Skip to main content

Showing 1–5 of 5 results for author: Sadiq, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:1908.03904  [pdf, other

    eess.AS cs.MM cs.SD

    Emotion Dependent Facial Animation from Affective Speech

    Authors: Rizwan Sadiq, Sasan AsadiAbadi, Engin Erzin

    Abstract: In human-to-computer interaction, facial animation in synchrony with affective speech can deliver more naturalistic conversational agents. In this paper, we present a two-stage deep learning approach for affective speech driven facial shape animation. In the first stage, we classify affective speech into seven emotion categories. In the second stage, we train separate deep estimators within each e… ▽ More

    Submitted 11 August, 2019; originally announced August 2019.

  2. arXiv:1804.04058  [pdf

    cs.LG cs.CL cs.SI stat.ML

    Analyzing Self-Driving Cars on Twitter

    Authors: Rizwan Sadiq, Mohsin Khan

    Abstract: This paper studies users' perception regarding a controversial product, namely self-driving (autonomous) cars. To find people's opinion regarding this new technology, we used an annotated Twitter dataset, and extracted the topics in positive and negative tweets using an unsupervised, probabilistic model known as topic modeling. We later used the topics, as well as linguist and Twitter specific fea… ▽ More

    Submitted 5 April, 2018; originally announced April 2018.

  3. arXiv:1406.0379  [pdf, ps, other

    cs.SI physics.soc-ph

    An improved vulnerability index of complex networks based on fractal dimension

    Authors: Li Gou, Bo Wei, Rehan Sadiq, Sankaran Mahadevan, Yong Deng

    Abstract: With an increasing emphasis on network security, much more attention has been attracted to the vulnerability of complex networks. The multi-scale evaluation of vulnerability is widely used since it makes use of combined powers of the links' betweenness and has an effective evaluation to vulnerability. However, how to determine the coefficient in existing multi-scale evaluation model to measure the… ▽ More

    Submitted 2 June, 2014; originally announced June 2014.

  4. arXiv:1404.0540  [pdf, ps, other

    cs.AI cs.CE

    Modeling contaminant intrusion in water distribution networks based on D numbers

    Authors: Li Gou, Yong Deng, Rehan Sadiq, Sankaran Mahadevan

    Abstract: Efficient modeling on uncertain information plays an important role in estimating the risk of contaminant intrusion in water distribution networks. Dempster-Shafer evidence theory is one of the most commonly used methods. However, the Dempster-Shafer evidence theory has some hypotheses including the exclusive property of the elements in the frame of discernment, which may not be consistent with th… ▽ More

    Submitted 2 April, 2014; originally announced April 2014.

    Comments: 20 pages, 3 figures

  5. arXiv:1403.5753  [pdf, ps, other

    cs.AI

    D-CFPR: D numbers extended consistent fuzzy preference relations

    Authors: Xinyang Deng, Felix T. S. Chan, Rehan Sadiq, Sankaran Mahadevan, Yong Deng

    Abstract: How to express an expert's or a decision maker's preference for alternatives is an open issue. Consistent fuzzy preference relation (CFPR) is with big advantages to handle this problem due to it can be construed via a smaller number of pairwise comparisons and satisfies additive transitivity property. However, the CFPR is incapable of dealing with the cases involving uncertain and incomplete infor… ▽ More

    Submitted 23 March, 2014; originally announced March 2014.

    Comments: 28 pages, 1 figure