Search results for "Server"

showing 10 items of 586 documents

Full-parallax immersive 3D display from depth-map cameras

2016

We exploit two different versions of the Kinect to make comparison of three-dimensional (3D) scenes displayed by proposed integral imaging (InI) display system. We attempt to show the difference between each version specifications and capacity. Furthermore, we illustrate our study result with some empirical imaging experiment in which the final result are displayed with full-parallax. Each demonstrated integral images can provide clear comparison results to the observer.

Integral imagingComputer sciencebusiness.industryComparison results02 engineering and technologyObserver (special relativity)Stereo display01 natural sciences010309 opticsDepth mapComputer graphics (images)0103 physical sciences0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer visionArtificial intelligencebusinessParallax2016 15th Workshop on Information Optics (WIO)
researchProduct

Full-parallax 3D display from the hole-filtered depth information

2015

In this paper we introduce an efficient hole-filling algorithm for synthetic generation of microimages that are displayed on an integral imaging monitor. We apply the joint bilateral filter and the median filter to the captured depth map. We introduce in any step of the iterative algorithm with the data from a new Kinect capture. As a result, this algorithm can improve the quality of the depth maps and remove unmeasured depth holes effectively. This refined depth information enables to create a tidy integral image, which can be projected into an integral imaging monitor. In this way the monitor can display 3D images with continuous views, full parallax and abundant 3D reconstructed scene fo…

Integral imagingbusiness.industryComputer scienceIterative methodComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONObserver (special relativity)Stereo displayDepth mapComputer graphics (images)Median filterComputer visionBilateral filterArtificial intelligencebusinessParallax2015 3DTV-Conference: The True Vision - Capture, Transmission and Display of 3D Video (3DTV-CON)
researchProduct

Toward 3D integral-imaging broadcast with increased viewing angle and parallax

2018

Abstract We propose a new method for improving the observer experience when using an integral monitor. Our method permits to increase the viewing angle of the integral monitor, and also the maximum parallax that can be displayed. Additionally, it is possible to decide which parts of the 3D scene are displayed in front or behind the monitor. Our method is based, first, in the direct capture, with significant excess of parallax, of elemental images of 3D real scenes. From them, a collection of microimages adapted to the observer lateral and depth position is calculated. Finally, an eye-tracking system permits to determine the 3D observer position, and therefore to display the adequate microim…

Integral imagingbusiness.industryComputer scienceMechanical EngineeringComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION02 engineering and technologyObserver (special relativity)BroadcastingÒptica021001 nanoscience & nanotechnologyViewing angle01 natural sciencesAtomic and Molecular Physics and OpticsElectronic Optical and Magnetic Materials010309 optics0103 physical sciencesComputer visionArtificial intelligenceElectrical and Electronic Engineering0210 nano-technologybusinessParallaxImatges Processament
researchProduct

Topology management in unstructured P2P networks using neural networks

2007

Resource discovery is an essential problem in peer-to-peer networks since there is no centralized index in which to look for information about resources. In a pure P2P network peers act as servers and clients at the same time and in the Gnutella network for example, peers know only their neighbors. In addition to developing different kinds of resource discovery algorithms, one approach is to study the different topologies or structures of the P2P network. In many cases topology management is based on either technical characteristics of the peers or their interests based on the previous resource queries. In this paper, we propose a topology management algorithm which does not predetermine fa…

Intelligent computer networkArtificial neural networkComputer sciencebusiness.industryDistributed computingServerLogical topologyNetwork topologybusinessNetwork management stationNetwork simulationNetwork formationComputer network2007 IEEE Congress on Evolutionary Computation
researchProduct

Efficient Switches with QoS Support for Clusters

2007

Current interconnect standards providing hardware support for quality of service (QoS) consider up to 16 virtual channels (VCs) for this purpose. However, most implementations do not offer so many VCs because they increase the complexity of the switch and the scheduling delays. We have shown that this number of VCs can be significantly reduced, because it is enough to use two VCs for QoS purposes at each switch port. In this paper, we cover the weaknesses of that proposal and, not only we reduce VCs, but we also improve performance due to the flexibility assigning buffer memory.

InterconnectionWeb serverJob shop schedulingbusiness.industryComputer scienceTheoryofComputation_LOGICSANDMEANINGSOFPROGRAMSQuality of serviceDistributed computingbusinesscomputer.software_genrecomputerComputer networkScheduling (computing)2007 IEEE International Parallel and Distributed Processing Symposium
researchProduct

epiPATH: an information system for the storage and management of molecular epidemiology data from infectious pathogens.

2007

Abstract Background Most research scientists working in the fields of molecular epidemiology, population and evolutionary genetics are confronted with the management of large volumes of data. Moreover, the data used in studies of infectious diseases are complex and usually derive from different institutions such as hospitals or laboratories. Since no public database scheme incorporating clinical and epidemiological information about patients and molecular information about pathogens is currently available, we have developed an information system, composed by a main database and a web-based interface, which integrates both types of data and satisfies requirements of good organization, simple…

Interface (computing)PopulationData securityBiologycomputer.software_genreBioinformaticsWork relatedCommunicable Diseaseslcsh:Infectious and parasitic diseasesRelational database management systemDatabases GeneticInformation systemHumanslcsh:RC109-216RegistrieseducationDatabase servereducation.field_of_studyInternetMolecular EpidemiologyDatabase schemaData scienceInfectious DiseasesDatabase Management SystemscomputerSoftwareBMC infectious diseases
researchProduct

A Trusted Hybrid Learning Approach to Secure Edge Computing

2021

Securing edge computing has drawn much attention due to the vital role of edge computing in Fifth Generation (5G) wireless networks. Artificial Intelligence (AI) has been adopted to protect networks against attackers targeting the connected edge devices or the wireless channel. However, the proposed detection mechanisms could generate a high false detection rate, especially against unknown attacks defined as zero-day threats. Thereby, we propose and conceive a new hybrid learning security framework that combines the expertise of security experts and the strength of machine learning to protect the edge computing network from known and unknown attacks, while minimizing the false detection rat…

Intrustion Detection: Computer science [C05] [Engineering computing & technology]Monitoringbusiness.industryComputer scienceFeature extractionHybrid learningServersHybrid learning: Sciences informatiques [C05] [Ingénierie informatique & technologie]Computer Science ApplicationsImage edge detectionHuman-Computer Interaction[SPI]Engineering Sciences [physics]Hardware and ArchitectureServerSecurityEdge ComputingFeature extractionEnginesElectrical and Electronic Engineeringbusiness5GEdge computingComputer network
researchProduct

ETAT: Expository Text Analysis Tool.

2002

Qualitative methods that analyze the coherence of expository texts not only are time consuming, but also present challenges in collecting data on coding reliability. We describe software that analyzes expository texts more rapidly and produces a notable level of objectivity. ETAT (Expository Text Analysis Tool) analyzes the coherence of expository texts. ETAT adopts a symbolic representational system, known as conceptual graph structures. ETAT follows three steps: segmentation of a text into nodes, classification of the unidentified nodes, and linking the nodes with relational arcs. ETAT automatically constructs a graph in the form of nodes and their interrelationships, along with various a…

JavaComputer scienceWritingExperimental and Cognitive Psychologycomputer.software_genreText comprehensionSoftwareMicrocomputersArtificial IntelligenceQuestion answeringSegmentationObjectivity (science)General Psychologycomputer.programming_languageInformation ServicesObserver Variationbusiness.industryReading comprehensionProgramming LanguagesPsychology (miscellaneous)Artificial intelligenceWord ProcessingbusinesscomputerNatural language processingSoftwareCoding (social sciences)Behavior research methods, instruments,computers : a journal of the Psychonomic Society, Inc
researchProduct

Accessibility of Norwegian Municipalities Websites: An Interactive Learning Environment Experimental Investigation

2016

Accessibility is an important aspect of websites generally and public websites particularly. Many ways could be proposed to enhance accessibility, however the impact of selected actions is hard to predict due to diversification and contradiction, in addition to the existence of the time factor. A System Dynamics simulation model including factors affecting the accessibility of Norwegian municipal websites was encapsulated in an Interactive Learning Environment (ILE). As the model promised to be able to change how users think and take decisions, this ILE was tested by users in an experiment. We have conducted a#x03B1;, a#x03B2;, and a#x03B3; change analysis on the results of this experiment.…

Knowledge managementComputer sciencebusiness.industrymedia_common.quotation_subject05 social sciences02 engineering and technologyNorwegianDiversification (marketing strategy)Interactive learning environmentlanguage.human_languageSystem dynamicsPerceptionServer0502 economics and business0202 electrical engineering electronic engineering information engineeringlanguageContradiction020201 artificial intelligence & image processingbusiness050203 business & managementmedia_commonGraphical user interface2016 UKSim-AMSS 18th International Conference on Computer Modelling and Simulation (UKSim)
researchProduct

2014

This paper deals with designing the controller of LTI system based on data-driven techniques. We propose a scheme embedding a residual generator into control loop based on realization of the Youla parameterization for advanced controller design. Basic idea of the proposed scheme is constructing the residual generator by using the solution of the Luenberger equations as well as the well-established relationship between diagnosis observer (DO) and the parity vector. Besides, the core of the above idea is straightly using the process measurements to obtain the parity space based on the Subspace Identification Method (SIM), rather than establishing the system model. At last, a simulation based …

LTI system theoryObserver (quantum physics)Control theoryGeneral MathematicsControl systemGeneral EngineeringEmbeddingControl engineeringRealization (systems)Subspace topologyMathematicsSystem modelMathematical Problems in Engineering
researchProduct