2,130 research outputs found

    2 + 1 Highways: Overview and Future Directions

    Get PDF
    Most of the rural transportation system is composed of two-lane highways, and many of them serve as the primary means for rural access to urban areas and freeways. In some highways, traffic volumes can be not high enough to justify a four-lane highway but higher than can be served by isolated passing lanes, or can present high number of head-on collisions. In those conditions, 2 + 1 highways are potentially applicable. This type of highway is used to provide high-performance highways as intermediate solution between the common two-lane highway and the freeway. Successful experiences reported in Germany, Sweden, Finland, Poland, or Texas (US) may suggest that they are potentially applicable in other countries. The objective of this white paper is to provide an overview of the past practice in 2 + 1 highways and discuss the research directions and challenges in this field, specially focusing on, but not limited to, operational research in association with the activities of the Subcommittee on Two-Lane Highways (AHB40 2.2) of the Transportation Research Board. The significance of this paper is twofold: (1) it provides wider coverage of past 2 + 1 highways design and evaluation, and (2) it discusses future directions of this field.The authors wish to thank the Fundación Agustín de Betancourt from the Universidad Politécnica de Cartagena for funding the research

    Unsupervised Sense-Aware Hypernymy Extraction

    Full text link
    In this paper, we show how unsupervised sense representations can be used to improve hypernymy extraction. We present a method for extracting disambiguated hypernymy relationships that propagates hypernyms to sets of synonyms (synsets), constructs embeddings for these sets, and establishes sense-aware relationships between matching synsets. Evaluation on two gold standard datasets for English and Russian shows that the method successfully recognizes hypernymy relationships that cannot be found with standard Hearst patterns and Wiktionary datasets for the respective languages.Comment: In Proceedings of the 14th Conference on Natural Language Processing (KONVENS 2018). Vienna, Austri

    Overview of PAN 2018. Author identification, author profiling, and author obfuscation

    Full text link
    [EN] PAN 2018 explores several authorship analysis tasks enabling a systematic comparison of competitive approaches and advancing research in digital text forensics.More specifically, this edition of PAN introduces a shared task in cross-domain authorship attribution, where texts of known and unknown authorship belong to distinct domains, and another task in style change detection that distinguishes between single author and multi-author texts. In addition, a shared task in multimodal author profiling examines, for the first time, a combination of information from both texts and images posted by social media users to estimate their gender. Finally, the author obfuscation task studies how a text by a certain author can be paraphrased so that existing author identification tools are confused and cannot recognize the similarity with other texts of the same author. New corpora have been built to support these shared tasks. A relatively large number of software submissions (41 in total) was received and evaluated. Best paradigms are highlighted while baselines indicate the pros and cons of submitted approaches.The work at the Universitat Polit`ecnica de Val`encia was funded by the MINECO research project SomEMBED (TIN2015-71147-C2-1-P)Stamatatos, E.; Rangel-Pardo, FM.; Tschuggnall, M.; Stein, B.; Kestemont, M.; Rosso, P.; Potthast, M. (2018). Overview of PAN 2018. Author identification, author profiling, and author obfuscation. Lecture Notes in Computer Science. 11018:267-285. https://doi.org/10.1007/978-3-319-98932-7_25S26728511018Argamon, S., Juola, P.: Overview of the international authorship identification competition at PAN-2011. In: Petras, V., Forner, P., Clough, P. (eds.) Notebook Papers of CLEF 2011 Labs and Workshops, 19–22 September 2011, Amsterdam, Netherlands, September 2011. http://www.clef-initiative.eu/publication/working-notesBird, S., Klein, E., Loper, E.: Natural Language Processing with Python. O’Reilly Media, Sebastopol (2009)Bogdanova, D., Lazaridou, A.: Cross-language authorship attribution. In: Proceedings of the 9th International Conference on Language Resources and Evaluation, LREC 2014, pp. 2015–2020 (2014)Choi, F.Y.: Advances in domain independent linear text segmentation. In: Proceedings of the 1st North American Chapter of the Association for Computational Linguistics Conference (NAACL), pp. 26–33. Association for Computational Linguistics, Seattle, April 2000Custódio, J.E., Paraboni, I.: EACH-USP ensemble cross-domain authorship attribution. In: Working Notes Papers of the CLEF 2018 Evaluation Labs, September 2018, to be announcedDaneshvar, S.: Gender identification in Twitter using n-grams and LSA. In: Working Notes Papers of the CLEF 2018 Evaluation Labs, September 2018, to be announcedDaniel Karaś, M.S., Sobecki, P.: OPI-JSA at CLEF 2017: author clustering and style breach detection. In: Working Notes Papers of the CLEF 2017 Evaluation Labs. CEUR Workshop Proceedings. CLEF and CEUR-WS.org, September 2017Giannella, C.: An improved algorithm for unsupervised decomposition of a multi-author document. The MITRE Corporation. Technical Papers, February 2014Glover, A., Hirst, G.: Detecting stylistic inconsistencies in collaborative writing. In: Sharples, M., van der Geest, T. (eds.) The New Writing Environment, pp. 147–168. Springer, London (1996). https://doi.org/10.1007/978-1-4471-1482-6_12Hagen, M., Potthast, M., Stein, B.: Overview of the author obfuscation task at PAN 2017: safety evaluation revisited. In: Cappellato, L., Ferro, N., Goeuriot, L., Mandl, T. (eds.) Working Notes Papers of the CLEF 2017 Evaluation Labs. CEUR Workshop Proceedings, CLEF and CEUR-WS.org, September 2017Hagen, M., Potthast, M., Stein, B.: Overview of the author obfuscation task at PAN 2018. In: Working Notes Papers of the CLEF 2018 Evaluation Labs. CEUR Workshop Proceedings, CLEF and CEUR-WS.org (2018)Hellekson, K., Busse, K. (eds.): The Fan Fiction Studies Reader. University of Iowa Press, Iowa City (2014)Juola, P.: An overview of the traditional authorship attribution subtask. In: Forner, P., Karlgren, J., Womser-Hacker, C. (eds.) CLEF 2012 Evaluation Labs and Workshop - Working Notes Papers, 17–20 September 2012, Rome, Italy, September 2012. http://www.clef-initiative.eu/publication/working-notesJuola, P.: The rowling case: a proposed standard analytic protocol for authorship questions. Digital Sch. Humanit. 30(suppl–1), i100–i113 (2015)Kestemont, M., Luyckx, K., Daelemans, W., Crombez, T.: Cross-genre authorship verification using unmasking. Engl. Stud. 93(3), 340–356 (2012)Kestemont, M., et al.: Overview of the author identification task at PAN-2018: cross-domain authorship attribution and style change detection. In: Working Notes Papers of the CLEF 2018 Evaluation Labs. CEUR Workshop Proceedings, CLEF and CEUR-WS.org (2018)Koppel, M., Schler, J., Bonchek-Dokow, E.: Measuring differentiability: unmasking pseudonymous authors. J. Mach. Learn. Res. 8, 1261–1276 (2007)Overdorf, R., Greenstadt, R.: Blogs, Twitter feeds, and reddit comments: cross-domain authorship attribution. Proc. Priv. Enhanc. Technol. 2016(3), 155–171 (2016)Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825–2830 (2011)Potthast, M., Eiselt, A., Barrón-Cedeño, A., Stein, B., Rosso, P.: Overview of the 3rd international competition on plagiarism detection. In: Notebook Papers of the 5th Evaluation Lab on Uncovering Plagiarism, Authorship and Social Software Misuse (PAN), Amsterdam, The Netherlands, September 2011Potthast, M., Hagen, M., Stein, B.: Author obfuscation: attacking the state of the art in authorship verification. In: Working Notes Papers of the CLEF 2016 Evaluation Labs. CEUR Workshop Proceedings, CLEF and CEUR-WS.org, September 2016. http://ceur-ws.org/Vol-1609/Potthast, M., Hagen, M., Völske, M., Stein, B.: Crowdsourcing interaction logs to understand text reuse from the web. In: Fung, P., Poesio, M. (eds.) Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics (ACL 2013), pp. 1212–1221. Association for Computational Linguistics, August 2013. http://www.aclweb.org/anthology/P13-1119Rangel, F., Celli, F., Rosso, P., Potthast, M., Stein, B., Daelemans, W.: Overview of the 3rd author profiling task at PAN 2015. In: Cappellato, L., Ferro, N., Jones, G., San Juan, E. (eds.) CLEF 2015 Evaluation Labs and Workshop - Working Notes Papers, Toulouse, France, pp. 8–11. CEUR-WS.org, September 2015Rangel, F., et al.: Overview of the 2nd author profiling task at PAN 2014. In: Cappellato, L., Ferro, N., Halvey, M., Kraaij, W. (eds.) CLEF 2014 Evaluation Labs and Workshop - Working Notes Papers, Sheffield, UK, pp. 15–18. CEUR-WS.org, September 2014Rangel, F., Rosso, P., G’omez, M.M., Potthast, M., Stein, B.: Overview of the 6th author profiling task at pan 2018: multimodal gender identification in Twitter. In: CLEF 2018 Labs and Workshops, Notebook Papers. CEUR Workshop Proceedings. CEUR-WS.org (2017)Rangel, F., Rosso, P., Koppel, M., Stamatatos, E., Inches, G.: Overview of the author profiling task at PAN 2013. In: Forner, P., Navigli, R., Tufis, D. (eds.) CLEF 2013 Evaluation Labs and Workshop - Working Notes Papers, 23–26 September 2013, Valencia, Spain, September 2013Rangel, F., Rosso, P., Potthast, M., Stein, B.: Overview of the 5th author profiling task at PAN 2017: gender and language variety identification in Twitter. In: Cappellato, L., Ferro, N., Goeuriot, L., Mandl, T. (eds.) Working Notes Papers of the CLEF 2017 Evaluation Labs. CEUR Workshop Proceedings, CLEF and CEUR-WS.org, September 2017Rangel, F., Rosso, P., Verhoeven, B., Daelemans, W., Potthast, M., Stein, B.: Overview of the 4th author profiling task at PAN 2016: cross-genre evaluations. In: Balog, K., Cappellato, L., Ferro, N., Macdonald, C. (eds.) CLEF 2016 Labs and Workshops, Notebook Papers. CEUR Workshop Proceedings. CEUR-WS.org, September 2016Safin, K., Kuznetsova, R.: Style breach detection with neural sentence embeddings. In: Working Notes Papers of the CLEF 2017 Evaluation Labs. CEUR Workshop Proceedings, CLEF and CEUR-WS.org, September 2017Sapkota, U., Bethard, S., Montes, M., Solorio, T.: Not all character n-grams are created equal: a study in authorship attribution. In: Proceedings of the 2015 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 93–102 (2015)Sapkota, U., Solorio, T., Montes, M., Bethard, S., Rosso, P.: Cross-topic authorship attribution: will out-of-topic data help? In: Proceedings of the 25th International Conference on Computational Linguistics. Technical Papers, pp. 1228–1237 (2014)Stamatatos, E.: Intrinsic plagiarism detection using character nnn-gram Profiles. In: Stein, B., Rosso, P., Stamatatos, E., Koppel, M., Agirre, E. (eds.) SEPLN 2009 Workshop on Uncovering Plagiarism, Authorship, and Social Software Misuse (PAN 2009), pp. 38–46. Universidad Politécnica de Valencia and CEUR-WS.org, September 2009. http://ceur-ws.org/Vol-502Stamatatos, E.: On the robustness of authorship attribution based on character n-gram features. J. Law Policy 21, 421–439 (2013)Stamatatos, E.: Authorship attribution using text distortion. In: Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics, Long Papers, vol. 1, pp. 1138–1149. Association for Computational Linguistics (2017)Stamatatos, E., et al.: Overview of the author identification task at PAN 2015. In: Cappellato, L., Ferro, N., Jones, G., San Juan, E. (eds.) CLEF 2015 Evaluation Labs and Workshop - Working Notes Papers, 8–11 September 2015, Toulouse, France. CEUR-WS.org, September 2015Stamatatos, E., et al.: Clustering by authorship within and across documents. In: Working Notes Papers of the CLEF 2016 Evaluation Labs. CEUR Workshop Proceedings, CLEF and CEUR-WS.org, September 2016. http://ceur-ws.org/Vol-1609/Takahashi, T., Tahara, T., Nagatani, K., Miura, Y., Taniguchi, T., Ohkuma, T.: Text and image synergy with feature cross technique for gender identification. In: Working Notes Papers of the CLEF 2018 Evaluation Labs, September 2018, to be announcedTellez, E.S., Miranda-Jiménez, S., Moctezuma, D., Graff, M., Salgado, V., Ortiz-Bejar, J.: Gender identification through multi-modal tweet analysis using microtc and bag of visual words. In: Working Notes Papers of the CLEF 2018 Evaluation Labs, September 2018, to be announcedTschuggnall, M., Specht, G.: Automatic decomposition of multi-author documents using grammar analysis. In: Proceedings of the 26th GI-Workshop on Grundlagen von Datenbanken. CEUR-WS, Bozen, October 2014Tschuggnall, M., et al.: Overview of the author identification task at PAN-2017: style breach detection and author clustering. In: Cappellato, L., Ferro, N., Goeuriot, L., Mandl, T. (eds.) Working Notes Papers of the CLEF 2017 Evaluation Labs. CEUR Workshop Proceedings, vol. 1866. CLEF and CEUR-WS.org, September 2017. http://ceur-ws.org/Vol-1866

    Ghent University-Department of Textiles: annual report 2013

    Get PDF

    Wireless sensor networks with energy harvesting: Modeling and simulation based on a practical architecture using real radiation levels

    Full text link
    This paper presents a new energy-harvesting model for a network simulator that implements super-capacitor energy storage with solar energy-harvesting recharge. The model is easily extensible, and other energyharvesting systems, or different energy storages, can be further developed. Moreover, code can be conveniently reused as the implementation is entirely uncoupled from the radio and node models. Real radiation data are obtained from available online databases in order to dynamically calculate super-capacitor charge and discharge. Such novelty enables the evaluation of energy evolution on a network of sensor nodes at various physical world locations and during different seasons. The model is validated against a real and fully working prototype, and good result correlation is shown. Furthermore, various experiments using the ns-3 simulator were conducted, demonstrating the utility of the model in assisting the research and development of the deployment of everlasting wireless sensor networks.This work was supported by the CICYT (research projects CTM2011-29691-C02-01 and TIN2011-28435-C03-01) and UPV research project SP20120889.Climent, S.; Sánchez Matías, AM.; Blanc Clavero, S.; Capella Hernández, JV.; Ors Carot, R. (2013). Wireless sensor networks with energy harvesting: Modeling and simulation based on a practical architecture using real radiation levels. Concurrency and Computation: Practice and Experience. 1-19. https://doi.org/10.1002/cpe.3151S119Akyildiz, I. F., & Vuran, M. C. (2010). Wireless Sensor Networks. doi:10.1002/9780470515181Seah, W. K. G., Tan, Y. K., & Chan, A. T. S. (2012). Research in Energy Harvesting Wireless Sensor Networks and the Challenges Ahead. Autonomous Sensor Networks, 73-93. doi:10.1007/5346_2012_27Vullers, R., Schaijk, R., Visser, H., Penders, J., & Hoof, C. (2010). Energy Harvesting for Autonomous Wireless Sensor Networks. IEEE Solid-State Circuits Magazine, 2(2), 29-38. doi:10.1109/mssc.2010.936667Ammar, Y., Buhrig, A., Marzencki, M., Charlot, B., Basrour, S., Matou, K., & Renaudin, M. (2005). Wireless sensor network node with asynchronous architecture and vibration harvesting micro power generator. Proceedings of the 2005 joint conference on Smart objects and ambient intelligence innovative context-aware services: usages and technologies - sOc-EUSAI ’05. doi:10.1145/1107548.1107618Vijayaraghavan, K., & Rajamani, R. (2007). Active Control Based Energy Harvesting for Battery-Less Wireless Traffic Sensors. 2007 American Control Conference. doi:10.1109/acc.2007.4282842Bottner, H., Nurnus, J., Gavrikov, A., Kuhner, G., Jagle, M., Kunzel, C., … Schlereth, K.-H. (2004). New thermoelectric components using microsystem technologies. Journal of Microelectromechanical Systems, 13(3), 414-420. doi:10.1109/jmems.2004.828740Mateu L Codrea C Lucas N Pollak M Spies P Energy harvesting for wireless communication systems using thermogenerators Conference on Design of Circuits and Integrated Systems (DCIS) 2006AEMet Agencia Estatal de Meteorolgía 2013 http//www.aemet.esPANGAEA Data Publisher for Earth & Environmental Science 2013 http://www.pangaea.de/Zeng, K., Ren, K., Lou, W., & Moran, P. J. (2007). Energy aware efficient geographic routing in lossy wireless sensor networks with environmental energy supply. Wireless Networks, 15(1), 39-51. doi:10.1007/s11276-007-0022-0Hasenfratz, D., Meier, A., Moser, C., Chen, J.-J., & Thiele, L. (2010). Analysis, Comparison, and Optimization of Routing Protocols for Energy Harvesting Wireless Sensor Networks. 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. doi:10.1109/sutc.2010.35Noh, D. K., & Hur, J. (2012). Using a dynamic backbone for efficient data delivery in solar-powered WSNs. Journal of Network and Computer Applications, 35(4), 1277-1284. doi:10.1016/j.jnca.2012.01.012Lin, L., Shroff, N. B., & Srikant, R. (2007). Asymptotically Optimal Energy-Aware Routing for Multihop Wireless Networks With Renewable Energy Sources. IEEE/ACM Transactions on Networking, 15(5), 1021-1034. doi:10.1109/tnet.2007.896173Ferry, N., Ducloyer, S., Julien, N., & Jutel, D. (2011). Power/Energy Estimator for Designing WSN Nodes with Ambient Energy Harvesting Feature. EURASIP Journal on Embedded Systems, 2011(1), 242386. doi:10.1155/2011/242386Glaser, J., Weber, D., Madani, S., & Mahlknecht, S. (2008). Power Aware Simulation Framework for Wireless Sensor Networks and Nodes. EURASIP Journal on Embedded Systems, 2008(1), 369178. doi:10.1155/2008/369178De Mil, P., Jooris, B., Tytgat, L., Catteeuw, R., Moerman, I., Demeester, P., & Kamerman, A. (2010). Design and Implementation of a Generic Energy-Harvesting Framework Applied to the Evaluation of a Large-Scale Electronic Shelf-Labeling Wireless Sensor Network. EURASIP Journal on Wireless Communications and Networking, 2010(1). doi:10.1155/2010/343690Castagnetti, A., Pegatoquet, A., Belleudy, C., & Auguin, M. (2012). A framework for modeling and simulating energy harvesting WSN nodes with efficient power management policies. EURASIP Journal on Embedded Systems, 2012(1). doi:10.1186/1687-3963-2012-8Alippi, C., & Galperti, C. (2008). An Adaptive System for Optimal Solar Energy Harvesting in Wireless Sensor Network Nodes. IEEE Transactions on Circuits and Systems I: Regular Papers, 55(6), 1742-1750. doi:10.1109/tcsi.2008.922023Xiaofan Jiang, Polastre, J., & Culler, D. (s. f.). Perpetual environmentally powered sensor networks. IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005. doi:10.1109/ipsn.2005.1440974Simjee, F., & Chou, P. H. (2006). Everlast. Proceedings of the 2006 international symposium on Low power electronics and design - ISLPED ’06. doi:10.1145/1165573.1165619Sánchez, A., Climent, S., Blanc, S., Capella, J. V., & Piqueras, I. (2011). WSN with energy-harvesting. Proceedings of the 6th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks - PM2HW2N ’11. doi:10.1145/2069087.2069091Renner C Jessen J Turau V Lifetime prediction for supercapacitor-powered wireless sensor nodes Proc. of the 8th GI/ITG KuVS Fachgesprächİ Drahtlose Sensornetze(FGSN09) 2009TI Analog, Embedded Processing, Semiconductor Company, Texas Instruments 2013 http//www.ti.comWSNVAL Wireless Sensor Networks Valencia 2013 www.wsnval.comSanchez, A., Blanc, S., Yuste, P., & Serrano, J. J. (2011). RFID Based Acoustic Wake-Up System for Underwater Sensor Networks. 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems. doi:10.1109/mass.2011.103Fan, K.-W., Zheng, Z., & Sinha, P. (2008). Steady and fair rate allocation for rechargeable sensors in perpetual sensor networks. Proceedings of the 6th ACM conference on Embedded network sensor systems - SenSys ’08. doi:10.1145/1460412.1460436Moser, C., Thiele, L., Brunelli, D., & Benini, L. (2010). Adaptive Power Management for Environmentally Powered Systems. IEEE Transactions on Computers, 59(4), 478-491. doi:10.1109/tc.2009.15

    Modeling Empathy and Distress in Reaction to News Stories

    Full text link
    Computational detection and understanding of empathy is an important factor in advancing human-computer interaction. Yet to date, text-based empathy prediction has the following major limitations: It underestimates the psychological complexity of the phenomenon, adheres to a weak notion of ground truth where empathic states are ascribed by third parties, and lacks a shared corpus. In contrast, this contribution presents the first publicly available gold standard for empathy prediction. It is constructed using a novel annotation methodology which reliably captures empathy assessments by the writer of a statement using multi-item scales. This is also the first computational work distinguishing between multiple forms of empathy, empathic concern, and personal distress, as recognized throughout psychology. Finally, we present experimental results for three different predictive models, of which a CNN performs the best.Comment: To appear at EMNLP 201
    • …
    corecore