965 resultados para Coinciding Objects


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This document describes large, accurately calibrated and time-synchronised datasets, gathered in controlled environmental conditions, using an unmanned ground vehicle equipped with a wide variety of sensors. These sensors include: multiple laser scanners, a millimetre wave radar scanner, a colour camera and an infra-red camera. Full details of the sensors are given, as well as the calibration parameters needed to locate them with respect to each other and to the platform. This report also specifies the format and content of the data, and the conditions in which the data have been gathered. The data collection was made in two different situations of the vehicle: static and dynamic. The static tests consisted of sensing a fixed ’reference’ terrain, containing simple known objects, from a motionless vehicle. For the dynamic tests, data were acquired from a moving vehicle in various environments, mainly rural, including an open area, a semi-urban zone and a natural area with different types of vegetation. For both categories, data have been gathered in controlled environmental conditions, which included the presence of dust, smoke and rain. Most of the environments involved were static, except for a few specific datasets which involve the presence of a walking pedestrian. Finally, this document presents illustrations of the effects of adverse environmental conditions on sensor data, as a first step towards reliability and integrity in autonomous perceptual systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The integration of separate, yet complimentary, cortical pathways appears to play a role in visual perception and action when intercepting objects. The ventral system is responsible for object recognition and identification, while the dorsal system facilitates continuous regulation of action. This dual-system model implies that empirically manipulating different visual information sources during performance of an interceptive action might lead to the emergence of distinct gaze and movement pattern profiles. To test this idea, we recorded hand kinematics and eye movements of participants as they attempted to catch balls projected from a novel apparatus that synchronised or de-synchronised accompanying video images of a throwing action and ball trajectory. Results revealed that ball catching performance was less successful when patterns of hand movements and gaze behaviours were constrained by the absence of advanced perceptual information from the thrower's actions. Under these task constraints, participants began tracking the ball later, followed less of its trajectory, and adapted their actions by initiating movements later and moving the hand faster. There were no performance differences when the throwing action image and ball speed were synchronised or de-synchronised since hand movements were closely linked to information from ball trajectory. Results are interpreted relative to the two-visual system hypothesis, demonstrating that accurate interception requires integration of advanced visual information from kinematics of the throwing action and from ball flight trajectory.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This creative work is the production of the live and animated performance of The Empty City. With a significant period of creative development and script work behind it, the team engaged in a range of innovative performance-making practices in order to realise the work onstage as a non-verbal live and animated theatre work. This intermedial process was often led by music, and involved the creation and convergence of non-verbal action, virtual performers, performing objects and two simultaneous projections of animated images. The production opened at the Brisbane Powerhouse on June 27 2013, with a subsequent tour to Perth’s Awesome Festival in October 2013. Its technical achievements were noted in the critical responses. "The story is told on a striking set of two huge screens, the front one transparent, upon which still and moving images are projected, and between which Oliver performs and occasional “real” objects are placed. The effect is startling, and creates a cartoon three dimensionality like those old Viewmaster slide shows. The live action… and soundscape sync perfectly with the projected imagery to complete a dense, intricately devised and technically brilliant whole." (The West Australian 14.10.13)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter begins with a discussion of the economic, political, and social context of the recent global financial crisis, which casts into relief current boundaries of criminology, permeated and made fluid in criminology's recent cultural turn. This cultural turn has reinvigorated criminology, providing new objects of analysis and rich and thick descriptions of the relationship between criminal justice and the conditions of life in ‘late modernity’. Yet in comparison with certain older traditions that sought to articulate criminal justice issues with a wider politics of contestation around political economies and social welfare policies of different polities, many of the current leading culturalist accounts tend in their globalized convergences to produce a strangely decontextualized picture in which we are all subject to the zeitgeist of a unitary ‘late modernity’ which does not differ between, for example, social democratic and neo-liberal polities, let alone allow for the widespread persistence of the pre-modern. It is argued that that contrary to this globalizing trend there are signs within criminology that life is being breathed back into social democratic and penal welfare concerns, habitus, and practices. The chapter discusses three of these signs: the emergence of neo-liberalism as a subject of criminology; a developing comparative penology which recognizes differences in the political economies of capitalist states and evinces a renewed interest in inequality; and a nascent revolt against the ‘generative grammar’, ‘pathological disciplinarities’, and ‘imaginary penalities’ of neoliberal managerialism.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This time last year we proposed the theme of the 'loop' issue to the M/C collective because it sounded deeply cool, satisfying our poststructuralist posturings about reflexivity and representation, while also tapping into everyday cultural objects and practices. We expected that the 'loop' issue would generate some interesting and varied responses, and it did. We received submissions about music, visual art, language, child development, pop-cultural artefacts, mathematics and culture in general. These explorations of disparate fields seemed, however, to be tied together by a common thread: the concept of "generation" itself. Each article in the 'loop' issue describes a loop that does not simply repeat an original operation, but that through iteration creates new possibilities and new meanings...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Quantum-inspired models have recently attracted increasing attention in Information Retrieval. An intriguing characteristic of the mathematical framework of quantum theory is the presence of complex numbers. However, it is unclear what such numbers could or would actually represent or mean in Information Retrieval. The goal of this paper is to discuss the role of complex numbers within the context of Information Retrieval. First, we introduce how complex numbers are used in quantum probability theory. Then, we examine van Rijsbergen’s proposal of evoking complex valued representations of informations objects. We empirically show that such a representation is unlikely to be effective in practice (confuting its usefulness in Information Retrieval). We then explore alternative proposals which may be more successful at realising the power of complex numbers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Numeric set watermarking is a way to provide ownership proof for numerical data. Numerical data can be considered to be primitives for multimedia types such as images and videos since they are organized forms of numeric information. Thereby, the capability to watermark numerical data directly implies the capability to watermark multimedia objects and discourage information theft on social networking sites and the Internet in general. Unfortunately, there has been very limited research done in the field of numeric set watermarking due to underlying limitations in terms of number of items in the set and LSBs in each item available for watermarking. In 2009, Gupta et al. proposed a numeric set watermarking model that embeds watermark bits in the items of the set based on a hash value of the items’ most significant bits (MSBs). If an item is chosen for watermarking, a watermark bit is embedded in the least significant bits, and the replaced bit is inserted in the fractional value to provide reversibility. The authors show their scheme to be resilient against the traditional subset addition, deletion, and modification attacks as well as secondary watermarking attacks. In this paper, we present a bucket attack on this watermarking model. The attack consists of creating buckets of items with the same MSBs and determine if the items of the bucket carry watermark bits. Experimental results show that the bucket attack is very strong and destroys the entire watermark with close to 100% success rate. We examine the inherent weaknesses in the watermarking model of Gupta et al. that leave it vulnerable to the bucket attack and propose potential safeguards that can provide resilience against this attack.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sustainability has become one of the important research topics in the field of Human Computer Interaction (HCI). However, the majority of work has focused on the Western culture. In this paper, we explore sustainable household practices in the developing world. Our research draws on the results from an ethnographic field study of household women belonging to the so-called middle class in India. We analyze our results in the context of Blevis' [4] principles of sustainable interaction design (established within the Western culture), to extract the intercultural aspects that need to be considered for designing technologies. We present examples from the field that we term "domestic artefacts". Domestic artefacts represent creative and sustainable ways household women appropriate and adapt used objects to create more useful and enriching objects that support household members' everyday activities. Our results show that the rationale behind creating domestic artefacts is not limited to the practicality and usefulness, but it shows how religious beliefs, traditions, family intimacy, personal interests and health issues are incorporated into them.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Physical design objects such as sketches, drawings, collages, storyboards and models play an important role in supporting communication and coordination in design studios. CAM (Cooperative Artefact Memory) is a mobile-tagging based messaging system that allows designers to collaboratively store relevant information onto their design objects in the form of messages, annotations and external web links. We studied the use of CAM in a Product Design studio over three weeks, involving three different design teams. In this paper, we briefly describe CAM and show how it serves as 'object memory'.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Body and Forgetting is a powerful dance performance that brings together the work of choreographer Liz Roche and film maker Alan Gilsenan, with a live score by Denis Roche. Inspired by the writings of Milan Kundera, Liz Roche Company's remarkable dancers find their way through delicately woven circumstances of disappearance, loss, relationship and hope. Their attempts to hold fast to memories and objects of meaning is at the heart of this work. The live performers move in dialogue with filmed versions of their dancing selves. They re-write their histories, make better endings to their stories, say what they regret not having said. These filmed reflections or versions of themselves, by offering a mirror, ultimately bring the performers back to themselves, richer from the experience.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a novel approach for multi-object detection in aerial videos based on tracking. The proposed method mainly involves three steps. Firstly, the spatial-temporal saliency is employed to detect moving objects. Secondly, the detected objects are tracked by mean shift in the subsequent frames. Finally, the saliency results are fused with the weight map generated by tracking to get refined detection results, and in turn the modified detection results are used to update the tracking models. The proposed algorithm is evaluated on VIVID aerial videos, and the results show that our approach can reliably detect moving objects even in challenging situations. Meanwhile, the proposed method can process videos in real time, without the effect of time delay.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, the problem of moving object detection in aerial video is addressed. While motion cues have been extensively exploited in the literature, how to use spatial information is still an open problem. To deal with this issue, we propose a novel hierarchical moving target detection method based on spatiotemporal saliency. Temporal saliency is used to get a coarse segmentation, and spatial saliency is extracted to obtain the object’s appearance details in candidate motion regions. Finally, by combining temporal and spatial saliency information, we can get refined detection results. Additionally, in order to give a full description of the object distribution, spatial saliency is detected in both pixel and region levels based on local contrast. Experiments conducted on the VIVID dataset show that the proposed method is efficient and accurate.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It is increasingly apparent that sea-level data (e.g. microfossil transfer functions, dated coral microatolls and direct observations from satellite and tidal gauges) vary temporally and spatially at regional to local scales, thus limiting our ability to model future sea-level rise for many regions. Understanding sealevel response at ‘far-field’ locations at regional scales is fundamental for formulating more relevant sea-level rise susceptibility models within these regions under future global change projections. Fossil corals and reefs in particular are valuable tools for reconstructing past sea levels and possible environmental phase shifts beyond the temporal constraints of instrumental records. This study used abundant surface geochronological data based on in situ subfossil corals and precise elevation surveys to determine previous sea level in Moreton Bay, eastern Australia, a far-field site. A total of 64 U-Th dates show that relative sea level was at least 1.1 m above modern lowest astronomical tide (LAT) from at least ˜6600 cal. yr BP. Furthermore, a rapid synchronous demise in coral reef growth occurred in Moreton Bay ˜5800 cal. yr BP, coinciding with reported reef hiatus periods in other areas around the Indo-Pacific region. Evaluating past reef growth patterns and phases allows for a better interpretation of anthropogenic forcing versus natural environmental/climatic cycles that effect reef formation and demise at all scales and may allow better prediction of reef response to future global change.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on the fact that secret (pass) objects appear in challenges with a different probability from non-secret (decoy) objects when the responses are taken into account. Although they mentioned that a protocol susceptible to this attack should minimize this difference, they did not give details as to how this can be achieved barring a few suggestions. In this paper, we attempt to fill this gap by generalizing the attack with a much more comprehensive theoretical analysis. Our treatment is more quantitative which enables us to describe a method to theoretically estimate a lower bound on the number of sessions a protocol can be safely used against the attack. Our results include 1) two proposed fixes to make counting protocols practically safe against the attack at the cost of usability, 2) the observation that the attack can be used on non-counting based protocols too as long as challenge generation is contrived, 3) and two main design principles for user authentication protocols which can be considered as extensions of the principles from Yan et al. This detailed theoretical treatment can be used as a guideline during the design of counting based protocols to determine their susceptibility to this attack. The Foxtail protocol, one of the protocols analyzed by Yan et al., is used as a representative to illustrate our theoretical and experimental results.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There has been tremendous interest in watermarking multimedia content during the past two decades, mainly for proving ownership and detecting tamper. Digital fingerprinting, that deals with identifying malicious user(s), has also received significant attention. While extensive work has been carried out in watermarking of images, other multimedia objects still have enormous research potential. Watermarking database relations is one of the several areas which demand research focus owing to the commercial implications of database theft. Recently, there has been little progress in database watermarking, with most of the watermarking schemes modeled after the irreversible database watermarking scheme proposed by Agrawal and Kiernan. Reversibility is the ability to re-generate the original (unmarked) relation from the watermarked relation using a secret key. As explained in our paper, reversible watermarking schemes provide greater security against secondary watermarking attacks, where an attacker watermarks an already marked relation in an attempt to erase the original watermark. This paper proposes an improvement over the reversible and blind watermarking scheme presented in [5], identifying and eliminating a critical problem with the previous model. Experiments showing that the average watermark detection rate is around 91% even with attacker distorting half of the attributes. The current scheme provides security against secondary watermarking attacks.