The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cyber Defense Exercises have received much attention in recent years, and are increasingly becoming the cornerstone for ensuring readiness in this new domain. Crossed Swords is an exercise directed at training Red Team members for responsive cyber defense. However, prior iterations have revealed the need for automated and transparent real-time feedback systems to help participants improve their techniques...
When looking at an image, humans shift their attention towards interesting regions, making sequences of eye fixations. When describing an image, they also come up with simple sentences that highlight the key elements in the scene. What is the correlation between where people look and what they describe in an image? To investigate this problem, we look into eye fixations and image captions, two types...
Recently, a state-of-the-art algorithm, called deep deterministic policy gradient (DDPG), has achieved good performance in many continuous control tasks in the MuJoCo simulator. To further improve the efficiency of the experience replay mechanism in DDPG and thus speeding up the training process, in this paper, a prioritized experience replay method is proposed for the DDPG algorithm, where prioritized...
Use of online applications in day-to-day life is increasing. In parallel to this increase the threat to the security of these applications is also increasing. The security of these applications is breached by different cyber attacks. Denial-of-Service (DoS) is one such type of cyber attack. DoS makes the online application or the resources of the server unavailable to the intended users. For detecting...
Image classification is a method that distinguishes the different categories of targets based on the different features of image. The current problem usually is that the feature modeling of target has a great influence on recognition robustness. In order to solve this problem, a correlation-based method is presented to optimize the bag-of-visual-word (BOVW) model by reducing the dictionary size. The...
It is difficult to establish accurate mathematical models to describe the range extender electric vehicles due to the non-stationary, non-linear and interconnection of the monitoring signal sources resulted from the massive moving parts and complex architecture in range-extender. And the support vector machine (SVM) and other algorithms would lead to the destruction of the natural structure and the...
Although the existing correlation filter based on trackers has appeared to be more excellent in the visual tracking problem, there is still tremendous space for the improvement of the tracking performance, especially in the occlusion situation which is often ignored due to the difficulty in detection and processing. In this paper, a scale-adaptive tracker is proposed to handle the case of occlusion...
In the distillation process, many important process variables are often difficult to be measured online. For example, the aviation kerosene is an important index of operation quality, but current methods cannot obtain the real-time value of the aviation kerosene efficiently. To solve this problem, a method of selecting the input variable based on partial least squares regression (PLS) is proposed...
Traditional image classification methods require the independence and the same distribution of training and testing data. However, this requirement cannot always be satisfied in some real-world applications, especially for crossdomain image classification tasks. In this paper, we propose to deal with this problem by combining transfer learning with sparse coding and dictionary learning. In dictionary...
Underwater acoustic channel is a time varying, strong multipath, serious Doppler frequency shift, and high noise interference channel. Aiming at the requirements of strong stability and high reliability to support reliable transmission over long distance, a direct sequence spread spectrum based on single carrier underwater acoustic communication system using dual spread spectrum code (SC-CDMA/DSSC)...
Learning similarity functions between image pairs with deep neural networks yields highly correlated activations of large embeddings. In this work, we show how to improve the robustness of embeddings by exploiting independence in ensembles. We divide the last embedding layer of a deep network into an embedding ensemble and formulate training this ensemble as an online gradient boosting problem. Each...
The 21st century is the age of automatization. While before the millennium day-to-day applications were semi-autonomous since they necessitated human intervention in achieving their goals, now we are living in a society that expects trustworthy autonomous systems in the industrial and business life as well as in their private life that can attain goals independently without any human intervention...
Neurofeedback training is one type of the biofeedback training that allows the subject do self-regulation during the training according to his/her real-time brain activities recognized from Electroencephalogram (EEG) and given to him/her through visual, audio or haptic feedback. The Neurofeedback training has been proved to be helpful in improvement of cognitive abilities not only for patients with...
The electroencephalography (EEG) data records vast amounts of human cerebral activity yet is still reviewed primarily by human readers. Most of the times, the data is contaminated with non-cerebral originated signals, called artifacts, which could be very difficult to visually detect and, undiscovered, could damage the neural information analysis. The purpose of our work is to detect the artifacts...
While adding new capabilities, the distributed energy resource proliferation raises great concern about challenges such as dynamic fluctuations of voltages. For example, in a volatile setting with highly uncertain renewable generation and customer consumption, it is challenging to provide reliable power and voltage prediction for operational planning purposes to mitigate risks, e.g., over-voltages...
We study the task of unsupervised domain adaptation, where no labeled data from the target domain is provided during training time. To deal with the potential discrepancy between the source and target distributions, both in features and labels, we exploit a copula-based regression framework. The benefits of this approach are two-fold: (a) it allows us to model a broader range of conditional predictive...
Command extraction from human beings becomes easier for a machine if it can analyze the non verbal ways of communication such as emotions. This paper focuses on improving the efficiency of extracting emotion from human facial expression images. The features that were extracted in this experiment were obtained from JAFFE (Japanese Female Facial Expression) database which includes 213 images of different...
This paper describes a new approach to building the query based relevance sets (qrels) or relevance judgments for a test collection automatically without using any human intervention. The methods we describe use supervised machine learning algorithms, namely the Naïve Bayes classifier and the Support Vector Machine (SVM). We achieve better Kendall's tau and Spearman correlation results between the...
Modeling preference time in triathlons means predicting the intermediate times of particular sports disciplines by a given overall finish time in a specific triathlon course for the athlete with the known personal best result. This is a hard task for athletes and sport trainers due to a lot of different factors that need to be taken into account, e.g., athlete's abilities, health, mental preparations...
Video summarization (VS) is one of key video signal processing techniques for unmanned aerial vehicles (UAVs). Essentially VS aims at eliminating redundant frames in aerial videos (AVs) with high similarity, which is helpful for quick browsing, retrieving and efficient storage without losing important information. For VS technique, how to measure the similarity between video frames is not a trivial...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.