Search results for "Image"
showing 10 items of 6818 documents
Exploiting Semantic Trajectories Using HMMs and BIM for Worker Safety in Dynamic Environments
2020
International audience; Understanding dynamic behaviors of moving objects using positioning technologies for construction safety monitoring is still an open research issue. One task; that is a small subset in the widespread field of objects dynamics is the enrichment of the location data of users with the semantic information for studying their mobility patterns in the context of the environment. However, incorporating the semantics related to the environment gets complex in case of the dynamic construction sites where the site spaces are kept evolving with time. For instance, new walls and infrastructure supports are added often on sites, while others are detached. Similar situations open …
Data lakes in business intelligence: reporting from the trenches
2018
Abstract The data lake approach has emerged as a promising way to handle large volumes of structured and unstructured data. This big data technology enables enterprises to profoundly improve their Business Intelligence. However, there is a lack of empirical studies on the use of the data lake approach in enterprises. This paper provides the results of an exploratory study designed to improve the understanding of the use of the data lake approach in enterprises. I interviewed 12 experts who had implemented this approach in various enterprises and identified three important purposes of implementing data lakes: (1) as staging areas or sources for data warehouses, (2) as a platform for experime…
Gui-driven intelligent tutoring system with affective support to help learning the algebraic method
2017
Despite many research efforts focused on the development of algebraic reasoning and the resolution of story problems, several investigations have reported that relatively advanced students experience serious difficulties in symbolizing certain meaningful relations by using algebraic equations. In this paper, we describe and justify the Graphical User Interface of an Intelligent Tutoring System that allows learning and practising the procedural aspects involved in translating the information contained in a story problem into a symbolic representation. The application design has been driven by cognitive findings from several previous investigations. First, the process of translating a word pr…
An Ontology Model for Interoperability and Multi-organization Data Exchange
2020
Progress in the uptake and use of technologies such as Artificial Intelligence and the Internet of Things seems to be stalled by the colossal fragmentation of information and data standards. This complexity is compounded by issues of inter-organisational differences, hindering effective collaboration. There is a growing demand for cross-organizational integrations in regulated but decentralized environments. This paper introduces an ontology architecture where information is sliced into independent semantic layers, each focusing on a specific aspect of the data. By dissolving traditional monolithic data structures into layered, light semantic components, the necessity to maintain contextual…
Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets
2021
International audience; With the Internet's unprecedented growth and nations' reliance on computer networks, new cyber‐attacks are created every day as means for achieving financial gain, imposing political agendas, and developing cyberwarfare arsenals. Network security is thus acquiring increasing attention among researchers, practitioners, network architects, policy makers, and others. To defend organizations' networks from existing, foreseen, and future threats, intrusion detection systems (IDSs) are becoming a must. Existing surveys on anomaly‐based IDS (AIDS) focus on specific components such as detection mechanisms and lack many others. In contrast to existing surveys, this article co…
Use of H.264 real-time video encoding to reduce display wall system bandwidth consumption
2015
This paper compares the DXT and JPEG image compression techniques used in display wall solutions SAGE and DisplayCluster with hardware accelerated H.264 video encoding that is used in the display wall system developed by the authors of this paper. The obtained processing power usage and generated bandwidth measurements presented in this paper demonstrate that hardware accelerated H.264 encoding offers multiple benefits over software implemented H.264, DXT and JPEG.
Integration of cloud computing tools and knowledge bodies for the management of programming projects
2018
A Body of Knowledge (BOK) is a set of concepts and skills that represent the knowledge of a specific area of engineering or scientific discipline and ensure their common understanding [1]. A BOK can include technical terms and theoretical concepts as well as best practices [2] so in this document we will focus on the context of software engineering specifically in Software Project Management. In addition, Cloud Computing will is becoming the best way to deliver solutions that meet the current need for greater collaboration between companies, education and society. In this context, the learning of Software Project Management is important during the professional life of Informatica since it e…
Binarization of a super-resolving graytone pupil filter by digital halftoning
1995
— Six digital-halftoning procedures, including one algorithm proposed by us, are compared to determine which one is best suited to binarization of a parabolic super-resolving pupil filter. The procedures we deal with include iterative, error-diffusion, error-convergence, and 1-pixel algorithms. We carry out a numerically simulated experiment in which an object that consists of either one point source or two coherent point sources is imaged in a 4f imaging system with either a continuous super-resolving parabolic filter or one of its six different binary versions. The performance of binary filters is examined in terms of two parameters: the resemblance of their amplitude impulse response (AI…
Detection of Duplicated Regions in Tampered Digital Images by Bit-Plane Analysis
2009
In this paper we present a new method for searching duplicated areas in a digital image. The goal is to detect if an image has been tampered by a copy-move process. Our method works within a convenient domain. The image to be analyzed is decomposed in its bit-plane representation. Then, for each bitplane, block of bits are encoded with an ASCII code, and a sequence of strings is analyzed rather than the original bit-plane. The sequence is lexicographically sorted and similar groups of bits are extracted as candidate areas, and passed to the following plane to be processed. Output of the last planes indicates if, and where, the image has been altered.
Interlacing multiplexing techniques for optical morphological correlation
2006
We propose a novel approach to implement nonlinear morphological correlation. Previous implementation was based on a time sequential approach that consists on displaying different binary image decomposition in a joint transform correlator adding each joint power spectra sequentially. A second Fourier transformation of the sum of joint power spectra gives the correlation output. In this paper, we propose to interlace the different binary images into one single distribution. Then, we introduce the distribution in a conventional joint transform correlator. The correlation output gives the morphological correlation at a specific location. The advantage is important considering that no sequentia…