366 research outputs found

    3D Human Face Reconstruction and 2D Appearance Synthesis

    Get PDF
    3D human face reconstruction has been an extensive research for decades due to its wide applications, such as animation, recognition and 3D-driven appearance synthesis. Although commodity depth sensors are widely available in recent years, image based face reconstruction are significantly valuable as images are much easier to access and store. In this dissertation, we first propose three image-based face reconstruction approaches according to different assumption of inputs. In the first approach, face geometry is extracted from multiple key frames of a video sequence with different head poses. The camera should be calibrated under this assumption. As the first approach is limited to videos, we propose the second approach then focus on single image. This approach also improves the geometry by adding fine grains using shading cue. We proposed a novel albedo estimation and linear optimization algorithm in this approach. In the third approach, we further loose the constraint of the input image to arbitrary in the wild images. Our proposed approach can robustly reconstruct high quality model even with extreme expressions and large poses. We then explore the applicability of our face reconstructions on four interesting applications: video face beautification, generating personalized facial blendshape from image sequences, face video stylizing and video face replacement. We demonstrate great potentials of our reconstruction approaches on these real-world applications. In particular, with the recent surge of interests in VR/AR, it is increasingly common to see people wearing head-mounted displays. However, the large occlusion on face is a big obstacle for people to communicate in a face-to-face manner. Our another application is that we explore hardware/software solutions for synthesizing the face image with presence of HMDs. We design two setups (experimental and mobile) which integrate two near IR cameras and one color camera to solve this problem. With our algorithm and prototype, we can achieve photo-realistic results. We further propose a deep neutral network to solve the HMD removal problem considering it as a face inpainting problem. This approach doesn\u27t need special hardware and run in real-time with satisfying results

    Magnetic reconnection at the earliest stage of solar flux emergence

    Full text link
    On 2016 September 20, the Interface Region Imaging Spectrograph observed an active region during its earliest emerging phase for almost 7 hours. The Helioseismic and Magnetic Imager on board the Solar Dynamics Observatory observed continuous emergence of small-scale magnetic bipoles with a rate of ∼\sim1016^{16} Mx~s−1^{-1}. The emergence of magnetic fluxes and interactions between different polarities lead to frequent occurrence of ultraviolet (UV) bursts, which exhibit as intense transient brightenings in the 1400 \AA{} images. In the meantime, discrete small patches with the same magnetic polarity tend to move together and merge, leading to enhancement of the magnetic fields and thus formation of pores (small sunspots) at some locations. The spectra of these UV bursts are characterized by the superposition of several chromospheric absorption lines on the greatly broadened profiles of some emission lines formed at typical transition region temperatures, suggesting heating of the local materials to a few tens of thousands of kelvin in the lower atmosphere by magnetic reconnection. Some bursts reveal blue and red shifts of ∼\sim100~km~s−1^{-1} at neighboring pixels, indicating the spatially resolved bidirectional reconnection outflows. Many such bursts appear to be associated with the cancellation of magnetic fluxes with a rate of the order of ∼\sim1015^{15} Mx~s−1^{-1}. We also investigate the three-dimensional magnetic field topology through a magneto-hydrostatic model and find that a small fraction of the bursts are associated with bald patches (magnetic dips). Finally, we find that almost all bursts are located in regions of large squashing factor at the height of ∼\sim1 Mm, reinforcing our conclusion that these bursts are produced through reconnection in the lower atmosphere.Comment: ApJ, 10 figure

    China’s Intellectual Property System in the Process of Catch-up : with Patent in Focus

    Get PDF
    This thesis explores the evolution of Chinese IP mechanisms during national development and transition to becoming a well-developed country. This subject is studied from the perspective of intellectual property (IP), with a special focus on the People’s Republic of China since 1949. Internationally, the Chinese State, as a late-developing country, has adopted various mechanisms to narrow its gap in income and in technological capability in relation to developed countries. Meanwhile, internally, China itself is going through a crucial stage of social transition, and switching its economic model from labour-intensive mode to high-tech and innovation-intensive mode. During China’s international ‘catch-up’ process, and its own social transition, the role of IP has constantly changed. This research on China’s IP covers a period of the late Qing Dynasty until early June 2017, especially focusing on the period after 1949 and the modern Chinese IP system since its Reform and Opening-up Policy in 1979. The reviewed literature covers: (1) Chinese IP-related legislation and policies; (2) the domestic and international academic IP studies; (3) research reports from international organizations; (4) central reports from the Central Committee of the Communist Party of China, other reports and speeches from the central government with a historical period start from 1933; and (5) IP-related annual reports and statistics from the State Intellectual Property Office and the various levels of the people’s court. This thesis combines the narrative approach of Chinese IP studies, law in context, and historical perspective, and specifically studies the question: ‘what is the IP system’s role in the catch-up process of China?’ The main research question is divided into sub questions: How does the development of the IP system and the national Science and Technology (S&T) integrate with each other (Chapter 2)? How is the IP system absorbed into Chinese society? The absorption of an IP system is explored via two aspects: one imperative aspect is the evolution of IP system from the perspective of enforcement (Chapter 3); and the other is how the IP system from the state level involved has impacted on the Chinese business players (Chapter 4). The manuscript concludes: Even though external pressures played an undeniable role during Chinese IP development, which can chase back to the 19th Century, China has been constantly advancing its IP system and its implementation mainly because of its internal and developmental needs since 1949 (Chapter 5). The outcome of this thesis summarises the three decades of Chinese modern IP development and its enforcement in the following way: an advanced legislation system that goes along with the international standards, an enforcement system with Chinese characteristics, and an administrative system for registration and examination focusing mainly on the domestic industries yet taking international practices as reference. China’s adjustments of the IP policies are ultimately determined by the overall objectives for catching up and building an innovative country. China updates its IP system strictly in line with its level of national S&T development. Based on the internal and international conditions, it is a selected development model from China’s side to emphasize IP reform and modernization

    What Bothers Innovation in China: Is It Only a Question of Counterfeits?

    Get PDF
    Starting with a comparison of litigation data between Western litigants and Chinese officials onboth public and private level, this article stands in the shoes of the foreign intellectual property(IP) right holders asking why a sound made by western society resonates so differently in China?This is done through the eyes of the Chinese adjudicators and the system as a whole: where,how long and with what results. It briefly lists various characteristics of each litigation phasethat foreign IP right holders will confront, when choosing the Chinese judiciary (privatelitigation) to enforce their IP rights, especially patents. Insum, this article offers a picture, fromthe perspective of aprivate party, of procedural peculiarities of Chinese courts, the time limitsystem and compensation rules. Even though the Chinese government, at the federal level, isworkiing very hard to introduce a positive image relating to private enforcement of IP rights,this article emphasizes that the negative attitude towards foreign right holders, , is caused by anormative chain effect. It is neither only about law nor only about policy

    Application-Driven AI Paradigm for Human Action Recognition

    Full text link
    Human action recognition in computer vision has been widely studied in recent years. However, most algorithms consider only certain action specially with even high computational cost. That is not suitable for practical applications with multiple actions to be identified with low computational cost. To meet various application scenarios, this paper presents a unified human action recognition framework composed of two modules, i.e., multi-form human detection and corresponding action classification. Among them, an open-source dataset is constructed to train a multi-form human detection model that distinguishes a human being's whole body, upper body or part body, and the followed action classification model is adopted to recognize such action as falling, sleeping or on-duty, etc. Some experimental results show that the unified framework is effective for various application scenarios. It is expected to be a new application-driven AI paradigm for human action recognition

    Side Channel Attack-Aware Resource Allocation for URLLC and eMBB Slices in 5G RAN

    Get PDF
    Network slicing is a key enabling technology to realize the provisioning of customized services in 5G paradigm. Due to logical isolation instead of physical isolation, network slicing is facing a series of security issues. Side Channel Attack (SCA) is a typical attack for slices that share resources in the same hardware. Considering the risk of SCA among slices, this paper investigates how to effectively allocate heterogeneous resources for the slices under their different security requirements. Then, a SCA-aware Resource Allocation (SCA-RA) algorithm is proposed for Ultra-reliable and Low-latency Communications (URLLC) and Enhanced Mobile Broadband (eMBB) slices in 5G RAN. The objective is to maximize the number of slices accommodated in 5G RAN. With dynamic slice requests, simulation is conducted to evaluate the performance of the proposed algorithm in two different network scenarios. Simulation results indicate that compared with benchmark, SCA-RA algorithm can effectively reduce blocking probability of slice requests. In addition, the usage of IT and transport resources is also optimized
    • …
    corecore