50,720 research outputs found

    The TREC-2002 video track report

    Get PDF
    TREC-2002 saw the second running of the Video Track, the goal of which was to promote progress in content-based retrieval from digital video via open, metrics-based evaluation. The track used 73.3 hours of publicly available digital video (in MPEG-1/VCD format) downloaded by the participants directly from the Internet Archive (Prelinger Archives) (internetarchive, 2002) and some from the Open Video Project (Marchionini, 2001). The material comprised advertising, educational, industrial, and amateur films produced between the 1930's and the 1970's by corporations, nonprofit organizations, trade associations, community and interest groups, educational institutions, and individuals. 17 teams representing 5 companies and 12 universities - 4 from Asia, 9 from Europe, and 4 from the US - participated in one or more of three tasks in the 2001 video track: shot boundary determination, feature extraction, and search (manual or interactive). Results were scored by NIST using manually created truth data for shot boundary determination and manual assessment of feature extraction and search results. This paper is an introduction to, and an overview of, the track framework - the tasks, data, and measures - the approaches taken by the participating groups, the results, and issues regrading the evaluation. For detailed information about the approaches and results, the reader should see the various site reports in the final workshop proceedings

    Stacked Convolutional and Recurrent Neural Networks for Bird Audio Detection

    Full text link
    This paper studies the detection of bird calls in audio segments using stacked convolutional and recurrent neural networks. Data augmentation by blocks mixing and domain adaptation using a novel method of test mixing are proposed and evaluated in regard to making the method robust to unseen data. The contributions of two kinds of acoustic features (dominant frequency and log mel-band energy) and their combinations are studied in the context of bird audio detection. Our best achieved AUC measure on five cross-validations of the development data is 95.5% and 88.1% on the unseen evaluation data.Comment: Accepted for European Signal Processing Conference 201

    I-BEAT: New ultrasonic method for single bunch measurement of ion energy distribution

    Full text link
    The shape of a wave carries all information about the spatial and temporal structure of its source, given that the medium and its properties are known. Most modern imaging methods seek to utilize this nature of waves originating from Huygens' principle. We discuss the retrieval of the complete kinetic energy distribution from the acoustic trace that is recorded when a short ion bunch deposits its energy in water. This novel method, which we refer to as Ion-Bunch Energy Acoustic Tracing (I-BEAT), is a generalization of the ionoacoustic approach. Featuring compactness, simple operation, indestructibility and high dynamic ranges in energy and intensity, I-BEAT is a promising approach to meet the needs of petawatt-class laser-based ion accelerators. With its capability of completely monitoring a single, focused proton bunch with prompt readout it, is expected to have particular impact for experiments and applications using ultrashort ion bunches in high flux regimes. We demonstrate its functionality using it with two laser-driven ion sources for quantitative determination of the kinetic energy distribution of single, focused proton bunches.Comment: Paper: 17 Pages, 3 figures Supplementary Material 16 pages, 7 figure

    PlaceRaider: Virtual Theft in Physical Spaces with Smartphones

    Full text link
    As smartphones become more pervasive, they are increasingly targeted by malware. At the same time, each new generation of smartphone features increasingly powerful onboard sensor suites. A new strain of sensor malware has been developing that leverages these sensors to steal information from the physical environment (e.g., researchers have recently demonstrated how malware can listen for spoken credit card numbers through the microphone, or feel keystroke vibrations using the accelerometer). Yet the possibilities of what malware can see through a camera have been understudied. This paper introduces a novel visual malware called PlaceRaider, which allows remote attackers to engage in remote reconnaissance and what we call virtual theft. Through completely opportunistic use of the camera on the phone and other sensors, PlaceRaider constructs rich, three dimensional models of indoor environments. Remote burglars can thus download the physical space, study the environment carefully, and steal virtual objects from the environment (such as financial documents, information on computer monitors, and personally identifiable information). Through two human subject studies we demonstrate the effectiveness of using mobile devices as powerful surveillance and virtual theft platforms, and we suggest several possible defenses against visual malware

    Evolution of Swarm Robotics Systems with Novelty Search

    Full text link
    Novelty search is a recent artificial evolution technique that challenges traditional evolutionary approaches. In novelty search, solutions are rewarded based on their novelty, rather than their quality with respect to a predefined objective. The lack of a predefined objective precludes premature convergence caused by a deceptive fitness function. In this paper, we apply novelty search combined with NEAT to the evolution of neural controllers for homogeneous swarms of robots. Our empirical study is conducted in simulation, and we use a common swarm robotics task - aggregation, and a more challenging task - sharing of an energy recharging station. Our results show that novelty search is unaffected by deception, is notably effective in bootstrapping the evolution, can find solutions with lower complexity than fitness-based evolution, and can find a broad diversity of solutions for the same task. Even in non-deceptive setups, novelty search achieves solution qualities similar to those obtained in traditional fitness-based evolution. Our study also encompasses variants of novelty search that work in concert with fitness-based evolution to combine the exploratory character of novelty search with the exploitatory character of objective-based evolution. We show that these variants can further improve the performance of novelty search. Overall, our study shows that novelty search is a promising alternative for the evolution of controllers for robotic swarms.Comment: To appear in Swarm Intelligence (2013), ANTS Special Issue. The final publication will be available at link.springer.co

    Application of TRIZ to develop an in-service diagnostic system for a synchronous belt transmission for automotive application

    Get PDF
    Development of robust diagnostic solutions to monitor the health of systems and components to ensure through life cost effectiveness is often technically difficult, requiring an effective integration of design development with research and innovation. This paper presents a structured application of TRIZ and USIT (Unified Structured Inventive Thinking) to generate concept solutions for an in-service diagnostic system for a synchronous belt drive system for an automotive application. The systematic exploration through TRIZ and USIT methods has led to the development of six concept solution ideas directed at the functional requirement to determine the state or condition of the belt. The paper demonstrates that the combined deployment of TRIZ and USIT frameworks is a valuable approach addressing difficult design problem
    corecore