Search results for "key"

showing 10 items of 1962 documents

Keyword Based Keyframe Extraction in Online Video Collections

2015

Keyframe extraction methods aim to find in a video sequence the most significant frames, according to specific criteria. In this paper we propose a new method to search, in a video database, for frames that are related to a given keyword, and to extract the best ones, according to a proposed quality factor. We first exploit a speech to text algorithm to extract automatic captions from all the video in a specific domain database. Then we select only those sequences (clips), whose captions include a given keyword, thus discarding a lot of information that is useless for our purposes. Each retrieved clip is then divided into shots, using a video segmentation method, that is based on the SURF d…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniInformation retrievalbusiness.industryComputer sciencemedia_common.quotation_subjectShot (filmmaking)InformationSystems_INFORMATIONSTORAGEANDRETRIEVALFrame (networking)ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONPattern recognitionDomain (software engineering)Factor (programming language)Metric (mathematics)Quality (business)SegmentationArtificial intelligencebusinesscomputerSentencemedia_commoncomputer.programming_languageVideo Summarization Keyframe Extraction Automatic Speech Recognition YouTube Multimedia Collections
researchProduct

Probabilistic Anomaly Detection for Wireless Sensor Networks

2011

Wireless Sensor Networks (WSN) are increasingly gaining popularity as a tool for environmental monitoring, however ensuring the reliability of their operation is not trivial, and faulty sensors are not uncommon; moreover, the deployment environment may influence the correct functioning of a sensor node, which might thus be mistakenly classified as damaged. In this paper we propose a probabilistic algorithm to detect a faulty node considering its sensed data, and the surrounding environmental conditions. The algorithm was tested with a real dataset acquired in a work environment, characterized by the presence of actuators that also affect the actual trend of the monitored physical quantities.

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniKey distribution in wireless sensor networksBrooks–Iyengar algorithmComputer scienceNode (networking)Sensor nodeReal-time computingProbabilistic logicintelligent data analysis probabilistic reasoning wireless sensor networksAnomaly detectionWireless sensor network
researchProduct

A Monitoring Framework Exploiting the Synergy between Actual and Virtual Wireless Sensors

2006

This paper describes a framework that allows realistic monitoring of a wireless sensor network in order to assess its behavior before actually deploying all the nodes. Designing a wireless sensor network for a specific application typically involves a preliminary phase of simulations that rely on specialized software, whose behavior does not necessarily reproduce what will be experienced by an actual network. On the other hand, delaying the test phase until deployment may not be advisable due to unreasonable costs. This paper suggests the adoption of a hybrid approach that involves coupling an actual wireless sensor network composed of a minimal set of actual nodes with a simulated one; we …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniKey distribution in wireless sensor networksWireless site surveyComputer scienceSoftware deploymentVisual sensor networkbusiness.industryDistributed computingMobile wireless sensor networkWirelessbusinessWireless sensor networkWireless sensor networks2006 International Conference on Parallel Processing Workshops (ICPPW'06)
researchProduct

Secure random number generation in wireless sensor networks

2011

The increasing adoption of wireless sensor networks as a flexible and inexpensive tool for the most diverseapplications, ranging from environmental monitoring to home automation, has raised more and more atten-tion to the issues related to the design of specifically customized security mechanisms. The scarcity ofcomputational, storage, and bandwidth resources cannot definitely be disregarded in such context, and thismakes the implementation of security algorithms particularly challenging. This paper proposes a securityframework for the generation of true random numbers, which are paramount as the core building blockfor many security algorithms; the intrinsic nature of wireless sensor nodes …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniLeader electionleader election random numbers generation wireless sensor networksRandom number generationbusiness.industryComputer scienceDistributed computingKey distribution in wireless sensor networksTrue random numbers generatorRobustness (computer science)Mobile wireless sensor networknetwork securityWirelessbusinesswireless sensor networksWireless sensor networkRandomnessComputer Science::Cryptography and SecurityComputer network
researchProduct

Simulation and anticipation as tools for coordinating with the future

2013

A key goal in designing an artificial intelligence capable of performing complex tasks is a mechanism that allows it to efficiently choose appropriate and relevant actions in a variety of situations and contexts. Nowhere is this more obvious than in the case of building a general intelligence, where the contextual choice and application of actions must be done in the presence of large numbers of alternatives, both subtly and obviously distinct from each other. We present a framework for action selection based on the concurrent activity of multiple forward and inverse models. A key characteristic of the proposed system is the use of simulation to choose an action: the system continuously sim…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniMechanism (biology)Computer sciencebusiness.industryAction selectionOutcome (game theory)AnticipationVariety (cybernetics)Domain (software engineering)Action SelectionAction (philosophy)Anticipation (artificial intelligence)Key (cryptography)Artificial intelligencebusinessMachine learning techniquesSimulation
researchProduct

An Embedded Processor for Metabolic Networks Optimization

2011

In recent years biological processes modelling and simulation have become two key issues in analyzing complex cellular systems. The computational requirements suggest to investigate alternative solutions to the common supercomputers and clusters in order to optimize and overcome computational bottleneck. The goal of this work is the design and the realization of an embedded processor for metabolic networks optimization in order to examine their behaviour and robustness under malfunctions of one or more nodes. The embedded processor has been prototyped on the Celoxica RC203E board, equipped with programmable FPGA technologies. A case studied outlining the E. Coli bacteria metabolic network i…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniMetabolic networks FPGA embedded processorRobustness (computer science)Computer sciencebusiness.industryEmbedded systemMetabolic networkSignal processing algorithmsAlgorithm designKey issuesbusinessField-programmable gate arrayBottleneck2011 International Conference on Complex, Intelligent, and Software Intensive Systems
researchProduct

A Structural Approach to Infer Recurrent Relations in Data

2014

Extracting knowledge from a great amount of collected data has been a key problem in Artificial Intelligence during the last decades. In this context, the word "knowledge" refers to the non trivial new relations not easily deducible from the observation of the data. Several approaches have been used to accomplish this task, ranging from statistical to structural methods, often heavily dependent on the particular problem of interest. In this work we propose a system for knowledge extraction that exploits the power of an ontology approach. Ontology is used to describe, organise and discover new knowledge. To show the effectiveness of our system in extracting and generalising the knowledge emb…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniOntology learningbusiness.industryComputer scienceContext (language use)Ontology (information science)Machine learningcomputer.software_genrePattern recognition MDL OntologiesGrammar inductionKnowledge extractionKey (cryptography)OntologyArtificial intelligencebusinesscomputerWord (computer architecture)
researchProduct

A TRNG Exploiting Multi-Source Physical Data

2010

In recent years, the considerable progress of miniaturization and the consequent increase of the efficiency of digital circuits has allowed a great diffusion of the wireless sensor network technology. This has led to the growth of applications and protocols for applying these networks to several scenarios, such as the military one, where it is essential to deploy security protocols in order to prevent opponents from accessing the information exchanged among sensor nodes. This paper analyzes security issues of data processed by the WSN and describes a system able to generate sequences of random numbers, which can be used by security algorithms and protocols. The proposed True Random Number G…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniRandom number generationbusiness.industryNetwork securityComputer scienceDistributed computingNode (networking)Cryptographic protocolTrusted third partyKey distribution in wireless sensor networksWireless Sensor Networks Random Number Generator Network SecurityNISTbusinessWireless sensor networkComputer network
researchProduct

Retargeting Framework Based on Monte-carlo Sampling

2015

Advance in image technology and proliferation of acquisition devices like smartphones, digital cameras, etc., made the display of digital images ubiquitous. Many displays exist in the market, spanning within a large variety of resolutions and shapes. Thus, displaying content optimizing the available number of pixels has become a very important issue in the multimedia community, and the image retargeting problem is being widely faced. In this work, we propose an image retargeting framework based on monte-carlo sampling. We operate the non-homogeneous resizing as the composition of several simple atomic resizing functions. The shape of such atomic operator can be chosen within a set of tested…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniRetargetingSaliencyPixelComputer sciencebusiness.industryComputer Science (all)ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONVisualizationSet (abstract data type)Image resizingDigital imageSeam carvingMonte-carloRetargetingKey (cryptography)Computer visionArtificial intelligencebusiness
researchProduct

Robust and Efficient Data Gathering for Wireless Sensor Networks

2006

This paper describes a new strategy for data gathering in wireless sensor networks that takes into account the need for both energy saving, typical of such networks, and for a reasonable tradeoff between robustness and efficiency. The proposed algorithm implements an efficient strategy for retransmission of lost packets by discovering alternative routes and making clever use of multiple paths when necessary; in order to do that we build upon the general framework presented in recent works, that provided a formulation of duplicate and order insensitive aggregation functions, and by taking advantage of some intrinsic characteristics of the wireless sensor networks, we exploit implicit acknowl…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniRouting protocolbusiness.industryNetwork packetComputer sciencePacket transmissionDistributed computingRetransmissionWireless sensor networksBase stationKey distribution in wireless sensor networksIntelligent sensorRobustness (computer science)Aggregation functionbusinessWireless sensor networkComputer networkProceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)
researchProduct