83 research outputs found

    TGSum: Build Tweet Guided Multi-Document Summarization Dataset

    Full text link
    The development of summarization research has been significantly hampered by the costly acquisition of reference summaries. This paper proposes an effective way to automatically collect large scales of news-related multi-document summaries with reference to social media's reactions. We utilize two types of social labels in tweets, i.e., hashtags and hyper-links. Hashtags are used to cluster documents into different topic sets. Also, a tweet with a hyper-link often highlights certain key points of the corresponding document. We synthesize a linked document cluster to form a reference summary which can cover most key points. To this aim, we adopt the ROUGE metrics to measure the coverage ratio, and develop an Integer Linear Programming solution to discover the sentence set reaching the upper bound of ROUGE. Since we allow summary sentences to be selected from both documents and high-quality tweets, the generated reference summaries could be abstractive. Both informativeness and readability of the collected summaries are verified by manual judgment. In addition, we train a Support Vector Regression summarizer on DUC generic multi-document summarization benchmarks. With the collected data as extra training resource, the performance of the summarizer improves a lot on all the test sets. We release this dataset for further research.Comment: 7 pages, 1 figure in AAAI 201

    Using Network Processor to Establish Security Agent for AODV Routing Protocol

    Get PDF
    Network Processor (NP) is optimized to perform special network functionalities. It has highly parallel processing architecture to achieve high performance. Ad hoc network is an exciting research aspect due to the characters of self-organization、 dynamically changing topology and temporary network life. However, all the characters make the security problem more serious. Denial-of-Service (DoS) attack is the main puzzle in the security of Ad hoc network. A novel NP-based security scheme is proposed to combat the attack in AODV routing protocol. Security agent is established by a hardware thread in NP. Agent can update itself at some interval by the trustworthiness of the neighbor nodes. Agent can trace the RREQ and RREP messages stream to aggregate the key information to link list and analyze them by intrusion detection algorithm. NS2 simulator is expanded to validate the security scheme. Simulation results show that NP-based security scheme is highly effective to detect and block DoS attack

    Update of the statements on biology and clinical impact of occult hepatitis B virus infection

    Get PDF
    Summary In October 2018 a large number of international experts with complementary expertise came together in Taormina to participate in a workshop on occult hepatitis B virus infection (OBI). The objectives of the workshop were to review the existing knowledge on OBI, to identify issues that require further investigation, to highlight both existing controversies and newly emerging perspectives, and ultimately to update the statements previously agreed in 2008. This paper represents the output from the workshop

    Characterization of Periplasmic Protein BP26 Epitopes of Brucella melitensis Reacting with Murine Monoclonal and Sheep Antibodies

    Get PDF
    More than 35,000 new cases of human brucellosis were reported in 2010 by the Chinese Center for Disease Control and Prevention. An attenuated B. melitensis vaccine M5-90 is currently used for vaccination of sheep and goats in China. In the study, a periplasmic protein BP26 from M5-90 was characterized for its epitope reactivity with mouse monoclonal and sheep antibodies. A total of 29 monoclonal antibodies (mAbs) against recombinant BP26 (rBP26) were produced, which were tested for reactivity with a panel of BP26 peptides, three truncated rBP26 and native BP26 containing membrane protein extracts (NMP) of B. melitensis M5-90 in ELISA and Western-Blot. The linear, semi-conformational and conformational epitopes from native BP26 were identified. Two linear epitopes recognized by mAbs were revealed by 28 of 16mer overlapping peptides, which were accurately mapped as the core motif of amino acid residues 93DRDLQTGGI101 (position 93 to 101) or residues 104QPIYVYPD111, respectively. The reactivity of linear epitope peptides, rBP26 and NMP was tested with 137 sheep sera by ELISAs, of which the two linear epitopes had 65–70% reactivity and NMP 90% consistent with the results of a combination of two standard serological tests. The results were helpful for evaluating the reactivity of BP26 antigen in M5-90
    corecore