Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 58171 - 58200 of 302428

Full-Text Articles in Physical Sciences and Mathematics

Fine-Grained Detection Of Hate Speech Using Bertoxic, Yakoob Khan Jun 2021

Fine-Grained Detection Of Hate Speech Using Bertoxic, Yakoob Khan

Dartmouth College Undergraduate Theses

This thesis describes our approach towards the fine-grained detection of hate speech using deep learning. We leverage the transformer encoder architecture to propose BERToxic, a system that fine-tunes a pre-trained BERT model to locate toxic text spans in a given text and utilizes additional post-processing steps to refine the prediction boundaries. The post-processing steps involve (1) labeling character offsets between consecutive toxic tokens as toxic and (2) assigning a toxic label to words that have at least one token labeled as toxic. Through experiments, we show that these two post-processing steps improve the performance of our model by 4.16% on …


Physically Based Rendering Techniques To Visualize Thin-Film Smoothed Particle Hydrodynamics Fluid Simulations, Aditya H. Prasad Jun 2021

Physically Based Rendering Techniques To Visualize Thin-Film Smoothed Particle Hydrodynamics Fluid Simulations, Aditya H. Prasad

Dartmouth College Undergraduate Theses

This thesis introduces a methodology and workflow I developed to visualize smoothed hydrodynamic particle based simulations for the research paper ’Thin-Film Smoothed Particle Hydrodynamics Fluid’ (2021), that I co-authored. I introduce a physically based rendering model which allows point cloud simulation data representing thin film fluids and bubbles to be rendered in a photorealistic manner. This includes simulating the optic phenomenon of thin-film interference and rendering the resulting iridescent patterns. The key to the model lies in the implementation of a physically based surface shader that accounts for the interference of infinitely many internally reflected rays in its bidirectional surface …


Impulse Method For Shallow Water Simulation, Evan Muscatel Jun 2021

Impulse Method For Shallow Water Simulation, Evan Muscatel

Dartmouth College Undergraduate Theses

The Shallow Water Equations is a simple method to simulate fluid in real-time. As a real-time model, the SWE is an excellent candidate for use in video games. However, the model is not often used in most fluid simulations because it does not preserve vorticity well, and therefore does not look very realistic. We present an improvement on the Shallow Water Equations by using a gauge method to preserve the vorticity of the fluid. We add a variable called impulse !, which is only weakly coupled with the velocity " of the simulation. We show that using this impulse method, …


The Discrete-Event Modeling Of Administrative Claims (Demac) System: Dynamically Modeling The U.S. Healthcare Delivery System With Medicare Claims Data To Improve End-Of-Life Care, Rachael Chacko Jun 2021

The Discrete-Event Modeling Of Administrative Claims (Demac) System: Dynamically Modeling The U.S. Healthcare Delivery System With Medicare Claims Data To Improve End-Of-Life Care, Rachael Chacko

Dartmouth College Undergraduate Theses

The shift of the U.S. healthcare delivery system from the treatment of acute conditions to chronic diseases requires a new method of healthcare system analysis to properly assess end- of-life (EOL) quality throughout the country. In this paper, we propose the Discrete-Event Modeling of Administrative Claims (DEMAC) system, which relies on a hetero-functional graph theory and discrete event-driven framework to dynamically model EOL care on multiple levels. The heat map visualizations produced by the DEMAC system enable the elucidation of not only patient-specific EOL care but also broader treatment patterns among providers and hospitals. As a whole, the DEMAC system …


Novel And Fast Peridynamic Models For Material Degradation And Failure, Siavash Jafarzadeh Jun 2021

Novel And Fast Peridynamic Models For Material Degradation And Failure, Siavash Jafarzadeh

Department of Mechanical and Materials Engineering: Dissertations, Theses, and Student Research

Fracture is one of the main mechanisms of structural failure. Corroded surfaces with chemically-induced damage are, notably, potential sites for crack initiation and propagation in metals, which can lead to catastrophic failure of structures. Despite some progress in simulating fracture and damage using classical models, realistic prediction of complex damage progression and failure has been out of reach for many decades. Peridynamics (PD), a nonlocal theory introduced in 2000, opened up new avenues in modeling material degradation and failure. Existing numerical methods used to discretize PD equations, however, are quite expensive as the PD nonlocal interactions make them unaffordable for …


2021 June - Tennessee Monthly Climate Report, Tennessee Climate Office, East Tennessee State University Jun 2021

2021 June - Tennessee Monthly Climate Report, Tennessee Climate Office, East Tennessee State University

Tennessee Climate Office Monthly Report

No abstract provided.


Mineralogical Restrictions On Porosity In The Taylor Sand Of The Cotton Valley Group, Northern Louisiana Salt Basin, Claiborne Parish, Louisiana, Kaleb C. Mcclain Jun 2021

Mineralogical Restrictions On Porosity In The Taylor Sand Of The Cotton Valley Group, Northern Louisiana Salt Basin, Claiborne Parish, Louisiana, Kaleb C. Mcclain

Electronic Theses and Dissertations

The Cotton Valley Group has been targeted for hydrocarbons since the 1940s. However, the reservoir was initially considered uneconomical to drill due to its low permeability and porosity. Since then, recent technological advances in hydraulic fracturing have allowed the Cotton Valley Sandstone members to become prolific, profitable plays, renewing interest in drilling and exploration across the northwest/northern Louisiana region.

In this research, mineralogical restrictions on the porosity in the Lower Taylor Sand of the Cotton Valley Group were studied from core (10,035’ft/3,059m -10,150’ft/3,094m) from Blackburn Field, northwest Claiborne Parish. Twelve samples were taken at intervals throughout the Taylor Sand, starting …


Precambrian Basement Influence On The Deposition Of The Upper Ordovician Utica Shale Play In East Central Ohio, William Kaleb Kirk Jun 2021

Precambrian Basement Influence On The Deposition Of The Upper Ordovician Utica Shale Play In East Central Ohio, William Kaleb Kirk

Electronic Theses and Dissertations

The Ordovician Utica shale play is a major oil and gas producing interval in the Appalachian Basin. The Utica shale play can be found as far as New York and Canada and to the south into Indiana and Kentucky. The play consists of the Trenton/Lexington limestones, Point Pleasant Formation, and Utica shale. The shallow marine fossiliferous limestones of the Trenton and shallow marine shaley limestones of the Lexington are overlain by an interbedded shale and limestone of the Point Pleasant Formation, which grade into the deeper marine interbedded shales and limey shales of the Utica. These formations are highly heterogeneous, …


Algal Alterity : A Study Of Florida's Algae-Crisis-Culture, Katelyn Flood Jun 2021

Algal Alterity : A Study Of Florida's Algae-Crisis-Culture, Katelyn Flood

Masters Theses

This research critically engages with the ecology of media discourse surrounding Florida’s “harmful algae crisis” . It uses a content analysis of online news media articles to address how the presence and unique processes of aquatic algae organisms are entangled with people and cultural practices. Specifically, this work grapples with the dynamic relationship between algae organisms and the cultural production of meaning through visual imagery/stimuli. It examines both visual and textual representations of algae in mass media communications covering the harmful algae crisis or “red tide crisis” of 2017 and 2018: an extreme period of aquatic algae proliferation and hazardous …


Catch You With Cache: Out-Of-Vm Introspection To Trace Malicious Executions, Chao Su, Xuhua Ding, Qinghai Zeng Jun 2021

Catch You With Cache: Out-Of-Vm Introspection To Trace Malicious Executions, Chao Su, Xuhua Ding, Qinghai Zeng

Research Collection School Of Computing and Information Systems

Out-of-VM introspection is an imperative part of security analysis. The legacy methods either modify the system, introducing enormous overhead, or rely heavily on hardware features, which are neither available nor practical in most cloud environments. In this paper, we propose a novel analysis method, named as Catcher, that utilizes CPU cache to perform out-of-VM introspection. Catcher does not make any modifications to the target program and its running environment, nor demands special hardware support. Implemented upon Linux KVM, it natively introspects the target's virtual memory. More importantly, it uses the cache-based side channel to infer the target control flow. To …


Expressive Bilateral Access Control For Internet-Of-Things In Cloud-Fog Computing, Shengmin Xu, Jianting Ning, Jinhua Ma, Xinyi Huang, Hwee Hwa Pang, Robert H. Deng Jun 2021

Expressive Bilateral Access Control For Internet-Of-Things In Cloud-Fog Computing, Shengmin Xu, Jianting Ning, Jinhua Ma, Xinyi Huang, Hwee Hwa Pang, Robert H. Deng

Research Collection School Of Computing and Information Systems

As a versatile system architecture, cloud-fog Internet-of-Things (IoT) enables multiple resource-constrained devices to communicate and collaborate with each other. By outsourcing local data and immigrating expensive workloads to cloud service providers and fog nodes (FNs), resource-constrained devices can enjoy data services with low latency and minimal cost. To protect data security and privacy in the untrusted cloud-fog environment, many cryptographic mechanisms have been invented. Unfortunately, most of them are impractical when directly applied to cloud-fog IoT computing, mainly due to the large number of resource-constrained end-devices (EDs). In this paper, we present a secure cloud-fog IoT data sharing system with …


Iquant: Interactive Quantitative Investment Using Sparse Regression Factors, Xuanwu Yue, Qiao Gu, Deyun Wang, Huamin Qu, Yong Wang Jun 2021

Iquant: Interactive Quantitative Investment Using Sparse Regression Factors, Xuanwu Yue, Qiao Gu, Deyun Wang, Huamin Qu, Yong Wang

Research Collection School Of Computing and Information Systems

The model-based investing using financial factors is evolving as a principal method for quantitative investment. The main challenge lies in the selection of effective factors towards excess market returns. Existing approaches, either hand-picking factors or applying feature selection algorithms, do not orchestrate both human knowledge and computational power. This paper presents iQUANT, an interactive quantitative investment system that assists equity traders to quickly spot promising financial factors from initial recommendations suggested by algorithmic models, and conduct a joint refinement of factors and stocks for investment portfolio composition. We work closely with professional traders to assemble empirical characteristics of “good” factors …


Engaging Drivers Via Competition: A Case Study With Arena, Hao Cheng, Shuyu Wei, Lingyu Zhang, Zimu Zhou, Yongxin. Tong Jun 2021

Engaging Drivers Via Competition: A Case Study With Arena, Hao Cheng, Shuyu Wei, Lingyu Zhang, Zimu Zhou, Yongxin. Tong

Research Collection School Of Computing and Information Systems

Sustained work enthusiasms of drivers are crucial for the success of large-scale ride-hailing platforms. In this paper, we conduct the first-of-its-kind exploration to encourage active participation of drivers via competition. We design Arena, a competition where drivers compete for prizes via completing more trips. Through a pilot study covering over 2,600 participants, we uncover the easy-win problem, an overlooked and serious issue in competition design for real-world drivers. It refers to situations where one competitor does not show up during competition whereas the other easily wins. To solve the easy-win problem without impairing motivation of drivers, we devise a novel …


Efficient Attribute-Based Encryption With Repeated Attributes Optimization, Fawad Khan, Hui Li, Yinghui Zhang, Haider Abbas, Tahreem Yaqoob Jun 2021

Efficient Attribute-Based Encryption With Repeated Attributes Optimization, Fawad Khan, Hui Li, Yinghui Zhang, Haider Abbas, Tahreem Yaqoob

Research Collection School Of Computing and Information Systems

Internet of Things (IoT) is an integration of various technologies to provide technological enhancements. To enforce access control on low power operated battery constrained devices is a challenging issue in IoT scenarios. Attribute-based encryption (ABE) has emerged as an access control mechanism to allow users to encrypt and decrypt data based on an attributes policy. However, to accommodate the expressiveness of policy for practical application scenarios, attributes may be repeated in a policy. For certain policies, the attributes repetition cannot be avoided even after applying the boolean optimization techniques to attain an equivalent smaller length boolean formula. For such policies, …


Technological Opportunities For Sensing Of The Health Effects Of Weather And Climate Change: A State-Of-The-Art-Review, V. Anderson, A. C. W. Leung, H. Mehdipoor, B. Janicke, D. Milosevic, A. Oliveira, S. Manavvi, P. Kabano, Yuliya Dzyuban, Et Al Jun 2021

Technological Opportunities For Sensing Of The Health Effects Of Weather And Climate Change: A State-Of-The-Art-Review, V. Anderson, A. C. W. Leung, H. Mehdipoor, B. Janicke, D. Milosevic, A. Oliveira, S. Manavvi, P. Kabano, Yuliya Dzyuban, Et Al

Research Collection College of Integrative Studies

Sensing and measuring meteorological and physiological parameters of humans, animals, and plants are necessary to understand the complex interactions that occur between atmospheric processes and the health of the living organisms. Advanced sensing technologies have provided both meteorological and biological data across increasingly vast spatial, spectral, temporal, and thematic scales. Information and communication technologies have reduced barriers to data dissemination, enabling the circulation of information across different jurisdictions and disciplines. Due to the advancement and rapid dissemination of these technologies, a review of the opportunities for sensing the health effects of weather and climate change is necessary. This paper provides …


Coordinating Multi-Party Vehicle Routing With Location Congestion Via Iterative Best Response, Waldy Joe, Hoong Chuin Lau Jun 2021

Coordinating Multi-Party Vehicle Routing With Location Congestion Via Iterative Best Response, Waldy Joe, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

This work is motivated by a real-world problem of coordinating B2B pickup-delivery operations to shopping malls involving multiple non-collaborative Logistics Service Providers (LSPs) in a congested city where space is scarce. This problem can be categorized as a Vehicle Routing Problem with Pickup and Delivery, Time Windows and Location Congestion with multiple LSPs (or ML-VRPLC in short), and we propose a scalable, decentralized, coordinated planning approach via iterative best response. We formulate the problem as a strategic game where each LSP is a self-interested agent but is willing to participate in a coordinated planning as long as there are sufficient …


Riding Through The Silver Tsunami: A Data Driven Approach To Improve Senior Citizens’ Engagement With Community Senior Activity Centres, Joshua Jie Feng Lam, Hwee-Pink Tan Jun 2021

Riding Through The Silver Tsunami: A Data Driven Approach To Improve Senior Citizens’ Engagement With Community Senior Activity Centres, Joshua Jie Feng Lam, Hwee-Pink Tan

Research Collection School Of Computing and Information Systems

In Singapore, 1 in 4 persons will be elderly by 2030 In preparation for the Silver Tsunami, the Singapore government and community care providers have collaborations to promote active, independent living amongst elders Current implementation of data driven population health is focused on well being indices using data collected from the general population There is no literature on the use of data analytics in assessing elder


Set Team Orienteering Problem With Time Windows, Aldy Gunawan, Vincent F. Yu, Andros Nicas Sutanto, Panca Jodiawan Jun 2021

Set Team Orienteering Problem With Time Windows, Aldy Gunawan, Vincent F. Yu, Andros Nicas Sutanto, Panca Jodiawan

Research Collection School Of Computing and Information Systems

This research introduces an extension of the Orienteering Problem (OP), known as Set Team Orienteering Problem with Time Windows (STOPTW), in which customers are first grouped into clusters. Each cluster is associated with a profit that will be collected if at least one customer within the cluster is visited. The objective is to find the best route that maximizes the total collected profit without violating time windows and time budget constraints. We propose an adaptive large neighborhood search algorithm to solve newly introduced benchmark instances. The preliminary results show the capability of the proposed algorithm to obtain good solutions within …


Counterfactual Zero-Shot And Open-Set Visual Recognition, Zhongqi Yue, Tan Wang, Qianru Sun, Xian-Sheng Hua, Hanwang Zhang Jun 2021

Counterfactual Zero-Shot And Open-Set Visual Recognition, Zhongqi Yue, Tan Wang, Qianru Sun, Xian-Sheng Hua, Hanwang Zhang

Research Collection School Of Computing and Information Systems

We present a novel counterfactual framework for both Zero-Shot Learning (ZSL) and Open-Set Recognition (OSR), whose common challenge is generalizing to the unseen-classes by only training on the seen-classes. Our idea stems from the observation that the generated samples for unseen-classes are often out of the true distribution, which causes severe recognition rate imbalance between the seen-class (high) and unseen-class (low). We show that the key reason is that the generation is not Counterfactual Faithful, and thus we propose a faithful one, whose generation is from the sample-specific counterfactual question: What would the sample look like, if we set its …


Gpu-Accelerated Graph Label Propagation For Real-Time Fraud Detection, Chang Ye, Yuchen Li, Bingsheng He, Zhao Li, Jianling Sun Jun 2021

Gpu-Accelerated Graph Label Propagation For Real-Time Fraud Detection, Chang Ye, Yuchen Li, Bingsheng He, Zhao Li, Jianling Sun

Research Collection School Of Computing and Information Systems

Fraud detection is a pressing challenge for most financial and commercial platforms. In this paper, we study the processing pipeline of fraud detection in a large e-commerce platform of TaoBao. Graph label propagation (LP) is a core component in this pipeline to detect suspicious clusters from the user-interaction graph. Furthermore, the run-time of the LP component occupies 75% overhead of TaoBao’s automated detection pipeline. To enable real-time fraud detection, we propose a GPU-based framework, called GLP, to support large-scale LP workloads in enterprises. We have identified two key challenges when integrating GPU acceleration into TaoBao’s data processing pipeline: (1) programmability …


Cache-Efficient Fork-Processing Patterns On Large Graphs, Shengliang Lu, Shixuan Sun, Johns Paul, Yuchen Li, Bingsheng He Jun 2021

Cache-Efficient Fork-Processing Patterns On Large Graphs, Shengliang Lu, Shixuan Sun, Johns Paul, Yuchen Li, Bingsheng He

Research Collection School Of Computing and Information Systems

As large graph processing emerges, we observe a costly fork-processing pattern (FPP) that is common in many graph algorithms. The unique feature of the FPP is that it launches many independent queries from different source vertices on the same graph. For example, an algorithm in analyzing the network community profile can execute Personalized PageRanks that start from tens of thousands of source vertices at the same time. We study the efficiency of handling FPPs in state-of-the-art graph processing systems on multi-core architectures, including Ligra, Gemini, and GraphIt. We find that those systems suffer from severe cache miss penalty because of …


Self-Adaptive Graph Traversal On Gpus, Mo Sha, Yuchen Li, Kian-Lee Tan Jun 2021

Self-Adaptive Graph Traversal On Gpus, Mo Sha, Yuchen Li, Kian-Lee Tan

Research Collection School Of Computing and Information Systems

GPU’s massive computing power offers unprecedented opportunities to enable large graph analysis. Existing studies proposed various preprocessing approaches that convert the input graphs into dedicated structures for GPU-based optimizations. However, these dedicated approaches incur significant preprocessing costs as well as weak programmability to build general graph applications. In this paper, we introduce SAGE, a self-adaptive graph traversal on GPUs, which is free from preprocessing and operates on ubiquitous graph representations directly. We propose Tiled Partitioning and Resident Tile Stealing to fully exploit the computing power of GPUs in a runtime and self-adaptive manner. We also propose Sampling-based Reordering to further …


Marrying Top-K With Skyline Queries: Relaxing The Preference Input While Producing Output Of Controllable Size, Kyriakos Mouratidis, Keming Li, Bo Tang Jun 2021

Marrying Top-K With Skyline Queries: Relaxing The Preference Input While Producing Output Of Controllable Size, Kyriakos Mouratidis, Keming Li, Bo Tang

Research Collection School Of Computing and Information Systems

The two most common paradigms to identify records of preference in a multi-objective setting rely either on dominance (e.g., the skyline operator) or on a utility function defined over the records’ attributes (typically, using a top-�� query). Despite their proliferation, each of them has its own palpable drawbacks. Motivated by these drawbacks, we identify three hard requirements for practical decision support, namely, personalization, controllable output size, and flexibility in preference specification. With these requirements as a guide, we combine elements from both paradigms and propose two new operators, ORD and ORU. We perform a qualitative study to demonstrate how they …


Efficient Conditional Gan Transfer With Knowledge Propagation Across Classes, Shahbazi. Mohamad, Zhiwu Huang, Huang, Danda Pani Paudel, Ajad Chhatkuli, Gool L. Van Jun 2021

Efficient Conditional Gan Transfer With Knowledge Propagation Across Classes, Shahbazi. Mohamad, Zhiwu Huang, Huang, Danda Pani Paudel, Ajad Chhatkuli, Gool L. Van

Research Collection School Of Computing and Information Systems

Generative adversarial networks (GANs) have shown impressive results in both unconditional and conditional image generation. In recent literature, it is shown that pre-trained GANs, on a different dataset, can be transferred to improve the image generation from a small target data. The same, however, has not been well-studied in the case of conditional GANs (cGANs), which provides new opportunities for knowledge transfer compared to unconditional setup. In particular, the new classes may borrow knowledge from the related old classes, or share knowledge among themselves to improve the training. This motivates us to study the problem of efficient conditional GAN transfer …


When Program Analysis Meets Bytecode Search: Targeted And Efficient Inter-Procedural Analysis Of Modern Android Apps In Backdroid, Daoyuan Wu, Debin Gao, Robert H. Deng, Rocky Chang Jun 2021

When Program Analysis Meets Bytecode Search: Targeted And Efficient Inter-Procedural Analysis Of Modern Android Apps In Backdroid, Daoyuan Wu, Debin Gao, Robert H. Deng, Rocky Chang

Research Collection School Of Computing and Information Systems

Widely-used Android static program analysis tools,e.g., Amandroid and FlowDroid, perform the whole-app interprocedural analysis that is comprehensive but fundamentallydifficult to handle modern (large) apps. The average app size hasincreased three to four times over five years. In this paper, weexplore a new paradigm of targeted inter-procedural analysis thatcan skip irrelevant code and focus only on the flows of securitysensitive sink APIs. To this end, we propose a technique calledon-the-fly bytecode search, which searches the disassembled appbytecode text just in time when a caller needs to be located. In thisway, it guides targeted (and backward) inter-procedural analysisstep by step until reaching …


Generating Face Images With Attributes For Free, Yaoyao Liu, Qianru Sun, He Xiangnan, Liu An-An, Su Yuting, Chua Tat-Seng Jun 2021

Generating Face Images With Attributes For Free, Yaoyao Liu, Qianru Sun, He Xiangnan, Liu An-An, Su Yuting, Chua Tat-Seng

Research Collection School Of Computing and Information Systems

With superhuman-level performance of face recognition, we are more concerned about the recognition of fine-grained attributes, such as emotion, age, and gender. However, given that the label space is extremely large and follows a long-tail distribution, it is quite expensive to collect sufficient samples for fine-grained attributes. This results in imbalanced training samples and inferior attribute recognition models. To this end, we propose the use of arbitrary attribute combinations, without human effort, to synthesize face images. In particular, to bridge the semantic gap between high-level attribute label space and low-level face image, we propose a novel neural-network-based approach that maps …


Silver Bow Creek/Butte Area Npl Site Butte Priority Soils Operable Unit, Pioneer Technical Services, Inc. Jun 2021

Silver Bow Creek/Butte Area Npl Site Butte Priority Soils Operable Unit, Pioneer Technical Services, Inc.

Silver Bow Creek/Butte Area Superfund Site

No abstract provided.


Research On Climate Change In Social Psychology Publications: A Systematic Review, Kim-Pong Kam, Angela K. Y. Leung, Susan Clayton Jun 2021

Research On Climate Change In Social Psychology Publications: A Systematic Review, Kim-Pong Kam, Angela K. Y. Leung, Susan Clayton

Research Collection School of Social Sciences

There is a strong scientific consensus that anthropogenic climate change is happening and that its impacts can put both ecological and human systems in jeopardy. Social psychology, the scientific study of human behaviours in their social and cultural settings, is an important tool for understanding how humans interpret and respond to climate change. In this article, we offered a systematic review of the social psychological literature of climate change. We sampled 130 studies on climate change or global warming from 80 articles published in journals indexed under the “Psychology, social” category of Journal Citation Reports. Based on this sample, …


Social Psychology Of Climate Change In The Asian Context: Introduction To Special Issue, Kim-Pong Tam, Angela K. Y. Leung, Susan Clayton Jun 2021

Social Psychology Of Climate Change In The Asian Context: Introduction To Special Issue, Kim-Pong Tam, Angela K. Y. Leung, Susan Clayton

Research Collection School of Social Sciences

Climate change is one of the biggest challenges facing many countries in the Asia Pacific. Asia as a whole is a primary contributor to carbon emissions. According to the BP Statistical Review of World Energy 2020, the Asia Pacific region alone accounts for more than half of the world’s total greenhouse gas emissions. This represents an increase in consumption of oil, gas, and coal in Asia Pacific from 44.5% in 2009 to 50.5% in 2019. According to the review, compared to the rest of the world, Asia Pacific had the highest growth rate (2.7%) of carbon emissions between 2008 and …


Projecting Your View Attentively: Monocular Road Scene Layout Estimation Via Cross-View Transformation, Weixiang Yang, Qi Li, Wenxi Liu, Yuanlong Yu, Yuexin Ma, Shengfeng He, Jia Pan Jun 2021

Projecting Your View Attentively: Monocular Road Scene Layout Estimation Via Cross-View Transformation, Weixiang Yang, Qi Li, Wenxi Liu, Yuanlong Yu, Yuexin Ma, Shengfeng He, Jia Pan

Research Collection School Of Computing and Information Systems

HD map reconstruction is crucial for autonomous driving. LiDAR-based methods are limited due to the deployed expensive sensors and time-consuming computation. Camera-based methods usually need to separately perform road segmentation and view transformation, which often causes distortion and the absence of content. To push the limits of the technology, we present a novel framework that enables reconstructing a local map formed by road layout and vehicle occupancy in the bird's-eye view given a front-view monocular image only. In particular, we propose a cross-view transformation module, which takes the constraint of cycle consistency between views into account and makes full use …