With the continuous advancement of automated vehicles (AVs), there is growing concern about how AVs interact with vulnerable road users, particularly pedestrians. As a result, this emerging concern has given rise to e...
详细信息
ISBN:
(数字)9781665468800
ISBN:
(纸本)9781665468800
With the continuous advancement of automated vehicles (AVs), there is growing concern about how AVs interact with vulnerable road users, particularly pedestrians. As a result, this emerging concern has given rise to extensive research into computational pedestrian behaviour models. However, very limited existing approaches modelled pedestrian crossing behaviour from an anthropomorphic perspective. Therefore, this study proposed a decision model for pedestrians interacting with traffic at uncontrolled intersections based on a human perception theory. Meanwhile, for the first time, we specified a kind of traffic flow-induced effect where pedestrians optimise their decisions by comparing the perceived risk of different traffic gaps. Furthermore, based on a deconstructed road-crossing decision process, we modelled pedestrian decisions and their timing in detail. A dataset collected in a CAVE-based simulator was applied to calibrate and validate the model. The results indicated that the proposed model fitted the data well and reasonably predicted pedestrian crossing decisions across a range of traffic flow scenarios. The model provides insights into the understanding and model pedestrian-AV interactions.
We describe a study of six visualisation methods for hierarchical pedigree data in virtual reality. We model six different pedigree graph layouts: planar, cylinder, floor, sphere, cone (force directed) and vase layout...
详细信息
ISBN:
(纸本)9781665440578
We describe a study of six visualisation methods for hierarchical pedigree data in virtual reality. We model six different pedigree graph layouts: planar, cylinder, floor, sphere, cone (force directed) and vase layouts. Measurements of task accuracy and task completion time showed a statistically significant pairwise comparison on two task completion times between the sphere (better) and floor (worse) conditions. Likert ratings of user sentiments showed a statistically significant main effect of graph condition ratings of the understandability of the data with the sphere and vase graph layouts to be generally higher and the floor layout to be generally lower.
We present a Spiral visualization that facilitates users to visually comprehend large graphs. Spiral visualization is a representation that highlights key aspects of networks, including the number, size, and density o...
We present a Spiral visualization that facilitates users to visually comprehend large graphs. Spiral visualization is a representation that highlights key aspects of networks, including the number, size, and density of communities, important or central nodes within communities, centrality distribution within communities, connections between communities, and connections between nodes. To facilitate analysis and comprehension of networks using various interaction techniques, such as zooming, tooltip, and highlight, we have implemented a Spiral visualization dashboard. We conducted a qualitative user study incorporating observation, think-aloud protocols, and participant rating of confidence and easiness to assess the usability and suitability of our visualization. The findings suggest that our visualization is appropriate for the network tasks evaluated. However, tasks requiring color comparison, such as identifying the densest community and comparing community densities were found to be more challenging to perform.
With the rapid advancement of 3D digital design, power grid engineering has higher and higher requirements for the digital level of geographic information. According to the characteristics of electric transmission lin...
详细信息
Downhole TV logging technology has been widely used in oil and gas well recognition, evaluation and intervention activities. Aiming at the problems existing in single-camera and dual-camera logging tools in visual log...
详细信息
Imitation learning (IL) approaches like behavioral cloning have been used successfully to learn simple visual navigation policies by learning a large amount of data from expert driving behaviors. However, scaling up t...
详细信息
ISBN:
(数字)9781665468800
ISBN:
(纸本)9781665468800
Imitation learning (IL) approaches like behavioral cloning have been used successfully to learn simple visual navigation policies by learning a large amount of data from expert driving behaviors. However, scaling up to the actual driving scenarios is still challenging for the IL approaches because they rely heavily on expert demonstrations requiring labeling every state the learner visits, which is not practical. Moreover, the expert demonstrations limit the performance upper bound. This work proposes a method to accelerate the learning efficiency inspired by human apprenticeship to promote end-to-end vision-based autonomous urban driving tasks. We employ a hierarchical structure for visual navigation, where the high-level agent is trained with the ground-truth data of the environment, and the trained policy is then executed to train a purely vision-based low-level agent. Moreover, in addition to the labeled demonstrations, the expert intervenes during the training of the low-level agent and brings efficient feedback information, interactively accelerating the training process. Such intervention provides critical knowledge that can be learned effectively for dealing with complex, challenging scenarios. We evaluate the method on the original CARLA benchmark and the more complicated NoCrash benchmark. Compared to the state-of-the-art methods, the proposed method achieves similar good results but requires fewer data and learns faster, effectively improving the sample efficiency.
Although Unmanned Aerial Vehicles (UAVs) are currently still in a state of continuous development, the trend of their integration into a wide range of industries and applications is growing. It leads to risk and cost ...
详细信息
ISBN:
(纸本)9788395918384
Although Unmanned Aerial Vehicles (UAVs) are currently still in a state of continuous development, the trend of their integration into a wide range of industries and applications is growing. It leads to risk and cost reduction but requires skilled operators. This fact motivated us to propose a new approach towards a UAV-based flight mission-definition system based on state-of-the-art waypoint-based techniques. Our solution enables the configuration and autonomous conduction of flight trajectories, whose spatial complexity exceeds the visualization capabilities of currently available solutions. Two testing scenarios confirmed our expectations;the autonomous execution of the trajectory reduced the time required in all cases by almost a half while achieving the same output as a user-controlled manual flight. The proposed solution extends the possibilities of users in creating complex flight trajectories and significantly contributes to the higher time efficiency of recurrent flights.
Visual tracking is adopted to extensive unmanned aerial vehicle (UAV)-related applications, which leads to a highly demanding requirement on the robustness of UAV trackers. However, adding imperceptible perturbations ...
详细信息
ISBN:
(纸本)9781728196817
Visual tracking is adopted to extensive unmanned aerial vehicle (UAV)-related applications, which leads to a highly demanding requirement on the robustness of UAV trackers. However, adding imperceptible perturbations can easily fool the tracker and cause tracking failures. This risk is often overlooked and rarely researched at present. Therefore, to help increase awareness of the potential risk and the robustness of UAV tracking, this work proposes a novel adaptive adversarial attack approach, i.e., Ad(2)Attack, against UAV object tracking. Specifically, adversarial examples are generated online during the resampling of the search patch image, which leads trackers to lose the target in the following frames. Ad(2)Attack is composed of a direct downsampling module and a super-resolution upsampling module with adaptive stages. A novel optimization function is proposed for balancing the imperceptibility and efficiency of the attack. Comprehensive experiments on several well-known benchmarks and real-world conditions show the effectiveness of our attack method, which dramatically reduces the performance of the most advanced Siamese trackers.
Wildfire disasters can easily cause overhead transmission lines to trip, threatening the stable operation of the power grid. In order to accurately predict the risk probability of transmission line trip induced by wil...
详细信息
As digital libraries make the dissemination of research publications easier, they also enable the propagation of invalid or unreliable knowledge. Examples of relevant problems include: retraction and inadvertent citat...
详细信息
ISBN:
(纸本)9781665417709
As digital libraries make the dissemination of research publications easier, they also enable the propagation of invalid or unreliable knowledge. Examples of relevant problems include: retraction and inadvertent citation and reuse of retracted papers [1], [2]; propagation of errors in literature and scientific databases [3], [4]; non-reproducible papers; known domain-specific issues such as cell line contamination [5]; bias in research datasets and publications [6]–[8]; systematic reviews that arrive at different conclusions about the same question at the same time [9], [10]. The digital environment facilitates broad interdisciplinary reuse beyond the originating scientific community; thus, marking known problems and tracing the impact on dependent and follow-on works is particularly important (but still under-addressed). Further, context-specific information inside a paper may not be immediately reusable when extracted by automated processes, leading to apparent contradictions [11]. Current mitigating approaches use the underlying reasoning for information retrieval [12], [13], develop new infrastructures analyzing the reasoning [14]–[16] or certainty [17] of statements, or use visualization to highlight possible discrepancies [10], [15].
暂无评论