Search results for "Intelligence"

showing 10 items of 6959 documents

Adoption of Constrained Application Protocol

2016

Among billions of Internet enabled devices that are expected to surround us in the near future, many will be resource constrained, i.e., will have limited power supply, processing power and memory. To cope with these limitations, the Constrained Application Protocol (CoAP) has been recently introduced as a lightweight alternative to HTTP for connecting the resource limited devices to the Web. Although the new protocol offers solid technical advantages, it remains uncertain whether a successful uptake will follow, as it depends also on its economic feasibility for the involved stakeholders. Therefore, this paper studies the techno-economic feasibility of CoAP using a systematic methodologica…

Computer sciencebusiness.industryPerspective (graphical)Techno economic020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreConstrained Application ProtocolWeb of ThingsRisk analysis (engineering)Software deployment0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingThe InternetLiterature surveybusinesscomputerProtocol (object-oriented programming)International Journal of Innovation in the Digital Economy
researchProduct

A Dual Taxonomy for Defects in Digitized Historical Photos

2009

Old photos may be affected by several types of defects. Manual restorers use their own taxonomy to classify damages by which a photo is affected, in order to apply the proper restoration techniques for a specific defect. Once a photo is digitally acquired, defects become part of the image, and their aspect change. This paper wants to be a first attempt to correlate real defects of printed photos, and digital defects of their digitized versions. A dual taxonomy is proposed, for real and digital defects, and used to classify an image dataset, for a posteriori comparative study. Furthermore, a set of digital features is analyzed for digitized images, to identify which of them could be useful f…

Computer sciencebusiness.industryPhotographyVisual descriptorsComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONImage processingFingerprint recognitionDUAL (cognitive architecture)Set (abstract data type)Image restorationImage processingTaxonomy (general)Computer visionArtificial intelligenceImage processing; Image restorationbusinessImage restoration2009 10th International Conference on Document Analysis and Recognition
researchProduct

Line reconstruction using prior knowledge in single non-central view

2016

International audience; Line projections in non-central systems contain more geometric information than in central systems. The four degrees of freedom of the 3D line are mapped to the line-image and the 3D line can be theoretically recovered from 4 projecting rays (i.e. line-image points) from a single non-central view. In practice, extraction of line-images is consid- erably more difficult and the resulting reconstruction is imprecise and sensitive to noise. In this paper we present a minimal solution to recover the geometry of the 3D line from only three line-image points when the line is parallel to a given plane. A second minimal solution allows to recover the 3D line from two points w…

Computer sciencebusiness.industryPlane (geometry)Pipeline (computing)[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]02 engineering and technologyDegrees of freedom (mechanics)[ INFO.INFO-CV ] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]01 natural sciencesExtractor[INFO.INFO-CV] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]0103 physical sciencesLine (geometry)Vertical direction0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer visionNoise (video)Artificial intelligence010306 general physicsbusinessPlucker
researchProduct

Towards a design process for modeling MAS organizations

2012

The design of MAS organizations is a complex activity where a proper methodological approach may offer a significant advantage in enabling the conception of the best solution. Moreover, the aid provided by a supporting tool significantly contributes to make the approach technically sound and it is a fundamental ingredient of a feasible strategy to the development of large MASs. In this paper, we introduce a portion of methodological approach devoted to design MAS organizations and a preliminary version of a specific case tool, named MoT (Moise+ Tool), for supporting activities from design production to automatic code generation. MoT provides four kinds of diagrams based on a definite graphi…

Computer sciencebusiness.industryProcess (engineering)NotationGraphical notationMethodological approachDevelopment (topology)Complex activityCode (cryptography)Design processProduction (economics)Code generationArtificial intelligenceAutomatically generatedDesign proceSoftware engineeringbusinessComputer-aided software engineeringSupporting toolAutomatic code generation
researchProduct

Pronunciation Learning Strategy Chains: A Qualitative Approach

2014

Language learning is a daunting process frequently enhanced by a number of factors, for example, language learning strategies deployed in an orchestrated manner (Oxford 1990). Similarly, pronunciation learning may be supported by effective strategies used either separately or in logically combined chains. However, little attention has been given so far to the strategies L2 learners employ when learning the target language pronunciation, not to mention pronunciation learning strategy chains. Hence, there have been a limited number of empirical investigations into pronunciation learning strategies (PLS) in general and in particular the ones following the qualitative design (cf. Bukowski 2004;…

Computer sciencebusiness.industryProcess (engineering)PronunciationLanguage acquisitioncomputer.software_genreLinguisticsCognitive strategyLanguage learning strategiesQualitative designElectronic dictionaryL2 learnersArtificial intelligencebusinesscomputerNatural language processing
researchProduct

Convolutional Neural Network for Blind Mesh Visual Quality Assessment Using 3D Visual Saliency

2018

In this work, we propose a convolutional neural network (CNN) framework to estimate the perceived visual quality of 3D meshes without having access to the reference. The proposed CNN architecture is fed by small patches selected carefully according to their level of saliency. To do so, the visual saliency of the 3D mesh is computed, then we render 2D projections from the 3D mesh and its corresponding 3D saliency map. Afterward, the obtained views are split to obtain 2D small patches that pass through a saliency filter to select the most relevant patches. Experiments are conducted on two MVQ assessment databases, and the results show that the trained CNN achieves good rates in terms of corre…

Computer sciencebusiness.industryQuality assessmentDistortion (optics)ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION020207 software engineeringPattern recognition02 engineering and technologyFilter (signal processing)Convolutional neural networkVisualizationSalience (neuroscience)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingSaliency mapArtificial intelligencebusinessComputingMethodologies_COMPUTERGRAPHICSVisual saliency2018 25th IEEE International Conference on Image Processing (ICIP)
researchProduct

Study of transmission parameters under controlled multipath environment using Rasp Pi3

2018

The evaluation of QoS in mobile multipath environments is an interesting topic in modern communications. The use of Raspberry Pi as a low cost microcomputer board developed in the United Kingdom by the Raspberry Pi Foundation can be helpful in onsite deployments. The Pi3 model has integrated WiFi and Bluetooth connectivity and also 4 USB ports to expand the device with all kinds of peripheral. Under the premise of offering the power of a computer at low prices, this device is one of the most affordable ways to have a particularly efficient and dynamic hardware accessible at a low price to develop a Wireless Sensor Netwok (WSN). The use of the Raspberry Pi3 permits the development of a power…

Computer sciencebusiness.industryQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications02 engineering and technologyUSBlaw.inventionBluetoothBase stationlawMicrocomputer0202 electrical engineering electronic engineering information engineeringWireless020201 artificial intelligence & image processingbusinessWireless sensor networkComputer hardwareMultipath propagationProceedings of the Euro American Conference on Telematics and Information Systems
researchProduct

Evaluation of SLA-based decision strategies for VM scheduling in cloud data centers

2016

Service level agreements (SLAs) gain more and more importance in the area of cloud computing. An SLA is a contract between a customer and a cloud service provider (CSP) in which the CSP guarantees functional and non-functional quality of service parameters for cloud services. Since CSPs have to pay for the hardware used as well as penalties for violating SLAs, they are eager to fulfill these agreements while at the same time optimizing the utilization of their resources.In this paper we examine SLA-aware VM scheduling strategies for cloud data centers. The service level objectives considered are resource usage and availability. The sample resources are CPU and RAM. They can be overprovision…

Computer sciencebusiness.industryQuality of serviceDistributed computingService level objective020207 software engineeringCloud computingWorkload02 engineering and technologyScheduling (computing)Service-level agreementService level0202 electrical engineering electronic engineering information engineeringLeverage (statistics)020201 artificial intelligence & image processingbusinessProceedings of the 3rd Workshop on CrossCloud Infrastructures & Platforms - CrossCloud '16
researchProduct

Context-Awareness in Ensemble Recommender System Framework

2021

Recommender systems that provide recommendations based uniquely on information over users and items may not be very accurate in some situations. Therefore, adding contextual information to recommendations may be a good choice resulting in a system with increased precision. In an early work, we proposed an Ensemble Variational Autoencoders (EnsVAE) framework for recommendation. EnsVAE is adjusted to output interest probabilities by learning the distribution of each item's ratings and attempts to provide diverse novel items that are pertinent to users. In this paper, we propose and investigate a context awareness framework based on the Ensemblist Variational Autoencoders model with integratin…

Computer sciencebusiness.industryRecommender systemMachine learningcomputer.software_genreTest (assessment)Data modelingFilter (video)Task analysisContextual informationContext awarenessArtificial intelligenceBaseline (configuration management)businesscomputer2021 International Conference on Electrical, Communication, and Computer Engineering (ICECCE)
researchProduct

Revealing the unique features of each individual’s muscle activation signatures

2020

AbstractThere is growing evidence that each individual has unique movement patterns, or signatures. The exact origin of these movement signatures however, remains unknown. We developed an approach that can identify individual muscle activation signatures during two locomotor tasks (walking and pedalling). A linear Support Vector Machine was used to classify 78 participants based on their electromyographic (EMG) patterns measured on eight lower limb muscles. To provide insight into decision making by the machine learning classification model, a Layer-wise Relevance Propagation (LRP) approach was implemented. This enabled the model predictions to be decomposed into relevance scores for each i…

Computer sciencebusiness.industryRelevance (information retrieval)Muscle activationPattern recognitionArtificial intelligencebusinessLower limbSignature (logic)
researchProduct