Search results for "Data type"
showing 10 items of 1183 documents
A framework for real-time Twitter data analysis
2016
A framework for real-time Twitter data analysisWe propose improvements to the Soft Frequent Pattern Mining (SFPM) algorithmThe stream of tweets is organized in dynamic windows whose size depends both on the volume of tweets and timeThe set of keywords used to query Twitter is progressively refined to highlight the user's point of viewComparisons with two state of the art systems Twitter is a popular social network which allows millions of users to share their opinions on what happens all over the world. In this work we present a system for real-time Twitter data analysis in order to follow popular events from the user's perspective. The method we propose extends and improves the Soft Freque…
Retargeting Framework Based on Monte-carlo Sampling
2015
Advance in image technology and proliferation of acquisition devices like smartphones, digital cameras, etc., made the display of digital images ubiquitous. Many displays exist in the market, spanning within a large variety of resolutions and shapes. Thus, displaying content optimizing the available number of pixels has become a very important issue in the multimedia community, and the image retargeting problem is being widely faced. In this work, we propose an image retargeting framework based on monte-carlo sampling. We operate the non-homogeneous resizing as the composition of several simple atomic resizing functions. The shape of such atomic operator can be chosen within a set of tested…
Vulnerability evaluation of distributed reputation management systems
2017
In distributed environments, Reputation Management Systems (RMSs) aim to estimate agents' trustworthiness by exploiting different sources of information. The distributed nature of these systems makes them vulnerable to several types of security attacks, and the response provided by a specific RMS depends on various factors, such as the algorithms adopted for estimating the reputation values and the communication protocols used to enable the cooperation among agents. This work examines the most important security attacks against RMSs and proposes a set of metrics for a quantitative evaluation of the RMS vulnerabilities. A parallel simulation framework is used to automatically give a vulnerab…
Concurrent photo sequence organization
2012
Personal photo album organization is a highly demanding domain where advanced tools are required to manage large photo collections. In contrast to many previous works, that try to solve the problem of organizing a single user photo sequence, we present a new technique to account for the concurrent photo sequence organization problem, that is the problem of organizing multiple photo sequences taken during the same event. Given a set of sequences acquired at the same place during the same temporal window by several users using different cameras, our framework is intended to capture the evolution of the event and groups photos based on temporal proximity and visual content. The method automati…
Extracting Touristic Information from Online Image Collections
2012
In this paper, we present a Geographical Information Retrieval system, which aims to automatically extract and analyze touristic information from photos of online image collections (in our case of study Flickr). Our system collect all the photos, and the related information, that are associated to a specific city. We then use Google Maps service to geolocate the retrieved photos, and finally we analyze geo-referenced data to obtain our goals: 1) determining and locating the most interesting places of the city, i.e. the most visited locations, and 2) reconstructing touristic routes of the users visiting the city. Information is filtered by using a set of constraints, which we apply to select…
Accelerating Clifford Algebra Operations using GPUs and an OpenCL Code Generator
2015
Clifford Algebra (CA) is a powerful mathematical language that allows for a simple and intuitive representation of geometric objects and their transformations. It has important applications in many research fields, such as computer graphics, robotics, and machine vision. Direct hardware support of Clifford data types and operators is needed to accelerate applications based on Clifford Algebra. This paper proposes a mixed software-hardware system that exploits the computational power of Graphics Processing Units (GPUs) to accelerate Clifford operations. A code generator, namely OpenCLifford, is presented that automatically generates Java and C libraries for the direct support of Clifford ele…
An FPGA Implementation of a Quadruple-Based Multiplier for 4D Clifford Algebra
2008
Geometric or Clifford algebra is an interesting paradigm for geometric modeling in fields as computer graphics, machine vision and robotics. In these areas the research effort is actually aimed at finding an efficient implementation of geometric algebra. The best way to exploit the symbolic computing power of geometric algebra is to support its data types and operators directly in hardware. However the natural representation of the algebra elements as variable-length objects causes some problems in the case of a hardware implementation. This paper proposes a 4D Clifford algebra in which the variable-length elements are mapped into fixed-length elements (quadruples). This choice leads to a s…
Embedded Coprocessors for Native Execution of Geometric Algebra Operations
2016
Clifford algebra or geometric algebra (GA) is a simple and intuitive way to model geometric objects and their transformations. Operating in high-dimensional vector spaces with significant computational costs, the practical use of GA requires dedicated software and/or hardware architectures to directly support Clifford data types and operators. In this paper, a family of embedded coprocessors for the native execution of GA operations is presented. The paper shows the evolution of the coprocessor family focusing on the latest two architectures that offer direct hardware support to up to five-dimensional Clifford operations. The proposed coprocessors exploit hardware-oriented representations o…
Text localization from photos
2009
In this paper a new text extraction algorithm is proposed. In real scenes the text is usually overlapped or is part of the background. To identify the text regions, in complex conditions, a method exploiting a “multi-resolution feature based method” for extracting text with undefined dimension has been developed. Once identified, the multi-resolution information are merged and skimmed through a set of Support Vector Machines (SVM). The tests and the comparisons with other techniques, performed on heterogeneous images, have shown the effectiveness of the proposed.
Probabilistic squares and hexagons of opposition under coherence
2017
Various semantics for studying the square of opposition and the hexagon of opposition have been proposed recently. We interpret sentences by imprecise (set-valued) probability assessments on a finite sequence of conditional events. We introduce the acceptability of a sentence within coherence-based probability theory. We analyze the relations of the square and of the hexagon in terms of acceptability. Then, we show how to construct probabilistic versions of the square and of the hexagon of opposition by forming suitable tripartitions of the set of all coherent assessments on a finite sequence of conditional events. Finally, as an application, we present new versions of the square and of the…