With the advancement of deep neural networks and computer vision-based Human Activity Recognition, employment of Point-Cloud Data technologies (LiDAR, mmWave) has seen a lot interests due to its privacy preserving nature. Given the high promise of accurate PCD technologies, we develop, PALMAR, a multiple-inhabitant activity recognition system by employing efficient signal processing and novel machine learning techniques to track individual person towards developing an adaptive multi-inhabitant tracking and HAR system. More specifically, we propose (i) a voxelized feature representation-based real-time PCD fine-tuning method, (ii) efficient clustering (DBSCAN and BIRCH), Adaptive Order Hidden Markov Model based multi-person tracking and crossover ambiguity reduction techniques and (iii) novel adaptive deep learning-based domain adaptation technique to improve the accuracy of HAR in presence of data scarcity and diversity (device, location and population diversity). We experimentally evaluate our framework and systems using (i) a real-time PCD collected by three devices (3D LiDAR and 79 GHz mmWave) from 6 participants, (ii) one publicly available 3D LiDAR activity data (28 participants) and (iii) an embedded hardware prototype system which provided promising HAR performances in multi-inhabitants (96%) scenario with a 63% improvement of multi-person tracking than state-of-art framework without losing significant system performances in the edge computing device.
translated by 谷歌翻译
大自然影响了许多元元素算法。在过去的几十年中,它们的数量一直在升级。这些算法中的大多数试图模仿自然的生物学和物理现象。这项研究集中在花授粉算法上,该算法是几种生物启发的算法之一。建议使用特定的全球授粉和局部授粉策略,建议在限制空间中进行花粉谷物探索和剥削。作为一种“群”元元素算法,其强度在于找到最佳解决方案的附近,而不是识别最小值。这项工作详细介绍了对原始方法的修改。这项研究发现,通过更改“开关概率”的特定值,具有不同尺寸和功能的动态值,结果主要比原始花授粉法改进。
translated by 谷歌翻译
在现代资本市场中,由于各种社会,财务,政治和其他动态因素,股票的价格通常被认为是高度波动和不可预测的。借助计算和周到的投资,股票市场可以通过最少的资本投资来确保可观的利润,而错误的预测可以轻松地为投资者带来灾难性的财务损失。本文介绍了最近引入的机器学习模型 - 变压器模型的应用,以预测孟加拉国领先的证券交易所达卡证券交易所(DSE)的未来价格。变压器模型已被广泛用于自然语言处理和计算机视觉任务,但据我们所知,从未在DSE进行股票价格预测任务。最近,介绍了代表时间序列功能的Time2VEC编码,使得可以采用变压器模型进行股票价格预测。本文集中于基于变压器的模型的应用,以根据其历史和每周的数据来预测DSE中列出的八个特定股票的价格转移。我们的实验证明了大多数股票的有希望的结果和可接受的根平方误差。
translated by 谷歌翻译
持续(渐进或终身学习)学习的最新进展集中在预防遗忘可能导致灾难性后果的预防上,但是必须解决两项重大挑战。首先是评估所提出方法的鲁棒性。第二个是确保学习任务的安全性在很大程度上没有探索。本文介绍了一项关于持续学习的任务(包括当前和以前学到的任务)的敏感性的全面研究,这些任务容易忘记。对抗攻击的任务的这种脆弱性引发了数据完整性和隐私方面的深刻问题。我们考虑任务增量学习(任务-IL)方案,并探索三个基于正则化的实验,三个基于重播的实验以及一种基于答复和示例方法的混合技术。我们检查了这些方法的鲁棒性。特别是,我们考虑了我们证明属于当前或先前学习的任务的任何类都容易出现错误分类的情况。我们的观察结果突出了现有任务IL方法的潜在局限性。我们的实证研究建议,研究界考虑了拟议的持续学习方法的鲁棒性,并投入了大量努力来减轻灾难性的遗忘。
translated by 谷歌翻译
由于对神经网络的运行推断的计算成本,因此通常需要在第三方的计算环境或硬件上部署推论步骤。如果第三方不完全信任,则需要混淆输入和输出的性质,以便第三方无法轻易确定正在执行哪些特定任务。事实证明,存在利用不受信任的政党的协议,但在实践中运行的计算要求太高了。相反,我们探索了一种不同的快速启发式安全策略,我们称之为连接主义符号伪造秘密。通过利用全息降低表示(HRR),我们创建了一个具有伪加密风格的防御的神经网络,从经验上表现出强大的攻击性,即使在不切实际地偏爱对手的威胁模型下也是如此。
translated by 谷歌翻译
在医疗诊断的世界中,采用各种深度学习技术是非常普遍的,也是有效的,并且当涉及到视网膜光学相干断层扫描(OCT)行业时,其陈述同样是正确的,但(i)这些技术有防止医疗专业人员完全信任的黑匣子特征(ii)这些方法的缺乏精度限制了它们在临床和复杂病例中的实施(iii)OCT分类上的现有工程和模型基本上是大而复杂,它们需要相当大量的内存和计算能力,从而降低实时应用中分类器的质量。为了满足这些问题,在本文中,提出了一种自我开发的CNN模型,而且使用石灰的使用相对较小,更简单,引入了可解释的AI对研究,并有助于提高模型的可解释性。此外,此外将成为医疗专家的资产,以获得主要和详细信息,并将帮助他们做出最终决策,并将降低传统深度学习模式的不透明度和脆弱性。
translated by 谷歌翻译
Deep neural networks (DNNs) are vulnerable to a class of attacks called "backdoor attacks", which create an association between a backdoor trigger and a target label the attacker is interested in exploiting. A backdoored DNN performs well on clean test images, yet persistently predicts an attacker-defined label for any sample in the presence of the backdoor trigger. Although backdoor attacks have been extensively studied in the image domain, there are very few works that explore such attacks in the video domain, and they tend to conclude that image backdoor attacks are less effective in the video domain. In this work, we revisit the traditional backdoor threat model and incorporate additional video-related aspects to that model. We show that poisoned-label image backdoor attacks could be extended temporally in two ways, statically and dynamically, leading to highly effective attacks in the video domain. In addition, we explore natural video backdoors to highlight the seriousness of this vulnerability in the video domain. And, for the first time, we study multi-modal (audiovisual) backdoor attacks against video action recognition models, where we show that attacking a single modality is enough for achieving a high attack success rate.
translated by 谷歌翻译
Unmanned aerial vehicle (UAV) swarms are considered as a promising technique for next-generation communication networks due to their flexibility, mobility, low cost, and the ability to collaboratively and autonomously provide services. Distributed learning (DL) enables UAV swarms to intelligently provide communication services, multi-directional remote surveillance, and target tracking. In this survey, we first introduce several popular DL algorithms such as federated learning (FL), multi-agent Reinforcement Learning (MARL), distributed inference, and split learning, and present a comprehensive overview of their applications for UAV swarms, such as trajectory design, power control, wireless resource allocation, user assignment, perception, and satellite communications. Then, we present several state-of-the-art applications of UAV swarms in wireless communication systems, such us reconfigurable intelligent surface (RIS), virtual reality (VR), semantic communications, and discuss the problems and challenges that DL-enabled UAV swarms can solve in these applications. Finally, we describe open problems of using DL in UAV swarms and future research directions of DL enabled UAV swarms. In summary, this survey provides a comprehensive survey of various DL applications for UAV swarms in extensive scenarios.
translated by 谷歌翻译
Compared to regular cameras, Dynamic Vision Sensors or Event Cameras can output compact visual data based on a change in the intensity in each pixel location asynchronously. In this paper, we study the application of current image-based SLAM techniques to these novel sensors. To this end, the information in adaptively selected event windows is processed to form motion-compensated images. These images are then used to reconstruct the scene and estimate the 6-DOF pose of the camera. We also propose an inertial version of the event-only pipeline to assess its capabilities. We compare the results of different configurations of the proposed algorithm against the ground truth for sequences of two publicly available event datasets. We also compare the results of the proposed event-inertial pipeline with the state-of-the-art and show it can produce comparable or more accurate results provided the map estimate is reliable.
translated by 谷歌翻译
With Twitter's growth and popularity, a huge number of views are shared by users on various topics, making this platform a valuable information source on various political, social, and economic issues. This paper investigates English tweets on the Russia-Ukraine war to analyze trends reflecting users' opinions and sentiments regarding the conflict. The tweets' positive and negative sentiments are analyzed using a BERT-based model, and the time series associated with the frequency of positive and negative tweets for various countries is calculated. Then, we propose a method based on the neighborhood average for modeling and clustering the time series of countries. The clustering results provide valuable insight into public opinion regarding this conflict. Among other things, we can mention the similar thoughts of users from the United States, Canada, the United Kingdom, and most Western European countries versus the shared views of Eastern European, Scandinavian, Asian, and South American nations toward the conflict.
translated by 谷歌翻译