abstract_id
stringlengths
10
10
sentences
list
labels
list
confs
list
train_0200
[ "The e-commerce literature has rarely addressed the measurement of customer perceptions of website service quality in digital marketing environments.", "It is argued that the current SERVQUAL and IS-SERVQUAL instruments need to be refined and validated to fit the digital marketing environment, as they are targeted primarily towards either traditional retailing or information systems contexts.", "This article validates and refines a comprehensive model and instrument for measuring customer-perceived service quality of websites that market digital products and services.", "After a discussion of the conceptualization and operationalization of the service quality construct, the procedure used in modifying items, collecting data, and validating a multiple-item scale is described.", "Subsequently, evidence of reliability and validity on the basis of analyzing data from a quota sample of 260 adult respondents is presented.", "Implications for practice and research are then explored.", "Finally, this paper concludes by discussing limitations that could be addressed in future studies.", "The final EC-SERVQUAL instrument with good reliability and validity will be essential to the development and testing of e-business theories, and provide researchers with a common framework for explaining, justifying, and comparing differences across results." ]
[ 0, 0, 2, 1, 1, 1, 4, 4 ]
[ 1, 1, 0.628600001335144, 0.8285999894142151, 1, 0.6000000238418579, 0.6000000238418579, 0.6000000238418579 ]
train_0201
[ "Image classification datasets are often imbalanced, characteristic that negatively affects the accuracy of deeplearning classifiers.", "In this work we propose balancing GAN (BAGAN) as an augmentation tool to restore balance in imbalanced datasets.", "This is challenging because the few minority-class images may not be enough to train a GAN.", "We overcome this issue by including during the adversarial training all available images of majority and minority classes.", "The generative model learns useful features from majority classes and uses these to generate images for minority classes.", "We apply class conditioning in the latent space to drive the generation process towards a target class.", "The generator in the GAN is initialized with the encoder module of an autoencoder that enables us to learn an accurate class-conditioning in the latent space.", "We compare the proposed methodology with state-of-the-art GANs and demonstrate that BAGAN generates images of superior quality when trained with an imbalanced dataset." ]
[ 0, 2, 2, 1, 1, 1, 1, 4 ]
[ 0.7940999865531921, 0.6176000237464905, 0.41179999709129333, 0.6176000237464905, 0.8234999775886536, 0.8234999775886536, 0.6176000237464905, 0.8234999775886536 ]
train_0202
[ "This paper focuses on the cultural effect of gender on the relationship of online word of mouth and trust in e-commerce.", "To encourage online commerce, many online retailers use online word-of-mouth systems, where consumers can rate products offered for sale.", "To date, how such ratings affect trust and adoption of e-commerce across genders has been relatively unexplored.", "We assess whether the effect of online trust on intention to shop online is moderated by gender.", "Our results show that the effect of trust on intention to shop online is stronger for women than for men.", "In addition, we find that men value their ability to post content online, whereas women value the responsive participation of other consumers to the content they have posted.", "Finally, we find that online word-of-mouth quality affects online trust differently across genders." ]
[ 2, 0, 0, 1, 4, 4, 4 ]
[ 0.5875999927520752, 0.5978999733924866, 0.5978999733924866, 0.5360999703407288, 0.5360999703407288, 0.5360999703407288, 1 ]
train_0203
[ "Witten and Frank 's textbook was one of two books that 1 used for a data mining class in the Fall o f 2001.", "T h e book covers all major methods o f data mining that p roduce a knowledge representa t ion as output .", "Knowledge representa t ion is hereby unders tood as a representat ion that can be studied, unders tood, and interpreted by human beings, at least in principle.", "Thus , neural networks and genetic a lgor i thms are excluded f rom the topics of this textbook.", "We need to say \"can be unders tood in pr inciple\" because a large decision tree or a large rule set may be as hard to interpret as a neural network." ]
[ 0, 0, 0, 0, 0 ]
[ 0.7838000059127808, 0.5946000218391418, 0.5946000218391418, 0.5946000218391418, 0.5946000218391418 ]
train_0204
[ "The explosion of social media services presents a great opportunity to understand the sentiment of the public via analyzing its large-scale and opinion-rich data.", "In social media, it is easy to amass vast quantities of unlabeled data, but very costly to obtain sentiment labels, which makes unsupervised sentiment analysis essential for various applications.", "It is challenging for traditional lexicon-based unsupervised methods due to the fact that expressions in social media are unstructured, informal, and fast-evolving.", "Emoticons and product ratings are examples of emotional signals that are associated with sentiments expressed in posts or words.", "Inspired by the wide availability of emotional signals in social media, we propose to study the problem of unsupervised sentiment analysis with emotional signals.", "In particular, we investigate whether the signals can potentially help sentiment analysis by providing a unified way to model two main categories of emotional signals, i.e., emotion indication and emotion correlation.", "We further incorporate the signals into an unsupervised learning framework for sentiment analysis.", "In the experiment, we compare the proposed framework with the state-of-the-art methods on two Twitter datasets and empirically evaluate our proposed framework to gain a deep understanding of the effects of emotional signals." ]
[ 0, 0, 0, 0, 2, 4, 4, 4 ]
[ 0.6176000237464905, 0.41179999709129333, 0.41179999709129333, 0.5881999731063843, 0.6176000237464905, 0.5881999731063843, 0.41179999709129333, 0.7940999865531921 ]
train_0205
[ "The healthcare industry collects huge amounts of healthcare data which, unfortunately, are not \";mined\"; to discover hidden information for effective decision making.", "Discovery of hidden patterns and relationships often goes unexploited.", "Advanced data mining techniques can help remedy this situation.", "This research has developed a prototype Intelligent Heart Disease Prediction System (IHDPS) using data mining techniques, namely, Decision Trees, Naive Bayes and Neural Network.", "Results show that each technique has its unique strength in realizing the objectives of the defined mining goals.", "IHDPS can answer complex \";what if\"; queries which traditional decision support systems cannot.", "Using medical profiles such as age, sex, blood pressure and blood sugar it can predict the likelihood of patients getting a heart disease.", "It enables significant knowledge, e.g. patterns, relationships between medical factors related to heart disease, to be established.", "IHDPS is Web-based, user-friendly, scalable, reliable and expandable.", "It is implemented on the .NET platform." ]
[ 0, 0, 4, 1, 1, 1, 4, 4, 1, 4 ]
[ 0.6000000238418579, 0.6000000238418579, 0.4000000059604645, 0.800000011920929, 0.6000000238418579, 0.4000000059604645, 0.6000000238418579, 0.6000000238418579, 0.5, 0.4000000059604645 ]
train_0206
[ "The highest accuracy object detectors to date are based on a two-stage approach popularized by R-CNN, where a classifier is applied to a sparse set of candidate object locations.", "In contrast, one-stage detectors that are applied over a regular, dense sampling of possible object locations have the potential to be faster and simpler, but have trailed the accuracy of two-stage detectors thus far.", "In this paper, we investigate why this is the case.", "We discover that the extreme foreground-background class imbalance encountered during training of dense detectors is the central cause.", "We propose to address this class imbalance by reshaping the standard cross entropy loss such that it down-weights the loss assigned to well-classified examples.", "Our novel Focal Loss focuses training on a sparse set of hard examples and prevents the vast number of easy negatives from overwhelming the detector during training.", "To evaluate the effectiveness of our loss, we design and train a simple dense detector we call RetinaNet.", "Our results show that when trained with the focal loss, RetinaNet is able to match the speed of previous one-stage detectors while surpassing the accuracy of all existing state-of-the-art two-stage detectors." ]
[ 0, 0, 0, 4, 2, 4, 4, 4 ]
[ 1, 0.8055999875068665, 0.8055999875068665, 0.3889000117778778, 0.3889000117778778, 0.41670000553131104, 0.583299994468689, 0.7778000235557556 ]
train_0207
[ "This paper presents some convex stochastic programming models for single and multiperiod inventory control problems where the market demand is random and order quantities need to be decided before demand is realized.", "Both models minimize the expected losses subject to risk aversion constraints expressed through Value at Risk (VaR) and Conditional Value at Risk (CVaR) as risk measures.", "A sample average approximation method is proposed for solving the models and convergence analysis of optimal solutions of the sample average approximation problem is presented.", "Finally, some numerical examples are given to illustrate the convergence of the algorithm." ]
[ 0, 2, 1, 4 ]
[ 1, 0.41029998660087585, 0.6154000163078308, 0.7949000000953674 ]
train_0208
[ "This paper presents a novel approach to visualizing the time structure of music and audio.", "The acoustic similarity between any two instants of an audio recording is displayed in a 2D representation, allowing identification of structural and rhythmic characteristics.", "Examples are presented for classical and popular music.", "Applications include content-based analysis and segmentation, as well as tempo and structure extraction." ]
[ 0, 1, 1, 4 ]
[ 0.5774000287055969, 0.42260000109672546, 0.5774000287055969, 0.7886999845504761 ]
train_0209
[ "The word2vec software of Tomas Mikolov and colleagues 1 has gained a lot of traction lately, and provides state-of-the-art word embeddings.", "The learning models behind the software are described in two research papers [1, 2].", "We found the description of the models in these papers to be somewhat cryptic and hard to follow.", "While the motivations and presentation may be obvious to the neural-networks language-modeling crowd, we had to struggle quite a bit to figure out the rationale behind the equations.", "This note is an attempt to explain equation (4) (negative sampling) in \" Distributed Representations of Words and Phrases and their Compositionality \" by 1 The skip-gram model The departure point of the paper is the skip-gram model.", "In this model we are given a corpus of words w and their contexts c. We consider the conditional probabilities p(c|w), and given a corpus T ext, the goal is to set the parameters θ of p(c|w; θ) so as to maximize the corpus probability: arg max θ w∈T ext   c∈C(w) p(c|w; θ)   (1) in this equation, C(w) is the set of contexts of word w.", "Alternatively: arg max θ (w,c)∈D p(c|w; θ) (2) here D is the set of all word and context pairs we extract from the text." ]
[ 0, 0, 0, 1, 2, 1, 4 ]
[ 1, 0.7949000000953674, 0.5896999835968018, 0.3846000134944916, 0.41029998660087585, 0.41029998660087585, 0.41029998660087585 ]
train_0210
[ "Our experience of the world is multimodal - we see objects, hear sounds, feel texture, smell odors, and taste flavors.", "Modality refers to the way in which something happens or is experienced and a research problem is characterized as multimodal when it includes multiple such modalities.", "In order for Artificial Intelligence to make progress in understanding the world around us, it needs to be able to interpret such multimodal signals together.", "Multimodal machine learning aims to build models that can process and relate information from multiple modalities.", "It is a vibrant multi-disciplinary field of increasing importance and with extraordinary potential.", "Instead of focusing on specific multimodal applications, this paper surveys the recent advances in multimodal machine learning itself and presents them in a common taxonomy.", "We go beyond the typical early and late fusion categorization and identify broader challenges that are faced by multimodal machine learning, namely: representation, translation, alignment, fusion, and co-learning.", "This new taxonomy will enable researchers to better understand the state of the field and identify directions for future research." ]
[ 0, 0, 2, 1, 1, 1, 2, 2 ]
[ 0.5788999795913696, 0.5788999795913696, 0.39469999074935913, 0.7894999980926514, 0.4666999876499176, 0.39469999074935913, 0.26669999957084656, 0.421099990606308 ]
train_0211
[ "Bitcoin is a digital currency that unlike traditional currencies does not rely on a centralized authority.", "Instead Bitcoin relies on a network of volunteers that collectively implement a replicated ledger and verify transactions.", "In this paper we analyze how Bitcoin uses a multi-hop broadcast to propagate transactions and blocks through the network to update the ledger replicas.", "We then use the gathered information to verify the conjecture that the propagation delay in the network is the primary cause for blockchain forks.", "Blockchain forks should be avoided as they are symptomatic for inconsistencies among the replicas in the network.", "We then show what can be achieved by pushing the current protocol to its limit with unilateral changes to the client's behavior." ]
[ 0, 0, 2, 1, 1, 4 ]
[ 1, 1, 0.53329998254776, 0.766700029373169, 0.833299994468689, 1 ]
train_0212
[ "Shoe-last, a 3D mould used for making footwear, influence the shape, size and fitting of footwear.", "Current shoe-last design software has focused mainly on reverse engineering of existing shoe-last and modification.", "Shoe-last designers have generally preferred to design the shoe-last manually due to limitations of design software.", "In order to solve these problems, a new software based on CATIA platform was developed.", "The shoe-last model is based on foot shape measurement data and foot biomechanics.", "Using the existing shoe-last design standards and the sections from existing shoe-lasts, design tables and relationship equations enables the design of shoe-last with different toe type, heel height and custom shoe-last.", "The design includes comfort and fit aspects as well as design aspect, therefore enables design of aesthetical comfortable shoes.", "Since the design can be modified instantaneously, the designers could visualize design changes leading to a reduction in shoe-last design cycle.", "2009 Elsevier B.V. All rights reserved." ]
[ 0, 0, 0, 1, 1, 1, 4, 4, 3 ]
[ 0.5946000218391418, 0.8108000159263611, 1, 0.7838000059127808, 0.40540000796318054, 0.6215999722480774, 0.5676000118255615, 0.40540000796318054, 0.5946000218391418 ]
train_0213
[ "Several extensions to evolutionary algorithms (EAs) and particle swarm optimization (PSO) have been suggested during the last decades offering improved performance on selected benchmark problems.", "Recently, another search heuristic termed differential evolution (DE) has shown superior performance in several real-world applications.", "In this paper, we evaluate the performance of DE, PSO, and EAs regarding their general applicability as numerical optimization techniques.", "The comparison is performed on a suite of 34 widely used benchmark problems.", "The results from our study show that DE generally outperforms the other algorithms.", "However, on two noisy functions, both DE and PSO were outperformed by the EA." ]
[ 0, 1, 2, 1, 4, 4 ]
[ 0.5752000212669373, 0.38940000534057617, 0.39820000529289246, 0.8141999840736389, 0.42480000853538513, 0.42480000853538513 ]
train_0214
[ "A long-standing question within the robotics community is about the degree of human-likeness robots ought to have when interacting with humans.", "We explore an unexamined aspect of this problem: how people empathize with robots along the anthropomorphic spectrum.", "We conducted an experiment that measured how people empathized with robots shown to be experiencing mistreatment by humans.", "Our results indicate that people empathize more strongly with more human-looking robots and less with mechanical-looking robots." ]
[ 0, 2, 1, 4 ]
[ 0.8055999875068665, 0.41670000553131104, 1, 1 ]
train_0215
[ "In recent years, there has been an increasing interest in applying Augmented Reality (AR) to create unique educational settings.", "So far, however, there is a lack of review studies with focus on investigating factors such as: the uses, advantages, limitations, effectiveness, challenges and features of augmented reality in educational settings.", "Personalization for promoting an inclusive learning using AR is also a growing area of interest.", "This paper reports a systematic review of literature on augmented reality in educational settings considering the factors mentioned before.", "In total, 32 studies published between 2003 and 2013 in 6 indexed journals were analyzed.", "The main findings from this review provide the current state of the art on research in AR in education.", "Furthermore, the paper discusses trends and the vision towards the future and opportunities for further research in augmented reality for educational settings." ]
[ 0, 0, 1, 1, 4, 4, 4 ]
[ 0.7878999710083008, 0.3939000070095062, 0.6061000227928162, 1, 0.6061000227928162, 0.6061000227928162, 0.666700005531311 ]
train_0216
[ "How good are cheap depth cameras, namely the Microsoft Kinect, compared to state of the art Time-ofFlight depth cameras?", "In this paper several depth cameras of different types were put to the test on a variety of tasks in order to judge their respective performance and to find out their weaknesses.", "We will concentrate on the common area of applications for which both types are specified, i.e. near field indoor scenes.", "The characteristics and limitations of the different technologies as well as the concrete hardware implementations are discussed and evaluated with a set of experimental setups.", "Especially, the noise level and the axial and angular resolutions are compared.", "Additionally, refined formulas to generate depth values based on the raw measurements of the Kinect are presented." ]
[ 0, 0, 2, 2, 4, 4 ]
[ 0.8611000180244446, 0.41670000553131104, 0.41670000553131104, 0.22220000624656677, 0.5555999875068665, 0.5555999875068665 ]
train_0217
[ "Swarm intelligence is a relatively new approach to problem solving that takes inspiration from the social behaviors of insects and of other animals.", "In particular, ants have inspired a number of methods and techniques among which the most studied and the most successful is the general purpose optimization technique known as ant colony optimization.", "Ant colony optimization (ACO) takes inspiration from the foraging behavior of some ant species.", "These ants deposit pheromone on the ground in order to mark some favorable path that should be followed by other members of the colony.", "Ant colony optimization exploits a similar mechanism for solving optimization problems.", "From the early nineties, when the first ant colony optimization algorithm was proposed, ACO attracted the attention of increasing numbers of researchers and many successful applications are now available.", "Moreover, a substantial corpus of theoretical results is becoming available that provides useful guidelines to researchers and practitioners in further applications of ACO.", "The goal of this article is to introduce ant colony optimization and to survey its most notable applications" ]
[ 0, 1, 2, 1, 1, 4, 4, 2 ]
[ 0.7940999865531921, 0.41179999709129333, 0.3824000060558319, 0.41179999709129333, 0.41179999709129333, 0.41179999709129333, 0.41179999709129333, 0.8234999775886536 ]
train_0218
[ "In this paper, we propose a new method for indexing large amounts of point and spatial data in highdimensional space.", "An analysis shows that index structures such as the R*-tree are not adequate for indexing high-dimensional data sets.", "The major problem of R-tree-based index structures is the overlap of the bounding boxes in the directory, which increases with growing dimension.", "To avoid this problem, we introduce a new organization of the directory which uses a split algorithm minimizing overlap and additionally utilizes the concept of supernodes.", "The basic idea of overlap-minimizing split and supernodes is to keep the directory as hierarchical as possible, and at the same time to avoid splits in the directory that would result in high overlap.", "Our experiments show that for high-dimensional data, the X-tree outperforms the well-known R*-tree and the TV-tree by up to two orders of magnitude." ]
[ 1, 0, 1, 1, 4, 4 ]
[ 0.41029998660087585, 0.5896999835968018, 0.5896999835968018, 0.7949000000953674, 0.5896999835968018, 1 ]
train_0219
[ "In this study 2,684 people evaluated the credibility of two live Web sites on a similar topic (such as health sites).", "We gathered the comments people wrote about each siteís credibility and analyzed the comments to find out what features of a Web site get noticed when people evaluate credibility.", "We found that the ìdesign lookî of the site was mentioned most frequently, being present in 46.1% of the comments.", "Next most common were comments about information structure and information focus.", "In this paper we share sample participant comments in the top 18 areas that people noticed when evaluating Web site credibility.", "We discuss reasons for the prominence of design look, point out how future studies can build on what we have learned in this new line of research, and outline six design implications for human-computer interaction professionals." ]
[ 4, 1, 4, 4, 4, 1 ]
[ 0.3666999936103821, 0.5666999816894531, 0.733299970626831, 0.733299970626831, 0.5666999816894531, 0.4332999885082245 ]
train_0220
[ "Convolutional neural networks (CNNs) are inherently limited to model geometric transformations due to the fixed geometric structures in their building modules.", "In this work, we introduce two new modules to enhance the transformation modeling capability of CNNs, namely, deformable convolution and deformable RoI pooling.", "Both are based on the idea of augmenting the spatial sampling locations in the modules with additional offsets and learning the offsets from the target tasks, without additional supervision.", "The new modules can readily replace their plain counterparts in existing CNNs and can be easily trained end-to-end by standard back-propagation, giving rise to deformable convolutional networks.", "Extensive experiments validate the performance of our approach.", "For the first time, we show that learning dense spatial transformation in deep CNNs is effective for sophisticated vision tasks such as object detection and semantic segmentation.", "The code is released at https://github.com/msracver/Deformable-ConvNets." ]
[ 0, 2, 1, 1, 1, 4, 3 ]
[ 1, 0.4000000059604645, 0.800000011920929, 0.6000000238418579, 0.6000000238418579, 0.6000000238418579, 0.4000000059604645 ]
train_0221
[ "With the availability of low-cost and compact 2.5/3D visual sensing devices, computer vision community is experiencing a growing interest in visual scene understanding.", "This survey paper provides a comprehensive background to this research topic.", "We begin with a historical perspective, followed by popular 3D data representations and a comparative analysis of available datasets.", "Before delving into the application specific details, this survey provides a succinct introduction to the core technologies that are the underlying methods extensively used in the literature.", "Afterwards, we review the developed techniques according to a taxonomy based on the scene understanding tasks.", "This covers holistic indoor scene understanding as well as subtasks such as scene classification, object detection, pose estimation, semantic segmentation, 3D reconstruction, saliency detection, physics-based reasoning and affordance prediction.", "Later on, we summarize the performance metrics used for evaluation in different tasks and a quantitative comparison among the recent state-of-the-art techniques.", "We conclude this review with the current challenges and an outlook towards the open research problems requiring further investigation." ]
[ 0, 2, 1, 1, 1, 1, 4, 4 ]
[ 0.5788999795913696, 0.39469999074935913, 0.5788999795913696, 0.6053000092506409, 0.5788999795913696, 0.39469999074935913, 0.6053000092506409, 0.7894999980926514 ]
train_0222
[ "Among the growing number of Chinese companies that went public overseas, many have been detected and alleged as conducting financial fraud by market research firms or U.S. Securities and Exchange Commission (SEC).", "Then investors lost money and even confidence to all overseas-listed Chinese companies.", "Likewise, these companies suffered serious stock sank or were even delisted from the stock exchange.", "Conventional auditing practices failed in these cases when misleading financial reports presented.", "This is partly because existing auditing practices and academic researches primarily focus on statistical analysis of structured financial ratios and market activity data in auditing process, while ignoring large amount of textual information about those companies in financial statements.", "In this paper, we build integrated language model, which combines statistical language model (SLM) and latent semantic analysis (LSA), to detect the strategic use of deceptive language in financial statements.", "By integrating SLM with LSA framework, the integrated model not only overcomes SLM’s inability to capture long-span information, but also extracts the semantic patterns which distinguish fraudulent financial statements from non-fraudulent ones.", "Four different modes of the integrated model are also studied and compared.", "With application to assess fraud risk in overseas-listed Chinese companies, the integrated model shows high accuracy to flag fraudulent financial statements." ]
[ 0, 0, 0, 0, 0, 1, 1, 1, 4 ]
[ 1, 1, 0.8363999724388123, 0.6182000041007996, 0.6182000041007996, 0.5636000037193298, 0.8363999724388123, 0.6182000041007996, 0.7817999720573425 ]
train_0223
[ "Models based on deep convolutional networks have dominated recent image interpretation tasks; we investigate whether models which are also recurrent are effective for tasks involving sequences, visual and otherwise.", "We describe a class of recurrent convolutional architectures which is end-to-end trainable and suitable for large-scale visual understanding tasks, and demonstrate the value of these models for activity recognition, image captioning, and video description.", "In contrast to previous models which assume a fixed visual representation or perform simple temporal averaging for sequential processing, recurrent convolutional models are “doubly deep” in that they learn compositional representations in space and time.", "Learning long-term dependencies is possible when nonlinearities are incorporated into the network state updates.", "Differentiable recurrent models are appealing in that they can directly map variable-length inputs (e.g., videos) to variable-length outputs (e.g., natural language text) and can model complex temporal dynamics; yet they can be optimized with backpropagation.", "Our recurrent sequence models are directly connected to modern visual convolutional network models and can be jointly trained to learn temporal dynamics and convolutional perceptual representations.", "Our results show that such models have distinct advantages over state-of-the-art models for recognition or generation which are separately defined or optimized." ]
[ 0, 1, 2, 1, 4, 1, 4 ]
[ 0.7828999757766724, 0.4341000020503998, 0.4341000020503998, 0.4341000020503998, 0.4341000020503998, 0.4341000020503998, 0.5968999862670898 ]
train_0224
[ "Smart world is envisioned as an era in which objects (e.g., watches, mobile phones, computers, cars, buses, and trains) can automatically and intelligently serve people in a collaborative manner.", "Paving the way for smart world, Internet of Things (IoT) connects everything in the smart world.", "Motivated by achieving a sustainable smart world, this paper discusses various technologies and issues regarding green IoT, which further reduces the energy consumption of IoT. Particularly, an overview regarding IoT and green IoT is performed first.", "Then, the hot green information and communications technologies (ICTs) (e.g., green radio-frequency identification, green wireless sensor network, green cloud computing, green machine to machine, and green data center) enabling green IoT are studied, and general green ICT principles are summarized.", "Furthermore, the latest developments and future vision about sensor cloud, which is a novel paradigm in green IoT, are reviewed and introduced, respectively.", "Finally, future research directions and open problems about green IoT are presented.", "Our work targets to be an enlightening and latest guidance for research with respect to green IoT and smart world." ]
[ 0, 0, 1, 1, 1, 4, 4 ]
[ 0.7886999845504761, 0.7886999845504761, 0.42260000109672546, 0.6037999987602234, 0.39250001311302185, 0.7886999845504761, 0.7886999845504761 ]
train_0225
[ "The operating characteristic (OC) and average sample number (ASN) characterize the performance of the sequential probability ratio test (SPRT).", "In this paper, the ASN and OC of the truncated SPRT (TSPRT) are examined in a general setting, in which the log-likelihood ratios are not necessarily identically distributed and the bounds for the test can be time varying.", "Two inductive integral equations are derived for the OC and ASN respectively, which can be solved analytically by backward induction provided the convolution involved can be evaluated analytically.", "The initial value for backward induction can be readily determined by TSPRT's truncation strategy.", "Due to the difficulty of analytically evaluating the convolution in the induction process, numerical methods may be necessary.", "Numerical algorithms based on the system of linear algebraic equation method and the finite element analysis are developed.", "Examples are provided to illustrate our algorithms." ]
[ 0, 0, 1, 1, 1, 1, 3 ]
[ 0.771399974822998, 0.428600013256073, 0.6000000238418579, 0.6000000238418579, 0.4000000059604645, 0.571399986743927, 0.37139999866485596 ]
train_0226
[ "Sexism toward women in online video game environments has become a pervasive and divisive issue in the gaming community.", "In this study, we sought to determine what personality traits, demographic variables, and levels of game play predicted sexist attitudes towards women who play video games.", "Male and female participants (N = 301) who were players of networked video games were invited to participate in an anonymous online survey.", "Social dominance orientation and conformity to some types of masculine norms (desire for power over women and the need for heterosexual self-presentation) predicted higher scores on the Video Game Sexism Scale (i.e., greater sexist beliefs about women and gaming).", "Implications for the social gaming environment and female gamers are discussed.", "2013 Elsevier Ltd. All rights reserved." ]
[ 0, 2, 4, 4, 3, 3 ]
[ 1, 0.5938000082969666, 0.40630000829696655, 0.40630000829696655, 0.40630000829696655, 1 ]
train_0227
[ "We present a learned model of human body shape and pose-dependent shape variation that is more accurate than previous models and is compatible with existing graphics pipelines.", "Our Skinned Multi-Person Linear model (SMPL) is a skinned vertex-based model that accurately represents a wide variety of body shapes in natural human poses.", "The parameters of the model are learned from data including the rest pose template, blend weights, pose-dependent blend shapes, identity-dependent blend shapes, and a regressor from vertices to joint locations.", "Unlike previous models, the pose-dependent blend shapes are a linear function of the elements of the pose rotation matrices.", "This simple formulation enables training the entire model from a relatively large number of aligned 3D meshes of different people in different poses.", "We quantitatively evaluate variants of SMPL using linear or dual-quaternion blend skinning and show that both are more accurate than a Blend-SCAPE model trained on the same data.", "We also extend SMPL to realistically model dynamic soft-tissue deformations.", "Because it is based on blend skinning, SMPL is compatible with existing rendering engines and we make it available for research purposes." ]
[ 0, 1, 1, 1, 1, 4, 1, 4 ]
[ 0.4323999881744385, 0.7838000059127808, 0.7838000059127808, 1, 1, 0.5676000118255615, 0.4323999881744385, 0.5946000218391418 ]
train_0228
[ "Linear Discriminant Analysis (LDA) is a very common technique for dimensionality reduction problems as a preprocessing step for machine learning and pattern classification applications.", "At the same time, it is usually used as a black box, but (sometimes) not well understood.", "The aim of this paper is to build a solid intuition for what is LDA, and how LDA works, thus enabling readers of all levels be able to get a better understanding of the LDA and to know how to apply this technique in different applications.", "The paper first gave the basic definitions and steps of how LDA technique works supported with visual explanations of these steps.", "Moreover, the two methods of computing the LDA space, i.e. class-dependent and class-independent methods, were explained in details.", "Then, in a step-by-step approach, two numerical examples are demonstrated to show how the LDA space can be calculated in case of the class-dependent and class-independent methods.", "Furthermore, two of the most common LDA problems (i.e. Small Sample Size (SSS) and non-linearity problems) were highlighted and illustrated, and stateof-the-art solutions to these problems were investigated and explained.", "Finally, a number of experiments was conducted with different datasets to (1) investigate the effect of the eigenvectors that used in the LDA space on the robustness of the extracted feature for the classification accuracy, and (2) to show when the SSS problem occurs and how it can be addressed." ]
[ 0, 0, 2, 1, 1, 1, 4, 4 ]
[ 1, 0.7949000000953674, 0.7949000000953674, 0.7949000000953674, 1, 0.7949000000953674, 0.41029998660087585, 0.5896999835968018 ]
train_0229
[ "Multiuser Detection (MUD) based receivers theoretically require no power control (PC) as they have the ability to separate signals regardless of their relative power levels as long as these signals achieve a suitable SNR.", "In practice, receiver designs have finite dynamic range.", "In this paper, power aware scheduling (PAS) and power control (PC) algorithms are investigated to address the finite MUD dynamic range and performance results are shown.", "The final PAS algorithm and motivating factors behind the design selections made on the DARPA Interference Multiple Access (DIMA) program are highlighted as well as different approaches involving both scheduling and PC.", "The techniques selected on the DIMA program are currently operating as part of the DEVIA mobile real-time experiments." ]
[ 0, 0, 2, 1, 4 ]
[ 1, 0.8529000282287598, 0.6176000237464905, 0.4706000089645386, 0.7940999865531921 ]
train_0230
[ "KDD 99 intrusion detection datasets, which are based on DARPA 98 dataset, provides labeled data for researchers working in the field of intrusion detection and is the only labeled dataset publicly available.", "Numerous researchers employed the datasets in KDD 99 intrusion detection competition to study the utilization of machine learning for intrusion detection and reported detection rates up to 91% with false positive rates less than 1%.", "To substantiate the performance of machine learning based detectors that are trained on KDD 99 training data; we investigate the relevance of each feature in KDD 99 intrusion detection datasets.", "To this end, information gain is employed to determine the most discriminating features for each class." ]
[ 0, 0, 1, 4 ]
[ 1, 1, 0.6773999929428101, 0.45159998536109924 ]
train_0231
[ "MT2DInvMatlab is an open-source MATLAB software package for two-dimensional (2D) inversion of magnetotelluric (MT) data; it is written in mixed languages of MATLAB and FORTRAN.", "MT2DInvMatlab uses the finite element method (FEM) to compute 2D MT model responses, and smoothness-constrained least-squares inversion with a spatially variable regularization parameter algorithm to stabilize the inversion process and provide a high-resolution optimal earth model.", "It is also able to include terrain effects in inversion by incorporating topography into a forward model.", "This program runs under the MATLAB environment so that users can utilize the existing general interface of MATLAB, while some specific functions are written in FORTRAN 90 to speed up computation and reuse pre-existing FORTRAN code in the MATLAB environment with minimal modification.", "This program has been tested using synthetic models, including one with variable topography, and on field data.", "The results were assessed by comparing inverse models obtained with MT2DInvMatlab and with a non-linear conjugate gradient (NLCG) algorithm.", "In both tests the new inversion software reconstructs the subsurface resistivity structure very closely and provides an improvement in both resolution and stability.", "& 2009 Elsevier Ltd. All rights reserved." ]
[ 0, 1, 1, 4, 4, 4, 4, 3 ]
[ 1, 0.6154000163078308, 0.6154000163078308, 0.5896999835968018, 0.3846000134944916, 0.8205000162124634, 0.6154000163078308, 1 ]
train_0232
[ "Newer models for interacting with wireless sensors such as Internet of Things and Sensor Cloud aim to overcome restricted resources and efficiency.", "The Missouri S&T (science and technology) sensor cloud enables different networks, spread in a huge geographical area, to connect together and be employed simultaneously by multiple users on demand.", "Virtual sensors, which are at the core of this sensor cloud architecture, assist in creating a multiuser environment on top of resource-constrained physical wireless sensors and can help in supporting multiple applications." ]
[ 0, 0, 1 ]
[ 0.6363999843597412, 0.42419999837875366, 0.42419999837875366 ]
train_0233
[ "The magnification factor for the steady-state response of a SDOF system under harmonic loading is described in many structural dynamics textbooks; the well known analytical solution is easily obtained from the solution to the damped equation of motion for harmonic loading.", "The complete and steady state solutions can differ significantly.", "An analytical expression for the maximum response to the complete solution (steady state plus transient) remains elusive; however, a simple analytical expression is identified herein for the undamped case.", "Differences in the magnification factors obtained for both solutions are discussed." ]
[ 0, 0, 1, 4 ]
[ 0.5881999731063843, 0.41179999709129333, 0.5881999731063843, 0.6176000237464905 ]
train_0234
[ "The arrival and proliferation of electronic resources and digital libraries have a number of significant impacts on the use of print resources and traditional libraries.", "This study explores the extent to which graduate students in a metropolitan university setting use print and electronic resources.", "Reading preferences and use of print and electronic resources vary among different disciplines.", "Graduate students seem to expect a hybrid of print and electronic resources.", "They desire to meet their information needs through a mix of print and online resources, even though reasons for supplementing another type of resource differ.", "Circumstances that affect the selection of use between digital libraries and traditional libraries are also discussed.", "2005 Elsevier Ltd. All rights reserved." ]
[ 0, 0, 0, 0, 1, 1, 3 ]
[ 0.8188999891281128, 0.8188999891281128, 0.7886999845504761, 0.6075000166893005, 0.42260000109672546, 0.5774000287055969, 0.3962000012397766 ]
train_0235
[ "We propose XSEED, a synopsis of path queries for cardinality estimation that is accurate, robust, efficient, and adaptive to memory budgets.", "XSEED starts from a very small kernel, and then incrementally updates information of the synopsis.", "With such an incremental construction, a synopsis structure can be dynamically configured to accommodate different memory budgets.", "Cardinality estimation based on XSEED can be performed very efficiently and accurately.", "Extensive experiments on both synthetic and real data sets show that even with less memory, XSEED could achieve accuracy that is an order of magnitude better than that of other synopsis structures.", "The cardinality estimation time is under 2% of the actual querying time for a wide range of queries in all test cases." ]
[ 2, 1, 1, 4, 4, 4 ]
[ 0.6000000238418579, 0.800000011920929, 0.6000000238418579, 0.4000000059604645, 0.800000011920929, 0.800000011920929 ]
train_0236
[ "Massively Multiplayer Online Games (MMOGs) routinely attract millions of players but little empirical data is available to assess their players' social experiences.", "In this paper, we use longitudinal data collected directly from the game to examine play and grouping patterns in one of the largest MMOGs: World of Warcraft.", "Our observations show that the prevalence and extent of social activities in MMOGs might have been previously over-estimated, and that gaming communities face important challenges affecting their cohesion and eventual longevity.", "We discuss the implications of our findings for the design of future games and other online social spaces." ]
[ 0, 2, 0, 2 ]
[ 1, 0.421099990606308, 0.3684000074863434, 0.421099990606308 ]
train_0237
[ "Research Article Gimun Kim Konyang University gmkim@konyang.ac.kr Bongsik Shin San Diego State University bshin@mail.sdsu.edu Kyung Kyu Kim Yonsei University kyu.kim@yonsei.ac.kr Ho Geun Lee Yonsei University h.lee@yonsei.ac.kr More and more publications are highlighting the value of IT in affecting business processes.", "Recognizing firmlevel dynamic capabilities as key to improved firm performance, our work examines and empirically tests the influencing relationships among IT capabilities (IT personnel expertise, IT infrastructure flexibility, and IT management capabilities), process-oriented dynamic capabilities, and financial performance.", "Processoriented dynamic capabilities are defined as a firm’s ability to change (improve, adapt, or reconfigure) a business process better than the competition in terms of integrating activities, reducing cost, and capitalizing on business intelligence/learning.", "They encompass a broad category of changes in the firm’s processes, ranging from continual adjustments and improvements to radical one-time alterations.", "Although the majority of changes may be incremental, a firm’s capacity for timely changes also implies its readiness to execute radical alterations when the need arises.", "Grounded on the theoretical position, we propose a research model and gather a survey data set through a rigorous process that retains research validity.", "From the analysis of the survey data, we find an important route of causality, as follows: IT personnel expertise  IT management capabilities  IT infrastructure flexibility  process-oriented dynamic capabilities  financial performance.", "Based on this finding, we discuss the main contributions of our study in terms of the strategic role of IT in enhancing firm performance." ]
[ 0, 2, 2, 1, 2, 1, 1, 4 ]
[ 0.6000000238418579, 0.6000000238418579, 0.6000000238418579, 0.4000000059604645, 0.4000000059604645, 0.800000011920929, 0.6000000238418579, 0.6000000238418579 ]
train_0238
[ "There has been a drastic growth of research in Generative Adversarial Nets (GANs) in the past few years.", "Proposed in 2014, GAN has been applied to various applications such as computer vision and natural language processing, and achieves impressive performance.", "Among the many applications of GAN, image synthesis is the most well-studied one, and research in this area has already demonstrated the great potential of using GAN in image synthesis.", "In this paper, we provide a taxonomy of methods used in image synthesis, review different models for text-to-image synthesis and image-to-image translation, and discuss some evaluation metrics as well as possible future research directions in image synthesis with GAN." ]
[ 0, 2, 2, 1 ]
[ 0.6345999836921692, 0.42309999465942383, 0.5385000109672546, 0.40380001068115234 ]
train_0239
[ "Recently there has been growing interest in applying object-oriented approach to large-scale programs with a view to treating the various complexities within these.", "Software designed using an object-oriented approach can be significantly more robust than traditional software.", "More codes can be reused and it can be easier to refine, test, maintain and extend the software.", "Several benefits of this approach may also be observed in the area of finite element analysis.", "This paper describes an implementation of objectoriented programming to the finite element method for engineering analysis using C++, and illustrates the advantages of this approach." ]
[ 0, 0, 0, 0, 2 ]
[ 1, 1, 0.800000011920929, 0.800000011920929, 0.4000000059604645 ]
train_0240
[ "This paper presents a simple method to recognise multistroke sketches of geometric shapes.", "It uses temporal adjacency and global geometric properties of gures to recognise a simple vocabulary of geometric shapes including solid and dashed line styles, selection and delete gestures.", "The geometric features used (convex hull, smallest-area regular polygons, perimeter and area scalar ratios) are invariant with rotation and scale of gures.", "We have found the method very usable with acceptable recognition rates although the multi-stroke approach poses problems in choosing appropriate values for time-outs.", "Although we have privileged simplicity over robustness, the method has proved suitable for interactive applications." ]
[ 1, 0, 0, 1, 1 ]
[ 0.40540000796318054, 0.4323999881744385, 0.4323999881744385, 0.5676000118255615, 0.5676000118255615 ]
train_0241
[ "One of the challenges in the study of generative adversarial networks is the instability of its training.", "In this paper, we propose a novel weight normalization technique called spectral normalization to stabilize the training of the discriminator.", "Our new normalization technique is computationally light and easy to incorporate into existing implementations.", "We tested the efficacy of spectral normalization on CIFAR10, STL-10, and ILSVRC2012 dataset, and we experimentally confirmed that spectrally normalized GANs (SN-GANs) is capable of generating images of better or equal quality relative to the previous training stabilization techniques.", "The code with Chainer (Tokui et al., 2015), generated images and pretrained models are available at https://github.com/pfnet-research/sngan_ projection." ]
[ 0, 2, 2, 2, 4 ]
[ 0.7894999980926514, 0.5788999795913696, 0.5788999795913696, 0.421099990606308, 0.421099990606308 ]
train_0242
[ "The ambitious goals set for 5G wireless networks, which are expected to be introduced around 2020, require dramatic changes in the design of different layers for next generation communications systems.", "Massive MIMO systems, filter bank multi-carrier modulation, relaying technologies, and millimeter-wave communications have been considered as some of the strong candidates for the physical layer design of 5G networks.", "In this article, we shed light on the potential and implementation of IM techniques for MIMO and multi-carrier communications systems, which are expected to be two of the key technologies for 5G systems.", "Specifically, we focus on two promising applications of IM: spatial modulation and orthogonal frequency-division multiplexing with IM, and discuss the recent advances and future research directions in IM technologies toward spectrum- and energy-efficient 5G wireless networks." ]
[ 0, 0, 1, 1 ]
[ 0.7949000000953674, 0.5896999835968018, 0.3846000134944916, 0.41029998660087585 ]
train_0243
[ "LIBSVM is a library for Support Vector Machines (SVMs).", "We have been actively developing this package since the year 2000.", "The goal is to help users to easily apply SVM to their applications.", "LIBSVM has gained wide popularity in machine learning and many other areas.", "In this article, we present all implementation details of LIBSVM.", "Issues such as solving SVM optimization problems theoretical convergence multiclass classification probability estimates and parameter selection are discussed in detail." ]
[ 0, 0, 2, 2, 1, 4 ]
[ 1, 1, 1, 0.6337000131607056, 0.6337000131607056, 0.5967000126838684 ]
train_0244
[ "Active, constructive, and interactive are terms that are commonly used in the cognitive and learning sciences.", "They describe activities that can be undertaken by learners.", "However, the literature is actually not explicit about how these terms can be defined; whether they are distinct; and whether they refer to overt manifestations, learning processes, or learning outcomes.", "Thus, a framework is provided here that offers a way to differentiate active, constructive, and interactive in terms of observable overt activities and underlying learning processes.", "The framework generates a testable hypothesis for learning: that interactive activities are most likely to be better than constructive activities, which in turn might be better than active activities, which are better than being passive.", "Studies from the literature are cited to provide evidence in support of this hypothesis.", "Moreover, postulating underlying learning processes allows us to interpret evidence in the literature more accurately.", "Specifying distinct overt activities for active, constructive, and interactive also offers suggestions for how learning activities can be coded and how each kind of activity might be elicited." ]
[ 0, 0, 0, 1, 1, 1, 1, 4 ]
[ 0.7949000000953674, 0.5896999835968018, 0.5896999835968018, 0.5896999835968018, 0.7949000000953674, 0.7949000000953674, 0.5896999835968018, 0.41029998660087585 ]
train_0245
[ "The paper presents a new generation of torque-controlled li ghtweight robots (LWR) developed at the Institute of Robotics and Mechatronics of the German Aerospace Center .", "I order to act in unstructured environments and interact with humans, the robots have design features an d co trol/software functionalities which distinguish them from classical robots, such as: load-to-weight ratio o f 1:1, torque sensing in the joints, active vibration damping, sensitive collision detection, as well as complia nt control on joint and Cartesian level.", "Due to the partially unknown properties of the environment, robustne s of planning and control with respect to environmental variations is crucial.", "After briefly describing the main har dware features, the paper focuses on showing how joint torque sensing (as a main feature of the robot) is conse quently used for achieving the above mentioned performance, safety, and robustness properties." ]
[ 0, 2, 2, 4 ]
[ 0.6000000238418579, 0.4000000059604645, 0.4000000059604645, 0.4000000059604645 ]
train_0246
[ "We propose a new framework for estimating generative models via an adversarial process, in which we simultaneously train two models: a generative model G that captures the data distribution, and a discriminative model D that estimates the probability that a sample came from the training data rather than G. The training procedure for G is to maximize the probability of D making a mistake.", "This framework corresponds to a minimax two-player game.", "In the space of arbitrary functions G and D, a unique solution exists, with G recovering the training data distribution and D equal to 1 2 everywhere.", "In the case where G and D are defined by multilayer perceptrons, the entire system can be trained with backpropagation.", "There is no need for any Markov chains or unrolled approximate inference networks during either training or generation of samples.", "Experiments demonstrate the potential of the framework through qualitative and quantitative evaluation of the generated samples." ]
[ 0, 1, 1, 1, 1, 4 ]
[ 0.41029998660087585, 0.7949000000953674, 0.5896999835968018, 0.6154000163078308, 0.41029998660087585, 0.7949000000953674 ]
train_0247
[ "Deep Bidirectional LSTM (DBLSTM) recurrent neural networks have recently been shown to give state-of-the-art performance on the TIMIT speech database.", "However, the results in that work relied on recurrent-neural-network-specific objective functions, which are difficult to integrate with existing large vocabulary speech recognition systems.", "This paper investigates the use of DBLSTM as an acoustic model in a standard neural network-HMM hybrid system.", "We find that a DBLSTM-HMM hybrid gives equally good results on TIMIT as the previous work.", "It also outperforms both GMM and deep network benchmarks on a subset of the Wall Street Journal corpus.", "However the improvement in word error rate over the deep network is modest, despite a great increase in framelevel accuracy.", "We conclude that the hybrid approach with DBLSTM appears to be well suited for tasks where acoustic modelling predominates.", "Further investigation needs to be conducted to understand how to better leverage the improvements in frame-level accuracy towards better word error rates." ]
[ 0, 0, 2, 4, 1, 1, 4, 4 ]
[ 1, 0.8234999775886536, 0.8529000282287598, 0.6176000237464905, 0.3824000060558319, 0.5587999820709229, 1, 0.7059000134468079 ]
train_0248
[ "Since the early days of the Internet, gender gap has existed in using the Internet, and it is particularly evident for online shopping.", "Females perceive higher level of risk for online shopping, and as a result, they tend to hesitate to make purchase online.", "Online consumer reviews can effectively mitigate such perceived risk by females and thereby attract them to buy online.", "This study investigates the effect of online consumer reviews on consumer’s purchase intention.", "In particular, we examine whether there are gender differences in responding to online consumer reviews.", "The results show that the effect of online consumer reviews on purchase intention is stronger for females than males.", "The negativity effect, that consumers are influenced by a negative review more than by a positive review, is also found to be more evident for females.", "These findings have practical implications for online sellers to guide them to effectively use online consumer reviews to engage females in online shopping." ]
[ 0, 0, 2, 2, 1, 1, 4, 4 ]
[ 0.5659000277519226, 0.5659000277519226, 0.40310001373291016, 0.5659000277519226, 0.40700000524520874, 0.40700000524520874, 0.40700000524520874, 0.3797999918460846 ]
train_0249
[ "Big-data server applications frequently encounter data misses, and hence, lose significant performance potential.", "One way to reduce the number of data misses or their effect is data prefetching.", "As data accesses have high temporal correlations, temporal prefetching techniques are promising for them.", "While state-of-the-art temporal prefetching techniques are effective at reducing the number of data misses, we observe that there is a significant gap between what they offer and the opportunity.", "This work aims to improve the effectiveness of temporal prefetching techniques.", "We identify the lookup mechanism of existing temporal prefetchers responsible for the large gap between what they offer and the opportunity.", "Existing lookup mechanisms either not choose the right stream in the history, or unnecessarily delay the stream selection, and hence, miss the opportunity at the beginning of every stream.", "In this work, we introduce Domino prefetching to address the limitations of existing temporal prefetchers.", "Domino prefetcher is a temporal data prefetching technique that logically looks up the history with both one and two last miss addresses to find a match for prefetching.", "We propose a practical design for Domino prefetcher that employs an Enhanced Index Table that is indexed by just a single miss address." ]
[ 0, 0, 0, 0, 2, 1, 1, 1, 1, 1 ]
[ 0.7894999980926514, 0.7894999980926514, 0.7894999980926514, 0.7894999980926514, 0.3684000074863434, 0.6053000092506409, 0.39469999074935913, 0.39469999074935913, 0.5788999795913696, 0.5788999795913696 ]
train_0250
[ "In this paper we investigate whether Virtual Reality (VR) and Augmented Reality (AR) offer potential for the training of manual skills, such as for assembly tasks, in comparison to conventional media.", "We present results from experiments that compare assembly completion times for a number of different conditions.", "We firstly investigate completion times for a task where participants can study an engineering drawing and an assembly plan and then conduct the task.", "We then investigate the task under various VR conditions and" ]
[ 0, 4, 4, 4 ]
[ 0.7838000059127808, 0.21619999408721924, 0.4323999881744385, 0.8378000259399414 ]
train_0251
[ "The following paper presents results of combining two intensively developed technologies used to build database applications SQL’s recursive queries and object-relational mapping.", "Recursive queries are efficient tools for querying graph and hierarchical structures.", "They are very useful in solving problems such as searching for connections between two cities or calculating bill-of-material.", "Object-relational mapping allows for separation of business logic from database layer and more efficient implementation of computer software.", "However, modern mapping systems still lack support for many advanced SQL techniques.", "In order to perform a recursive calculation a programmer has to either write a recursive function in a language supported by the target database or implement a native function in the main software code that recursively sends queries to the database.", "The authors propose an enhancement enabling the use of recursive queries in one of the most popular ORM systems Hibernate for Java language.", "With this enhancement a programmer will be able to take a full advantage of the support for the recursive queries offered by various object-relational database management systems and write a code fully compliant with Hibernate standard.", "The proposed solution works with IBM DB2, Oracle and PostgreSQL DBMS and proved to be many times faster than the approaches currently used." ]
[ 0, 0, 0, 4, 4, 4, 1, 4, 4 ]
[ 0.5946000218391418, 0.5946000218391418, 0.3783999979496002, 0.21619999408721924, 0.21619999408721924, 0.21619999408721924, 0.3783999979496002, 0.40540000796318054, 0.4323999881744385 ]
train_0252
[ "The variational approximation of posterior distributions by multivariate gaussians has been much less popular in the machine learning community compared to the corresponding approximation by factorizing distributions.", "This is for a good reason: the gaussian approximation is in general plagued by an number of variational parameters to be optimized, N being the number of random variables.", "In this letter, we discuss the relationship between the Laplace and the variational approximation, and we show that for models with gaussian priors and factorizing likelihoods, the number of variational parameters is actually .", "The approach is applied to gaussian process regression with nongaussian likelihoods." ]
[ 0, 0, 1, 4 ]
[ 0.8125, 0.6563000082969666, 0.5625, 0.40630000829696655 ]
train_0253
[ "Auditors and process managers often face a huge amount of financial entries in accounting information systems.", "For many reasons like auditing the internal control system a process-oriented view would be more helpful to understand how a set of transactions produced financial entries.", "For this reason we present an algorithm capable to mine financial entries and open items to reconstruct the process instances which produced the financial entries.", "In this way, auditors can trace how balance sheet items have been produced in the system.", "Traditional process mining techniques only reconstruct processes but pay no regard to the financial dimension.", "The paper wants to close this gap and integrate the process view with the accounting view." ]
[ 0, 0, 2, 2, 1, 1 ]
[ 1, 1, 0.421099990606308, 0.421099990606308, 0.6053000092506409, 0.6053000092506409 ]
train_0254
[ "In this paper, we present a possible application of neural networks as a component of an intrusion detection system.", "Neural network algorithms are emerging nowadays as a new arnficial intelligence techm”quethat can be applied to real-l~e problems.", "We present an approach of user behavior modeling that takes advantage of the properties of neural algorithms and display results obtained on preliminary testing of our approach." ]
[ 0, 0, 1 ]
[ 0.7838000059127808, 0.5946000218391418, 0.5676000118255615 ]
train_0255
[ "We consider the problem of embedding entities and relationships of multirelational data in low-dimensional vector spaces.", "Our objective is to propose a canonical model which is easy to train, contains a reduced number of parameters and can scale up to very large databases.", "Hence, we propose TransE, a method which models relationships by interpreting them as translations operating on the low-dimensional embeddings of the entities.", "Despite its simplicity, this assumption proves to be powerful since extensive experiments show that TransE significantly outperforms state-of-the-art methods in link prediction on two knowledge bases.", "Besides, it can be successfully trained on a large scale data set with 1M entities, 25k relationships and more than 17M training samples." ]
[ 0, 2, 1, 3, 4 ]
[ 0.5758000016212463, 0.8485000133514404, 0.666700005531311, 0.33329999446868896, 0.6061000227928162 ]
train_0256
[ "Visual speech enhancement is used on videos shot in noisy environments to enhance the voice of a visible speaker and to reduce background noise.", "While most existing methods use audio-only inputs, we propose an audio-visual neural network model for this purpose.", "The visible mouth movements are used to separate the speaker’s voice from the background sounds.", "Instead of training our speech enhancement model on a wide range of possible noise types, we train the model on videos where other speech samples of the target speaker are used as background noise.", "A model trained using this paradigm generalizes well to various noise types, while also substantially reducing training time.", "The proposed model outperforms prior audio visual methods on two public lipreading datasets.", "It is also the first to be demonstrated on a general dataset not designed for lipreading.", "Our dataset was composed of weekly addresses of Barack Obama." ]
[ 0, 1, 1, 1, 1, 1, 4, 4 ]
[ 0.8055999875068665, 0.41670000553131104, 0.6111000180244446, 1, 1, 0.41670000553131104, 0.41670000553131104, 0.41670000553131104 ]
train_0257
[ "Distributed real-time embedded (DRE) software systems such as are used to manage critical large-scale infrastructure are important systems to target for increased functionality and resiliency.", "DRE systems that can adapt to changes in the environment and/or changes in available resources are more robust to unexpected changes and extend both the systems' utility and lifespan.", "Artificial intelligence techniques are used for adaptation of software systems in general.", "However, they must meet certain requirements to be appropriate for use with DRE systems.", "Any artificial intelligence (AI) technique used in an adaptive DRE system should produce consistent results across a distributed system, operate in bounded time, make decisions autonomously, and gracefully handle and learn from previously unencountered environments.", "This paper surveys a variety of AI techniques, providing a brief overview of each method, evaluating how each technique fits the requirements of an adaptive DRE system, and recognizing the gaps in each technique's ability to meet all of these requirements.", "Our results show that there is not one single AI technique in our survey that is a perfect fit for adaptive DRE systems, although some techniques address more of these requirements than others." ]
[ 0, 0, 0, 0, 0, 1, 4 ]
[ 0.7894999980926514, 0.7894999980926514, 0.631600022315979, 0.5788999795913696, 0.421099990606308, 0.53329998254776, 0.7894999980926514 ]
train_0258
[ "Digitization of paper-bound documents is one of the foremost commercial interests worldwide.", "First step in all such applications is transforming a paper bound document into an electronic document by scanning, subsequently applying to the image OCR to generate textual information from the document image.", "In this paper we describe our work that acts as a pre-processing stage for OCR application.", "Automatic document layout extraction and segmentation is done using spatial configuration of various text/image segments represented as bounded boxes; this segmented layout is than analyzed with certain heuristic tests and each segment is assigned labels (title, authors, abstract, body, header, footer etc).", "This information is than passed on to OCR module as an XML interface, accelerating it¿s performance by allowing it to label recognized text segments and identifying only those parts of the document which have text resulting saving in computation.", "Although, the work has been motivated for application to an automated machine translation system preserving the overall document layout, it has a number of other applications such as in information retrieval, search etc.", "This information is also being used to classify technical documents into three categories which can be extended to any number of classes based on spatial configuration heuristics." ]
[ 0, 0, 0, 2, 1, 1, 4 ]
[ 1, 0.6111000180244446, 0.41670000553131104, 0.5171999931335449, 0.7778000235557556, 0.41670000553131104, 0.5555999875068665 ]
train_0259
[ "In this paper we propose a new General Image DataBase (GIDB) model.", "The model establishes taxonomy based on the systematisation of existing approaches.", "The GIDB model is based on the General Image Data model [1] and General Image Retrieval model [2].", "The GIDB model uses the powerful features offered by objectoriented modelling, the elegance of the relational databases, the state of art of computer vision and the current methods for knowledge representation and management to achieve effective image retrieval.", "The developed language for the model is a hybrid between interactive and descriptive query languages.", "The ideas of the model can be used in the design of image retrieval libraries for an object-oriented database.", "As an illustration the results of applying the GIDB model to a plant database in the Sofia Image Database Management System are presented." ]
[ 2, 2, 2, 1, 1, 4, 4 ]
[ 0.583299994468689, 0.583299994468689, 0.41670000553131104, 0.3889000117778778, 0.3889000117778778, 0.6388999819755554, 1 ]
train_0260
[ "The increasing demand of mobile Internet and the Internet of Things poses challenging requirements for 5G wireless communications, such as high spectral efficiency and massive connectivity.", "In this article, a promising technology, non-orthogonal multiple access (NOMA), is discussed, which can address some of these challenges for 5G.", "Different from conventional orthogonal multiple access technologies, NOMA can accommodate much more users via nonorthogonal resource allocation.", "We divide existing dominant NOMA schemes into two categories: power-domain multiplexing and code-domain multiplexing, and the corresponding schemes include power-domain NOMA, multiple access with low-density spreading, sparse code multiple access, multi-user shared access, pattern division multiple access, and so on.", "We discuss their principles, key features, and pros/cons, and then provide a comprehensive comparison of these solutions from the perspective of spectral efficiency, system performance, receiver complexity, and so on.", "In addition, challenges, opportunities, and future research trends for NOMA design are highlighted to provide some insight on the potential future work for researchers in this field.", "Finally, to leverage different multiple access schemes including both conventional OMA and new NOMA, we propose the concept of software defined multiple access (SoDeMA), which enables adaptive configuration of available multiple access schemes to support diverse services and applications in future 5G networks." ]
[ 0, 0, 0, 1, 0, 4, 1 ]
[ 0.8399999737739563, 0.8399999737739563, 0.7142999768257141, 0.38999998569488525, 0.4867999851703644, 0.44999998807907104, 0.44999998807907104 ]
train_0261
[ "Many schemes have been recently advanced for storing data on multiple clouds.", "Distributing data over different cloud storage providers (CSPs) automatically provides users with a certain degree of information leakage control, as no single point of attack can leak all user's information.", "However, unplanned distribution of data chunks can lead to high information disclosure even while using multiple clouds.", "In this paper, to address this problem we present StoreSim, an information leakage aware storage system in multicloud.", "StoreSim aims to store syntactically similar data on the same cloud, thus minimizing the user's information leakage across multiple clouds.", "We design an approximate algorithm to efficiently generate similarity-preserving signatures for data chunks based on MinHash and Bloom filter, and also design a function to compute the information leakage based on these signatures.", "Next, we present an effective storage plan generation algorithm based on clustering for distributing data chunks with minimal information leakage across multiple clouds.", "Finally, we evaluate our scheme using two real datasets from Wikipedia and GitHub.", "We show that our scheme can reduce the information leakage by up to 60% compared to unplanned placement." ]
[ 0, 1, 2, 1, 2, 1, 1, 4, 4 ]
[ 0.6111000180244446, 0.3889000117778778, 0.3889000117778778, 0.6111000180244446, 0.3889000117778778, 0.666700005531311, 0.6111000180244446, 0.6111000180244446, 0.833299994468689 ]
train_0262
[ "In this paper we present eMir, digital signage (public electronic displays) that show human faces which react to audience emotion.", "Using a camera installed at the sign, the system observes the audience and detects whether someone watches the display via face detection software.", "The face detection is able to classify facial expressions and determine gender.", "This information is used to let a human character on the screen react accordingly and encourage interaction with the face/sign.", "The system has been deployed for one month on a digital sign in a university building.", "We present experiences with the system, our findings from the collected interaction data and results from interviews with eight users." ]
[ 1, 1, 1, 1, 0, 4 ]
[ 0.4000000059604645, 0.8285999894142151, 0.8285999894142151, 0.8285999894142151, 0.37139999866485596, 0.428600013256073 ]
train_0263
[ "In this paper, the performance of a topological-metric visual-path-following framework is investigated in different environments.", "The framework relies on a monocular camera as the only sensing modality.", "The path is represented as a series of reference images such that each neighboring pair contains a number of common landmarks.", "Local 3-D geometries are reconstructed between the neighboring reference images to achieve fast feature prediction.", "This condition allows recovery from tracking failures.", "During navigation, the robot is controlled using image-based visual servoing.", "The focus of this paper is on the results from a number of experiments that were conducted in different environments, lighting conditions, and seasons.", "The experiments with a robot car show that the framework is robust to moving objects and moderate illumination changes.", "It is also shown that the system is capable of online path learning." ]
[ 0, 1, 1, 1, 1, 1, 2, 4, 4 ]
[ 0.6000000238418579, 0.6000000238418579, 0.800000011920929, 1, 1, 0.6000000238418579, 0.4000000059604645, 1, 1 ]
train_0264
[ "We introduce a neural network with a recurrent attention model over a possibly large external memory.", "The architecture is a form of Memory Network [23] but unlike the model in that work, it is trained end-to-end, and hence requires significantly less supervision during training, making it more generally applicable in realistic settings.", "It can also be seen as an extension of RNNsearch [2] to the case where multiple computational steps (hops) are performed per output symbol.", "The flexibility of the model allows us to apply it to tasks as diverse as (synthetic) question answering [22] and to language modeling.", "For the former our approach is competitive with Memory Networks, but with less supervision.", "For the latter, on the Penn TreeBank and Text8 datasets our approach demonstrates comparable performance to RNNs and LSTMs.", "In both cases we show that the key concept of multiple computational hops yields improved results." ]
[ 0, 1, 1, 1, 1, 4, 4 ]
[ 0.6154000163078308, 0.41029998660087585, 0.41029998660087585, 0.6154000163078308, 0.6154000163078308, 0.41029998660087585, 0.8205000162124634 ]
train_0265
[ "In this paper, a power density analysis is presented for 7nm FinFET technology node based on both shorted-gate (SG) and independent-gate (IG) standard cells operating in multiple supply voltage regimes.", "A Liberty-formatted standard cell library is established by selecting the appropriate number of fins for the pull-up and pull-down networks of each logic cell.", "The layout of both shorted-gate and independent-gate standard cells are then characterized according to lambda-based layout design rules for FinFET devices.", "Finally, the power density of 7nm FinFET technology node is analyzed and compared with the 45 nm CMOS technology node for different circuits.", "Experimental result shows that the power density of each 7nm FinFET circuit is 3-20 times larger than that of 45nm CMOS circuit under the spacer-defined technology.", "Experimental result also shows that the back-gate signal enables a better control of power consumption for independent-gate FinFETs." ]
[ 0, 1, 1, 1, 4, 4 ]
[ 0.800000011920929, 0.6000000238418579, 0.6000000238418579, 0.6000000238418579, 1, 1 ]
train_0266
[ "Despite recent breakthroughs in the applications of deep neural networks, one setting that presents a persistent challenge is that of “one-shot learning.", "”", "Traditional gradient-based networks require a lot of data to learn, often through extensive iterative training.", "When new data is encountered, the models must inefficiently relearn their parameters to adequately incorporate the new information without catastrophic interference.", "Architectures with augmented memory capacities, such as Neural Turing Machines (NTMs), offer the ability to quickly encode and retrieve new information, and hence can potentially obviate the downsides of conventional models.", "Here, we demonstrate the ability of a memory-augmented neural network to rapidly assimilate new data, and leverage this data to make accurate predictions after only a few samples.", "We also introduce a new method for accessing an external memory that focuses on memory content, unlike previous methods that additionally use memory locationbased focusing mechanisms." ]
[ 0, 3, 0, 1, 1, 1, 1 ]
[ 0.6485999822616577, 1, 0.4323999881744385, 0.4323999881744385, 0.4323999881744385, 0.4323999881744385, 0.7838000059127808 ]
train_0267
[ "In this paper we describe simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys.", "The schemes are provably secure against any known or chosen message attack if factoring is difficult, and typical implementations require only 1% to 4% of the number of modular multiplications required by the RSA scheme.", "Due to their simplicity, security and speed, these schemes are ideally suited for microprocessor-based devices such as smart cards, personal computers, and remote control systems." ]
[ 0, 0, 0 ]
[ 0.6000000238418579, 0.571399986743927, 0.428600013256073 ]
train_0268
[ "We presentconditional random fields, a framework for building probabilistic models to segment and label sequence data.", "Conditional random fields offer several advantages over hidden Markov models and stochastic grammars for such tasks, including the ability to relax strong independence assumptions made in those models.", "Conditional random fields also avoid a fundamental limitation of maximum entropy Markov models (MEMMs) and other discriminative Markov models based on directed graphical models, which can be biased towards states with few successor states.", "We present iterative parameter estimation algorithms for conditional random fields and compare the performance of the resulting models to HMMs and MEMMs on synthetic and natural-language data." ]
[ 2, 1, 1, 4 ]
[ 0.7949000000953674, 0.8205000162124634, 0.6154000163078308, 0.41029998660087585 ]
train_0269
[ "has slightly different meanings to different people.", "Some believe a Web application is anything that uses Java, others consider a Web application anything that uses a Web server.", "The general consensus is somewhere in between.", "In this article, a Web application will be loosely defined as a Web system (Web server, network, HTTP, browser) in which user input (navigation and data input) effects the state of the business.", "This definition attempts to establish that a Web application is a software system with business state, and that its front end is in large part delivered via a Web system.", "The general architecture of a Web application is A new term has entered" ]
[ 0, 0, 0, 2, 2, 0 ]
[ 0.6053000092506409, 1, 0.8158000111579895, 0.631600022315979, 0.631600022315979, 0.5788999795913696 ]
train_0270
[ "Kaplan-Meier survival curves and the associated nonparametric log rank test statistic are methods of choice for unadjusted survival analyses, while the semiparametric Cox proportional hazards regression model is used ubiquitously as a method for covariate adjustment.", "The Cox model extends naturally to include covariates, but there is no generally accepted method to graphically depict adjusted survival curves.", "The authors describe a method and provide a simple worked example using inverse probability weights (IPW) to create adjusted survival curves.", "When the weights are non-parametrically estimated, this method is equivalent to direct standardization of the survival curves to the combined study population." ]
[ 1, 0, 1, 1 ]
[ 0.5946000218391418, 0.40540000796318054, 1, 0.6215999722480774 ]
train_0271
[ "The estimation of a vehiclepsilas dynamic state is one of the most fundamental data fusion tasks for intelligent traffic applications.", "For that, motion models are applied in order to increase the accuracy and robustness of the estimation.", "This paper surveys numerous (especially curvilinear) models and compares their performance using a tracking tasks which includes the fusion of GPS and odometry data with an Unscented Kalman Filter.", "For evaluation purposes, a highly accurate reference trajectory has been recorded using an RTK-supported DGPS receiver.", "With this ground truth data, the performance of the models is evaluated in different scenarios and driving situations." ]
[ 0, 0, 1, 4, 4 ]
[ 0.7949000000953674, 0.5896999835968018, 0.41029998660087585, 0.41029998660087585, 0.7949000000953674 ]
train_0272
[ "This paper introduces an approach of creating face makeup upon a face image with another image as the style example.", "Our approach is analogous to physical makeup, as we modify the color and skin detail while preserving the face structure.", "More precisely, we first decompose the two images into three layers: face structure layer, skin detail layer, and color layer.", "Thereafter, we transfer information from each layer of one image to corresponding layer of the other image.", "One major advantage of the proposed method lies in that only one example image is required.", "This renders face makeup by example very convenient and practical.", "Equally, this enables some additional interesting applications, such as applying makeup by a portraiture.", "The experiment results demonstrate the effectiveness of the proposed approach in faithfully transferring makeup." ]
[ 0, 0, 1, 1, 1, 4, 4, 4 ]
[ 0.5788999795913696, 0.5788999795913696, 0.8158000111579895, 1, 1, 0.6053000092506409, 0.7894999980926514, 0.8158000111579895 ]
train_0273
[ "Research into online gaming has steadily increased over the last decade, although relatively little research has examined the relationship between online gaming addiction and personality factors.", "This study examined the relationship between a number of personality traits (sensation seeking, self-control, aggression, neuroticism, state anxiety, and trait anxiety) and online gaming addiction.", "Data were collected over a 1-month period using an opportunity sample of 123 university students at an East Midlands university in the United Kingdom.", "Gamers completed all the online questionnaires.", "Results of a multiple linear regression indicated that five traits (neuroticism, sensation seeking, trait anxiety, state anxiety, and aggression) displayed significant associations with online gaming addiction.", "The study suggests that certain personality traits may be important in the acquisition, development, and maintenance of online gaming addiction, although further research is needed to replicate the findings of the present study." ]
[ 0, 2, 1, 1, 4, 4 ]
[ 1, 0.5625, 0.625, 1, 1, 1 ]
train_0274
[ "Table detection is a crucial step in many document analysis applications as tables are used for presenting essential information to the reader in a structured manner.", "It is a hard problem due to varying layouts and encodings of the tables.", "Researchers have proposed numerous techniques for table detection based on layout analysis of documents.", "Most of these techniques fail to generalize because they rely on hand engineered features which are not robust to layout variations.", "In this paper, we have presented a deep learning based method for table detection.", "In the proposed method, document images are first pre-processed.", "These images are then fed to a Region Proposal Network followed by a fully connected neural network for table detection.", "The proposed method works with high precision on document images with varying layouts that include documents, research papers, and magazines.", "We have done our evaluations on publicly available UNLV dataset where it beats Tesseract's state of the art table detection system by a significant margin." ]
[ 0, 0, 1, 1, 1, 1, 1, 1, 4 ]
[ 1, 0.7838000059127808, 0.6215999722480774, 0.7838000059127808, 0.7838000059127808, 1, 0.7838000059127808, 1, 0.5676000118255615 ]
train_0275
[ "In this paper, we study the linking patterns and discussion topics of political bloggers.", "Our aim is to measure the degree of interaction between liberal and conservative blogs, and to uncover any differences in the structure of the two communities.", "Specifically, we analyze the posts of 40 \"A-list\" blogs over the period of two months preceding the U.S. Presidential Election of 2004, to study how often they referred to one another and to quantify the overlap in the topics they discussed, both within the liberal and conservative communities, and also across communities.", "We also study a single day snapshot of over 1,000 political blogs.", "This snapshot captures blogrolls (the list of links to other blogs frequently found in sidebars), and presents a more static picture of a broader blogosphere.", "Most significantly, we find differences in the behavior of liberal and conservative blogs, with conservative blogs linking to each other more frequently and in a denser pattern." ]
[ 0, 2, 1, 1, 1, 4 ]
[ 0.5788999795913696, 0.7894999980926514, 0.8158000111579895, 0.631600022315979, 0.6053000092506409, 1 ]
train_0276
[ "The field of privacy has seen rapid advances in recent years because of the increases in the ability to store data.", "In particular, recent advances in the data mining field have lead to increased concerns about privacy.", "While the topic of privacy has been traditionally studied in the context of cryptography and information-hiding, recent emphasis on data mining has lead to renewed interest in the field.", "In this chapter, we will introduce the topic of privacy-preserving data mining and provide an overview of the different topics covered in this book." ]
[ 0, 0, 0, 2 ]
[ 1, 0.628600001335144, 0.628600001335144, 0.6000000238418579 ]
train_0277
[ "Sponsored recommendation blog posts, a form of online consumer review, are blog articles written by bloggers who receive benefits from sponsoring marketers to review and promote products on their personal blog.", "Because national regulations require that marketer sponsorship must be revealed in the blog post, sponsored recommendation posts can no longer conceal their marketing intent.", "Consumer’s attitudes toward sponsored recommendation posts are thus a vital issue in assessing the effectiveness of the advertisement.", "This study uses a 2(sponsorship type) !", "2(product type) !", "2(brand awareness) experimental design and a total of 613 valid samples to examine consumer attitudes toward sponsored recommendation posts and purchase intention.", "The results show that when products recommended in blog posts are search goods or have high brand awareness, consumers have highly positive attitudes toward sponsored recommendation posts, which improves purchase intention.", "The directly-monetary/ indirect-monetary benefits received by the bloggers have no significant effect on readership attitudes.", "Using these features in blog writings appears to improve online readers’ trust toward and the credibility of sponsored recommendation posts and thus can be a vital online marketing tool for marketers. !", "2014 Elsevier Ltd." ]
[ 0, 0, 0, 1, 1, 1, 4, 3, 4, 3 ]
[ 1, 0.7838000059127808, 0.5676000118255615, 0.4323999881744385, 0.4323999881744385, 0.7838000059127808, 0.8378000259399414, 0.40540000796318054, 0.7838000059127808, 0.40540000796318054 ]
train_0278
[ "The purpose of this study was to examine force transmission from one of the major multi-articular muscles of the finger, flexor digitorum pro-fundus (FDP), to the index finger.", "Specifically, we examined whether the popular moment arm (MA)-joint torque technique of modeling muscle force transmission can accurately represent the effects of the FDP on finger movement.", "A dynamic finger model employing geometric MA values (model I) was compared with another model including realistic tendon force transformation mechanisms via pulley structures and joint reaction forces (model II).", "Finger flexion movements generated by these models were compared with those obtained from in vivo stimulation experiments.", "The model with the force transformation mechanisms (model II) resulted in more realistic joint spatial coordination (i.e., proximal interphalangeal > metacarpophalangeal ges distal interphalangeal) than the MA-based model (model I) in relation to the movement patterns evoked by stimulation.", "Also, the importance of the pulley structures and passive joint characteristics was confirmed in the model simulation; altering/eliminating these components significantly changed the spatial coordination of the joint angles during the resulting movements.", "The results of this study emphasize the functional importance of the force transformation through various biomechanical components, and suggest the importance of including these components when investigating finger motor control, such as for examining injury mechanisms or designing rehabilitation protocols." ]
[ 2, 1, 1, 1, 1, 1, 4 ]
[ 0.583299994468689, 0.583299994468689, 0.583299994468689, 0.8055999875068665, 0.833299994468689, 0.41670000553131104, 0.8055999875068665 ]
train_0279
[ "With the popularity of social media (e.g., Facebook and Flicker), users can easily share their check-in records and photos during their trips.", "In view of the huge number of user historical mobility records in social media, we aim to discover travel experiences to facilitate trip planning.", "When planning a trip, users always have specific preferences regarding their trips.", "Instead of restricting users to limited query options such as locations, activities, or time periods, we consider arbitrary text descriptions as keywords about personalized requirements.", "Moreover, a diverse and representative set of recommended travel routes is needed.", "Prior works have elaborated on mining and ranking existing routes from check-in data.", "To meet the need for automatic trip organization, we claim that more features of Places of Interest (POIs) should be extracted.", "Therefore, in this paper, we propose an efficient Keyword-aware Representative Travel Route framework that uses knowledge extraction from users’ historical mobility records and social interactions.", "Explicitly, we have designed a keyword extraction module to classify the POI-related tags, for effective matching with query keywords.", "We have further designed a route reconstruction algorithm to construct route candidates that fulfill the requirements." ]
[ 0, 0, 0, 1, 1, 0, 1, 2, 1, 1 ]
[ 1, 0.5676000118255615, 0.5676000118255615, 0.6215999722480774, 0.40540000796318054, 0.5676000118255615, 0.40540000796318054, 0.5676000118255615, 1, 1 ]
train_0280
[ "Deep learning is a broad set of techniques that uses multiple layers of representation to automatically learn relevant features directly from structured data.", "Recently, such techniques have yielded record-breaking results on a diverse set of difficult machine learning tasks in computer vision, speech recognition, and natural language processing.", "Despite the enormous success of deep learning, relatively little is understood theoretically about why these techniques are so successful at feature learning and compression.", "Here, we show that deep learning is intimately related to one of the most important and successful techniques in theoretical physics, the renormalization group (RG).", "RG is an iterative coarse-graining scheme that allows for the extraction of relevant features (i.e. operators) as a physical system is examined at different length scales.", "We construct an exact mapping from the variational renormalization group, first introduced by Kadanoff, and deep learning architectures based on Restricted Boltzmann Machines (RBMs).", "We illustrate these ideas using the nearest-neighbor Ising Model in one and two-dimensions.", "Our results suggests that deep learning algorithms may be employing a generalized RG-like scheme to learn relevant features from data." ]
[ 0, 0, 0, 0, 1, 1, 1, 4 ]
[ 1, 1, 0.7894999980926514, 0.421099990606308, 0.631600022315979, 0.8421000242233276, 0.631600022315979, 1 ]
train_0281
[ "Social networking sites (SNS) provide opportunities for mood management through selective exposure.", "This study tested the prediction that negative mood fosters self-enhancing social comparisons to SNS profiles.", "Participants were induced into positive or negative moods and then browsed manipulated profiles on an experimental SNS.", "Profiles varied in a 2 2 within-subjects design along two dimensions, ratings of career success and attractiveness, allowing for upward comparisons (high ratings) and downward comparisons (low ratings).", "Selective exposure was measured in seconds spent viewing profiles.", "Negative mood led to less exposure to upward comparisons and more to downward comparisons than positive mood.", "The comparison dimension did not influence selective exposure.", "Thus, in a negative mood, SNS users prefer self-enhancing social comparisons to manage their mood.", "2014 Elsevier Ltd.", "All rights reserved." ]
[ 0, 2, 1, 1, 1, 1, 1, 4, 3, 3 ]
[ 0.8378000259399414, 0.4323999881744385, 0.7838000059127808, 0.8108000159263611, 0.8108000159263611, 0.8108000159263611, 0.6485999822616577, 1, 1, 1 ]
train_0282
[ "In recent years, the effect of the curse of high dimensionality has been studied in great detail on several problems such as clustering, nearest neighbor search, and indexing.", "In high dimensional space the data becomes sparse, and traditional indexing and algorithmic techniques fail from a efficiency and/or effectiveness perspective.", "Recent research results show that in high dimensional space, the concept of proximity, distance or nearest neighbor may not even be qualitatively meaningful.", "In this paper, we view the dimensionality curse from the point of view of the distance metrics which are used to measure the similarity between objects.", "We specifically examine the behavior of the commonly used Lk norm and show that the problem of meaningfulness in high dimensionality is sensitive to the value of k. For example, this means that the Manhattan distance metric (L1 norm) is consistently more preferable than the Euclidean distance metric (L2 norm) for high dimensional data mining applications.", "Using the intuition derived from our analysis, we introduce and examine a natural extension of the Lk norm to fractional distance metrics.", "We show that the fractional distance metric provides more meaningful results both from the theoretical and empirical perspective.", "The results show that fractional distance metrics can significantly improve the effectiveness of standard clustering algorithms such as the k-means algorithm." ]
[ 0, 0, 2, 0, 1, 4, 4, 4 ]
[ 0.8285999894142151, 0.6000000238418579, 0.4000000059604645, 0.37139999866485596, 0.428600013256073, 0.4571000039577484, 0.4571000039577484, 0.8285999894142151 ]
train_0283
[ "We describe an object detection system based on mixtures of multiscale deformable part models.", "Our system is able to represent highly variable object classes and achieves state-of-the-art results in the PASCAL object detection challenges.", "While deformable part models have become quite popular, their value had not been demonstrated on difficult benchmarks such as the PASCAL data sets.", "Our system relies on new methods for discriminative training with partially labeled data.", "We combine a margin-sensitive approach for data-mining hard negative examples with a formalism we call latent SVM.", "A latent SVM is a reformulation of MI--SVM in terms of latent variables.", "A latent SVM is semiconvex, and the training problem becomes convex once latent information is specified for the positive examples.", "This leads to an iterative training algorithm that alternates between fixing latent values for positive examples and optimizing the latent SVM objective function." ]
[ 1, 1, 0, 1, 1, 1, 1, 4 ]
[ 0.5794000029563904, 0.5794000029563904, 0.4205999970436096, 0.5888000130653381, 0.6168000102043152, 0.6168000102043152, 0.4205999970436096, 0.6075000166893005 ]
train_0284
[ "A new, large scale multiprocessor architecture is presented in this paper.", "The architecture consists of hierarchies of shared buses and caches.", "Extended versions of shared bus multicache coherency protocols are used to maintain coherency among all caches in the system.", "After explaining the basic operation of the strict hierarchical approach, a clustered system is introduced which distributes the memory among groups of processors.", "Results of simulations are presented which demonstrate that the additional coherency protocol overhead introduced by the clustered approach is small.", "The simulations also show that a 128 processor multiprocessor can be constructed using this architecture which will achieve a substantial fraction of its peak performance.", "Finally, an analytic model is used to explore systems too large to simulate (with available hardware).", "The model indicates that a system of over 1000 usable MIPS can be constructed using high performance microprocessors." ]
[ 2, 1, 1, 1, 4, 4, 4, 4 ]
[ 1, 0.7838000059127808, 0.5676000118255615, 1, 0.5946000218391418, 0.7838000059127808, 1, 1 ]
train_0285
[ "The Internet of Things (IoT) is changing human lives by connecting everyday objects together.", "For example, in a grocery store, all items can be connected with each other, forming a smart shopping system.", "In such an IoT system, an inexpensive radio frequency identification (RFID) tag can be attached to each product which, when placed into a smart shopping cart, can be automatically read by a cart equipped with an RFID reader.", "As a result, billing can be conducted from the shopping cart itself, preventing customers from waiting in a long queue at checkout.", "Additionally, smart shelving can be added into this system, equipped with RFID readers, and can monitor stock, perhaps also updating a central server.", "Another benefit of this kind of system is that inventory management becomes much easier, as all items can be automatically read by an RFID reader instead of manually scanned by a laborer.", "To validate the feasibility of such a system, in this paper we identify the design requirements of a smart shopping system, build a prototype system to test functionality, and design a secure communication protocol to make the system practical.", "To the best of our knowledge, this is the first time a smart shopping system is proposed with security under consideration." ]
[ 0, 0, 0, 4, 4, 4, 4, 3 ]
[ 1, 1, 0.6388999819755554, 0.583299994468689, 0.3889000117778778, 0.6111000180244446, 0.41670000553131104, 0.41670000553131104 ]
train_0286
[ "This paper is concerned with the design of gain-scheduled controllers with guaranteed %$ performance for a class of linear parameter-varying (LPV) plants.", "Here the plant state-space matrices are assumed to depend affinely on a vector 8 of time-varying real parameters.", "Assuming real-time measurement of these parameters, they can be fed to the controller to optimize the performance and robustness of the closed-loop system.", "The resulting controller is time-varying and automatically ‘gain-scheduled’ along parameter trajectories.", "Based on the notion of quadratic %& performance, solvability conditions are obtained for continuousand discrete-time systems.", "In both cases the synthesis problem reduces to solving a system of linear matrix inequalities (LMIs).", "The main benefit of this approach is to bypass most difficulties associated with more classical schemes such as gain-interpolation or gain-scheduling techniques.", "The methodology presented in this paper is applied to the gain scheduling of a missile autopilot.", "The missile has a large operating range and high angles of attack.", "The dificulty of the problem is reinforced by tight performance requirements as well as the presence of flexible modes that limit the control bandwidth." ]
[ 0, 0, 0, 0, 0, 0, 2, 1, 4, 4 ]
[ 0.833299994468689, 0.833299994468689, 0.6388999819755554, 0.44440001249313354, 0.44440001249313354, 0.44440001249313354, 0.583299994468689, 0.3889000117778778, 0.41670000553131104, 0.6388999819755554 ]
train_0287
[ "Much is known about the motor system and its role in simple movement execution.", "However, little is understood about the neural systems underlying auditory-motor integration in the context of musical rhythm, or the enhanced ability of musicians to execute precisely timed sequences.", "Using functional magnetic resonance imaging, we investigated how performance and neural activity were modulated as musicians and nonmusicians tapped in synchrony with progressively more complex and less metrically structured auditory rhythms.", "A functionally connected network was implicated in extracting higher-order features of a rhythm's temporal structure, with the dorsal premotor cortex mediating these auditory-motor interactions.", "In contrast to past studies, musicians recruited the prefrontal cortex to a greater degree than nonmusicians, whereas secondary motor regions were recruited to the same extent.", "We argue that the superior ability of musicians to deconstruct and organize a rhythm's temporal structure relates to the greater involvement of the prefrontal cortex mediating working memory." ]
[ 0, 0, 1, 1, 1, 4 ]
[ 1, 0.6240000128746033, 0.7828999757766724, 0.620199978351593, 0.4341000020503998, 1 ]
train_0288
[ "The least squares problem is formulated in terms of ℓ p quasi-norm regularization (0 < p < 1).", "Two formulations are considered: (i) an ℓ p-constrained optimization and (ii) an ℓ p-penalized (unconstrained) optimization.", "Due to the nonconvexity of the ℓ p quasi-norm, the solution paths of the regularized least squares problem are not ensured to be continuous.", "A critical path, which is a maximal continuous curve consisting of critical points, is therefore considered separately.", "The critical paths are piecewise smooth, as can be seen from the viewpoint of the variational method, and generally contain non-optimal points such as saddle points and local maxima as well as global/local minima.", "Along each critical path, the correspondence between the regularization parameters (which govern the 'strength' of regularization in the two formulations) is non-monotonic and, more specifically, it has multiplicity.", "Two paths of critical points connecting the origin and an ordinary least squares (OLS) solution are highlighted.", "One is a main path starting at an OLS solution, and the other is a greedy path starting at the origin.", "Part of the greedy path can be constructed with a generalized Minkowskian gradient.", "The breakpoints of the greedy path coincide with the step-by-step solutions generated by using orthogonal matching pursuit (OMP), thereby establishing a direct link between OMP and ℓ p-regularized least squares." ]
[ 1, 1, 1, 4, 4, 4, 4, 1, 1, 4 ]
[ 0.5946000218391418, 0.5946000218391418, 0.40540000796318054, 0.40540000796318054, 0.40540000796318054, 0.5171999931335449, 0.40540000796318054, 0.40540000796318054, 0.40540000796318054, 0.21619999408721924 ]
train_0289
[ "In the Internet of Things (IoT), resource-constrained things are connected to the unreliable and untrusted Internet via IPv6 and 6LoWPAN networks.", "Even when they are secured with encryption and authentication, these things are exposed both to wireless attacks from inside the 6LoWPAN network and from the Internet.", "Since these attacks may succeed, Intrusion Detection Systems (IDS) are necessary.", "Currently, there are no IDSs that meet the requirements of the IPv6-connected IoT since the available approaches are either customized for Wireless Sensor Networks (WSN) or for the conventional Internet.", "In this paper we design, implement, and evaluate a novel intrusion detection system for the IoT that we call SVELTE.", "In our implementation and evaluation we primarily target routing attacks such as spoofed or altered information, sinkhole, and selective-forwarding.", "However, our approach can be extended to detect other attacks.", "We implement SVELTE in the Contiki OS and thoroughly evaluate it.", "Our evaluation shows that in the simulated scenarios, SVELTE detects all malicious nodes that launch our implemented sinkhole and/or selective forwarding attacks.", "However, the true positive rate is not 100%, i.e., we have some false alarms during the detection of malicious nodes." ]
[ 0, 0, 0, 0, 1, 4, 4, 4, 4, 4 ]
[ 1, 0.7949000000953674, 0.5896999835968018, 0.5896999835968018, 0.41029998660087585, 0.5896999835968018, 0.41029998660087585, 0.5896999835968018, 0.5896999835968018, 0.6154000163078308 ]
train_0290
[ "The research field of technology acceptance and software acceptance is a fertile field in the discipline of MIS.", "Acceptance research is mainly affected by the technology acceptance model (TAM).", "The TAM is counted as the major guideline for acceptance research.", "But recently more researchers discover the deficits of former acceptance research.", "The main cause of the criticism is the focus on quantitative research methods.", "We will show this with the help of former meta-studies and a literature review.", "Quantitative approaches are basically appropriate for the testing of theories.", "The development of new theories or constructs is followed to a lesser intent.", "In the article we will show how a qualitative approach can be used for theory-construction.", "We will introduce a qualitative research design and show how this approach can be used to develop new constructs of acceptance while some existing constructs taken from TAM and related theories cannot be confirmed." ]
[ 0, 0, 0, 0, 2, 1, 1, 1, 1, 1 ]
[ 1, 0.8101000189781189, 0.5149000287055969, 0.8101000189781189, 0.40700000524520874, 0.6240000128746033, 0.7702999711036682, 0.8140000104904175, 0.40700000524520874, 0.7828999757766724 ]
train_0291
[ "In this paper the major components of every programming language are identified as: (1) the elementary program statement, (2) mechanisms for linking elementary statements together, (3) the means by which a program can obtain data inputs.", "Several alternative forms of each of these components are also described, compared and evaluated.", "Many examples, frequently from list processing languages, illustrate the forms described.", "The advantages, disadvantages and factors influencing the choice of a form of component for a language are discussed, and the paper concludes with the suggestion that programming languages evolve toward one which will permit all the most convenient ways of structuring programs, organizing systems and referencing data." ]
[ 0, 2, 1, 4 ]
[ 0.41029998660087585, 0.6154000163078308, 0.5896999835968018, 0.7949000000953674 ]
train_0292
[ "Deep neural networks have made significant breakthroughs in many fields of artificial intelligence.", "However, it has not been applied in the field of programming language processing.", "In this paper, we propose the treebased convolutional neural network (TBCNN) to model programming languages, which contain rich and explicit tree structural information.", "In our model, program vector representations are learned by the “coding” pretraining criterion based on abstract syntax trees (ASTs); the convolutional layer explicitly captures neighboring features on the tree; with the “binary continuous tree” and “3-way pooling,” our model can deal with ASTs of different shapes and sizes.", "We evaluate the program vector representations empirically, showing that the coding criterion successfully captures underlying features of AST nodes, and that program vector representations significantly speed up supervised learning.", "We also compare TBCNN to baseline methods; our model achieves better accuracy in the task of program classification.", "To our best knowledge, this paper is the first to analyze programs with deep neural networks; we extend the scope of deep learning to the field of programming language processing.", "The experimental results validate its feasibility; they also show a promising future of this new research area." ]
[ 0, 0, 2, 1, 4, 4, 0, 4 ]
[ 1, 0.7778000235557556, 0.5, 0.5555999875068665, 0.7778000235557556, 0.41670000553131104, 0.5555999875068665, 0.7778000235557556 ]
train_0293
[ "Recently, MOEA/D (multi-objective evolutionary algorithm based on decomposition) has achieved great success in the field of evolutionary multi-objective optimization and has attracted a lot of attention.", "It decomposes a multi-objective optimization problem (MOP) into a set of scalar subproblems using uniformly distributed aggregation weight vectors and provides an excellent general algorithmic framework of evolutionary multi-objective optimization.", "Generally, the uniformity of weight vectors in MOEA/D can ensure the diversity of the Pareto optimal solutions, however, it cannot work as well when the target MOP has a complex Pareto front (PF; i.e., discontinuous PF or PF with sharp peak or low tail).", "To remedy this, we propose an improved MOEA/D with adaptive weight vector adjustment (MOEA/D-AWA).", "According to the analysis of the geometric relationship between the weight vectors and the optimal solutions under the Chebyshev decomposition scheme, a new weight vector initialization method and an adaptive weight vector adjustment strategy are introduced in MOEA/D-AWA.", "The weights are adjusted periodically so that the weights of subproblems can be redistributed adaptively to obtain better uniformity of solutions.", "Meanwhile, computing efforts devoted to subproblems with duplicate optimal solution can be saved.", "Moreover, an external elite population is introduced to help adding new subproblems into real sparse regions rather than pseudo sparse regions of the complex PF, that is, discontinuous regions of the PF.", "MOEA/D-AWA has been compared with four state of the art MOEAs, namely the original MOEA/D, Adaptive-MOEA/D, -MOEA/D, and NSGA-II on 10 widely used test problems, two newly constructed complex problems, and two many-objective problems.", "Experimental results indicate that MOEA/D-AWA outperforms the benchmark algorithms in terms of the IGD metric, particularly when the PF of the MOP is complex." ]
[ 0, 0, 0, 1, 1, 1, 1, 1, 4, 4 ]
[ 0.833299994468689, 0.6388999819755554, 0.6388999819755554, 0.7778000235557556, 1, 1, 1, 1, 0.41670000553131104, 1 ]
train_0294
[ "Since the textual contents on online social media are highly unstructured, informal, and often misspelled, existing research on message-level offensive language detection cannot accurately detect offensive content.", "Meanwhile, user-level offensiveness detection seems a more feasible approach but it is an under researched area.", "To bridge this gap, we propose the Lexical Syntactic Feature (LSF) architecture to detect offensive content and identify potential offensive users in social media.", "We distinguish the contribution of pejoratives/profanities and obscenities in determining offensive content, and introduce hand-authoring syntactic rules in identifying name-calling harassments.", "In particular, we incorporate a user's writing style, structure and specific cyber bullying content as features to predict the user's potentiality to send out offensive content.", "Results from experiments showed that our LSF framework performed significantly better than existing methods in offensive content detection.", "It achieves precision of 98.24% and recall of 94.34% in sentence offensive detection, as well as precision of 77.9% and recall of 77.8% in user offensive detection.", "Meanwhile, the processing speed of LSF is approximately 10msec per sentence, suggesting the potential for effective deployment in social media." ]
[ 0, 0, 2, 1, 1, 4, 4, 4 ]
[ 1, 0.5896999835968018, 0.6154000163078308, 0.7949000000953674, 0.7949000000953674, 0.5896999835968018, 0.7949000000953674, 0.7949000000953674 ]
train_0295
[ "Massive multiple-input multiple-output technology has been considered a breakthrough in wireless communication systems.", "It consists of equipping a base station with a large number of antennas to serve many active users in the same time-frequency block.", "Among its underlying advantages is the possibility to focus transmitted signal energy into very short-range areas, which will provide huge improvements in terms of system capacity.", "However, while this new concept renders many interesting benefits, it brings up new challenges that have called the attention of both industry and academia: channel state information acquisition, channel feedback, instantaneous reciprocity, statistical reciprocity, architectures, and hardware impairments, just to mention a few.", "This paper presents an overview of the basic concepts of massive multiple-input multiple-output, with a focus on the challenges and opportunities, based on contemporary research." ]
[ 0, 0, 0, 4, 2 ]
[ 0.7894999980926514, 0.5788999795913696, 0.7894999980926514, 0.421099990606308, 0.39469999074935913 ]
train_0296
[ "An automated irrigation system was developed to optimize water use for agricultural crops.", "The system has a distributed wireless network of soil-moisture and temperature sensors placed in the root zone of the plants.", "In addition, a gateway unit handles sensor information, triggers actuators, and transmits data to a web application.", "An algorithm was developed with threshold values of temperature and soil moisture that was programmed into a microcontroller-based gateway to control water quantity.", "The system was powered by photovoltaic panels and had a duplex communication link based on a cellular-Internet interface that allowed for data inspection and irrigation scheduling to be programmed through a web page.", "The automated system was tested in a sage crop field for 136 days and water savings of up to 90% compared with traditional irrigation practices of the agricultural zone were achieved.", "Three replicas of the automated system have been used successfully in other places for 18 months.", "Because of its energy autonomy and low cost, the system has the potential to be useful in water limited geographically isolated areas." ]
[ 1, 1, 1, 1, 1, 4, 4, 4 ]
[ 0.833299994468689, 0.5666999816894531, 0.833299994468689, 0.800000011920929, 0.4666999876499176, 0.6333000063896179, 0.800000011920929, 0.6333000063896179 ]
train_0297
[ "In this work we demonstrate the usefulness of the application of Recommender Systems in the financial domain.", "Specifically we investigate a dataset, made available by a major European bank, containing the purchases of a large set of investment assets by 200k investors.", "We also present some preliminary results of the application of network analysis via statistical validation to identify clusters of investment assets." ]
[ 4, 2, 4 ]
[ 0.21240000426769257, 0.42480000853538513, 0.21240000426769257 ]
train_0298
[ "Reading strategies have been shown to improve comprehension levels, especially for readers lacking adequate prior knowledge.", "Just as the process of knowledge accumulation is time-consuming for human readers, it is resource-demanding to impart rich general domain knowledge into a language model via pre-training (Radford et al., 2018; Devlin et al., 2018).", "Inspired by reading strategies identified in cognitive science, and given limited computational resources — just a pre-trained model and a fixed number of training instances — we therefore propose three simple domain-independent strategies aimed to improve non-extractive machine reading comprehension (MRC): (i) BACK AND FORTH READING that considers both the original and reverse order of an input sequence, (ii) HIGHLIGHTING, which adds a trainable embedding to the text embedding of tokens that are relevant to the question and candidate answers, and (iii) SELF-ASSESSMENT that generates practice questions and candidate answers directly from the text in an unsupervised manner.", "By fine-tuning a pre-trained language model (Radford et al., 2018) with our proposed strategies on the largest existing general domain multiple-choice MRC dataset RACE, we obtain a 5.8% absolute increase in accuracy over the previous best result achieved by the same pre-trained model fine-tuned on RACE without the use of strategies.", "We further fine-tune the resulting model on a target task, leading to new stateof-the-art results on six representative nonextractive MRC datasets from different domains (i.e., ARC, OpenBookQA, MCTest, MultiRC, SemEval-2018, and ROCStories).", "These results indicate the effectiveness of the proposed strategies and the versatility ∗", "This work was done when the author was an intern at Tencent AI Lab and general applicability of our fine-tuned models that incorporate the strategies." ]
[ 0, 0, 0, 1, 1, 4, 3 ]
[ 1, 1, 0.542900025844574, 0.685699999332428, 0.4571000039577484, 0.8285999894142151, 0.4571000039577484 ]
train_0299
[ "Most additive manufacturing processes today operate by printing voxels (3D pixels) serially point-by-point to build up a 3D part.", "In some more recently-developed techniques, for example optical printing methods such as projection stereolithography [Zheng et al. 2012], [Tumbleston et al. 2015], parts are printed layer-by-layer by curing full 2d (very thin in one dimension)", "layers of the 3d part in each print step.", "There does not yet exist a technique which is able to print arbitrarily-defined 3D geometries in a single print step.", "If such a technique existed, it could be used to expand the range of printable geometries in additive manufacturing and relax constraints on factors such as overhangs in topology optimization.", "It could also vastly increase print speed for 3D parts.", "In this work, we develop the principles for an approach for single exposure 3D printing of arbitrarily defined geometries.", "The approach, termed Computed Axial Lithgography (CAL), is based on tomographic reconstruction, with mathematical optimization to generate a set of projections to optically define an arbitrary dose distribution within a target volume.", "We demonstrate the potential ability of the technique to print 3D parts using a prototype CAL system based on sequential illumination from many angles.", "We also propose new hardware designs which will help us to realize true single-shot arbitrary-geometry 3D CAL." ]
[ 0, 0, 0, 0, 0, 0, 2, 1, 1, 4 ]
[ 0.8158000111579895, 0.8158000111579895, 1, 1, 0.7894999980926514, 0.7894999980926514, 0.5788999795913696, 0.8158000111579895, 0.39469999074935913, 0.6053000092506409 ]