Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Significant improvements have been recently achieved in both quality and realism of computer generated characters, which are nowadays often very difficult to be distinguished from real ones. However, generating highly realistic facial expressions is still a challenging issue, since synthetic expressions usually follow a repetitive pattern, while in natural faces the same expression is usually produced...
In a walking rehabilitation, the cooperative walking between therapist and patient is implemented and the synchrony of walking rhythm is often observed. So, we suggest that the interpersonal synchrony is important for walking rehabilitation. Our group has proposed gait assistive system using interactive rhythmic auditory stimulation to emulate interpersonal synchrony. It is called “Walk-Mate”. In...
Managing critical infrastructures under the growing cyber-threat is becoming a matter of international urgency. The volume and frequency of cyber-related incidents on the rise yearly, and the level of sophistication is increasing. Critical infrastructures are key service providers and heavily interconnected, meaning any damaging impact would result in devastating consequences and potential cascading...
In contrast to intelligence, wisdom is the part of the propositional knowledge part of the background of knowledge that is a mean between two extremes of believing without sufficient evidence and not believing with sufficient evidence. Wisdom may be incorporated in an artificial intelligence system as artificial wisdom (AW). An intelligence system with AW, will learn a collection of activities like...
This study focuses on the negotiation in the financial markets, specifically in programming an algorithm to trade automatically (without human intervention) in the foreign exchange market (Forex). The platform used in this study was the Meta Trader (version 5), which allows for this kind of negotiation. The main objective was to conclude about the effectiveness of anewly developed strategy for automatic...
The security of web applications is an ongoing dilemma. Hackers and bots are getting more and more innovative in bypassing the various defensive tools implemented to enforce security. e-Commerce Applications, such as those used for the transaction processes, could be in a placed in a position of not providing a fair chance to all consumers because because can interact more quickly. This is especially...
With the rapid advancement of hardware efficiency in recent years, computation power has significantly improved, increasing the speed and depths of the game tree search in computer chess programs. However, to satisfy the need of increasing search depth, the investment in hardware is no longer personally affordable. Thus, another method must be found in addition to improving the efficiency of hardware...
In many decision problems, there are two levels of choice: The first one is strategic and the second is tactical. We formalize the difference between both and discuss the relevance of the bandit literature for strategic decisions and test the quality of different bandit algorithms in real world examples such as board games and card games. For exploration-exploitation algorithm, we evaluate the Upper...
The objectives of these studies were to examine the effect of non-verbal cues of a Future Robotic Computer (FRC) on peopl's impressions of the robots (Study 1) and on people's perceptions of the robots' emotions (Study 2). In Study 1, participants watched nine stimuli drawn from robots in three working conditions (not working, working using one eye module, working using two eye modules) and in three...
An important method used to speed up forensic file-system analysis is white-listing of files: Well-known files are detected using signatures (message digests) or similar methods, and omitted from further analysis initially, in order to better focus the initial analysis on files likely to be more important. Typical examples of such well-known files include files used by operating systems, popular applications,...
Due to the ubiquity of web browsers and the dramatic development of dynamic web pages, web applications become the most popular computing model for providing services over the Internet. Unfortunately, this type of systems is vulnerable to the attacks issued by automated programs. CAPTCHA, a challenge-response test, is the most widely used mechanism to protect web application systems from attacks issued...
This paper collected the literatures (published in the last decade) of Human-computer Interaction from ISI Web of Science, and used the method of Mapping Knowledge Domains, to study the recent key topics and core documents in HCI. the results identify three research directions, including recognition technology, user interface design and usability study. the key topics in each direction and evolution...
This paper presents a content-based image retrieval (CBIR) system using multiple Hierarchical Temporal Memory classifiers. in order to improve the efficiency of image management and retrieval, the CBIR system proposed in this paper take advantage of Hierarchical Temporal Memory Algorithm which replicates the structure and function of the human neocortex. in this study, multiple Hierarchical Temporal...
In this paper, we propose a method for representing “neighborhoods” of moving objects such as people. By using neighborhoods, it is possible to determine whether the spatial relations between objects and their surrounding spatial information are strong. It can be said that a neighborhood is the spatial area of an object's attention, interest or concern. It is preferable that neighborhoods move while...
This paper presents a unified action recognition framework combining harris3D descriptor with 3D SIFT detector. We perform action recognition experiments on the KTH dataset using Support Vector Machines. Experiments apply the leave-one-out and compare our proposed approach with state-of-the-art methods. The result shows that our proposed approach is effective. Compared with other approaches our approach...
GORGE is the name of a research tool developed for investigations into playful development of technology competence. As a research tool, it has been employed several times in varying settings and application scenarios always quite successfully. Set up as a browser game, GORGE is now invading private homes. Playing GORGE may result in a gain of technology competence provided that particular aspects...
CAPTCHA (Completely Automated Public Turing Test to tell Computers and Human Apart) is widely used than before, which becomes the common part of current website login system. However, the CAPTCHA implementation is tricky and risky without deliberate design. In this paper, we give a study case of the vulnerabilities in current login website using text-based CAPTCHA. Our target is a website of mainstream...
The incapability of virtual agents to analyze the irrational behavior in human-virtual agent interactions urges to develop efficient mechanisms to capture the irrationality. Irrational actions in cognitive interactions are employed to attract the opponent's trust or to make future actions harder to anticipate. Recent works mostly investigate interactions of multiple decision makers with perfect knowledge...
The English alphabet is employed for inputting English and other Western languages into the Computer. It is also used for many other languages such as the Chinese and Japanese for the same purpose. Since the Alphabet is a phonetic system, it can be said that all computer input is made through phonetics. Although the script system of these languages use commonly the Alphabet, the way of reading them...
CAPTCHAs are popularly used techniques to distinguish humans and automated applications. Such techniques are often useful in banking transactions, email creation, online surveys, data downloads etc. Starting from a very primitive stage of providing the users with a simple alphabetical string to asking using to do complex calculations, CAPTCHAs have come a long way in terms of sophistication of human-bot...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.