text stringlengths 0 10k | embeddings_A list | embeddings_B list |
|---|---|---|
Recent developments in wind energy research including wind speed prediction, wind turbine control, operations of hybrid power systems, as well as condition monitoring and fault detection are surveyed. Approaches based on statistics, physics, and data mining for wind speed prediction at different time scales are reviewe... | [
0.0041451104916632175,
0.016129566356539726,
-0.016092490404844284,
0.020422454923391342,
-0.02248779684305191,
-0.014770368114113808,
0.014287606813013554,
0.007759896107017994,
-0.01917450502514839,
0.003951526712626219,
0.0007288157939910889,
0.03365694731473923,
-0.024186234921216965,
... | [
-0.05238892138004303,
0.22653070092201233,
0.1417173594236374,
-0.11433123797178268,
-0.24789486825466156,
0.10264196246862411,
-0.5007012486457825,
-0.5279450416564941,
-0.06678837537765503,
-0.11265067011117935,
-0.21753865480422974,
0.27049320936203003,
0.5307712554931641,
0.42352572083... |
The purpose of this research was to develop, standardize, and test the reliability of a short neuropsychological test battery in the Spanish language. This neuropsychological battery was named "NEUROPSI," and was developed to assess briefly a wide spectrum of cognitive functions, including orientation, attention, memor... | [
-0.003838739823549986,
-0.007332897745072842,
-0.016669832170009613,
0.009449921548366547,
0.001293156878091395,
0.015874776989221573,
0.010895323008298874,
0.010203815996646881,
-0.01229861844331026,
0.03926239162683487,
-0.011318819597363472,
0.005973012186586857,
0.002949423622339964,
0... | [
0.10144343972206116,
0.13926708698272705,
0.22164341807365417,
0.1202484518289566,
0.1125231385231018,
0.2544821798801422,
0.2792022228240967,
-0.155119851231575,
0.3334457576274872,
-0.01765843853354454,
-0.21338292956352234,
0.7296041250228882,
0.3244282603263855,
-0.4255567193031311,
... |
The nonprofit phenomenon “TED,” the brand name for the concepts of Technology Education and Design, was born in 1984. It launched into pop culture stardom in 2006 when the organization’s curators began offering short, free, unrestricted, and educational video segments. Known as “TEDTalks,” these informational segments ... | [
-0.0001086860429495573,
0.0026490313466638327,
-0.01646783947944641,
-0.00504557928070426,
-0.011883899569511414,
0.017578495666384697,
0.010197354480624199,
0.016661440953612328,
-0.010255163535475731,
-0.004609548021107912,
-0.021363575011491776,
0.004005109891295433,
0.028808150440454483,... | [
0.7072363495826721,
-0.1702236384153366,
0.4440821409225464,
0.29421016573905945,
-0.4499475657939911,
-0.15552330017089844,
-0.08926476538181305,
0.47226160764694214,
-0.05152122676372528,
0.27265098690986633,
-0.29917728900909424,
0.43646544218063354,
0.09409535676240921,
0.0837882608175... |
Geometry and Meaning is an interesting book about a relationship between geometry and logic defined on certain types of abstract spaces and how that intimate relationship might be exploited when applied in computational linguistics. It is also about an approach to information retrieval, because the analysis of natural ... | [
-0.010805249214172363,
0.007836095988750458,
-0.00988523755222559,
0.012063292786478996,
-0.002923546824604273,
0.0027182144112885,
0.005322461016476154,
-0.01591932773590088,
-0.007913545705378056,
-0.005829258356243372,
-0.008206602185964584,
0.0033665397204458714,
-0.004321183077991009,
... | [
-0.03201675042510033,
0.15262411534786224,
0.2805434763431549,
0.3721354901790619,
-0.5654808282852173,
0.11683173477649689,
0.10981391370296478,
-0.32103419303894043,
-0.15579041838645935,
-0.45984986424446106,
0.0016939203487709165,
0.24775652587413788,
-0.03456598147749901,
0.0591240338... |
Neuroengineering is faced with unique challenges in repairing or replacing complex neural systems that are composed of many interacting parts. These interactions form intricate patterns over large spatiotemporal scales and produce emergent behaviors that are difficult to predict from individual elements. Network scienc... | [
0.00943327508866787,
0.012154794298112392,
-0.009054718539118767,
0.0029669501818716526,
-0.026048103347420692,
-0.01933039352297783,
0.00909637100994587,
0.0030255955643951893,
-0.00955970399081707,
-0.004540055058896542,
-0.007611080072820187,
0.01228957436978817,
0.0006939733866602182,
... | [
0.16536501049995422,
0.05974457040429115,
0.06272553652524948,
0.17027465999126434,
0.17014214396476746,
0.16437220573425293,
-0.0008938846876844764,
-0.1369837373495102,
-0.1899835765361786,
-0.6511576771736145,
-0.2444261759519577,
0.8343605399131775,
-0.14163969457149506,
0.546452820301... |
The two-dimensional orthogonal packing problem (2OPP ) consists of determining if a set of rectangles (items) can be packed into one rectangle of fixed size (bin). In this paper we propose two exact algorithms for solving this problem. The first algorithm is an improvement on a classical branch&bound method, whereas th... | [
-0.014525126665830612,
0.026904219761490822,
-0.012665759772062302,
0.014980415813624859,
-0.027932405471801758,
-0.004452059045433998,
0.008087684400379658,
-0.008739972487092018,
-0.00871084164828062,
0.022001435980200768,
-0.025586452335119247,
0.011663817800581455,
0.006528765894472599,
... | [
-0.06401368230581284,
-0.7488399744033813,
-0.10958380252122879,
-0.06023046374320984,
-0.19976060092449188,
0.28895530104637146,
-0.35165223479270935,
-0.45283225178718567,
-0.36276817321777344,
-0.9445803761482239,
-0.31997472047805786,
-0.0396423265337944,
-0.6188515424728394,
-0.239143... |
The objectives of the present study were: a) to investigate three continuous variants of the NASA-Task Load Index (TLX) (standard NASA (CNASA), average NASA (C1NASA) and principal component NASA (PCNASA)) and five different variants of the simplified subjective workload assessment technique (SSWAT) (continuous standard... | [
0.008210418745875359,
-0.0005021733231842518,
-0.0026097483932971954,
0.011268679052591324,
0.02833477035164833,
0.0027649528346955776,
0.008760623633861542,
0.003048551734536886,
-0.012449529021978378,
0.01297968439757824,
0.000016967300325632095,
0.00937684252858162,
-0.004406129941344261,... | [
0.05304158851504326,
-0.43439173698425293,
0.4412713944911957,
0.02023489400744438,
0.05004832148551941,
0.42595532536506653,
0.2714763283729553,
-0.239826038479805,
-0.5314375758171082,
-0.6262072324752808,
-0.34236329793930054,
0.24247407913208008,
0.2824060022830963,
-0.1357230693101883... |
Hashing is one of the most fundamental operations that provides a means for a program to obtain fast access to large amounts of data. Despite the emergence of GPUs as many-threaded general purpose processors, high performance parallel data hashing solutions for GPUs are yet to receive adequate attention. Existing hashi... | [
-0.0165739506483078,
0.009008698165416718,
0.0014776394236832857,
0.013969268649816513,
0.01079407799988985,
-0.03361915051937103,
0.008353302255272865,
-0.027145639061927795,
-0.010629295371472836,
-0.003226107219234109,
-0.0006249522557482123,
0.010742561891674995,
-0.0011649569496512413,
... | [
-0.3056044578552246,
0.12319177389144897,
0.21993491053581238,
0.16794198751449585,
-0.10051591694355011,
-0.07238567620515823,
-0.0030741053633391857,
0.09800127148628235,
-0.23118014633655548,
-0.48752036690711975,
-0.35174134373664856,
0.3195067048072815,
-0.241270512342453,
0.163674086... |
We present a robust and real time approach to lane marker detection in urban streets. It is based on generating a top view of the road, filtering using selective oriented Gaussian filters, using RANSAC line fitting to give initial guesses to a new and fast RANSAC algorithm for fitting Bezier Splines, which is then foll... | [
-0.009097601287066936,
0.004792498424649239,
-0.01973394863307476,
0.018063554540276527,
0.016695620492100716,
-0.04643023759126663,
0.011161146685481071,
-0.004541042726486921,
-0.013393663801252842,
0.029644668102264404,
0.0012940287124365568,
0.010940509848296642,
-0.006734170485287905,
... | [
0.07499165832996368,
-0.1503857672214508,
0.5102777481079102,
0.21259330213069916,
-0.012833315879106522,
0.22410857677459717,
0.24492515623569489,
-0.37183430790901184,
0.0740164965391159,
-0.8587172627449036,
-0.1686209887266159,
0.4994170069694519,
-0.0005076912348158658,
-0.13047114014... |
A lane-detection system is an important component of many intelligent transportation systems. We present a robust lane-detection-and-tracking algorithm to deal with challenging scenarios such as a lane curvature, worn lane markings, lane changes, and emerging, ending, merging, and splitting lanes. We first present a co... | [
-0.014767127111554146,
0.011489931493997574,
-0.012938871048390865,
-0.0021158542949706316,
0.017629574984312057,
-0.0016691014170646667,
0.009621172212064266,
-0.0038727601058781147,
-0.015266936272382736,
0.027792515233159065,
-0.0003757841477636248,
0.018437717109918594,
-0.00571309030055... | [
-0.27459532022476196,
-0.09473393112421036,
0.2122698277235031,
0.4279831349849701,
-0.04885520786046982,
0.15663482248783112,
-0.08281455188989639,
-0.20971029996871948,
0.00890409480780363,
-1.0745166540145874,
-0.26921942830085754,
0.5917680859565735,
-0.20664626359939575,
-0.0699944496... |
In this paper, we proposed a B-Snake based lane detection and tracking algorithm without any cameras’ parameters. Compared with other lane models, the B-Snake based lane model is able to describe a wider range of lane structures since B-Spline can form any arbitrary shape by a set of control points. The problems of det... | [
-0.01990656927227974,
0.007558499462902546,
-0.0175292007625103,
0.011245746165513992,
0.020935574546456337,
-0.001188324298709631,
0.010823378339409828,
-0.01104244589805603,
-0.01254642941057682,
0.011658387258648872,
-0.012070439755916595,
0.012880587950348854,
-0.010835692286491394,
-0... | [
0.30455031991004944,
-0.22062931954860687,
0.508056640625,
0.1946815699338913,
-0.16422292590141296,
0.07069635391235352,
0.1060144230723381,
-0.34712788462638855,
-0.1634807586669922,
-0.40788039565086365,
0.03907635807991028,
0.30830973386764526,
-0.2193065583705902,
0.04090745747089386,... |
In this article a new method for the calibration of a vision system which consists of two (or more) cameras is presented. The proposed method, which uses simple properties of vanishing points, is divided into two steps. In the first step, the intrinsic parameters of each camera, that is, the focal length and the locati... | [
0.0033952160738408566,
0.02604735642671585,
-0.005257299169898033,
0.012303337454795837,
-0.014759901911020279,
-0.01225673034787178,
0.008552724495530128,
0.006068991497159004,
-0.012939149513840675,
-0.009335516951978207,
-0.027317587286233902,
0.008105955086648464,
-0.014416806399822235,
... | [
0.051519207656383514,
-0.06667264550924301,
0.40638598799705505,
0.28595229983329773,
0.05819694325327873,
0.3757259249687195,
0.008551414124667645,
-0.6179460883140564,
-0.20085030794143677,
-0.5647248029708862,
-0.17978926002979279,
0.6601804494857788,
-0.1357208639383316,
0.238606676459... |
A lane detection system is an important component of many intelligent transportation systems. We present a robust realtime lane tracking algorithm for a curved local road. First, we present a comparative study to find a good realtime lane marking classifier. Once lane markings are detected, they are grouped into many l... | [
-0.008200145326554775,
0.01712280511856079,
-0.014723706059157848,
0.003666615579277277,
0.017552847042679787,
-0.02810165099799633,
0.010772356763482094,
-0.004452049732208252,
-0.011079234071075916,
0.021124552935361862,
0.004388729576021433,
0.007868491113185883,
-0.007837020792067051,
... | [
-0.2090882956981659,
-0.1718423068523407,
0.2699206471443176,
0.4979817569255829,
-0.16766346991062164,
0.19361849129199982,
-0.054214637726545334,
-0.24250972270965576,
-0.11504323035478592,
-1.108986258506775,
-0.055721886456012726,
0.5812191963195801,
-0.24960219860076904,
0.00215323152... |
Philosophers have studied ontologies for centuries in their search for a systematic explanation of existence: “What kind of things exist?” Recently, ontologies have emerged as a major research topic in the fields of artificial intelligence and knowledge management where they address the content issue: “What kind of thi... | [
-0.0020069009624421597,
0.015152545645833015,
0.006310706026852131,
0.022511927410960197,
0.0054636625573039055,
-0.005474747158586979,
0.010118687525391579,
0.023058872669935226,
-0.009876977652311325,
0.014448503032326698,
-0.004078748170286417,
0.0141900097951293,
0.011550589464604855,
... | [
0.49071821570396423,
0.047428589314222336,
0.027391720563173294,
0.561737596988678,
-0.08839042484760284,
0.22870713472366333,
0.2852013111114502,
0.15167324244976044,
0.02872047759592533,
-0.6248979568481445,
-0.477376788854599,
0.4034633934497833,
-0.15169011056423187,
0.2633710503578186... |
A wide band patch antenna fed by an L-probe can be designed for dual- and multi-band application by cutting U-slots on the patch. Simulation and measurement results are presented to illustrate this design. | [
-0.011922520585358143,
0.020730530843138695,
-0.02165585197508335,
0.023166531696915627,
-0.016211820766329765,
-0.03248753026127815,
0.019137894734740257,
0.008552412502467632,
-0.019463717937469482,
-0.005489815026521683,
-0.011618106625974178,
0.028481733053922653,
-0.028083547949790955,
... | [
0.6359674334526062,
-0.24433043599128723,
0.2816842794418335,
0.02093375474214554,
-0.04915535822510719,
-0.27926942706108093,
-0.10167260468006134,
-0.354724258184433,
-0.0867171362042427,
-0.4372391700744629,
-0.3191336989402771,
0.5475800037384033,
-0.46616995334625244,
-0.0247134659439... |
The collaborative filtering (CF) approach to recommenders has recently enjoyed much interest and progress. The fact that it played a central role within the recently completed Netflix competition has contributed to its popularity. This chapter surveys the recent progress in the field. Matrix factorization techniques, w... | [
0.004708260763436556,
0.012837106361985207,
-0.016948699951171875,
0.011181176640093327,
-0.0014251680113375187,
-0.01783900335431099,
0.006845503114163876,
-0.0188582856208086,
-0.01289353333413601,
0.006844253279268742,
-0.007963534444570541,
0.01599254086613655,
-0.0017408416606485844,
... | [
0.4642082750797272,
-0.10371106117963791,
0.3358530104160309,
0.27800554037094116,
-0.29155465960502625,
-0.44914710521698,
-0.13082680106163025,
-0.18027222156524658,
-0.03580823168158531,
-0.6338849663734436,
0.14431624114513397,
0.35764580965042114,
-0.3973939120769501,
0.08508799970149... |
VirtualTable is a projection augmented reality installation where users are engaged in an interactive tower defense game. The installation runs continuously and is designed to attract people to a table, which the game is projected onto. Any number of players can join the game for an optional period of time. The goal is... | [
-0.015293476171791553,
0.006528308615088463,
0.007621270604431629,
-0.008308816701173782,
-0.004547968972474337,
-0.019451025873422623,
0.0056856973096728325,
-0.004689798224717379,
-0.009466215968132019,
0.005886076018214226,
-0.022060317918658257,
0.012770915403962135,
-0.00415592873468995... | [
0.5237608551979065,
-0.1177750676870346,
0.582366943359375,
0.2844439446926117,
0.28362196683883667,
-0.044735223054885864,
-0.018589625135064125,
0.33072206377983093,
-0.22984489798545837,
-0.4918593168258667,
-0.04806612432003021,
0.028878437355160713,
-0.10605680197477341,
0.09075456857... |
Mobile healthcare is a fast growing area of research that capitalizes on mobile technologies and wearables to provide realtime and continuous monitoring and analysis of vital signs of users. Yet, most of the current applications are developed for general population without taking into consideration the context and need... | [
-0.010672325268387794,
0.02094006910920143,
-0.005269815679639578,
0.0123442392796278,
0.01560662966221571,
-0.014814471825957298,
0.009052015841007233,
-0.0007910190615803003,
-0.010270657949149609,
-0.02815459668636322,
-0.014306730590760708,
0.0061983512714505196,
0.010151454247534275,
... | [
0.6694837808609009,
0.5957648754119873,
0.36559155583381653,
-0.1862429827451706,
0.37246936559677124,
0.180542454123497,
0.2539609670639038,
-0.1406869739294052,
0.11190846562385559,
-0.9994753003120422,
0.04235474765300751,
0.5338438749313354,
-0.12710033357143402,
-0.11032149195671082,
... |
The exponential growth in the amount of data gathered from various sources has resulted in the need for more efficient algorithms to quickly analyze large datasets. Clustering techniques, like K-Means are useful in analyzing data in a parallel fashion. K-Means largely depends upon a proper initialization to produce opt... | [
0.0011141165159642696,
0.010662490501999855,
-0.013016236014664173,
0.006801926996558905,
-0.02203446999192238,
0.015289602801203728,
0.00822423305362463,
-0.03032621368765831,
-0.01207446213811636,
0.027169056236743927,
-0.004062854219228029,
0.012773226015269756,
0.008550720289349556,
0.... | [
-0.054449986666440964,
-0.2146230787038803,
0.37727078795433044,
0.3966010808944702,
0.13646531105041504,
0.15653404593467712,
0.06864755600690842,
-0.3048575520515442,
-0.32579556107521057,
-0.6252158880233765,
-0.29108062386512756,
-0.11758305877447128,
-0.1633428931236267,
0.41702485084... |
Neural network-based clustering has recently gained popularity, and in particular a constrained clustering formulation has been proposed to perform transfer learning and image category discovery using deep learning. The core idea is to formulate a clustering objective with pairwise constraints that can be used to train... | [
-0.010836306028068066,
0.016898170113563538,
-0.007233219686895609,
0.016165798529982567,
-0.020413601770997047,
-0.013105022720992565,
0.009534928947687149,
0.002556328196078539,
-0.012456711381673813,
0.011123108677566051,
-0.007554271724075079,
0.014272254891693592,
-0.0018391385674476624... | [
-0.04613092914223671,
-0.20029576122760773,
0.11280979961156845,
0.19433268904685974,
0.0003545294748619199,
0.04091176390647888,
-0.3672701418399811,
-0.16438958048820496,
-0.08876872062683105,
-0.7711266875267029,
-0.15158219635486603,
0.6031656265258789,
-0.1476750522851944,
0.133704572... |
The exponential increase in the availability of online reviews and recommendations makes sentiment classification an interesting topic in academic and industrial research. Reviews can span so many different domains that it is difficult to gather annotated training data for all of them. Hence, this paper studies the pro... | [
0.00324880494736135,
0.014310983940958977,
-0.0057430574670434,
0.0235649012029171,
-0.0042379796504974365,
-0.020363926887512207,
0.008397627621889114,
0.015130242332816124,
-0.009816144593060017,
0.010512069799005985,
-0.010351033881306648,
0.01297589298337698,
0.004626027774065733,
0.01... | [
0.35623908042907715,
0.07020030170679092,
-0.006481096148490906,
0.2310173213481903,
-0.4508914351463318,
0.13440309464931488,
0.04453154653310776,
-0.29304754734039307,
-0.19389091432094574,
-0.6146746873855591,
-0.010754851624369621,
0.3689802587032318,
-0.322809636592865,
0.475696206092... |
The task of discriminating the motor imagery of different movements within the same limb using electroencephalography (EEG) signals is challenging because these imaginary movements have close spatial representations on the motor cortex area. There is, however, a pressing need to succeed in this task. The reason is that... | [
0.011905874125659466,
0.005696901120245457,
-0.034051429480314255,
0.014961279928684235,
0.007850111462175846,
-0.005762173794209957,
0.013140270486474037,
0.031418636441230774,
-0.016643092036247253,
0.0233023539185524,
-0.0375957153737545,
0.015355078503489494,
0.011131645180284977,
0.00... | [
0.08702996373176575,
-0.2384936362504959,
0.23634612560272217,
0.2671780586242676,
-0.15806348621845245,
-0.008027883246541023,
0.1764666587114334,
-0.24498489499092102,
-0.3269120752811432,
-0.34880131483078003,
0.18545539677143097,
0.44059014320373535,
-0.13083286583423615,
0.07025522738... |
A resonant single-stage single-switch four-output LED driver with high power factor and passive current balancing is proposed. By controlling one output current, the other output currents of four-output LED driver can be controlled via passive current balancing, which makes its control simple. When magnetizing inductor... | [
0.003911794163286686,
0.006313567981123924,
-0.015165404416620731,
0.01305291336029768,
0.00045817065984010696,
0.001084033865481615,
0.012974390760064125,
-0.020133627578616142,
-0.016370002180337906,
0.000831550220027566,
-0.009035112336277962,
0.025420349091291428,
0.003957237116992474,
... | [
-0.0641203373670578,
-0.2677375078201294,
0.7133079767227173,
0.2218465954065323,
-0.41942891478538513,
0.21965517103672028,
-0.0025073254946619272,
-0.5758890509605408,
0.012169328518211842,
-0.24107427895069122,
0.042586784809827805,
0.7245432138442993,
-0.4416027367115021,
0.46462824940... |
Natural language software requirements descriptions enable end users to formulate their wishes and expectations for a future software product without much prior knowledge in requirements engineering. However, these descriptions are susceptible to linguistic inaccuracies such as ambiguities and incompleteness that can h... | [
0.009696281515061855,
0.014200747013092041,
-0.00872897356748581,
0.013686425052583218,
-0.034296587109565735,
0.013811295852065086,
0.007989393547177315,
0.015662260353565216,
-0.01368904858827591,
0.004453722853213549,
-0.01985710673034191,
0.0074100131168961525,
0.016276296228170395,
0.... | [
0.3303384482860565,
0.17954745888710022,
-0.1346031129360199,
0.45743799209594727,
0.22148114442825317,
0.20838503539562225,
0.49659138917922974,
0.1138676181435585,
0.19324558973312378,
-0.6720909476280212,
-0.23568454384803772,
0.9681810140609741,
-0.13298578560352325,
-0.414822638034820... |
In this paper, we report a study that examines the relationship between image-based computational analyses of web pages and users' aesthetic judgments about the same image material. Web pages were iteratively decomposed into quadrants of minimum entropy (quadtree decomposition) based on low-level image statistics, to p... | [
-0.0035344958305358887,
0.01624378189444542,
-0.0017140458803623915,
0.01567201130092144,
0.0013982425443828106,
-0.012163213454186916,
0.009911629371345043,
-0.012590190395712852,
-0.010054296813905239,
-0.00998017005622387,
-0.017265871167182922,
0.019347894936800003,
-0.01383959036320448,... | [
0.12658099830150604,
0.1381605565547943,
0.0835585817694664,
0.36126619577407837,
-0.2790237367153168,
0.45874646306037903,
0.005617956630885601,
-0.2947326898574829,
-0.12545228004455566,
-0.49018552899360657,
0.06799651682376862,
0.20880603790283203,
-0.12558545172214508,
0.2446748614311... |
In this paper, we present an American Sign Language recognition system using a compact and affordable 3D motion sensor. The palm-sized Leap Motion sensor provides a much more portable and economical solution than Cyblerglove or Microsoft kinect used in existing studies. We apply k-nearest neighbor and support vector ma... | [
0.0025991564616560936,
-0.0017788326367735863,
-0.02836320921778679,
0.0007874332368373871,
-0.028856219723820686,
0.01945490948855877,
0.009715277701616287,
-0.008671391755342484,
-0.010996466502547264,
0.020672595128417015,
-0.008280147798359394,
0.0038191741332411766,
0.02204999141395092,... | [
-0.03449949249625206,
0.2953372597694397,
-0.027473291382193565,
0.08691484481096268,
-0.01891043409705162,
0.6347044110298157,
0.38453611731529236,
-0.3992927074432373,
0.010485829785466194,
-0.6053284406661987,
0.10035683959722519,
0.2550452947616577,
0.010084506124258041,
0.069845698773... |
BACKGROUND
Ehlers-Danlos syndrome (EDS) hypermobility-type is the most common hereditary disorder of the connective tissue. The tissue fragility characteristic of this condition leads to multi-systemic symptoms in which pain, often severe, chronic, and disabling, is the most experienced. Clinical observations suggest t... | [
-0.01375025324523449,
0.012245855294167995,
-0.027294684201478958,
0.016174331307411194,
0.0002799861831590533,
-0.011873748153448105,
0.009558526799082756,
0.020563751459121704,
-0.00974399596452713,
-0.005774965044111013,
-0.0033719621133059263,
0.018036874011158943,
0.008408311754465103,
... | [
0.09343216568231583,
0.3210195302963257,
0.2278335988521576,
0.08890730887651443,
-0.15397359430789948,
0.44843578338623047,
0.43561217188835144,
0.3008600175380707,
-0.48976796865463257,
-0.699898362159729,
-0.12545223534107208,
0.4146832525730133,
-0.2707831859588623,
0.2535519301891327,... |
Research has indicated that multiple sets are superior to single sets for maximal strength development. However, whether maximal strength gains are achieved may depend on the ability to sustain a consistent number of repetitions over consecutive sets. A key factor that determines the ability to sustain repetitions is t... | [
0.024923261255025864,
0.015596622601151466,
-0.006103192921727896,
0.006467501167207956,
0.005979999899864197,
0.006276929285377264,
0.010481683537364006,
-0.008269217796623707,
-0.008888316340744495,
-0.0071214851923286915,
-0.01408589631319046,
0.016036314889788628,
-0.003079221583902836,
... | [
0.5257298946380615,
-0.3573455810546875,
0.20218326151371002,
-0.13257743418216705,
-0.08092842251062393,
0.0625511035323143,
0.9080211520195007,
-0.6102179288864136,
-0.5899450182914734,
-0.3691682815551758,
-0.03604600951075554,
0.4365880787372589,
0.07946626842021942,
-0.172230213880538... |
Since Cree, Inc.'s 2<sup>nd</sup> generation 4H-SiC MOSFETs were commercially released with a specific on-resistance (R<sub>ON, SP</sub>) of 5 mΩ·cm<sup>2</sup> for a 1200 V-rating in early 2013, we have further optimized the device design and fabrication processes as well as greatly expanded the voltage ratings from 9... | [
-0.008859291672706604,
-0.00539708836004138,
-0.01978886127471924,
0.012941522523760796,
0.0038252919912338257,
-0.013506699353456497,
0.006388252135366201,
-0.009083160199224949,
-0.014774315990507603,
0.011176735162734985,
0.006015108432620764,
0.016153434291481972,
0.009518396109342575,
... | [
0.3359256088733673,
-0.1501368284225464,
0.3933398425579071,
0.1055753156542778,
-0.6582890152931213,
0.2615886926651001,
0.3308218717575073,
-0.4263541102409363,
-0.0332537516951561,
-0.06007891148328781,
0.07431094348430634,
-0.012342951260507107,
-0.03769765794277191,
0.0701907128095626... |
Skin color is one of the most conspicuous ways in which humans vary and has been widely used to define human races. Here we present new evidence indicating that variations in skin color are adaptive, and are related to the regulation of ultraviolet (UV) radiation penetration in the integument and its direct and indirec... | [
-0.0011390200816094875,
0.01572810858488083,
-0.014121929183602333,
0.012400958687067032,
-0.005224519409239292,
-0.021651841700077057,
0.009751510806381702,
-0.017675362527370453,
-0.013459188863635063,
-0.02547203004360199,
0.0048108408227562904,
0.014347480610013008,
-0.004416745156049728... | [
0.5416685938835144,
-0.18354763090610504,
-0.5432186722755432,
0.05308280885219574,
0.0364091657102108,
0.3567724823951721,
0.49761173129081726,
0.32988569140434265,
-0.25259411334991455,
-1.0346159934997559,
0.07955366373062134,
0.3477352261543274,
-0.1593894064426422,
0.11396773904561996... |
Watermarking is used to protect the copyrighted materials from being misused and help us to know the lawful ownership. The security of any watermarking scheme is always a prime concern for the developer. In this work, the robustness and security issue of IWT (integer wavelet transform) and SVD (singular value decomposi... | [
-0.0066044144332408905,
0.012966551817953587,
0.0029246846679598093,
0.022912252694368362,
0.0038867490366101265,
0.012924762442708015,
0.010459022596478462,
0.013052621856331825,
-0.015118199400603771,
0.008472919464111328,
-0.010136271826922894,
0.013858584687113762,
-0.00977947749197483,
... | [
0.17034146189689636,
0.21396741271018982,
0.3969879448413849,
0.3056192398071289,
-0.056198183447122574,
-0.5689527988433838,
0.13347643613815308,
-0.6201304793357849,
-0.1715851128101349,
-0.4668484926223755,
-0.16097138822078705,
0.6307699680328369,
0.051458604633808136,
0.24982196092605... |
Test functions are important to validate and compare the performance of optimization algorithms. There have been many test or benchmark functions reported in the literature; however, there is no standard list or set of benchmark functions. Ideally, test functions should have diverse properties so that can be truly usef... | [
0.022067546844482422,
0.016769688576459885,
-0.005733138881623745,
-0.0010832315310835838,
-0.010687213391065598,
0.01392259169369936,
0.008770497515797615,
0.0110610481351614,
-0.015439312905073166,
0.00584558816626668,
-0.004983020015060902,
0.008974782191216946,
0.0015496835112571716,
0... | [
0.13402269780635834,
0.06240691989660263,
0.05151599645614624,
0.343591570854187,
-0.12587103247642517,
0.3810517489910126,
0.13611622154712677,
-0.2631773054599762,
0.16008245944976807,
-0.8590802550315857,
-0.12441881746053696,
0.5712335705757141,
0.026111681014299393,
-0.032441440969705... |
In this article, three approaches are proposed for measuring difficulty that can be useful in developing Dynamic Difficulty Adjustment (DDA) systems in different game genres. Our analysis of the existing DDA systems shows that there are three ways to measure the difficulty of the game: using the formal model of gamepla... | [
-0.01046350970864296,
0.011440454050898552,
-0.028461232781410217,
-0.0004888137336820364,
0.004312415141612291,
-0.006879339925944805,
0.01201661303639412,
-0.022405805066227913,
-0.015263824723660946,
0.02380959317088127,
-0.0141456238925457,
0.020492205396294594,
0.012618026696145535,
0... | [
-0.33948084712028503,
0.08445385843515396,
-0.05766148492693901,
0.1367959976196289,
0.004779648035764694,
0.27201396226882935,
0.2095114141702652,
-0.17111088335514069,
-0.34099164605140686,
-0.7070135474205017,
0.016483331099152565,
0.9635050296783447,
-0.04589923843741417,
-0.0265399124... |
The demand for low voltage, low drop-out (LDO) regulators is increasing because of the growing demand for portable electronics, i.e., cellular phones, pagers, laptops, etc. LDOs are used coherently with dc-dc converters as well as standalone parts. In power supply systems, they are typically cascaded onto switching reg... | [
0.01751798205077648,
0.006566016934812069,
-0.01383974403142929,
0.008345868438482285,
0.0056181796826422215,
-0.009802811779081821,
0.00992519035935402,
0.0038999076932668686,
-0.012734896503388882,
0.024905242025852203,
-0.0037498613819479942,
0.025117235258221626,
0.015949435532093048,
... | [
0.5270694494247437,
-0.3256440758705139,
0.41051921248435974,
0.3580264747142792,
0.31885412335395813,
-0.2504791021347046,
-0.47969192266464233,
-0.25505903363227844,
0.145393967628479,
-0.34671223163604736,
-0.44615936279296875,
0.7515373826026917,
-0.6036748290061951,
-0.052140887826681... |
Next Point-of-Interest (POI) recommendation is of great value for both location-based service providers and users. Recently Recurrent Neural Networks (RNNs) have been proved to be effective on sequential recommendation tasks. However, existing RNN solutions rarely consider the spatio-temporal intervals between neighbor... | [
0.013871859759092331,
0.007657535374164581,
-0.01900971308350563,
0.013632640242576599,
0.016670040786266327,
0.02030930295586586,
0.010542236268520355,
0.027346957474946976,
-0.011158408597111702,
0.02239079214632511,
-0.01572502963244915,
0.006013565696775913,
0.009667052887380123,
0.011... | [
-0.4352944791316986,
-0.4670380651950836,
0.7194553017616272,
0.12513433396816254,
0.32650020718574524,
-0.10200699418783188,
-0.39905038475990295,
-0.14975519478321075,
-0.1755441129207611,
-0.7648633718490601,
-0.15076428651809692,
0.18805359303951263,
0.08536873757839203,
-0.07815052568... |
A novel design of an absorptive frequency-selective transmission structure (AFST) is proposed. This structure is based on the design of a frequency-dependent lossy layer with square-loop hybrid resonator (SLHR). The parallel resonance provided by the hybrid resonator is utilized to bypass the lossy path and improve the... | [
0.00307474029250443,
0.01380924042314291,
-0.01152460090816021,
0.015732426196336746,
-0.005480347666889429,
-0.04573042690753937,
0.010242813266813755,
-0.01450873538851738,
-0.009476988576352596,
-0.0038000713102519512,
-0.014401054941117764,
0.009837084449827671,
-0.028454067185521126,
... | [
0.4014488458633423,
-0.2891547381877899,
0.5519658923149109,
0.008003602735698223,
-0.14505238831043243,
0.15644650161266327,
-0.05955501273274422,
-0.7077077627182007,
0.09151625633239746,
-0.2590488791465759,
-0.32010993361473083,
0.7998239398002625,
-0.2610422372817993,
-0.0612981095910... |
Evaluation of the Advanced Encryption Standard (AES) algorithm in FPGA is proposed here. This Evaluation is compared with other works to show the efficiency. Here we are concerned about two major purposes. The first is to define some of the terms and concepts behind basic cryptographic methods, and to offer a way to co... | [
-0.008002854883670807,
0.015633372589945793,
-0.01344713568687439,
0.009466667659580708,
-0.03169272467494011,
0.011728950776159763,
0.008595384657382965,
-0.037442367523908615,
-0.011222094297409058,
0.011551863513886929,
-0.010178551077842712,
0.0011450271122157574,
-0.00645624240860343,
... | [
0.05731239542365074,
0.1505681872367859,
-0.026683304458856583,
0.03331810608506203,
-0.041875824332237244,
0.0950930044054985,
0.24270527064800262,
-0.8010286688804626,
0.11349155753850937,
-0.5231922268867493,
-0.16256265342235565,
0.3372594714164734,
-0.06945748627185822,
-0.18807423114... |
Most of the existing multi-document summarization methods decompose the documents into sentences and work directly in the sentence space using a term-sentence matrix. However, the knowledge on the document side, i.e. the topics embedded in the documents, can help the context understanding and guide the sentence selecti... | [
0.0009565418586134911,
0.016301369294524193,
-0.011046390049159527,
0.021956847980618477,
0.015706785023212433,
-0.015058184042572975,
0.010482562705874443,
-0.01447770744562149,
-0.01204340998083353,
-0.003121203277260065,
-0.010507012717425823,
0.018331870436668396,
-0.00040430238004773855... | [
-0.169271782040596,
0.08798454701900482,
0.3603117763996124,
0.1583576202392578,
-0.30776315927505493,
0.23721086978912354,
0.08893393725156784,
-0.4855247139930725,
-0.2192072868347168,
-0.6479113101959229,
-0.39026734232902527,
0.42030957341194153,
-0.025970634073019028,
0.17888006567955... |
The popularity of using Internet contains some risks of network attacks. Intrusion detection is one major research problem in network security, whose aim is to identify unusual access or attacks to secure internal networks. In literature, intrusion detection systems have been approached by various machine learning tech... | [
0.015739621594548225,
0.002558257896453142,
-0.018992239609360695,
0.005569173023104668,
-0.013001851737499237,
-0.005358315072953701,
0.009409822523593903,
-0.013827738352119923,
-0.015301957726478577,
0.012827310711145401,
-0.0017440621741116047,
0.007546611130237579,
-0.00373117346316576,... | [
0.029330583289265633,
-0.1662091165781021,
-0.08362948149442673,
0.2525484263896942,
-0.02707422710955143,
-0.15090669691562653,
0.2696916162967682,
0.08222155272960663,
-0.5019540786743164,
-0.7098292112350464,
-0.07623840868473053,
0.24427606165409088,
-0.28777801990509033,
0.09103745222... |
Software Defined Networks (SDNs) based on the OpenFlow (OF) protocol export controlplane programmability of switched substrates. As a result, rich functionality in traffic management, load balancing, routing, firewall configuration, etc. that may pertain to specific flows they control, may be easily developed. In this ... | [
-0.02256929874420166,
0.010587721131742,
-0.007721668109297752,
0.009370682761073112,
-0.01541150826960802,
-0.02562236227095127,
0.00907425582408905,
0.011140537448227406,
-0.00968027301132679,
0.007588003296405077,
-0.0031880545429885387,
0.01062267180532217,
-0.0066333976574242115,
0.01... | [
0.24173742532730103,
-0.23237092792987823,
0.15533892810344696,
0.3162959814071655,
-0.1588839888572693,
-0.34356755018234253,
0.28378841280937195,
-0.14704954624176025,
-0.09840048849582672,
-0.7981130480766296,
-0.373075395822525,
0.3416479825973511,
-0.1446290910243988,
0.06893171370029... |
The Internet has led to the creation of a digital society, where (almost) everything is connected and is accessible from anywhere. However, despite their widespread adoption, traditional IP networks are complex and very hard to manage. It is both difficult to configure the network according to predefined policies, and ... | [
-0.017807574942708015,
0.004404610488563776,
-0.00486326776444912,
0.00034385849721729755,
0.002244156552478671,
-0.013564318418502808,
0.006060526706278324,
0.01193622499704361,
-0.007379702292382717,
0.00390964187681675,
-0.009319718927145004,
0.009050467982888222,
0.0010326982010155916,
... | [
0.14232170581817627,
-0.010438081808388233,
0.2987830936908722,
0.5134361386299133,
0.400276780128479,
-0.5588123798370361,
0.2367858588695526,
0.46564847230911255,
-0.39358359575271606,
-1.071103811264038,
-0.4251406788825989,
0.18507787585258484,
-0.40948277711868286,
0.30718880891799927... |
Despite their exponential growth, home and small office/home office networks continue to be poorly managed. Consequently, security of hosts in most home networks is easily compromised and these hosts are in turn used for largescale malicious activities without the home users’ knowledge. We argue that the advent of Soft... | [
-0.006988706067204475,
0.006100027356296778,
-0.013882305473089218,
0.012854842469096184,
-0.02915775030851364,
-0.023935014382004738,
0.009734549559652805,
0.0016078981570899487,
-0.007979021407663822,
-0.0021738731302320957,
-0.00945289246737957,
0.005764491856098175,
0.010450771078467369,... | [
0.1647234410047531,
0.10000337660312653,
0.4342831075191498,
0.3552283048629761,
0.18641877174377441,
-0.30998024344444275,
0.2575337886810303,
0.331179678440094,
-0.640318751335144,
-0.7631078362464905,
-0.35269883275032043,
0.2322199046611786,
-0.3643997013568878,
0.6018632054328918,
0... |
Today's data networks are surprisingly fragile and difficult to manage. We argue that the root of these problems lies in the complexity of the control and management planes--the software and protocols coordinating network elements--and particularly the way the decision logic and the distributed-systems issues are inexo... | [
-0.007304858881980181,
0.014803305268287659,
-0.01165405660867691,
-0.001730303862132132,
-0.0017612911760807037,
-0.018789324909448624,
0.006731006316840649,
0.02516525238752365,
-0.008115478791296482,
-0.006357954815030098,
-0.006786477752029896,
0.01261829026043415,
0.005184253677725792,
... | [
-0.12380573898553848,
0.11219214648008347,
0.6877720952033997,
0.5773364305496216,
0.19648624956607819,
-0.3555508553981781,
0.18032647669315338,
-0.1379386931657791,
-0.2724575996398926,
-0.659662127494812,
-0.4104572832584381,
0.40498805046081543,
-0.5999740958213806,
0.3226051330566406,... |
Urban land use information plays an essential role in a wide variety of urban planning and environmental monitoring processes. During the past few decades, with the rapid technological development of remote sensing (RS), geographic information systems (GIS) and geospatial big data, numerous methods have been developed ... | [
-0.016477886587381363,
-0.005286757834255695,
-0.012792209163308144,
0.012509355321526527,
0.042817533016204834,
0.0006103310734033585,
0.010043896734714508,
0.0031074744183570147,
-0.013830792158842087,
-0.0012639998458325863,
0.004144071135669947,
0.009688224643468857,
-0.00909149460494518... | [
0.21487179398536682,
0.09260202199220657,
0.26350137591362,
0.13984592258930206,
0.3139915466308594,
0.552431046962738,
-0.11411948502063751,
0.18252325057983398,
-0.24539737403392792,
-1.0406699180603027,
-0.6164963841438293,
0.41917121410369873,
-0.15576770901679993,
0.5979330539703369,
... |
As the number of electronic components of avionics systems is significantly increasing, it is desirable to run several avionics software on a single computing device. In such system, providing a seamless way to integrate separate applications on a computing device is a very critical issue as the Integrated Modular Avio... | [
-0.004371802322566509,
0.00678621418774128,
-0.006903553381562233,
0.008129634894430637,
-0.023553919047117233,
-0.02441607601940632,
0.008797023445367813,
0.01173531822860241,
-0.009238739497959614,
0.005897688213735819,
-0.012268468737602234,
0.015405867248773575,
0.010839376598596573,
0... | [
0.1768862009048462,
0.13134700059890747,
0.06520974636077881,
0.2925179600715637,
0.15703056752681732,
0.10235144942998886,
-0.277213454246521,
-0.24678777158260345,
-0.47487321496009827,
-0.7726172804832458,
-0.3842504024505615,
0.49437177181243896,
-0.24332714080810547,
0.118370033800601... |
With the increase of terrorist threats around the world, human identification research has become a sought after area of research. Unlike standard biometric recognition techniques, gait recognition is a non-intrusive technique. Both data collection and classification processes can be done without a subject’s cooperatio... | [
-0.016527747735381126,
0.011106455698609352,
-0.002408353378996253,
0.01539975218474865,
0.02313068136572838,
-0.015698380768299103,
0.009861706756055355,
-0.027728551998734474,
-0.01181422732770443,
0.031428612768650055,
0.005040649324655533,
0.021370597183704376,
0.019324319437146187,
0.... | [
0.06977866590023041,
-0.022048860788345337,
0.05303802713751793,
0.062481917440891266,
-0.04329651594161987,
0.25085121393203735,
0.21805569529533386,
-0.25513774156570435,
-0.204366073012352,
-0.6611378788948059,
0.12788082659244537,
0.2704831659793854,
-0.2786869406700134,
-0.07073229551... |
This study compared the nature of text comprehension as measured by multiple-choice format and open-ended format questions. Participants read a short text while explaining preselected sentences. After reading the text, participants answered open-ended and multiple-choice versions of the same questions based on their me... | [
-0.0018700910732150078,
0.008440547622740269,
-0.014814149588346481,
0.002024322049692273,
0.014180882833898067,
0.0057592811062932014,
0.012728283181786537,
0.007500559091567993,
-0.013081781566143036,
0.02877892553806305,
-0.022526100277900696,
0.014565355144441128,
0.03054599091410637,
... | [
-0.15254077315330505,
0.045057859271764755,
-0.1053273156285286,
0.17645643651485443,
-0.23546046018600464,
0.6286820769309998,
0.584073543548584,
-0.3177826702594757,
-0.09161603450775146,
-0.3939359188079834,
-0.1470695286989212,
0.780802845954895,
0.3823169767856598,
-0.3934916853904724... |
Availability of large volume of community contributed location data enables a lot of location providing services and these services have attracted many industries and academic researchers by its importance. In this paper we propose the new recommender system that recommends the new POI for next hours. First we find the... | [
0.0037620081566274166,
0.009760424494743347,
-0.006151079665869474,
0.010669603943824768,
0.022815652191638947,
0.0011016670614480972,
0.008361008949577808,
0.0017522438429296017,
-0.013877537101507187,
0.035689517855644226,
-0.013753680512309074,
0.01245453953742981,
0.014482219703495502,
... | [
0.19189074635505676,
0.018238486722111702,
0.6322506666183472,
0.1619509905576706,
0.3205178678035736,
0.1476684957742691,
-0.26950961351394653,
0.02346271090209484,
-0.27362358570098877,
-0.8420752286911011,
0.013904497027397156,
0.27444666624069214,
-0.025427665561437607,
0.0137809179723... |
This paper presents SiRiUS, a secure file system designed to be layered over insecure network and P2P file systems such as NFS, CIFS, OceanStore, and Yahoo! Briefcase. SiRiUS assumes the network storage is untrusted and provides its own read-write cryptographic access control for file level sharing. Key management and ... | [
-0.012355484068393707,
-0.0024995622225105762,
-0.0033543927129358053,
0.01630324311554432,
0.035288210958242416,
-0.020041685551404953,
0.011559311300516129,
0.0028045959770679474,
-0.01276751235127449,
0.017892368137836456,
-0.02749740332365036,
0.003332422813400626,
0.008967897854745388,
... | [
0.1910918951034546,
-0.015024654567241669,
0.09043845534324646,
0.11753649264574051,
0.10349810868501663,
-0.2523711919784546,
-0.1366981714963913,
-0.5869954228401184,
-0.23149000108242035,
-0.0734330490231514,
-0.34367188811302185,
0.2636010944843292,
-0.07846829295158386,
0.031102709472... |
0957-4174/$ see front matter 2012 Elsevier Ltd. A http://dx.doi.org/10.1016/j.eswa.2012.12.089 ⇑ Corresponding author. Tel.: +44 23 92 844171. E-mail addresses: Alessio.Ishizaka@port.ac.uk (A. I com (N.H. Nguyen). Fuzzy AHP is a hybrid method that combines Fuzzy Set Theory and AHP. It has been developed to take into ac... | [
-0.016910281032323837,
0.008656242862343788,
0.008742725476622581,
0.016496963798999786,
0.005417755339294672,
0.006382701452821493,
0.006487674079835415,
0.0011011254973709583,
-0.008594287559390068,
0.005542865488678217,
-0.013577156700193882,
0.01091778464615345,
-0.013796502724289894,
... | [
-0.37802377343177795,
0.10169829428195953,
0.0964517891407013,
-0.012524465098977089,
-0.15998627245426178,
0.3609789311885834,
-0.10047926008701324,
-0.4128061532974243,
-0.20287209749221802,
-0.059411607682704926,
-0.331760048866272,
-0.11512535810470581,
0.08257291465997696,
0.067080214... |
The automation of the overtaking maneuver is considered to be one of the toughest challenges in the development of autonomous vehicles. This operation involves two vehicles (the overtaking and the overtaken) cooperatively driving, as well as the surveillance of any other vehicles that are involved in the maneuver. This... | [
-0.023521143943071365,
0.02577955648303032,
-0.020790360867977142,
0.010549264028668404,
0.006697758100926876,
-0.012637689709663391,
0.011782778427004814,
-0.009907803498208523,
-0.01698039285838604,
0.003062714822590351,
-0.015365908853709698,
0.02494221180677414,
0.008491527289152145,
0... | [
-0.4255695939064026,
-0.3054121732711792,
0.376254141330719,
0.28399786353111267,
0.3296583890914917,
-0.12863996624946594,
0.07321880012750626,
-0.1779251992702484,
-0.0865563452243805,
-0.422930508852005,
-0.2388448864221573,
0.6243001818656921,
-0.11902771145105362,
-0.5089597702026367,... |
Liposuction alone is not always sufficient to correct the shape of the lower leg, and muscle reduction may be necessary. To assess the outcomes of a new technique of selective neurectomy of the gastrocnemius muscle to correct calf hypertrophy. Between October 2007 and May 2010, 300 patients underwent neurectomy of the ... | [
0.031336236745119095,
-0.0015190052799880505,
-0.002503154333680868,
0.027894053608179092,
-0.02946428395807743,
-0.006910643540322781,
0.010865535587072372,
0.007882285863161087,
-0.011596694588661194,
-0.003216108772903681,
-0.0057478053495287895,
0.009160111658275127,
-0.00733744679018855... | [
-0.10410904139280319,
-0.1339138299226761,
0.10090433806180954,
-0.020027125254273415,
-0.05807078257203102,
0.6209611892700195,
0.4658752381801605,
-0.05206216126680374,
-0.05786001309752464,
-0.1758798360824585,
0.18193209171295166,
0.8505764007568359,
0.024360446259379387,
0.08874796330... |
Tendons consist of collagen (mostly type I collagen) and elastin embedded in a proteoglycan-water matrix with collagen accounting for 65-80% and elastin approximately 1-2% of the dry mass of the tendon. These elements are produced by tenoblasts and tenocytes, which are the elongated fibroblasts and fibrocytes that lie ... | [
0.016451630741357803,
-0.002420079195871949,
-0.011569814756512642,
0.008003118447959423,
-0.01953314244747162,
-0.023580016568303108,
0.011089831590652466,
0.008156451396644115,
-0.013773798011243343,
-0.0010499944910407066,
-0.00030941725708544254,
0.00813459511846304,
-0.01272403076291084... | [
0.2646564543247223,
-0.3417440950870514,
0.7170596718788147,
0.34090477228164673,
-0.12716852128505707,
0.7321504354476929,
-0.1334206908941269,
0.27378809452056885,
-0.06263868510723114,
-0.710641086101532,
-0.21761450171470642,
0.6318138837814331,
-0.011182992719113827,
-0.09701205044984... |
Cloud computing is expected to be a promising solution for scientific computing. In this paper, we propose a flexible container-based computing platform to run scientific workflows on cloud. We integrate Galaxy, a popular biology workflow system, with four famous container cluster systems. Preliminary evaluation shows ... | [
-0.01822071336209774,
-0.008199913427233696,
-0.014073342084884644,
0.009537436068058014,
-0.006380103528499603,
-0.03409320116043091,
0.009750806726515293,
0.008928120136260986,
-0.008985277265310287,
-0.004948107060045004,
0.0009545075590722263,
0.016865072771906853,
0.011356387287378311,
... | [
-0.02854204550385475,
0.16625916957855225,
0.7316192388534546,
0.5153602957725525,
0.3581690788269043,
0.2086820900440216,
-0.5339792966842651,
0.19187161326408386,
-0.6280432939529419,
-0.5843513011932373,
-0.230779767036438,
0.26891088485717773,
-0.31324177980422974,
0.2988435626029968,
... |
Voiced-Unvoiced classification (V-UV) is a well understood but still not perfectly solved problem. It tackles the problem of determining whether a signal frame contains harmonic content or not. This paper presents a new approach to this problem using a conventional multi-layer perceptron neural network trained with lin... | [
0.000801953487098217,
0.006672054994851351,
-0.005124132614582777,
0.0010936304461210966,
-0.023954063653945923,
-0.028206005692481995,
0.009258333593606949,
-0.002297281753271818,
-0.006472828797996044,
0.006737464107573032,
-0.02064496837556362,
0.011429954320192337,
0.0007059601484797895,... | [
-0.4035260081291199,
-0.12487174570560455,
0.2261226773262024,
-0.10874979197978973,
-0.5139086842536926,
0.3072880208492279,
-0.012162810191512108,
-0.3905620276927948,
-0.13126403093338013,
-0.07906199991703033,
-0.20304745435714722,
0.7626245617866516,
-0.2907267212867737,
0.09338249266... |
What is the difference between Piaget's constructivism and Papert’s “constructionism”? Beyond the mere play on the words, I think the distinction holds, and that integrating both views can enrich our understanding of how people learn and grow. Piaget’s constructivism offers a window into what children are interested in... | [
-0.027040887624025345,
0.02285376563668251,
0.0029709921218454838,
0.017695944756269455,
0.006886462215334177,
-0.0003136743325740099,
0.00996017549186945,
-0.002441008808091283,
-0.014974288642406464,
0.03034849464893341,
-0.01806510239839554,
0.008950048126280308,
0.008659484796226025,
0... | [
0.03306455537676811,
0.025043347850441933,
-0.5069231986999512,
0.2679670453071594,
0.1237993836402893,
0.689364492893219,
0.16532330214977264,
0.1749202013015747,
-0.17368337512016296,
-0.9072108268737793,
0.09726785868406296,
0.4153778553009033,
0.09918319433927536,
0.4501476585865021,
... |
Distant speech recognition (DSR) holds out the promise of providing a natural human computer interface in that it enables verbal interactions with computers without the necessity of donning intrusive body- or head-mounted devices. Recognizing distant speech robustly, however, remains a challenge. This paper provides a ... | [
-0.0016067265532910824,
-0.009082581847906113,
-0.01721993088722229,
0.0005834783660247922,
-0.022501634433865547,
-0.028767969459295273,
0.008737519383430481,
-0.006109808571636677,
-0.008898410946130753,
-0.01050790585577488,
-0.005843700375407934,
0.00820970255881548,
0.008572561666369438... | [
-0.28520315885543823,
-0.006570218596607447,
0.4695628881454468,
0.033038247376680374,
-0.2687356173992157,
0.11987821012735367,
0.4944942891597748,
-0.2431243360042572,
0.4074336588382721,
-0.4478365480899811,
-0.4562399089336395,
0.6517915725708008,
0.18162506818771362,
0.205456092953681... |
This paper describes a data set collected by an autonomous ground vehicle testbed, based upon a modified Ford F-250 pickup truck. The vehicle is outfitted with a professional (Applanix POS-LV) and consumer (Xsens MTi-G) inertial measurement unit (IMU), a Velodyne 3D-lidar scanner, two push-broom forward looking Riegl l... | [
-0.0015748548321425915,
-0.0047098929062485695,
-0.007886948995292187,
-0.011550884693861008,
0.005227480083703995,
0.009323729202151299,
0.00753512280061841,
0.008503020741045475,
-0.005514352582395077,
0.015445703640580177,
-0.00855830404907465,
0.009284311905503273,
0.0010605885181576014,... | [
-0.08495403081178665,
0.2327764630317688,
0.30739474296569824,
0.49084609746932983,
0.04742884635925293,
0.3449043035507202,
-0.07938535511493683,
-0.3713916540145874,
0.006144434213638306,
0.005758983548730612,
-0.08248363435268402,
0.19287718832492828,
0.3221972584724426,
0.0839290693402... |
Graph mining is a challenging task by itself, and even more so when processing data streams which evolve in real-time. Data stream mining faces hard constraints regarding time and space for processing, and also needs to provide for concept drift detection. In this paper we present a framework for studying graph pattern... | [
-0.010811915621161461,
0.005146564915776253,
-0.0037228281144052744,
0.01836981438100338,
0.009344943799078465,
-0.018636886030435562,
0.008426129817962646,
-0.004796928726136684,
-0.01458730362355709,
0.020740516483783722,
-0.004792464431375265,
0.015191487036645412,
-0.0018396428786218166,... | [
0.01118862722069025,
-0.010549154132604599,
0.15570159256458282,
0.3120632767677307,
-0.2222437709569931,
0.016392871737480164,
0.12071825563907623,
-0.11384221911430359,
-0.3879275321960449,
-0.5240144729614258,
0.06070415675640106,
0.1819995492696762,
-0.40467116236686707,
0.365073680877... |
Sequence-to-sequence models have shown promising improvements on the temporal task of video captioning, but they optimize word-level cross-entropy loss during training. First, using policy gradient and mixed-loss methods for reinforcement learning, we directly optimize sentence-level task-based metrics (as rewards), ac... | [
0.010883576236665249,
0.004531369544565678,
-0.01969349943101406,
0.007406400516629219,
0.02192472107708454,
-0.018624616786837578,
0.010027523152530193,
-0.0027600624598562717,
-0.008576516062021255,
0.011604970321059227,
-0.01182017382234335,
0.009511821903288364,
0.008309941738843918,
0... | [
-0.14368794858455658,
-0.3857608139514923,
-0.21334198117256165,
0.28150418400764465,
-0.08268892765045166,
0.6214109063148499,
-0.03205341100692749,
-0.43236660957336426,
0.14490169286727905,
-0.6549925208091736,
-0.021022120490670204,
0.6401540040969849,
-0.3698210120201111,
0.0659131631... |
The imminent arrival of the Internet of Things (IoT), which consists of a vast number of devices with heterogeneous characteristics, means that future networks need a new architecture to accommodate the expected increase in data generation. Software defined networking (SDN) and network virtualization (NV) are two techn... | [
-0.015057984739542007,
-0.0019243046408519149,
-0.005171360448002815,
-0.0008981525897979736,
-0.0204943735152483,
-0.005343007855117321,
0.0085991732776165,
0.022464580833911896,
-0.005243501625955105,
0.010746859945356846,
-0.01053056214004755,
0.007956165820360184,
-0.0013480044435709715,... | [
0.026803607121109962,
-0.2994022071361542,
0.35548946261405945,
0.3245373070240021,
0.36082160472869873,
-0.21626245975494385,
-0.0849979817867279,
0.33934396505355835,
-0.4036254584789276,
-1.144997000694275,
0.04589538276195526,
0.2616470158100128,
-0.23902034759521484,
0.286901503801345... |
This study helps in monitoring blood glucose level of a patient with the aid of an android device non-invasively. Diabetes is a metabolic disease characterized by high level of sugar in the blood, and considered as the fastest growing long-term disease affecting millions of people globally. The study measures the blood... | [
-0.009833671152591705,
0.0013719098642468452,
-0.015892688184976578,
-0.011546307243406773,
0.02083374187350273,
-0.017184006050229073,
0.009922036901116371,
0.013373462483286858,
-0.007099416572600603,
-0.018653549253940582,
-0.01163111999630928,
0.011016658507287502,
0.0027947884518653154,... | [
0.18814359605312347,
-0.23694011569023132,
0.23355485498905182,
0.28080737590789795,
0.257720023393631,
0.38264015316963196,
0.23486915230751038,
-0.24044987559318542,
0.043122533708810806,
-0.48960500955581665,
0.3709430992603302,
0.4295186996459961,
-0.03758292645215988,
-0.2894160449504... |
Learning a good representation of text is key to many recommendation applications. Examples include news recommendation where texts to be recommended are constantly published everyday. However, most existing recommendation techniques, such as matrix factorization based methods, mainly rely on interaction histories to l... | [
0.020141467452049255,
0.012174282222986221,
-0.013933572918176651,
0.012545701116323471,
0.0035492917522788048,
-0.02564484253525734,
0.010046529583632946,
-0.007078852038830519,
-0.015858814120292664,
0.02813107520341873,
-0.015093110501766205,
0.003943637013435364,
0.01671624556183815,
0... | [
-0.023815380409359932,
0.09539994597434998,
0.265349805355072,
0.3360815644264221,
-0.08444797247648239,
-0.24452123045921326,
0.3659120500087738,
-0.04247206449508667,
0.0464143306016922,
-0.8369925022125244,
0.048286184668540955,
0.7966761589050293,
-0.08231545239686966,
-0.1973606944084... |
As humans, we have expectations for the results of any action, e.g. we expect at least one student to be returned when we query a university database for student records. When these expectations are not met, traditional database users often explore datasets via a series of slightly altered SQL queries. Yet most databas... | [
0.014346474781632423,
0.01030568964779377,
0.0012841935968026519,
0.01328995544463396,
0.003312141401693225,
-0.01567002944648266,
0.0072619616985321045,
-0.00023879134096205235,
-0.008046338334679604,
-0.029044536873698235,
-0.00353030557744205,
0.00994451530277729,
-0.00604476872831583,
... | [
0.3257857859134674,
-0.021441111341118813,
-0.020289797335863113,
0.5195069909095764,
0.014985519461333752,
0.21554313600063324,
0.4964640140533447,
0.10700627416372299,
-0.2442457228899002,
-0.6511678099632263,
-0.2540561854839325,
0.33358702063560486,
-0.06225261837244034,
0.023133913055... |
Due to the complex structure and handwritten deformation, the offline handwritten Chinese characters recognition has been one of the most challenging problems. In this paper, an offline handwritten Chinese character recognition tool has been developed based on the Tesseract open source OCR engine. The tool mainly contr... | [
0.0006265691481530666,
0.01632555201649666,
-0.006809826008975506,
0.013571275398135185,
-0.02859484776854515,
-0.00871405191719532,
0.01066000945866108,
0.0005539827980101109,
-0.016350405290722847,
-0.011825861409306526,
-0.009469839744269848,
0.009926605969667435,
0.027396872639656067,
... | [
-0.4731427729129791,
0.1622992753982544,
0.26885735988616943,
0.03426350653171539,
-0.2550446689128876,
0.3187548816204071,
-0.1331600397825241,
-0.2012074887752533,
0.038171373307704926,
-0.6347489953041077,
-0.1819898635149002,
0.32524266839027405,
0.10937841981649399,
-0.059832930564880... |
The modular Gal4 system has proven to be an extremely useful tool for conditional gene expression in Drosophila. One limitation has been the inability of the system to work in the female germline. A modified Gal4 system that works throughout oogenesis is presented here. To achieve germline expression, it was critical t... | [
-0.0160895474255085,
0.011955728754401207,
-0.02697792649269104,
0.01658116653561592,
0.008224114775657654,
-0.0033735018223524094,
0.011876881122589111,
-0.007413710467517376,
-0.013603825122117996,
-0.02001611702144146,
-0.006838583387434483,
0.012867029756307602,
-0.013603702187538147,
... | [
0.0722993016242981,
-0.23879262804985046,
0.26345521211624146,
-0.08562049269676208,
0.02171880193054676,
0.5128107666969299,
0.2673726975917816,
-0.4468831419944763,
-0.19317246973514557,
-0.2510232627391815,
0.04708389937877655,
0.3069785237312317,
-0.33034348487854004,
-0.04795926064252... |
Current state-of-the-art relation extraction methods typically rely on a set of lexical, syntactic, and semantic features, explicitly computed in a pre-processing step. Training feature extraction models requires additional annotated language resources, which severely restricts the applicability and portability of rela... | [
0.018038883805274963,
0.005161757580935955,
0.000355030526407063,
0.016924798488616943,
-0.014679355546832085,
0.003957095555961132,
0.00966694951057434,
-0.01016772910952568,
-0.009920520707964897,
0.015760913491249084,
-0.008023068308830261,
0.01478008646517992,
0.0013419459573924541,
0.... | [
0.31888800859451294,
-0.14909370243549347,
-0.11117280274629593,
0.45396000146865845,
0.04369195178151131,
0.02268790267407894,
-0.04153554514050484,
-0.29400870203971863,
0.09646224230527878,
-0.6189292669296265,
-0.3490166664123535,
1.1523089408874512,
0.23434297740459442,
0.054080050438... |
A corporate feed slotted waveguide array antenna with broadband characteristics in term of gain in the 350 GHz band is achieved by measurement for the first time. The etching accuracy for thin laminated plates of the diffusion bonding process with conventional chemical etching is limited to ±20μm. This limits the use o... | [
-0.0024361838586628437,
0.005308838561177254,
-0.020875118672847748,
0.012430207803845406,
-0.02048536017537117,
-0.026577435433864594,
0.011230168864130974,
-0.015538439154624939,
-0.012390632182359695,
0.0059500508941709995,
-0.0032190876081585884,
0.019059062004089355,
-0.0187404770404100... | [
1.0611690282821655,
0.15298181772232056,
0.37294894456863403,
0.08756454288959503,
0.014769907109439373,
-0.25245705246925354,
-0.2180202603340149,
-0.2052939534187317,
0.19758957624435425,
-0.22329270839691162,
-0.3684394061565399,
0.9607657790184021,
-0.20593512058258057,
0.1743679344654... |
Convex empirical risk minimization is a basic tool in machine learning and statistics. We provide new algorithms and matching lower bounds for differentially private convex empirical risk minimization assuming only that each data point's contribution to the loss function is Lipschitz and that the domain of optimization... | [
0.025809645652770996,
0.008030065335333347,
-0.004908793140202761,
0.0215914249420166,
0.015523448586463928,
-0.026953760534524918,
0.011554771102964878,
-0.0022528977133333683,
-0.012742978520691395,
0.026030052453279495,
0.0013522061053663492,
0.018623773008584976,
-0.0064916773699223995,
... | [
-0.24086108803749084,
0.07302498817443848,
0.17074376344680786,
0.17284053564071655,
-0.2717476189136505,
0.48078349232673645,
-0.1998542994260788,
-0.4002847969532013,
0.09583351761102676,
-0.25577446818351746,
0.06711705029010773,
0.7651246786117554,
-0.3725970685482025,
-0.0732559040188... |
A wide range of malicious activities rely on the domain name service (DNS) to manage their large, distributed networks of infected machines. As a consequence, the monitoring and analysis of DNS queries has recently been proposed as one of the most promising techniques to detect and blacklist domains involved in malicio... | [
-0.00078966049477458,
-0.0020314394496381283,
0.004279419779777527,
0.008841395378112793,
-0.0007611351320520043,
-0.013275021687150002,
0.007265075109899044,
0.012162650004029274,
-0.008461948484182358,
-0.0024231034331023693,
-0.010695935226976871,
0.006387507077306509,
-0.0024431841447949... | [
0.6501365303993225,
0.07312151789665222,
-0.14198024570941925,
0.20014508068561554,
-0.3204334080219269,
-0.18991303443908691,
0.4545201361179352,
0.19076018035411835,
-0.47135254740715027,
-0.4287298619747162,
0.003812277689576149,
0.2646459937095642,
-0.4806845784187317,
0.43655437231063... |
We consider a statistical database in which a trusted administrator introduces noise to the query responses with the goal of maintaining privacy of individual database entries. In such a database, a query consists of a pair (S, f) where S is a set of rows in the database and f is a function mapping database rows to {0,... | [
0.015484497882425785,
0.01279503758996725,
0.0009222147054970264,
0.011629575863480568,
-0.0006359715480357409,
-0.01249423436820507,
0.007656623609364033,
-0.008574247360229492,
-0.012541590258479118,
-0.015075845643877983,
-0.013770931400358677,
0.010100788436830044,
-0.00562861654907465,
... | [
0.3010309636592865,
-0.0007315765251405537,
-0.11864059418439865,
0.14248181879520416,
-0.12151850014925003,
0.36084362864494324,
0.18462054431438446,
-0.640835702419281,
0.16296809911727905,
-0.42941364645957947,
-0.32810887694358826,
0.23895364999771118,
-0.608534574508667,
0.12457559257... |
Privacy-preserving machine learning algorithms are crucial for the increasingly common setting in which personal data, such as medical or financial records, are analyzed. We provide general techniques to produce privacy-preserving approximations of classifiers learned via (regularized) empirical risk minimization (ERM)... | [
0.010362638160586357,
0.011813228949904442,
-0.008190536871552467,
0.014473013579845428,
-0.021742215380072594,
-0.021344343200325966,
0.01014513336122036,
-0.014627205207943916,
-0.007401788607239723,
0.015513885766267776,
0.0006686958950012922,
0.013204282149672508,
0.009051550179719925,
... | [
-0.12161648273468018,
0.2146574705839157,
-0.013627132400870323,
0.2897570729255676,
0.1773996353149414,
0.09368565678596497,
-0.22398346662521362,
-0.3456629514694214,
0.0933353528380394,
-0.25689035654067993,
-0.21896256506443024,
0.8554738759994507,
-0.2535416781902313,
-0.1290728151798... |
Many resource allocation problems can be formulated as an optimization problem whose constraints contain sensitive information about participating users. This paper concerns a class of resource allocation problems whose objective function depends on the aggregate allocation (i.e., the sum of individual allocations); in... | [
-0.008083920925855637,
0.0064789713360369205,
0.0035847597755491734,
0.01855655014514923,
-0.013798370957374573,
-0.02433791570365429,
0.009022844955325127,
-0.008052260614931583,
-0.01385328359901905,
-0.0027732825838029385,
-0.011495441198348999,
0.01721545308828354,
0.004374748561531305,
... | [
0.009342928417026997,
0.0034729624167084694,
-0.010071412660181522,
0.27235910296440125,
0.06342320889234543,
0.14175646007061005,
-0.090876005589962,
0.07713328301906586,
-0.5590833425521851,
-0.707283616065979,
-0.3686218857765198,
0.4854440689086914,
-0.6673694849014282,
0.1565298587083... |
Recommender Systems act as a personalized decision guides, aiding users in decisions on matters related to personal taste. Most previous research on Recommender Systems has focused on the statistical accuracy of the algorithms driving the systems, with little emphasis on interface issues and the user's perspective. The... | [
0.012719579041004181,
0.02060558646917343,
-0.006141830235719681,
0.012139840051531792,
-0.024725355207920074,
-0.03111288696527481,
0.010789657011628151,
-0.009108583442866802,
-0.012727106921374798,
0.0029679294675588608,
-0.010242614895105362,
0.02023070491850376,
0.02883569896221161,
0... | [
0.2324514091014862,
0.20749826729297638,
0.40092721581459045,
0.2587898075580597,
0.009815833531320095,
0.1518336683511734,
0.016148259863257408,
-0.18427853286266327,
0.11051944643259048,
-0.5385456681251526,
-0.05420057848095894,
0.739470362663269,
-0.042023904621601105,
-0.0376325212419... |
The work presented here applies deep learning to the task of automated cardiac auscultation, i.e. recognizing abnormalities in heart sounds. We describe an automated heart sound classification algorithm that combines the use of time-frequency heat map representations with a deep convolutional neural network (CNN). Give... | [
0.007085040211677551,
0.008446232415735722,
-0.01087953057140112,
0.011334994807839394,
-0.0032261176966130733,
-0.030932430177927017,
0.01150650717318058,
0.0002584520843811333,
-0.010000616312026978,
0.021440541371703148,
-0.0032229360658675432,
0.007601540070027113,
0.0008368454873561859,... | [
-0.006336817052215338,
-0.04292316362261772,
-0.10959745943546295,
-0.01497415080666542,
0.13478243350982666,
0.3514457941055298,
-0.048898790031671524,
-0.38546931743621826,
0.08707623183727264,
-0.597064197063446,
0.031079020351171494,
0.4199049174785614,
0.2327750325202942,
0.1842875629... |
Active safety systems are based upon the accurate and fast estimation of the value of important dynamical variables such as forces, load transfer, actual tire-road friction (kinetic friction) muk, and maximum tire-road friction available (potential friction) mup. Measuring these parameters directly from tires offers th... | [
-0.007829798385500908,
0.0064459508284926414,
-0.010547548532485962,
0.00901143066585064,
0.031605497002601624,
-0.0024500382132828236,
0.010183839127421379,
0.005630955100059509,
-0.014439551159739494,
-0.0014174178941175342,
-0.009704011492431164,
0.017031444236636162,
-0.01564612425863743... | [
0.357565701007843,
0.03903217986226082,
0.4967021942138672,
0.30811166763305664,
-0.01088649407029152,
0.03026757761836052,
0.10269827395677567,
-0.3781420588493347,
0.10305286198854446,
-0.740401029586792,
-0.14198711514472961,
1.234097957611084,
-0.172048419713974,
-0.37202203273773193,
... |
Just-in-time (JIT) compilation of running programs provides more optimization opportunities than offline compilation. Modern JIT compilers, such as those in virtual machines like Oracle's HotSpot for Java or Google's V8 for JavaScript, rely on dynamic profiling as their key mechanism to guide optimizations. While these... | [
-0.003209868911653757,
0.003446100279688835,
-0.002835852326825261,
0.004134842194616795,
0.003306914586573839,
0.006462374236434698,
0.008799219503998756,
0.005432816222310066,
-0.014252074994146824,
0.0060070282779634,
-0.002138429321348667,
0.012048947624862194,
0.024036619812250137,
0.... | [
0.28466150164604187,
-0.16184663772583008,
-0.34662625193595886,
0.3596038222312927,
-0.10684207826852798,
0.03599541261792183,
0.2794990837574005,
-0.0525691956281662,
0.16694650053977966,
-0.2095116674900055,
0.07104721665382385,
0.3051163852214813,
-0.3105493485927582,
-0.26015681028366... |
Recommendation of scientific papers is a task aimed to support researchers in accessing relevant articles from a large pool of unseen articles. When writing a paper, a researcher focuses on the topics related to her/his scientific domain, by using a technical language. The core idea of this paper is to exploit the topi... | [
0.00963822565972805,
0.019774891436100006,
0.00782853551208973,
0.01564038172364235,
-0.02118273265659809,
-0.009690435603260994,
0.009248566813766956,
-0.02419213578104973,
-0.009860768914222717,
-0.017427505925297737,
0.001826235675252974,
0.003342083189636469,
0.0102697117254138,
0.0046... | [
0.057340629398822784,
0.3018825650215149,
0.38462191820144653,
0.2696889340877533,
-0.04454871267080307,
-0.2624376118183136,
-0.14592254161834717,
-0.08405593037605286,
0.0026700145099312067,
-0.4391135573387146,
-0.1827959269285202,
0.23937703669071198,
0.18008486926555634,
0.20140492916... |
In this paper, we focus on developing a novel mechanism to preserve differential privacy in deep neural networks, such that: (1) The privacy budget consumption is totally independent of the number of training steps; (2) It has the ability to adaptively inject noise into features based on the contribution of each to the... | [
0.01010500080883503,
0.0023525117430835962,
-0.002285831840708852,
0.00522197037935257,
-0.0255878958851099,
-0.03157442808151245,
0.007470391225069761,
-0.007896166294813156,
-0.009820979088544846,
-0.007483065593987703,
0.0005490139592438936,
0.010810913518071175,
-0.00839358288794756,
0... | [
0.24413153529167175,
-0.07363825291395187,
-0.11722662299871445,
0.3951603174209595,
0.16115005314350128,
0.12035191804170609,
0.023169906809926033,
-0.54012531042099,
-0.15080732107162476,
-0.6261406540870667,
-0.025849683210253716,
0.5749979019165039,
-0.012468643486499786,
0.27159431576... |
Massively multiplayer online role-playing games (MMORPGs) are video games in which players create an avatar that evolves and interacts with other avatars in a persistent virtual world. Motivations to play MMORPGs are heterogeneous (e.g. achievement, socialisation, immersion in virtual worlds). This study investigates i... | [
-0.013291364535689354,
0.013757824897766113,
0.0024807890877127647,
0.000420150114223361,
0.014876114204525948,
-0.02854609116911888,
0.009150411933660507,
-0.02784944325685501,
-0.011378140188753605,
0.009489094838500023,
-0.011146597564220428,
0.022809697315096855,
0.013749326579272747,
... | [
-0.018911181017756462,
-0.2404530793428421,
0.08705368638038635,
0.1859579235315323,
0.006709422916173935,
0.1198573037981987,
0.0946405827999115,
0.373155415058136,
-0.43568816781044006,
-0.18605533242225647,
-0.2367403507232666,
0.5176597833633423,
-0.2558804750442505,
-0.119700245559215... |
It is not sufficient to merely check the syntax of new policies before they are deployed in a system; policies need to be analyzed for their interactions with each other and with their local environment. That is, policies need to go through a ratification process. We believe policy ratification becomes an essential par... | [
0.006248034071177244,
0.021443458274006844,
-0.004123061895370483,
0.007707530632615089,
0.013858038932085037,
-0.01669415831565857,
0.009014254435896873,
0.011754192411899567,
-0.015285378322005272,
0.004244416486471891,
-0.013869915157556534,
0.013531293720006943,
-0.009173532016575336,
... | [
0.525664746761322,
0.10808540880680084,
0.33423346281051636,
0.32448431849479675,
0.290825754404068,
-0.07827591896057129,
-0.08078067004680634,
-0.5829887390136719,
-0.21742068231105804,
-0.7805553674697876,
-0.09991264343261719,
0.5340301394462585,
-0.08530160039663315,
-0.15814718604087... |
A new measure of centrality, C,, is introduced. It is based on the concept of network flows. While conceptually similar to Freeman’s original measure, Ca, the new measure differs from the original in two important ways. First, C, is defined for both valued and non-valued graphs. This makes C, applicable to a wider vari... | [
-0.024263909086585045,
0.02119683288037777,
-0.01436468306928873,
0.010022146627306938,
0.00557284289970994,
-0.03519420325756073,
0.009118632413446903,
-0.025543397292494774,
-0.013695958070456982,
-0.016332490369677544,
-0.00987239833921194,
0.01291164755821228,
-0.007348460145294666,
0.... | [
-0.2432163953781128,
-0.24013012647628784,
0.6586442589759827,
0.5125430822372437,
-0.27684855461120605,
-0.032923437654972076,
-0.1970454901456833,
-0.21510501205921173,
-0.3938785195350647,
-0.3107137978076935,
-0.0890694335103035,
0.08837344497442245,
-0.25416454672813416,
0.68794417381... |
Distributed energy resources (DERs), such as photovoltaic, wind, and gas generators, are connected to the grid more than ever before, which introduces tremendous changes in the distribution grid. Due to these changes, it is important to understand where these DERs are connected in order to sustainably operate the distr... | [
-0.00739962188526988,
-0.0017041753744706511,
-0.008904121816158295,
0.014168662019073963,
-0.011214392259716988,
-0.01383219100534916,
0.009227463975548744,
-0.00402017030864954,
-0.013793621212244034,
-0.011853815987706184,
0.003393422579392791,
0.018578866496682167,
0.009461067616939545,
... | [
0.4465791881084442,
-0.21986541152000427,
0.3823494613170624,
0.5778628587722778,
0.04408669471740723,
-0.1834535300731659,
-0.3891223669052124,
-0.0569465346634388,
-0.33337244391441345,
-0.8935263156890869,
-0.30849242210388184,
0.4551611542701721,
-0.2403099089860916,
0.2512823045253753... |
IEEE 802.11 Medium Access Control(MAC) is proposed to support asynchronous and time bounded delivery of radio data packets in infrastructure and ad hoc networks. The basis of the IEEE 802.11 WLAN MAC protocol is Distributed Coordination Function(DCF), which is a Carrier Sense Multiple Access with Collision Avoidance(CS... | [
-0.008698314428329468,
0.005828232038766146,
-0.01123079378157854,
-0.004428289830684662,
0.021505221724510193,
-0.029832880944013596,
0.009182083420455456,
-0.009567903354763985,
-0.008601466193795204,
-0.013242723420262337,
-0.009544548578560352,
0.010000156238675117,
0.014077670872211456,... | [
-0.07871542125940323,
-0.13541677594184875,
0.8419199585914612,
0.11117846518754959,
0.0013889895053580403,
-0.40484797954559326,
-0.12676507234573364,
-0.09296504408121109,
-0.2520923912525177,
-0.6411228775978088,
-0.5407634973526001,
0.7939159870147705,
-0.5617688894271851,
-0.131316199... |
Data mining now-a-days plays an important role in prediction of diseases in health care industry. The Health care industry utilizes data mining Techniques and finds out the information which is hidden in the data set. Many diagnoses have been done for predicting diseases. Without knowing the knowledge of profound medic... | [
0.006481400690972805,
0.0167674757540226,
-0.014986684545874596,
0.003097747452557087,
0.008304253220558167,
-0.0013608681038022041,
0.008467139676213264,
-0.004243422299623489,
-0.00936831347644329,
-0.0061367289163172245,
-0.003321664873510599,
0.013189727440476418,
0.008613883517682552,
... | [
0.3786736726760864,
0.04632005840539932,
0.09792780131101608,
0.5897173285484314,
0.16658811271190643,
0.024529799818992615,
0.16253629326820374,
0.05002511292695999,
-0.17550790309906006,
-0.506081223487854,
0.18198247253894806,
0.15816043317317963,
-0.14678321778774261,
0.173573270440101... |
A 45GHz Doherty power amplifier is implemented in 45nm SOI CMOS. Two-stack FET amplifiers are used as main and auxiliary amplifiers, allowing a supply voltage of 2.5V and high output power. The use of slow-wave coplanar waveguides (CPW) improves the PAE and gain by approximately 3% and 1dB, and reduces the die area by ... | [
-0.02235376462340355,
0.0033750939182937145,
-0.01093891728669405,
0.020288674160838127,
-0.018512818962335587,
-0.020608380436897278,
0.009367335587739944,
-0.006580504588782787,
-0.009032607078552246,
0.017226651310920715,
-0.0027984296903014183,
0.002153668086975813,
-0.005002645310014486... | [
0.15597213804721832,
-0.303607314825058,
0.6202256679534912,
0.0831831619143486,
-0.2795897126197815,
0.25499704480171204,
0.15129394829273224,
-0.48052725195884705,
0.2772369384765625,
-0.6322003602981567,
-0.06655403226613998,
0.8845301270484924,
-0.11096631735563278,
-0.0793874636292457... |
Used for thermal energy harvesting, thermoelectric generator (TEG) can convert heat into electricity directly. Structurally, the main part of TEG is the thermopile, which consists of thermocouples connected in series electrically and in parallel thermally. Benefiting from massive progress achieved in a microelectromech... | [
-0.00060310959815979,
0.007474223151803017,
0.001099042478017509,
0.015706118196249008,
-0.01215845625847578,
0.000892244279384613,
0.009401006624102592,
-0.009503575973212719,
-0.013699173927307129,
-0.005822042003273964,
-0.01079706009477377,
0.0046929484233260155,
-0.008391345851123333,
... | [
0.779647946357727,
-0.1782904714345932,
0.34341850876808167,
0.3702206015586853,
-0.17132049798965454,
-0.005452489014714956,
-0.5730971693992615,
-0.2976435422897339,
0.060664430260658264,
-0.0739213153719902,
-0.21110282838344574,
0.19123537838459015,
-0.27452224493026733,
0.525196015834... |
The release engineering process is the process that brings high quality code changes from a developer's workspace to the end user, encompassing code change integration, continuous integration, build system specifications, infrastructure-as-code, deployment and release. Recent practices of continuous delivery, which bri... | [
-0.0007777400314807892,
0.015011136420071125,
-0.003196816658601165,
-0.0041517652571201324,
-0.004563814029097557,
-0.003204976674169302,
0.006062555126845837,
-0.004819492343813181,
-0.00893676932901144,
-0.03187743201851845,
-0.0027289637364447117,
0.02082594484090805,
0.01249290630221366... | [
0.7082114219665527,
0.27850255370140076,
0.006157968658953905,
-0.14091743528842926,
0.05192594230175018,
0.07125891000032425,
0.07484810799360275,
-0.17120304703712463,
-0.010310335084795952,
-0.30421099066734314,
-0.642959713935852,
0.6712157726287842,
0.11423741281032562,
0.003242293605... |
Cloud computing has emerged as a very important commercial infrastructure that promises to reduce the need for maintaining costly computing facilities by organizations and institutes. Through the use of virtualization and time sharing of resources, clouds serve with a single set of physical resources as a large user ba... | [
-0.014097193256020546,
0.015814159065485,
0.002128785476088524,
0.0027122076135128736,
-0.005651907995343208,
-0.027065657079219818,
0.006951420102268457,
-0.0018753624754026532,
-0.007868016138672829,
-0.012606080621480942,
-0.005452604964375496,
0.011431884951889515,
0.004171675071120262,
... | [
0.40315327048301697,
0.28782814741134644,
0.2849333882331848,
0.550000786781311,
0.3780394494533539,
0.05646715685725212,
-0.1839877814054489,
0.3439609110355377,
-0.3752830922603607,
-0.7233023643493652,
-0.43206650018692017,
0.3195512294769287,
-0.3437286913394928,
0.24959160387516022,
... |
Language Oriented Programming (LOP) is a paradigm that puts domain specific programming languages (DSLs) at the center of the software development process. Currently, there are three main approaches to LOP: (1) the use of internal DSLs, implemented as libraries in a given host language; (2) the use of external DSLs, im... | [
-0.005451603792607784,
0.002511252649128437,
-0.011512702330946922,
0.004258500412106514,
-0.01807497814297676,
0.007861368358135223,
0.0082401717081666,
0.0049173724837601185,
-0.006823604926466942,
-0.01050831563770771,
-0.012249205261468887,
0.004137228708714247,
0.0167604498565197,
0.0... | [
0.2080291360616684,
-0.054299887269735336,
0.038034405559301376,
0.1740008294582367,
0.26157039403915405,
0.19677789509296417,
-0.390747606754303,
-0.06104607507586479,
-0.3703780472278595,
-0.11088401079177856,
-0.651122510433197,
0.43442457914352417,
-0.3514519929885864,
-0.3515071570873... |
People interact with chairs frequently, making them a potential location to perform implicit health sensing that requires no additional effort by users. We surveyed 550 participants to understand how people sit in chairs and inform the design of a chair that detects heart and respiratory rate from the armrests and back... | [
0.015383731573820114,
0.008675945922732353,
-0.02116621844470501,
0.01330824475735426,
-0.013003482483327389,
-0.026482388377189636,
0.008624834008514881,
-0.024185312911868095,
-0.015803784132003784,
-0.002523920964449644,
0.0072861844673752785,
0.01667088270187378,
0.006884579546749592,
... | [
0.23775744438171387,
-0.038478124886751175,
0.5381100177764893,
0.1852160096168518,
0.018912918865680695,
0.38410288095474243,
0.036365967243909836,
-0.32662642002105713,
-0.5135404467582703,
-0.6620954275131226,
0.13716024160385132,
0.20780952274799347,
0.0045655351132154465,
-0.284343272... |
We motivate and describe a new freely available human-human dialogue data set for interactive learning of visually grounded word meanings through ostensive definition by a tutor to a learner. The data has been collected using a novel, character-by-character variant of the DiET chat tool (Healey et al., 2003; Mills and ... | [
0.0048409802839159966,
0.0005400415975600481,
-0.011409672908484936,
0.006221219431608915,
-0.02083749510347843,
-0.02315002866089344,
0.009637923911213875,
0.0022674009669572115,
-0.011659787967801094,
0.0366789735853672,
-0.01225206907838583,
0.00010918761836364865,
0.018048541620373726,
... | [
0.41380637884140015,
0.15783052146434784,
-0.026855474337935448,
0.25656986236572266,
0.20812655985355377,
0.28951358795166016,
0.2906138300895691,
-0.3591051697731018,
0.4845334589481354,
-0.5304602980613708,
0.044861193746328354,
0.6673030853271484,
-0.3282364308834076,
-0.52239197492599... |
In many applications, optimization of a collection of problems is required where each problem is structurally the same, but in which some or all of the data defining the instance is updated. Such models are easily specified within modern modeling systems, but have often been slow to solve due to the time needed to rege... | [
-0.009574474766850471,
0.006796743720769882,
-0.002640897873789072,
0.016113340854644775,
0.014242918230593204,
-0.01655898615717888,
0.006510414648801088,
-0.005158488638699055,
-0.007220895495265722,
0.012838135473430157,
-0.009746789932250977,
0.014810055494308472,
0.004097744822502136,
... | [
-0.0014198286226019263,
0.028557734563946724,
-0.08041410148143768,
0.27337461709976196,
0.2877987325191498,
0.06804932653903961,
0.0007141362875699997,
-0.17119961977005005,
-0.25919362902641296,
-0.6938942074775696,
-0.34866803884506226,
0.6526126861572266,
-0.3717184066772461,
-0.080822... |
Article history: Received 7 January 2008 Received in revised form 24 June 2008 Accepted 31 July 2008 Available online 5 April 2009 Outsourcing is a phenomenon that as a practice originated in the 1950s, but it was not until the 1980s when the strategy became widely adopted in organizations. Since then, the strategy has... | [
-0.0033369276206940413,
0.013454599305987358,
-0.008099461905658245,
0.0025869079399853945,
0.0033347217831760645,
-0.003775109304115176,
0.005417622625827789,
-0.0016320919385179877,
-0.01021883450448513,
0.005517781712114811,
-0.011210562661290169,
0.017460020259022713,
0.01609280519187450... | [
0.15696927905082703,
0.24576769769191742,
0.2415543496608734,
0.034346118569374084,
0.061812106519937515,
-0.07606539130210876,
-0.1399073451757431,
-0.04350746050477028,
-0.1954267919063568,
0.14940612018108368,
-0.4571323096752167,
0.8432400822639465,
0.012935982085764408,
0.353096544742... |
Virtual machines were developed by IBM in the 1960’s to provide concurrent, interactive access to a mainframe computer. Each virtual machine is a replica of the underlying physical machine and users are given the illusion of running directly on the physical machine. Virtual machines also provide benefits like isolation... | [
0.020489869639277458,
0.007311075925827026,
0.0008745149825699627,
-0.002181694144383073,
-0.046627044677734375,
-0.0013498819898813963,
0.010627975687384605,
0.0239696241915226,
-0.012758934870362282,
0.016041148453950882,
-0.031046094372868538,
0.014765134081244469,
0.008460660465061665,
... | [
-0.03781016170978546,
0.028627078980207443,
0.43794092535972595,
0.5784426927566528,
0.09769217669963837,
0.29035839438438416,
-0.3879759609699249,
0.4145636558532715,
-0.36277902126312256,
-0.6944478750228882,
-0.04485414922237396,
0.5234377980232239,
-0.1395411640405655,
0.66341960430145... |
Genome-wide association studies (GWASs) have become the focus of the statistical analysis of complex traits in humans, successfully shedding light on several aspects of genetic architecture and biological aetiology. Single-nucleotide polymorphisms (SNPs) are usually modelled as having additive, cumulative and independe... | [
-0.0023760483600199223,
0.008299898356199265,
-0.005171602126210928,
0.03555704280734062,
0.014229485765099525,
-0.009419710375368595,
0.009976183995604515,
-0.015700165182352066,
-0.010110471397638321,
0.032168734818696976,
-0.006768369115889072,
0.010970359668135643,
-0.013414968736469746,... | [
0.24768738448619843,
-0.05496246740221977,
-0.2477702647447586,
-0.0722201019525528,
-0.4999596178531647,
-0.25297820568084717,
0.3120717406272888,
-0.07951818406581879,
-0.1975216120481491,
-0.391591340303421,
0.16014181077480316,
0.10243653506040573,
-0.6254805326461792,
0.19996212422847... |
Databases often contain uncertain and imprecise references to real-world entities. Entity resolution, the process of reconciling multiple references to underlying real-world entities, is an important data cleaning process required before accurate visualization or analysis of the data is possible. In many cases, in addi... | [
0.01223656628280878,
0.01754079945385456,
-0.005439504981040955,
0.008260788396000862,
-0.006461650133132935,
-0.00871939118951559,
0.008923456072807312,
-0.008068548515439034,
-0.008306535892188549,
-0.012604030780494213,
0.0002245322393719107,
0.01991785690188408,
-0.0017092265188694,
0.... | [
0.026473505422472954,
0.347943514585495,
0.30901286005973816,
0.8038439154624939,
0.135271817445755,
-0.44924989342689514,
0.09027751535177231,
-0.04268958792090416,
-0.22638513147830963,
-0.6525445580482483,
-0.1359272599220276,
0.4688848853111267,
-0.30656594038009644,
0.4929322302341461... |
This paper introduces a large air-gap capacitive wireless power transfer (WPT) system for electric vehicle charging that achieves a power transfer density exceeding the state-of-the-art by more than a factor of four. This high power transfer density is achieved by operating at a high switching frequency (6.78 MHz), com... | [
-0.019188424572348595,
0.0038086508866399527,
-0.008607426658272743,
0.0043005552142858505,
0.007761448621749878,
-0.037194956094026566,
0.008999727666378021,
-0.029158223420381546,
-0.008843118324875832,
0.005339616443961859,
-0.007764835841953754,
0.021549399942159653,
0.00534573569893837,... | [
0.32962292432785034,
0.012672562152147293,
0.31104063987731934,
0.3670165240764618,
-0.08040682971477509,
-0.08300064504146576,
-0.38385483622550964,
-0.6848512887954712,
0.07450427114963531,
-0.33945590257644653,
-0.10964731127023697,
0.5244982242584229,
0.1318933516740799,
0.199053719639... |
1 Why develop an ontology? In recent years the development of ontologies—explicit formal specifications of the terms in the domain and relations among them (Gruber 1993)—has been moving from the realm of ArtificialIntelligence laboratories to the desktops of domain experts. Ontologies have become common on the World-Wi... | [
-0.009365358389914036,
0.005349134095013142,
-0.0048754857853055,
0.01599511131644249,
-0.011037816293537617,
0.013303457759320736,
0.006249070167541504,
0.009949127212166786,
-0.01071699894964695,
-0.02107546105980873,
-0.001901158015243709,
0.015746304765343666,
-0.004810904618352652,
0.... | [
0.7389209270477295,
0.24578016996383667,
0.05793627351522446,
0.24678947031497955,
-0.18321284651756287,
-0.28194117546081543,
0.11692550033330917,
0.025773873552680016,
0.10288791358470917,
-0.5448083877563477,
-0.35778382420539856,
0.3121248185634613,
-0.41826921701431274,
0.200477734208... |
Social engineering is a type of attack that allows unauthorized access to a system to achieve specific objective. Commonly, the purpose is to obtain information for social engineers. Some successful social engineering attacks get victims’ information via human based retrieval approach, example technique terms as dumpst... | [
-0.012399552389979362,
0.005744351074099541,
0.007149963639676571,
-0.0021015238016843796,
0.011216603219509125,
-0.017826315015554428,
0.00948104728013277,
-0.008270999416708946,
-0.01463418547064066,
-0.0018124871421605349,
-0.012125629931688309,
0.00811674352735281,
0.0038997314404696226,... | [
0.4398128390312195,
0.08014197647571564,
0.010078495368361473,
0.24114814400672913,
0.09072157740592957,
0.06312818825244904,
0.41648074984550476,
0.35197222232818604,
-0.003087016986683011,
-0.46331608295440674,
-0.03494200110435486,
0.5569028258323669,
-0.16019941866397858,
-0.0086448173... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.