no code implementations • SMM4H (COLING) 2020 • Andrey Gusev, Anna Kuznetsova, Anna Polyanskaya, Egor Yatsishin
This paper describes a system developed for the Social Media Mining for Health 2020 shared task.
no code implementations • MTSummit 2021 • Anna Kuznetsova, Alfarabi Imashev, Medet Mukushev, Anara Sandygulova, Vadim Kimmelman
This paper presents a study that compares non-manual markers of polar and wh-questions to statements in Kazakh-Russian Sign Language (KRSL) in a dataset collected for NLP tasks.
1 code implementation • SignLang (LREC) 2022 • Anna Kuznetsova, Alfarabi Imashev, Medet Mukushev, Anara Sandygulova, Vadim Kimmelman
This paper is a continuation of Kuznetsova et al. (2021), which described non-manual markers of polar and wh-questions in comparison with statements in an NLP dataset of Kazakh-Russian Sign Language (KRSL) using Computer Vision.
no code implementations • 15 Mar 2024 • Anna Kuznetsova, Vadim Kimmelman
Advances in Deep Learning have made possible reliable landmark tracking of human bodies and faces that can be used for a variety of tasks.
1 code implementation • 13 Dec 2023 • Mikhail Kulyabin, Aleksei Zhdanov, Anastasia Nikiforova, Andrey Stepichev, Anna Kuznetsova, Mikhail Ronkin, Vasilii Borisov, Alexander Bogachev, Sergey Korotkich, Paul A Constable, Andreas Maier
Optical coherence tomography (OCT) is a non-invasive imaging technique with extensive clinical applications in ophthalmology.
no code implementations • 18 Oct 2022 • Regina Tuganova, Anna Permyakova, Anna Kuznetsova, Karina Rakhmanova, Natalia Monzul, Roman Uvarov, Elizaveta Kovtun, Semen Budennyy
Our results show that the advancement of research in all three areas of eco-innovation does not automatically lead to the increase in the number of patents.
no code implementations • 13 Jan 2019 • Yuri Monakhov, Oleg Nikitin, Anna Kuznetsova, Alexey Kharlamov, Alexandr Amochkin
In the authors' opinion, anomaly detection systems, or ADS, seem to be the most perspective direction in the subject of attack detection, because these systems can detect, among others, the unknown (zero-day) attacks.