The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Automatic movie summarization based on the visual-audio features is introduced. The importance evaluation model for video clips chooses face detection and atwitter shot detection as the basis. Against the difficult of movie's speech endpoint detection, speech endpoint detection based on subtitles of movie is introduced, which can help detect the captions' start or end time exactly. Compared with other...
In this study, a novel P300 based brain-computer interface (BCI) system using random set presentation pattern and employing the effect of face familiarity has been proposed and developed. While the effect of face familiarity is widely studied in the cognitive neurosciences, it has so far not been addressed for the purpose of BCI. We compare P300-based BCI performances of a conventional row-column...
AXES, Access for Audiovisual Archives, is a research project developing tools for new engaging ways to interact with audiovisual libraries, integrating advanced audio and video analysis technologies. The presented prototype is targeted at academic researchers and journalists. The tool allows them to search and retrieve video segments through metadata, audio analysis, as well as visual concepts and...
We present a novel grid-based image retargeting approach that is able to balance important/unimportant contents while minimizing visual distortions on image geometric structures. Our approach begins with a structure-consistent importance map, efficiently obtained by filtering image saliency under the guidance of image gradients. Then we maintain the important contents located by the importance map,...
Labeling children's play behavior is an important process in children's social behavior analysis which is traditionally done by experienced coders. With the growing volume of data, automatic methods for labeling are increasingly required. This paper presents a novel method to label children's social behavior automatically in peer-play scenarios based on visual attention and mutual interaction computation...
We present a code which captures the topology of closed-curve based diagrams (e.g. Euler diagrams (EDs) are used to visualize set-based relationships, whilst knot diagrams represent knotted structures), often used in visual languages. We briefly indicate how to construct a diagram from such a code. Furthermore, we present an interactive software artefact with a human-centric focus, permitting users...
Bag of words (BoW) model, which was originally used for document processing field, has been introduced to computer vision field recently and used in object recognition successfully. However, in face recognition, the order less collection of local patches in BoW model cannot provide strong distinctive information since the objects (face images) belong to the same category. A new framework for extracting...
The technological advancement of digital devices such as digital cameras, smart phones and tablet, provides convenience way for people to take pictures during in daily life. In traditional method in photo browsing, searching, and retrieving from SNS or a large database is performed by tag or text descriptions that described the photos. However, this process becomes more difficult as the number of...
As a crucial security problem, anti-spoofing in biomet-rics, and particularly for the face modality, has achieved great progress in the recent years. Still, new threats arrive in form of better, more realistic and more sophisticated spoofing attacks. The objective of the 2nd Competition on Counter Measures to 2D Face Spoofing Attacks is to challenge researchers to create counter measures effectively...
In a previous publication we showed a component approach performing better than a holistic approach for classifying 6 discrete facial expressions of emotion (happy, sad, surprised, fearful, disgusted and angry) plus the neutral face. In this paper, we present the impact on the two approaches if a seventh facial expression is included. This seventh expression is known as the contemptuous expression...
At the end of their technical studies, students have to present a final project in order to finish their degree. With this project, students prove that they have got all of the competences they should have acquired. Some competencies, such as the ability to communicate orally or the ability to argue may be evaluated during a face-to-face dissertation defense, but how to translate this evaluation scenario...
This paper describes the Multimedia Educational Pills (MEPs) model. MEPs are highly concentrated courses, designed to address a topic through multiple representations, following a recursive, non-cumulative, logic, as pointed out by the Cognitive Flexibility Theory (CFT) methodology. MEPs have been designed to meet the educational challenges posed by the transition from an industrial to an information...
Event-related potential (ERP) studies are very specialized ones that can be used only to investigate specific problems to get a different perspective with respect to more traditional measurements techniques. The peculiarity of ERP measures (time windows, repetitions, etc.) requires a careful design of the experimental protocol to obtain meaningful data. In this paper we discuss how ERPs can be used...
This work presents an experience in learning digital microelectronic design based in the techniques of cooperative-project based learning. The teaching program starts with an introduction on the concept of synthesis using languages of hardware description. Then synthesis tools are introduced. Some simple design examples are proposed and developed in class to clarify concepts and point common errors...
We present a computational method to create a new illusionary solid sign inspired by two kinds of illusions, ghollow mask illusionh and gcrater illusionh. The three dimensional vertices of the illusionary solid sign are obtained by the straight line Voronoi diagram for a given base shape. We also provide a specific example of our new illusionary solid sign, so-called hollow arrow sign. Just like the...
Twenty-eight University students participated in the experiment on speech perception. The typical McGurk Effects were observed in consonant, vowel and word perception. In addition to consonant condition which had been observed in previous studies, cross-cultural differences can also be found in vowel perception. If the temporal discrepancies between auditory and visual information are large, the McGurk...
It has been reported that if two sensory stimuli are presented consecutively with stimulus onset asynchrony (SOA) of as short as several hundreds of milliseconds, the neural activity, elicited by the second stimulus, in the stimulus-sensitive area will be inhibited, say, suppressive phenomenon. Using a paired-stimulus paradigm, in which two visual stimuli were successively presented, we investigated...
We propose an algorithm for estimating the intrinsic dimension of a data set derived by applying the maximum likelihood estimator and analyzing both k nearest neighbor and reverse k nearest neighbors. Which can overcome the limitations of shortcut problem and bias caused by abnormal sampling density distribution when using only k nearest neighbor. It produces good results on some simulated and real...
Augmented reality has been used in many areas and it has proved to be useful for storytelling. These systems are adequate for edutainment. In this paper, we present two augmented reality interactive storytelling systems that use tangible cubes. The first shows the story in only one face of the cube and the second presents the story in all visible faces of the cube. The progress of the story can be...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.