-
Towards emotion recognition for virtual environments: an evaluation of EEG features on benchmark dataset
Authors:
M. L. Menezes,
A. Samara,
L. Galway,
A. Sant'anna,
A. Verikas,
F. Alonso-Fernandez,
H. Wang,
R. Bond
Abstract:
One of the challenges in virtual environments is the difficulty users have in interacting with these increasingly complex systems. Ultimately, endowing machines with the ability to perceive users emotions will enable a more intuitive and reliable interaction. Consequently, using the electroencephalogram as a bio-signal sensor, the affective state of a user can be modelled and subsequently utilised…
▽ More
One of the challenges in virtual environments is the difficulty users have in interacting with these increasingly complex systems. Ultimately, endowing machines with the ability to perceive users emotions will enable a more intuitive and reliable interaction. Consequently, using the electroencephalogram as a bio-signal sensor, the affective state of a user can be modelled and subsequently utilised in order to achieve a system that can recognise and react to the user's emotions. This paper investigates features extracted from electroencephalogram signals for the purpose of affective state modelling based on Russell's Circumplex Model. Investigations are presented that aim to provide the foundation for future work in modelling user affect to enhance interaction experience in virtual environments. The DEAP dataset was used within this work, along with a Support Vector Machine and Random Forest, which yielded reasonable classification accuracies for Valence and Arousal using feature vectors based on statistical measurements and band power from the ź, \b{eta}, ź, and źź waves and High Order Crossing of the EEG signal.
△ Less
Submitted 25 October, 2022;
originally announced October 2022.
-
Pitfalls of Assessing Extracted Hierarchies for Multi-Class Classification
Authors:
Pablo del Moral,
Slawomir Nowaczyk,
Anita Sant'Anna,
Sepideh Pashami
Abstract:
Using hierarchies of classes is one of the standard methods to solve multi-class classification problems. In the literature, selecting the right hierarchy is considered to play a key role in improving classification performance. Although different methods have been proposed, there is still a lack of understanding of what makes one method to extract hierarchies perform better or worse. To this effe…
▽ More
Using hierarchies of classes is one of the standard methods to solve multi-class classification problems. In the literature, selecting the right hierarchy is considered to play a key role in improving classification performance. Although different methods have been proposed, there is still a lack of understanding of what makes one method to extract hierarchies perform better or worse. To this effect, we analyze and compare some of the most popular approaches to extracting hierarchies. We identify some common pitfalls that may lead practitioners to make misleading conclusions about their methods. In addition, to address some of these problems, we demonstrate that using random hierarchies is an appropriate benchmark to assess how the hierarchy's quality affects the classification performance. In particular, we show how the hierarchy's quality can become irrelevant depending on the experimental setup: when using powerful enough classifiers, the final performance is not affected by the quality of the hierarchy. We also show how comparing the effect of the hierarchies against non-hierarchical approaches might incorrectly indicate their superiority. Our results confirm that datasets with a high number of classes generally present complex structures in how these classes relate to each other. In these datasets, the right hierarchy can dramatically improve classification performance.
△ Less
Submitted 26 January, 2021;
originally announced January 2021.
-
Boundary-Aware Segmentation Network for Mobile and Web Applications
Authors:
Xuebin Qin,
Deng-** Fan,
Chenyang Huang,
Cyril Diagne,
Zichen Zhang,
Adrià Cabeza Sant'Anna,
Albert Suàrez,
Martin Jagersand,
Ling Shao
Abstract:
Although deep models have greatly improved the accuracy and robustness of image segmentation, obtaining segmentation results with highly accurate boundaries and fine structures is still a challenging problem. In this paper, we propose a simple yet powerful Boundary-Aware Segmentation Network (BASNet), which comprises a predict-refine architecture and a hybrid loss, for highly accurate image segmen…
▽ More
Although deep models have greatly improved the accuracy and robustness of image segmentation, obtaining segmentation results with highly accurate boundaries and fine structures is still a challenging problem. In this paper, we propose a simple yet powerful Boundary-Aware Segmentation Network (BASNet), which comprises a predict-refine architecture and a hybrid loss, for highly accurate image segmentation. The predict-refine architecture consists of a densely supervised encoder-decoder network and a residual refinement module, which are respectively used to predict and refine a segmentation probability map. The hybrid loss is a combination of the binary cross entropy, structural similarity and intersection-over-union losses, which guide the network to learn three-level (ie, pixel-, patch- and map- level) hierarchy representations. We evaluate our BASNet on two reverse tasks including salient object segmentation, camouflaged object segmentation, showing that it achieves very competitive performance with sharp segmentation boundaries. Importantly, BASNet runs at over 70 fps on a single GPU which benefits many potential real applications. Based on BASNet, we further developed two (close to) commercial applications: AR COPY & PASTE, in which BASNet is integrated with augmented reality for "COPYING" and "PASTING" real-world objects, and OBJECT CUT, which is a web-based tool for automatic object background removal. Both applications have already drawn huge amount of attention and have important real-world impacts. The code and two applications will be publicly available at: https://github.com/NathanUA/BASNet.
△ Less
Submitted 11 May, 2021; v1 submitted 12 January, 2021;
originally announced January 2021.
-
Follow the Flow: sets, relations, and categories as special cases of functions with no domain
Authors:
Adonai Sant'Anna,
Otavio Bueno,
Marcio de Franca
Abstract:
We introduce, develop, and apply a new approach for dealing with the intuitive notion of function, called Flow Theory. Within our framework all functions are monadic and none of them has any domain. Sets, proper classes, categories, functors, and even relations are special cases of functions. In this sense, functions in Flow are not equivalent to functions in ZFC. Nevertheless, we prove both ZFC a…
▽ More
We introduce, develop, and apply a new approach for dealing with the intuitive notion of function, called Flow Theory. Within our framework all functions are monadic and none of them has any domain. Sets, proper classes, categories, functors, and even relations are special cases of functions. In this sense, functions in Flow are not equivalent to functions in ZFC. Nevertheless, we prove both ZFC and Category Theory are naturally immersed within Flow. Besides, our framework provides major advantages as a language for axiomatization of standard mathematical and physical theories. Russell's paradox is avoided without any equivalent to the Separation Scheme. Hierarchies of sets are obtained without any equivalent to the Power Set Axiom. And a clear principle of duality emerges from Flow, in a way which was not anticipated neither by Category Theory nor by standard set theories. Besides, there seems to be within Flow an identification not only with the common practice of doing mathematics (which is usually quite different from the ways proposed by logicians), but even with the common practice of teaching this formal science.
△ Less
Submitted 28 November, 2019;
originally announced December 2019.
-
No Free Lunch But A Cheaper Supper: A General Framework for Streaming Anomaly Detection
Authors:
Ece Calikus,
Slawomir Nowaczyk,
Anita Sant'Anna,
Onur Dikmen
Abstract:
In recent years, there has been increased research interest in detecting anomalies in temporal streaming data. A variety of algorithms have been developed in the data mining community, which can be divided into two categories (i.e., general and ad hoc). In most cases, general approaches assume the one-size-fits-all solution model where a single anomaly detector can detect all anomalies in any doma…
▽ More
In recent years, there has been increased research interest in detecting anomalies in temporal streaming data. A variety of algorithms have been developed in the data mining community, which can be divided into two categories (i.e., general and ad hoc). In most cases, general approaches assume the one-size-fits-all solution model where a single anomaly detector can detect all anomalies in any domain. To date, there exists no single general method that has been shown to outperform the others across different anomaly types, use cases and datasets. In this paper, we propose SAFARI, a general framework formulated by abstracting and unifying the fundamental tasks in streaming anomaly detection, which provides a flexible and extensible anomaly detection procedure to overcome the limitations of one-size-fits-all solutions. SAFARI helps to facilitate more elaborate algorithm comparisons by allowing us to isolate the effects of shared and unique characteristics of different algorithms on detection performance. Using SAFARI, we have implemented various anomaly detectors and identified a research gap that motivates us to propose a novel learning strategy in this work. We conducted an extensive evaluation study of 20 detectors that are composed using SAFARI and compared their performances using real-world benchmark datasets with different properties. The results indicate that there is no single superior detector that works well for every case, proving our hypothesis that "there is no free lunch" in the streaming anomaly detection world. Finally, we discuss the benefits and drawbacks of each method in-depth and draw a set of conclusions to guide future users of SAFARI.
△ Less
Submitted 18 April, 2020; v1 submitted 15 September, 2019;
originally announced September 2019.
-
A data-driven approach for discovering heat load patterns in district heating
Authors:
Ece Calikus,
Slawomir Nowaczyk,
Anita Sant'Anna,
Henrik Gadd,
Sven Werner
Abstract:
Understanding the heat usage of customers is crucial for effective district heating operations and management. Unfortunately, existing knowledge about customers and their heat load behaviors is quite scarce. Most previous studies are limited to small-scale analyses that are not representative enough to understand the behavior of the overall network. In this work, we propose a data-driven approach…
▽ More
Understanding the heat usage of customers is crucial for effective district heating operations and management. Unfortunately, existing knowledge about customers and their heat load behaviors is quite scarce. Most previous studies are limited to small-scale analyses that are not representative enough to understand the behavior of the overall network. In this work, we propose a data-driven approach that enables large-scale automatic analysis of heat load patterns in district heating networks without requiring prior knowledge. Our method clusters the customer profiles into different groups, extracts their representative patterns, and detects unusual customers whose profiles deviate significantly from the rest of their group. Using our approach, we present the first large-scale, comprehensive analysis of the heat load patterns by conducting a case study on many buildings in six different customer categories connected to two district heating networks in the south of Sweden. The 1222 buildings had a total floor space of 3.4 million square meters and used 1540 TJ heat during 2016. The results show that the proposed method has a high potential to be deployed and used in practice to analyze and understand customers' heat-use habits.
△ Less
Submitted 18 September, 2019; v1 submitted 14 January, 2019;
originally announced January 2019.
-
Exploring home robot capabilities by medium fidelity prototy**
Authors:
Martin Cooney,
Sepideh Pashami,
Yuantao Fan,
Anita Sant'Anna,
Yinrong Ma,
Tianyi Zhang,
Yuwei Zhao,
Wolfgang Hotze,
Jeremy Heyne,
Cristofer Englund,
Achim J. Lilienthal,
Tom Ziemke
Abstract:
In order for autonomous robots to be able to support people's well-being in homes and everyday environments, new interactive capabilities will be required, as exemplified by the soft design used for Disney's recent robot character Baymax in popular fiction. Home robots will be required to be easy to interact with and intelligent--adaptive, fun, unobtrusive and involving little effort to power and…
▽ More
In order for autonomous robots to be able to support people's well-being in homes and everyday environments, new interactive capabilities will be required, as exemplified by the soft design used for Disney's recent robot character Baymax in popular fiction. Home robots will be required to be easy to interact with and intelligent--adaptive, fun, unobtrusive and involving little effort to power and maintain--and capable of carrying out useful tasks both on an everyday level and during emergencies. The current article adopts an exploratory medium fidelity prototy** approach for testing some new robotic capabilities in regard to recognizing people's activities and intentions and behaving in a way which is transparent to people. Results are discussed with the aim of informing next designs.
△ Less
Submitted 9 October, 2017; v1 submitted 4 October, 2017;
originally announced October 2017.