965 resultados para Coinciding Objects


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the summer of 2012 - 2013, the State Library of Queensland invited us to run a number of workshops for younger participants as part of the Garage Gamer program. The brief was very much about the local games industry and the SLQ community, the core concept was about participant contribution. The 'Stories into Games' series of workshops ran across three Saturdays (January 5 - March 2). The workshops were aimed at younger audiences (ages 6-12) and the concept was to engage this group with games as game makers and designers, rather than players. Each session saw a group of participants create a shared story, illustrate the story and then make game assets and objects out of their illustrative work. These were then put into a raw framework created in the Unity Game Engine so that the stories could be played.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a new framework for distributed intrusion detection based on taint marking. Our system tracks information flows between applications of multiple hosts gathered in groups (i.e., sets of hosts sharing the same distributed information flow policy) by attaching taint labels to system objects such as files, sockets, Inter Process Communication (IPC) abstractions, and memory mappings. Labels are carried over the network by tainting network packets. A distributed information flow policy is defined for each group at the host level by labeling information and defining how users and applications can legally access, alter or transfer information towards other trusted or untrusted hosts. As opposed to existing approaches, where information is most often represented by two security levels (low/high, public/private, etc.), our model identifies each piece of information within a distributed system, and defines their legal interaction in a fine-grained manner. Hosts store and exchange security labels in a peer to peer fashion, and there is no central monitor. Our IDS is implemented in the Linux kernel as a Linux Security Module (LSM) and runs standard software on commodity hardware with no required modification. The only trusted code is our modified operating system kernel. We finally present a scenario of intrusion in a web service running on multiple hosts, and show how our distributed IDS is able to report security violations at each host level.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents an investigation into event detection in crowded scenes, where the event of interest co-occurs with other activities and only binary labels at the clip level are available. The proposed approach incorporates a fast feature descriptor from the MPEG domain, and a novel multiple instance learning (MIL) algorithm using sparse approximation and random sensing. MPEG motion vectors are used to build particle trajectories that represent the motion of objects in uniform video clips, and the MPEG DCT coefficients are used to compute a foreground map to remove background particles. Trajectories are transformed into the Fourier domain, and the Fourier representations are quantized into visual words using the K-Means algorithm. The proposed MIL algorithm models the scene as a linear combination of independent events, where each event is a distribution of visual words. Experimental results show that the proposed approaches achieve promising results for event detection compared to the state-of-the-art.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we will examine passenger actions and activities at the security screening points of Australian domestic and international airports. Our findings and analysis provide a more complete understanding of the current airport passenger security screening experience. Data in this paper is comprised of field studies conducted at two Australian airports, one domestic and one international. Video data was collected by cameras situated either side of the security screening point. A total of one hundred and ninety-six passengers were observed. Two methods of analysis are used. First, the activities of passengers are coded and analysed to reveal the common activities at domestic and international security regimes and between quiet and busy periods. Second, observation of passenger activities is used to reveal uncommon aspects. The results show that passengers do more at security screening that being passively scanned. Passengers queue, unpack the required items from their bags and from their pockets, walk through the metal-detector, re-pack and occasionally return to be re-screened. For each of these activities, passengers must understand the procedures at the security screening point and must co-ordinate various actions and objects in time and space. Through this coordination passengers are active participants in making the security checkpoint function – they are co-producers of the security screening process.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Process modelling – the design and use of graphical documentations of an organisation’s business processes – is a key method to document and use information about business processes. Still, despite current interest in process modelling, this research area faces essential challenges. Key unanswered questions concern the impact of process modelling in organisational practice, and the mechanisms through which impacts are developed. To answer these questions and to provide a better understanding of process modelling impact, I turn to the concept of affordances. Affordances describe the possibilities for goal-oriented action that technical objects offer to specified users. This notion has received growing attention from IS researchers. I report on my efforts to further develop the IS discipline’s understanding of affordances and impacts from informational objects, such as process models used by analysts for purposes of information systems analysis and design. Specifically, I seek to extend existing theory on the emergence and actualisation of affordances. I develop a research model that describes the process by which affordances are perceived and actualised and explain their dependence on available information and actualisation effort. I present my plans for operationalising and testing this research model empirically, and provide details about my design of a full-cycle, mixed methods study currently in progress.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Non-linear finite deformations of articular cartilages under physiological loading conditions can be attributed to hyperelastic behavior. This paper contains experimental results of indentation tests in finite deformation and proposes an empirical based new generalized hyperelastic constitutive model to account for strain-rate dependency for humeral head cartilage tissues. The generalized model is based on existing hyperelastic constitutive relationships that are extensively used to represent biological tissues in biomechanical literature. The experimental results were obtained for three loading velocities, corresponding to low (1x10-3 s-1), moderate and high strain-rates (1x10-1 s-1), which represent physiological loading rates that are experienced in daily activities such as lifting, holding objects and sporting activities. Hyperelastic material parameters were identified by non linear curve fitting procedure. Analysis demonstrated that the material behavior of cartilage can be effectively decoupled into strain-rate independent(elastic) and dependent parts. Further, experiments conducted using different indenters indicated that the parameters obtained are significantly affected by the indenter size, potentially due to structural inhomogeneity of the tissue. The hyperelastic constitutive model developed in this paper opens a new avenue for the exploration of material properties of cartilage tissues.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The huge amount of CCTV footage available makes it very burdensome to process these videos manually through human operators. This has made automated processing of video footage through computer vision technologies necessary. During the past several years, there has been a large effort to detect abnormal activities through computer vision techniques. Typically, the problem is formulated as a novelty detection task where the system is trained on normal data and is required to detect events which do not fit the learned ‘normal’ model. There is no precise and exact definition for an abnormal activity; it is dependent on the context of the scene. Hence there is a requirement for different feature sets to detect different kinds of abnormal activities. In this work we evaluate the performance of different state of the art features to detect the presence of the abnormal objects in the scene. These include optical flow vectors to detect motion related anomalies, textures of optical flow and image textures to detect the presence of abnormal objects. These extracted features in different combinations are modeled using different state of the art models such as Gaussian mixture model(GMM) and Semi- 2D Hidden Markov model(HMM) to analyse the performances. Further we apply perspective normalization to the extracted features to compensate for perspective distortion due to the distance between the camera and objects of consideration. The proposed approach is evaluated using the publicly available UCSD datasets and we demonstrate improved performance compared to other state of the art methods.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Porn studies researchers in the humanities have tended to use different research methods from those in social sciences. There has been surprisingly little conversation between the groups about methodology. This article presents a basic introduction to textual analysis and statistical analysis, aiming to provide for all porn studies researchers a familiarity with these two quite distinct traditions of data analysis. Comparing these two approaches, the article suggests that social science approaches are often strongly reliable – but can sacrifice validity to this end. Textual analysis is much less reliable, but has the capacity to be strongly valid. Statistical methods tend to produce a picture of human beings as groups, in terms of what they have in common, whereas humanities approaches often seek out uniqueness. Social science approaches have asked a more limited range of questions than have the humanities. The article ends with a call to mix up the kinds of research methods that are applied to various objects of study.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Internet of Things facilitates the identification, digitization, and control of physical objects. However, it is the availability of cost effective sensors, mobile smart devices, scalable cloud infrastructure, and advanced analytics that have consumerized the Internet of Things. The accessibility of digital representations of things has transformative potential and provides entire new affordances for organizations and their ecosystems across most industries.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Process models are used to convey semantics about business operations that are to be supported by an information system. A wide variety of professionals is targeted to use such models, including people who have little modeling or domain expertise. We identify important user characteristics that influence the comprehension of process models. Through a free simulation experiment, we provide evidence that selected cognitive abilities, learning style, and learning strategy influence the development of process model comprehension. These insights draw attention to the importance of research that views process model comprehension as an emergent learning process rather than as an attribute of the models as objects. Based on our findings, we identify a set of organizational intervention strategies that can lead to more successful process modeling workshops.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The ability to measure surface temperature and represent it on a metrically accurate 3D model has proven applications in many areas such as medical imaging, building energy auditing, and search and rescue. A system is proposed that enables this task to be performed with a handheld sensor, and for the first time with results able to be visualized and analyzed in real-time. A device comprising a thermal-infrared camera and range sensor is calibrated geometrically and used for data capture. The device is localized using a combination of ICP and video-based pose estimation from the thermal-infrared video footage which is shown to reduce the occurrence of failure modes. Furthermore, the problem of misregistration which can introduce severe distortions in assigned surface temperatures is avoided through the use of a risk-averse neighborhood weighting mechanism. Results demonstrate that the system is more stable and accurate than previous approaches, and can be used to accurately model complex objects and environments for practical tasks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Product Lifecycle Management (PLM) systems are widely used in the manufacturing industry. A core feature of such systems is to provide support for versioning of product data. As workflow functionality is increasingly used in PLM systems, the possibility emerges that the versioning transitions for product objects as encapsulated in process models do not comply with the valid version control policies mandated in the objects’ actual lifecycles. In this paper we propose a solution to tackle the (non-)compliance issues between processes and object version control policies. We formally define the notion of compliance between these two artifacts in product lifecycle management and then develop a compliance checking method which employs a well-established workflow analysis technique. This forms the basis of a tool which offers automated support to the proposed approach. By applying the approach to a collection of real-life specifications in a main PLM system, we demonstrate the practical applicability of our solution to the field.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The story of prickly pear in Australia is usually told as a tale of triumphant scientific intervention into an environmental disaster. Instead, this unarticle considers it as a transnational network in order to better understand the myriad of elements that made this event so important. Through this methodology emerges the complex nature of prickly pear land that included people, places, ideas, rhetoric and objects that traveled from all over the world into settler Australia.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Utilising quantitative and qualitative research methods the thesis explored how movement patterns were coordinated under different conditions in elite athletes. Results revealed each elite athlete's ability to use multiple, varied information sources to guide successful task performance, highlighting the specific role of surrounding objects in the performance environment to perceptually guide behaviour. Combining elite coaching knowledge with empirical research enhanced understanding of the role of vision in regulating interceptive behaviours, enhancing the representative design of training environments. The main findings have been applied to training design of the Athletics Australia National Jumps Centre at the Queensland Academy of Sport in preparation for the World Indoor Championships, World Championships, and Olympic Games for Australian long and triple jumpers.