The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Every year, companies are searching for professionals in cybersecurity more than ever before; however, there is a big void in the pipeline. Interestingly enough, the largest source of security incidents are unintentional insiders, which demonstrates the need for cybersecurity education not only for developing cybersecurity workforce but also to raise mere awareness and consciousness about these issues...
The article describes a new author's method of floodlighting designing of architectural objects. The method is described and the advantages and limits are shown. The method allows to create a multivariate concept of illumination without the need of usage of complex visualization tools. It is based on projections on the real object of the 3D model or two-dimensional grid, the luminance distribution...
This research studies the effects of a conversation-gambits visual novel game on students' English achievement and motivation. 54 students involved in this research. The research implemented experimental design with 27 students in control group and the other 27 in the experimental group. The experimental group used the conversation-gambits visual novel game while the control group used printed book...
The possibility of more intuitive human-machine interfaces has sparked the development of new visual technologies. The way humans interact with elements of their environment should not be limited to the screens of phones or computers. Other alternatives where a sensation of spatial freedom are under development. Projection systems, using continuous light on surrounding surfaces, represent a major...
Considerable research has been done looking at the asymmetries between the dominant and nondominant arms. However, one area that has received less attention is how information about a perturbation affects these upper limb asymmetries. Our study sought to determine whether foreknowledge of a perturbation can affect the compensation from each arm. In addition, we examined the differences in compensation...
Steady state visual evoked potentials (SSVEPs) are the brain signals induced by gazing at a constantly flickering target. Frame-based frequency approximation methods can be implemented in order to realize a high number of visual stimuli for SSVEP-based Brain-Computer Interfaces (BCIs) on ordinary computer screens. In this paper, we investigate the possibilities and limitations regarding the number...
The conventional intervention for chronic total occlusion (CTO) of the coronary artery has crucial challenges for its successful outcome; surgeons should understand the vascular anatomy and the instrument location, solely depending on two-dimensional (2D) X-ray images. Excessive doses of both X-ray radiation and the contrast agent from continuous fluoroscopy are also critical limitations in clinical...
This application is based on face recognition and facial features techniques to extract Regions Of Interest (ROI) by applying Haar filters and cascade classifier with OpenCV implemented in Visual Studio C#. Likewise, a software program was developed to transform blinkings into words, along with a graphical user interface, in which the spanish language alphabet letters and predifined phrases are displayed...
Now a days many people are doing online financial transactions. This transaction needs to be secure. There are various attacks present behind this. Phishing is one type of attack. For detecting this attack, various anti-phishing mechanisms are used. In phishing process, suppose cheater sends out thousands of phishing emails with a link to the fake website. Victims click on links in email believing...
Internet usage is rising at a frenzied rate as knowledge and information sharing becomes easy and time-saving. Regrettably, the visually impaired do not enjoy this liberty and they have difficulties in using the computer and the Internet to obtain any shared and published information. This difficulty is also faced by the visually impaired Bahasa Melayu (BM) language medium Internet users. Existing...
The REU Site: Research Experience for Undergraduates in Collaborative Data Visualization Applications (VisREU) is a multi-year, interdisciplinary program that provides research experiences for undergraduates with an interest in visualization. The unique feature of the VisREU site is the paring of undergraduate students with research teams which consist of a research faculty member, graduate students...
Many studies have shown that temporal asynchrony of visual-auditory stimuli can influence the integration between visual and auditory modality, however, the multisensory mechanisms of asynchronous inputs were not well understood. To investigate the effect of temporal asynchrony on audiovisual integration, we measured event-related potentials (ERPs) and behavior in human subjects. In this study, visual...
The current studies indicated that sound can improve the visual perception. However, whether the gain is influenced by temporal disparity between visual and auditory stimuli, and whether the gain is the same for older and younger adults remains unclear. To clarify this mechanism, ten older adults and 10 younger adults were invited to confirm and visual/auditory discrimination task. The visual target...
Examination affairs management is a bottleneck of the examination management information system because of its complex process, many participants and its confidentiality requirements. To solve this problem, an automated management information system of the examination affairs is present in this paper. In the system the examination affairs is controlled by the workflow based on forms, and its security...
In the real-word matching, deformation, outliers and other emerging variations are inseparable conditions which make matching increasingly difficult. One way to solve this challenging problem is raising an effective graph matching method which is flexible to non-rigid objects. As a good structure representation, graph can nicely describe objects with meaningful information. Meanwhile, feature pooling...
Infographic is a type of information visualization that uses graphic design to enhance human ability to identify patterns and trends. It is popularly used to support spread of information. Yet, there are few studies that investigate how infographics affect learning and how individual factors, such as learning styles and enjoyment of the information affect infographics perception. In this sense, this...
Computer Assisted Language Learning (CALL) uses computers in the language learning process. The design and development of CALL resources is difficult and sometimes the potential of HCI in the process is overlooked. This paper provides an overview of how the CALLIPSO (CALL for Irish for Parents Students and Others) system uses animated visualisation to demonstrate words are pronounced in Irish. Irish...
Gaze estimation is the process of determining the point of gaze in the space, or the visual axis of an eye. It plays an important role in representing human attention; therefore, it can be most appropriately used in Human Computer Interaction as a means of an advance computer input. Here, the focus is to develop a gaze estimation method for Human Computer Interaction using an ordinary webcam mounted...
The main purpose of analyzing the social network data is to observe the behaviors and trends that are followed by people. How people interact with each other, what they usually share, what are their interests on social networks, so that analysts can focus new trends for the provision of those things which are of great interest for people so in this paper an easy approach of gathering and analyzing...
Existing approaches for egocentric activity recognition mainly rely on a single modality (e.g., detecting interacting objects) to infer the activity category. However, due to the inconsistency between camera angle and subject's visual field, important objects may be partially occluded or missing in the video frames. Moreover, where the objects are and how we interact with the objects are usually ignored...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.