Search results for "Software engineering"

showing 10 items of 1151 documents

Digitization and preservation of cultural heritage: The CEPROQHA approach

2017

The humanity has always learned from the previous experiences for many reasons. The national heritage proves to be a great way to discover a nation's history. As a result, these priceless cultural items have a special attention. However, Since the wide adoption of new digital technologies, documenting, storing, and exhibiting cultural heritage assets became more affordable and reliable. These digital records are then used in several applications. Researchers saw the opportunity to use digital heritage recordings for long-term preservation. In this paper, we present the research progress in cultural heritage digital processing and preservation, highlighting the most impactful advances. Addit…

History[ INFO ] Computer Science [cs]Content management system02 engineering and technologySemanticsDigital records01 natural sciences[INFO.INFO-CL]Computer Science [cs]/Computation and Language [cs.CL]World Wide WebACM: H.: Information SystemsCultural diversity3D Modeling0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs][ INFO.INFO-CL ] Computer Science [cs]/Computation and Language [cs.CL]Digital preservationCEPROQHA projectDigitizationComputingMilieux_MISCELLANEOUSDigital heritage010401 analytical chemistryACM : H.: Information Systems020207 software engineering0104 chemical sciencesCultural heritageSemantic enrichmentDigital preservationHumanityCultural heritageDigital heritage
researchProduct

Quantum search of spatial regions

2003

Can Grover's algorithm speed up search of a physical region - for example a 2-D grid of size sqrt(n) by sqrt(n)? The problem is that sqrt(n) time seems to be needed for each query, just to move amplitude across the grid. Here we show that this problem can be surmounted, refuting a claim to the contrary by Benioff. In particular, we show how to search a d-dimensional hypercube in time O(sqrt n) for d at least 3, or O((sqrt n)(log n)^(3/2)) for d=2. More generally, we introduce a model of quantum query complexity on graphs, motivated by fundamental physical limits on information storage, particularly the holographic principle from black hole thermodynamics. Our results in this model include a…

Holographic principleDiscrete mathematicsQuantum PhysicsComputational complexity theoryFOS: Physical sciencesComputer Science::Software EngineeringGraph theoryGeneral Relativity and Quantum Cosmology (gr-qc)Unitary matrixUpper and lower boundsGeneral Relativity and Quantum CosmologyCombinatoricsHypercubeQuantum Physics (quant-ph)Black hole thermodynamicsQuantum computerMathematics44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings.
researchProduct

Database to Ontology Mapping Patterns in RDB2OWL Lite

2016

We describe the RDB2OWL Lite language for relational database to RDF/OWL mapping specification and discuss the architectural and content specification patterns arising in mapping definition. RDB2OWL Lite is a simplification of original RDB2OWL with aggregation possibilities and order-based filters removed, while providing in-mapping SQL view definition possibilities. The mapping constructs and their usage patterns are illustrated on mapping examples from medical domain: medicine registries and hospital information system. The RDB2OWL Lite mapping implementation is offered both via translation into D2RQ and into standard R2RML mapping notations.

Hospital information systemOpen Biomedical OntologiesInformation retrievalComputer scienceViewRelational databaseSemantic integrationcomputer.file_formatRDFNotationcomputerDomain (software engineering)
researchProduct

Intention recognition in manufacturing applications

2015

In this article, we present a novel approach to intention recognition, based on the recognition and representation of state information in a cooperative human-robot environment. States are represented by a combination of spatial relations along with cardinal direction information. The output of the Intention Recognition Algorithms will allow a robot to help a human perform a perceived operation or, minimally, not cause an unsafe situation to occur. We compare the results of the Intention Recognition Algorithms to those of an experiment involving human subjects attempting to recognize the same intentions in a manufacturing kitting domain. In almost every case, results show that the Intention…

Human-robot collaborationOntologybusiness.industryComputer scienceGeneral MathematicsManufacturing kittingRoboticsIntention recognitionRoboticsOntology (information science)Industrial and Manufacturing EngineeringComputer Science ApplicationsDomain (software engineering)Task (project management)Spatial relationControl and Systems EngineeringHuman–computer interactionRobotArtificial intelligenceState recognitionbusinessRepresentation (mathematics)SoftwareCardinal directionRobotics and Computer-Integrated Manufacturing
researchProduct

User-Centered Design for Biomedical Literature Search User Interfaces

2019

Biomedical literature search tools are crucial resources for the work of physicians, biologists, and bioinformatics. Many of the genetic-medical diagnoses depend on the findings in these literature resources. Despite the importance and value of the information stored in these resources, the user interface (UI) implemented by such tools present several usability problems converting the query and interpretation of the information into complex and time-consuming tasks. In this sense, an user-centered design (UCD) approach can improve the usability of these UIs facilitating the interaction, analysis, and comparison of biomedical information, and, consequently, improving the productivity of prac…

Human–computer interactionComputer sciencebusiness.industryBiomedical informationUsabilityUser interfacebusinessDomain (software engineering)User-centered designUser interface design
researchProduct

A Saturation Model of the Synchronous Reluctance Motor and its Identification by Genetic Algorithms

2018

This paper proposes a complete saturation model of the Synchronous Reluctance Motor (Syn1231), accounting for both the self-saturation and cross-saturation effects. This model is based on an analytical relationship between the stator flux and current components, and is characterized by parameters presenting an interesting physical interpretation, differently from many other saturation model in the scientific literature. It proposes also an identification technique of such a model based on stand-still tests, without the need of locking the rotor. The proposed saturation model permits the complete description of the magnetic behaviour of the machine with 8 parameters, fewer than those require…

IdentificationComputer simulationComputer scienceStator05 social sciences020207 software engineering02 engineering and technologylaw.inventionSettore ING-INF/04 - AutomaticaControl theorylawMagnetic characteristicParameters' estimationGenetic algorithm0202 electrical engineering electronic engineering information engineeringSuperimposition0501 psychology and cognitive sciencesMagnetic characteristicsSynchronous Reluctance Motor (SynRM)Synchronous reluctance motorSaturation (magnetic)050107 human factors2018 IEEE Energy Conversion Congress and Exposition (ECCE)
researchProduct

A Color Image Database for Haze Model and Dehazing Methods Evaluation

2016

International audience; One of the major issues related to dehazing methods (single or multiple image based) evaluation is the absence of the haze-free image (ground-truth). This is also a problem when it concerns the validation of Koschmieder model or its subsequent dehazing methods. To overcome this problem, we created a database called CHIC (Color Hazy Image for Comparison), consisting of two scenes in controlled environment. In addition to the haze-free image, we provide 9 images of different fog densities. Moreover, for each scene, we provide a number of parameters such as local scene depth, distance from the camera of known objects such as Macbeth Color Checkers, their radiance, and t…

Image formationHazeDatabaseColor imageComputer scienceImage qualitybusiness.industryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONEnvironment controlled020207 software engineering02 engineering and technologycomputer.software_genreImage (mathematics)[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV]Computer graphics (images)[ INFO.INFO-TI ] Computer Science [cs]/Image Processing0202 electrical engineering electronic engineering information engineeringTransmittanceRadiance020201 artificial intelligence & image processingComputer visionArtificial intelligencebusinesscomputerComputingMethodologies_COMPUTERGRAPHICS
researchProduct

Ghost Detection and Removal for High Dynamic Range Images: Recent Advances

2012

23 pages; International audience; High dynamic range (HDR) image generation and display technologies are becoming increasingly popular in various applications. A standard and commonly used approach to obtain an HDR image is the multiple exposures fusion technique which consists of combining multiple images of the same scene with varying exposure times. However, if the scene is not static during the sequence acquisition, moving objects manifest themselves as ghosting artefacts in the final HDR image. Detecting and removing ghosting artefacts is an important issue for automatically generating HDR images of dynamic scenes. The aim of this paper is to provide an up-to-date review of the recentl…

Image generationExposures fusionComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION02 engineering and technology[ INFO.INFO-CV ] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]GeneralLiterature_MISCELLANEOUSImage (mathematics)Ghost detectionComputer graphics (images)0202 electrical engineering electronic engineering information engineeringComputer visionElectrical and Electronic EngineeringGhostingHigh dynamic rangeComputingMethodologies_COMPUTERGRAPHICSSequencebusiness.industry[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020207 software engineeringHigh dynamic range imagesGhost removalSignal Processing020201 artificial intelligence & image processingComputer Vision and Pattern RecognitionArtificial intelligencebusinessSoftware
researchProduct

Dissecting and Reassembling Color Correction Algorithms for Image Stitching

2018

This paper introduces a new compositional framework for classifying color correction methods according to their two main computational units. The framework was used to dissect fifteen among the best color correction algorithms and the computational units so derived, with the addition of four new units specifically designed for this work, were then reassembled in a combinatorial way to originate about one hundred distinct color correction methods, most of which never considered before. The above color correction methods were tested on three different existing datasets, including both real and artificial color transformations, plus a novel dataset of real image pairs categorized according to …

Image stitchingColor correction compositional framework image stitching image mosaicingSettore INF/01 - Informaticabusiness.industryComputer scienceColor correctionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION020207 software engineering02 engineering and technologyImage segmentationReal imageImage mosaicingComputer Graphics and Computer-Aided DesignLight scatteringImage stitchingHistogram0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer visionArtificial intelligencebusinessAlgorithmSoftwareColor correctionCompositional framework
researchProduct

BlockSee: Blockchain for IoT video surveillance in smart cities

2018

The growing demand for safety in urban environments is supported by monitoring using video surveillance. The need to analyze multiple video-flows from different cameras deployed around the city by heterogeneous owners introduces vulnerabilities and privacy issues. Video frames, timestamps, and camera settings can be digitally manipulated by malicious users; the positions of cameras, their orientation and their mechanical settings can be physically manipulated. Digital and physical manipulations may have several effects, including the change of the observed scene and the potential violation of neighbors' privacy. To face these risks, we introduce BlockSee, a blockchain-based video surveillan…

Immutabilityblockchain video surveillance privacyBlockchainbusiness.industryPHYSICAL MANIPULATIONSComputer scienceOrientation (computer vision)Settore ING-INF/03 - TelecomunicazioniComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION020207 software engineeringMonitoring system02 engineering and technologyComputer securitycomputer.software_genreFace (geometry)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingTimestampInternet of Thingsbusinesscomputer
researchProduct