The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Big network data analysis has become a challenging task not only due to increasing large volume but the appearance of dynamic spatial-temporal relationship. Both network topologies and their link properties are constantly changing as a result of newly established and torn connections. Traditional data mining techniques in large-scale dynamic networks are either incapable or computationally expensive...
EDA tools paved the way for the integration of billion of components in a single integrated circuit. However, many tools still rely on text interfaces. The use of visualizations tools can help not only to provide a visual output of an EDA tool but also to show how a tool is performing in terms of quality of results. A good graphic output can be useful to improve algorithms or develop new ones. Some...
Due to the advancement of digital media, data authentication and security has become a major issue. Digital watermarking comes as a solution to it. This paper gives comparative study of digital watermarking technology based on DWT and SVD on various color spaces. The same technique is applied on various color spaces like RGB, YUV and YCbCr in case of color image. The quality of watermarked image is...
The paper represents a bioengineering system and approaches to stimulating the brain areas responsible for memory and its hippocampus by means of applying brain wave frequencies (alpha, beta, theta, delta), which allow conducting research aimed at finding the ways to restore memory after stroke.
For the first time since 1947 it is proposed to use a simpler and mathematically more rigorous concept of programming with the graphs loaded only through horizontal arcs. Such graph is a polyglot, it has ISO 8631:1989 certificate, and can be used along the entire lifecycle of programming process and working on a computer. The new concept has HUNDREDS(!) times better characteristics from the standpoint...
Within the experiments described in this paper, the authors focused the research on the capabilities of currently available commercial jammers, and tried to prove whether they have the potential to prevent or at least to make it more difficult to misuse commercial UAVs (Unmanned Aerial Vehicles). This will allow to prove or disprove the potential of protection against these means. Furthermore, the...
This paper reports the details and results of a subjective and objective quality evaluation assessing responses to an MPEG call for evidence (CfE) on high dynamic range (HDR) and wide color gamut video coding. Five HDR video contents, compressed at four bit rates by each proponent responding to the CfE, were used in the subjective assessments. To be able to evaluate the performance of objective quality...
In this demo paper, we present the “Music Tweet Map” interface for browsing music listening events on a global scale. These events have been extracted automatically from a large set of microblogs harvested from Twitter. We showcase the major functionalities offered by the interface, i.e., browsing music by time, specific locations, topic clusters learned from tag information, and music charts. Furthermore,...
Visual cryptography is proposed in 1994 by Naor and Shamir who introduced a simple but perfectly secure way that allows secret sharing without any complex cryptographic computation, which they termed as Visual Cryptography Scheme. This proposal shows a new visual cryptography for color image by proposing special table for both IP and IP−1 in a way to increase the diffusion then putting the plain image...
Since Arduino is the main entry-level platform to the world of electronic circuits and systems, there are many programming environments that try to ease the burden of Arduino textual programming on young primary students. Although block-based, most of these environments retain the imperative structures of textual programming languages, which are not easily comprehensible by such students. The proposed,...
Given different ways to fix a failure in a program run, you may want to fix it such that future runs of the same program with other inputs do not show any effect of that fixed bug. We present InfectoMeter, a tool which provides a map of the source code for a programmer such that each statement in the source code is colored based on the impact it has on the rest of the execution. A darker line represents...
Software is modularized to make its high complexity manageable. However, a multitude of modularization criteria exists and is applied. Hence, to extend, reuse, or restructure a system, it is important for developers to understand which criteria have been used. To this end, we provide an interactive visualization approach that compares the current modularization of a system to several software clustering...
Joint architecting, design, and simulation of operational-functional requirements and scenarios on the one hand and system functionality and technological requirements on the other hand is a common challenge in systems engineering. We propose a model-based systems engineering approach that addresses this challenge. The confusion between operational and functional behavior stems from systems engineers'...
Digital crime and constantly emerging software technologies is growing at a rate that far surpasses the various defensive measures. Analysis of computer generated content as an evidence, authentication of digital images can provide support for clue analysis. Our proposed method aims at assisting investigators for the authentication of such clues. Such evidence can also not be proven as tampered or...
Colors play a vital role in letting us perceive and distinguish between the various things that exist in our surroundings. While many of us are able to do so perfectly, some are not blessed with a perfect visual ability. The answer to the question that how fine is our color vision, depends upon some factors which we will be explaining in detail in this paper. When these parameters deviate from their...
Here, we propose that the use of unusual crossed-sense-modality couplings can be exploited to engineer non-realistic but potentially beneficial VEs providing high degrees of interaction and presence, and provide new avenues for enhancing the experience and utility of single- and multi-user VE technologies. We report user's reactions to mediated environments in which the sound of their voice is represented...
Virtual reality is an experience, often generated by computer, which brings immersive environments that can be interacted with. Since 2014, the spread of VR technology created a content demand as well as new paradigms of interactions. One of the key aspects of these new paradigms is that they consider the use of virtual reality by visually impaired people. In HCI, accessibility features are special...
The multiple-assignments approach alleviates the quantization error and enhances the accuracy of the Content-Based Image Retrieval (CBIR) systems. It aims to hard assign each feature vector to k-nearest visual words. However, during the matching step, the k-nearest visual words are used independently and ignore the significant of the best visual word. In this paper, we present our CBIR system which...
A new approach in spatial domain is presented for the enhancement of color images using an Adaptive Bacterial Foraging Algorithm (ABFA). The image may be classified as under-exposed or over-exposed depending upon the value of exposure. A new objective function is formulated which makes use of the fuzzy entropy. This objective function is optimized using ABFA which allows the step-size of the bacterial...
In this paper, we propose MT-Diet, a smartphone-based automated diet monitoring system that interfaces a thermal camera with a smartphone and identifies types of food consumed at the click of a button. The system uses thermal maps of a food plate to increase accuracy of segmentation and extraction of food parts, and combines thermal and visual images to improve accuracy in the detection of cooked...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.