_id stringlengths 40 40 | text stringlengths 0 10k | title stringclasses 1
value |
|---|---|---|
2b211f9553ec78ff17fa3ebe16c0a036ef33c54b | Marko A. Rodriguez is graph systems architect at AT&T Interactive. He can be reached at marko<at>markorodriguez.com. Peter Neubauer is chief operating officer of Neo Technology. He can be reached at peter.neubauer<at>neotechnology.com A graph is a data structure composed of dots (i.e., vertices) and lines (i.e., edges)... | |
0c5e3186822a3d10d5377b741f36b6478d0a8667 | A central problem in artificial intelligence is that of planning to maximize future reward under uncertainty in a partially observable environment. In this paper we propose and demonstrate a novel algorithm which accurately learns a model of such an environment directly from sequences of action-observation pairs. We th... | |
16611312448f5897c7a84e2f590617f4fa3847c4 | Hidden Markov Models (HMMs) are one of the most fundamental a nd widely used statistical tools for modeling discrete time series. Typically, they are learned using sea rch heuristics (such as the Baum-Welch / EM algorithm), which suffer from the usual local optima issues. While in gen eral these models are known to be ... | |
8ad6fda2d41dd823d2569797c8c7353dad31b371 | We construct an Attribute-Based Encryption (ABE) scheme that allows a user's private key to be expressed in terms of any access formula over attributes. Previous ABE schemes were limited to expressing only monotonic access structures. We provide a proof of security for our scheme based on the Decisional Bilinear Diffie... | |
4f3dbfec5c67f0fb0602d9c803a391bc2f6ee4c7 | A 20-GHz phase-locked loop with 4.9 ps/sub pp//0.65 ps/sub rms/ jitter and -113.5 dBc/Hz phase noise at 10-MHz offset is presented. A half-duty sampled-feedforward loop filter that simply replaces the resistor with a switch and an inverter suppresses the reference spur down to -44.0 dBc. A design iteration procedure is... | |
1fcaf7ddcadda724d67684d66856c107375f448b | We present a new Convolutional Neural Network (CNN) model for text classification that jointly exploits labels on documents and their constituent sentences. Specifically, we consider scenarios in which annotators explicitly mark sentences (or snippets) that support their overall document categorization, i.e., they prov... | |
20b41b2a0d8ee71efd3986b4baeed24eba904350 | OBJECTIVE
To investigate the relationship between maternal depression and child growth in developing countries through a systematic literature review and meta-analysis.
METHODS
Six databases were searched for studies from developing countries on maternal depression and child growth published up until 2010. Standard m... | |
c596f88ccba5b7d5276ac6a9b68972fd7d14d959 | By bringing together the physical world of real objects with the virtual world of IT systems, the Internet of Things has the potential to significantly change both the enterprise world as well as society. However, the term is very much hyped and understood differently by different communities, especially because IoT is... | |
5a9f4dc3e5d7c70d58c9512d7193d079c3331273 | We advocate the use of Gaussian Process Dynamical Models (GPDMs) for learning human pose and motion priors for 3D people tracking. A GPDM provides a lowdimensional embedding of human motion data, with a density function that gives higher probability to poses and motions close to the training data. With Bayesian model a... | |
c3f2d101b616d82d07ca2cc4cb8ed0cb53fde21f | We conducted human study to provide reference to our current CD and EMD values reported on the rendered dataset. We provided the human subject with a GUI tool to create a triangular mesh from the image. The tool (see Fig 1) enables the user to edit the mesh in 3D and to align the modeled object back to the input image.... | |
32791996c1040b9dcc34e71a05d72e5c649eeff9 | Ambulatory electrocardiography is increasingly being used in clinical practice to detect abnormal electrical behavior of the heart during ordinary daily activities. The utility of this monitoring can be improved by deriving respiration, which previously has been based on overnight apnea studies where patients are stati... | |
7eac1eb85b919667c785b9ac4085d8ca68998d20 | Education and training is the process by which the wisdom, knowledge and skills of one generation are passed on to the next. Today there are two form s f education and training: conventional education and distance education. Mobile learning, or "M-Lear ning", offers modern ways to support learning process through mobil... | |
57820e6f974d198bf4bbdf26ae7e1063bac190c3 | ||
8e393c18974baa8d5d704edaf116f009cb919463 | A high-speed SerDes must meet multiple challenges including high-speed operation, intensive equalization technique, low power consumption, small area and robustness. In order to meet new standards, such a OIF CEI-25G-LR, CEI-28G-MR/SR/VSR, IEEE802.3bj and 32G-FC, data-rates are increased to 25 to 28Gb/s, which is more ... | |
505c58c2c100e7512b7f7d906a9d4af72f6e8415 | Page ii Complex Adaptive Systems John H. Holland, Christopher Langton, and Stewart W. Wilson, advisors Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence, MIT Press edition John H. Holland Toward a Practice of Autonomous Systems: Pro... | |
3a46c11ad7afed8defbb368e478dbf94c24f43a3 | Scientific problems that depend on processing largeamounts of data require overcoming challenges in multiple areas:managing large-scale data distribution, co-placement andscheduling of data with compute resources, and storing and transferringlarge volumes of data. We analyze the ecosystems of thetwo prominent paradigms... | |
dc7024840a4ba7ab634517fae53e77695ff5dda9 | In this paper we propose a novel energy efficient approach for the recognition of human activities using smartphones as wearable sensing devices, targeting assisted living applications such as remote patient activity monitoring for the disabled and the elderly. The method exploits fixed-point arithmetic to propose a mo... | |
f4cdd1d15112a3458746b58a276d97e79d8f495d | Regularizing the gradient norm of the output of a neural network with respect to its inputs is a powerful technique, rediscovered several times. This paper presents evidence that gradient regularization can consistently improve classification accuracy on vision tasks, using modern deep neural networks, especially when ... | |
984df1f081fbd623600ec45635e5d9a4811c0aef | Two Vivaldi antenna arrays have been presented. First is an 8-element tapered slot array covering 1.2 to 4 GHz band for STW applications for brick/concrete wall imaging. Second is a 16-element antipodal array operating at 8 to 10.6 GHz for high resolution imaging when penetrating through dry wall. Based on the two desi... | |
e3f4fdf6d2f10ebe4cfc6d0544afa63976527d60 | This paper presents a 324-element 2-D broadside array for radio astronomy instrumentation which is sensitive to two mutually orthogonal polarizations. The array is composed of cruciform units consisting of a group of four Vivaldi antennas arranged in a cross-shaped structure. The Vivaldi antenna used in this array exhi... | |
1a090df137014acab572aa5dc23449b270db64b4 | ||
9ae252d3b0821303f8d63ba9daf10030c9c97d37 | We propose a novel approach to learn and recognize natural scene categories. Unlike previous work, it does not require experts to annotate the training set. We represent the image of a scene by a collection of local regions, denoted as codewords obtained by unsupervised learning. Each region is represented as part of a... | |
fa6cbc948677d29ecce76f1a49cea01a75686619 | In this paper, we propose a computational model of the recognition of real world scenes that bypasses the segmentation and the processing of individual objects or regions. The procedure is based on a very low dimensional representation of the scene, that we term the Spatial Envelope. We propose a set of perceptual dime... | |
1ac52b7d8db223029388551b2db25657ed8c9852 | In this paper, we propose a machine-learning solution to problems consisting of many similar prediction tasks. Each of the individual tasks has a high risk of overrtting. We combine two types of knowledge transfer between tasks to reduce this risk: multi-task learning and hierarchical Bayesian modeling. Multi-task lear... | |
1e56ed3d2c855f848ffd91baa90f661772a279e1 | We propose a generative model for text and other collections of discrete data that generalizes or improves on several previous models including naive Bayes/unigram, mixture of unigrams [6], and Hofmann's aspect model , also known as probabilistic latent semantic indexing (pLSI) [3]. In the context of text modeling, our... | |
e990a41e8f09e0ef4695c39af351bf25f333eefa | ||
1f8116db538169de3553b1091e82107f7594301a | ||
539ea86fa738afd939fb18566107c971461f8548 | Mappings to structured output spaces (strings, trees, partitions, etc.) are typically learned using extensions of classification algorithms to simple graphical structures (eg., linear chains) in which search and parameter estimation can be performed exactly. Unfortunately, in many complex problems, it is rare that exac... | |
1219fb39b46aabd74879a7d6d3c724fb4e55aeae | We develop a perspective on technology entrepreneurship as involving agency that is distributed across different kinds of actors. Each actor becomes involved with a technology, and, in the process, generates inputs that result in the transformation of an emerging technological path. The steady accumulation of inputs to... | |
2266636d87e44590ade738b92377d1fe1bc5c970 | ||
2af586c64c32baeb445992e0ea6b76bbbbc30c7f | ||
0e8b8e0c37b0ebc9c36b99103a487dbbbdf9ee97 | ||
2c03df8b48bf3fa39054345bafabfeff15bfd11d | Deeper neural networks are more difficult to train. We present a residual learning framework to ease the training of networks that are substantially deeper than those used previously. We explicitly reformulate the layers as learning residual functions with reference to the layer inputs, instead of learning unreferenced... | |
5763c2c62463c61926c7e192dcc340c4691ee3aa | We propose a deep learning method for single image superresolution (SR). Our method directly learns an end-to-end mapping between the low/high-resolution images. The mapping is represented as a deep convolutional neural network (CNN) [15] that takes the lowresolution image as the input and outputs the high-resolution o... | |
2db168f14f3169b8939b843b9f4caf78c3884fb3 | In this letter, a broadband bent triangular omnidirectional antenna is presented for RF energy harvesting. The antenna has a bandwidth for VSWR ≤ 2 from 850 MHz to 1.94 GHz. The antenna is designed to receive both horizontal and vertical polarized waves and has a stable radiation pattern over the entire bandwidth. Ante... | |
484ac571356251355d3e24dcb23bdd6d0911bd94 | Recent scientific and technological advances have witnessed an abundance of structural patterns modeled as graphs. As a result, it is of special interest to process graph containment queries effectively on large graph databases. Given a graph database G, and a query graph q, the graph containment query is to retrieve a... | |
22749899b50c5113516b9820f875a580910aa746 | A small slot-loaded patch antenna design developed for receiving both L1 and L2 bands GPS signals is discussed. The dual band coverage is achieved by using a patch mode at L2 band and a slot mode at L1 band. High dielectric material and meandered slot line are employed to reduce the antenna size down to 25.4 mm in diam... | |
afbe59950a7d452ce0a3f412ee865f1e1d94d9ef | Reinforcement learning holds the promise of enabling autonomous robots to learn large repertoires of behavioral skills with minimal human intervention. However, robotic applications of reinforcement learning often compromise the autonomy of the learning process in favor of achieving training times that are practical fo... | |
b8aa8b5d06c98a900d8cea61864669b28c3ac0fc | This article presents a comprehensive survey of routing protocols proposed for routing in Vehicular Delay Tolerant Networks (VDTN) in vehicular environment. DTNs are utilized in various operational environments, including those subject to disruption and disconnection and those with high-delay, such as Vehicular Ad-Hoc ... | |
4555fd3622908e2170e4ffdd717b83518b123b09 | The paper presents the effects on antenna parameters when an antenna is placed horizontally near a metal plate. The plate has finite size and rectangular shape. A folded dipole antenna is used and it is placed symmetrically above the plate. The FEM (finite element method) is used to simulate the dependency of antenna p... | |
d70cd3d2fe0a194321ee92c305976873b883d529 | A wideband 57.7–84.2 GHz Phase Shifter is presented using a compact Lange coupler to generate in-phase and quadrature signal. The Lange coupler is followed by two balun transformers that provide the IQ vector modulation with differential I and Q signals. The implemented Phase Shifter demonstrates an average 6-dB insert... | |
eb58118b9db1e95f9792f39c3780dbba3bb966cb | This paper presents a wearable inertial measurement system and its associated spatiotemporal gait analysis algorithm to obtain quantitative measurements and explore clinical indicators from the spatiotemporal gait patterns for patients with stroke or Parkinson’s disease. The wearable system is composed of a microcontro... | |
7e7f14f325d7e8d70e20ca22800ad87cfbf339ff | This publication contains reprint articles for which IEEE does not hold copyright. Full text is not available on IEEE Xplore for these articles. | |
002a8b9ef513d46dc8dcce85c04a87ae6a221b4c | We propose a new class of support vector algorithms for regression and classification. In these algorithms, a parameter lets one effectively control the number of support vectors. While this can be useful in its own right, the parameterization has the additional benefit of enabling us to eliminate one of the other free... | |
0911bcf6bfff20a84a56b9d448bcb3d72a1eb093 | Regularized training of an autoencoder typically results in hidden unit biases that take on large negative values. We show that negative biases are a natural result of using a hidden layer whose responsibility is to both represent the input data and act as a selection mechanism that ensures sparsity of the representati... | |
27f9b805de1f125273a88786d2383621e60c6094 | In this paper we propose a kinematic approach for tracked mobile robots in order to improve motion control and pose estimation. Complex dynamics due to slippage and track–soil interactions make it difficult to predict the exact motion of the vehicle on the basis of track velocities. Nevertheless, real-time computations... | |
04caa1a55b12d5f3830ed4a31c4b47921a3546f2 | Kernel classifiers and regressors designed for structured data, such as sequences, trees and graphs, have significantly advanced a number of interdisciplinary areas such as computational biology and drug design. Typically, kernels are designed beforehand for a data type which either exploit statistics of the structures... | |
1dc5b2114d1ff561fc7d6163d8f4e9c905ca12c4 | It is well known that when data are nonnormally distributed, a test of the significance of Pearson's r may inflate Type I error rates and reduce power. Statistics textbooks and the simulation literature provide several alternatives to Pearson's correlation. However, the relative performance of these alternatives has be... | |
d3abb0b5b3ce7eb464846bbdfd93e0fbf505e954 | In this paper, we compare three different concepts of compact antenna arrays fed by substrate integrated waveguides (SIW). Antenna concepts differ in the type of radiators. Slots represent magnetic linear radiators, patches are electric surface radiators, and Vivaldi slots belong to travelling-wave antennas. Hence, the... | |
e4acaccd3c42b618396c9c28dae64ae7091e36b8 | A novel I/Q receiver array is demonstrated that adapts phase shifts in each receive channel to point a receive beam toward an incident RF signal. The measured array operates at 8.1 GHz and covers steering angles of +/-35 degrees for a four element array. Additionally, the receiver incorporates an I/Q down-converter and... | |
149bf28af91cadf2cd933bd477599cca40f55ccd | We propose a learning architecture, that is able to do reinforcement learning based on raw visual input data. In contrast to previous approaches, not only the control policy is learned. In order to be successful, the system must also autonomously learn, how to extract relevant information out of a high-dimensional stre... | |
759d9a6c9206c366a8d94a06f4eb05659c2bb7f2 | To date, almost all experimental evaluations of machine learning-based recognition algorithms in computer vision have taken the form of “closed set” recognition, whereby all testing classes are known at training time. A more realistic scenario for vision applications is “open set” recognition, where incomplete knowledg... | |
00960cb3f5a74d23eb5ded93f1aa717b9c6e6851 | Bayesian optimization has proven to be a highly effective methodology for the global optimization of unknown, expensive and multimodal functions. The ability to accurately model distributions over functions is critical to the effectiveness of Bayesian optimization. Although Gaussian processes provide a flexible prior o... | |
b53e4c232833a8e663a9cf15dcdd050ff801c05c | We present a scalable system for high-throughput real-time analysis of heterogeneous data streams. Our architecture enables incremental development of models for predictive analytics and anomaly detection as data arrives into the system. In contrast with batch data-processing systems, such as Hadoop, that can have high... | |
39b58ef6487c893219c77c61c762eee5694d0e36 | Classi cation is an important problem in the emerging eld of data mining. Although classi cation has been studied extensively in the past, most of the classi cation algorithms are designed only for memory-resident data, thus limiting their suitability for data mining large data sets. This paper discusses issues in buil... | |
1f25ed3c9707684cc0cdf3e8321c791bc7164147 | Classification is an important data mining problem. Although classification is a wellstudied problem, most of the current classification algorithms require that all or a portion of the the entire dataset remain permanently in memory. This limits their suitability for mining over large databases. We present a new decisi... | |
7c3a4b84214561d8a6e4963bbb85a17a5b1e003a | ||
76c87ec44fc5dc96bc445abe008deaf7c97c9373 | This paper presents a planar grid array antenna with a 100 Ω differential microstrip line feed on a single layer of standard soft substrate. The antenna operates in the 79 GHz frequency band for automotive radar applications. Its single row design offers a narrow beam in elevation and a wide beam in azimuth. Together w... | |
bc7308a97ec2d3f7985d48671abe7a8942a5b9f8 | This paper introduces an approach to sentiment analysis which uses support vector machines (SVMs) to bring together diverse sources of potentially pertinent information, including several favorability measures for phrases and adjectives and, where available, knowledge of the topic of the text. Models using the features... | |
be389fb59c12c8c6ed813db13ab74841433ea1e3 | Fig. 1. We present iMapper, a method that reasons about the interactions of humans with objects, to recover both a plausible scene arrangement and human motions, that best explain an input monocular video (see inset). We fit characteristic interactions called scenelets (e.g., A, B, C) to the video and use them to recon... | |
f24a1af3bd8873920593786d81590d29520cfebc | This letter presents the design and experiment of a novel elliptic filter based on the multilayered substrate integrated waveguide (MSIW) technique. A C-band elliptic filter with four folded MSIW cavities is simulated by using high frequency structure simulator software and fabricated with a two-layer printed circuit b... | |
8052bc5f9beb389b3144d423e7b5d6fcf5d0cc4f | Attributes are semantic visual properties shared by objects. They have been shown to improve object recognition and to enhance content-based image search. While attributes are expected to cover multiple categories, e.g. a dalmatian and a whale can both have "smooth skin", we find that the appearance of a single attribu... | |
01094798b20e96e1d029d6874577167f2214c7b6 | Fast concurrent hash tables are an increasingly important building block as we scale systems to greater numbers of cores and threads. This paper presents the design, implementation, and evaluation of a high-throughput and memory-efficient concurrent hash table that supports multiple readers and writers. The design aris... | |
5685a394b25fcb27b6ad91f7325f2e60a9892e2a | Graph databases (GDB) have recently been arisen to overcome the limits of traditional databases for storing and managing data with graph-like structure. Today, they represent a requirementfor many applications that manage graph-like data,like social networks.Most of the techniques, applied to optimize queries in graph ... | |
0541d5338adc48276b3b8cd3a141d799e2d40150 | MapReduce is a programming model and an associated implementation for processing and generating large datasets that is amenable to a broad variety of real-world tasks. Users specify the computation in terms of a map and a reduce function, and the underlying runtime system automatically parallelizes the computation acro... | |
683c8f5c60916751bb23f159c86c1f2d4170e43f | ||
3a116f2ae10a979c18787245933cb9f984569599 | Wireless sensor networks (WSNs) have emerged as an effective solution for a wide range of applications. Most of the traditional WSN architectures consist of static nodes which are densely deployed over a sensing area. Recently, several WSN architectures based on mobile elements (MEs) have been proposed. Most of them ex... | |
e7b50e3f56e21fd2a5eb34923d427a0bc6dd8905 | In this paper a new approach to the synthesis of coupling matrices for microwave filters is presente d. The new approach represents an advance on existing direct a nd optimization methods for coupling matrix synthesis in that it will exhaustively discover all possible coupling matrix solutions for a network if more tha... | |
a6f1dfcc44277d4cfd8507284d994c9283dc3a2f | We have developed a near-real-time computer system that can locate and track a subject's head, and then recognize the person by comparing characteristics of the face to those of known individuals. The computational approach taken in this system is motivated by both physiology and information theory, as well as by the p... | |
b217788dd6d274ad391ee950e6f6a34033bd2fc7 | The multilayer perceptron, when trained as a classifier using backpropagation, is shown to approximate the Bayes optimal discriminant function. The result is demonstrated for both the two-class problem and multiple classes. It is shown that the outputs of the multilayer perceptron approximate the a posteriori probabili... | |
647cb3825baecb6fab8b098166d5a446f7711f9b | In recent years, deep generative models have been shown to ‘imagine’ convincing high-dimensional observations such as images, audio, and even video, learning directly from raw data. In this work, we ask how to imagine goal-directed visual plans – a plausible sequence of observations that transition a dynamical system f... | |
a63b97291149bfed416aa9e56a21314069540a7b | OBJECTIVE
To determine the empirical evidence for deficits in working memory (WM) processes in children and adolescents with attention-deficit/hyperactivity disorder (ADHD).
METHOD
Exploratory meta-analytic procedures were used to investigate whether children with ADHD exhibit WM impairments. Twenty-six empirical res... | |
49e77b981a0813460e2da2760ff72c522ae49871 | Deep learning takes advantage of large datasets and computationally efficient training algorithms to outperform other approaches at various machine learning tasks. However, imperfections in the training phase of deep neural networks make them vulnerable to adversarial samples: inputs crafted by adversaries with the int... | |
3f52f57dcfdd1bb0514ff744f4fdaa986a325591 | There are several flaws in Apple's MacBook firmware security that allows untrusted modifications to be written to the SPI Flash boot ROM of these laptops. This capability represents a new class of persistent firmware rootkits, or 'bootkits', for the popular Apple MacBook product line. Stealthy bootkits can conceal them... | |
3b3acbf7cc2ec806e4177eac286a2ee22f6f7630 | This paper presents an over-110-GHz-bandwidth 2:1 analog multiplexer (AMUX) for ultra-broadband digital-to-analog (D/A) conversion subsystems. The AMUX was designed and fabricated by using newly developed $\pmb{0.25-\mu \mathrm{m}}$ -emitter-width InP double heterojunction bipolar transistors (DHBTs), which have a peak... | |
4dd7721248c5489e25f46f7ab78c7d0229a596d4 | This paper introduces a fully integrated RF energy-harvesting system. The system can simultaneously deliver the current demanded by external dc loads and store the extra energy in external capacitors, during periods of extra output power. The design is fabricated in 0.18- $\mu \text{m}$ CMOS technology, and the active... | |
7314be5cd836c8f06bd1ecab565b00b65259eac6 | Surveying a suite of algorithms that offer a solution to managing large document archives. | |
f0eace9bfe72c2449f76461ad97c4042d2a7141b | In this letter, a novel antenna-in-package (AiP) technology at W-band has been proposed. This technology is presented for solving the special case that the metallic package should be used to accommodate high mechanical strength. By taking advantages of the multilayer low temperature co-fired ceramic (LTCC) technology, ... | |
2077d0f30507d51a0d3bbec4957d55e817d66a59 | We develop a framework for learning generic, expressive image priors that capture the statistics of natural scenes and can be used for a variety of machine vision tasks. The approach extends traditional Markov random field (MRF) models by learning potential functions over extended pixel neighborhoods. Field potentials ... | |
214658334c581f0d18b9a871928e91b6e4f83be7 | Cell balancing circuits are important to extent life-cycle of batteries and to extract maximum power from the batteries. A lot of power electronics topology has been tried for cell balancing in the battery packages. Active cell balancing topologies transfer energy from the cells showing higher performance to the cells ... | |
0c04909ed933469246defcf9aca2b71ae8e3f623 | The major change in the second edition of this book is the addition of a new chapter on probabilistic retrieval. This chapter has been included because I think this is one of the most interesting and active areas of research in information retrieval. There are still many problems to be solved so I hope that this partic... | |
3cfbb77e5a0e24772cfdb2eb3d4f35dead54b118 | Context-predicting models (more commonly known as embeddings or neural language models) are the new kids on the distributional semantics block. Despite the buzz surrounding these models, the literature is still lacking a systematic comparison of the predictive models with classic, count-vector-based distributional sema... | |
9ec20b90593695e0f5a343dade71eace4a5145de | 1Student,Dept. of Computer Engineering, VESIT, Maharashtra, India ---------------------------------------------------------------------------***-------------------------------------------------------------------Abstract Deep Learning has come into existence as a new area for research in Machine Learning. It aims to act... | |
cc13fde0a91f4d618e6af66b49690702906316ae | Recent years have witness the development of cloud computing and the big data era, which brings up challenges to traditional decision tree algorithms. First, as the size of dataset becomes extremely big, the process of building a decision tree can be quite time consuming. Second, because the data cannot fit in memory a... | |
d73a71fa24b582accb934a9c2308567376ff396d | 3D geo-database research is a promising field to support challenging applications such as 3D urban planning, environmental monitoring, infrastructure management, and early warning or disaster management and response. In these fields, interdisciplinary research in GIScience and related fields is needed to support the mo... | |
dce7a0550b4d63f6fe2e6908073ce0ce63626b0c | As we march down the road of automation in robotics and artificial intelligence, we will need to automate an increasing amount of ethical decision-making in order for our devices to operate independently from us. But automating ethical decision-making raises novel questions for engineers and designers, who will have to... | |
ab19cbea5c61536b616cfa7654cf01bf0621b83f | ||
102153467f27d43dd1db8a973846d3ac10ffdc3c | Healthcare is one of the most rapidly expanding application areas of the Internet of Things (IoT) technology. IoT devices can be used to enable remote health monitoring of patients with chronic diseases such as cardiovascular diseases (CVD). In this paper we develop an algorithm for ECG analysis and classification for ... | |
44159c85dec6df7a257cbe697bfc854ecb1ebb0b | The newly inaugurated Research Resource for Complex Physiologic Signals, which was created under the auspices of the National Center for Research Resources of the National Institutes of Health, is intended to stimulate current research and new investigations in the study of cardiovascular and other complex biomedical s... | |
a92eac4415719698d7d2097ef9564e7b36699010 | Purpose – To identify the applicability of social auditing as an approach of engaging stakeholders in assessing and reporting on corporate sustainability and its performance. Design/methodology/approach – Drawing upon the framework of AA1000 and the social auditing studies, this paper links stakeholder engagement, soci... | |
915c4bb289b3642489e904c65a47fa56efb60658 | We consider image transformation problems, where an input image is transformed into an output image. Recent methods for such problems typically train feed-forward convolutional neural networks using a per-pixel loss between the output and ground-truth images. Parallel work has shown that high-quality images can be gene... | |
9201bf6f8222c2335913002e13fbac640fc0f4ec | ||
929a376c6fea1376baf40fc2979cfbdd867f03ab | Lossy image compression methods always introduce various unpleasant artifacts into the compressed results, especially at low bit-rates. In recent years, many effective soft decoding methods for JPEG compressed images have been proposed. However, to the best of our knowledge, very few works have been done on soft decodi... | |
cfa092829c4c7a42ec77ab6844661e1dae082172 | Bitcoin has introduced a new concept that could feasibly revolutionise the entire Internet as it exists, and positively impact on many types of industries including, but not limited to, banking, public sector and supply chain. This innovation is grounded on pseudo-anonymity and strives on its innovative decentralised a... | |
2e5fadbaab27af0c2b5cc6a3481c11b2b83c4f94 | We introduce the novel problem of identifying the photographer behind a photograph. To explore the feasibility of current computer vision techniques to address this problem, we created a new dataset of over 180,000 images taken by 41 well-known photographers. Using this dataset, we examined the effectiveness of a varie... | |
25b6818743a6c0b9502a1c026c653038ff505c09 | ||
6ed67a876b3afd2f2fb7b5b8c0800a0398c76603 | ||
24281c886cd9339fe2fc5881faf5ed72b731a03e | MapReduce and its variants have been highly successful in implementing large-scale data-intensive applications on commodity clusters. However, most of these systems are built around an acyclic data flow model that is not suitable for other popular applications. This paper focuses on one such class of applications: thos... | |
03ff3f8f4d5a700fbe8f3a3e63a39523c29bb60f | The ability to accurately represent sentences is central to language understanding. We describe a convolutional architecture dubbed the Dynamic Convolutional Neural Network (DCNN) that we adopt for the semantic modelling of sentences. The network uses Dynamic k-Max Pooling, a global pooling operation over linear sequen... | |
ff5c193fd7142b3f426baf997b43937eca1bbbad | Multilevel inverter technology has emerged recently as a very important alternative in the area of high-power medium-voltage energy control. This paper presents the most important topologies like diode-clamped inverter (neutral-point clamped), capacitor-clamped (flying capacitor), and cascaded multicell with separate d... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.