7,154 research outputs found
An Expressive Deep Model for Human Action Parsing from A Single Image
This paper aims at one newly raising task in vision and multimedia research:
recognizing human actions from still images. Its main challenges lie in the
large variations in human poses and appearances, as well as the lack of
temporal motion information. Addressing these problems, we propose to develop
an expressive deep model to naturally integrate human layout and surrounding
contexts for higher level action understanding from still images. In
particular, a Deep Belief Net is trained to fuse information from different
noisy sources such as body part detection and object detection. To bridge the
semantic gap, we used manually labeled data to greatly improve the
effectiveness and efficiency of the pre-training and fine-tuning stages of the
DBN training. The resulting framework is shown to be robust to sometimes
unreliable inputs (e.g., imprecise detections of human parts and objects), and
outperforms the state-of-the-art approaches.Comment: 6 pages, 8 figures, ICME 201
Recognizing Focal Liver Lesions in Contrast-Enhanced Ultrasound with Discriminatively Trained Spatio-Temporal Model
The aim of this study is to provide an automatic computational framework to
assist clinicians in diagnosing Focal Liver Lesions (FLLs) in
Contrast-Enhancement Ultrasound (CEUS). We represent FLLs in a CEUS video clip
as an ensemble of Region-of-Interests (ROIs), whose locations are modeled as
latent variables in a discriminative model. Different types of FLLs are
characterized by both spatial and temporal enhancement patterns of the ROIs.
The model is learned by iteratively inferring the optimal ROI locations and
optimizing the model parameters. To efficiently search the optimal spatial and
temporal locations of the ROIs, we propose a data-driven inference algorithm by
combining effective spatial and temporal pruning. The experiments show that our
method achieves promising results on the largest dataset in the literature (to
the best of our knowledge), which we have made publicly available.Comment: 5 pages, 1 figure
A range extension for Haplomitrium mnioides (Lindb.) R.M.Schust.
Haplomitrium mnioides (Lindb.) R.M.Schust. is reported as new to Hainan Island. A continuous distribution of H. mnioides from west (Thailand) to east (Japan) is confirmed. Habitat pictures and a distribution map are provided
Secrecy Wireless Information and Power Transfer in Fading Wiretap Channel
Simultaneous wireless information and power transfer (SWIPT) has recently
drawn significant interests for its dual use of radio signals to provide
wireless data and energy access at the same time. However, a challenging
secrecy communication issue arises as the messages sent to the information
receivers (IRs) may be eavesdropped by the energy receivers (ERs), which are
presumed to harvest energy only from the received signals. To tackle this
problem, we propose in this paper an artificial noise (AN) aided transmission
scheme to facilitate the secrecy information transmission to IRs and yet meet
the energy harvesting requirement for ERs, under the assumption that the AN can
be cancelled at IRs but not at ERs. Specifically, the proposed scheme splits
the transmit power into two parts, to send the confidential message to the IR
and an AN to interfere with the ER, respectively. Under a simplified three-node
wiretap channel setup, the transmit power allocations and power splitting
ratios over fading channels are jointly optimized to minimize the outage
probability for delay-limited secrecy information transmission, or to maximize
the average rate for no-delay-limited secrecy information transmission, subject
to a combination of average and peak power constraints at the transmitter as
well as an average energy harvesting constraint at the ER. Both the secrecy
outage probability minimization and average rate maximization problems are
shown to be non-convex, for each of which we propose the optimal solution based
on the dual decomposition as well as suboptimal solution based on the
alternating optimization. Furthermore, two benchmark schemes are introduced for
comparison. Finally, the performances of proposed schemes are evaluated by
simulations in terms of various trade-offs for wireless (secrecy) information
versus energy transmissions.Comment: to appear in IEEE Transactions on Vehicular Technolog
- …