Datasets:
_id stringlengths 40 40 | title stringlengths 10 300 | text stringlengths 0 10k |
|---|---|---|
506172b0e0dd4269bdcfe96dda9ea9d8602bbfb6 | A modified particle swarm optimizer | In this paper, we introduce a new parameter, called inertia weight, into the original particle swarm optimizer. Simulations have been done to illustrate the signilicant and effective impact of this new parameter on the particle swarm optimizer. |
7d3c9c4064b588d5d8c7c0cb398118aac239c71b | $\mathsf {pSCAN}$ : Fast and Exact Structural Graph Clustering | We study the problem of structural graph clustering, a fundamental problem in managing and analyzing graph data. Given an undirected unweighted graph, structural graph clustering is to assign vertices to clusters, and to identify the sets of hub vertices and outlier vertices as well, such that vertices in the same clus... |
5ebfcd50c56e51aada28ccecd041db5e002f5862 | Gualzru's Path to the Advertisement World | This paper describes the genesis of Gualzru, a robot commissioned by a large Spanish technological company to provide advertisement services in open public spaces. Gualzru has to stand by at an interactive panel observing the people passing by and, at some point, select a promising candidate and approach her to initiat... |
c2aa3c7fd59a43c949844e98569429261dba36e6 | Planar Helical Antenna of Circular Polarization | A planar helical antenna is presented for achieving wideband end-fire radiation of circular polarization while maintaining a very low profile. The helix is formed using printed strips with straight-edge connections implemented by plated viaholes. The currents flowing on the strips and along via-holes of the helix contr... |
befdf0eb1a3d2e0d404e7fbdb43438be7ae607e5 | Body Composition Changes After Very-Low-Calorie Ketogenic Diet in Obesity Evaluated by 3 Standardized Methods. | Context
Common concerns when using low-calorie diets as a treatment for obesity are the reduction in fat-free mass, mostly muscular mass, that occurs together with the fat mass (FM) loss, and determining the best methodologies to evaluate body composition changes.
Objective
This study aimed to evaluate the very-low-c... |
1b2a0e8af5c1f18e47e71244973ce4ace4ac6034 | Compressed Nonparametric Language Modelling | Hierarchical Pitman-Yor Process priors are compelling methods for learning language models, outperforming point-estimate based methods. However, these models remain unpopular due to computational and statistical inference issues, such as memory and time usage, as well as poor mixing of sampler. In this work we propose ... |
f69253e97f487b9d77b72553a9115fc814e3ed51 | Clickbait Convolutional Neural Network | With the development of online advertisements, clickbait spread wider and wider. Clickbait dissatisfies users because the article content does not match their expectation. Thus, clickbait detection has attracted more and more attention recently. Traditional clickbait-detection methods rely on heavy feature engineering ... |
d18cc66f7f87e041dec544a0b843496085ab54e1 | Memory, navigation and theta rhythm in the hippocampal-entorhinal system | Theories on the functions of the hippocampal system are based largely on two fundamental discoveries: the amnestic consequences of removing the hippocampus and associated structures in the famous patient H.M. and the observation that spiking activity of hippocampal neurons is associated with the spatial position of the... |
4114c89bec92ebde7c20d12d0303281983ed1df8 | Design and Implementation of a Fast Dynamic Packet Filter | This paper presents Swift, a packet filter for high-performance packet capture on commercial off-the-shelf hardware. The key features of the Swift include: 1) extremely lowfilter update latency for dynamic packet filtering, and 2) gigabits-per-second high-speed packet processing. Based on complex instruction set comput... |
4b53f660eb6cfe9180f9e609ad94df8606724a3d | Text mining of news-headlines for FOREX market prediction: A Multi-layer Dimension Reduction Algorithm with semantics and sentiment | In this paper a novel approach is proposed to predict intraday directional-movements of a currency-pair in the foreign exchange market based on the text of breaking financial news-headlines. The motivation behind this work is twofold: First, although market-prediction through text-mining is shown to be a promising area... |
a64f48f9810c4788236f31dc2a9b87dd02977c3e | Voice quality evaluation of recent open source codecs | • Averaged frequency responses at different 16, and 24 kHz. External sampling rate does not tell the internal sampling rate. • Supported signal bandwidth depends on bitrate, but no documentation exists bandwidths were found out expirementally • We tested 32kHz sampling with 16ms frame length. There is also 8 ms lookahe... |
892fea843d58852a835f38087bc3b5102123f567 | Multiple ramp schemes | A (t; k; n; S) ramp scheme is a protocol to distribute a secret s chosen inS among a setP of n participants in such a way that: 1) sets of participants of cardinality greater than or equal to k can reconstruct the secrets; 2) sets of participants of cardinality less than or equal tot have no information on s, whereas 3... |
3ea9cd35f39e8c128f39f13148e91466715f4ee2 | A File Comparison Program | A file comparison program produces a list of differences between two files. These differences can be couched in terms of lines, e.g. by telling which lines must be inserted, deleted or moved to convert the first file to the second. Alternatively, the list of differences can identify individual bytes. Byte-oriented comp... |
508119a50e3d4e8b7116c1b56a002de492b2270b | Object Detection Featuring 3D Audio Localization for Microsoft HoloLens - A Deep Learning based Sensor Substitution Approach for the Blind | Finding basic objects on a daily basis is a difficult but common task for blind people. This paper demonstrates the implementation of a wearable, deep learning backed, object detection approach in the context of visual impairment or blindness. The prototype aims to substitute the impaired eye of the user and replace it... |
2c6835e8bdb8c70a9c3aa9bd2578b01dd1b93114 | RY-ON WITH CLOTHING REGION | We propose a virtual try-on method based on generative adversarial networks (GANs). By considering clothing regions, this method enables us to reflect the pattern of clothes better than Conditional Analogy GAN (CAGAN), an existing virtual try-on method based on GANs. Our method first obtains the clothing region on a pe... |
d5ecb372f6cbdfb52588fbb4a54be21d510009d0 | A Study of Birth Order , Academic Performance , and Personality | This study aimed to investigate birth order effect on personality and academic performance amongst 120 Malaysians. Besides, it also aimed to examine the relationship between personality and academic achievement. Thirty firstborns, 30 middle children, 30 lastborns, and 30 only children, who shared the mean age of 20.0 y... |
bb192e0208548831de1475b11859f2114121c662 | Direct and Indirect Discrimination Prevention Methods | Along with privacy, discrimination is a very import ant issue when considering the legal and ethical aspects of data mini ng. It is more than obvious that most people do not want to be discriminated because of their gender, religion, nationality, age and so on, especially when those att ribu es are used for making deci... |
55ca165fa6091973674b12ea8fa3f1a3a1e50a6d | Sample-Based Tree Search with Fixed and Adaptive State Abstractions | Sample-based tree search (SBTS) is an approach to solving Markov decision problems based on constructing a lookahead search tree using random samples from a generative model of the MDP. It encompasses Monte Carlo tree search (MCTS) algorithms like UCT as well as algorithms such as sparse sampling. SBTS is well-suited t... |
40cfac582cafeadb0e09e5f020e2febf5cbd4986 | Leveraging graph topology and semantic context for pharmacovigilance through twitter-streams | Adverse drug events (ADEs) constitute one of the leading causes of post-therapeutic death and their identification constitutes an important challenge of modern precision medicine. Unfortunately, the onset and effects of ADEs are often underreported complicating timely intervention. At over 500 million posts per day, Tw... |
292eee24017356768f1f50b72701ea636dba7982 | IMPLICIT SHAPE MODELS FOR OBJECT DETECTION IN 3D POINT CLOUDS | We present a method for automatic object localization and recognition in 3D point clouds representing outdoor urban scenes. The method is based on the implicit shape models (ISM) framework, which recognizes objects by voting for their center locations. It requires only few training examples per class, which is an impor... |
922b5eaa5ca03b12d9842b7b84e0e420ccd2feee | A New Approach to Linear Filtering and Prediction Problems | AN IMPORTANT class of theoretical and practical problems in communication and control is of a statistical nature. Such problems are: (i) Prediction of random signals; (ii) separation of random signals from random noise; (iii) detection of signals of known form (pulses, sinusoids) in the presence of random noise. In his... |
0db78d548f914135ad16c0d6618890de52c0c065 | Incremental Dialogue System Faster than and Preferred to its Nonincremental Counterpart | Current dialogue systems generally operate in a pipelined, modular fashion on one complete utterance at a time. Evidence from human language understanding shows that human understanding operates incrementally and makes use of multiple sources of information during the parsing process, including traditionally “later” co... |
2907cde029f349948680a3690500d4cf09b5be96 | An architecture for scalable, universal speech recognition | This thesis describes MultiSphinx, a concurrent architecture for scalable, low-latency automatic speech recognition. We first consider the problem of constructing a universal “core” speech recognizer on top of which domain and task specific adaptation layers can be constructed. We then show that when this problem is re... |
86436e9d0c98e7133c7d00d8875bcf0720ad3882 | ' SMART ’ CANE FOR THE VISUALLY IMPAIRED : DESIGN AND CONTROLLED FIELD TESTING OF AN AFFORDABLE OBSTACLE DETECTION SYSTEM | (USA) respectively. Since graduation, they have been associated with this project in voluntary and individual capacity. Sandeep Singh Gujral, an occupational therapist was an intern at the IIT Delhi from August-November 2009 and conducted user training for the trials. |
e50a316f97c9a405aa000d883a633bd5707f1a34 | Term-Weighting Approaches in Automatic Text Retrieval | The experimental evidence accumulated over the past 20 years indicates that text indexing systems based on the assignment of appropriately weighted single terms produce retrieval results that are superior to those obtainable with other more elaborate text representations. These results depend crucially on the choice of... |
6ac15e819701cd0d077d8157711c4c402106722c | Team MIT Urban Challenge Technical Report | This technical report describes Team MIT's approach to the DARPA Urban Challenge. We have developed a novel strategy for using many inexpensive sensors, mounted on the vehicle periphery, and calibrated with a new crossmodal calibration technique. Lidar, camera, and radar data streams are processed using an innovative,... |
e5a837696c7a5d329a6a540a0d2de912a010ac47 | Tableau Methods for Modal and Temporal Logics | This document is a complete draft of a chapter by Rajeev Gor e on \Tableau Methods for Modal and Temporal Logics" which is part of the \Handbook of Tableau Methods", edited |
412b93429b7b7b307cc64702cdfa91630210a52e | An optimal technology mapping algorithm for delay optimization in lookup-table based FPGA designs | In this paper we present a polynomial time technology mapping algorithm, called Flow-Map, that optimally solves the LUT-based FPGA technology mapping problem for depth minimization for general Boolean networks. This theoretical breakthrough makes a sharp contrast with the fact that conventional technology mapping probl... |
7ecaca8db190608dc4482999e19b1593cc6ad4e5 | Feature-based survey of model transformation approaches | Concrete Figure 5 Features of the body of a domain: (A) patterns and (B) logic Language Paradigm Value Specification Element Creation Implicit Explicit Logic Constraint Object-Oriented Functional Procedural Logic Value Binding Imperative Assignment IBM SYSTEMS JOURNAL, VOL 45, NO 3, 2006 CZARNECKI AND HELSEN 629 operat... |
704885bae7e9c5a37528be854b8bd2f24d1e641c | An Empirical Examination of the Effects of Web Personalization at Different Stages of Decision-Making | Personalization agents are incorporated in many websites to tailor content and interfaces for individual users. But in contrast to the proliferation of personalized web services worldwide, empirical research studying the effects of web personalization is scant. How does exposure to personalized offers affect subsequent... |
6e91e18f89027bb01c791ce54b2f7a1fc8d8ce9c | Pacific kids DASH for health (PacDASH) randomized, controlled trial with DASH eating plan plus physical activity improves fruit and vegetable intake and diastolic blood pressure in children. | BACKGROUND
Pacific Kids DASH for Health (PacDASH) aimed to improve child diet and physical activity (PA) level and prevent excess weight gain and elevation in blood pressure (BP) at 9 months.
METHODS
PacDASH was a two-arm, randomized, controlled trial (ClinicalTrials.gov: NCT00905411). Eighty-five 5- to 8-year-olds i... |
5e296b53252db11667011b55e78bd4a67cd3e547 | Performance of Store Brands: A Cross-Country Analysis of Consumer Store Brand Preferences, Perceptions, and Risk | This paper empirically studies consumer choice behavior in regard to store brands in the US, UK and Spain. Store brand market shares differ by country and they are usually much higher in Europe than in the US. However, there is surprisingly little work in marketing that empirically studies the reasons that underlie hig... |
2cfac4e999538728a8e11e2b7784433e80ca6a38 | Transcriptional regulatory networks in Saccharomyces cerevisiae. | We have determined how most of the transcriptional regulators encoded in the eukaryote Saccharomyces cerevisiae associate with genes across the genome in living cells. Just as maps of metabolic networks describe the potential pathways that may be used by a cell to accomplish metabolic processes, this network of regulat... |
fa27e993f88c12ef3cf5bbc6eb3b0b4f9de15e86 | The Anatomy of Motivation: An Evolutionary-Ecological Approach | There have been few attempts to bring evolutionary theory to the study of human motivation. From this perspective motives can be considered psychological mechanisms to produce behavior that solves evolutionarily important tasks in the human niche. From the dimensions of the human niche we deduce eight human needs: opti... |
6de09e48d42d14c4079e5d8a6a58485341b41cad | Students’ opinions on blended learning and its implementation in terms of their learning styles | The purpose of this article is to examine students’ views on the blended learning method and its use in relation to the students’ individual learning style. The study was conducted with 31 senior students. Web based media together with face to face classroom settings were used in the blended learning framework. A scale... |
0fd0e3854ee696148e978ec33d5c042554cd4d23 | Tree Edit Models for Recognizing Textual Entailments, Paraphrases, and Answers to Questions | This document provides additional details about the experiments described in (Heilman and Smith, 2010). Note that while this document provides information about the datasets and experimental methods, it does not provide further results. If you have any further questions, please feel free to contact the first author. Th... |
326a0914dcdf7f42b5e1c2887174476728ca1b9d | Wasserstein GAN | The problem this paper is concerned with is that of unsupervised learning. Mainly, what does it mean to learn a probability distribution? The classical answer to this is to learn a probability density. This is often done by defining a parametric family of densities (Pθ)θ∈Rd and finding the one that maximized the likeli... |
c62ba57869099f20c8bcefd9b38ce5d8b4b3db56 | Computational models of trust and reputation: agents, evolutionary games, and social networks | Many recent studies of trust and reputation are made in the context of commercial reputation or rating systems for online communities. Most of these systems have been constructed without a formal rating model or much regard for our sociological understanding of these concepts. We first provide a critical overview of th... |
dcff311940942dcf81db5073e551a87e1710e52a | Recognizing Malicious Intention in an Intrusion Detection Process | Generally, theintrudermustperformseveralactions,organizedin anintrusionscenario, to achieve hisor hermaliciousobjective.Wearguethatintrusionscenarioscan bemodelledasa planningprocessandwesuggestmodellinga maliciousobjectiveas anattemptto violatea givensecurityrequirement. Our proposalis thento extendthe definitionof at... |
b63a60e666c4c0335d8de4581eaaa3f71e8e0e54 | A Nonlinear-Disturbance-Observer-Based DC-Bus Voltage Control for a Hybrid AC/DC Microgrid | DC-bus voltage control is an important task in the operation of a dc or a hybrid ac/dc microgrid system. To improve the dc-bus voltage control dynamics, traditional approaches attempt to measure and feedforward the load or source power in the dc-bus control scheme. However, in a microgrid system with distributed dc sou... |
382c057c0be037340e7d6494fc3a580b9d6b958c | Should TED talks be teaching us something? | The nonprofit phenomenon “TED,” the brand name for the concepts of Technology Education and Design, was born in 1984. It launched into pop culture stardom in 2006 when the organization’s curators began offering short, free, unrestricted, and educational video segments. Known as “TEDTalks,” these informational segments ... |
36eff99a7f23cec395e4efc80ff7f937934c7be6 | Geometry and Meaning | Geometry and Meaning is an interesting book about a relationship between geometry and logic defined on certain types of abstract spaces and how that intimate relationship might be exploited when applied in computational linguistics. It is also about an approach to information retrieval, because the analysis of natural ... |
f7d5f8c60972c18812925715f685ce8ae5d5659d | A new exact method for the two-dimensional orthogonal packing problem | The two-dimensional orthogonal packing problem (2OPP ) consists of determining if a set of rectangles (items) can be packed into one rectangle of fixed size (bin). In this paper we propose two exact algorithms for solving this problem. The first algorithm is an improvement on a classical branch&bound method, whereas th... |
90c1104142203c8ead18882d49bfea8aec23e758 | Sensitivity and diagnosticity of NASA-TLX and simplified SWAT to assess the mental workload associated with operating an agricultural sprayer. | The objectives of the present study were: a) to investigate three continuous variants of the NASA-Task Load Index (TLX) (standard NASA (CNASA), average NASA (C1NASA) and principal component NASA (PCNASA)) and five different variants of the simplified subjective workload assessment technique (SSWAT) (continuous standard... |
514ee2a4d6dec51d726012bd74b32b1e05f13271 | The Ontological Foundation of REA Enterprise Information Systems | Philosophers have studied ontologies for centuries in their search for a systematic explanation of existence: “What kind of things exist?” Recently, ontologies have emerged as a major research topic in the fields of artificial intelligence and knowledge management where they address the content issue: “What kind of thi... |
d77d2ab03f891d8f0822083020486a6de1f2900f | EEG Classification of Different Imaginary Movements within the Same Limb | The task of discriminating the motor imagery of different movements within the same limb using electroencephalography (EEG) signals is challenging because these imaginary movements have close spatial representations on the motor cortex area. There is, however, a pressing need to succeed in this task. The reason is that... |
519f5892938d4423cecc999b6e489b72fc0d0ca7 | Cognitive, emotional, and behavioral considerations for chronic pain management in the Ehlers-Danlos syndrome hypermobility-type: a narrative review. | BACKGROUND
Ehlers-Danlos syndrome (EDS) hypermobility-type is the most common hereditary disorder of the connective tissue. The tissue fragility characteristic of this condition leads to multi-systemic symptoms in which pain, often severe, chronic, and disabling, is the most experienced. Clinical observations suggest t... |
fe0643f3405c22fe7ca0b7d1274a812d6e3e5a11 | Silicon carbide power MOSFETs: Breakthrough performance from 900 V up to 15 kV | Since Cree, Inc.'s 2<sup>nd</sup> generation 4H-SiC MOSFETs were commercially released with a specific on-resistance (R<sub>ON, SP</sub>) of 5 mΩ·cm<sup>2</sup> for a 1200 V-rating in early 2013, we have further optimized the device design and fabrication processes as well as greatly expanded the voltage ratings from 9... |
d87d70ecd0fdf0976cebbeaeacf25ad9872ffde1 | Robust and false positive free watermarking in IWT domain using SVD and ABC | Watermarking is used to protect the copyrighted materials from being misused and help us to know the lawful ownership. The security of any watermarking scheme is always a prime concern for the developer. In this work, the robustness and security issue of IWT (integer wavelet transform) and SVD (singular value decomposi... |
26f70336acf7247a35d3c0be6308fe29f25d2872 | Implementation of AES-GCM encryption algorithm for high performance and low power architecture Using FPGA | Evaluation of the Advanced Encryption Standard (AES) algorithm in FPGA is proposed here. This Evaluation is compared with other works to show the efficiency. Here we are concerned about two major purposes. The first is to define some of the terms and concepts behind basic cryptographic methods, and to offer a way to co... |
89cbcc1e740a4591443ff4765a6ae8df0fdf5554 | Piaget ’ s Constructivism , Papert ’ s Constructionism : What ’ s the difference ? | What is the difference between Piaget's constructivism and Papert’s “constructionism”? Beyond the mere play on the words, I think the distinction holds, and that integrating both views can enrich our understanding of how people learn and grow. Piaget’s constructivism offers a window into what children are interested in... |
f5888af5e5353eb74d37ec50e9840e58b1992953 | An LDA-Based Approach to Scientific Paper Recommendation | Recommendation of scientific papers is a task aimed to support researchers in accessing relevant articles from a large pool of unseen articles. When writing a paper, a researcher focuses on the topics related to her/his scientific domain, by using a technical language. The core idea of this paper is to exploit the topi... |
5574763d870bae0fd3fd6d3014297942a045f60a | Utilization of Data mining Approaches for Prediction of Life Threatening Diseases Survivability | Data mining now-a-days plays an important role in prediction of diseases in health care industry. The Health care industry utilizes data mining Techniques and finds out the information which is hidden in the data set. Many diagnoses have been done for predicting diseases. Without knowing the knowledge of profound medic... |
1e396464e440e6032be3f035a9a6837c32c9d2c0 | Review of Micro Thermoelectric Generator | Used for thermal energy harvesting, thermoelectric generator (TEG) can convert heat into electricity directly. Structurally, the main part of TEG is the thermopile, which consists of thermocouples connected in series electrically and in parallel thermally. Benefiting from massive progress achieved in a microelectromech... |
9f6db3f5809a9d1b9f1c70d9d30382a0bd8be8d0 | A Review on Performance Analysis of Cloud Computing Services for Scientific Computing | Cloud computing has emerged as a very important commercial infrastructure that promises to reduce the need for maintaining costly computing facilities by organizations and institutes. Through the use of virtualization and time sharing of resources, clouds serve with a single set of physical resources as a large user ba... |
24b4076e2f58325f5d86ba1ca1f00b08a56fb682 | Ontologies: principles, methods and applications | This paper is intended to serve as a comprehensive introduction to the emerging eld concerned with the design and use of ontologies. We observe that disparate backgrounds, languages, tools, and techniques are a major barrier to e ective communication among people, organisations, and/or software systems. We show how the... |
236f183be06d824122da59ffb79e501d1a537486 | Design for Reliability of Low-voltage, Switched-capacitor Circuits | Design for Reliability of Low-voltage, Switched-capacitor Circuits by Andrew Masami Abo Doctor of Philosophy in Engineering University of California, Berkeley Professor Paul R. Gray, Chair Analog, switched-capacitor circuits play a critical role in mixed-signal, analogto-digital interfaces. They implement a large class... |
83834cd33996ed0b00e3e0fca3cda413d7ed79ff | DWCMM: The Data Warehouse Capability Maturity Model | Data Warehouses and Business Intelligence have become popular fields of research in recent years. Unfortunately, in daily practice many Data Warehouse and Business Intelligence solutions still fail to help organizations make better decisions and increase their profitability, due to intransparent complexities and projec... |
89a9ad85d8343a622aaa8c072beacaf8df1f0464 | Multiple-resonator-based bandpass filters | This article describes a class of recently developed multiple-mode-resonator-based bandpass filters for ultra-wide-band (UWB) transmission systems. These filters have many attractive features, including a simple design, compact size, low loss and good linearity in the UWB, enhanced out-of-band rejection, and easy integ... |
608ec914e356ff5e5782c908016958bf650a946f | CogALex-V Shared Task: GHHH - Detecting Semantic Relations via Word Embeddings | This paper describes our system submission to the CogALex-2016 Shared Task on Corpus-Based Identification of Semantic Relations. Our system won first place for Task-1 and second place for Task-2. The evaluation results of our system on the test set is 88.1% (79.0% for TRUE only) f-measure for Task-1 on detecting semant... |
206723950b10580ced733cbacbfc23c85b268e13 | Why Lurkers Lurk | The goal of this paper is to address the question: ‘why do lurkers lurk?’ Lurkers reportedly makeup the majority of members in online groups, yet little is known about them. Without insight into lurkers, our understanding of online groups is incomplete. Ignoring, dismissing, or misunderstanding lurking distorts knowled... |
e75cb14344eaeec987aa571d0009d0e02ec48a63 | Design of Highly Integrated Mechatronic Gear Selector Levers for Automotive Shift-by-Wire Systems | Increased requirements regarding ergonomic comfort, limited space, weight reduction, and electronic automation of functions and safety features are on the rise for future automotive gear levers. At the same time, current mechanical gear levers have restrictions to achieve this. In this paper, we present a monostable, m... |
66c410a2567e96dcff135bf6582cb26c9df765c4 | Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks | Secure access is one of the fundamental problems in wireless mobile networks. Digital signature is a widely used technique to protect messages’ authenticity and nodes’ identities. From the practical perspective, to ensure the quality of services in wireless mobile networks, ideally the process of signature verification... |
9a59a3719bf08105d4632898ee178bd982da2204 | International Journal of Advanced Robotic Systems Design of a Control System for an Autonomous Vehicle Based on Adaptive-PID Regular Paper | The autonomous vehicle is a mobile robot integrating multi‐sensor navigation and positioning, intelligent decision making and control technology. This paper presents the control system architecture of the autonomous vehicle, called “Intelligent Pioneer”, and the path tracking and stability of mot... |
7b24aa024ca2037b097cfcb2ea73a60ab497b80e | Internet security architecture | Fear of security breaches has been a major r eason f or the business world’ s reluctance to embrace the Inter net as a viable means of communication. A widely adopted solution consists of physically separating private networks from the rest of Internet using firewalls. This paper discusses the curr ent cryptographic se... |
7817db7b898a3458035174d914a7570d0b0efb7b | Corporate social responsibility and bank customer satisfaction A research agenda | Purpose – The purpose of this paper is to explore the relationship between corporate social responsibility (CSR) and customer outcomes. Design/methodology/approach – This paper reviews the literature on CSR effects and satisfaction, noting gaps in the literature. Findings – A series of propositions is put forward to gu... |
9d420ad78af7366384f77b29e62a93a0325ace77 | A spectrogram-based audio fingerprinting system for content-based copy detection | This paper presents a novel audio fingerprinting method that is highly robust to a variety of audio distortions. It is based on an unconventional audio fingerprint generation scheme. The robustness is achieved by generating different versions of the spectrogram matrix of the audio signal by using a threshold based on t... |
e030aa1ea57ee47d3f3a0ce05b7e983f95115f1a | Psychometric Properties of Physical Activity and Leisure Motivation Scale in Farsi: an International Collaborative Project on Motivation for Physical Activity and Leisure. | BACKGROUND
Given the importance of regular physical activity, it is crucial to evaluate the factors favoring participation in physical activity. We aimed to report the psychometric analysis of the Farsi version of the Physical Activity and Leisure Motivation Scale (PALMS).
METHODS
The Farsi version of PALMS was compl... |
6570489a6294a5845adfd195a50a226f78a139c1 | An extended online purchase intention model for middle-aged online users | This article focuses on examining the determinants and mediators of the purchase intention of nononline purchasers between ages 31 and 60 who mostly have strong purchasing power. It propose anew online purchase intention model by integrating the technology acceptance model with additional determinants and adding habitu... |
a42569c671b5f9d0fe2007af55199d668dae491b | Fine-grained Concept Linking using Neural Networks in Healthcare | To unlock the wealth of the healthcare data, we often need to link the real-world text snippets to the referred medical concepts described by the canonical descriptions. However, existing healthcare concept linking methods, such as dictionary-based and simple machine learning methods, are not effective due to the word ... |
5fb1285e05bbd78d0094fe8061c644ea09d9da8d | Double-spending fast payments in bitcoin | Bitcoin is a decentralized payment system that relies on Proof-of-Work (PoW) to verify payments. Nowadays, Bitcoin is increasingly used in a number of fast payment scenarios, where the time between the exchange of currency and goods is short (in the order of few seconds). While the Bitcoin payment verification scheme i... |
d2920567fb66bc69d92ab2208f6455e37ce6138b | Disruptive Innovation : Removing the Innovators ’ Dilemma | The objectives of this research are to co-create understanding and knowledge on the phenomenon of disruptive innovation in order to provide pragmatic clarity on the term’s meaning, impact and implications. This will address the academic audience’s gap in knowledge and provide help to practitioners wanting to understand... |
0dbed89ea3296f351eb986cc02678c7a33d50945 | A Combinatorial Noise Model for Quantum Computer Simulation | Quantum computers (QCs) have many potential hardware implementations ranging from solid-state silicon-based structures to electron-spin qubits on liquid helium. However, all QCs must contend with gate infidelity and qubit state decoherence over time. Quantum error correcting codes (QECCs) have been developed to protect... |
47f0455d65a0823c70ce7cce9749f3abd826e0a7 | Random Walk with Restart on Large Graphs Using Block Elimination | Given a large graph, how can we calculate the relevance between nodes fast and accurately? Random walk with restart (RWR) provides a good measure for this purpose and has been applied to diverse data mining applications including ranking, community detection, link prediction, and anomaly detection. Since calculating RW... |
1eff385c88fd1fdd1c03fd3fb573de2530b73f99 | OBJECTIVE SELF-AWARENESS THEORY : RECENT PROGRESS AND ENDURING PROBLEMS By : | Objective self-awareness theory has undergone fundamental changes in the 3 decades since Duval and Wicklund's (1972) original formulation. We review new evidence that bears on the basic tenets of the theory. Many of the assumptions of self-awareness theory require revision, particularly how expectancies influence appro... |
b0f16acfa4efce9c24100ec330b82fb8a28feeec | Reinforcement Learning in Continuous State and Action Spaces | Many traditional reinforcement-learning algorithms have been designed for problems with small finite state and action spaces. Learn ing in such discrete problems can been difficult, due to noise and delayed reinfor cements. However, many real-world problems have continuous state or action sp aces, which can make learni... |
b1b5646683557b38468344dff09ae921a5a4b345 | Comparison of CoAP and MQTT Performance Over Capillary Radios | The IoT protocols used in the application layer, namely the Constraint Application Protocol (CoAP) and Message Queue Telemetry Transport (MQTT) have dependencies to the transport layer. The choice of transport, Transmission Control Protocol (TCP) or the User Datagram Protocol(UDP), on the other hand, has an impact on t... |
6a2311d02aea97f7fe4e78c8bd2a53091364dc3b | Aesthetics and Entropy III . Aesthetic measures 2 | 1 Consultant, Maplewood, MN USA 4 * Correspondence: sahyun@infionline.net; 1-(651)-927-9686 5 6 Abstract: We examined a series of real-world, pictorial photographs with varying 7 characteristics, along with their modification by noise addition and unsharp masking. As 8 response metrics we used three different versions ... |
6fd62c67b281956c3f67eb53fafaea83b2f0b4fb | Taking perspective into account in a communicative task | Previous neuroimaging studies of spatial perspective taking have tended not to activate the brain's mentalising network. We predicted that a task that requires the use of perspective taking in a communicative context would lead to the activation of mentalising regions. In the current task, participants followed auditor... |
738f4d2137fc767b1802963b5e45a2216c27b77c | Churn Prediction : Does Technology Matter ? | The aim of this paper is to identify the most suitable model for churn prediction based on three different techniques. The paper identifies the variables that affect churn in reverence of customer complaints data and provides a comparative analysis of neural networks, regression trees and regression in their capabiliti... |
090a6772a1d69f07bfe7e89f99934294a0dac1b9 | Two Modifications of CNN | |
32f7aef5c13c715b00b966eaaba5dd2fe35df1a4 | Bayesian network classifiers for identifying the slope of the customer lifecycle of long-life customers | Undoubtedly, Customer Relationship Management (CRM) has gained its importance through the statement that acquiring a new customer is several times more costly than retaining and selling additional products to existing customers. Consequently, marketing practitioners are currently often focusing on retaining customers f... |
25519ce6a924f5890180eacfa6e66203048f5dd1 | Big Data : New Tricks for Econometrics | 5 Nowadays computers are in the middle of most economic transactions. 6 These “computer-mediated transactions” generate huge amounts of 7 data, and new tools can be used to manipulate and analyze this data. 8 This essay offers a brief introduction to some of these tools and meth9 ods. 10 Computers are now involved in m... |
d7ab41adebaec9272c2797512a021482a594d040 | DevOps for Developers | ed descriptions of machines by using a DSL while enjoying the full power of scripting languages (in both Puppet and Chef, you can describe behavior in the Ruby language (a dynamic, general-purpose object-oriented programming language), see http://www.ruby-lang. org/en/). Declarative descriptions of target behavior (i.e... |
ef51ff88c525751e2d09f245a3bedc40cf364961 | Breaking CAPTCHAs on the Dark Web 11 February , 2018 | On the Dark Web, several websites inhibit automated scraping attempts by employing CAPTCHAs. Scraping important content from a website is possible if these CAPTCHAs are solved by a web scraper. For this purpose, a Machine Learning tool is used, TensorFlow and an Optical Character Recognition tool, Tesseract to solve si... |
8f6c14f6743d8f9a8ab0be99a50fb51a123ab62c | Document Image Binarization Using Recurrent Neural Networks | In the context of document image analysis, image binarization is an important preprocessing step for other document analysis algorithms, but also relevant on its own by improving the readability of images of historical documents. While historical document image binarization is challenging due to common image degradatio... |
3ddac15bd47bc0745db4297d30be71af43adf0bb | Greed is good: Approximating independent sets in sparse and bounded-degree graphs | Theminimum-degree greedy algorithm, or Greedy for short, is a simple and well-studied method for finding independent sets in graphs. We show that it achieves a performance ratio of (Δ+2)/3 for approximating independent sets in graphs with degree bounded by Δ. The analysis yields a precise characterization of the size o... |
f07fd927971c40261dd7cef1ad6d2360b23fe294 | A greedy approach to sparse canonical correlation analysis | We consider the problem of sparse canonical correlation analysis (CCA), i.e., the search for two linear combi nations, one for each multivariate, that yield maximum correlation using a specified number of variables. We propose an efficient numeri cal approximation based on a direct greedy approach which bound s the cor... |
a742d81416a1da97af53e0a9748c16f37fd61b40 | Blood Code: The History and Future of Video Game Censorship | INTRODUCTION ................................................................................... 571 I. FIRST AMENDMENT BACKGROUND ....................................... 573 II. THE ANALOGOUS HISTORIES OF FILMS AND VIDEO GAMES ....................................................................................... 576 ... |
b5f6ee9baa07301bba6e187bd9380686a72866c6 | Networks of the Brain | Models of Network Growth All networks, whether they are social, technological, or biological, are the result of a growth process. Many of these networks continue to grow for prolonged periods of time, continually modifying their connectivity structure throughout their entire existence. For example, the World Wide Web h... |
d0eab53a6b20bfca924b85fcfb0ee76bfde6d4ef | Comparative Analysis of ADS-B Verification Techniques | ADS-B is one of many Federal Aviation Administration (FAA) regulated technologies used to monitor air traffic with high precision, while reducing dependencies on dated and costly radar equipment [1]. The FAA hopes to decrease the separation between aircraft, reduce risk of collision as air traffic density increases, sa... |
e33b9ee3c575c6a38b873888e796d29f59d98e04 | Heart-Brain Neurodynamics : The Making of Emotions | As pervasive and vital as they are in human experience, emotions have long remained an enigma to science. This monograph explores recent scientific advances that clarify central controversies in the study of emotion, including the relationship between intellect and emotion, and the historical debate on the source of em... |
486eb944129e0d90a7d2ef8d6085fd482c9be6c5 | Correctness By Construction: Better Can Also Be Cheaper | I n December 1999 CrossTalk [3], David Cook provided a well-reasoned historical analysis of programming language development and considered the role languages play in the software development process. The article was valuable because it showed that programming language developments are not sufficient to ensure success;... |
89a3c09e0a4c54f89a7237be92d3385116030efc | Phishing Detection Taxonomy for Mobile Device | Phishing is one of the social engineering attacks and currently hit on mobile devices. Based on security report by Lookout [1], 30% of Lookout users clicking on an unsafe link per year by using mobile device. Few phishing detection techniques have been applied on mobile device. However, review on phishing detection tec... |
585654039c441a15cdda936902f0f1f9b7498a89 | Gold Fingers: 3D Targets for Evaluating Capacitive Readers | With capacitive fingerprint readers being increasingly used for access control as well as for smartphone unlock and payments, there is a growing interest among metrology agencies (e.g., the National Institute of Standards and Technology) to develop standard artifacts (targets) and procedures for repeatable evaluation o... |
c1cd441dad61b9d9d294a19a7043adb1582f786b | Speech recognition using factorial hidden Markov models for separation in the feature space | This paper proposes an algorithm for the recognition and separation of speech signals in non-stationary noise, such as another speaker. We present a method to combine hidden Markov models (HMMs) trained for the speech and noise into a factorial HMM to model the mixture signal. Robustness is obtained by separating the s... |
ecd4bc32bb2717c96f76dd100fcd1255a07bd656 | Roles of Pre-Training and Fine-Tuning in Context-Dependent DBN-HMMs for Real-World Speech Recognition | Recently, deep learning techniques have been successfully applied to automatic speech recognition tasks -first to phonetic recognition with context-independent deep belief network (DBN) hidden Markov models (HMMs) and later to large vocabulary continuous speech recognition using context-dependent (CD) DBN-HMMs. In this... |
0286bef6d6da7990a2c50aefd5543df2ce481fbb | Combinatorial Pure Exploration of Multi-Armed Bandits | We study the combinatorial pure exploration (CPE) problem in the stochastic multi-armed bandit setting, where a learner explores a set of arms with the objective of identifying the optimal member of a decision class, which is a collection of subsets of arms with certain combinatorial structures such as size-K subsets, ... |
b8759b1ea437802d9a1c2a99d22932a960b7beec | Firewall Security: Policies, Testing and Performance Evaluation | This paper explores the firewall security and performance relationship for distributed systems. Experiments are conducted to set firewall security into seven different levels and to quantify their performance impacts. These firewall security levels are formulated, designed, implemented, and tested phase by phase under ... |
d87ceda3042f781c341ac17109d1e94a717f5f60 | WordNet : an electronic lexical database | WordNet is perhaps the most important and widely used lexical resource for natural language processing systems up to now. WordNet: An Electronic Lexical Database, edited by Christiane Fellbaum, discusses the design of WordNet from both theoretical and historical perspectives, provides an up-to-date description of the l... |
scidocs (Decontaminated)
A decontaminated version of the scidocs dataset from the BEIR benchmark, with samples found in the mgte-en pre-training dataset removed.
Decontamination methodology
Contamination was detected using a two-pass approach against the full mgte-en dataset (484 GB, 1,235 parquet files):
Pass 1: Exact hash matching
All texts (queries and corpus documents) were normalized (lowercased, unicode NFKD, whitespace collapsed) and hashed with xxHash-64. The same normalization + hashing was applied to every query and document field in mgte-en. Any sample whose hash appeared in mgte-en was flagged as contaminated.
Pass 2: 13-gram containment (GPT-3 style)
Following the methodology introduced in the GPT-3 paper (Brown et al., 2020), word-level 13-grams were extracted from all remaining samples. For each sample, containment was computed as:
containment = |ngrams_in_sample ∩ ngrams_in_mgte| / |ngrams_in_sample|
Samples with containment >= 0.5 were flagged as near-duplicates.
Qrels filtering
Relevance judgments (qrels) referencing any removed query or corpus document were also removed.
Decontamination results
| Component | Original | Clean | Removed |
|---|---|---|---|
| Corpus | 25,657 | 5,833 | 19,824 |
| Queries | 1,000 | 201 | 799 |
Qrels per split
| Split | Original | Clean | Removed |
|---|---|---|---|
| test | 29,928 | 1,373 | 28,555 |
Usage
from datasets import load_dataset
corpus = load_dataset("lightonai/scidocs-decontaminated", "corpus", split="corpus")
queries = load_dataset("lightonai/scidocs-decontaminated", "queries", split="queries")
Citation
Please cite the original BEIR benchmark:
@inproceedings{thakur2021beir,
title={BEIR: A Heterogeneous Benchmark for Zero-shot Evaluation of Information Retrieval Models},
author={Thakur, Nandan and Reimers, Nils and Rücklé, Andreas and Srivastava, Abhishek and Gurevych, Irena},
booktitle={NeurIPS Datasets and Benchmarks},
year={2021}
}
License
MIT (same as original BEIR)
- Downloads last month
- 18