5,388 research outputs found

    A tutorial task and tertiary courseware model for collaborative learning communities

    Get PDF
    RAED provides a computerised infrastructure to support the development and administration of Vicarious Learning in collaborative learning communities spread across multiple universities and workplaces. The system is based on the OASIS middleware for Role-based Access Control. This paper describes the origins of the model and the approach to implementation and outlines some of its benefits to collaborative teachers and learners

    Interpretable and Generalizable Person Re-Identification with Query-Adaptive Convolution and Temporal Lifting

    Get PDF
    For person re-identification, existing deep networks often focus on representation learning. However, without transfer learning, the learned model is fixed as is, which is not adaptable for handling various unseen scenarios. In this paper, beyond representation learning, we consider how to formulate person image matching directly in deep feature maps. We treat image matching as finding local correspondences in feature maps, and construct query-adaptive convolution kernels on the fly to achieve local matching. In this way, the matching process and results are interpretable, and this explicit matching is more generalizable than representation features to unseen scenarios, such as unknown misalignments, pose or viewpoint changes. To facilitate end-to-end training of this architecture, we further build a class memory module to cache feature maps of the most recent samples of each class, so as to compute image matching losses for metric learning. Through direct cross-dataset evaluation, the proposed Query-Adaptive Convolution (QAConv) method gains large improvements over popular learning methods (about 10%+ mAP), and achieves comparable results to many transfer learning methods. Besides, a model-free temporal cooccurrence based score weighting method called TLift is proposed, which improves the performance to a further extent, achieving state-of-the-art results in cross-dataset person re-identification. Code is available at https://github.com/ShengcaiLiao/QAConv.Comment: This is the ECCV 2020 version, including the appendi

    A web system trace model and its application to web design

    Full text link
    Traceability analysis is crucial to the development of web-centric systems, particularly those with frequent system changes, fine-grained evolution and maintenance, and high level of requirements uncertainty. A trace model at the level of the web system architecture is presented in this paper to address the specific challenges of developing web-centric systems. The trace model separates the concerns of different stakeholders in the web development life cycle into viewpoints; and classifies each viewpoint into structure and behaviour. Tracing relationships are presented along two dimensions: within viewpoints; and among viewpoints. Examples of tracing relationships are presented using UML. This trace model is demonstrated through its application to the design of a commercial web project using a web-design process. The design artifacts in each activity are transformed based on the artifacts tracing relationship in the trace model. The model provides mechanisms for verification of consistency, completeness and coverage within each viewpoint and the connectedness across viewpoints

    Using synchronized lightweight state observers to minimise wireless sensor resource utilisation

    Full text link
    A major trend in the evolution of the Web is the rapidly growing numbers of web-enabled sensors which provide a rich ability to monitor and control our physical environment. The devices are often cheap, lightweight, rapidly deployed and densely interconnected. The current dominant models of Web-based data monitoring are not well-adapted to the operational needs of these devices, particularly in terms of resource utilization. In this paper we describe an approach to the optimization of the resources utilized by these devices based on the use of synchronized state-observers. By embedding state observers with a minimized footprint into both the sensors and the monitoring Web client, we show that it is possible to minimize the utilization of limited sensor resources such as power and bandwidth, and hence to improve the performance and potential applications of these devices

    Separation of concerns: A web application architecture framework

    Full text link
    Architecture frameworks have been extensively developed and described within the literature. These frameworks typically support and guide organisations during system planning, design, building, deployment and maintenance. Their main pupose is to provide clarity to the different modelling perspectives, abstractions, and domains of consideration within system development. In dpoing so they allow improved clarity with regard to the connections between the different models, and the selection of models tht are most likely to capture salient features of the system. In this paper we present an Architectural Framework which takes into account the specific characteristics of web systems. The framework is based around a two dimensional matrix. One dimension separates the concerns of different participants of the web system into perspectives. The second dimension classifies each perspective into development abstractions: structure (what), behaviour (how), location (where) and pattern. The framework is illustrated through examples from the development of a commercial web application

    STUDY OF SPREAD CODES WITH BLOCK SPREAD OFDM

    Full text link
    This paper presents the study undertaken with block spread OFDM and compares three spreading matrices. The matrices include the Hadamard, Rotated Hadamard and Mutually Orthogonal Complementary Sets of Sequences (MOCSS). The study is carried out for block lengths of M = 2, M = 4 and M = 8 and it shows that all the spreading matrices show improvement and a better performance over the conventional OFDM over frequency selective channel as expected. As the size ofM increased the spreading matrices which have better orthogonal qualities show greater improvemen

    Rehabilitation strategies to overcome quadriceps weakness for athletes with anterior cruciate ligament (ACL) reconstruction

    Get PDF
    This poster was presented at the Great Plains Honors Conference in Canyon, Texas.https://scholarworks.uttyler.edu/student_posters/1018/thumbnail.jp

    Feature-Guided Black-Box Safety Testing of Deep Neural Networks

    Full text link
    Despite the improved accuracy of deep neural networks, the discovery of adversarial examples has raised serious safety concerns. Most existing approaches for crafting adversarial examples necessitate some knowledge (architecture, parameters, etc.) of the network at hand. In this paper, we focus on image classifiers and propose a feature-guided black-box approach to test the safety of deep neural networks that requires no such knowledge. Our algorithm employs object detection techniques such as SIFT (Scale Invariant Feature Transform) to extract features from an image. These features are converted into a mutable saliency distribution, where high probability is assigned to pixels that affect the composition of the image with respect to the human visual system. We formulate the crafting of adversarial examples as a two-player turn-based stochastic game, where the first player's objective is to minimise the distance to an adversarial example by manipulating the features, and the second player can be cooperative, adversarial, or random. We show that, theoretically, the two-player game can con- verge to the optimal strategy, and that the optimal strategy represents a globally minimal adversarial image. For Lipschitz networks, we also identify conditions that provide safety guarantees that no adversarial examples exist. Using Monte Carlo tree search we gradually explore the game state space to search for adversarial examples. Our experiments show that, despite the black-box setting, manipulations guided by a perception-based saliency distribution are competitive with state-of-the-art methods that rely on white-box saliency matrices or sophisticated optimization procedures. Finally, we show how our method can be used to evaluate robustness of neural networks in safety-critical applications such as traffic sign recognition in self-driving cars.Comment: 35 pages, 5 tables, 23 figure

    Diffuse scattered field of elastic waves from randomly rough surfaces using an analytical Kirchhoff theory

    No full text
    We develop an elastodynamic theory to predict the diffuse scattered field of elastic waves by randomly rough surfaces, for the first time, with the aid of the Kirchhoff approximation (KA). Analytical expressions are derived incorporating surface statistics, to represent the expectation of the angular distribution of the diffuse intensity for different modes. The analytical solutions are successfully verified with numerical Monte Carlo simulations, and also validated by comparison with experiments. We then apply the theory to quantitatively investigate the effects of the roughness and the shear-to-compressional wave speed ratio on the mode conversion and the scattering intensity, from low to high roughness within the valid region of KA. Both the direct and the mode converted intensities are significantly affected by the roughness, which leads to distinct scattering patterns for different wave modes. The mode conversion effect is very strong around the specular angle and it is found to increase as the surface appears to be more rough. In addition, the 3D roughness induced coupling between the out-of-plane shear horizontal (SH) mode and the in-plane modes is studied. The intensity of the SH mode is shown to be very sensitive to the out-of-plane correlation length, being influenced more by this than by the RMS value of the roughness. However, it is found that the depolarization pattern for the diffuse field is independent of the actual value of the roughness
    • …
    corecore