The main SciRate homepage is down (when not logged in). We are working to fix it. See https://github.com/scirate/scirate/issues/337 for updates.

- arXiv.org
- Popular Physics
- Data Analysis, Statistics and Probability
- Space Physics
- Biological Physics
- Optics
- Fluid Dynamics
- Atomic and Molecular Clusters
- General Physics
- Physics and Society
- History and Philosophy of Physics
- Atomic Physics
- Plasma Physics
- Medical Physics
- Geophysics
- Instrumentation and Detectors
- Physics Education
- Chemical Physics
- Computational Physics
- Accelerator Physics
- Classical Physics
- Atmospheric and Oceanic Physics

- Analysis of PDEs
- Number Theory
- Information Theory
- Statistics Theory
- History and Overview
- Mathematical Physics
- Algebraic Geometry
- Representation Theory
- Combinatorics
- Probability
- Group Theory
- Operator Algebras
- Complex Variables
- Symplectic Geometry
- Metric Geometry
- Numerical Analysis
- Optimization and Control
- Differential Geometry
- Dynamical Systems
- Quantum Algebra
- Logic
- Geometric Topology
- General Topology
- General Mathematics
- Functional Analysis
- Rings and Algebras
- Category Theory
- Commutative Algebra
- K-Theory and Homology
- Spectral Theory
- Classical Analysis and ODEs
- Algebraic Topology

- Symbolic Computation
- Information Theory
- Computational Engineering, Finance, and Science
- General Literature
- Formal Languages and Automata Theory
- Information Retrieval
- Multiagent Systems
- Learning
- Neural and Evolutionary Computing
- Computer Vision and Pattern Recognition
- Databases
- Software Engineering
- Programming Languages
- Social and Information Networks
- Sound
- Emerging Technologies
- Numerical Analysis
- Other Computer Science
- Operating Systems
- Artificial Intelligence
- Distributed, Parallel, and Cluster Computing
- Systems and Control
- Hardware Architecture
- Computational Complexity
- Cryptography and Security
- Discrete Mathematics
- Computer Science and Game Theory
- Performance
- Human-Computer Interaction
- Digital Libraries
- Mathematical Software
- Data Structures and Algorithms
- Computational Geometry
- Computation and Language
- Graphics
- Robotics
- Logic in Computer Science
- Multimedia
- Networking and Internet Architecture
- Computers and Society

- We develop a novel visual model which can recognize protesters, describe their activities by visual attributes and estimate the level of perceived violence in an image. Studies of social media and protests use natural language processing to track how individuals use hashtags and links, often with a focus on those items' diffusion. These approaches, however, may not be effective in fully characterizing actual real-world protests (e.g., violent or peaceful) or estimating the demographics of participants (e.g., age, gender, and race) and their emotions. Our system characterizes protests along these dimensions. We have collected geotagged tweets and their images from 2013-2017 and analyzed multiple major protest events in that period. A multi-task convolutional neural network is employed in order to automatically classify the presence of protesters in an image and predict its visual attributes, perceived violence and exhibited emotions. We also release the UCLA Protest Image Dataset, our novel dataset of 40,764 images (11,659 protest images and hard negatives) with various annotations of visual attributes and sentiments. Using this dataset, we train our model and demonstrate its effectiveness. We also present experimental results from various analysis on geotagged image data in several prevalent protest events. Our dataset will be made accessible at https://www.sscnet.ucla.edu/comm/jjoo/mm-protest/.
- Maedeh Jamali, Shima Rafiee, S.M. Reza Soroushmehr, Nader Karimi, Shahram Shirani, Kayvan Najarian, Shadrokh SamaviSep 20 2017 cs.MM arXiv:1709.06536v1Development of digital content has increased the necessity of copyright protection by means of watermarking. Imperceptibility and robustness are two important features of watermarking algorithms. The goal of watermarking methods is to satisfy the tradeoff between these two contradicting characteristics. Recently watermarking methods in transform domains have displayed favorable results. In this paper, we present an adaptive blind watermarking method which has high transparency in areas that are important to human visual system. We propose a fuzzy system for adaptive control of the embedding strength factor. Features such as saliency, intensity, and edge-concentration, are used as fuzzy attributes. Redundant embedding in discrete cosine transform (DCT) of wavelet domain has increased the robustness of our method. Experimental results show the efficiency of the proposed method and better results are obtained as compared to comparable methods with same size of watermark logo.