The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article presents the results of an eye-tracking experiment concerning a part of “My Little Pony” cartoon. The aim of the research was to find out the ways of watching animated auditions for children by adults, and how those ways differ among men and women. The text includes the description of the research procedure and the results of the research in terms of the most important measurements and...
Section 2. Information and communication technologies. IEEE-paper. The automatic synthesis method of the timeparametrized (timing) parallel programs for the multiprocessing computers is suggested. The synthesis method support architecture and configuration of the computers with true shared and distributed memory as well as the users demands and limitations (time of task solution or numbers of processors...
The rapid serial visual presentation (RSVP) paradigm is a method that can be used to extend the P300 based brain computer interface (BCI) approach to enable high throughput target image recognition applications. The method requires high temporal resolution and hence, generating reliable and accurate stimulus triggers is critical for high performance execution. The traditional RSVP paradigm is normally...
This paper presents the design, development and analysis of a game for computer literacy. Specifically, the game addresses educational objectives included in the curriculum of non-technological careers, such as the identification and analysis of concepts related to basic hardware components of a computer. These objectives are joined with those of a video game, i.e., live an attractive, motivating...
Cargo transportation between moving platforms is one of the most meaningful potential applications of UAVs. However, to fully autonomously transport the cargos, the UAV is required to have high position precision and high intelligence to tackle all the emergencies, on which the technology is not mature yet. In this article, we present a quadrotor system targeting at fully autonomous cargo transportation...
Nowadays there is an increasing demand for the design of assistive devices able to improve the lives of persons with disabilities. In this work, an intelligent human-machine multi-interface framework was developed, implemented and tested, to allow the replacement of the mouse by new humancomputer interfaces. Non-intrusive facial tracking presents obvious advantages for human users that cannot be able...
Computer Assisted Qualitative Data Analysis Software (CAQDAS) may be defined as tools that help researchers developing qualitative research projects. These software packages help the users with tasks such as transcription analysis, writing and annotation, coding and text interpretation, recursive abstraction, content search and analysis, discourse analysis, data mapping, grounded theory methodology,...
This paper present the design and delivery procedure for a computer based assessment for brain electrophysiology technique of dyslexic children. Electrical activities of the brain are recorded using electroencephalograph where analysis can then be made and results can lead towards an objective diagnosis assessment of dyslexia. The benchmark of the assessment design is based on methods employed by...
In recent times there has been a decline in the confidence of common people over electronic voting machines (EVMs). More anticipated than what the reality actually is, today's automated vote casting methods have faced immense controversy related to being vulnerable to hacking and questions have been raised about their transparency and security. This paper proposes the design and development of a novel...
The paper introduces a framework for replacing selected foreground region with appropriate background region using inpainting and super-resolution techniques. To get maximum details of the missing area, super-resolution algorithm is used. This scheme makes use of inpainting of low-resolution images easier. Main novelty of the paper is in terms of reducing number of computation time by reducing size...
Eye tracking measures where the eye is focused or the movement of eye with respect to the head. The eye tracker will track the eye positions and eye movement for the visual stimulus presented on the computer system. Various features like gaze point, pupil size and mouse position can be extracted and it can be represented using visualization techniques such as fixation, saccade, scanpath and heat map...
Task of 3D scene generation has been focused in many systems but without processing its input query. Such system automatically generates 3D equivalent of text input by identifying explicit and implicit constraints. However, if input query is refined, generation of more relevant scene will be easy. Our proposed system takes raw text as input identifies misspelled, incomplete and non visualizable words...
In this paper, a manipulation classification method based on SURF features was proposed for near-duplicate videos (NDVs). After detect corresponding keyframes based on Zernike moments, we use the SURF matching algorithm to find matched point pairs. The orientation among these corresponding point pairs is measured to evaluate the consistency for manipulation classification. The experimental results...
This paper introduces a classification scheme for the visual classification of cyber attacks. Through the use of the scheme, the impact of various cyber attacks throughout the history of South Africa are investigated and classified. The goal of this paper is to introduce a classification scheme that arranges attacks into different classes and sub-classes, which is presented visually. To enhance the...
How can we use information visualization to support retrospective, exploratory analysis of collections of histories for patients admitted to acute care? This paper describes a novel design for visual cohort identification and exploration. We have developed a tool that integrates multiple, heterogeneous clinical data sources and allows alignment, querying and abstraction in a common workbench.
In this study, we combine a voxel selection method with temporal mesh model to decode the discriminative information distributed in functional Magnetic Resonance Imaging (fMRI) data. We first employ one way Analysis of Variance (ANOVA) feature selection to select the most informative voxels. Then, we form meshes around selected voxels with their spatial and functional neighbors by employing the Mesh...
Since Arduino is the main entry-level platform to the world of electronic circuits and systems, there are many programming environments that try to ease the burden of Arduino textual programming on young primary students. Although block-based, most of these environments retain the imperative structures of textual programming languages, which are not easily comprehensible by such students. The proposed,...
Modern programming paradigms have brought many different challenges for visually impaired programmers. Graphical interfaces have become one of the biggest obstacles for visually impaired programming professionals. The same problems that relate to visually impaired programmers also apply to programming education in which it is very challenging to make educational interfaces accessible for visually...
The Finnish power company Teollisuuden Voima Oy studies crystalline bedrock in Finland for final disposal of high-level nuclear fuel waste. In evaluation of the varying lithological and structural conditions CAD-based ROCK-CAD system has been developed. ROCK-CAD is based on true solid modelling approach. One modelled volume consists of several mutually independent submodels. Mainly lithological, structural...
With the rising popularity of mobile devices, recent years have witnessed a growing interest in document image retrieval (DIR). In conventional Bag-of-Visual-Words (BoVW) based document image retrieval method, only SIFT or SURF feature is used to locate feature points and produce a codebook, which has a low discriminative power. Though several multiple feature based BoVW methods are proposed, these...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.