FPGA.", "This work can potentially evolve to a RNN co-processor for future mobile devices.", "Keywords-Recurrent Neural Network (RNN); Long Short Term Memory (LSTM); acceleration; FPGA;" ]
[ 0, 0, 0, 2, 1, 1, 2, 4 ]
[ 1, 0.8158000111579895, 0.8158000111579895, 0.421099990606308, 0.421099990606308, 0.6053000092506409, 0.3684000074863434, 0.421099990606308 ]
train_0894
[ "The purpose of this experiment was to examine the effect of web page text/background colour combination on readability, retention, aesthetics, and behavioural intention.", "One hundred and thirty-six participants studied two Web pages, one with educational content and one with commercial content, in one of four colour-combination conditions.", "Major findings were: (a) Colours with greater contrast ratio generally lead to greater readability; (b) colour combination did not significantly affect retention; (c) preferred colours (i.e., blues and chromatic colours) led to higher ratings of aesthetic quality and intention to purchase; and (d) ratings of aesthetic quality were significantly related to intention to purchase." ]
[ 2, 0, 0 ]
[ 0.6388999819755554, 0.44440001249313354, 0.44440001249313354 ]
train_0895
[ "Object recognition technology has matured to a point at which exciting applications are becoming possible.", "Indeed, industry has created a variety of computer vision products and services from the traditional area of machine inspection to more recent applications such as video surveillance, or face recognition.", "In this chapter, several representatives from industry present their views on the use of computer vision in industry.", "Current research conducted in industry is summarized and prospects for future applications and developments in industry are discussed." ]
[ 0, 0, 2, 1 ]
[ 1, 1, 0.6215999722480774, 0.3513999879360199 ]
train_0896
[ "Bloom filter is effective, space-efficient data structure for concisely representing a data set and supporting approximate membership queries.", "Traditionally, researchers often believe that it is possible that a Bloom filter returns a false positive, but it will never return a false negative under well-behaved operations.", "By investigating the mainstream variants, however, we observe that a Bloom filter does return false negatives in many scenarios.", "In this work, we show that the undetectable incorrect deletion of false positive items and detectable incorrect deletion of multiaddress items are two general causes of false negative in a Bloom filter.", "We then measure the potential and exposed false negatives theoretically and practically.", "Inspired by the fact that the potential false negatives are usually not fully exposed, we propose a novel Bloom filter scheme, which increases the ratio of bits set to a value larger than one without decreasing the ratio of bits set to zero.", "Mathematical analysis and comprehensive experiments show that this design can reduce the number of exposed false negatives as well as decrease the likelihood of false positives.", "To the best of our knowledge, this is the first work dealing with both the false positive and false negative problems of Bloom filter systematically when supporting standard usages of item insertion, query, and deletion operations." ]
[ 0, 0, 0, 1, 1, 1, 4, 4 ]
[ 0.7940999865531921, 0.7940999865531921, 0.41179999709129333, 0.5881999731063843, 0.7940999865531921, 0.7940999865531921, 0.41179999709129333, 0.5881999731063843 ]
train_0897
[ "openair is an R package primarily developed for the analysis of air pollution measurement data but which is also of more general use in the atmospheric sciences.", "The package consists of many tools for importing and manipulating data, and undertaking a wide range of analyses to enhance understanding of air pollution data.", "In this paper we consider the development of the package with the purpose of showing how air pollution data can be analysed in more insightful ways.", "Examples are provided of importing data from UK air pollution networks, source identiVcation and characterisation using bivariate polar plots, quantitative trend estimates and the use of functions for model evaluation purposes.", "We demonstrate how air pollution data can be analysed quickly and eXciently and in an interactive way, freeing time to consider the problem at hand.", "One of the central themes of openair is the use of conditioning plots and analyses, which greatly enhance inference possibilities.", "Finally, some consideration is given to future developments." ]
[ 0, 0, 2, 2, 4, 4, 4 ]
[ 0.44440001249313354, 0.44440001249313354, 0.44440001249313354, 0.44440001249313354, 0.3889000117778778, 0.3889000117778778, 0.6111000180244446 ]
train_0898
[ "Pedestrians follow different trajectories to avoid obstacles and accommodate fellow pedestrians.", "Any autonomous vehicle navigating such a scene should be able to foresee the future positions of pedestrians and accordingly adjust its path to avoid collisions.", "This problem of trajectory prediction can be viewed as a sequence generation task, where we are interested in predicting the future trajectory of people based on their past positions.", "Following the recent success of Recurrent Neural Network (RNN) models for sequence prediction tasks, we propose an LSTM model which can learn general human movement and predict their future trajectories.", "This is in contrast to traditional approaches which use hand-crafted functions such as Social forces.", "We demonstrate the performance of our method on several public datasets.", "Our model outperforms state-of-the-art methods on some of these datasets.", "We also analyze the trajectories predicted by our model to demonstrate the motion behaviour learned by our model." ]
[ 0, 0, 2, 1, 1, 4, 4, 4 ]
[ 0.8181999921798706, 0.8181999921798706, 0.6363999843597412, 0.3939000070095062, 0.42419999837875366, 0.7407000064849854, 0.6061000227928162, 0.6061000227928162 ]
train_0899
[ "A fast fashion system combines quick response production capabilities with enhanced product design capabilities, to both design “hot”products that capture the latest consumer trends and exploit minimal production leadtimes to match supply with uncertain demand.", "We develop a model of such a system, and compare its performance to three alternative systems: quick response-only systems, enhanced design-only systems, and traditional systems (which lack both enhanced design and quick response capabilities).", "In particular, we focus on the impact of each of the four systems on “strategic”or forward-looking customer purchasing behavior, i.e., the intentional delay in purchasing an item at the full price to obtain it during an end-ofseason clearance.", "We find that enhanced design helps to mitigate strategic behavior by offering consumers a product they value more, making them less willing to risk waiting for a clearance sale and possibly experiencing a stock-out.", "Quick response mitigates strategic behavior through a different mechanism: by better matching supply to demand, it reduces the chance of a clearance sale.", "Most importantly, we find that while it is possible for quick response and enhanced design to be either complements or substitutes, the complementarity effect tends to dominate.", "Hence, when both quick response and enhanced design are combined in a fast fashion system, the firm typically enjoys a greater incremental increase in profit than the sum of the increases resulting from employing either system in isolation, roughly by a factor of two in our numerical experiments.", "Furthermore, complementarity is strongest when customers are very strategic.", "We conclude that fast fashion systems can be of significant value, particularly when consumers exhibit strategic behavior." ]
[ 0, 1, 1, 1, 1, 4, 4, 4, 4 ]
[ 0.6154000163078308, 0.41029998660087585, 0.7949000000953674, 0.6154000163078308, 0.5160999894142151, 0.6154000163078308, 0.6154000163078308, 0.7949000000953674, 0.8205000162124634 ]