Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper, we show an end-user oriented tool suite for mobile application development. The advantages of this tool suite are that the graphical user interface (GUI), as well as the application logic can both be developed in a rapid and simple way, and web-based services on the Internet can be integrated into our platform by end-users. This tool suite involves three sub-systems, namely ServiceAccess,...
This paper is about underpinning long-term operations of fleets of vehicles using visual localisation. In particular it examines ways in which vehicles, considered as independent agents, can share, update and leverage each others' visual experiences in a mutually beneficial way. We draw on our previous work in Experience-based Navigation (EBN) [1], in which a visual map supporting multiple representations...
In this paper, we present an online landmark selection method for distributed long-term visual localization systems in bandwidth-constrained environments. Sharing a common map for online localization provides a fleet of autonomous vehicles with the possibility to maintain and access a consistent map source, and therefore reduce redundancy while increasing efficiency. However, connectivity over a mobile...
Data visualizations have become an integral role for management system. It not only allows users to witness, explore and understand large amounts of information, but also convey information more directly expressed. This paper presents how to use JavaScript third-party library such as Flot and D3.js for collection, analysis, processing and visualization of data by using Ajax.
After Great East Japan Earthquake, we increase importance to conserve electric power consumption by using Home Energy Management System, HEMS for short. However, HEMS is insufficient approaches other than change in figure. This study develops user experience as a service for consumers and estimates the system.
Distributed Reflective Denial of Service attacks (DRDoS) represent an ever growing security threat. These attacks are characterized by spoofed UDP traffic that is sent to genuine machines, called amplifiers, whose response to the spoofed IP, i.e. the victim machine, is amplified and could be 500 times larger in size than the originating request. In this paper, we provide a method and a tool for Internet...
Vast amounts of environmental data, and specifically, ocean data are collected every day. These data are multi-dimensional, with longitude, latitude and depth coordinates and time at which it is collected. Numerous ocean variables are tracked including at least temperature, salinity, currents, sea surface height and chlorophyll concentration. The many uses of these data include weather forecasting,...
We present a high-resolution interactive and collaborative data visualization framework capable of supporting multiple user interaction on a large screen display. The data visualization framework takes advantage of SAGE2 collaborative visualization workspace. SAGE2 is designed to take multiple displays and use them as one high-resolution multiuser workspace. SAGE2 users are able to access and manipulate...
This study examines (also develops) several scenarios in a massively multiplayer online game, World of Tanks, in order to observe player's response to the occurred/created stimuli in different situations. A qualitative approach through observation and experience is employed to study the behavior of team players in the real situations, although occurring in a virtual environment. World of Tanks offers...
Searching for a relevant paper is usually done in a tedious and an inefficient way by searching from written references. Another approach is to use citation network. A citation network is a visualization from summary of papers that show the connectivity between the papers according to certain parameters. This paper describes a new way to see the detail from available data. Our approach is a combination...
Data centers are extremely important facilities that contain core business information and applications, but the energy consumption is an inevitable issue, so the thermal distribution monitoring is critical for data centers reliable and stable operation. Thermal information enables monitoring and autonomic thermal management in large data centers. Recent approaches that employed a mobile robot or...
Hundreds of millions of images are uploaded to the cloud every day. Innovative applications able to analyze and extract efficiently information from such a big database are needed nowadays more than ever. Visual Search is an application able to retrieve information of a query image comparing it against a large image database. In this paper a Visual Search pipeline implementation is presented able...
We present a novel indoor mapping and localisation approach for Augmented Reality (AR) devices that exploits the fusion of inertial sensors with visual odometry. We have demonstrated the approach using Google Glass (GG) and Google Cardboard (GC) supported with an Android phone. Our work presents an application of Extended Kalman Filter (EKF) for sensor fusion for AR based application where previous...
The scoring function is a central component in mobile visual search. In this paper, we propose an embedded 3D geometry score for mobile 3D visual search (M3DVS). In contrast to conventional mobile visual search, M3DVS uses not only the visual appearance of query objects, but utilizes also the underlying 3D geometry. The proposed scoring function interprets visual search as a process that reduces uncertainty...
Aiming at understanding the role of short-term memory in subjective image quality assessment, we report and compare results from two pair-comparison methods: stimuli shown side-by-side versus stimuli shown one after the other. Our results suggest that there is a significant chance that an observer will make different quality assessments in the two setups.
In contrast to still image analysis, motion information offers a powerful means to analyze video. In particular, motion trajectories determined from keypoints have become very popular in recent years for a variety of video analysis tasks, including search, retrieval and classification. Additionally, cloud-based analysis of media content has been gaining momentum, so efficient communication of salient...
In this paper we show DIORAMA efficiency in a simulated Mass Casualty Incident drill. As shown by our results DIORAMA system has achieved orderly transport of patients from site of injury to collection point, all red before the yellow were transported (no order was obeyed in the paper drills). We also show that DIORAMA system was used by responders with very short training time and by responders that...
Now a days many people are doing online financial transactions. This transaction needs to be secure. There are various attacks present behind this. Phishing is one type of attack. For detecting this attack, various anti-phishing mechanisms are used. In phishing process, suppose cheater sends out thousands of phishing emails with a link to the fake website. Victims click on links in email believing...
Security is one of the basic needs of a system. New methods of providing security need to be found. To overcome all the security issues in current protocol, a new protocol is defined. The protocol makes use of visual cryptography technique by which images can be used as password. Here, we use the visual secret sharing scheme to protect the data that cannot afford getting hacked. Authentication is...
This paper describes a Web application that was developed at our faculty last year. This application visualizes the results of monitoring traffic in city centers. The method of visualization is performed by using of interactive graphs. Complex JavaScript components were designed in order to encapsulate the selected technology that works with charts in a Web environment. The application is designed...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.