5,272 research outputs found
Enriched Long-term Recurrent Convolutional Network for Facial Micro-Expression Recognition
Facial micro-expression (ME) recognition has posed a huge challenge to
researchers for its subtlety in motion and limited databases. Recently,
handcrafted techniques have achieved superior performance in micro-expression
recognition but at the cost of domain specificity and cumbersome parametric
tunings. In this paper, we propose an Enriched Long-term Recurrent
Convolutional Network (ELRCN) that first encodes each micro-expression frame
into a feature vector through CNN module(s), then predicts the micro-expression
by passing the feature vector through a Long Short-term Memory (LSTM) module.
The framework contains two different network variants: (1) Channel-wise
stacking of input data for spatial enrichment, (2) Feature-wise stacking of
features for temporal enrichment. We demonstrate that the proposed approach is
able to achieve reasonably good performance, without data augmentation. In
addition, we also present ablation studies conducted on the framework and
visualizations of what CNN "sees" when predicting the micro-expression classes.Comment: Published in Micro-Expression Grand Challenge 2018, Workshop of 13th
IEEE Facial & Gesture 201
Less is More: Micro-expression Recognition from Video using Apex Frame
Despite recent interest and advances in facial micro-expression research,
there is still plenty room for improvement in terms of micro-expression
recognition. Conventional feature extraction approaches for micro-expression
video consider either the whole video sequence or a part of it, for
representation. However, with the high-speed video capture of micro-expressions
(100-200 fps), are all frames necessary to provide a sufficiently meaningful
representation? Is the luxury of data a bane to accurate recognition? A novel
proposition is presented in this paper, whereby we utilize only two images per
video: the apex frame and the onset frame. The apex frame of a video contains
the highest intensity of expression changes among all frames, while the onset
is the perfect choice of a reference frame with neutral expression. A new
feature extractor, Bi-Weighted Oriented Optical Flow (Bi-WOOF) is proposed to
encode essential expressiveness of the apex frame. We evaluated the proposed
method on five micro-expression databases: CAS(ME), CASME II, SMIC-HS,
SMIC-NIR and SMIC-VIS. Our experiments lend credence to our hypothesis, with
our proposed technique achieving a state-of-the-art F1-score recognition
performance of 61% and 62% in the high frame rate CASME II and SMIC-HS
databases respectively.Comment: 14 pages double-column, author affiliations updated, acknowledgment
of grant support adde
Relaxor characteristics at the interfaces of [NdMnO3/SrMnO3/LaMnO3] superlattices
We have investigated the magnetic properties of transition metal oxide
superlattices with broken inversion symmetry composed of three different
antiferromagnetic insulators, [NdMnO3/SrMnO3/LaMnO3]. In the superlattices
studied here, we identify the emergence of a relaxor, glassy-like behavior
below spin glass temperature, T=36K. Our results offer the possibility to study
and utilize magnetically metastable devices confined in nano-scale interfaces
Recommended from our members
Smart, secure and seamless access control scheme for mobile devices
Smart devices capture users' activity such as unlock failures, application usage, location and proximity of devices in and around their surrounding environment. This activity information varies between users and can be used as digital fingerprints of the users' behaviour. Traditionally, users are authenticated to access restricted data using long term static attributes such as password and roles. In this paper, in order to allow secure and seamless data access in mobile environment, we combine both the user behaviour captured by the smart device and the static attributes to develop a novel access control technique. Security and performance analyses show that the proposed scheme substantially reduces the computational complexity while enhances the security compared to the conventional schemes
Metallic characteristics in superlattices composed of insulators, NdMnO3/SrMnO3/LaMnO3
We report on the electronic properties of superlattices composed of three
different antiferromagnetic insulators, NdMnO3/SrMnO3/LaMnO3 grown on SrTiO3
substrates. Photoemission spectra obtained by tuning the x-ray energy at the Mn
2p -> 3d edge show a Fermi cut-off, indicating metallic behavior mainly
originating from Mn e_g electrons. Furthermore, the density of states near the
Fermi energy and the magnetization obey a similar temperature dependence,
suggesting a correlation between the spin and charge degrees of freedom at the
interfaces of these oxides
Recommended from our members
Spontaneous expression classification in the encrypted domain
To date, most facial expression analysis have been based on posed image databases and is carried out without being able to protect the identity of the subjects whose expressions are being recognised. In this paper, we propose and implement a system for classifying facial expressions of images in the encrypted domain based on a Paillier cryptosystem implementation of Fisher Linear Discriminant Analysis and k-nearest neighbour (FLDA + kNN). We present results of experiments carried out on a recently developed natural visible and infrared facial expression (NVIE) database of spontaneous images. To the best of our knowledge, this is the first system that will allow the recog-nition of encrypted spontaneous facial expressions by a remote server on behalf of a client
Recommended from our members
Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud
Emerging cloud computing infrastructure replaces traditional outsourcing techniques and provides flexible services to clients at different locations via Internet. This leads to the requirement for data classification to be performed by potentially untrusted servers in the cloud. Within this context, classifier built by the server can be utilized by clients in order to classify their own data samples over the cloud. In this paper, we study a privacy-preserving (PP) data classification technique where the server is unable to learn any knowledge about clients’ input data samples while the server side classifier is also kept secret from the clients during the classification process. More specifically, to the best of our knowledge, we propose the first known client-server data classification protocol using support vector machine. The proposed protocol performs PP classification for both two-class and multi-class problems. The protocol exploits properties of Pailler homomorphic encryption and secure two-party computation. At the core of our protocol lies an efficient, novel protocol for securely obtaining the sign of Pailler encrypted numbers
Peer assisted learning in higher education: Roles, perceptions and efficacy
Universities are increasingly examining alternative means of teaching and learning, and supplemental instruction in the form of peer tutoring is progressively used to support
learning in selected courses. This small scale ethnographic study investigates the roles and relationships between the peer tutors and tutees to uncover their perceptions of peer tutoring and their perceived effects. Semi-structured focus group discussions of ten tutors and ten tutees and two participant group observations were employed. The findings suggest that perceptions of the success of this programme were attributed to low power distance of the tutors and tutees, the development of friendships and the metacognitive learning strategies that were explicitly taught. Implications arising from this study suggest a greater focus on roles and expectations in the design of peer tutoring programmes
- …
