The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Automated Static Analysis Tools (ASATs) are an integral part of today's software quality assurance practices. At present, a plethora of ASATs exist, each with different strengths. However, there is little guidance for developers on which of these ASATs to choose and combine for a project. As a result, many projects still only employ one ASAT with practically no customization. With UAV, the Unified...
The availability of open source software projects has created an enormous opportunity for software engineering research. However, this availability requires that researchers judiciously select an appropriate set of evaluation targets and properly document this rationale. After all, the choice of targets may have a significant effect on evaluation.We developed a tool called RepoGrams to support researchers...
Accessibility is an integral element of Human Computer Interaction (HCI) domain which deals with building the tools in the digital ecosystem that shall be used universally by all categories of users irrespective of their disabilities. For persons with disabilities the security in the digital environments acquires increased significance as they are one among the leading soft targets. Phishing is an...
In this paper we present an immersive virtual reality user study aimed at investigating how customers perceive and if they would purchase non-standard (i.e. misshaped) fruits and vegetables (FaVs) in supermarkets and hypermarkets. Indeed, food waste is a major issue for the retail sector and a recent trend is to reduce it by selling non-standard goods. An important question for retailers relates to...
Color is an effective communication media in the objects of Art and historical (A&H) significance. However, as age increases, the objects become prone to color change through weather conditions, handling, display or preservation tasks. Therefore, to monitor the overall color change or to detect discolored area, it is important to precisely visualize the colored surface. This paper shows that RGB...
Research in this paper is carried out based on the discussion on web design style in teaching material "Web Design" (Yi Zhang, 2015) written by the writer. On the basis of original research, this paper has analyzed the important role of digital technology development played in the evolution of web design style, divided the 21 web design styles discussed in this book into six categories of...
Nowadays, in many applications, we need to convert images from color to gray scale and preserve both the visual appearance and feature discrimination. This paper presents a maximum entropy algorithm, a new color-to-gray conversion, based on the Just noticeable difference (JND). Unlike previous approaches, the proposed method extracts the visual feature edges in the image based on the characteristics...
We present an interactive perception model for object sorting based on Gaussian Process (GP) classification that is capable of recognizing objects categories from point cloud data. In our approach, FPFH features are extracted from point clouds to describe the local 3D shape of objects and a Bag-of-Words coding method is used to obtain an object-level vocabulary representation. Multi-class Gaussian...
The study of brain activity can be done by visual stimulus flickering at specific frequencies, Steady-State Visual Evoked Potential or as known as SSVEP. SSVEP is to stimulate the EEG signal to locate the desired goal of the experiment when a visual stimulus flickering with different constant frequencies and same duration. We aim to present a case study of electroencephalogram (EEG) signal by analyzing...
Video skimming is a process of generating a shorter yet fully comprehensible version of a given video as its dynamic summary. A generic skimming system involves division of the video into segments and selecting the segments based on their suitability. The suitability is often obtained considering various features of the video and combining their individual contributions. Suggesting that the combination...
Visual Cryptography is a secret sharing scheme which owns the technique of sharing the visual information like pictures, text etc. It encrypts a secret into n visual shares printed in transparencies and shared among n participants. Qualified subsets of participants superimpose their transparencies to reconstruct the actual visual secret. The decryption of the visual secret demands no complex computation...
The RoboCupRescue Simulation project is a way to evaluate approaches to disaster relief that use the latest techniques of artificial intelligence, information science, and related topics. The project holds annual international and regional competitions as a part of RoboCup, which is the world cup of autonomous robots. In the competition, participants compete for championship using their own ideas...
Person with visual impairment suffers from various problems and is unable to lead a normal regular life because of their blindness. In this paper, the proposal of a wearable device for visually impaired persons is presented that can detect color and speak out the name of the color in two different languages: Bengali and English, through connected headphone. Bluetooth headphone or wire headphone, even...
We developed the "edutabs box" as a Computer Supported Collaborative Learning (hereinafter, "CSCL") system that consists of a single unit, including a wireless LAN AP, and is portable. Because the edutab box is equipped with a web application that can be used on a browser, there is no need to newly install an application onto the tablet terminal. Therefore, such a CSCL that uses...
In this paper, a simple and efficient method, based on Quaternionic Distance Based Weber Descriptor (QDWD) and object cues, is proposed for saliency detection. Firstly, QDWD, which was initially designed for detecting outliers in color images, is used to represent the directional cues in an image. Meanwhile, two low-level priors, namely the color contrast and center cue of the image, are utilized...
Though it is hard to define ‘presence’, it is often said to be a feeling of being in the place when watching artworks. Visual imagery is the visual perception registered from the eyes. The authors define “presence” as a physiological and emotional feeling which feels that he or she is immerged in a specific virtual environment (VE) when he/she is very interested in the images of virtual reality (VR)...
Communication between devices and data through networks have been increasing drastically in the past few decades. Encryption of data provides high level of security. This paper presents a median based technique for selective encryption where partial data of image is encrypted based on pixel values. An encrypted mask of the image is also appended with the image that specifies the pixels that are encrypted...
In this paper, the estimation of just noticeable color difference in color images is improved by using a new spatial masking. The internal generative mechanism of human of brain theory implies that the human visual system (HVS) is sensitive to the orderly stimulus possessing structural regularity which is easily to be predicted and is insensitive to the disorderly stimulus containing structural irregularity...
In this technology era, every sensitive data must be secured. Visual cryptography is a technique to hide the image based secret. In visual cryptography the secret image is encrypted in to shares and at decryption side all shares are superimposed with each other so that secret is revealed. The key feature of visual cryptography is that, no difficult computation is needed at decryption side to decrypt...
We describe a technique for object detection that uses a combination of global shape descriptors and local point descriptors. Our system is able to represent pose using a global shape descriptor, rather than the commonly used part based representation. This approach considerably reduces computational complexity and achieves a significant performance improvement on an extensive dataset: CUB-200-2011...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.