50,720 research outputs found
The TREC-2002 video track report
TREC-2002 saw the second running of the Video Track, the goal of which was to promote progress in content-based retrieval from digital video via open, metrics-based evaluation. The track used 73.3 hours of publicly available digital video (in MPEG-1/VCD format) downloaded by the participants directly from the Internet Archive (Prelinger Archives) (internetarchive, 2002) and some from the Open
Video Project (Marchionini, 2001). The material comprised advertising, educational, industrial, and amateur films produced between the 1930's and the 1970's by corporations, nonprofit organizations, trade associations, community and interest groups, educational institutions, and individuals. 17 teams representing 5 companies and 12 universities - 4 from Asia, 9 from Europe, and 4 from the US - participated in one or more of three tasks in the 2001 video track: shot boundary determination, feature extraction, and search (manual or interactive). Results were scored by NIST using manually created truth data for shot boundary determination and manual assessment of feature extraction and search results. This paper is an introduction to, and an overview
of, the track framework - the tasks, data, and measures - the approaches taken by the participating groups, the results, and issues regrading the evaluation. For detailed information about the approaches and results, the reader should see the various site reports in the final workshop proceedings
Stacked Convolutional and Recurrent Neural Networks for Bird Audio Detection
This paper studies the detection of bird calls in audio segments using
stacked convolutional and recurrent neural networks. Data augmentation by
blocks mixing and domain adaptation using a novel method of test mixing are
proposed and evaluated in regard to making the method robust to unseen data.
The contributions of two kinds of acoustic features (dominant frequency and log
mel-band energy) and their combinations are studied in the context of bird
audio detection. Our best achieved AUC measure on five cross-validations of the
development data is 95.5% and 88.1% on the unseen evaluation data.Comment: Accepted for European Signal Processing Conference 201
I-BEAT: New ultrasonic method for single bunch measurement of ion energy distribution
The shape of a wave carries all information about the spatial and temporal
structure of its source, given that the medium and its properties are known.
Most modern imaging methods seek to utilize this nature of waves originating
from Huygens' principle. We discuss the retrieval of the complete kinetic
energy distribution from the acoustic trace that is recorded when a short ion
bunch deposits its energy in water. This novel method, which we refer to as
Ion-Bunch Energy Acoustic Tracing (I-BEAT), is a generalization of the
ionoacoustic approach. Featuring compactness, simple operation,
indestructibility and high dynamic ranges in energy and intensity, I-BEAT is a
promising approach to meet the needs of petawatt-class laser-based ion
accelerators. With its capability of completely monitoring a single, focused
proton bunch with prompt readout it, is expected to have particular impact for
experiments and applications using ultrashort ion bunches in high flux regimes.
We demonstrate its functionality using it with two laser-driven ion sources for
quantitative determination of the kinetic energy distribution of single,
focused proton bunches.Comment: Paper: 17 Pages, 3 figures Supplementary Material 16 pages, 7 figure
PlaceRaider: Virtual Theft in Physical Spaces with Smartphones
As smartphones become more pervasive, they are increasingly targeted by
malware. At the same time, each new generation of smartphone features
increasingly powerful onboard sensor suites. A new strain of sensor malware has
been developing that leverages these sensors to steal information from the
physical environment (e.g., researchers have recently demonstrated how malware
can listen for spoken credit card numbers through the microphone, or feel
keystroke vibrations using the accelerometer). Yet the possibilities of what
malware can see through a camera have been understudied. This paper introduces
a novel visual malware called PlaceRaider, which allows remote attackers to
engage in remote reconnaissance and what we call virtual theft. Through
completely opportunistic use of the camera on the phone and other sensors,
PlaceRaider constructs rich, three dimensional models of indoor environments.
Remote burglars can thus download the physical space, study the environment
carefully, and steal virtual objects from the environment (such as financial
documents, information on computer monitors, and personally identifiable
information). Through two human subject studies we demonstrate the
effectiveness of using mobile devices as powerful surveillance and virtual
theft platforms, and we suggest several possible defenses against visual
malware
Evolution of Swarm Robotics Systems with Novelty Search
Novelty search is a recent artificial evolution technique that challenges
traditional evolutionary approaches. In novelty search, solutions are rewarded
based on their novelty, rather than their quality with respect to a predefined
objective. The lack of a predefined objective precludes premature convergence
caused by a deceptive fitness function. In this paper, we apply novelty search
combined with NEAT to the evolution of neural controllers for homogeneous
swarms of robots. Our empirical study is conducted in simulation, and we use a
common swarm robotics task - aggregation, and a more challenging task - sharing
of an energy recharging station. Our results show that novelty search is
unaffected by deception, is notably effective in bootstrapping the evolution,
can find solutions with lower complexity than fitness-based evolution, and can
find a broad diversity of solutions for the same task. Even in non-deceptive
setups, novelty search achieves solution qualities similar to those obtained in
traditional fitness-based evolution. Our study also encompasses variants of
novelty search that work in concert with fitness-based evolution to combine the
exploratory character of novelty search with the exploitatory character of
objective-based evolution. We show that these variants can further improve the
performance of novelty search. Overall, our study shows that novelty search is
a promising alternative for the evolution of controllers for robotic swarms.Comment: To appear in Swarm Intelligence (2013), ANTS Special Issue. The final
publication will be available at link.springer.co
Recommended from our members
Understanding Behavioral Responses of Wildlife to Traffic to Improve Mitigation Planning
Creating and maintaining sustainable transportation systems depends in part on understanding and mitigating ecological impacts. Wildlife crossing structures (WCS) are often used to mitigate impacts on wildlife populations. WCS and existing structures may provide passage for multiple species, depending on their sensitivity to traffic disturbance and perception of the roadway. In a previous project, the research team found that traffic conditions and traffic noise could reduce WCS effectiveness in facilitating passage of diverse and sensitive species. In the current project, they expanded the geographic scope to 26 sites throughout California, including detailed measurements of vehicle noise and lighting impacts on wildlife use of structures. They investigated individual animal behavior as the animals approached structures as a possible mechanism for reducing species diversity due to traffic disturbance. In order to inform future WCS planning, placement and construction, the team studied traffic noise and light impacts on wildlife in the vicinity of the proposed Liberty Canyon wildlife over-crossing (over US 101), the first and largest of its kind in California. They improved a preliminary statistical model of the effects of traffic on WCS use of existing structures. The authors recommend strategies for transportation agencies to use in developing and modifying WCS to improve wildlife passage.View the NCST Project Webpag
Application of TRIZ to develop an in-service diagnostic system for a synchronous belt transmission for automotive application
Development of robust diagnostic solutions to monitor the health of systems and components to ensure through life cost effectiveness is often technically difficult, requiring an effective integration of design development with research and innovation. This paper presents a structured application of TRIZ and USIT (Unified Structured Inventive Thinking) to generate concept solutions for an in-service diagnostic system for a synchronous belt drive system for an automotive application. The systematic exploration through TRIZ and USIT methods has led to the development of six concept solution ideas directed at the functional requirement to determine the state or condition of the belt. The paper demonstrates that the combined deployment of TRIZ and USIT frameworks is a valuable approach addressing difficult design problem
- …