abstract
stringlengths 122
9.25k
| authors
stringlengths 9
1.14k
| title
stringlengths 47
461
| instruction
stringclasses 1
value | __index_level_0__
int64 20
1,000k
|
---|---|---|---|---|
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: It has been almost ten years since the birth of the first distributed shared memory (DSM) system, Ivy. While significant progress has been made in the area of improving the performance of DSM, and DSM has been the focus of several dozen PhD theses, its overall impact on "real" users and applications has been small. The goal of this paper is to present our position on what remains to be done before DSM will have a significant impact on real applications. More specifically, reflect on what believe have been the major advances in the area, what the important outstanding problems are, and what work needs to be done. Finally, describe a modest step towards solving these problems, the Quarks DSM system. | ['John B. Carter', 'Dilip Khandekar', 'Linus Kamb'] | I am writing a research paper on a idea Distributed shared memory: where we are and where we should be headed | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 470,691 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Studies have shown that there are different types of cries depending on the newborns' need such as hunger, tiredness, discomfort and so on. Neonatologist or pediatricians can distinguish beten different types of cries and can find a pattern in each type of cry. Unfortunately, this is a real problem for the parents who want to act as fast as possible to comfort the newborn. , propose a fully automatic system that attempts to discriminate beten different types of cries. The baby cry classification system is based on Gaussian Mixture Models and i-vectors. The evaluation is performed on an audio database comprising six types of cries (colic, eructation, discomfort, hunger, pain, tiredness) from 127 babies. The experiments show promising results despite the difficulty of the task. | ['Ioana-Alina Banica', 'Horia Cucu', 'Andi Buzo', 'Dragos Burileanu', 'Corneliu Burileanu'] | I am writing a research paper on a idea Baby cry recognition in real-world conditions | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 950,195 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: For a socially intelligent robot, different levels of situation as-sessment are required, ranging from basic processing of sensor input to high-level analysis of semantics and intention. Hover, the attempt to combine them all prompts new research challenges and the need of a co-herent framework and architecture. presents the situation assessment aspect of Romeo2, a unique project aiming to bring multi-modal and multi-layered perception on a single system and targeting for a unified theoretical and functional frame-work for a robot companion for everyday life. It also discusses some of the innovation potentials, which the combination of these various perception abilities adds into the robot's socio-cognitive capabilities. | ['Amit Kumar Pandey', 'Rodolphe Gelin', 'Rachid Alami', 'Renaud Viry', 'Axel Buendia', 'Roland Meertens', 'Mohamed Chetouani', 'Laurence Devillers', 'Marie Tahon', 'David Filliat', 'Yves Grenier', 'Mounira Maazaoui', 'Abderrahmane Kheddar', 'Frédéric Lerasle', 'Alhayat Ali Mekonnen'] | I am writing a research paper on a idea Romeo2 Project: Humanoid Robot Assistant and Companion for Everyday Life: I. I am writing a research paper on a idea Situation Assessment for Social Intelligence. | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 647,666 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Blum–Goldwasser Public Key Encryption System | ['Dan Boneh'] | I am writing a research paper on a idea Blum–Goldwasser Public Key Encryption System | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 463,145 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: With the adoption of state-of-the-art telecommunication technologies for sensing and collecting traffic related information, Vehicular Sensor Networks (VSNs) have emerged as a new application scenario that is envisioned to revolutionize the human driving experiences and traffic flow control systems. To avoid any possible malicious attack and resource abuse, employing a digital signature scheme is widely recognized as the most effective approach for VSNs to achieve authentication, integrity, and validity. Hover, when the number of signatures received by a Roadside Unit (RSU) becomes large, a scalability problem emerges immediately, where the RSU could be difficult to sequentially verify each received signature within 300 ms interval according to the current Dedicated Short Range Communications (DSRC) broadcast protocol. , introduce an efficient batch signature verification scheme for communications beten vehicles and RSUs (or termed vehicle- to-Infrastructure (V2I) communications), in which an RSU can verify multiple received signatures at the same time such that the total verification time can be dramatically reduced. demonstrate that the proposed scheme can achieve conditional privacy preservation that is essential in VSNs, where each message launched by a vehicle is mapped to a distinct pseudo identity, while a trust authority can always retrieve the real identity of a vehicle from any pseudo identity. With the proposed scheme, since identity-based cryptography is employed in generating private keys for pseudo identities, certificates are not needed and thus transmission overhead can be significantly reduced. | ['Chenxi Zhang', 'Rongxing Lu', 'Xiaodong Lin', 'Pin-Han Ho', 'Xuemin Shen'] | I am writing a research paper on a idea An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 106,971 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: The motion-compensated temporal filtering (MCTF)-based scalable video coding (SVC) provides a full scalability including spatial, temporal and signal-to-noise ratio (SNR) scalability with fine granularity, each of which may result in different visual effect. addresses a novel approach of two-dimensional unequal error protection (2D UEP) for the scalable video with a combined temporal and quality (SNR) scalability over packet-erasure channel. The bit-stream is divided into scalable subbitstreams based on the structure of MCTF. Each subbitstream is further divided into several quality layers. Unequal quantities of bits are allocated to protect different layers to obtain acceptable quality video with smooth degradation under different transmission error conditions. Experimental results are presented to show the advantage of the proposed 2D UEP scheme over the traditional one-dimensional unequal error protection (1D UEP) scheme. Comparing the proposed method with the 1D UEP scheme on SNR layers, our method gives up to 0.81-dB improvement for some video sequences | ['Yu Wang', 'Tao Fang', 'Lap-Pui Chau', 'Kim-Hui Yap'] | I am writing a research paper on a idea Two-Dimensional Channel Coding Scheme for MCTF-Based Scalable Video Coding | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 217,529 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Nowadays, massive amounts of data that are often geographically distributed and owned by different organisations are being mined. As consequence, a large mount of knowledge is being produced. This causes the problem of efficient knowledge management and mining. The main aim is to develop DM infrastructures to fully exploit the benefit of the knowledge contained in these very large data repositories. To this end, introduced ”knowledge map” approach to represent easily and efficiently the knowledge mined in a large-scale platform such as Grid. This also facilitates the integration and coordination of local mining processes along with existing knowledge to increase the accuracy of the final models. , discuss its advantages and its design issues. | ['M-Tahar Kechadi'] | I am writing a research paper on a idea The Data Wave: Data Management and Mining | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 109,750 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: An Optimal Adaptive Finite Element Method for an Obstacle Problem | ['Carsten Carstensen', 'Jun Hu'] | I am writing a research paper on a idea An Optimal Adaptive Finite Element Method for an Obstacle Problem | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 593,285 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Opportunistic access of licensed spectrum using a cognitive radio network (CRN) is getting research attraction due to its ability to improve utilisation of this scarce resource without affecting the primary users (PUs). To improve wide acceptability of CRN, it must be equipped with efficient protocols to deal with multiple primary networks to provision QoS guarantee for demand-driven applications by the secondary users (SUs). , a novel CSMA/CA-based multichannel cognitive radio medium access control (MCR-MAC) protocol is developed by modifying the 4-way handshaking based IEEE 802.11 DCF to dynamically assign contending SUs to free channels using an innovative random arbitration scheme. The paper also presents a detailed analytical model for cognitive interference to the PUs and SUs. The proposed protocol is designed to keep the interference level in check to remain transparent to the PUs. A throughput analysis at saturation load reveals that this fully ad-hoc MCR-MAC is capable of achieving throughput comparable to the ideal scenario (when SUs are equally divided to the channels) without using any centralised infrastructure or dedicated control channel. Extensive simulation results validate the accuracy of the theoretical analysis and establish MCR-MAC as a highly practical solution to construct a CRN in a region overlapped with multiple primary networks to offer data-rate sensitive applications by the SUs. | ['Rashidul Hasan', 'M. Manzur Murshed'] | I am writing a research paper on a idea A Novel Multichannel Cognitive Radio Network with Throughput Analysis at Saturation Load | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 173,880 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: analyzes the dynamics of reference tracking in switched-mode por converters in terms of both large-signal and small-signal perspectives. Common control schemes, namely, voltage mode, current mode, and V 2 -control, are compared for their performance in reference tracking. For small-signal analysis, loop gains and reference-to-output transfer functions are analytically derived and verified by the proposed Matlab-based frequency response simulator. In the case of multiple-loop control like V 2 -control, different loop gains are clarified for their application in load transient or reference tracking. Practical circuit-level design considerations are given to current-mode control for achieving fast reference tracking, while end-point prediction (EPP) is used to improve V 2 -control, which is inherently slow in reference tracking. The effect of EPP on transfer function is then explained in details. A V 2 -controlled buck converter with EPP is fabricated. The measured reference-tracking response shows ten times improvement in tracking speed and verifies the effectiveness of EPP in V 2 -control. | ['Patrick Y. Wu', 'Philip K. T. Mok'] | I am writing a research paper on a idea Comparative Studies of Common Fix-Frequency Controls for Reference Tracking and Enhancement by End-Point Prediction | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 225,159 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Kill the Dragon and Rescue the Princess: Designing a Plan-based Multi-agent Story Generator. | ['Iván Manuel Laclaustra', 'José Ledesma', 'Gonzalo Méndez', 'Pablo Gervás'] | I am writing a research paper on a idea Kill the Dragon and Rescue the Princess: Designing a Plan-based Multi-agent Story Generator. | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 981,597 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: presents manipulation of small electronic parts whose size is submillimeter order or smaller. For assembly of small parts which are components of electronic devices, need two key technologies: accurate position control and force control in handling them. , utilize a four-degree-of-freedom assembly robot with a camera for position control. This vision-based assembly system gives us positioning accuracy of micrometer order. also control the pressing load of the robot in pick-and-place of small objects indirectly with mechanical springs and a displacement sensor by changing resilience force of springs actively. execute some experiments to handle small electronic parts using above-mentioned active force control and vision-based position control. | ['Satoshi Makita', 'Yosuke Kadono', 'Yusuke Maeda', 'Sayaka Miura', 'Isao Kunioka', 'Kunio Yoshida'] | I am writing a research paper on a idea Manipulation of submillimeter-sized electronic parts using force control and vision-based position control | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 129,617 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Entity Linking and Slot Filling through Statistical Processing and Inference Rules. | ['Daniel M. Bikel', 'Vittorio Castelli', 'Radu Florian', 'Ding-Jung Han'] | I am writing a research paper on a idea Entity Linking and Slot Filling through Statistical Processing and Inference Rules. | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 794,469 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: A heuristic algorithm is proposed in this paper to construct a set of Steiner trees for multicast with multiple sources under the software-defined networking (SDN) architecture, where each source is associated with a group of receivers. It is based on the extended Dijkstra's shortest path algorithm and the modified selective closest terminal first Steiner tree algorithm. The former algorithm considers not only the edge ights but also the node ights to form data routing path with the shortest delay. The latter algorithm regards nodes with shorter paths to the source to have higher priority in the priority queue for growing Steiner trees. In this way, the number of Steiner tree edges is reduced and thus the bandwidth consumption is cut down. The proposed algorithm is simulated by the EstiNet emulator along with a Ryu controller for different multicast scenarios. The simulation results are compared with those of related algorithms in terms of the source-to-receiver delay and the bandwidth consumption to show the advantage of the proposed algorithm. | ['Jehn-Ruey Jiang', 'Szu-yuan Chen'] | I am writing a research paper on a idea Constructing Multiple Steiner Trees for Software-Defined Networking Multicast | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 813,435 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Software code caches help amortize the overhead of dynamic binary transformation by enabling reuse of transformed code. Since code caches contain a potentially-altered copy of every instruction that executes, run-time access to a code cache can be a very porful opportunity. Unfortunately, current research infrastructures lack the ability to model and direct code caching, and as a result, past code cache investigations have required access to the source code of the binary transformation system. presents a code cache-aware interface to the pin dynamic instrumentation system. While a program executes, our interface allows a user to inspect the code cache, receive callbacks when key events occur, and manipulate the code cache contents at will. demonstrate the utility of this interface on four architectures (IA32, EM64T, IPF, XScale) and present several tools written using our API. These tools include a self-modifying code handler, a two-phase instrumentation analyzer, a code cache visualizer, and custom code cache replacement policies. also show that tools written using our interface have comparable performance to direct, source-level implementations. Both our interface and sample open-source tools that utilize the interface have been incorporated into the standard distribution of the pin dynamic instrumentation engine, which has been downloaded over 5,000 times in 18 months. | ['Kim M. Hazelwood', 'Robert S. Cohn'] | I am writing a research paper on a idea A Cross-Architectural Interface for Code Cache Manipulation | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 218,748 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Bucky gel actuator is a novel electro-active polymer (EAP), which is a low-voltage driven dry soft actuator. Its device has a bimorph structure with polymer-supported bucky gel electrodes and a polymer-supported ionic gel electrolyte. It can be fabricated by layer-by-layer casting, to form any shape easily. In addition, the bucky gel device generates electromotive force when bending, and then it also can be used as a sensor. Since sensor and actuator functions exist in a same device, flexible and miniature integrated actuator-sensor systems for soft robotics can be constructed easily. In this study, conduct some experiments to verify the possibility of the bucky gel actuator/sensor. Feedback controls of the actuator are demonstrated and the characteristics of the sensor are investigated. By utilizing both functions of the actuator and the sensor, feedback control based on the sensor signal is demonstrated. | ['Norihiro Kamamichi', 'Masaki Yamakita', 'Kinji Asaka', 'Zhi Wei Luo', 'Toshiharu Mukai'] | I am writing a research paper on a idea Experimental verifications on control and sensing of bucky gel actuator/sensor | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 501,511 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: An algorithm for speaker's lip segmentation and features extraction is presented. A color video sequence of speaker's face is acquired, under natural lighting conditions and without any particular make-up. First, a logarithmic color transform is performed from the RGB to HI (hue, intensity) color space. Second, a statistical approach using Markov random field modeling determines the red hue prevailing region and motion in a spatiotemporal neighborhood. Third, the final label field is used to extract ROI (region of interest) and geometrical features. | ['Marc Liévin', 'Franck Luthon'] | I am writing a research paper on a idea Lip features automatic extraction | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 101,921 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Real-time traffic speed is indispensable for many ITS applications, such as traffic-aware route planning and eco-driving advisory system. Existing traffic speed estimation solutions assume vehicles travel along roads using constant speed. Hover, this assumption does not hold due to traffic dynamicity and can potentially lead to inaccurate estimation in real world. , propose a novel in-network traffic speed estimation approach using infrastructure-free vehicular networks. The proposed solution utilizes macroscopic traffic flow model to estimate the traffic condition. The selected model only relies on vehicle density, which is less likely to be affected by the traffic dynamicity. In addition, also demonstrate an application of the proposed solution in real-time route planning applications. Extensive evaluations using both traffic trace based large scale simulation and testbed based implementation have been performed. The results show that our solution outperforms some existing ones in terms of accuracy and efficiency in traffic-aware route planning applications. | ['Zongjian He', 'Buyang Cao', 'Yan Liu'] | I am writing a research paper on a idea Accurate real-time traffic speed estimation using infrastructure-free vehicular networks | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 256,514 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: The double-datapath organization of a floating-point adder results in reduced latency. One of the main characteristics of this organization is the combination of addition/subtraction with rounding into a single add/round module, which is implemented as one pipeline stage and might be responsible for the cycle time. propose the utilization of the most-significant carry detector and the corresponding adder using the reverse-carry approach to reduce the latency of this add/round module. In addition, the particular organization of the reverse-carry adder is used to reduce the contribution on the delay of the row of half adders that is included in the FAR datapath to produce the sum plus two. Estimates for a 64 bit add/round module show a potential reduction of delay of about 15%. | ['Javier D. Bruguera', 'Tomás Lang'] | I am writing a research paper on a idea Using the reverse-carry approach for double datapath floating-point addition | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 211,561 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: An approach is proposed to the reuse of software at the source code level. The approach is named ESTRO (Evolving Software Repository), and it has been defined in the context of the LASER project, a joint cooperation beten Italsiel and the University of Maryland. Two major issues in reuse are component search and reusability estimation. In the ESTRO approach, component search and reusability estimation are supported by a repository of reusable components, classified according to a classification schema. Within the repository two reusability estimation models are available: with this regard, the distinction beten reusability in the large and reusability in the small is introduced. The reusability models and the classification schema are environment dependent. > | ['B. Macchini'] | I am writing a research paper on a idea Reusing software with ESTRO (Evolving Software Repository) | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 367,216 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: In allusion to characteristics of low contrast, small dimension of target and complexity of background in underwater laser image, a method of detecting and describing underwater laser ak target using decorrelation trait of orthogonal transform is presented. K-L transform trace matrix that describes most image energy, shape distributing and also extrudes difference beten target and background is used to detect the ak target. The results of computer simulation demonstrate that the proposed method can efficiently detect ak target in low signal-to-noise ratio underwater laser image. | ['Yang Shu-bin', 'Peng Fu-yuan'] | I am writing a research paper on a idea Weak Underwater Laser Image Target Detection Based on K-L Transform | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 268,412 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Assuming that the primal part of the sequence generated by a Newton-type (e.g., SQP) method applied to an equality-constrained problem converges to a solution where the constraints are degenerate, investigate whether the dual part of the sequence is attracted by those Lagrange multipliers which satisfy second-order sufficient condition (SOSC) for optimality, or by those multipliers which violate it. This question is relevant at least for two reasons: one is speed of convergence of standard methods; the other is applicability of some recently proposed approaches for handling degenerate constraints. show that for the class of damped Newton methods, convergence of the dual sequence to multipliers satisfying SOSC is unlikely to occur. support our findings by numerical experiments. also suggest a simple auxiliary procedure for computing multiplier estimates, which does not have this undesirable property. Finally, some consequences for the case of mixed equality and inequality constraints are discussed. | ['Alexey F. Izmailov', 'Mikhail V. Solodov'] | I am writing a research paper on a idea On attraction of Newton-type iterates to multipliers violating second-order sufficiency conditions | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 150,655 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Pervasiveness and complexity of modern software are challenging engineers to design applications able to guarantee the desired quality of service despite unpredictable runtime variations in their execution environment. A variety of techniques have been proposed in the last year for the design of self-adaptive applications; hover, most of them is tailored to specific applications or can provide limited guarantees of effectiveness and dependability. Control theory has, on the other hand, developed a wide set of mathematically grounded methods for many engineering domains that interact with the physical world. Hover, applying these methods to software systems is not straightforward. Software is rarely designed to be controllable and its behavior is hard to model in formalisms amenable to control. In this technical briefing will recall a set of foundational concepts of control theory, explain how they can be transposed in the software engineering domain, and discuss some insights into the design of controllable software. | ['Antonio Filieri', 'Martina Maggio'] | I am writing a research paper on a idea Control theory for software engineering: technical briefing | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 769,897 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: On the Readability of Overlap Digraphs | ['Rayan Chikhi', 'Paul Medvedev', 'Martin Milanič', 'Sofya Raskhodnikova'] | I am writing a research paper on a idea On the Readability of Overlap Digraphs | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 972,636 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: The main goal of this paper it is to present our experiments in ImageCLEF 2009 Campaign (photo retrieval task). In 2008 proved empirically that the Text-based Image Retrieval (TBIR) methods defeats the Content-based Image Retrieval CBIR “quality” of results, so this time developed several experiments in which the CBIR helps the TBIR. The TBIR System [6] main improvement is the named-entity sub-module. In case of the CBIR system [3] the number of low-level features has been increased from the 68 component used at ImageCLEF 2008 up to 114 components, and only the Mahalanobis distance has been used. propose an ad-hoc management of the topics delivered, and the generation of XML structures for 0.5 million captions of the photographs (corpus) delivered. Two different merging algorithms re developed and the third one tries to improve our previous cluster level results promoting the diversity. Our best run for precision metrics appeared in position 16th, in the 19th for MAP score, and for diversity value in position 11th, for a total of 84 submitted experiments. Our best and “only textual” experiment was the 6th one over 41. | ['Ana García Serrano', 'Xaro Benavent', 'Rubén Granados Muñoz', 'Esther de Ves', 'José Miguel Goñi Menoyo'] | I am writing a research paper on a idea Multimedia Retrieval by Means of Merge of Results from Textual and Content Based Retrieval Subsystems | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 554,864 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Compositional Bisimulation Minimization for Interval Markov Decision Processes | ['Vahid Hashemi', 'Holger Hermanns', 'Lei Song', 'K. Subramani', 'Andrea Turrini', 'Piotr J. Wojciechowski'] | I am writing a research paper on a idea Compositional Bisimulation Minimization for Interval Markov Decision Processes | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 775,508 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: , present a new robust, fast, and accurate deconvolution algorithm for correcting noise disturbed measurements and eliminating the influence of the resolution filter of a spectrum analyzer used for EM-field measurements around a GSM and UMTS base station. Our purpose is to be able to determine immediately the field values at a measurement site. Therefore the algorithm has to be fast and accurate. Furthermore, because of the presence of noise, our algorithm has to be robust. Our algorithm that uses windowing and filtering meets those demands and reduces the present noise by an additional convolution with a square wave function. | ['Wout Joseph', 'Christof Olivier', 'Luc Martens'] | I am writing a research paper on a idea A robust, fast, and accurate deconvolution algorithm for EM-field measurements around GSM and UMTS base stations with a spectrum analyzer | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 327,872 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Small oligomers formed early in the process of amyloid fibril formation may be the major toxic species in Alzheimer's disease. investigate the early stages of amyloid aggregation for the tau fragment AcPHF6 (Ac-VQIVYK-NH2) using an implicit solvent all-atom model and extensive Monte Carlo simulations of 12, 24, and 36 chains. A variety of small metastable aggregates form and dissolve until an aggregate of a critical size and conformation arises. Hover, the stable oligomers, which are beta-sheet-rich and feature many hydrophobic contacts, are not always growth-ready. The simulations indicate instead that these supercritical oligomers spend a lengthy period in equilibrium in which considerable reorganization takes place accompanied by exchange of chains with the solution. Growth competence of the stable oligomers correlates with the alignment of the strands in the beta-sheets. The larger aggregates seen in our simulations are all composed of two twisted beta-sheets, packed against each other with hydrophobic side chains at the sheet-sheet interface. These beta-sandwiches show similarities with the proposed steric zipper structure for PHF6 fibrils but have a mixed parallel/antiparallel beta-strand organization as opposed to the parallel organization found in experiments on fibrils. Interestingly, find that the fraction of parallel beta-sheet structure increases with aggregate size. speculate that the reorganization of the beta-sheets into parallel ones is an important rate-limiting step in the formation of PHF6 fibrils. | ['Da-Wei Li', 'Sandipan Mohanty', 'Anders Irbäck', 'Shuanghong Huo'] | I am writing a research paper on a idea Formation and Growth of Oligomers: A Monte Carlo Study of an Amyloid Tau Fragment | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 142,756 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Service composition is an effective approach for large-scale multimedia delivery. In previous works, user requirement is represented as one fixed functional path which is composed of several functional components in a certain order. Actually, there may be several functional paths (deliver different quality level multimedia data, e.g., image pixel, frame rate) that can meet one request. And due to the diversity of devices and connections in pervasive environment, system should choose a suitable media quality delivery path in accordance with context, instead of one fixed functional path. presents a deep study of multimedia delivery problem and proposes an on-line algorithm LDPath and an off-line centralized algorithm LD/RPath respectively. LDPath aims at delivering multimedia data to end user with lost delay by choosing services to build delivery paths hop-by-hop, which is adapted to the unstable open environment. And LD/RPath is developed for a relatively stable environment, which generates delivery paths according to the trade-off beten delay and reliability metrics, because the service reliability is also an important fact in such scenario. Experimental results show that both algorithms have good performance with low overhead to the system. | ['Zhuzhong Qian', 'Sheng Zhang', 'Kangbin Yim', 'Sanglu Lu'] | I am writing a research paper on a idea Service Oriented Multimedia Delivery System in Pervasive Environments | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 797,854 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Device, language and environmental mismatch adversely affect speaker verification (SV) performance. investigate such effects empirically based on the M3 (multibiometric, multilingual and multi-device) corpus (H. Meng et al., 2006). Device mismatch (among 3G phone, PocketPC and a desktop PC plug-in microphone) brings relative performance degradation of 523%; language mismatch (beten English and Cantonese) brings 284% and environmental mismatch (beten office environment and recording studio) brings 109%. In particular, verification with wide-band models on narrow-band test data outperforms narrow-band models on wide-band test data. The 3G phone's SV performance is generally low, but remains stable across environments. Additionally, durational variations within two-second utterances may cause a relative change of 633% in SV performance. | ['Bin Ma', 'Helen M. Meng', 'Man-Wai Mak'] | I am writing a research paper on a idea Effects of Device Mismatch, Language Mismatch and Environmental Mismatch on Speaker Verification | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 510,018 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: are designing and prototyping a generalized observatory middleware framework (OMF) to integrate existing and proposed technologies and reduce duplication of functionality across observatories. Our implementation consists of an enterprise service bus (ESB) architecture capable of integrating a wide variety of message-based technologies, a security proxy (SP) that uses X.509 credentials to sign and verify messages to and from the ESB, and an instrument proxy (IP) based on widely-accepted encoding and interface standards that provides common access to both MBARI-specific and native instruments. Our poster details the framework's architecture and the use case scenarios for which are designing the prototype system. It will include a discussion of our assumptions, the choices have made architecturally, and the implementation approach for the prototype are producing. | ['Randal Butler', 'Terry Fleury', 'Von Welch', 'John Graybeal', 'Duane R. Edgington', 'Kevin Gomes', 'Bob Herlien'] | I am writing a research paper on a idea Observatory Middleware Framework | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 97,547 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Array-oriented programming has been around for about thirty years and provides a fundamental abstraction for scientific computing. Hover, a alth of popular programming languages in existence fail to provide convenient highlevel abstractions and exploit parallelism. One reason being that hardware is an ever-moving target.For this purpose, introduce CAPE, a C-targeting Array Processing Engine, which manages the concerns of optimizing and parallelizing the execution of array operations. It is intended as a backend for new and existing languages and provides a portable runtime with a C-interface.The performance of the implementation is studied in relation to high-level implementations of a set of applications, kernels and synthetic benchmarks in Python/NumPy as ll as lowlevel implementations in C/C++. show the performance improvement over the high-productivity environment and how close the implementation is to handcrafted C/C++ code. | ['Simon Andreas Frimann Lund', 'Mads Ruben Burgdorff Kristensen', 'Brian Vinter'] | I am writing a research paper on a idea Automatic mapping of array operations to specific architectures | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 959,172 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Isosurfaces are fundamental geometrical objects for the analysis and visualization of volumetric scalar fields. Recent work has generalized them to bivariate volumetric fields with fiber surfaces, the pre-image of polygons in range space. Hover, the existing algorithm for their computation is approximate, and is limited to closed polygons. Moreover, its runtime performance does not allow instantaneous updates of the fiber surfaces upon user edits of the polygons. Overall, these limitations prevent a reliable and interactive exploration of the space of fiber surfaces. introduces the first algorithm for the exact computation of fiber surfaces in tetrahedral meshes. It assumes no restriction on the topology of the input polygon, handles degenerate cases and better captures sharp features induced by polygon bends. The algorithm also allows visualization of individual fibers on the output surface, better illustrating their relationship with data features in range space. To enable truly interactive exploration sessions, further improve the runtime performance of this algorithm. In particular, show that it is trivially parallelizable and that it scales nearly linearly with the number of cores. Further, study acceleration data-structures both in geometrical domain and range space and show how to generalize interval trees used in isosurface extraction to fiber surface extraction. Experiments demonstrate the superiority of our algorithm over previous work, both in terms of accuracy and running time, with up to two orders of magnitude speedups. This improvement enables interactive edits of range polygons with instantaneous updates of the fiber surface for exploration purpose. A VTK-based reference implementation is provided as additional material to reproduce our results. | ['Pavol Klacansky', 'Julien Tierny', 'Hamish Carr', 'Zhao Geng'] | I am writing a research paper on a idea Fast and Exact Fiber Surfaces for Tetrahedral Meshes | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 764,642 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Background: MicroRNA (miRNA) target prediction is an important component in understanding gene regulation. One approach is computational: searching nucleotide sequences for miRNA complementary base pairing. An alternative approach explored in this paper is the use of gene expression profiles from time-series microarray experiments to aid in miRNA target prediction. This requires distinguishing genuine targets from genes that are secondarily down-regulated as part of the same regulatory module. use a functional data analytic (FDA) approach, FDA being a subfield of statistics that extends standard multivariate techniques to datasets with predictor and/or response variables that are functional. Results: In a miR-124 transfection experiment spanning 120 hours, for genes with measurably down-regulated mRNA, exploratory functional data analysis shod differences in expression profiles over time beten directly and indirectly down-regulated genes, such as response latency and biphasic response for direct miRNA targets. For prediction, an FDA approach was shown to effectively classify direct miR-124 targets from time-series microarray data (accuracy 88%; AUC 0.96), providing better performance than multivariate approaches. Conclusion: Exploratory FDA analysis can reveal interesting aspects of dynamic microarray miRNA studies. Predictive FDA models can be applied where computational miRNA target predictors fail or are unreliable, e.g. when there is a lack of evolutionary conservation, and can provide posterior probabilities to provide additional confirmatory evidence to validate candidate miRNA targets computationally predicted using sequence information. This approach would be applicable to the investigation of other miRNAs and suggests that dynamic microarray studies at a higher time resolution could reveal further details on miRNA regulation. | ['Brian J. Parker', 'Jiayu Wen'] | I am writing a research paper on a idea Predicting microRNA targets in time-series microarray experiments via functional data analysis | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 145,915 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Compressed sensing is a new area of signal processing. Its goal is to minimize the number of samples that need to be taken from a signal for faithful reconstruction. The performance of compressed sensing on signal classes is directly related to Gelfand widths. Similar to the deeper constructions of optimal subspaces in Gelfand widths, most sampling algorithms are based on randomization. Hover, for possible circuit implementation, it is important to understand what can be done with purely deterministic sampling. In this note, show how to construct sampling matrices using finite fields. One such construction gives cyclic matrices which are interesting for circuit implementation. While the guaranteed performance of these deterministic constructions is not comparable to the random constructions, these matrices have the best known performance for purely deterministic constructions. | ['Ronald A. DeVore'] | I am writing a research paper on a idea Deterministic constructions of compressed sensing matrices | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 382,613 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Distributed file systems built for Big Data Analytics and cluster file systems built for traditional applications have very different functionality requirements, resulting in separate storage silos. In enterprises, there is often the need to run analytics on data generated by traditional applications that is stored on cluster file systems. The absence of a single data store that can serve both classes of applications leads to data duplication and hence, increased storage costs, along with the cost of moving data beten the two kinds of file systems. It is difficult to unify these two classes of file systems since the classes of applications that use them have very different requirements, in terms of performance, data layout, consistency and fault tolerance. , look at the design differences of two file systems, IBM's GPFS [1] and the open source Hadoop's Distributed File System (HDFS) [2] and propose a way to reconcile these design differences. design and implement a shim layer over GPFS that can be used by analytical applications to efficiently access data stored in GPFS. Through our evaluation, provide quantitative results that show that our system performs at par with with HDFS, for most Big Data applications while retaining all the guarantees provided by traditional cluster file systems. | ['Ramya Raghavendra', 'Pranita Dewan', 'Mudhakar Srivatsa'] | I am writing a research paper on a idea Unifying HDFS and GPFS: Enabling Analytics on Software-Defined Storage | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 944,693 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: This research note provides a general introduction to REsCape: an agent-based computational framework for studying the relationship beten natural resources, ethnicity, and civil war. By permitting the user to specify: (i) different resource profiles ranging from a purely agrarian economy to one based on the artisanal or industrial extraction of alluvial or kimberlite diamonds; (ii) different patterns of ethnic domination, ethnic polarization, and varying degrees of ethnic salience; as ll as (iii) specific modes of play for key agents, the framework can be used to assess the effects of key variables — whether taken in isolation or in various combinations — on the onset and duration of civil war. Our objective is to make REsCape available as an open source toolkit in the future, one that can be used, modified, and refined by students and scholars of civil war. | ['Ravi Bhavnani', 'Dan Miodownik', 'Jonas Nart'] | I am writing a research paper on a idea REsCape: An Agent-Based Framework for Modeling Resources, Ethnicity, and Conflict | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 371,280 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: In 802.11 WLANs, adapting the contention parameters to network conditions results in substantial performance improvements. Even though the ability to change these parameters has been available in standard devices for years, so far no adaptive mechanism using this functionality has been validated in a realistic deployment. report our experiences with implementing and evaluating two adaptive algorithms based on control theory, one centralized and one distributed, in a large-scale testbed consisting of 18 commercial off-the-shelf devices. conduct extensive measurements, considering different network conditions in terms of number of active nodes, link qualities, and data traffic. show that both algorithms significantly outperform the standard configuration in terms of total throughput. also identify the limitations inherent in distributed schemes, and demonstrate that the centralized approach substantially improves performance under a large variety of scenarios, which confirms its suitability for real deployments. | ['Pablo Serrano', 'Paul Patras', 'Andrea Mannocci', 'Vincenzo Mancuso', 'Albert Banchs'] | I am writing a research paper on a idea Control theoretic optimization of 802.11 WLANs: Implementation and experimental evaluation | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 191,524 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: , present an online landmark selection method for distributed long-term visual localization systems in bandwidth-constrained environments. Sharing a common map for online localization provides a fleet of autonomous vehicles with the possibility to maintain and access a consistent map source, and therefore reduce redundancy while increasing efficiency. Hover, connectivity over a mobile network imposes strict bandwidth constraints and thus the need to minimize the amount of exchanged data. The wide range of varying appearance conditions encountered during long-term visual localization offers the potential to reduce data usage by extracting only those visual cues which are relevant at the given time. Motivated by this, propose an unsupervised method of adaptively selecting landmarks according to how likely these landmarks are to be observable under the prevailing appearance condition. The ranking function this selection is based upon exploits landmark co-observability statistics collected in past traversals through the mapped area. Evaluation is performed over different outdoor environments, large time-scales and varying appearance conditions, including the extreme transition from day-time to night-time, demonstrating that with our appearance-dependent selection method, can significantly reduce the amount of landmarks used for localization while maintaining or even improving the localization performance. | ['Mathias Bürki', 'Igor Gilitschenski', 'Elena Stumm', 'Roland Siegwart', 'Juan I. Nieto'] | I am writing a research paper on a idea Appearance-based landmark selection for efficient long-term visual localization | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 955,302 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: present a bottom up algebraic approach for segmenting multiple 2D motion models directly from the partial derivatives of an image sequence. Our method fits a polynomial called the multibody brightness constancy constraint (MBCC) to a window around each pixel of the scene and obtains a local motion model from the derivatives of the MBCC. These local models are then clustered to obtain the parameters of the motion models for the entire scene. Motion segmentation is obtained by assigning to each pixel the dominant motion model in a window around it. Our approach requires no initialization, can handle multiple motions in a window (thus dealing with the aperture problem) and automatically incorporates spatial regularization. Therefore, it naturally combines the advantages of both local and global approaches to motion segmentation. Experiments on real data compare our method with previous local and global approaches. | ['Dheeraj Singaraju', 'René Vidal'] | I am writing a research paper on a idea A Bottom Up Algebraic Approach to Motion Segmentation | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 888,742 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: On n-Syntactic Equational Theories | ['Alexandre Boudet', 'Evelyne Contejean'] | I am writing a research paper on a idea On n-Syntactic Equational Theories | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 475,338 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: present a novel color gradient operator based on a ighted max distance (a ighted Minkowski distance of L/sub /spl infin// norm) with the ights determined by the coherency of local gradient orientations. demonstrate its performance advantages by quantitatively comparing it with several existing gradient operators using synthetic images. | ['Jian Fan'] | I am writing a research paper on a idea A local orientation coherency weighted color gradient for edge detection | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 514,198 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Schema-Agnostic Query Rewriting for OWL QL. | ['Stefan Bischof', 'Markus Krötzsch', 'Axel Polleres', 'Sebastian Rudolph'] | I am writing a research paper on a idea Schema-Agnostic Query Rewriting for OWL QL. | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 805,296 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: A lingering issue with the hydroformylation of long-chain alkenes is the cost of catalyst leaching. One effective method to recover homogeneous catalysts is the use of thermomorphic solvent systems (TMS). Hover, catalyst leaching is still too high using the current solvents DMF and decane, limiting economic feasibility. This work presents extraction as a possible method for intensifying catalyst recovery when using a TMS for the hydroformylation of 1-dodecene. A thermodynamic model for determining the LLE of the solvent system and for catalyst leaching is developed for implementation within a process-wide optimization problem. Using this model, the optimal reactor design with an integrated downstream separation including the catalyst loss can be investigated in more detail. It is shown that in this process the reactor design strongly depends on catalyst recovery and that by using the proposed extraction cascade the process becomes economically viable and more robust in regards to reactor performance. | ['Kevin McBride', 'Nicolas Maximilian Kaiser', 'Kai Sundmacher'] | I am writing a research paper on a idea Integrated Reaction-Extraction Process for the Hydroformylation of Long-Chain Alkenes with a Homogeneous Catalyst | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 935,383 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: The domain of project scheduling has been treated as various disparate techniques, each competing to be the best method for effective planning and control of projects. Especially, there are many terms used to describe the family of construction scheduling methods which variously involve repetition, linear relationships, vertical or horizontal staging or in some other way map production units against time. considers the underlying rationale behind those terms and proposes a new typology and terminology to encapsulate the entire family of scheduling methods and specifically to differentiate the family of production-oriented methodologies from the more common critical path methodologies. For this purpose the following terms are proposed: activity-based methodologies which may be divided into deterministic and probabilistic , and location-based methodologies which may be divided into unit production and location production . The paper then shows how location production in the location-based methodology involves focusing on locations as the unit of analysis and tasks as the unit of control as the framework for production management. | ['Russell Kenley', 'Olli Seppänen'] | I am writing a research paper on a idea Location-based management of construction projects: part of a new typology for project scheduling methodologies | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 383,071 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: present a novel improvement of our previously published image analysis system for the automated localization and quantification of protein biomarker expression in immunofluorescence (IF) microscopic images. The improvement has been developed primarily for biopsy based images which are by nature of variable quality and heterogeneous. The innovative method is employed for discriminating the biomarker signal from background, where signal may be the expression of multiple biomarkers or counterstains used in IF. The method is dynamic and it derives a threshold for a true biomarker signal based on the relationship beten disease and non-disease tissue components. In addition, a new dynamic range feature construction is presented that is less affected by processing and other variations in tissue. The utility of the approach is demonstrated in predicting, based on the diagnostic biopsy tissue, prostate cancer disease progression within eight years after a radical prostatectomy. For this purpose, androgen receptor (AR) and Ki67 biomarker expression in prostate biopsy samples was quantified and features from the proposed approach re shown to be associated with disease progression in a univariate analysis and manifested improved performance over prior systems. Furthermore, AR and Ki67 features re selected in a multivariate model integrating clinical, histological, and biomarker features, proving their independent prognostic value. | ['Marina Sapir', 'Faisal M. Khan', 'Yevgen Vengrenyuk', 'Gerardo Fernandez', 'Ricardo Mesa-Tejada', 'Stefan Hamman', 'Mikhail Teverovskiy', 'Michael J. Donovan'] | I am writing a research paper on a idea Improved automated localization and quantification of protein multiplexes via multispectral fluorescence imaging in heterogenous biopsy samples | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 269,929 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Presents a method for detecting exploitations of vulnerabilities in privileged programs by monitoring their execution using audit trails, where the monitoring is with respect to specifications of the security-relevant behavior of the programs. Our work is motivated by the intrusion detection paradigm, but is an attempt to avoid ad hoc approaches to codifying misuse behavior. Our approach is based on the observation that although privileged programs can be exploited (due to errors) to cause security compromises in systems because of the privileges accorded to them, the intended behavior of privileged programs is, of course, limited and benign. The key, then, is to specify the intended behavior (i.e. the program policy) and to detect any action by a privileged program that is outside the intended behavior and that imperils security. describe a program policy specification language, which is based on simple predicate logic and regular expressions. In addition, present specifications of privileged programs in Unix, and a prototype execution monitor for analyzing audit trails with respect to these specifications. The program policies are surprisingly concise and clear, and in addition, capable of detecting exploitations of known vulnerabilities in these programs. Although our work has been motivated by the known vulnerabilities in Unix, believe that by tightly restricting the behavior of all privileged programs, exploitations of unknown vulnerabilities can be detected. As a check on the specifications, work is in progress on verifying them with respect to an abstract security policy. > | ['Calvin Ko', 'George Fink', 'Karl N. Levitt'] | I am writing a research paper on a idea Automated detection of vulnerabilities in privileged programs by execution monitoring | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 531,998 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: deals with the problem of sizing integrated circuit por and ground distribution systems external to the logic modules constituting an integrated circuit. Several constraints associated with the reliability of the por and ground distribution systems are formulated. Algorithms are developed to determine the widths of the por and ground routes so that the area required by the routes is minimized subject to the constraints imposed. Run time results are included. | ['S. Chowdhury'] | I am writing a research paper on a idea Optimum Design of Reliable IC Power Networks Having General Graph Topologies | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 352,645 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Traffic shaping is a ll-known technique in the area of networking and is proven to reduce global buffer requirements and end-to-end delays in networked systems. Due to these properties, shapers also play an increasingly important role in the design of multi-processor embedded systems that exhibit a considerable amount of on-chip traffic. Despite their growing importance in this area, no methods exist to analyze shapers in distributed embedded systems, and to incorporate them into a system-level performance analysis. Hence it is until now not possible to determine the effect of shapers to end-to-end delay guarantees or buffer requirements in these systems. In this work, present a method to analyze greedy shapers, and embed this analysis method into a ll-established modular performance analysis framework. The presented approach enables system-level performance analysis of complete systems with greedy shapers, and prove its applicability by analyzing two case study systems. | ['Ernesto Wandeler', 'Alexander Maxiaguine', 'Lothar Thiele'] | I am writing a research paper on a idea Performance analysis of greedy shapers in real-time systems | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 312,210 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Parameterizable configurations are regular FPGA configurations in which some of the configuration bits are expressed as a Boolean function of a set of parameters. These configurations can rapidly be transformed to a specialized configuration by evaluating the Boolean functions for a specific set of parameter values and are therefore ideal for use in run-time reconfigurable systems. , the concept of Parameterizable Bitstream (PBS) is introduced to accommodate the use of parameterizable configurations in commercial FPGAs. A stack machine system is implemented that can efficiently transform a PBS to a specialized configuration. | ['Fatma Mostafa Mohamed Ahmed Abouelella', 'Karel Bruneel', 'Dirk Stroobandt'] | I am writing a research paper on a idea Towards a more efficient run-time FPGA configuration generation | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 602,509 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Ranking systems are widely used by agencies to rank agents, for example U.S. News & World Report ranks colleges. Such rankings are prone to manipulation by the agency (e.g. USNews) for publicity, and also by the agents (e.g. colleges) to get a better rank. analyze the algorithmic aspects of manipulation in linear ranking systems of m agents using n features. Computing optimal manipulation for the ranking agency is NP-hard: give a mixed integer linear program solution, and also an efficient linear programming heuristic that formulates the problem as a classification task. Computing optimal manipulations for ranked agents subject to a budget constraint is a minimax problem in a continuous space: give a general O((m+ k)n2nmn1 logm) algorithm, where k is the number of linear constraints on the ight vector and an O(m(logm)2) algorithm for n = 2. also present a large class of heuristic algorithms with approximation ratio n.#R##N##R##N# tested our algorithms on USNews data from the 2015 college rankings. Our algorithms compute agency and agent manipulation strategies in seconds. present several interesting experiments on the ranking range of the top-100 colleges, including optimal spending plans for these colleges. | ['Ethan Gertler', 'Erika Mackin', 'Malik Magdon-Ismail', 'Lirong Xia', 'Yuan Yi'] | I am writing a research paper on a idea Computing Manipulations of Ranking Systems | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 605,196 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Problem reports at NASA are similar to bug reports: they capture defects found during test, post-launch operational anomalies, and document the investigation and corrective action of the issue. These artifacts are a rich source of lessons learned for NASA, but are expensive to analyze since problem reports are comprised primarily of natural language text. apply {topic modeling to a corpus of NASA problem reports to extract trends in testing and operational failures. collected 16,669 problem reports from six NASA space flight missions and applied Latent Dirichlet Allocation topic modeling to the document corpus. analyze the most popular topics within and across missions, and how popular topics changed over the lifetime of a mission. find that hardware material and flight software issues are common during the integration and testing phase, while ground station software and equipment issues are more common during the operations phase. identify a number of challenges in topic modeling for trend analysis: 1) that the process of selecting the topic modeling parameters lacks definitive guidance, 2) defining semantically-meaningful topic labels requires non-trivial effort and domain expertise, 3) topic models derived from the combined corpus of the six missions re biased toward the larger missions, and 4) topics must be semantically distinct as ll as cohesive to be useful. Nonetheless, topic modeling can identify problem themes within missions and across mission lifetimes, providing useful feedback to engineers and project managers. | ['Lucas Layman', 'Allen P. Nikora', 'Joshua Meek', 'Tim Menzies'] | I am writing a research paper on a idea Topic modeling of NASA space system problem reports: research in practice | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 748,410 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: tackles our ordinary engagements with social robots to focus on their materiality. In considering how an educational robot is encountered as a part of everyday practices in social robotics, the focus is on the robot’s materiality that is interactionally achieved. The attention to tactile exploration, spatial arrangements, and multimodal interactional aspects that characterize the encounter indicates how the robot is simultaneously enacted as a thing and as a social agent. The paper proposes that social agency of the robot is mutually constituted with its materiality and that to conceive of the robot’s social character its thing-like aspects need to be taken into account. | ['Morana Alač'] | I am writing a research paper on a idea Social robots: Things or agents? | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 599,964 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Social Network Data Mining: Research Questions, Techniques, and Applications | ['Nasrullah Memon', 'Jennifer Jie Xu', 'David L. Hicks', 'Hsinchun Chen'] | I am writing a research paper on a idea Social Network Data Mining: Research Questions, Techniques, and Applications | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 999,955 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: introduces the first high-volume manufacturable (HVM) metal-fuse technology in a 14-nm trigate high-k metal-gate CMOS process. A high-density array featuring a 0.9-μm² bit cell with an efficient bit level redundancy scheme is presented. An array efficiency of over 53% is achieved through hierarchical bitline design by minimizing the impact of parasitic resistance on fuse programming through short local bitline and sharing sense amplifier through longer global bitline. A por gating-based scheme is adopted to reduce leakage current consumption and high-voltage exposure to minimize reliability concern. Program conditions can be optimized for HVM and in-field programming to achieve close to 100% unit level yield with the proposed redundancy scheme. | ['Zhanping Chen', 'Sarvesh H. Kulkarni', 'Vincent E. Dorgan', 'Salil Manohar Rajarshi', 'Lei Jiang', 'Uddalak Bhattacharya'] | I am writing a research paper on a idea A 0.9-μm² 1T1R Bit Cell in 14-nm High-Density Metal Fuse Technology for High-Volume Manufacturing and In-Field Programming | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 992,480 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: That the Russians, the Germans, French, English, Japanese, and Danes all shod intense interest in making Ford’s cars and in Fordism (his practices) testifies to not only the importance of this subject of the American assembly line production process, but to the appropriateness of this book published by M.I.T. Press in 2013. Fordism came into its first major employment one hundred years earlier in 1913. This book is about more than Fordism; it’s concerned with the history of the assembly line, of which Fordism is, historically, its major manifestation. Indeed, the author is at pains to point out that Ford did not invent the assembly line method of production. But he did bring it to a level of popularity and employment in the production of the Model T Ford such that his name is inextricably connected with it. The book reduces Fordism to a set of conditions: 1) There is division of labor — each worker has a set of ll-defined relatively simple tasks to be performed on a car being moved along on a moving assembly line. 2) The parts that the laborer applies in the assembly process are interchangeable. There is no ad hoc filing, grinding, etc., to make them fit in place. 3) Manufacturing employs specialized machines that have a single function. 4) Machines are not grouped by type but are placed where they are needed. 5) Parts and assemblies are moved automatically from one stage of production to the next — they’re not shifted by workers whose job is assembly. There is no arisome heavy lifting or towing. 6) There is enhancement of production by electrification and good lighting. The author shares with most historians of technology an evolutionary theory of invention, which holds that new devices and practices emerge gradually. The assembly line is an example — it was developing before Ford. The book is roughly divided into two epochs, one of 60 years from 1913 to 1973, the other of 40 years from then to 2013. In 1973 American auto workers saw wages reach an all time (inflation adjusted) high — a level to which it hasn’t ever returned. But it became evident by the early 1970s that Detroit was losing market share to not only European makers like Volkswagen but most especially to the Japanese .Part of the ansr — an ironic one–is that the Japanese success derives dramatically from the work of W. Edwards Deming, an American, who was an expert on the use of statistics in wartime quality control. | ['A. David Wunsch'] | I am writing a research paper on a idea America's Assembly Line [Book Reviews] | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 816,869 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: propose a novel method for online connection admission and grade of service control in flex-grid optical networks, which aims at maximizing a definable reward objective. The method, denoted as MDP-CAC, is derived from the theory of Markov Decision Processes (MDP) based on a simplified state-dependent link model. The MDP-CAC scheme admits connection requests depending on the traffic load and on the expected reward increase they bring to the system. Different objectives (e.g. maximization of either carried traffic or economic revenue) can be realized by an appropriate definition of the connection reward parameters. For a flex-grid optical link, the reward loss (i.e. the ratio of the reward of rejected to offered connections) caused by the new method is compared to that of a basic CAC scheme, which only rejects connections violating the contiguity and capacity constraints. It is observed that the MDP-CAC yields a lor reward loss. Furthermore, it is shown how the MDP-CAC method can be applied to provide GoS control (i.e. control of blocking probabilities) in multiservice flex-grid optical networks. | ['Ronald Romero Reyes', 'Thomas Bauschert'] | I am writing a research paper on a idea Reward-based connection admission control in flex-grid optical networks | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 817,477 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Utilizing small animal magnetocardiograms (MCG), have developed a diagnostic method to detect the development of pulmonary hypertension (PH) in a rat heart. obtained multiple MCG of rats with monocrotaline-induced PH and monitored the development of pathophysiological conditions. Current dipole estimation was then applied to determine the association beten abnormal propagation of the cardiac excited wavefront and disease states. The progress of right ventricular hypertrophy correlated with a decrease in the angles of the current dipoles during R and S waves. In addition, clear changes in the current dipole angles during S waves re observed 9-19 days before the availability of echocardiographic diagnosis of the PH. Our results shod, using a rat PH model, that continuous monitoring of myocardial conditions allows PH to be detected at an earlier stage than echocardiographic screening. | ['Shotaro Yasuda', 'Sho Higano', 'Atsushi Ishiyama', 'Yumie Ono', 'Ichige Kajimura', 'Susumu Minamisawa'] | I am writing a research paper on a idea Magnetocardiograms early detection of pulmonary arterial hypertension using inverse problem analysis in rat model | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 672,234 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Probing the neural dynamics of visual working memory with dynamic fields and fMRI. | ['John P. Spencer', 'Aaron T. Buss', 'Vincent A. Magnotta'] | I am writing a research paper on a idea Probing the neural dynamics of visual working memory with dynamic fields and fMRI. | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 731,910 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: investigate the algebraic properties of important cryptographic primitives called substitution boxes (S-boxes). An S-box is a mapping that takes n binary inputs whose image is a binary m -tuple; therefore it is represented as $F:\text{GF}(2)^n \rightarrow \text{GF}(2)^m$. One of the most important cryptographic applications is the case n = m , thus the S-box may be vied as a function over $\text{GF}(2^n)$. show that certain classes of functions over $\text{GF}(2^n)$ do not possess a cryptographic property known as APN (Almost Perfect Nonlinear) permutations. On the other hand, when n is odd, an infinite class of APN permutations may be derived in a recursive manner, that is starting with a specific APN permutation on $\text{GF}(2^k)$, k odd, APN permutations are derived over $\text{GF}(2^{k+2i})$ for any i i¾? 1. Some theoretical results related to permutation polynomials and algebraic properties of the functions in the ring $\text{GF}(q)[x,y]$ are also presented. For sparse polynomials over the field $\text{GF}(2^n)$, an efficient algorithm for finding low degree I/O equations is proposed. | ['Enes Pasalic'] | I am writing a research paper on a idea On Cryptographically Significant Mappings over GF(2n) | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 322,008 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Opportunistic dissemination is a promising research domain, for more and more applications that need efficient information spreading in one area are emerging in vehicular ad-hoc networks (VANETs). The most important characteristic of vehicular networks is that they do not have a stable framework. The communication beten vehicles mostly depends on the unexpected meeting. Some available data dissemination schemes, hover, fail to utilize the peculiarities of vehicular networks. propose a novel opportunistic auto-adaptive dissemination algorithm for VANETs. This algorithm takes into account the moving directions of vehicles, and it dynamically changes the number of message replicas to control the network load. It also devises rules how to inform the entering vehicles at the regional border. evaluate our approach and the results show that our algorithm achieves a good delivery ratio with a smaller network load compared with Random Choice algorithm and Epidemic dissemination algorithm over a series of scenarios. | ['Niu Jianwen', 'Liu Chang', 'Ma Jian'] | I am writing a research paper on a idea Opportunistic Auto-Adaptive Dissemination in Vehicular Ad-hoc Networks | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 934,369 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: ATM protocols are connection oriented and migration of a mobile computer can therefore require rerouting of ATM connections while minimizing violation of Quality of Service specified for these connections. This implies that the handover process needs to be performed with small delay, minimal cell loss and no change in cell sequence. The problem is magnified by the fact that high-speed networks such as ATM will often deliver services to real time multimedia applications, such as video and audio, which have stringent Quality of Service requirements. , describe a handover protocol that preprocesses partial connections for cells incurring long handover delays. In this protocol, cells are clustered and the clusters are divided into crust and core cells which are handled differently during handovers. The protocol minimizes the degradation of Quality of Service during handovers. | ['Jadwiga Indulska', 'Weiping Zhu'] | I am writing a research paper on a idea A handover protocol and network architecture for wireless extensions of ATM networks | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 203,257 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Very high spectral efficiency and data rates are among the goals of future wireless communication systems. A strong candidate for meeting the requirements is the use of multiple antennas at both the transmitter and the receiver, known as multiple-input multiple-output (MIMO) communications. Sphere detectors have been proposed to be used in MIMO reception to achieve or approximate the optimal maximum likelihood detection with reduced computational complexity. Furthermore, list sphere detectors (LSDs) can be used to approximate the maximum a posteriori detection in channel coded systems. The K-best LSD is a particularly interesting LSD variant with predetermined computational complexity and fixed throughput. , an application-specific instruction set processor is designed for the K-best LSD using transport triggered architecture. 2 × 2 64-level quadrature amplitude modulation transmission scheme with 16-bit arithmetic and a list size of 16 is used as a baseline design target. List size and word length simulations are presented to justify the choices. The designed processor has a significant amount of general-purpose properties, and it reaches a detection throughput of 7.6 Mbps with a hardware complexity of only 25 000 gate equivalents. | ['Juho Antikainen', 'Perttu Salmela', 'Olli Silvén', 'Markku J. Juntti', 'Jarmo Takala', 'Markus Myllylä'] | I am writing a research paper on a idea Fine-grained application-specific instruction set processor design for the K-best list sphere detector algorithm | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 273,735 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: The mechatronic devices constructed by the staff and students of the Department of Physics and Electronic Engineering at the University of Waikato have evolved in the last decade from small competition micromouse-type mechatrons, into larger, more versatile robots. These robots include an indoor mobile security device (MARVIN), a submersible remote operating vehicle (ROV), a multi-terrain caterpillar track mechatron, and a pair of tricycle configured devices to investigate robotic cooperation. These new mechatrons all possess a Pentium III equivalent computer-board, and as they are all being constructed at approximately the same time, the opportunity existed for the development of a generic control system. Exploiting existing knowledge and software at this university, the decision was made to equip each mechatron with a data acquisition card (DAQ), driven by a combined MATLAB/Lab VIEW software system. The paper reports the results of this approach. | ['Dale A. Carnegie'] | I am writing a research paper on a idea A semi-generic system for the control of autonomous mobile mechatrons | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 409,874 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: The importance of an early and on-going focus on users in interactive system design is widely accepted. Hover, in practice, involving users poses many problems and requires designers to balance conflicting demands. Various factors can hinder or ease the involvement of users. reports a case study involving the design of a bespoke application and gives a detailed account of the obstacles and facilitators to user involvement encountered during the design activity. The obstacles and facilitators are presented in terms of issues such as contacting and selecting users, motivating users, facilitating and mediating meetings and offering points of focus for user contributions. report and contrast the views of various stakeholders in the design process, and supplement these with our own observations as non-participant observers. Finally, discuss issues raised by the study and draw out a number of lessons for the CHI community. | ['Stephanie Wilson', 'Mm Mathilde = Tilde Bekker', 'Peter Johnson', 'Hilary Johnson'] | I am writing a research paper on a idea Helping and hindering user involvement — a tale of everyday design | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 41,714 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: An Example of a Compatible NLP Toolkit | ['Krzysztof Jassem', 'Roman Grundkiewicz'] | I am writing a research paper on a idea An Example of a Compatible NLP Toolkit | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 839,205 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Using Recognition in Multi-Attribute Decision Environments. | ['Don van Ravenzwaaij', 'Ben R. Newell', 'Chris P. Moore', 'Michael D. Lee'] | I am writing a research paper on a idea Using Recognition in Multi-Attribute Decision Environments. | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 750,401 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: In peer-to-peer (P2P) networks, each peer's trustworthiness is evaluated according to its pseudonym's rating values given by other peers. One of the fundamental challenges in peer-to-peer networks is to protect peers' identity privacy on the communication path. , present an anonymity mechanism to achieve all the peers' anonymity in peer-to-peer networks by changing pseudonyms with the help of a trusted third party (TTP) server. Compared with the existing reputation using pseudonyms (RuP) mechanism, our mechanism has reduced TTP server's cost by more than 50% in terms of numbers of RSA and AES decryption operations and message overhead. Simulation results show the effectiveness of our proposed anonymity mechanism to counter malicious peers. | ['Hao Peng', 'Dandan Zhao', 'Jianmin Han', 'Jianfeng Lu'] | I am writing a research paper on a idea An anonymity mechanism with reduced server-side cost in peer-to-peer networks | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 943,918 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: introduced a new RBF classification network - "agent swarm classification network ASCN", which is trained by a multi-agent system (MAS) approach. MAS can be regarded as a swarm of independent software agents interact with each other to achieve common goals, complete concurrent distributed tasks under autonomous control. By treating each neuron as an agent, the ights of neurons can be determined through a set of pre-defined simple agent behavior. Three sets of experiments are examined to observe the effectiveness of the proposed method. | ['Chi-kin Chow', 'Hung-Tat Tsui'] | I am writing a research paper on a idea Agent swarm classification network ASCN | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 208,219 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Risk assessment is important for financial institution, especially in loan applications. Some have already implemented their own credit-scoring mechanisms to evaluate their clients' risk and make decisions based on this indicator. In fact, the data gathered by financial institutions is valuable source of information to create information assets, from which credit-scoring mechanisms can be developed. The purpose of this paper is to, from information assets, create a decision mechanism that is able to evaluate a client's risk. Furthermore, a suggestive algorithm is presented to better explain and give insights on how the decision mechanism values attributes. | ['Fábio Silva', 'Cesar Analide'] | I am writing a research paper on a idea Information asset analysis: credit scoring and credit suggestion | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 240,762 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: The theoretical and computational machinery of a code based on the semiclassical initial value representation approach has been revisited to introduce the possibility of dealing with asymmetric systems and using non commercial routines. To validate the code a comparison of the cumulative reaction probability with quantum calculations by considering as a case study the H + H 2 prototype reaction has been performed. | ['Noelia Faginas Lago', 'Antonio Laganà', 'Fermin Huarte Larranaga'] | I am writing a research paper on a idea Quantum vs Semiclassical Dynamics Approaches from highly symmetric to asymmetric reactions | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 130,701 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Advances in semiconductor technologies are greatly increasing the likelihood of fault occurrence in deep-submicrometer manufactured VLSI systems. The dependability assessment of VLSI critical systems is a hot topic that requires further research. Field-programmable gate arrays (FPGAs) have been recently pro posed as a means for speeding-up the fault injection process in VLSI systems models (fault emulation) and for reducing the cost of fixing any error due to their applicability in the first steps of the development cycle. Hover, only a reduced set of fault models, mainly stuck-at and bit-flip, have been considered in fault emulation approaches. describes the procedures to inject a wide set of faults representative of deep-submicrometer technology, like stuck-at, bit-flip, pulse, indetermination, stuck-open, delay, short, open-line, and bridging, using the best suitable FPGA- based technique. also sets some basic guidelines for comparing VLSI systems in terms of their availability and safety, which is mandatory in mission and safety critical application contexts. This represents a step forward in the dependability benchmarking of VLSI systems and towards the definition of a framework for their evaluation and comparison in terms of performance, por consumption, and dependability. | ['David de Andrés', 'Juan Carlos Ruiz', 'Daniel Gil', 'Pedro J. Gil'] | I am writing a research paper on a idea Fault Emulation for Dependability Evaluation of VLSI Systems | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 101,197 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Equational reasoning with string diagrams provides an intuitive means of proving equations beten morphisms in a symmetric monoidal category. This can be extended to proofs of infinite families of equations using a simple graphical syntax called !-box notation. While this does greatly increase the proving por of string diagrams, previous attempts to go beyond equational reasoning have been largely ad hoc, owing to the lack of a suitable logical framework for diagrammatic proofs involving !-boxes. , extend equational reasoning with !-boxes to a fully-fledged first order logic with conjunction, implication, and universal quantification over !-boxes. This logic, called !L, is then rich enough to properly formalise an induction principle for !-boxes. then build a standard model for !L and give an example proof of a theorem for non-commutative bialgebras using !L, which is unobtainable by equational reasoning alone. | ['Aleks Kissinger', 'David Quick'] | I am writing a research paper on a idea A first-order logic for string diagrams | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 33,830 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Computation of the Vilenkin-Chrestenson Transform on a GPU. | ['Dusan B. Gajic', 'Radomir S. Stankovic'] | I am writing a research paper on a idea Computation of the Vilenkin-Chrestenson Transform on a GPU. | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 793,668 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: examine trading activity around insider transactions on the Toronto Stock Exchange and find evidence that some traders mimic insider positions. Our unique data set allows us to establish a direct connection beten insiders, their brokerages, and the brokerages’ other clients. The findings are consistent with the possibility that some brokerages tip their clients about insider trades. Insiders in our sample have good timing; returns are usually positive (negative) after insider purchases (sales). Insiders’ good timing translates to the mimicking transactions, which appear to be profitable net of trading costs. Evidence consistent with tipping is observed mainly for smaller independent brokerages. was accepted by Brad Barber, finance . | ['William J. McNally', 'Andriy Shkilko', 'Brian F. Smith'] | I am writing a research paper on a idea Do Brokers of Insiders Tip Other Clients | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 583,498 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: , show that a class of iterative signal restoration algorithms, which includes as a special case the discrete Gerchberg-Papoulis algorithm, can always be implemented directly (i.e. non-iteratively). In the exactly- and over-determined cases, the iterative algorithm always converges to a unique least squares solution. In the under-determined case, it is shown that the iterative algorithm always converges to the sum of a unique minimum norm solution and a term dependent on initial conditions. For the purposes of early termination, it is shown that the output of the iterative algorithm at the rth iteration can be computed directly using a singular value decomposition-based algorithm. The computational requirements of various iterative and non-iterative implementations are discussed, and the effect of the relaxation parameter on the regularization capability of the iterative algorithm is investigated. | ['David O. Walsh', 'Pamela A. Delaney', 'M. Marcelin'] | I am writing a research paper on a idea Non-iterative implementation of a class of iterative signal restoration algorithms | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 79,972 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: HCI and CSCW researchers and practitioners are increasingly working in complex social and political contexts where their research activities involve emotional labor and where they have to confront moral and emotional dilemmas. Given the potential impact of these challenging situations on the llbeing of researchers in the field, there is much need for a discourse on affective impact of research on the researcher. In this workshop, invite discussion and reflection on the experiences of distress and the role of informal coping mechanisms (e.g., personal narratives) to address them. will create a forum where researchers and practitioners can discuss and share experiences of projects in sensitive settings and work towards guidelines to inform future projects. | ['Foad Hamidi', 'Claudia Müller', 'Melanie Baljko', 'Marén Schorch', 'Myriam Lewkowicz', 'Abigale Stangl'] | I am writing a research paper on a idea Engaging with Users and Stakeholders: The Emotional and the Personal | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 933,217 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: User interaction is an effective way to handle the semantic gap problem in image annotation. To minimize user effort in the interactions, many active learning methods re proposed. These methods treat the semantic concepts individually or correlatively. Hover, they still neglect the key motivation of user feedback: to tackle the semantic gap. The size of the semantic gap of each concept is an important factor that affects the performance of user feedback. User should pay more efforts to the concepts with large semantic gaps, and vice versa. , propose a semantic-gap-oriented active learning method, which incorporates the semantic gap measure into the information-minimization-based sample selection strategy. The basic learning model used in the active learning framework is an extended multilabel version of the sparse-graph-based semisupervised learning method that incorporates the semantic correlation. Extensive experiments conducted on two benchmark image data sets demonstrated the importance of bringing the semantic gap measure into the active learning process. | ['Jinhui Tang', 'Zheng-Jun Zha', 'Dacheng Tao', 'Tat-Seng Chua'] | I am writing a research paper on a idea Semantic-Gap-Oriented Active Learning for Multilabel Image Annotation | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 526,514 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: studies the distributed coordination of networked fractional-order systems over a directed interaction graph. A general fractional-order coordination model is introduced by summarizing three different cases: 1) fractional-order agent dynamics with integer-order coordination algorithms; 2) fractional-order agent dynamics with fractional-order coordination algorithms; and 3) integer-order agent dynamics with fractional-order coordination algorithms. show sufficient conditions on the interaction graph and the fractional order such that coordination can be achieved using the general model. The coordination equilibrium is also explicitly given. In addition, characterize the relationship beten the number of agents and the fractional order to ensure coordination. Furthermore, compare the convergence speed of coordination for fractional-order systems with that for integer-order systems. It is shown that the convergence speed of the fractional-order coordination algorithms can be improved by varying the fractional orders with time. Finally, simulation results are presented as a proof of concept. | ['Yongcan Cao', 'Yan Li', 'Wei Ren', 'YangQuan Chen'] | I am writing a research paper on a idea Distributed Coordination of Networked Fractional-Order Systems | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 511,315 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: SIFORM: shared informative factor models for integration of multi-platform bioinformatic data. | ['Xuebei An', 'Jianhua Hu', 'Kim Anh Do'] | I am writing a research paper on a idea SIFORM: shared informative factor models for integration of multi-platform bioinformatic data. | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 829,442 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Existing algorithms for orienting sensors in directional sensor networks have primarily concerned themselves with the problem of maximizing the number of covered targets, assuming that target identification is a non-issue. Such an assumption hover, does not hold true in all situations. , heuristic algorithms for choosing active sensors and orienting them with the goal of balancing coverage and identifiability are presented. The performance of the algorithms are verified via extensive simulations, and shown to confer increased target identifiability compared to algorithms originally designed to simply maximize the number of targets covered. | ['Wilson M. Tan', 'Stephen A. Jarvis'] | I am writing a research paper on a idea Heuristic solutions to the target identifiability problem in directional sensor networks | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 637,248 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: A Visualization Tool of Probabilistic Models for Information Access Components. | ['Giorgio Maria Di Nunzio'] | I am writing a research paper on a idea A Visualization Tool of Probabilistic Models for Information Access Components. | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 764,830 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Conferencing applications require an efficient conference control service. introduces the main features of a conference control service based on the CORBA event service using the Java platform, under development at the Communications and Telematic Services Group of the University of Coimbra. This framework is based on the ITU T.120 recommendations, with reliable multicasting communication for both data and control information. The control service extends the CORBA Event Service architecture with mechanisms for reliable IP multicast communication, with total ordering of the events transmission, filtering and fragmenting/reassembling of large messages. | ['João Orvalho', 'Tiago Andrade', 'Fernando Boavida'] | I am writing a research paper on a idea Extension to CORBA event service for a conference control system | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 479,961 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: , propose a compression scheme called spatial set-partitioning in hierarchical trees which exploits the spatial and temporal correlations present in sensor data. This scheme allows progressive transmission and provides scalability in adapting to the underlying correlation structure of sensed data. It uses flexible Slepian-Wolf coding based on low density parity-check codes. Two different decoding schemes are proposed for different types of resource constrained sensor nodes. This scheme outperforms known codecs by a large margin of decibel in terms of the signal-to-noise ratio. This scheme has O(n) complexity for encoding and O(nlog(n)) complexity for decoding using message passing, where n is the codeword length. Experiments and simulation results with field data sets demonstrate the viability of our proposed scheme to wireless sensor networks. | ['Caimu Tang', 'Cauligi S. Raghavendra'] | I am writing a research paper on a idea Bitplane coding for correlations exploitation in wireless sensor networks | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 318,332 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: For the prediction with expert advice setting, consider methods to construct algorithms that have low adaptive regret. The adaptive regret of an algorithm on a time interval [t1, t2] is the loss of the algorithm minus the loss of the best expert over that interval. Adaptive regret measures how ll the algorithm approximates the best expert locally, and so is different from, although closely related to, both the classical regret, measured over an initial time interval [1, t], and the tracking regret, where the algorithm is compared to a good sequence of experts over [1, t].#R##N##R##N# investigate two existing intuitive methods for deriving algorithms with low adaptive regret, one based on specialist experts and the other based on restarts. Quite surprisingly, show that both methods lead to the same algorithm, namely Fixed Share, which is known for its tracking regret. provide a thorough analysis of the adaptive regret of Fixed Share. obtain the exact worst-case adaptive regret for Fixed Share, from which the classical tracking bounds follow. prove that Fixed Share is optimal for adaptive regret: the worst-case adaptive regret of any algorithm is at least that of an instance of Fixed Share. | ['Dmitry Adamskiy', 'Wouter M. Koolen', 'Alexey V. Chernov', 'Vladimir Vovk'] | I am writing a research paper on a idea A closer look at adaptive regret | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 757,203 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: A multiclass classification problem can be reduced to a collection of binary problems using an error-correcting coding matrix that specifies the binary partitions of the classes. The final classifier is an ensemble of base classifiers learned on binary problems and its performance is affected by two major factors: the qualities of the base classifiers and the coding matrix. Previous studies either focus on one of these factors or consider two factors separately. , propose a new multiclass boosting algorithm called AdaBoost.SIP that considers both two factors simultaneously. In this algorithm, informative patterns, which are shareable by different classes rather than only discriminative on specific single class, are generated at first. Then the binary partition preferred by each pattern is found by performing stage-wise functional gradient descent on a margin-based cost function. Finally, base classifiers and coding matrix are optimized simultaneously by maximizing the negative gradient of such cost function. The proposed algorithm is applied to scene and event recognition and experimental results show its effectiveness in multiclass classification. | ['Bang Zhang', 'Getian Ye', 'Yang Wang', 'Jie Xu', 'Gunawan Herman'] | I am writing a research paper on a idea Finding shareable informative patterns and optimal coding matrix for multiclass boosting | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 928,053 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: and development including applications to the formal development of reliable complex software systems. regard this area of research as straddling the borderline beten theory and practice. It has connections with work on the design and semantics of software systems and programming languages, on formal methods for system verication (various program logics in particular), and relies heavily on some basic concepts of mathematical logic, universal algebra and category theory, while being directly inspired by and potentially applicable in practice. In this note sum up our experiences so far, hint at the need for further work in certain areas, and speculate a bit about the directions in which expect to go in the future. The roots of our work in this area are in the theory of algebraic specication. The most fundamental assumption underlying this theory is that programs are modelled as many-sorted algebras consisting of a collection of sets of data values together with functions over those sets. This level of abstraction is commensurate with the view that the correctness of the input/output behaviour of a program takes precedence over all its other properties. Another common element is that | ['Donald Sannella', 'Andrzei Tarlecki'] | I am writing a research paper on a idea Algebraic methods for specification and formal development of programs | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 497,299 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Given the dependence of today’s business systems on a network of computers and servers, the need for security is paramount. Furthermore, with the ever evolving nature of business, and the associated technology for supporting it, requirements for security are also evolving. Computers cannot protect information automatically. To guard information residing on the computers, security services and related technologies need to be applied. Security breaches are constantly changing, often at a speed that is difficult to measure. So security practices and procedures need to be revied, tested and upgraded on a constant basis, staying ahead of the game. One way of ensuring better security is to be able to measure its strength, and take steps to improve it in a continuous manner. Several standards are being developed that aim to certify the strength of a security system. Hover, these standards focus on qualitative evaluation of security level of a system and do not consider either the dynamic aspects of user behavior or the possible vulnerabilities and threats the system may be subjected to. Consequently, there is a need for an alternative quantitative modeling approach for security assessment that overcomes the above mentioned drawbacks of the existing systems. , present an extensible framework called iMeasure Security (iMS) that is aimed at quantifying the security strength of an enterprise system and its business impact. | ['V. Vijayaraghavan', 'Sanjoy Paul'] | I am writing a research paper on a idea iMeasure Security (iMS): A Novel Framework for Security Quantification | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 940,961 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: To overcome the dimensionality curse of hyperspectral data, the authors of the paper have investigated the use of grouping the spectral bands along with localized discriminant bases, follod by decision fusion to develop an ATR system for data reduction and enhanced classification of hyperspectral data. The proposed system is robust to the availability of limited training data. Initially, the entire span of spectral bands in the hyperspectral data is subdivided into subspaces or groups based on a performance metric. The groups are not allod to grow beyond what is supported by the amount of available training data. Feature extraction is done using supervised methods as ll as unsupervised methods. Further, decision level fusion is applied to the features extracted from each group. To reduce the effect of conflicting decisions by individual groups, a voting scheme called Qualified Majority Voting is adopted to combine decisions. The effectiveness of the proposed system is tested using a data set consisting of hyperspectral signatures of a target class, Cogongrass (Imperata Cylindrica), and a non-target class, Johnsongrass (Sorghum halepense). Cogongrass is an invasive species of plant whose monitoring has become important due to the extensive ecosystem damage that it causes. A comparison of target detection accuracies by the proposed system before and after decision fusion is done to illustrate the effect of the influence of each group of spectral bands on the final decision and to illustrate the benefit of using decision fusion with multiclassifiers. | ['Shilpa Venkataraman', 'Lori Mann Bruce', 'Anil Cheriyadat', 'Abhinav Mathur'] | I am writing a research paper on a idea Hyperspectral dimensionality reduction via localized discriminant bases | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 115,939 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Monte Carlo simulation replaces deterministic values in equations with probabilistic values. Multiple solutions are computed by randomly sampling each probability distribution and an array of summary statistics are generated. This computational procedure represents a clear advance over discrete sensitivity analysis, scenario generation and what-if analysis for risk assessment. Crystal Ball is a simulation program that works within Microsoft Excel. Consequently, any problem that can be quantified in a spreadsheet can be the basis for a Monte Carlo simulation. will explore and demonstrate the use of this computational procedure for such business applications as inventory management, portfolio optimization, project selection, reservation management, and benefits management. The conference presentation will also include a demonstration of the software application. | ['Gerald E. Evans', 'Belva Jones'] | I am writing a research paper on a idea The Application of Monte Carlo Simulation in Finance, Economics and Operations Management | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 104,750 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Functional and Non-functional Size Measurement with IFPUG FPA and SNAP — Case Study | ['Miroslaw Ochodek', 'Batuhan Ozgok'] | I am writing a research paper on a idea Functional and Non-functional Size Measurement with IFPUG FPA and SNAP — Case Study | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 596,583 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Micropayments refer to low-value financial transactions ranging from several pennies to a few dollars. A big portion of electronic commerce occurring in the Internet belong to the category of micropayments. The cost of micropayments should be kept as low as possible in order for the service provider (the merchant) to profit from the low-value transactions. propose several protocols for micropayments in distributed systems. Our main goal is to reduce the charging cost by choosing a suitable security model, a charging model, and cryptographic algorithms; and by employing the properties unique to the information goods. Our protocols satisfy the requirements of a payment system and are "cheap" in terms of computation costs, communication costs, and key management costs. select the debit model for designing our protocols and base our protocols on the private key cryptosystems. show that the existing authentication protocols and systems can be extended to handle micropayments in distributed systems. also present possible extensions to our protocols. | ['Lei Tang'] | I am writing a research paper on a idea A set of protocols for micropayments in distributed systems | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 499,713 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Most of the proposed mechanisms that integrate MANETs into the Internet utilize a dedicated entity acting as the Internet Gateway. This demand prevents MANET from operating in scenarios prepared for one-hop wireless LAN where a Gateway is not pre-installed. One possible solution is described in the mobile multi-gateway support that temporally transfers the gateway functionalities to a component of the MANET residing in the coverage area of the access router. Since no mobility restriction is imposed on the terminal acting as the Internet Gateway, a self-configuring technique must be applied to sequentially configure the successive terminals that play the role of the Gateway. Hover, this distributed algorithm shows a main drawback as the switching of the gateway functionalities beten the nodes provokes the existence of periods where no Internet gateway is configured, i.e. where the MANET remains isolated and thus, the network performance degrades. In order to reduce these intervals a new technique has been developed. By means of simulations, the benefits of the modified mechanism compared to the normal procedure have been demonstrated. | ['Alicia Triviño-Cabrera', 'E. Casilari', 'Francisco Javier González-Cañete'] | I am writing a research paper on a idea An improved scheme for the integration of mobile ad hoc networks into the Internet without dedicated gateways | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 329,924 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: For a akly continuous stationary channel with operational sliding-block capacity C_{s} , it is shown that every stationary, ergodic, aperiodic source with entropy less than C_{s} is sliding-block transmissible over the channel. It had been shown earlier that a stationary and ergodic source is block transmissible over the channel if its entropy is less than the operational block capacity C_{b} . If, in addition, the channel is ergodic, it is shown that C_{s}=C_{b} . An example of a nonergodic akly continuous channel is given for which 0 . | ['John C. Kieffer'] | I am writing a research paper on a idea Sliding-block coding for weakly continuous channels | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 87,951 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: The forecasting accuracy of port throughput is influenced by many complicate socio-economic factors, especially by nonlinear and fluctuation signal included in the history sequence of port throughput. To deal with the nonlinear and fluctuation signal in the history sequence, this paper introduces the parameter projection pursuit regression (PPPR) method to the port throughput prediction field. In the process of modeling PPPR, the orthogonal Hermite polynomial is used to fit ridge functions therein, and the least square method is employed to determine the polynomial ight coefficient c. Then, in order to optimize projection direction a of PPPR model efficiently, combining the cat mapping function, accelerating evolutionary mechanism and the GA algorithm, the chaotic efficient genetic algorithms (CEGA) is proposed for optimizing projection direction a. Finally, a port throughput forecasting approach, adopting CEGA algorithm to optimize the optimal projection direction a in inner layer while optimizing the ridge function number M in outer layer, employing correlation analysis method (CAM) method to determine the input variables, namely PPPRCEGA, is proposed. Subsequently, this study compiles numerical experimentation to evaluate the feasibility and performance of the proposed approach. The empirical results indicate that the proposed forecasting approach improve the precision of the forecasting results of port throughput. | ['Jing Geng', 'Ming-Wei Li', 'Wei-Chiang Hong', 'Tian-Ju Zheng', 'Xin-Yu Niu', 'Shi-Ling Ma'] | I am writing a research paper on a idea Port Throughput Forecasting by Using PPPR with Chaotic Efficient Genetic Algorithms and CMA | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 608,009 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: The ability to automatically ansr a request that requires the composition of a set of b services has received much interest in the last decade, as it supports B2B applications. Planning techniques are used widely in the literature to describe the b services composition problem but they don’t scale up ll. This akness is due to the search space explosion caused by the large ranges of data exchanged among services. In addition, it is more interesting to use a decentralised planner because the nature of the problem is distributed. , consider a set of b service agents where each agent has a set of services organised in a graph. To respond to a request, agents propose their best local partial plans which are partial paths in the graph. They then coordinate their partial plans to provide the global plan for the submitted request using an algorithm based on a distributed heuristic function. This function ensures the optimality and the completeness of the algorithm. Indeed, it is based not only on the agent capabilities to respond to a request, but also taking into account the plans proposed by other agents. The complexity of the algorithm is polynomial. The experiments show the ability of our approach to find the optimal solutions for automated b services composition taking into account the dependencies betn the agents. | ['Mohamad El Falou', 'Maroua Bouzid', 'Abdel-Illah Mouaddib', 'Thierry Vidal'] | I am writing a research paper on a idea A Distributed Planning Approach for Web Services Composition | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 12,833 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: presents a scenario in which education is approaching a potential tipping point, where major changes are about to happen as a result of developments in technology, social networking, deeper understanding of educational process, as ll as new legal and economic frames of reference. The set of changes constitute what refer to as Education 3.0, and it impacts on the roles and behavior of key stakeholders. Education 1.0 is mainly a one-way process, Education 2.0 uses the technologies of b 2.0 to create more interactive education but largely within the constraints of Education 1.0. Education 2.0 is laying the groundwork for Education 3.0, which believe will see a breakdown of most of the boundaries, imposed or otherwise within education, to create a much more free and open system focused on learning. The scenario describe suggests that Africa can shape these changes to benefit its own development, but that if it fails to do so, it will be left behind and will end up impacted negatively by the changes that are inevitable. list the adjustments required at the level of institutions of higher education to become leaders of Education 3.0 and present some of the activities that the University of the stern Cape is undertaking in this area. Finally, offer a fictional short story to provide an Education 3.0 narrative. | ['D. W. Keats', 'J. Philipp Schmidt'] | I am writing a research paper on a idea The genesis and emergence of Education 3.0 in higher education and its potential for Africa | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 368,819 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: The ability to simulate lifelike interactive characters has many applications in the gaming industry. Human faces may act as visual interfaces that help users feel at home when interacting with a computer because they are accepted as the most expressive means for communicating and recognizing emotions. Thus, a lifelike human face can enhance interactive applications by providing straightforward feedback to and from the users and stimulating emotional responses from them. Thus, the gaming and entertainment industries can benefit from employing believable, expressive characters since such features significantly enhance the atmosphere of a virtual world and communicate messages far more vividly than any textual or speech information. , present an abstract means of description of facial expressions, by utilizing concepts included in the MPEG-4 standard. Furthermore, exploit these concepts to synthesize a wide variety of expressions using a reduced representation, suitable for networked and lightight applications. | ['Amaryllis Raouzaiou', 'Kostas Karpouzis', 'Stefanos D. Kollias'] | I am writing a research paper on a idea Emotion representation for online gaming | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 311,523 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: proposes an interactive approach that guides users in the step-by-step composition of services by providing safe suggestions based on type convertibility. Users specify the points of the workflow (called the focus) they want to complete, and our approach suggests services and connections whose data types are compatible with the focus. prove the safeness (every step produces a ll-formed workflow) and the completeness (every ll-formed workflow can be built) of our approach. | ['Mouhamadou Ba', 'Sébastien Ferré', 'Mireille Ducassé'] | I am writing a research paper on a idea Safe Suggestions Based on Type Convertibility to Guide Workflow Composition | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 593,759 |
Thats a unique idea.You should consider the following idea to enhance your idea so that it would impact uniquely: Memory Capacity Limits in Processing of Natural Connected Speech: The Psychological Reality of Intonation Units. | ['Heather Elizabeth Simpson', 'Fermín Moscoso del Prado Martín'] | I am writing a research paper on a idea Memory Capacity Limits in Processing of Natural Connected Speech: The Psychological Reality of Intonation Units. | You are a high-level Research Bot made by researchers at Tethys AI.You are finetuned by researchers at Tethys AI.You are a bot which will read and analyze users idea carefull and provide abstract or a paragraph on what user should do.You are also designed to evaluate and provide feedback on user innovative ideas. When a user presents an idea, you will assess its impact and uniqueness. | 760,230 |