Search results for "computer.software_genre"
showing 10 items of 3858 documents
2015
Visuo-auditory sensory substitution systems are augmented reality devices that translate a video stream into an audio stream in order to help the blind in daily tasks requiring visuo-spatial information. In this work, we present both a new mobile device and a transcoding method specifically designed to sonify moving objects. Frame differencing is used to extract spatial features from the video stream and two-dimensional spatial information is converted into audio cues using pitch, interaural time difference and interaural level difference. Using numerical methods, we attempt to reconstruct visuo-spatial information based on audio signals generated from various video stimuli. We show that de…
On the Design of Probe Signals in Wireless Acoustic Sensor Networks Self-Positioning Algorithms
2018
A wireless acoustic sensor network comprises a distributed group of devices equipped with audio transducers. Typically, these devices can interoperate with each other using wireless links and perform collaborative audio signal processing. Ranging and self-positioning of the network nodes are examples of tasks that can be carried out collaboratively using acoustic signals. However, the environmental conditions can distort the emitted signals and complicate the ranging process. In this context, the selection of proper acoustic signals can facilitate the attainment of this goal and improve the localization accuracy. This letter deals with the design and evaluation of acoustic probe signals all…
Dance to your own drum: Identification of musical genre and individual dancer from motion capture using machine learning
2020
Machine learning has been used to accurately classify musical genre using features derived from audio signals. Musical genre, as well as lower-level audio features of music, have also been shown to...
Eye tracking analysis of minor details in films for audio description
2012
This article focuses on the many instances when minute details found in feature films may have direct implications upon the development of both the visual and plot narratives. The main question we would like to ask examines whether very subtle details which may easily go unnoticed by the viewer should be audio described. To assess the visual consciousness of such minute details, a perception experiment was conducted using eye-tracking technology and questionnaires. Though the result is not conclusive, it shows a clear methodological approach in the field of the audio description of visual details, and does give some indication as to what should be taken into consideration in future studies …
Multi-sensory approaches to (audio) describing the visual arts
2012
Making art accessible to blind patrons requires the ability to convey explicit and implicit visual messages through non-visual forms. Audio description is often seen as the best way to offer visual texts to blind people; however, one may query whether words alone are sufficient to convey the subtleties of art and to transport the emotional charge such works offer. It is a fact that the dialogue between words and touch may allow these particular “readers” to “see” art in its tangible forms, but perhaps more is needed if one is to give them the opportunity to live the art experience to the full. This article discusses different multi-sensory approaches to making art available to visually impa…
Lyrics against images: music and audio description
2012
Music has been an integral part of films from as far back as the silent movie era, where a piano accompaniment was used to build the narrative and an orchestra was used to drown out the sound of the projector. Music in films can encompass a wide array of elements, from a song to a whistle, and can play many roles, as has been commented upon by many researchers. Due to the relevance of music in film narrative, it is an element which merits attention when it comes to making a film accessible, be it through Audio description, Audio subtitling, Sign Language or Subtitling for the Deaf and Hard-of-Hearing. This article focuses on Audio description (AD) and how music is handled in audio described…
Analyzing the security of Windows 7 and Linux for cloud computing
2013
We review and analyze the major security features and concerns in deploying modern commodity operating systems such as Windows 7 and Linux 2.6.38 in a cloud computing environment. We identify the security weaknesses and open challenges of these two operating systems when deployed in the cloud environment. In particular, we examine and compare various operating system security features which are critical in providing a secure cloud. These security features include authentication, authorization and access control, physical memory protection, privacy and encryption of stored data, network access and firewalling capabilities, and virtual memory.
Machine Learning VS Transfer Learning - Smart Camera Implementation for Face Authentication
2018
The aim of this paper is to highlight differences between classical machine learning and transfer learning applied to low cost real-time face authentication. Furthermore, in an access control context, the size of biometric data should be minimized so it can be stored on a remote personal media. These constraints have led us to compare only lightest versions of these algorithms. Transfer learning applied on Mobilenet v1 raises to 85% of accuracy, for a 457Ko model, with 3680s and 1.43s for training and prediction tasks. In comparison, the fastest integrated method (Random Forest) shows accuracy up to 90% for a 7,9Ko model, with a fifth of a second to be trained and a hundred of microseconds …
Disadvantaged by Disability: Examining the Accessibility of Cyber Security
2021
Today, we are living in a digitally dependent world. Through the use of digital technologies, life is meant to be easier and streamlined. This includes giving access to services that previously were unavailable to many due to disability. Although technology has evolved immensely over the past few decades, reducing the digital divide, authentication methods have changed very little. Authentication is the forefront of securing users’ information, services and technology, yet for many it still poses issues in terms of usability and security, due to specific characteristics of different disabilities. In this paper, drawing upon a literature review, a review of recognized disabilities, and the r…
Blockchain based Device identification and authentication in a Smart Grid
2020
The power grid is a critical infrastructure of a country that needs protection and security. According to the report of the International Energy Agency, the electricity demand is constantly increasing the world over. Countries are moving towards green energy and efforts are being made to integrate these green energy into the main grid. Smart Grid will improve the reliability and efficiency of the grid by managing the energy demand. Cyber-attacks and cyber terrorism is also increasingly targeting the electrical grid. Intruders may try to gain access to the grid by exploiting the vulnerability of the grid. IEDs/devices are the endpoints of the network and they are the weakest link in the enti…