3,561 research outputs found

    Tracking Discrete and Continuous Entity State for Process Understanding

    Full text link
    Procedural text, which describes entities and their interactions as they undergo some process, depicts entities in a uniquely nuanced way. First, each entity may have some observable discrete attributes, such as its state or location; modeling these involves imposing global structure and enforcing consistency. Second, an entity may have properties which are not made explicit but can be effectively induced and tracked by neural networks. In this paper, we propose a structured neural architecture that reflects this dual nature of entity evolution. The model tracks each entity recurrently, updating its hidden continuous representation at each step to contain relevant state information. The global discrete state structure is explicitly modeled with a neural CRF over the changing hidden representation of the entity. This CRF can explicitly capture constraints on entity states over time, enforcing that, for example, an entity cannot move to a location after it is destroyed. We evaluate the performance of our proposed model on QA tasks over process paragraphs in the ProPara dataset and find that our model achieves state-of-the-art results.Comment: 5 page

    Improved Local Search Based Approximation Algorithm for Hard Uniform Capacitated k-Median Problem

    Full text link
    In this paper, we study the hard uniform capacitated kk- median problem using local search heuristic. Obtaining a constant factor approximation for the \ckm problem is open. All the existing solutions giving constant-factor approximation, violate at least one of the cardinality and the capacity constraints. All except Koruplou et al are based on LP-relaxation. We give (3+ϵ)(3+\epsilon) factor approximation algorithm for the problem violating the cardinality by a factor of 8/32.678/3 \approx 2.67. There is a trade-off between the approximation factor and the cardinality violation between our work and the existing work. Koruplou et al gave (1+α)(1 + \alpha) approximation factor with (5+5/α)(5 + 5/\alpha) factor loss in cardinality using local search paradigm. Though the approximation factor can be made arbitrarily small, cardinality loss is at least 55. On the other hand, we improve upon the results in [capkmGijswijtL2013],[capkmshili2014], [Lisoda2016] in terms of factor-loss though the cardinality loss is more in our case. Also, these results are obtained using LP-rounding, some of them being strengthened, whereas local search techniques are simple to apply and have been shown to perform well in practice via empirical studies. We extend the result to hard uniform capacitated kk-median with penalties. To the best of our knowledge, ours is the first result for the problem.Comment: 22 pages including bibliograph

    Constant factor Approximation Algorithms for Uniform Hard Capacitated Facility Location Problems: Natural LP is not too bad

    Full text link
    In this paper, we give first constant factor approximation for capacitated knapsack median problem (CKM) for hard uniform capacities, violating the budget only by an additive factor of fmaxf_{max} where fmaxf_{max} is the maximum cost of a facility opened by the optimal and violating capacities by (2+ϵ)(2+\epsilon) factor. Natural LP for the problem is known to have an unbounded integrality gap when any one of the two constraints is allowed to be violated by a factor less than 22. Thus, we present a result which is very close to the best achievable from the natural LP. To the best of our knowledge, the problem has not been studied earlier. For capacitated facility location problem with uniform capacities, a constant factor approximation algorithm is presented violating the capacities a little (1+ϵ1 + \epsilon). Though constant factor results are known for the problem without violating the capacities, the result is interesting as it is obtained by rounding the solution to the natural LP, which is known to have an unbounded integrality gap without violating the capacities. Thus, we achieve the best possible from the natural LP for the problem. The result shows that natural LP is not too bad. Finally, we raise some issues with the proofs of the results presented in~\cite{capkmByrkaFRS2013} for capacitated kk-facility location problem (CkkFLP).~\cite{capkmByrkaFRS2013} presents O(1/ϵ2)O(1/\epsilon^2) approximation violating the capacities by a factor of (2+ϵ)(2 + \epsilon) using dependent rounding. We first fix these issues using our techniques. Also, it can be argued that (deterministic) pipage rounding cannot be used to open the facilities instead of dependent rounding. Our techniques for CKM provide a constant factor approximation for CkFLP violating the capacities by (2+ϵ)(2 + \epsilon)

    Modeling and Analysis of Walking Pattern for a Biped Robot

    Full text link
    This paper addresses the design and development of an autonomous biped robot using master and worker combination of controllers. In addition, the bot is wirelessly controllable. The work presented here explains the walking pattern, system control and actuator control techniques for 10 Degree of Freedom (DOF) biped humanoid. Bi-pedal robots have better mobility than conventional wheeled robots, but they tend to topple easily. In order to walk stably in various environments, such as on rough terrain, up and down slopes, or in regions containing obstacles, it is necessary, that robot should adapt to the ground conditions with a foot motion, as well as maintain its stability with a torso motion. It is desirable to select a walking pattern that requires small torque and velocity of the joint actuators. The work proposed a low cost solution using open source hardware-software and application. The work extends to develop and implement new algorithms by adding gyroscope and accelerometer to further the research in the field of biped robots

    A Partial Order Reduction Technique for Event-driven Multi-threaded Programs

    Full text link
    Event-driven multi-threaded programming is fast becoming a preferred style of developing efficient and responsive applications. In this concurrency model, multiple threads execute concurrently, communicating through shared objects as well as by posting asynchronous events that are executed in their order of arrival. In this work, we consider partial order reduction (POR) for event-driven multi-threaded programs. The existing POR techniques treat event queues associated with threads as shared objects and thereby, reorder every pair of events handled on the same thread even if reordering them does not lead to different states. We do not treat event queues as shared objects and propose a new POR technique based on a novel backtracking set called the dependence-covering set. Events handled by the same thread are reordered by our POR technique only if necessary. We prove that exploring dependence-covering sets suffices to detect all deadlock cycles and assertion violations defined over local variables. To evaluate effectiveness of our POR scheme, we have implemented a dynamic algorithm to compute dependence-covering sets. On execution traces obtained from a few Android applications, we demonstrate that our technique explores many fewer transitions ---often orders of magnitude fewer--- compared to exploration based on persistent sets, wherein, event queues are considered as shared objects.Comment: 35 pages, 20 figures, 2 table

    Acoustic Features Fusion using Attentive Multi-channel Deep Architecture

    Full text link
    In this paper, we present a novel deep fusion architecture for audio classification tasks. The multi-channel model presented is formed using deep convolution layers where different acoustic features are passed through each channel. To enable dissemination of information across the channels, we introduce attention feature maps that aid in the alignment of frames. The output of each channel is merged using interaction parameters that non-linearly aggregate the representative features. Finally, we evaluate the performance of the proposed architecture on three benchmark datasets:- DCASE-2016 and LITIS Rouen (acoustic scene recognition), and CHiME-Home (tagging). Our experimental results suggest that the architecture presented outperforms the standard baselines and achieves outstanding performance on the task of acoustic scene recognition and audio tagging.Comment: Accepted in CHiME'18 (Interspeech Workshop

    Deep Reinforcement Learning for Programming Language Correction

    Full text link
    Novice programmers often struggle with the formal syntax of programming languages. To assist them, we design a novel programming language correction framework amenable to reinforcement learning. The framework allows an agent to mimic human actions for text navigation and editing. We demonstrate that the agent can be trained through self-exploration directly from the raw input, that is, program text itself, without any knowledge of the formal syntax of the programming language. We leverage expert demonstrations for one tenth of the training data to accelerate training. The proposed technique is evaluated on 6975 erroneous C programs with typographic errors, written by students during an introductory programming course. Our technique fixes 14% more programs and 29% more compiler error messages relative to those fixed by a state-of-the-art tool, DeepFix, which uses a fully supervised neural machine translation approach

    Deep Learning for Bug-Localization in Student Programs

    Full text link
    Providing feedback is an integral part of teaching. Most open online courses on programming make use of automated grading systems to support programming assignments and give real-time feedback. These systems usually rely on test results to quantify the programs' functional correctness. They return failing tests to the students as feedback. However, students may find it difficult to debug their programs if they receive no hints about where the bug is and how to fix it. In this work, we present the first deep learning based technique that can localize bugs in a faulty program w.r.t. a failing test, without even running the program. At the heart of our technique is a novel tree convolutional neural network which is trained to predict whether a program passes or fails a given test. To localize the bugs, we analyze the trained network using a state-of-the-art neural prediction attribution technique and see which lines of the programs make it predict the test outcomes. Our experiments show that the proposed technique is generally more accurate than two state-of-the-art program-spectrum based and one syntactic difference based bug-localization baselines

    Ingesting High-Velocity Streaming Graphs from Social Media Sources

    Full text link
    Many data science applications like social network analysis use graphs as their primary form of data. However, acquiring graph-structured data from social media presents some interesting challenges. The first challenge is the high data velocity and bursty nature of the social media data. The second challenge is that the complex nature of the data makes the ingestion process expensive. If we want to store the streaming graph data in a graph database, we face a third challenge -- the database is very often unable to sustain the ingestion of high-velocity, high-burst data. We have developed an adaptive buffering mechanism and a graph compression technique that effectively mitigates the problem. A novel aspect of our method is that the adaptive buffering algorithm uses the data rate, the data content as well as the CPU resources of the database machine to determine an optimal data ingestion mechanism. We further show that an ingestion-time graph-compression strategy improves the efficiency of the data ingestion into the database. We have verified the efficacy of our ingestion optimization strategy through extensive experiments

    BrainSegNet : A Segmentation Network for Human Brain Fiber Tractography Data into Anatomically Meaningful Clusters

    Full text link
    The segregation of brain fiber tractography data into distinct and anatomically meaningful clusters can help to comprehend the complex brain structure and early investigation and management of various neural disorders. We propose a novel stacked bidirectional long short-term memory(LSTM) based segmentation network, (BrainSegNet) for human brain fiber tractography data classification. We perform a two-level hierarchical classification a) White vs Grey matter (Macro) and b) White matter clusters (Micro). BrainSegNet is trained over three brain tractography data having over 250,000 fibers each. Our experimental evaluation shows that our model achieves state-of-the-art results. We have performed inter as well as intra class testing over three patient's brain tractography data and achieved a high classification accuracy for both macro and micro levels both under intra as well as inter brain testing scenario.Comment: Deep Learning in Irregular Domains - British Machine Vision Conference (DLID-BMVC
    corecore