The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Good quality requirements help you to make the right architectural decisionsbut collecting your requirements is not always easy. The Quality AttributeWorkshop (QAW) helps teams effectively gather requirements but can be costlyand cumbersome to organize. The mini-QAW is a short (a few hours to a full day)workshop designed for inexperienced facilitators and a great fit for teamspracticing Agile methods...
Content-based image retrieval is a technology that is used to identify similar images based on their visual content. Relevant images are found by employing methods that rank images and show the top-ranked images. One important query pertaining to image retrieval methods is regarding as to how to rank the results. This paper proposes a new method based on an unsupervised Hopfield neural network that...
Community analysis is an important task in graph mining. Most of the existing community studies are community detection, which aim to find the community membership for each user based on the user friendship links. However, membership alone, without a complete profile of what a community is and how it interacts with other communities, has limited applications. This motivates us to consider systematically...
Hashing methods have proven to be useful for a variety of tasks and have attracted extensive attention in recent years. Various hashing approaches have been proposed to capture similarities between textual, visual, and cross-media information. However, most of the existing works use a bag-of-words methods to represent textual information. Since words with different forms may have similar meaning,...
Human-robot teams can incorporate advanced technology such as distributed mobile sensor networks, integrated communications, visualization technology, and other means to acquire and assess information. These factors can greatly affect mission effectiveness, safety, and survivability, by providing critical information and suggesting courses of action. However, information overload can result. Tactical...
In this paper, we analyse first-person-view videos to develop a personalized user authentication mechanism. Our proposed algorithm generates provisional image-based passwords which benefit a variety of purposes such as unlocking a mobile device or fallback authentication. First, representative frames are extracted from the egocentric videos. Then, they are split into distinguishable segments before...
Pervasive computing and, specifically, the Internet of Things aspire to deliver smart services and effortless interactions for their users. Achieving this requires making sense of multiple streams of sensor data, which becomes particularly challenging when these concern people's activities in the real world. In this paper we describe the exploration of different approaches that allow users to self-annotate...
Visual Cryptography is a technique, which is used to conceal the secret image into transparencies and these transparencies are distributed to the intended recipients. They demonstrated a visual secret sharing scheme, where an image was broken up into n shares so that only someone with all n shares could decrypt the image, while any n−1 shares revealed no information about the original image. In this...
This paper proposes a multi-lingual enhanced Rapid Serial Visual Presentation (RSVP) system named “MulLinR,” which is an attempt for language-specific problems of existing RSVP tools. We design and build a prototype system, which currently only supports Japanese, and experiment with variation of presentation time intervals. Experimental results suggests 400 milliseconds is the most suitable time interval...
The correlation between visual perception and the evoked emotional response has been investigated extensively in the area of cognitive psychology using the method of electroencephalography (EEG). Activities in the visual cortex have been found to be correlated with psychophysical performance, visual attention, and subjective perceptual experience. While electroencephalography could record the cerebral...
In this paper, we propose a phase field variational model with arctangent regularization for saliency detection. The classical Cahn-Hilliard model is used to extract features in complex image domain with highly anisotropic interfacial energy. Various visual attention features can be detected by minimizing the energy functional. The processing of saliency detection can be seen as a dynamical competition...
Deep learning is a hot research topic at home and abroad. In view of the massive 3D model data, a 3D model identification method based on topographic sparse coding is proposed. Firstly, the 3D model is projected to get its three views, and the feature vector is used as the training sample. A complete dictionary is constructed by using the greedy algorithm to train the dictionary, which makes the normal...
Automatic prediction of continuous level emotional state requires selection of suitable affective features to develop a regression system based on supervised machine learning. This paper investigates the performance of low-level dynamic features for predicting two common dimensions of emotional state, namely, valence and arousal instantaneously. Low-complexity features are extracted from audio and...
Driving an automobile taxes the driver in almost all of his sensory systems and uses his deduction power to the fullest. The mental state of the driver is vital to safe and correct driving. This paper focuses on identifying the emotional state of the driver based on his interactions with the automobile while driving and inferring when the driver is in an unpleasant state of mind. The driver's actions...
Visual Cryptography is a secret sharing scheme which owns the technique of sharing the visual information like pictures, text etc. It encrypts a secret into n visual shares printed in transparencies and shared among n participants. Qualified subsets of participants superimpose their transparencies to reconstruct the actual visual secret. The decryption of the visual secret demands no complex computation...
Information which is related to the geographic area is being produced continuously. However, there is currently no technique that can handle large spatial data. For this reason, we developed a spatial big data platform, ORANGE, based on the Apache Hadoop. ORANGE can load the vector and raster data based on HDFS and manages metadata and creates index data using the Apache HIVE. These improvements made...
In this paper, we propose SpreadViz, a web tool for exploration and visualization of spreading processes in social networks. SpreadViz consists of three main modules, namely graph exploration and analytics, detection of influential nodes, and interactive visualization. More precisely, SpreadViz offers the following functionalities: (i) It computes and visualizes various centrality criteria towards...
Smart boards enable students to learn and explore new concepts using technology to create a more dynamic learning experience. Students become more excited about learning when the smart boards are incorporated into the lesson. Many educators encourage the use of smart boards in teaching and learning. This paper presents a conceptual framework for the use of smart boards among students and teachers...
There is an increasing need to quickly understand the contents log data. A wide range of patterns can be computed and provide valuable information: for example existence of repeated sequences of events or periodic behaviors. However patternminingtechniquesoftenproducemanypatternsthathave to be examined one by one, which is time consuming for experts. On the other hand, visualization techniques are...
With the development of data science, the market of data also plays a significant role in the data mining domain gradually. This paper focus on how to use a visualization method based on contour map to seek the relationship between Data Jackets in order to create an innovative chance for data transaction. The analysis of results by questionnaires can illustrate the feasibility of this visualization...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.