Search results for "computer.software_genre"

showing 10 items of 3858 documents

2015

Visuo-auditory sensory substitution systems are augmented reality devices that translate a video stream into an audio stream in order to help the blind in daily tasks requiring visuo-spatial information. In this work, we present both a new mobile device and a transcoding method specifically designed to sonify moving objects. Frame differencing is used to extract spatial features from the video stream and two-dimensional spatial information is converted into audio cues using pitch, interaural time difference and interaural level difference. Using numerical methods, we attempt to reconstruct visuo-spatial information based on audio signals generated from various video stimuli. We show that de…

Audio signalComputer Networks and Communicationsbusiness.industryComputer scienceSpeech recognitionMotion detectionTranscodingAudio signal flowVideo processingcomputer.software_genreSensory substitutionArtificial IntelligenceHardware and ArchitectureSonificationComputer visionArtificial intelligencebusinessAudio signal processingcomputerSoftwareInformation SystemsFrontiers in ICT
researchProduct

On the Design of Probe Signals in Wireless Acoustic Sensor Networks Self-Positioning Algorithms

2018

A wireless acoustic sensor network comprises a distributed group of devices equipped with audio transducers. Typically, these devices can interoperate with each other using wireless links and perform collaborative audio signal processing. Ranging and self-positioning of the network nodes are examples of tasks that can be carried out collaboratively using acoustic signals. However, the environmental conditions can distort the emitted signals and complicate the ranging process. In this context, the selection of proper acoustic signals can facilitate the attainment of this goal and improve the localization accuracy. This letter deals with the design and evaluation of acoustic probe signals all…

Audio signalComputer sciencebusiness.industryApplied Mathematics020208 electrical & electronic engineeringReal-time computingBandwidth (signal processing)020206 networking & telecommunicationsRanging02 engineering and technologycomputer.software_genreTransducerSignal Processing0202 electrical engineering electronic engineering information engineeringChirpWirelessElectrical and Electronic EngineeringAudio signal processingbusinessFrequency modulationcomputerIEEE Signal Processing Letters
researchProduct

Dance to your own drum: Identification of musical genre and individual dancer from motion capture using machine learning

2020

Machine learning has been used to accurately classify musical genre using features derived from audio signals. Musical genre, as well as lower-level audio features of music, have also been shown to...

Audio signalVisual Arts and Performing ArtsDanceInformationSystems_INFORMATIONINTERFACESANDPRESENTATION(e.g.HCI)Computer sciencebusiness.industry05 social sciencesComputingMilieux_PERSONALCOMPUTING06 humanities and the artsDrumMusicalMachine learningcomputer.software_genreMotion capture050105 experimental psychology060404 musicIdentification (information)Embodied cognition0501 psychology and cognitive sciencesArtificial intelligencebusinesscomputer0604 artsMusicJournal of New Music Research
researchProduct

Eye tracking analysis of minor details in films for audio description

2012

This article focuses on the many instances when minute details found in feature films may have direct implications upon the development of both the visual and plot narratives. The main question we would like to ask examines whether very subtle details which may easily go unnoticed by the viewer should be audio described. To assess the visual consciousness of such minute details, a perception experiment was conducted using eye-tracking technology and questionnaires. Though the result is not conclusive, it shows a clear methodological approach in the field of the audio description of visual details, and does give some indication as to what should be taken into consideration in future studies …

AudiodescripciónLinguistics and LanguageAudio description; Eye tracking; Media accessibility; Audiovisual translationComputer sciencemedia_common.quotation_subjectÀudiodescripcióMinor (academic)Traducció audiovisualAudio descriptioncomputer.software_genreMedia accessibilityLanguage and LinguisticsPlot (graphics)Field (computer science)EducationHuman–computer interactionAudiodescripción; Accesibilidad a los medios; Traducción audiovisualPerceptionNarrativemedia_commonUNESCO::CIENCIAS DE LAS ARTES Y LAS LETRASEye trackingMultimediaAccessibilidad a los mediosAudio descriptionTranslation and InterpretingTraducción e InterpretaciónTraducció--RevistesTraducción audiovisualFeature (computer vision)Accesibilidad a los medios:CIENCIAS DE LAS ARTES Y LAS LETRAS [UNESCO]Eye trackingAccessibilitat als mitjanscomputerAudiovisual translation
researchProduct

Multi-sensory approaches to (audio) describing the visual arts

2012

Making art accessible to blind patrons requires the ability to convey explicit and implicit visual messages through non-visual forms. Audio description is often seen as the best way to offer visual texts to blind people; however, one may query whether words alone are sufficient to convey the subtleties of art and to transport the emotional charge such works offer. It is a fact that the dialogue between words and touch may allow these particular “readers” to “see” art in its tangible forms, but perhaps more is needed if one is to give them the opportunity to live the art experience to the full. This article discusses different multi-sensory approaches to making art available to visually impa…

AudiodescripciónLinguistics and LanguageComputer scienceVisually impairedTraducció audiovisualAudio descriptionSoundpaintingcomputer.software_genreAccesibilidadLanguage and LinguisticsVisual artsMuseoEducationMulti sensoryArtes visualesAudio description; Audio guides; Soundpainting; Museum; Visual arts; AccessibilityMuseumAudioguíasUNESCO::CIENCIAS DE LAS ARTES Y LAS LETRASMultimediaTranslation and InterpretingAudio descriptionTraducción e InterpretaciónAudio guidesTraducció--RevistesAccessibilityTraducción audiovisual:CIENCIAS DE LAS ARTES Y LAS LETRAS [UNESCO]Audiodescripción; Audioguías; Museo; Artes visuales; AccesibilidadTranscreationAudiovisual translationcomputer
researchProduct

Lyrics against images: music and audio description

2012

Music has been an integral part of films from as far back as the silent movie era, where a piano accompaniment was used to build the narrative and an orchestra was used to drown out the sound of the projector. Music in films can encompass a wide array of elements, from a song to a whistle, and can play many roles, as has been commented upon by many researchers. Due to the relevance of music in film narrative, it is an element which merits attention when it comes to making a film accessible, be it through Audio description, Audio subtitling, Sign Language or Subtitling for the Deaf and Hard-of-Hearing. This article focuses on Audio description (AD) and how music is handled in audio described…

AudiodescripciónLinguistics and LanguageSonidoAudiènciamedia_common.quotation_subjectAudio description; Film music; Lyrics; Sound; AudienceForeign languageÀudiodescripcióFilm musicTraducció audiovisualSign languageAudienciaAudio descriptioncomputer.software_genreLanguage and LinguisticsEducationSoundtrackPopular musicNarrativemedia_commonLetrasAudienceUNESCO::CIENCIAS DE LAS ARTES Y LAS LETRASMultimediaPianoTranslation and InterpretingAudio descriptionTraducción e InterpretaciónTraducció--RevistesArtLyricsLinguisticsTraducción audiovisualSound:CIENCIAS DE LAS ARTES Y LAS LETRAS [UNESCO]MusicLyricsAudiovisual translationcomputerBanda sonoraAudiodescripción; Banda sonora; Letras; Sonido; Audiencia
researchProduct

Analyzing the security of Windows 7 and Linux for cloud computing

2013

We review and analyze the major security features and concerns in deploying modern commodity operating systems such as Windows 7 and Linux 2.6.38 in a cloud computing environment. We identify the security weaknesses and open challenges of these two operating systems when deployed in the cloud environment. In particular, we examine and compare various operating system security features which are critical in providing a secure cloud. These security features include authentication, authorization and access control, physical memory protection, privacy and encryption of stored data, network access and firewalling capabilities, and virtual memory.

AuthenticationCloud computing securityGeneral Computer ScienceComputer sciencebusiness.industryAuthorizationData securityAccess controlCloud computingInformation securityComputer security modelAsset (computer security)EncryptionInternet securityComputer securitycomputer.software_genreSecurity and safety features new to Windows VistaSecurity information and event managementSecurity serviceNetwork Access ControlSecurity through obscuritybusinessLawcomputerComputers & Security
researchProduct

Machine Learning VS Transfer Learning - Smart Camera Implementation for Face Authentication

2018

The aim of this paper is to highlight differences between classical machine learning and transfer learning applied to low cost real-time face authentication. Furthermore, in an access control context, the size of biometric data should be minimized so it can be stored on a remote personal media. These constraints have led us to compare only lightest versions of these algorithms. Transfer learning applied on Mobilenet v1 raises to 85% of accuracy, for a 457Ko model, with 3680s and 1.43s for training and prediction tasks. In comparison, the fastest integrated method (Random Forest) shows accuracy up to 90% for a 7,9Ko model, with a fifth of a second to be trained and a hundred of microseconds …

AuthenticationComputer sciencebusiness.industry05 social sciencesContext (language use)Access controlMachine learningcomputer.software_genre050105 experimental psychologyRandom forest03 medical and health sciences0302 clinical medicineFace (geometry)0501 psychology and cognitive sciencesArtificial intelligenceBiometric dataSmart camerabusinessTransfer of learningcomputer[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing030217 neurology & neurosurgeryComputingMilieux_MISCELLANEOUS[SPI.SIGNAL] Engineering Sciences [physics]/Signal and Image processing
researchProduct

Disadvantaged by Disability: Examining the Accessibility of Cyber Security

2021

Today, we are living in a digitally dependent world. Through the use of digital technologies, life is meant to be easier and streamlined. This includes giving access to services that previously were unavailable to many due to disability. Although technology has evolved immensely over the past few decades, reducing the digital divide, authentication methods have changed very little. Authentication is the forefront of securing users’ information, services and technology, yet for many it still poses issues in terms of usability and security, due to specific characteristics of different disabilities. In this paper, drawing upon a literature review, a review of recognized disabilities, and the r…

AuthenticationComputer sciencebusiness.industrymedia_common.quotation_subjectFace (sociological concept)UsabilityContext (language use)Computer securitycomputer.software_genreDisadvantagedbusinessDigital divideFunction (engineering)computerQuestionnaire studymedia_common
researchProduct

Blockchain based Device identification and authentication in a Smart Grid

2020

The power grid is a critical infrastructure of a country that needs protection and security. According to the report of the International Energy Agency, the electricity demand is constantly increasing the world over. Countries are moving towards green energy and efforts are being made to integrate these green energy into the main grid. Smart Grid will improve the reliability and efficiency of the grid by managing the energy demand. Cyber-attacks and cyber terrorism is also increasingly targeting the electrical grid. Intruders may try to gain access to the grid by exploiting the vulnerability of the grid. IEDs/devices are the endpoints of the network and they are the weakest link in the enti…

AuthenticationIdentification (information)Smart gridComputer scienceCryptographic hash functionComputer securitycomputer.software_genreGridElectrical gridcomputerCritical infrastructureVulnerability (computing)2020 5th International Conference on Smart and Sustainable Technologies (SpliTech)
researchProduct