title stringlengths 8 300 | abstract stringlengths 0 10k |
|---|---|
An advanced channel framework for improved Underwater Acoustic Network simulations | Underwater Acoustic Networks (UANs) are an emerging technology that are being used to facilitate new aquatic applications in our water world. This is accomplished by linking underwater sensors, vehicles and devices together using acoustic communication. Network protocol development for UANs often relies on simulations ... |
Virtual machines vs. containers in cloud gaming systems | In cloud gaming the game is rendered on a distant cloud server and the resulting video stream is sent back to the user who controls the game via a thin client. The high resource usage of cloud gaming servers is a challenge. Expensive hardware including GPUs have to be efficiently shared among multiple simultaneous user... |
Economics of environmental quality | The authors use the term environmental quality to refer to the conditions associated with those resources that have not been assigned to the market for allocation. Though the focus is on air and water quality, it could just as well include conditions of crowding, visual stimuli, and odors within the same framework. Thi... |
Depth Recovery Using an Adaptive Color-Guided Auto-Regressive Model | This paper proposes an adaptive color-guided auto-regressive (AR) model for high quality depth recovery from low quality measurements captured by depth cameras. We formulate the depth recovery task into a minimization of AR prediction errors subject to measurement consistency. The AR predictor for each pixel is constru... |
Safe for Generations to Come: Considerations of Safety for Millimeter Waves in Wireless Communications | With the increasing demand for higher data rates and more reliable service capabilities for wireless devices, wireless service providers are facing an unprecedented challenge to overcome a global bandwidth shortage. Early global activities on beyond fourth-generation (B4G) and fifth-generation (5G) wireless communicati... |
Why do people use information technology? A critical review of the technology acceptance model | Information systems (IS) implementation is costly and has a relatively low success rate. Since the seventies, IS research has contributed to a better understanding of this process and its outcomes. The early efforts concentrated on the identification of factors that facilitated IS use. This produced a long list of item... |
The Delphi Method for Graduate Research | Executive Summary The Delphi method is an attractive method for graduate students completing masters and PhD level research. It is a flexible research technique that has been successfully used in our program at the University of Calgary to explore new concepts within and outside of the information systems body of knowl... |
Web Crawlers : Taxonomy , Issues & Challenges | with increase in the size of Web, the search engine relies on Web Crawlers to build and maintain the index of billions of pages for efficient searching. The creation and maintenance of Web indices is done by Web crawlers, the crawlers recursively traverses and downloads Web pages on behalf of search engines. The expone... |
GTS: A Fast and Scalable Graph Processing Method based on Streaming Topology to GPUs | A fast and scalable graph processing method becomes increasingly important as graphs become popular in a wide range of applications and their sizes are growing rapidly. Most of distributed graph processing methods require a lot of machines equipped with a total of thousands of CPU cores and a few terabyte main memory f... |
Effects of gait speed on the body's center of mass motion relative to the center of pressure during over-ground walking. | Preferred walking speed (PWS) reflects the integrated performance of the relevant physiological sub-systems, including energy expenditure. It remains unclear whether the PWS during over-ground walking is chosen to optimize one's balance control because studies on the effects of speed on the body's balance control have ... |
Clinical, MRI and arthroscopic correlation in internal derangement of knee. | BACKGROUND
The traumatic or degenerative internal derangement of the knee requires certain investigations for the establishment of diagnosis, in addition to clinical history and a thorough physical examination. The use of arthrography and arthroscopy improves the accuracy of the diagnosis. MRI scanning of the knee join... |
The management of adolescents with neurogenic urinary tract and bowel dysfunction. | Most children with neurogenic bladder dysfunction arrive into adolescence with reasonably managed lower urinary tract function only to experience bladder and kidney function deterioration after puberty. The aim of this article is to identify issues that contribute to adverse changes in bladder and renal function during... |
Composable Planning with Attributes | The tasks that an agent will need to solve often are not known during training. However, if the agent knows which properties of the environment are important then, after learning how its actions affect those properties, it may be able to use this knowledge to solve complex tasks without training specifically for them. ... |
Estimation of the Cramer-Rao Bound for Radio Direction-Finding on the Azimuth and Elevation of the Cylindical Antenna Arrays | In this paper the problem of direction-of-arrival (DOA) estimation for conformal antenna arrays consisting of directive emitters for the azimuth and elevation cases is studied. The expression for the Cramer-Rao lower bound of the DOA estimates variance depending on the antenna directivity and the geometry is presented.... |
Iterative Machine Learning for Output Tracking | This paper develops a frequency-domain iterative machine learning (IML) approach for output tracking. Frequency-domain iterative learning control allows bounded noncausal inversion of system dynamics and is, therefore, applicable to nonminimum phase systems. The model used in the frequency-domain control update can be ... |
A fully pipelined hardware architecture for convolutional neural network with low memory usage and DRAM bandwidth | As a typical deep learning model, Convolutional Neural Network (CNN) has shown excellent ability in solving complex classification problems. To apply CNN models in mobile ends and wearable devices, a fully pipelined hardware architecture adopting a Row Processing Tree (RPT) structure with small memory resource consumpt... |
Cutting your nerve changes your brain. | Following upper limb peripheral nerve transection and surgical repair, some patients regain good sensorimotor function while others do not. Understanding peripheral and central mechanisms that contribute to recovery may facilitate the development of new therapeutic interventions. Plasticity following peripheral nerve t... |
A premenarcheal girl with urogenital bleeding. | An 8-year-old Caucasian girl was referred with perineal bleeding of sudden onset during micturition. There was no history of trauma, fever or dysuria, but she had a history of constipation. Family history was unremarkable. Physical examination showed a prepubertal girl with a red ‘doughnut’-shaped lesion surrounding th... |
Cerebrovascular and blood-brain barrier impairments in Huntington's disease: Potential implications for its pathophysiology. | OBJECTIVE
Although the underlying cause of Huntington's disease (HD) is well established, the actual pathophysiological processes involved remain to be fully elucidated. In other proteinopathies such as Alzheimer's and Parkinson's diseases, there is evidence for impairments of the cerebral vasculature as well as the bl... |
A Highly Accurate Feature Fusion Network For Vehicle Detection In Surveillance Scenarios | In this paper we present a novel vehicle detection method in traffic surveillance scenarios. This work is distinguished by three key contributions. First, a feature fusion backbone network is proposed to extract vehicle features which has the capability of modeling geometric transformations. Second, a vehicle proposal ... |
Orthotopic liver transplantation with preservation of the inferior vena cava. | Piggyback orthotopic liver transplantation was performed in 24 patients during a period of 4 months. This represented 19% of the liver transplantation at our institution during that time. The piggyback method of liver insertion compared favorably with the standard operation in terms of patient survival, blood loss, inc... |
Fascia lliaca block for analgesia after hip arthroplasty: a randomized double-blind, placebo-controlled trial. | BACKGROUND AND OBJECTIVES
Fascia iliaca block (FIB) is often used to treat pain after total hip arthroplasty (THA), despite a lack of randomized trials to evaluate its efficacy for this indication. The objective of this study was to assess the analgesic benefit of FIB after THA. Our primary hypothesis was administratio... |
Modeling crowdsourcing systems: design and analysis of incentive mechanism and rating system | Over the past few years, we have seen an increasing popularity of crowdsourcing services [5]. Many companies are now providing such services, e.g., Amazon Mechanical Turk [1], Google Helpouts [3], and Yahoo! Answers [8], etc. Briefly speaking, crowdsourcing is an online, distributed problem solving paradigm and busines... |
Electronic switching in phase-change memories | A detailed investigation of electronic switching in chalcogenide-based phase-change memory devices is presented. An original bandgap model consistent with the microscopic structure of both crystalline and amorphous chalcogenide is described, and a physical picture of the switching mechanism is proposed. Numerical simul... |
A Compact Dual-Polarized Printed Dipole Antenna With High Isolation for Wideband Base Station Applications | A compact dual-polarized printed dipole antenna for wideband base station applications is presented in this communication. The proposed dipole antenna is etched on three assembled substrates. Four horizontal triangular patches are introduced to form two dipoles in two orthogonal polarizations. Two integrated baluns con... |
Sparse Convolved Gaussian Processes for Multi-output Regression | We present a sparse approximation approach for dependent output Gaussian processes (GP). Employing a latent function framework, we apply the convolution process formalism to establish dependencies between output variables, where each latent function is represented as a GP. Based on these latent functions, we establish ... |
Improving Verb Metaphor Detection by Propagating Abstractness to Words, Phrases and Individual Senses | Abstract words refer to things that can not be seen, heard, felt, smelled, or tasted as opposed to concrete words. Among other applications, the degree of abstractness has been shown to be a useful information for metaphor detection. Our contribution to this topic are as follows: i) we compare supervised techniques to ... |
THE CHANGING SIZE DISTRIBUTION OF U.S. TRADE UNIONS AND ITS DESCRIPTION BY PARETO'S DISTRIBUTION | The size distribution of trade unions in the United States and changes in this distribution are documented. Because the most profound changes are taking place among very large unions, these are subject to special analysis by invoking Pareto’s distribution. This represents a new application of this distribution. Extensi... |
Gastrojejunostomy without partial gastrectomy to manage duodenal stenosis in a dog | A nine-year-old female Rottweiler with a history of repeated gastrointestinal ulcerations and three previous surgical interventions related to gastrointestinal ulceration presented with symptoms of anorexia and intermittent vomiting. Benign gastric outflow obstruction was diagnosed in the proximal duodenal area. The in... |
Public Sector Sponsored Continuous Vocational Training in East Germany: Institutional Arrangements, Participants, and Results of Empirical Evaluations | After unification of the East and West German economies in July 1990 the public sector devoted substantial resources to train the labour force of the former centrally planned East German economy. In this paper we describe the basic trends of the rules and regulations governing these efforts. We supplement this descript... |
Implementation of Back Propagation Algorithm ( of neural networks ) in VHDL | authentic record of my own work carried under the supervision of Mr. SANJAY SHARMA and Mrs. MANU BANSAL at TIET, PATIALA. The matter presented in this thesis has not been submitted in any other University or Institute for the award of Master of Engineering. Signature of the student This is certified that the above stat... |
Domain-dependent knowledge in answer set planning | In this article we consider three different kinds of domain-dependent control knowledge (temporal, procedural and HTN-based) that are useful in planning. Our approach is declarative and relies on the language of logic programming with answer set semantics (AnsProlog*). AnsProlog* is designed to plan without control kno... |
CR-GAN: Learning Complete Representations for Multi-view Generation | Generating multi-view images from a single-view input is an essential yet challenging problem. It has broad applications in vision, graphics, and robotics. Our study indicates that the widely-used generative adversarial network (GAN) may learn “incomplete” representations due to the single-pathway framework: an encoder... |
Small Moving Vehicle Detection in a Satellite Video of an Urban Area | Vehicle surveillance of a wide area allows us to learn much about the daily activities and traffic information. With the rapid development of remote sensing, satellite video has become an important data source for vehicle detection, which provides a broader field of surveillance. The achieved work generally focuses on ... |
IEC 61850 substation configuration language as a basis for automated security and SDN configuration | IEC61850 has revolutionized the way substations are configured and maintained. Substation Configuration Language (SCL) defines the parameters needed to configure individual devices and combine them into a working system. Security is implemented by IEC62351 and there are potential vulnerabilities. Best practice recommen... |
Self-Reported and Serum Cotinine-Validated Smoking in Pregnant Women in Estonia | Objectives: Although widely used in epidemiological studies, self-report has been shown to underestimate the prevalence of smoking among pregnant women. Objectives of this study were to examine the discrepancy between self-reported and cotinine-validated smoking status, and the sociodemographic characteristics associat... |
Toxicity of three phenolic compounds and their mixtures on the gram-positive bacteria Bacillus subtilis in the aquatic environment. | Although phenolic compounds are intensively studied for their toxic effects on the environment, the toxicity of catechol, resorcinol and hydroquinone mixtures are still not well understood because most previous bioassays are conducted solely using single compound based on acute tests. In this work, the adverse effect o... |
Automatic Extraction and Classification of Footwear Patterns | Identification of the footwear traces from crime scenes is an important yet largely forgotten aspect of forensic intelligence and evidence. We present initial results from a developing automatic footwear classification system. The underlying methodology is based on large numbers of localized features located using MSER... |
Resource management for OFDMA based next generation 802.11 WLANs | Recently, IEEE 802.11ax Task Group has adapted OFDMA as a new technique for enabling multi-user transmission. It has been also decided that the scheduling duration should be same for all the users in a multi-user OFDMA so that the transmission of the users should end at the same time. In order to realize that condition... |
A Performance Comparison of RAID-5 and Log-Structured Arrays | Increasmg performance of CPUs and memorres wrll be squandered lf not matched by a sunrlm peformance ourease m II0 Whde the capactty of Smgle Large Expenstve D&T (SLED) has grown rapuily, the performance rmprovement of SLED has been modest Redundant Arrays of Inexpensive Disks (RAID), based on the magnetic duk technolog... |
IEC 61850 Communication Networks and Systems In Substations : An Overview for Users | Over the last decade, the “digitization” of the electron enterprise has grown at exponential rates. Utility, industrial, commercial, and even residential consumers are transforming all aspects of their lives into the digital domain. Moving forward, it is expected that every piece of equipment, every receptacle, every s... |
Probabilistic Relations between Words : Evidence from Reduction in Lexical Production | The ideas of frequency and predictability have played a fundamental role in models of human language processing for well over a hundred years (Schuchardt, 1885; Jespersen, 1922; Zipf, 1929; Martinet, 1960; Oldfield & Wingfield, 1965; Fidelholz, 1975; Jescheniak & Levelt, 1994; Bybee, 1996). While most psycholinguistic ... |
Transforming Singapore health care: public-private partnership. | Prudent health care policies that encourage public-private participation in health care financing and provisioning have conferred on Singapore the advantage of flexible response as it faces the potentially conflicting challenges of becoming a regional medical hub attracting foreign patients and ensuring domestic access... |
Construction and Practice of Surveying and Mapping Engineering Specialty Practice Teaching System | The four dimensions are rule system dimension, organization dimension, practice base dimension and innovation dimension of Surveying and Mapping Engineering. "Four Dimensional Integration" practice teaching system is summarized in this article. The methods of construct practical teaching quality guarantee system is des... |
A Comparison of Equality in Computer Algebra and Correctness in Mathematical Pedagogy | How do we recognize when an answer is "right"? This is a question that has bedevilled the use of computer systems in mathematics (as opposed to arithmetic) ever since their introduction. A computer system can certainly say that some answers are definitely wrong, in the sense that they are provably not an answer to the ... |
A randomized trial evaluating tobacco possession-use-purchase laws in the USA. | Tobacco Purchase-Use-Possession laws (PUP) are being implemented throughout the US, but it is still unclear whether they are effective in reducing smoking prevalence among the youth targeted by these public health policies. In the present study, 24 towns in Northern Illinois were randomly assigned to one of two conditi... |
Major Depression Detection from EEG Signals Using Kernel Eigen-Filter-Bank Common Spatial Patterns | Major depressive disorder (MDD) has become a leading contributor to the global burden of disease; however, there are currently no reliable biological markers or physiological measurements for efficiently and effectively dissecting the heterogeneity of MDD. Here we propose a novel method based on scalp electroencephalog... |
Recognizing Visual Signatures of Spontaneous Head Gestures | Head movements are an integral part of human nonverbal communication. As such, the ability to detect various types of head gestures from video is important for robotic systems that need to interact with people or for assistive technologies that may need to detect conversational gestures to aid communication. To this en... |
Rhythm and Beat Perception in Motor Areas of the Brain | When we listen to rhythm, we often move spontaneously to the beat. This movement may result from processing of the beat by motor areas. Previous studies have shown that several motor areas respond when attending to rhythms. Here we investigate whether specific motor regions respond to beat in rhythm. We predicted that ... |
Effect of adjunct fluticasone propionate on airway physiology during rest and exercise in COPD. | RATIONALE
Combination therapy with corticosteroid and long-acting β(2)-agonists (LABA) in a single inhaler is associated with superior effects on airway function and exercise performance in COPD compared with LABA monotherapy. The physiological effects of adding inhaled corticosteroid monotherapy to maintenance broncho... |
Study and Handling Methods of Power IGBT Module Failures in Power Electronic Converter Systems | Power electronics plays an important role in a wide range of applications in order to achieve high efficiency and performance. Increasing efforts are being made to improve the reliability of power electronics systems to ensure compliance with more stringent constraints on cost, safety, and availability in different app... |
Programmable rendering of line drawing from 3D scenes | This article introduces a programmable approach to nonphotorealistic line drawings from 3D models, inspired by programmable shaders in traditional rendering. This approach relies on the assumption generally made in NPR that style attributes (color, thickness, etc.) are chosen depending on generic properties of the scen... |
Multimodal Network Embedding via Attention based Multi-view Variational Autoencoder | Learning the embedding for social media data has attracted extensive research interests as well as boomed a lot of applications, such as classification and link prediction. In this paper, we examine the scenario of a multimodal network with nodes containing multimodal contents and connected by heterogeneous relationshi... |
Are ceramic implants a viable alternative to titanium implants? A systematic literature review. | AIM
The aim of this systematic review was to screen the literature in order to locate animal and clinical data on bone-implant contact (BIC) and clinical survival/success that would help to answer the question 'Are ceramic implants a viable alternative to titanium implants?'
MATERIAL AND METHODS
A literature search w... |
Empirically Analyzing the Effect of Dataset Biases on Deep Face Recognition Systems | It is unknown what kind of biases modern in the wild face datasets have because of their lack of annotation. A direct consequence of this is that total recognition rates alone only provide limited insight about the generalization ability of a Deep Convolutional Neural Networks (DCNNs). We propose to empirically study t... |
Reliability of measurements of muscle tone and muscle power in stroke patients. | OBJECTIVES
to establish the reliability of the modified Ashworth scale for measuring muscle tone in a range of muscle groups (elbow, wrist, knee and ankle; flexors and extensors) and of the Medical Research Council scale for measuring muscle power in the same muscle groups and their direct antagonists.
DESIGN
a cross... |
Efficacy of cranial electric stimulation for the treatment of insomnia: a randomized pilot study. | OBJECTIVES
This pilot study examined the potential efficacy of cranial electric stimulation for the treatment of insomnia.
DESIGN
The researchers tested the hypothesis through a randomized, double-blind, and placebo controlled clinical trial. The researchers approached eligible subjects who scored 21 or above on the ... |
Automatic verification of EMC immunity by simulation | Immunity of analog circuit blocks is becoming a major design risk. This paper presents an automated methodology to simulate the susceptibility of a circuit during the design phase. More specifically, we propose a CAD tool which determines the fail/pass criteria of a signal under direct power injection (DPI). This contr... |
Combining equilibrium , resampling , and analysts ’ views in portfolio optimization | Portfolio optimization methodologies play a central role in strategic asset allocation (SAA), where it is desirable to have portfolios that are efficient, diversified, and stable. Since the development of the traditional mean-variance approach of Markowitz (1952), many improvements have been made to overcome problems s... |
Ang Social Network sa Facebook ng mga Taga-Batangas at ng mga Taga-Laguna: Isang Paghahambing | [English Abstract] Online social networking (OSN) has become of great influence to Filipinos, where Facebook, Twitter, LinkedIn, Google+, and Instagram are among the popular ones. Their popularity, coupled with their intuitive and interactive use, allow one’s personal information such as gender, age, address, relations... |
Unsupervised Sparse Vector Densification for Short Text Similarity | Sparse representations of text such as bag-ofwords models or extended explicit semantic analysis (ESA) representations are commonly used in many NLP applications. However, for short texts, the similarity between two such sparse vectors is not accurate due to the small term overlap. While there have been multiple propos... |
Effects of a recruitment maneuver on plasma levels of soluble RAGE in patients with diffuse acute respiratory distress syndrome: a prospective randomized crossover study | The soluble form of the receptor for advanced glycation end-products (sRAGE) is a promising marker for epithelial dysfunction, but it has not been fully characterized as a biomarker of acute respiratory distress syndrome (ARDS). Whether sRAGE could inform on the response to ventilator settings has been poorly investiga... |
Active Disk Architecture for Databases | Today’s commodity disk drives, the basic unit of storage for computer systems large and small, are actually small computers, with a processor, memory and a network connection, in addition to the spinning magnetic material that stores the data. Large collections of data are becoming larger, and people are beginning to a... |
Neural Networks for Joint Sentence Classification in Medical Paper Abstracts | Existing models based on artificial neural networks (ANNs) for sentence classification often do not incorporate the context in which sentences appear, and classify sentences individually. However, traditional sentence classification approaches have been shown to greatly benefit from jointly classifying subsequent sente... |
An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems | Signature-based intrusion detection systems use a set of attack descriptions to analyze event streams, looking for evidence of malicious behavior. If the signatures are expressed in a well-defined language, it is possible to analyze the attack signatures and automatically generate events or series of events that confor... |
WearIA: Wearable device implicit authentication based on activity information | Privacy and authenticity of data pushed by or into wearable devices are of important concerns. Wearable devices equipped with various sensors can capture user's activity in fine-grained level. In this work, we investigate the possibility of using user's activity information to develop an implicit authentication approac... |
An Efficient FDTD Algorithm Based on the Equivalence Principle for Analyzing Onbody Antenna Performance | In this paper, on body antenna performance and its effect on the radio channel is analyzed. An efficient numerical technique based on the finite-difference time-domain technique and the equivalence principle is developed. The proposed technique begins with the problem decomposition by separately computing the wearable ... |
Detecting algorithmically generated malicious domain names | Recent Botnets such as Conficker, Kraken and Torpig have used DNS based "domain fluxing" for command-and-control, where each Bot queries for existence of a series of domain names and the owner has to register only one such domain name. In this paper, we develop a methodology to detect such "domain fluxes" in DNS traffi... |
Public education in a multicultural society: TEACHING LITERATURE | Part I. Introduction and Critique: 1. Multicultural education: concepts, policies and controversies ROBERT K. FULLINWIDER 2. Antiracist civic education in the California history-social science framework LAWRENCE A. BLUM 3. A conflict of visions: multiculturalism and the social studies GILBERT T. SEWALL Part II. Culture... |
Vehicle Tracking, Monitoring and Alerting System: A Review | The goal of this paper is to review the past work of vehicle tracking, monitoring and alerting system, to categorize various methodologies and identify new trends. Vehicle tracking, monitoring and alerting system is challenging problem. There are various challenges encounter in vehicle tracking, monitoring and alerting... |
Production and evaluation of ZnS thin films by the MOCVD technique as alpha-particle detectors | Abstract Zinc sulphide thin films are deposited on several substrates such as glass, quartz, silicon, Teflon and Mylar. The chemical reaction of hydrogen sulphide with dimethylzinc is utilised for the deposition process. The optimum working conditions (deposition rate versus flow rate, temperature and pressure) are obt... |
A Survey on Data-Flow Testing | Data-flow testing (DFT) is a family of testing strategies designed to verify the interactions between each program variable’s definition and its uses. Such a test objective of interest is referred to as a def-use pair. DFT selects test data with respect to various test adequacy criteria (i.e., data-flow coverage criter... |
Naked eye star visibility and limiting magnitude mapped from DMSP-OLS satellite data | We extend the method introduced by Cinzano et al. (2000a) to map the artificial sky brightness in large territories from DMSP satellite data, in order to map the naked eye star visibility and telescopic limiting magnitudes. For these purposes we take into account the altitude of each land area from GTOPO30 world elevat... |
CSLIM: contextual SLIM recommendation algorithms | Context-aware recommender systems (CARS) take contextual conditions into account when providing item recommendations. In recent years, context-aware matrix factorization (CAMF) has emerged as an extension of the matrix factorization technique that also incorporates contextual conditions. In this paper, we introduce ano... |
Countering Adversarial Images using Input Transformations | This paper investigates strategies that defend against adversarial-example attacks on image-classification systems by transforming the inputs before feeding them to the system. Specifically, we study applying image transformations such as bit-depth reduction, JPEG compression, total variance minimization, and image qui... |
Effectiveness, relapse prevention and mechanisms of change of cognitive therapy vs. interpersonal therapy for depression: Study protocol for a randomised controlled trial | BACKGROUND
Major depression is a common mental disorder that substantially impairs quality of life and has high societal costs. Although psychotherapies have proven to be effective antidepressant treatments, initial response rates are insufficient and the risk of relapse and recurrence is high. Improvement of treatment... |
Discovering affective regions in deep convolutional neural networks for visual sentiment prediction | In this paper, we address the problem of automatically recognizing emotions in still images. While most of current work focus on improving whole-image representations using CNNs, we argue that discovering affective regions and supplementing local features will boost the performance, which is inspired by the observation... |
Stochastic Block-Coordinate Frank-Wolfe Optimization for Structural SVMs | We propose a randomized block-coordinate variant of the classic Frank-Wolfe algorithm for convex optimization with block-separable constraints. Despite its lower iteration cost, we show that it achieves a similar convergence rate in duality gap as the full FrankWolfe algorithm. We also show that, when applied to the du... |
Viewing the Kenyan health system through an equity lens: implications for universal coverage | INTRODUCTION
Equity and universal coverage currently dominate policy debates worldwide. Health financing approaches are central to universal coverage. The way funds are collected, pooled, and used to purchase or provide services should be carefully considered to ensure that population needs are addressed under a univer... |
Continuous arc rotation of the couch therapy for the delivery of accelerated partial breast irradiation: a treatment planning analysis. | PURPOSE
We present a novel form of arc therapy: continuous arc rotation of the couch (C-ARC) and compare its dosimetry with three-dimensional conformal radiotherapy (3D-CRT), intensity-modulated radiotherapy (IMRT), and volumetric-modulated arc therapy (VMAT) for accelerated partial breast irradiation (APBI). C-ARC, li... |
Towards Optimal One Pass Large Scale Learning with Averaged Stochastic Gradient Descent | For large scale learning problems, it is desirable if we can obtain the optimal model parameters by going through the data in only one pass. Polyak and Juditsky (1992) showed that asymptotically the test performance of the simple average of the parameters obtained by stochastic gradient descent (SGD) is as good as that... |
Hybrid transformer-based tunable integrated duplexer with antenna impedance tracking loop | Electrical balance between the antenna and the balance network impedances is crucial for achieving high isolation in a hybrid transformer duplexer. In this paper an auto calibration loop for tuning a novel integrated balance network to track the antenna impedance variations is introduced. It achieves an isolation of mo... |
Mining Frequent Patterns by Pattern-Growth: Methodology and Implications | Mining frequent patterns has been a focused topic in data mining research in recent years, with the developmeht of numerous interesting algorithms for mining association, correlation, causality, sequential patterns, partial periodicity, constraint-based frequent pattern mining, associative classification, emerging patt... |
Deep Discrete Hashing with Self-supervised Pairwise Labels | Hashing methods have been widely used for applications of large-scale image retrieval and classification. Non-deep hashing methods using handcrafted features have been significantly outperformed by deep hashing methods due to their better feature representation and end-to-end learning framework. However, the most strik... |
Pedagogies Against the State | In our everyday conversations and relations with others we treat individuals and ourselves as stable entities. We relate to each other as though we are responding to a particular person with a specific identity, if we know them or even if we do not. We tend to assume a clear distinction between people and the world in ... |
Impaired coronary blood flow in nonculprit arteries in the setting of acute myocardial infarction. The TIMI Study Group. Thrombolysis in myocardial infarction. | OBJECTIVES AND BACKGROUND
While attention has focused on coronary blood flow in the culprit artery in acute myocardia infarction (MI), flow in the nonculprit artery has not been studied widely, in part because it has been assumed to be normal. We hypothesized that slower flow in culprit arteries, larger territories inf... |
Transcatheter aortic valve implantation in patients on corticosteroid therapy | Transcatheter aortic valve implantation (TAVI) is recommended for patients who are inoperable or at high risk for surgical aortic valve replacement (SAVR). Corticosteroid therapy is considered to be a risk factor for SAVR, but there is a paucity of information about TAVI in patients taking corticosteroids. The aim of t... |
Enhancing the cultural competence of women's health nurses via online continuing education | ...................................................................................................................... iii ACKNOWLEDGEMENTS .................................................................................................v CHAPTER |
Cumulative trauma: the impact of child sexual abuse, adult sexual assault, and spouse abuse. | The present study investigated the relationship between trauma symptoms and a history of child sexual abuse, adult sexual assault, and physical abuse by a partner as an adult. While there has been some research examining the correlation between individual victimization experiences and traumatic stress, the cumulative i... |
Georg Simmel and naturalist interactivist epistemology of science | Abstract In 1895 sociologist and philosopher Georg Simmel published a paper: ‘On a connection of selection theory to epistemology’. It was focussed on the question of how behavioural success and the evolution of the cognitive capacities that underlie it are to be related to knowing and truth. Subsequently, Simmel’s ide... |
Giving Infants an Identity: Fingerprint Sensing and Recognition | There is a growing demand for biometrics-based recognition of children for a number of applications, particularly in developing countries where children do not have any form of identification. These applications include tracking child vaccination schedules, identifying missing children, preventing fraud in food subsidi... |
This looks like that: deep learning for interpretable image recognition | When we are faced with challenging image classification tasks, we often explain our reasoning by dissecting the image, and pointing out prototypical aspects of one class or another. The mounting evidence for each of the classes helps us make our final decision. In this work, we introduce a deep network architecture tha... |
The Robust Beauty of Improper Linear Models in Decision Making | Proper linear models are those in which predictor variables are given weights in such a way that the resulting linear composite optimally predicts some criterion of interest; examples of proper linear models are standard regression analysis, discriminant function analysis, and ridge regression analysis. Research summar... |
Numerical construction of spherical $t$-designs by Barzilai-Borwein method | A point set XN on the unit sphere is a spherical t-design is equivalent to the nonnegative quantity AN,t+1 vanished. We show that if XN is a stationary point set of AN,t+1 and the minimal singular value of basis matrix is positive, then XN is a spherical t-design. Moreover, the numerical construction of spherical t-des... |
Continuous analogs of axiomatized digital surfaces | Z3. But simple surface points are defined by means of axioms, and the axioms do not reveal what simple surface points “look like.” In this paper eight of the nine varieties of simple surface points are shown to have natural “continuous analogs,” and the one remaining variety is shown to be very different from the other... |
Protein turnover and amino acid transport kinetics in end-stage renal disease. | Protein and amino acid metabolism is abnormal in end-stage renal disease (ESRD). Protein turnover is influenced by transmembrane amino acid transport. The effect of ESRD and hemodialysis (HD) on intracellular amino acid transport kinetics is unknown. We studied intracellular amino acid transport kinetics and protein tu... |
A Critical Success Factors Model for Enterprise Resource Planning Implementation | Enterprise Resource Planning (ERP) systems are highly integrated enterprise-wide information systems that automate core business processes. The ERP packages of vendors such as SAP, Baan, J.D. Edwards, Peoplesoft and Intentia represent more than a standard business platform, they prescribe information blueprints of how ... |
Cosmic rays and tests of fundamental principles | It is now widely acknowledged that cosmic rays experiments can test possible new physics directly generated at the Planck scale or at some other fundamental scale. By studying particle properties at energies far beyond the reach of any man-made accelerator, they can yield unique checks of basic principles. A well-known... |
Improved outcome for children with acute lymphoblastic leukemia: results of Dana-Farber Consortium Protocol 91-01. | The Dana-Farber Cancer Institute (DFCI) acute lymphoblastic leukemia (ALL) Consortium Protocol 91-01 was designed to improve the outcome of children with newly diagnosed ALL while minimizing toxicity. Compared with prior protocols, post-remission therapy was intensified by substituting dexamethasone for prednisone and ... |
A Survey of Domain Ontology Engineering: Methods and Tools | With the advent of the Semantic Web, the field of domain ontology engineering has gained more and more importance. This innovative field may have a big impact on computer-based education and will certainly contribute to its development. This paper presents a survey on domain ontology engineering and especially domain o... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.