We propose an assembly system involving two robotic arms with flexible mechanisms. These flexible joints provide passive compliance, allowing the robots to absorb positional errors between assembly parts and their res...
详细信息
Multimodal-based action recognition methods have achieved high success using pose and RGB ***,skeletons sequences lack appearance depiction and RGB images suffer irrelevant noise due to modality *** address this,the a...
详细信息
Multimodal-based action recognition methods have achieved high success using pose and RGB ***,skeletons sequences lack appearance depiction and RGB images suffer irrelevant noise due to modality *** address this,the authors introduce human parsing feature map as a novel modality,since it can selectively retain effective semantic features of the body parts while filtering out most irrelevant *** authors propose a new dual-branch framework called ensemble human parsing and pose network(EPP-Net),which is the first to leverage both skeletons and human parsing modalities for action *** first human pose branch feeds robust skeletons in the graph convolutional network to model pose features,while the second human parsing branch also leverages depictive parsing feature maps to model parsing features via convolutional *** two high-level features will be effectively combined through a late fusion strategy for better action *** experiments on NTU RGB t D and NTU RGB t D 120 benchmarks consistently verify the effectiveness of our proposed EPP-Net,which outperforms the existing action recognition *** code is available at https://***/liujf69/EPP-Net-Action.
This paper proposes a method that allows users to easily convert a large number of still images into movies by displaying photos in sync with memories or favorite songs, which offers a new media viewing method for use...
详细信息
ISBN:
(数字)9798350367331
ISBN:
(纸本)9798350367348
This paper proposes a method that allows users to easily convert a large number of still images into movies by displaying photos in sync with memories or favorite songs, which offers a new media viewing method for users to look back at the vast number of photos in their photo folders. We assume here that users select a song and have images stored in local PC. One method of synchronization involves selecting images based on elapsed time of song. However, since lyrics convey meaning, it can be better to display the images that align with both lyrics’ meaning and images’ meaning matched. In order to do this, we need the space which shares the concept of both lyrics and images, and select colors as the concept. Displayed images are determined based on the distance between points that are mapped from words and images to color space. Specifically, the color concepts from words are extracted using the Color Image Scale, and that from images are determined as the most frequent colors by cluster analysis. Experimental results show that it is possible to easily create movies where images with colors that match the mood of the lyrics are displayed.
This paper first provides an overview of the English pronunciation learning support tool. The tool aims to use "accent-modified speech that retains the learner’s voice quality" as the "target speech.&q...
详细信息
ISBN:
(数字)9798350367331
ISBN:
(纸本)9798350367348
This paper first provides an overview of the English pronunciation learning support tool. The tool aims to use "accent-modified speech that retains the learner’s voice quality" as the "target speech." We propose a new conversion model based on conventional methods for this accent conversion. Specifically, we improve the conventional LSTM-based DNN model for accent conversion by adopting a transformer-based model. Our experiments investigated the model’s ability to handle the unique katakana pronunciation characteristic of Japanese speakers. The results confirmed the effectiveness of the proposed conversion method, although challenges remain, such as the scarcity of Japanese speech data and the need to improve the accuracy of speaker identity retention.
In public wireless LAN services such as free WiFi, the dangers of eavesdropping and tampering with communications have been pointed out. Evil Twin attack which is one of the problems utilizes a fake access point (AP) ...
详细信息
The fast gradient signed method (FGSM) is an efficient white-box attack method that uses the gradient information to generate adversarial examples. However, applying the classic FGSM to real-world applications is ofte...
In order to realize a sustainable society that integrates cyber and physical space (Society 5.0), it is important to construct secure Cyber-Physical System (CPS). Devices in industrial systems must be energy efficient...
详细信息
The vehicle navigating through narrow and crowded environments requires detailed shape information of the surrounding pedestrians for collision avoidance. While Light Detection and Ranging (LiDAR) is highly effective ...
详细信息
The potential of mesenchymal stem cells(MSCs)in regenerative medicine has been largely known due to their capability to induce tissue regeneration in vivo with minimum inflammation during *** adult stem cell type exhi...
详细信息
The potential of mesenchymal stem cells(MSCs)in regenerative medicine has been largely known due to their capability to induce tissue regeneration in vivo with minimum inflammation during *** adult stem cell type exhibit unique features of tissue repair mechanism and immune modulation mediated by their secreted factors,called ***,the utilization of secretome as a therapeutic agent provided new insight into cell-free ***,a sufficient amount of secretome is necessary to realize their applications for translational medicine which required a proper biomanufacturing *** factors related to their production need to be considered to produce a clinical-grade secretome as a biological therapeutic *** viewpoint highlights the current challenges and considerations during the biomanufacturing process of MSCs secretome.
In recent years, there has been a proliferation of Internet of Things (IoT) devices, and so has been the attacks on them. In this paper we will propose a methodology to detect Distributed Denial of Service (DDoS) atta...
In recent years, there has been a proliferation of Internet of Things (IoT) devices, and so has been the attacks on them. In this paper we will propose a methodology to detect Distributed Denial of Service (DDoS) attacks on IoT devices using Machine Learning for Microcontrollers. We will discuss a model which we made for Arduino Nano 33 BLE Sense using Machine Learning for Microcontrollers. Additionally, we will discuss results of our proposal in detecting DDoS attacks on IoT devices. Lastly, we will describe the feasibility of our model on IoT devices.
暂无评论