Dataset Viewer
Auto-converted to Parquet Duplicate
_id
stringlengths
40
40
title
stringlengths
10
300
text
stringlengths
0
10k
506172b0e0dd4269bdcfe96dda9ea9d8602bbfb6
A modified particle swarm optimizer
In this paper, we introduce a new parameter, called inertia weight, into the original particle swarm optimizer. Simulations have been done to illustrate the signilicant and effective impact of this new parameter on the particle swarm optimizer.
7d3c9c4064b588d5d8c7c0cb398118aac239c71b
$\mathsf {pSCAN}$ : Fast and Exact Structural Graph Clustering
We study the problem of structural graph clustering, a fundamental problem in managing and analyzing graph data. Given an undirected unweighted graph, structural graph clustering is to assign vertices to clusters, and to identify the sets of hub vertices and outlier vertices as well, such that vertices in the same clus...
5ebfcd50c56e51aada28ccecd041db5e002f5862
Gualzru's Path to the Advertisement World
This paper describes the genesis of Gualzru, a robot commissioned by a large Spanish technological company to provide advertisement services in open public spaces. Gualzru has to stand by at an interactive panel observing the people passing by and, at some point, select a promising candidate and approach her to initiat...
c2aa3c7fd59a43c949844e98569429261dba36e6
Planar Helical Antenna of Circular Polarization
A planar helical antenna is presented for achieving wideband end-fire radiation of circular polarization while maintaining a very low profile. The helix is formed using printed strips with straight-edge connections implemented by plated viaholes. The currents flowing on the strips and along via-holes of the helix contr...
befdf0eb1a3d2e0d404e7fbdb43438be7ae607e5
Body Composition Changes After Very-Low-Calorie Ketogenic Diet in Obesity Evaluated by 3 Standardized Methods.
Context Common concerns when using low-calorie diets as a treatment for obesity are the reduction in fat-free mass, mostly muscular mass, that occurs together with the fat mass (FM) loss, and determining the best methodologies to evaluate body composition changes. Objective This study aimed to evaluate the very-low-c...
1b2a0e8af5c1f18e47e71244973ce4ace4ac6034
Compressed Nonparametric Language Modelling
Hierarchical Pitman-Yor Process priors are compelling methods for learning language models, outperforming point-estimate based methods. However, these models remain unpopular due to computational and statistical inference issues, such as memory and time usage, as well as poor mixing of sampler. In this work we propose ...
f69253e97f487b9d77b72553a9115fc814e3ed51
Clickbait Convolutional Neural Network
With the development of online advertisements, clickbait spread wider and wider. Clickbait dissatisfies users because the article content does not match their expectation. Thus, clickbait detection has attracted more and more attention recently. Traditional clickbait-detection methods rely on heavy feature engineering ...
d18cc66f7f87e041dec544a0b843496085ab54e1
Memory, navigation and theta rhythm in the hippocampal-entorhinal system
Theories on the functions of the hippocampal system are based largely on two fundamental discoveries: the amnestic consequences of removing the hippocampus and associated structures in the famous patient H.M. and the observation that spiking activity of hippocampal neurons is associated with the spatial position of the...
4114c89bec92ebde7c20d12d0303281983ed1df8
Design and Implementation of a Fast Dynamic Packet Filter
This paper presents Swift, a packet filter for high-performance packet capture on commercial off-the-shelf hardware. The key features of the Swift include: 1) extremely lowfilter update latency for dynamic packet filtering, and 2) gigabits-per-second high-speed packet processing. Based on complex instruction set comput...
4b53f660eb6cfe9180f9e609ad94df8606724a3d
Text mining of news-headlines for FOREX market prediction: A Multi-layer Dimension Reduction Algorithm with semantics and sentiment
In this paper a novel approach is proposed to predict intraday directional-movements of a currency-pair in the foreign exchange market based on the text of breaking financial news-headlines. The motivation behind this work is twofold: First, although market-prediction through text-mining is shown to be a promising area...
a64f48f9810c4788236f31dc2a9b87dd02977c3e
Voice quality evaluation of recent open source codecs
• Averaged frequency responses at different 16, and 24 kHz. External sampling rate does not tell the internal sampling rate. • Supported signal bandwidth depends on bitrate, but no documentation exists bandwidths were found out expirementally • We tested 32kHz sampling with 16ms frame length. There is also 8 ms lookahe...
892fea843d58852a835f38087bc3b5102123f567
Multiple ramp schemes
A (t; k; n; S) ramp scheme is a protocol to distribute a secret s chosen inS among a setP of n participants in such a way that: 1) sets of participants of cardinality greater than or equal to k can reconstruct the secrets; 2) sets of participants of cardinality less than or equal tot have no information on s, whereas 3...
3ea9cd35f39e8c128f39f13148e91466715f4ee2
A File Comparison Program
A file comparison program produces a list of differences between two files. These differences can be couched in terms of lines, e.g. by telling which lines must be inserted, deleted or moved to convert the first file to the second. Alternatively, the list of differences can identify individual bytes. Byte-oriented comp...
508119a50e3d4e8b7116c1b56a002de492b2270b
Object Detection Featuring 3D Audio Localization for Microsoft HoloLens - A Deep Learning based Sensor Substitution Approach for the Blind
Finding basic objects on a daily basis is a difficult but common task for blind people. This paper demonstrates the implementation of a wearable, deep learning backed, object detection approach in the context of visual impairment or blindness. The prototype aims to substitute the impaired eye of the user and replace it...
2c6835e8bdb8c70a9c3aa9bd2578b01dd1b93114
RY-ON WITH CLOTHING REGION
We propose a virtual try-on method based on generative adversarial networks (GANs). By considering clothing regions, this method enables us to reflect the pattern of clothes better than Conditional Analogy GAN (CAGAN), an existing virtual try-on method based on GANs. Our method first obtains the clothing region on a pe...
d5ecb372f6cbdfb52588fbb4a54be21d510009d0
A Study of Birth Order , Academic Performance , and Personality
This study aimed to investigate birth order effect on personality and academic performance amongst 120 Malaysians. Besides, it also aimed to examine the relationship between personality and academic achievement. Thirty firstborns, 30 middle children, 30 lastborns, and 30 only children, who shared the mean age of 20.0 y...
bb192e0208548831de1475b11859f2114121c662
Direct and Indirect Discrimination Prevention Methods
Along with privacy, discrimination is a very import ant issue when considering the legal and ethical aspects of data mini ng. It is more than obvious that most people do not want to be discriminated because of their gender, religion, nationality, age and so on, especially when those att ribu es are used for making deci...
55ca165fa6091973674b12ea8fa3f1a3a1e50a6d
Sample-Based Tree Search with Fixed and Adaptive State Abstractions
Sample-based tree search (SBTS) is an approach to solving Markov decision problems based on constructing a lookahead search tree using random samples from a generative model of the MDP. It encompasses Monte Carlo tree search (MCTS) algorithms like UCT as well as algorithms such as sparse sampling. SBTS is well-suited t...
40cfac582cafeadb0e09e5f020e2febf5cbd4986
Leveraging graph topology and semantic context for pharmacovigilance through twitter-streams
Adverse drug events (ADEs) constitute one of the leading causes of post-therapeutic death and their identification constitutes an important challenge of modern precision medicine. Unfortunately, the onset and effects of ADEs are often underreported complicating timely intervention. At over 500 million posts per day, Tw...
292eee24017356768f1f50b72701ea636dba7982
IMPLICIT SHAPE MODELS FOR OBJECT DETECTION IN 3D POINT CLOUDS
We present a method for automatic object localization and recognition in 3D point clouds representing outdoor urban scenes. The method is based on the implicit shape models (ISM) framework, which recognizes objects by voting for their center locations. It requires only few training examples per class, which is an impor...
922b5eaa5ca03b12d9842b7b84e0e420ccd2feee
A New Approach to Linear Filtering and Prediction Problems
AN IMPORTANT class of theoretical and practical problems in communication and control is of a statistical nature. Such problems are: (i) Prediction of random signals; (ii) separation of random signals from random noise; (iii) detection of signals of known form (pulses, sinusoids) in the presence of random noise. In his...
0db78d548f914135ad16c0d6618890de52c0c065
Incremental Dialogue System Faster than and Preferred to its Nonincremental Counterpart
Current dialogue systems generally operate in a pipelined, modular fashion on one complete utterance at a time. Evidence from human language understanding shows that human understanding operates incrementally and makes use of multiple sources of information during the parsing process, including traditionally “later” co...
2907cde029f349948680a3690500d4cf09b5be96
An architecture for scalable, universal speech recognition
This thesis describes MultiSphinx, a concurrent architecture for scalable, low-latency automatic speech recognition. We first consider the problem of constructing a universal “core” speech recognizer on top of which domain and task specific adaptation layers can be constructed. We then show that when this problem is re...
86436e9d0c98e7133c7d00d8875bcf0720ad3882
' SMART ’ CANE FOR THE VISUALLY IMPAIRED : DESIGN AND CONTROLLED FIELD TESTING OF AN AFFORDABLE OBSTACLE DETECTION SYSTEM
(USA) respectively. Since graduation, they have been associated with this project in voluntary and individual capacity. Sandeep Singh Gujral, an occupational therapist was an intern at the IIT Delhi from August-November 2009 and conducted user training for the trials.
e50a316f97c9a405aa000d883a633bd5707f1a34
Term-Weighting Approaches in Automatic Text Retrieval
The experimental evidence accumulated over the past 20 years indicates that text indexing systems based on the assignment of appropriately weighted single terms produce retrieval results that are superior to those obtainable with other more elaborate text representations. These results depend crucially on the choice of...
6ac15e819701cd0d077d8157711c4c402106722c
Team MIT Urban Challenge Technical Report
This technical report describes Team MIT's approach to the DARPA Urban Challenge. We have developed a novel strategy for using many inexpensive sensors, mounted on the vehicle periphery, and calibrated with a new cross­modal calibration technique. Lidar, camera, and radar data streams are processed using an innovative,...
e5a837696c7a5d329a6a540a0d2de912a010ac47
Tableau Methods for Modal and Temporal Logics
This document is a complete draft of a chapter by Rajeev Gor e on \Tableau Methods for Modal and Temporal Logics" which is part of the \Handbook of Tableau Methods", edited
412b93429b7b7b307cc64702cdfa91630210a52e
An optimal technology mapping algorithm for delay optimization in lookup-table based FPGA designs
In this paper we present a polynomial time technology mapping algorithm, called Flow-Map, that optimally solves the LUT-based FPGA technology mapping problem for depth minimization for general Boolean networks. This theoretical breakthrough makes a sharp contrast with the fact that conventional technology mapping probl...
7ecaca8db190608dc4482999e19b1593cc6ad4e5
Feature-based survey of model transformation approaches
Concrete Figure 5 Features of the body of a domain: (A) patterns and (B) logic Language Paradigm Value Specification Element Creation Implicit Explicit Logic Constraint Object-Oriented Functional Procedural Logic Value Binding Imperative Assignment IBM SYSTEMS JOURNAL, VOL 45, NO 3, 2006 CZARNECKI AND HELSEN 629 operat...
704885bae7e9c5a37528be854b8bd2f24d1e641c
An Empirical Examination of the Effects of Web Personalization at Different Stages of Decision-Making
Personalization agents are incorporated in many websites to tailor content and interfaces for individual users. But in contrast to the proliferation of personalized web services worldwide, empirical research studying the effects of web personalization is scant. How does exposure to personalized offers affect subsequent...
6e91e18f89027bb01c791ce54b2f7a1fc8d8ce9c
Pacific kids DASH for health (PacDASH) randomized, controlled trial with DASH eating plan plus physical activity improves fruit and vegetable intake and diastolic blood pressure in children.
BACKGROUND Pacific Kids DASH for Health (PacDASH) aimed to improve child diet and physical activity (PA) level and prevent excess weight gain and elevation in blood pressure (BP) at 9 months. METHODS PacDASH was a two-arm, randomized, controlled trial (ClinicalTrials.gov: NCT00905411). Eighty-five 5- to 8-year-olds i...
5e296b53252db11667011b55e78bd4a67cd3e547
Performance of Store Brands: A Cross-Country Analysis of Consumer Store Brand Preferences, Perceptions, and Risk
This paper empirically studies consumer choice behavior in regard to store brands in the US, UK and Spain. Store brand market shares differ by country and they are usually much higher in Europe than in the US. However, there is surprisingly little work in marketing that empirically studies the reasons that underlie hig...
2cfac4e999538728a8e11e2b7784433e80ca6a38
Transcriptional regulatory networks in Saccharomyces cerevisiae.
We have determined how most of the transcriptional regulators encoded in the eukaryote Saccharomyces cerevisiae associate with genes across the genome in living cells. Just as maps of metabolic networks describe the potential pathways that may be used by a cell to accomplish metabolic processes, this network of regulat...
fa27e993f88c12ef3cf5bbc6eb3b0b4f9de15e86
The Anatomy of Motivation: An Evolutionary-Ecological Approach
There have been few attempts to bring evolutionary theory to the study of human motivation. From this perspective motives can be considered psychological mechanisms to produce behavior that solves evolutionarily important tasks in the human niche. From the dimensions of the human niche we deduce eight human needs: opti...
6de09e48d42d14c4079e5d8a6a58485341b41cad
Students’ opinions on blended learning and its implementation in terms of their learning styles
The purpose of this article is to examine students’ views on the blended learning method and its use in relation to the students’ individual learning style. The study was conducted with 31 senior students. Web based media together with face to face classroom settings were used in the blended learning framework. A scale...
0fd0e3854ee696148e978ec33d5c042554cd4d23
Tree Edit Models for Recognizing Textual Entailments, Paraphrases, and Answers to Questions
This document provides additional details about the experiments described in (Heilman and Smith, 2010). Note that while this document provides information about the datasets and experimental methods, it does not provide further results. If you have any further questions, please feel free to contact the first author. Th...
326a0914dcdf7f42b5e1c2887174476728ca1b9d
Wasserstein GAN
The problem this paper is concerned with is that of unsupervised learning. Mainly, what does it mean to learn a probability distribution? The classical answer to this is to learn a probability density. This is often done by defining a parametric family of densities (Pθ)θ∈Rd and finding the one that maximized the likeli...
c62ba57869099f20c8bcefd9b38ce5d8b4b3db56
Computational models of trust and reputation: agents, evolutionary games, and social networks
Many recent studies of trust and reputation are made in the context of commercial reputation or rating systems for online communities. Most of these systems have been constructed without a formal rating model or much regard for our sociological understanding of these concepts. We first provide a critical overview of th...
dcff311940942dcf81db5073e551a87e1710e52a
Recognizing Malicious Intention in an Intrusion Detection Process
Generally, theintrudermustperformseveralactions,organizedin anintrusionscenario, to achieve hisor hermaliciousobjective.Wearguethatintrusionscenarioscan bemodelledasa planningprocessandwesuggestmodellinga maliciousobjectiveas anattemptto violatea givensecurityrequirement. Our proposalis thento extendthe definitionof at...
b63a60e666c4c0335d8de4581eaaa3f71e8e0e54
A Nonlinear-Disturbance-Observer-Based DC-Bus Voltage Control for a Hybrid AC/DC Microgrid
DC-bus voltage control is an important task in the operation of a dc or a hybrid ac/dc microgrid system. To improve the dc-bus voltage control dynamics, traditional approaches attempt to measure and feedforward the load or source power in the dc-bus control scheme. However, in a microgrid system with distributed dc sou...
382c057c0be037340e7d6494fc3a580b9d6b958c
Should TED talks be teaching us something?
The nonprofit phenomenon “TED,” the brand name for the concepts of Technology Education and Design, was born in 1984. It launched into pop culture stardom in 2006 when the organization’s curators began offering short, free, unrestricted, and educational video segments. Known as “TEDTalks,” these informational segments ...
36eff99a7f23cec395e4efc80ff7f937934c7be6
Geometry and Meaning
Geometry and Meaning is an interesting book about a relationship between geometry and logic defined on certain types of abstract spaces and how that intimate relationship might be exploited when applied in computational linguistics. It is also about an approach to information retrieval, because the analysis of natural ...
f7d5f8c60972c18812925715f685ce8ae5d5659d
A new exact method for the two-dimensional orthogonal packing problem
The two-dimensional orthogonal packing problem (2OPP ) consists of determining if a set of rectangles (items) can be packed into one rectangle of fixed size (bin). In this paper we propose two exact algorithms for solving this problem. The first algorithm is an improvement on a classical branch&bound method, whereas th...
90c1104142203c8ead18882d49bfea8aec23e758
Sensitivity and diagnosticity of NASA-TLX and simplified SWAT to assess the mental workload associated with operating an agricultural sprayer.
The objectives of the present study were: a) to investigate three continuous variants of the NASA-Task Load Index (TLX) (standard NASA (CNASA), average NASA (C1NASA) and principal component NASA (PCNASA)) and five different variants of the simplified subjective workload assessment technique (SSWAT) (continuous standard...
514ee2a4d6dec51d726012bd74b32b1e05f13271
The Ontological Foundation of REA Enterprise Information Systems
Philosophers have studied ontologies for centuries in their search for a systematic explanation of existence: “What kind of things exist?” Recently, ontologies have emerged as a major research topic in the fields of artificial intelligence and knowledge management where they address the content issue: “What kind of thi...
d77d2ab03f891d8f0822083020486a6de1f2900f
EEG Classification of Different Imaginary Movements within the Same Limb
The task of discriminating the motor imagery of different movements within the same limb using electroencephalography (EEG) signals is challenging because these imaginary movements have close spatial representations on the motor cortex area. There is, however, a pressing need to succeed in this task. The reason is that...
519f5892938d4423cecc999b6e489b72fc0d0ca7
Cognitive, emotional, and behavioral considerations for chronic pain management in the Ehlers-Danlos syndrome hypermobility-type: a narrative review.
BACKGROUND Ehlers-Danlos syndrome (EDS) hypermobility-type is the most common hereditary disorder of the connective tissue. The tissue fragility characteristic of this condition leads to multi-systemic symptoms in which pain, often severe, chronic, and disabling, is the most experienced. Clinical observations suggest t...
fe0643f3405c22fe7ca0b7d1274a812d6e3e5a11
Silicon carbide power MOSFETs: Breakthrough performance from 900 V up to 15 kV
Since Cree, Inc.'s 2<sup>nd</sup> generation 4H-SiC MOSFETs were commercially released with a specific on-resistance (R<sub>ON, SP</sub>) of 5 mΩ·cm<sup>2</sup> for a 1200 V-rating in early 2013, we have further optimized the device design and fabrication processes as well as greatly expanded the voltage ratings from 9...
d87d70ecd0fdf0976cebbeaeacf25ad9872ffde1
Robust and false positive free watermarking in IWT domain using SVD and ABC
Watermarking is used to protect the copyrighted materials from being misused and help us to know the lawful ownership. The security of any watermarking scheme is always a prime concern for the developer. In this work, the robustness and security issue of IWT (integer wavelet transform) and SVD (singular value decomposi...
26f70336acf7247a35d3c0be6308fe29f25d2872
Implementation of AES-GCM encryption algorithm for high performance and low power architecture Using FPGA
Evaluation of the Advanced Encryption Standard (AES) algorithm in FPGA is proposed here. This Evaluation is compared with other works to show the efficiency. Here we are concerned about two major purposes. The first is to define some of the terms and concepts behind basic cryptographic methods, and to offer a way to co...
89cbcc1e740a4591443ff4765a6ae8df0fdf5554
Piaget ’ s Constructivism , Papert ’ s Constructionism : What ’ s the difference ?
What is the difference between Piaget's constructivism and Papert’s “constructionism”? Beyond the mere play on the words, I think the distinction holds, and that integrating both views can enrich our understanding of how people learn and grow. Piaget’s constructivism offers a window into what children are interested in...
f5888af5e5353eb74d37ec50e9840e58b1992953
An LDA-Based Approach to Scientific Paper Recommendation
Recommendation of scientific papers is a task aimed to support researchers in accessing relevant articles from a large pool of unseen articles. When writing a paper, a researcher focuses on the topics related to her/his scientific domain, by using a technical language. The core idea of this paper is to exploit the topi...
5574763d870bae0fd3fd6d3014297942a045f60a
Utilization of Data mining Approaches for Prediction of Life Threatening Diseases Survivability
Data mining now-a-days plays an important role in prediction of diseases in health care industry. The Health care industry utilizes data mining Techniques and finds out the information which is hidden in the data set. Many diagnoses have been done for predicting diseases. Without knowing the knowledge of profound medic...
1e396464e440e6032be3f035a9a6837c32c9d2c0
Review of Micro Thermoelectric Generator
Used for thermal energy harvesting, thermoelectric generator (TEG) can convert heat into electricity directly. Structurally, the main part of TEG is the thermopile, which consists of thermocouples connected in series electrically and in parallel thermally. Benefiting from massive progress achieved in a microelectromech...
9f6db3f5809a9d1b9f1c70d9d30382a0bd8be8d0
A Review on Performance Analysis of Cloud Computing Services for Scientific Computing
Cloud computing has emerged as a very important commercial infrastructure that promises to reduce the need for maintaining costly computing facilities by organizations and institutes. Through the use of virtualization and time sharing of resources, clouds serve with a single set of physical resources as a large user ba...
24b4076e2f58325f5d86ba1ca1f00b08a56fb682
Ontologies: principles, methods and applications
This paper is intended to serve as a comprehensive introduction to the emerging eld concerned with the design and use of ontologies. We observe that disparate backgrounds, languages, tools, and techniques are a major barrier to e ective communication among people, organisations, and/or software systems. We show how the...
236f183be06d824122da59ffb79e501d1a537486
Design for Reliability of Low-voltage, Switched-capacitor Circuits
Design for Reliability of Low-voltage, Switched-capacitor Circuits by Andrew Masami Abo Doctor of Philosophy in Engineering University of California, Berkeley Professor Paul R. Gray, Chair Analog, switched-capacitor circuits play a critical role in mixed-signal, analogto-digital interfaces. They implement a large class...
83834cd33996ed0b00e3e0fca3cda413d7ed79ff
DWCMM: The Data Warehouse Capability Maturity Model
Data Warehouses and Business Intelligence have become popular fields of research in recent years. Unfortunately, in daily practice many Data Warehouse and Business Intelligence solutions still fail to help organizations make better decisions and increase their profitability, due to intransparent complexities and projec...
89a9ad85d8343a622aaa8c072beacaf8df1f0464
Multiple-resonator-based bandpass filters
This article describes a class of recently developed multiple-mode-resonator-based bandpass filters for ultra-wide-band (UWB) transmission systems. These filters have many attractive features, including a simple design, compact size, low loss and good linearity in the UWB, enhanced out-of-band rejection, and easy integ...
608ec914e356ff5e5782c908016958bf650a946f
CogALex-V Shared Task: GHHH - Detecting Semantic Relations via Word Embeddings
This paper describes our system submission to the CogALex-2016 Shared Task on Corpus-Based Identification of Semantic Relations. Our system won first place for Task-1 and second place for Task-2. The evaluation results of our system on the test set is 88.1% (79.0% for TRUE only) f-measure for Task-1 on detecting semant...
206723950b10580ced733cbacbfc23c85b268e13
Why Lurkers Lurk
The goal of this paper is to address the question: ‘why do lurkers lurk?’ Lurkers reportedly makeup the majority of members in online groups, yet little is known about them. Without insight into lurkers, our understanding of online groups is incomplete. Ignoring, dismissing, or misunderstanding lurking distorts knowled...
e75cb14344eaeec987aa571d0009d0e02ec48a63
Design of Highly Integrated Mechatronic Gear Selector Levers for Automotive Shift-by-Wire Systems
Increased requirements regarding ergonomic comfort, limited space, weight reduction, and electronic automation of functions and safety features are on the rise for future automotive gear levers. At the same time, current mechanical gear levers have restrictions to achieve this. In this paper, we present a monostable, m...
66c410a2567e96dcff135bf6582cb26c9df765c4
Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks
Secure access is one of the fundamental problems in wireless mobile networks. Digital signature is a widely used technique to protect messages’ authenticity and nodes’ identities. From the practical perspective, to ensure the quality of services in wireless mobile networks, ideally the process of signature verification...
9a59a3719bf08105d4632898ee178bd982da2204
International Journal of Advanced Robotic Systems Design of a Control System for an Autonomous Vehicle Based on Adaptive-PID Regular Paper
The autonomous vehicle is a mobile robot integrating multi‐sensor navigation and positioning, intelligent decision making and control technology. This paper presents the control system architecture of the autonomous vehicle, called “Intelligent Pioneer”, and the path tracking and stability of mot...
7b24aa024ca2037b097cfcb2ea73a60ab497b80e
Internet security architecture
Fear of security breaches has been a major r eason f or the business world’ s reluctance to embrace the Inter net as a viable means of communication. A widely adopted solution consists of physically separating private networks from the rest of Internet using firewalls. This paper discusses the curr ent cryptographic se...
7817db7b898a3458035174d914a7570d0b0efb7b
Corporate social responsibility and bank customer satisfaction A research agenda
Purpose – The purpose of this paper is to explore the relationship between corporate social responsibility (CSR) and customer outcomes. Design/methodology/approach – This paper reviews the literature on CSR effects and satisfaction, noting gaps in the literature. Findings – A series of propositions is put forward to gu...
9d420ad78af7366384f77b29e62a93a0325ace77
A spectrogram-based audio fingerprinting system for content-based copy detection
This paper presents a novel audio fingerprinting method that is highly robust to a variety of audio distortions. It is based on an unconventional audio fingerprint generation scheme. The robustness is achieved by generating different versions of the spectrogram matrix of the audio signal by using a threshold based on t...
e030aa1ea57ee47d3f3a0ce05b7e983f95115f1a
Psychometric Properties of Physical Activity and Leisure Motivation Scale in Farsi: an International Collaborative Project on Motivation for Physical Activity and Leisure.
BACKGROUND Given the importance of regular physical activity, it is crucial to evaluate the factors favoring participation in physical activity. We aimed to report the psychometric analysis of the Farsi version of the Physical Activity and Leisure Motivation Scale (PALMS). METHODS The Farsi version of PALMS was compl...
6570489a6294a5845adfd195a50a226f78a139c1
An extended online purchase intention model for middle-aged online users
This article focuses on examining the determinants and mediators of the purchase intention of nononline purchasers between ages 31 and 60 who mostly have strong purchasing power. It propose anew online purchase intention model by integrating the technology acceptance model with additional determinants and adding habitu...
a42569c671b5f9d0fe2007af55199d668dae491b
Fine-grained Concept Linking using Neural Networks in Healthcare
To unlock the wealth of the healthcare data, we often need to link the real-world text snippets to the referred medical concepts described by the canonical descriptions. However, existing healthcare concept linking methods, such as dictionary-based and simple machine learning methods, are not effective due to the word ...
5fb1285e05bbd78d0094fe8061c644ea09d9da8d
Double-spending fast payments in bitcoin
Bitcoin is a decentralized payment system that relies on Proof-of-Work (PoW) to verify payments. Nowadays, Bitcoin is increasingly used in a number of fast payment scenarios, where the time between the exchange of currency and goods is short (in the order of few seconds). While the Bitcoin payment verification scheme i...
d2920567fb66bc69d92ab2208f6455e37ce6138b
Disruptive Innovation : Removing the Innovators ’ Dilemma
The objectives of this research are to co-create understanding and knowledge on the phenomenon of disruptive innovation in order to provide pragmatic clarity on the term’s meaning, impact and implications. This will address the academic audience’s gap in knowledge and provide help to practitioners wanting to understand...
0dbed89ea3296f351eb986cc02678c7a33d50945
A Combinatorial Noise Model for Quantum Computer Simulation
Quantum computers (QCs) have many potential hardware implementations ranging from solid-state silicon-based structures to electron-spin qubits on liquid helium. However, all QCs must contend with gate infidelity and qubit state decoherence over time. Quantum error correcting codes (QECCs) have been developed to protect...
47f0455d65a0823c70ce7cce9749f3abd826e0a7
Random Walk with Restart on Large Graphs Using Block Elimination
Given a large graph, how can we calculate the relevance between nodes fast and accurately? Random walk with restart (RWR) provides a good measure for this purpose and has been applied to diverse data mining applications including ranking, community detection, link prediction, and anomaly detection. Since calculating RW...
1eff385c88fd1fdd1c03fd3fb573de2530b73f99
OBJECTIVE SELF-AWARENESS THEORY : RECENT PROGRESS AND ENDURING PROBLEMS By :
Objective self-awareness theory has undergone fundamental changes in the 3 decades since Duval and Wicklund's (1972) original formulation. We review new evidence that bears on the basic tenets of the theory. Many of the assumptions of self-awareness theory require revision, particularly how expectancies influence appro...
b0f16acfa4efce9c24100ec330b82fb8a28feeec
Reinforcement Learning in Continuous State and Action Spaces
Many traditional reinforcement-learning algorithms have been designed for problems with small finite state and action spaces. Learn ing in such discrete problems can been difficult, due to noise and delayed reinfor cements. However, many real-world problems have continuous state or action sp aces, which can make learni...
b1b5646683557b38468344dff09ae921a5a4b345
Comparison of CoAP and MQTT Performance Over Capillary Radios
The IoT protocols used in the application layer, namely the Constraint Application Protocol (CoAP) and Message Queue Telemetry Transport (MQTT) have dependencies to the transport layer. The choice of transport, Transmission Control Protocol (TCP) or the User Datagram Protocol(UDP), on the other hand, has an impact on t...
6a2311d02aea97f7fe4e78c8bd2a53091364dc3b
Aesthetics and Entropy III . Aesthetic measures 2
1 Consultant, Maplewood, MN USA 4 * Correspondence: sahyun@infionline.net; 1-(651)-927-9686 5 6 Abstract: We examined a series of real-world, pictorial photographs with varying 7 characteristics, along with their modification by noise addition and unsharp masking. As 8 response metrics we used three different versions ...
6fd62c67b281956c3f67eb53fafaea83b2f0b4fb
Taking perspective into account in a communicative task
Previous neuroimaging studies of spatial perspective taking have tended not to activate the brain's mentalising network. We predicted that a task that requires the use of perspective taking in a communicative context would lead to the activation of mentalising regions. In the current task, participants followed auditor...
738f4d2137fc767b1802963b5e45a2216c27b77c
Churn Prediction : Does Technology Matter ?
The aim of this paper is to identify the most suitable model for churn prediction based on three different techniques. The paper identifies the variables that affect churn in reverence of customer complaints data and provides a comparative analysis of neural networks, regression trees and regression in their capabiliti...
090a6772a1d69f07bfe7e89f99934294a0dac1b9
Two Modifications of CNN
32f7aef5c13c715b00b966eaaba5dd2fe35df1a4
Bayesian network classifiers for identifying the slope of the customer lifecycle of long-life customers
Undoubtedly, Customer Relationship Management (CRM) has gained its importance through the statement that acquiring a new customer is several times more costly than retaining and selling additional products to existing customers. Consequently, marketing practitioners are currently often focusing on retaining customers f...
25519ce6a924f5890180eacfa6e66203048f5dd1
Big Data : New Tricks for Econometrics
5 Nowadays computers are in the middle of most economic transactions. 6 These “computer-mediated transactions” generate huge amounts of 7 data, and new tools can be used to manipulate and analyze this data. 8 This essay offers a brief introduction to some of these tools and meth9 ods. 10 Computers are now involved in m...
d7ab41adebaec9272c2797512a021482a594d040
DevOps for Developers
ed descriptions of machines by using a DSL while enjoying the full power of scripting languages (in both Puppet and Chef, you can describe behavior in the Ruby language (a dynamic, general-purpose object-oriented programming language), see http://www.ruby-lang. org/en/). Declarative descriptions of target behavior (i.e...
ef51ff88c525751e2d09f245a3bedc40cf364961
Breaking CAPTCHAs on the Dark Web 11 February , 2018
On the Dark Web, several websites inhibit automated scraping attempts by employing CAPTCHAs. Scraping important content from a website is possible if these CAPTCHAs are solved by a web scraper. For this purpose, a Machine Learning tool is used, TensorFlow and an Optical Character Recognition tool, Tesseract to solve si...
8f6c14f6743d8f9a8ab0be99a50fb51a123ab62c
Document Image Binarization Using Recurrent Neural Networks
In the context of document image analysis, image binarization is an important preprocessing step for other document analysis algorithms, but also relevant on its own by improving the readability of images of historical documents. While historical document image binarization is challenging due to common image degradatio...
3ddac15bd47bc0745db4297d30be71af43adf0bb
Greed is good: Approximating independent sets in sparse and bounded-degree graphs
Theminimum-degree greedy algorithm, or Greedy for short, is a simple and well-studied method for finding independent sets in graphs. We show that it achieves a performance ratio of (Δ+2)/3 for approximating independent sets in graphs with degree bounded by Δ. The analysis yields a precise characterization of the size o...
f07fd927971c40261dd7cef1ad6d2360b23fe294
A greedy approach to sparse canonical correlation analysis
We consider the problem of sparse canonical correlation analysis (CCA), i.e., the search for two linear combi nations, one for each multivariate, that yield maximum correlation using a specified number of variables. We propose an efficient numeri cal approximation based on a direct greedy approach which bound s the cor...
a742d81416a1da97af53e0a9748c16f37fd61b40
Blood Code: The History and Future of Video Game Censorship
INTRODUCTION ................................................................................... 571 I. FIRST AMENDMENT BACKGROUND ....................................... 573 II. THE ANALOGOUS HISTORIES OF FILMS AND VIDEO GAMES ....................................................................................... 576 ...
b5f6ee9baa07301bba6e187bd9380686a72866c6
Networks of the Brain
Models of Network Growth All networks, whether they are social, technological, or biological, are the result of a growth process. Many of these networks continue to grow for prolonged periods of time, continually modifying their connectivity structure throughout their entire existence. For example, the World Wide Web h...
d0eab53a6b20bfca924b85fcfb0ee76bfde6d4ef
Comparative Analysis of ADS-B Verification Techniques
ADS-B is one of many Federal Aviation Administration (FAA) regulated technologies used to monitor air traffic with high precision, while reducing dependencies on dated and costly radar equipment [1]. The FAA hopes to decrease the separation between aircraft, reduce risk of collision as air traffic density increases, sa...
e33b9ee3c575c6a38b873888e796d29f59d98e04
Heart-Brain Neurodynamics : The Making of Emotions
As pervasive and vital as they are in human experience, emotions have long remained an enigma to science. This monograph explores recent scientific advances that clarify central controversies in the study of emotion, including the relationship between intellect and emotion, and the historical debate on the source of em...
486eb944129e0d90a7d2ef8d6085fd482c9be6c5
Correctness By Construction: Better Can Also Be Cheaper
I n December 1999 CrossTalk [3], David Cook provided a well-reasoned historical analysis of programming language development and considered the role languages play in the software development process. The article was valuable because it showed that programming language developments are not sufficient to ensure success;...
89a3c09e0a4c54f89a7237be92d3385116030efc
Phishing Detection Taxonomy for Mobile Device
Phishing is one of the social engineering attacks and currently hit on mobile devices. Based on security report by Lookout [1], 30% of Lookout users clicking on an unsafe link per year by using mobile device. Few phishing detection techniques have been applied on mobile device. However, review on phishing detection tec...
585654039c441a15cdda936902f0f1f9b7498a89
Gold Fingers: 3D Targets for Evaluating Capacitive Readers
With capacitive fingerprint readers being increasingly used for access control as well as for smartphone unlock and payments, there is a growing interest among metrology agencies (e.g., the National Institute of Standards and Technology) to develop standard artifacts (targets) and procedures for repeatable evaluation o...
c1cd441dad61b9d9d294a19a7043adb1582f786b
Speech recognition using factorial hidden Markov models for separation in the feature space
This paper proposes an algorithm for the recognition and separation of speech signals in non-stationary noise, such as another speaker. We present a method to combine hidden Markov models (HMMs) trained for the speech and noise into a factorial HMM to model the mixture signal. Robustness is obtained by separating the s...
ecd4bc32bb2717c96f76dd100fcd1255a07bd656
Roles of Pre-Training and Fine-Tuning in Context-Dependent DBN-HMMs for Real-World Speech Recognition
Recently, deep learning techniques have been successfully applied to automatic speech recognition tasks -first to phonetic recognition with context-independent deep belief network (DBN) hidden Markov models (HMMs) and later to large vocabulary continuous speech recognition using context-dependent (CD) DBN-HMMs. In this...
0286bef6d6da7990a2c50aefd5543df2ce481fbb
Combinatorial Pure Exploration of Multi-Armed Bandits
We study the combinatorial pure exploration (CPE) problem in the stochastic multi-armed bandit setting, where a learner explores a set of arms with the objective of identifying the optimal member of a decision class, which is a collection of subsets of arms with certain combinatorial structures such as size-K subsets, ...
b8759b1ea437802d9a1c2a99d22932a960b7beec
Firewall Security: Policies, Testing and Performance Evaluation
This paper explores the firewall security and performance relationship for distributed systems. Experiments are conducted to set firewall security into seven different levels and to quantify their performance impacts. These firewall security levels are formulated, designed, implemented, and tested phase by phase under ...
d87ceda3042f781c341ac17109d1e94a717f5f60
WordNet : an electronic lexical database
WordNet is perhaps the most important and widely used lexical resource for natural language processing systems up to now. WordNet: An Electronic Lexical Database, edited by Christiane Fellbaum, discusses the design of WordNet from both theoretical and historical perspectives, provides an up-to-date description of the l...
End of preview. Expand in Data Studio

scidocs (Decontaminated)

A decontaminated version of the scidocs dataset from the BEIR benchmark, with samples found in the mgte-en pre-training dataset removed.

Decontamination methodology

Contamination was detected using a two-pass approach against the full mgte-en dataset (484 GB, 1,235 parquet files):

Pass 1: Exact hash matching

All texts (queries and corpus documents) were normalized (lowercased, unicode NFKD, whitespace collapsed) and hashed with xxHash-64. The same normalization + hashing was applied to every query and document field in mgte-en. Any sample whose hash appeared in mgte-en was flagged as contaminated.

Pass 2: 13-gram containment (GPT-3 style)

Following the methodology introduced in the GPT-3 paper (Brown et al., 2020), word-level 13-grams were extracted from all remaining samples. For each sample, containment was computed as:

containment = |ngrams_in_sample ∩ ngrams_in_mgte| / |ngrams_in_sample|

Samples with containment >= 0.5 were flagged as near-duplicates.

Qrels filtering

Relevance judgments (qrels) referencing any removed query or corpus document were also removed.

Decontamination results

Component Original Clean Removed
Corpus 25,657 5,833 19,824
Queries 1,000 201 799

Qrels per split

Split Original Clean Removed
test 29,928 1,373 28,555

Usage

from datasets import load_dataset

corpus = load_dataset("lightonai/scidocs-decontaminated", "corpus", split="corpus")
queries = load_dataset("lightonai/scidocs-decontaminated", "queries", split="queries")

Citation

Please cite the original BEIR benchmark:

@inproceedings{thakur2021beir,
  title={BEIR: A Heterogeneous Benchmark for Zero-shot Evaluation of Information Retrieval Models},
  author={Thakur, Nandan and Reimers, Nils and Rücklé, Andreas and Srivastava, Abhishek and Gurevych, Irena},
  booktitle={NeurIPS Datasets and Benchmarks},
  year={2021}
}

License

MIT (same as original BEIR)

Downloads last month
18