This paper presents our Facial Action Units (AUs) detection submission to the fifth Affective Behavior Analysis in-the-wild Competition (ABAW). Our approach consists of three main modules: (i) a pre-trained facial rep...
This paper presents our Facial Action Units (AUs) detection submission to the fifth Affective Behavior Analysis in-the-wild Competition (ABAW). Our approach consists of three main modules: (i) a pre-trained facial representation encoder which produce a strong facial representation from each input face image in the input sequence; (ii) an AU-specific feature generator that specifically learns a set of AU features from each facial representation; and (iii) a spatio-temporal graph learning module that constructs a spatio-temporal graph representation. This graph representation describes AUs contained in all frames and predicts the occurrence of each AU based on both the modeled spatial information within the corresponding face and the learned temporal dynamics among frames. The experimental results show that our approach outperformed the baseline and the spatio-temporal graph representation learning allows our model to generate the best results among all ablated systems. Our model ranks at the 4th place in the AU recognition track at the 5th ABAW Competition. Our code is publicly available at https://***/wzh125/ABAW-5.
The problem of solving linear systems is of great significance in both theory and practice, for which quantum solvers have been shown to provide an exponential speedup over the best-known classical solvers. Recently, ...
The problem of solving linear systems is of great significance in both theory and practice, for which quantum solvers have been shown to provide an exponential speedup over the best-known classical solvers. Recently, a quantum linear system solver has been developed with the state-of-the-art complexity [1], which combines two techniques, namely, discrete adiabatic evolution and eigenstate filtering. However, the parameters of the quantum circuit for eigenstate filtering need to be precomputed classically via the discrete Fourier transform, which introduces additional computational overhead. In this paper, we improve the solver by presenting a new eigenstate filtering process termed quantum phase discrimination in which the circuit parameters are given directly in a concise and analytical form with negligible classical overhead, while maintaining the same quantum complexity.
The Internet of Things (IoT) defines the universal and embedded actuators and sensors network with limited and heterogeneous capabilities of computation. The trustworthiness of IoT-enabled services raises concerns, si...
详细信息
Visual question generation involves the generation of meaningful questions about an image. Although we have made significant progress in automatically generating a single high-quality question related to an image, exi...
Aspect sentiment triplet extraction (ASTE) is a crucial sub-task of aspect-based sentiment analysis, which aims to extract each aspect term along with its opinion term and sentiment polarity. Prior works accomplish AS...
Aspect sentiment triplet extraction (ASTE) is a crucial sub-task of aspect-based sentiment analysis, which aims to extract each aspect term along with its opinion term and sentiment polarity. Prior works accomplish ASTE by jointly modeling its two sub-tasks, i.e., term extraction and sentiment classification. However, they ignore that different features have different importance to the two sub-tasks, resulting in feature confusion and insufficient feature fusion. To address this, we propose a dual-encoder attention fusion model (DuaIAF) for ASTE, consisting of a term extraction module and a sentiment classification module. First, we adopt a grid tagging scheme to model word-to-word interactions within word pairs. Second, we employ a dual-encoder framework to obtain BERT-style grid multi-features for term extraction and contextualized features for sentiment classification, thus alleviating feature confusion. Third, deep fusion networks are applied to refine word-level and span-level features. A convolution neural network (CNN)-based self-attention network deeply fuses word-level grid multi-features to explore the 2D structure information and long-distance dependency information. Moreover, attention pooling aggregates contextualized features into span-level features, which helps capture span-to-span interactions between aspect term spans and opinion term spans. The experimental results show that our model outperforms previous state-of-the-art methods over 4 English and 2 Chinese datasets in various domains.
We present a new dynamic window approach (DWA) for mobile vehicles equipped with Ackermann steering geometry that adheres to Ackermann kinematic constraints. By integrating these constraints with the sampling window i...
We present a new dynamic window approach (DWA) for mobile vehicles equipped with Ackermann steering geometry that adheres to Ackermann kinematic constraints. By integrating these constraints with the sampling window in DWA, we can further reduce and bound the sampling range and enhance the efficiency of the DWA when a mobile vehicle moves on sandy terrain. Furthermore, we improve the evaluation function to optimize the selected trajectory. Our algorithm is successfully validated in ROS and Gazebo through comparison with other existing local planner such as the original DWA and TEB algorithms. We also successfully deploy our Bounded-DWA in the application of coverage path planning, where tree-planting robots traverse on sandy terrain.
Unemployment is a huge problem around the world because a lack of job opportunities. People are unable to find the job opportunities according to their preferences and qualifications. As a solution for this, many coun...
详细信息
Anomaly detection is a popular research topic in Artificial Intelligence and has been widely applied in network security, financial fraud detection, and industrial equipment failure detection. Isolation forest based m...
详细信息
ISBN:
(数字)9798331506681
ISBN:
(纸本)9798331506698
Anomaly detection is a popular research topic in Artificial Intelligence and has been widely applied in network security, financial fraud detection, and industrial equipment failure detection. Isolation forest based methods are the base algorithms to detect anomalies in these scenarios for their simplicity and efficiency, which has been further exploited with multi-folk trees and learning mechanisms to realize the optimal isolation forest for high detection accuracy. However, the optimal isolation forest is time-consuming with the learning mechanisms, resulting in the task failing of time-constrained applications. Moreover, the original optimal isolation forest fails to construct the optimal tree structure restricted by the time complexity. To address the above challenges, we propose an efficient anomaly detection method called EEIF, which realizes the real e-folk structure of the optimal isolation forest in our practical algorithm design. Specifically, we design a distribution that perfectly matches the e-branch theory to construct the optimal isolation forest. Then, we design an FR clustering scheme to achieve fast training of the isolation forest with learning to hash and provide related proofs of accuracy and efficiency. Besides, a parallel algorithm is integrated into our method to reduce prediction time. Finally, extensive experiments are conducted on a large amount of real-world datasets and the results demonstrate that our method significantly improves efficiency while ensuring effectiveness, compared with the state-of-the-art methods.
An intrusion Detection System (IDS) is a system that resides inside the network and monitors all incoming and outgoing traffic. It prevents unethical activities from happening over the network. With the use of IoT dev...
详细信息
In Wireless Multimedia Sensor Networks(WMSNs),nodes capable of retrieving video,audio,images,and small scale sensor data,tend to generate immense traffic of various *** energy-efficient transmission of such a vast amo...
详细信息
In Wireless Multimedia Sensor Networks(WMSNs),nodes capable of retrieving video,audio,images,and small scale sensor data,tend to generate immense traffic of various *** energy-efficient transmission of such a vast amount of heterogeneous multimedia content while simultaneously ensuring the quality of service and optimal energy consumption is ***,we propose a Power-Efficient Wireless Multimedia of Things(PE-WMoT),a robust and energy-efficient cluster-based mechanism to improve the overall lifetime of *** a PE-WMoT,nodes declare themselves Cluster Heads(CHs)based on available *** cluster formation and CH declaration processes are completed,the Sub-Cluster(SC)formation process triggers,in which application base nodes within close vicinity of each other organize themselves under the administration of a Sub-Cluster Head(SCH).The SCH gathers data from member nodes,removes redundancies,and forwards miniaturized data to its respective ***-WMoT adopts a fuzzy-based technique named the analytical hierarchical process,which enables CHs to select an optimal SCH among available SCs.A PE-WMoT also devises a robust scheduling mechanism between CH,SCH,and child nodes to enable collision-free data *** results revealed that a PE-WMoT significantly reduces the number of redundant packet transmissions,improves energy consumption of the network,and effectively increases network throughput.
暂无评论