3,561 research outputs found
Tracking Discrete and Continuous Entity State for Process Understanding
Procedural text, which describes entities and their interactions as they
undergo some process, depicts entities in a uniquely nuanced way. First, each
entity may have some observable discrete attributes, such as its state or
location; modeling these involves imposing global structure and enforcing
consistency. Second, an entity may have properties which are not made explicit
but can be effectively induced and tracked by neural networks. In this paper,
we propose a structured neural architecture that reflects this dual nature of
entity evolution. The model tracks each entity recurrently, updating its hidden
continuous representation at each step to contain relevant state information.
The global discrete state structure is explicitly modeled with a neural CRF
over the changing hidden representation of the entity. This CRF can explicitly
capture constraints on entity states over time, enforcing that, for example, an
entity cannot move to a location after it is destroyed. We evaluate the
performance of our proposed model on QA tasks over process paragraphs in the
ProPara dataset and find that our model achieves state-of-the-art results.Comment: 5 page
Improved Local Search Based Approximation Algorithm for Hard Uniform Capacitated k-Median Problem
In this paper, we study the hard uniform capacitated - median problem
using local search heuristic. Obtaining a constant factor approximation for the
\ckm problem is open. All the existing solutions giving constant-factor
approximation, violate at least one of the cardinality and the capacity
constraints. All except Koruplou et al are based on LP-relaxation.
We give factor approximation algorithm for the problem
violating the cardinality by a factor of . There is a
trade-off between the approximation factor and the cardinality violation
between our work and the existing work. Koruplou et al gave
approximation factor with factor loss in cardinality using
local search paradigm. Though the approximation factor can be made arbitrarily
small, cardinality loss is at least .
On the other hand, we improve upon the results in
[capkmGijswijtL2013],[capkmshili2014], [Lisoda2016] in terms of factor-loss
though the cardinality loss is more in our case. Also, these results are
obtained using LP-rounding, some of them being strengthened, whereas local
search techniques are simple to apply and have been shown to perform well in
practice via empirical studies.
We extend the result to hard uniform capacitated -median with penalties.
To the best of our knowledge, ours is the first result for the problem.Comment: 22 pages including bibliograph
Constant factor Approximation Algorithms for Uniform Hard Capacitated Facility Location Problems: Natural LP is not too bad
In this paper, we give first constant factor approximation for capacitated
knapsack median problem (CKM) for hard uniform capacities, violating the budget
only by an additive factor of where is the maximum cost of
a facility opened by the optimal and violating capacities by
factor. Natural LP for the problem is known to have an unbounded integrality
gap when any one of the two constraints is allowed to be violated by a factor
less than . Thus, we present a result which is very close to the best
achievable from the natural LP. To the best of our knowledge, the problem has
not been studied earlier.
For capacitated facility location problem with uniform capacities, a constant
factor approximation algorithm is presented violating the capacities a little
(). Though constant factor results are known for the problem
without violating the capacities, the result is interesting as it is obtained
by rounding the solution to the natural LP, which is known to have an unbounded
integrality gap without violating the capacities. Thus, we achieve the best
possible from the natural LP for the problem. The result shows that natural LP
is not too bad.
Finally, we raise some issues with the proofs of the results presented
in~\cite{capkmByrkaFRS2013} for capacitated -facility location problem
(CFLP).~\cite{capkmByrkaFRS2013} presents approximation
violating the capacities by a factor of using dependent
rounding. We first fix these issues using our techniques. Also, it can be
argued that (deterministic) pipage rounding cannot be used to open the
facilities instead of dependent rounding. Our techniques for CKM provide a
constant factor approximation for CkFLP violating the capacities by
Modeling and Analysis of Walking Pattern for a Biped Robot
This paper addresses the design and development of an autonomous biped robot
using master and worker combination of controllers. In addition, the bot is
wirelessly controllable. The work presented here explains the walking pattern,
system control and actuator control techniques for 10 Degree of Freedom (DOF)
biped humanoid. Bi-pedal robots have better mobility than conventional wheeled
robots, but they tend to topple easily. In order to walk stably in various
environments, such as on rough terrain, up and down slopes, or in regions
containing obstacles, it is necessary, that robot should adapt to the ground
conditions with a foot motion, as well as maintain its stability with a torso
motion. It is desirable to select a walking pattern that requires small torque
and velocity of the joint actuators. The work proposed a low cost solution
using open source hardware-software and application. The work extends to
develop and implement new algorithms by adding gyroscope and accelerometer to
further the research in the field of biped robots
A Partial Order Reduction Technique for Event-driven Multi-threaded Programs
Event-driven multi-threaded programming is fast becoming a preferred style of
developing efficient and responsive applications. In this concurrency model,
multiple threads execute concurrently, communicating through shared objects as
well as by posting asynchronous events that are executed in their order of
arrival. In this work, we consider partial order reduction (POR) for
event-driven multi-threaded programs. The existing POR techniques treat event
queues associated with threads as shared objects and thereby, reorder every
pair of events handled on the same thread even if reordering them does not lead
to different states. We do not treat event queues as shared objects and propose
a new POR technique based on a novel backtracking set called the
dependence-covering set. Events handled by the same thread are reordered by our
POR technique only if necessary. We prove that exploring dependence-covering
sets suffices to detect all deadlock cycles and assertion violations defined
over local variables. To evaluate effectiveness of our POR scheme, we have
implemented a dynamic algorithm to compute dependence-covering sets. On
execution traces obtained from a few Android applications, we demonstrate that
our technique explores many fewer transitions ---often orders of magnitude
fewer--- compared to exploration based on persistent sets, wherein, event
queues are considered as shared objects.Comment: 35 pages, 20 figures, 2 table
Acoustic Features Fusion using Attentive Multi-channel Deep Architecture
In this paper, we present a novel deep fusion architecture for audio
classification tasks. The multi-channel model presented is formed using deep
convolution layers where different acoustic features are passed through each
channel. To enable dissemination of information across the channels, we
introduce attention feature maps that aid in the alignment of frames. The
output of each channel is merged using interaction parameters that non-linearly
aggregate the representative features. Finally, we evaluate the performance of
the proposed architecture on three benchmark datasets:- DCASE-2016 and LITIS
Rouen (acoustic scene recognition), and CHiME-Home (tagging). Our experimental
results suggest that the architecture presented outperforms the standard
baselines and achieves outstanding performance on the task of acoustic scene
recognition and audio tagging.Comment: Accepted in CHiME'18 (Interspeech Workshop
Deep Reinforcement Learning for Programming Language Correction
Novice programmers often struggle with the formal syntax of programming
languages. To assist them, we design a novel programming language correction
framework amenable to reinforcement learning. The framework allows an agent to
mimic human actions for text navigation and editing. We demonstrate that the
agent can be trained through self-exploration directly from the raw input, that
is, program text itself, without any knowledge of the formal syntax of the
programming language. We leverage expert demonstrations for one tenth of the
training data to accelerate training. The proposed technique is evaluated on
6975 erroneous C programs with typographic errors, written by students during
an introductory programming course. Our technique fixes 14% more programs and
29% more compiler error messages relative to those fixed by a state-of-the-art
tool, DeepFix, which uses a fully supervised neural machine translation
approach
Deep Learning for Bug-Localization in Student Programs
Providing feedback is an integral part of teaching. Most open online courses
on programming make use of automated grading systems to support programming
assignments and give real-time feedback. These systems usually rely on test
results to quantify the programs' functional correctness. They return failing
tests to the students as feedback. However, students may find it difficult to
debug their programs if they receive no hints about where the bug is and how to
fix it. In this work, we present the first deep learning based technique that
can localize bugs in a faulty program w.r.t. a failing test, without even
running the program. At the heart of our technique is a novel tree
convolutional neural network which is trained to predict whether a program
passes or fails a given test. To localize the bugs, we analyze the trained
network using a state-of-the-art neural prediction attribution technique and
see which lines of the programs make it predict the test outcomes. Our
experiments show that the proposed technique is generally more accurate than
two state-of-the-art program-spectrum based and one syntactic difference based
bug-localization baselines
Ingesting High-Velocity Streaming Graphs from Social Media Sources
Many data science applications like social network analysis use graphs as
their primary form of data. However, acquiring graph-structured data from
social media presents some interesting challenges. The first challenge is the
high data velocity and bursty nature of the social media data. The second
challenge is that the complex nature of the data makes the ingestion process
expensive. If we want to store the streaming graph data in a graph database, we
face a third challenge -- the database is very often unable to sustain the
ingestion of high-velocity, high-burst data. We have developed an adaptive
buffering mechanism and a graph compression technique that effectively
mitigates the problem. A novel aspect of our method is that the adaptive
buffering algorithm uses the data rate, the data content as well as the CPU
resources of the database machine to determine an optimal data ingestion
mechanism. We further show that an ingestion-time graph-compression strategy
improves the efficiency of the data ingestion into the database. We have
verified the efficacy of our ingestion optimization strategy through extensive
experiments
BrainSegNet : A Segmentation Network for Human Brain Fiber Tractography Data into Anatomically Meaningful Clusters
The segregation of brain fiber tractography data into distinct and
anatomically meaningful clusters can help to comprehend the complex brain
structure and early investigation and management of various neural disorders.
We propose a novel stacked bidirectional long short-term memory(LSTM) based
segmentation network, (BrainSegNet) for human brain fiber tractography data
classification. We perform a two-level hierarchical classification a) White vs
Grey matter (Macro) and b) White matter clusters (Micro). BrainSegNet is
trained over three brain tractography data having over 250,000 fibers each. Our
experimental evaluation shows that our model achieves state-of-the-art results.
We have performed inter as well as intra class testing over three patient's
brain tractography data and achieved a high classification accuracy for both
macro and micro levels both under intra as well as inter brain testing
scenario.Comment: Deep Learning in Irregular Domains - British Machine Vision
Conference (DLID-BMVC
- …
