displaying 1000 best results Help
Search results for: MULTIMEDIA MANUALS
-
Multimedia Business Presentations - 2021/2022
e-Learning Courses -
Multimedia Business Presentations - 2023/2024
e-Learning Courses -
Multimedia Business Presentations - 2022/2023
e-Learning Courses -
Uncertainty Quantification of Additive Manufacturing Post-Fabrication Tuning of Resonator-Based Microwave Sensors
PublicationReconfigurability, especially in terms of the ability of adjusting the operating frequency, has become an important prerequisite in the design of modern microwave components and systems. It is also pertinent to microwave sensors developed for a variety of applications such as characterization of material properties of solids or liquids. This paper discusses uncertainty quantification of additive-manufacturing-based post-fabrication...
-
Optimization-based antenna miniaturization using adaptively-adjusted penalty factors
PublicationThe continuing trend for miniaturization of electronic devices necessitates size reduction of the comprising components and circuitry. Specifically, integrated circuit-antenna modules therein require compact radiators in applications such as 5G communications, implantable and on-body devices, or internet of things (IoT). The conflict between the demands for compact size and elec-trical and field performance can be mitigated by...
-
World Conference on Educational Multimedia, Hypermedia and Telecommunications
Conferences -
IEEE International Conference on Multimedia Computing and Systems
Conferences -
International Conference on Distributed Frameworks for Multimedia Applications
Conferences -
International Conference on Advances in Mobile Computing and Multimedia
Conferences -
Annals of Pedagogies
Journals -
Historical Annals
Journals -
Annals of Psychology
Journals -
The Annals of Philosophy
Journals -
Annals of Arts
Journals -
Annals of Theology
Journals -
Annals of Theology
Journals -
Message Inter-Arrival and Inter-Departure Time Distributions in IMS/NGN Architecture
PublicationCurrently is it assumed that requirements of the information society for delivering multimedia services will be satisfied by the Next Generation Network (NGN) architecture, which includes elements of the IP Multimedia Subsystem (IMS) solution. In order to guarantee Quality of Service (QoS), NGN has to be appropriately designed and dimensioned. Therefore, proper traffic models should be proposed and applied. This requires determination...
-
Verification of the Analytical Traffic Model of a Multidomain IMS/NGN Using the Simulation Model
PublicationIn this paper we verify the previously proposed analytical traffic model of a multidomain Next Generation Network (NGN), which is standardized for delivering multimedia services based on the IP Multimedia Subsystem (IMS). For this reason a proper simulation model used, in which not theoretical queuing system models but the operation of real network elements and standardized call scenarios are accurately implemented. Consequently,...
-
On the fast BSS transition algorithms in the IEEE 802.11r local area wireless networks
PublicationHandover performance is critical to support multimedia services that are becoming increasingly available over the wireless devices. The high transition delay can be unaccepted for such services or can be a source of disruption on the session. On the other side, IEEE 802.11 standard is being extended with new functionalities. Security and QoS features, included in recent IEEE 802.11-2007 standard, add management frames that are...
-
Kamil Brodnicki dr inż.
PeopleKamil Brodnicki is an assistant at the Department of Applied Informatics in Management at the Faculty of Economics and Management at the Gdańsk University of Technology. From 2017, he is the head of the Customer Experience laboratory. Since 2011, he has been working in one of the Tri-City IT companies as an IT Systems Analyst, implementing projects in the financial sector. His research interests are focused on the following areas:...
-
Comments on ''an SVD-based watermarking scheme for protecting rightful ownership''
PublicationW pracy wykazano, że algorytm zaproponowany w komentowanym artykule nie ma wartości praktycznej, gdyż charakteryzuje się bardzo dużym prawdopodobieństwem fałszywej akceptacji.
-
Video analytics-based algorithm for monitoring egress from buildings
PublicationA concept and a practical implementation of the algorithm for detecting of potentially dangerous situations related to crowding in passages is presented. An example of such a situation is a crush which may be caused by an obstructed pedestrian pathway. The surveillance video camera signal analysis performed in the online mode is employed in order to detect hold-ups near bottlenecks like doorways or staircases. The details of the...
-
Detection and localization of selected acoustic events in acoustic field for smart surveillance applications
PublicationA method for automatic determination of position of chosen sound events such as speech signals and impulse sounds in 3-dimensional space is presented. The evens are localized in the presence of sound reflections employing acoustic vector sensors. Human voice and impulsive sounds are detected using adaptive detectors based on modified peak-valley difference (PVD) parameter and sound pressure level. Localization based on signals...
-
Genetic programming extension to APF-based monocular human body pose estimation
PublicationNew method of the human body pose estimation based on a single camera 2D observation is presented, aimed at smart surveillance related video analysis and action recognition. It employs 3D model of the human body, and genetic algorithm combined with annealed particle filter for searching the global optimum of model state, best matching the object's 2D observation. Additionally, new motion cost metric is employed, considering current...
-
Analysis of impact of audio modifications on the robustness of watermark for non-blind architecture
PublicationThe aim of this paper is to assess the robustness of the non-blind audio content watermarking scheme proposed by the authors. The authors present the architecture of the designed system along with the employed workflows for embedding and extracting the watermark followed by the implementation phase description and the analysis of the experimental results. Some possible attack simulations on the embedded watermarks are reviewed,...
-
Detection, classification and localization of acoustic events in the presence of background noise for acoustic surveillance of hazardous situations
PublicationEvaluation of sound event detection, classification and localization of hazardous acoustic events in the presence of background noise of different types and changing intensities is presented. The methods for discerning between the events being in focus and the acoustic background are introduced. The classifier, based on a Support Vector Machine algorithm, is described. The set of features and samples used for the training of the...
-
Adversarial attack algorithm for traffic sign recognition
PublicationDeep learning suffers from the threat of adversarial attacks, and its defense methods have become a research hotspot. In all applications of deep learning, intelligent driving is an important and promising one, facing serious threat of adversarial attack in the meanwhile. To address the adversarial attack, this paper takes the traffic sign recognition as a typical object, for it is the core function of intelligent driving. Considering...
-
Maritime traffic situation awareness analysis via high-fidelity ship imaging trajectory
PublicationSituation awareness provides crucial yet instant information to maritime traffic participants, and significant attentions are paid to implement traffic situation awareness task via various maritime data source (e.g., automatic identification system, maritime surveillance video, radar, etc.). The study aims to analyze traffic situation with the support of ship imaging trajectory. First, we employ the dark channel prior model to...
-
Variable length sliding models for banking clients face biometry
PublicationAn experiment was organized in 100 bank branches to acquire biometric samples from nearly 5000 clients including face images. A procedure for creating face verification models based on continuously expanding database of biometric samples is proposed, implemented, and tested. The presented model applies to circumstances where it is possible to collect and to take into account new biometric samples after each positive verification...
-
Simple gait parameterization and 3D animation for anonymous visual monitoring based on augmented reality
PublicationThe article presents a method for video anonymization and replacing real human silhouettes with virtual 3D figures rendered on a screen. Video stream is processed to detect and to track objects, whereas anonymization stage employs animating avatars accordingly to behavior of detected persons. Location, movement speed, direction, and person height are taken into account during animation and rendering phases. This approach requires...
-
A comparative study of English viseme recognition methods and algorithms
PublicationAn elementary visual unit – the viseme is concerned in the paper in the context of preparing the feature vector as a main visual input component of Audio-Visual Speech Recognition systems. The aim of the presented research is a review of various approaches to the problem, the implementation of algorithms proposed in the literature and a comparative research on their effectiveness. In the course of the study an optimal feature vector construction...
-
A comparative study of English viseme recognition methods and algorithm
PublicationAn elementary visual unit – the viseme is concerned in the paper in the context of preparing the feature vector as a main visual input component of Audio-Visual Speech Recognition systems. The aim of the presented research is a review of various approaches to the problem, the implementation of algorithms proposed in the literature and a comparative research on their effectiveness. In the course of the study an optimal feature vector...
-
Deep neural networks for human pose estimation from a very low resolution depth image
PublicationThe work presented in the paper is dedicated to determining and evaluating the most efficient neural network architecture applied as a multiple regression network localizing human body joints in 3D space based on a single low resolution depth image. The main challenge was to deal with a noisy and coarse representation of the human body, as observed by a depth sensor from a large distance, and to achieve high localization precision....
-
Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents
PublicationElectronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...
-
Multiple sound sources localization in free field using acoustic vector sensor
PublicationMethod and preliminary results of multiple sound sources localization in free field using the acoustic vector sensor were presented in this study. Direction of arrival (DOA) for considered source was determined based on sound intensity method supported by Fourier analysis. Obtained spectrum components for considered signal allowed to determine the DOA value for the particular frequency independently. The accuracy of the developed...
-
A method for counting people attending large public events
PublicationThe algorithm for people counting in crowded scenes, based on the idea of virtual gate which uses optical flow method is presented. The concept and practical application of the developed algorithm under real conditions is depicted. The aim of the work is to estimate the number of people passing through entrances of a large sport hall. The most challenging problem was the unpredicted behavior of people while entering the building....
-
Extraction of stable foreground image regions for unattended luggage detection
PublicationA novel approach to detection of stationary objects in the video stream is presented. Stationary objects are these separated from the static background, but remaining motionless for a prolonged time. Extraction of stationary objects from images is useful in automatic detection of unattended luggage. The proposed algorithm is based on detection of image regions containing foreground image pixels having stable values in time and...
-
Processing of acoustical data in a multimodal bank operating room surveillance system
PublicationAn automatic surveillance system capable of detecting, classifying and localizing acoustic events in a bank operating room is presented. Algorithms for detection and classification of abnormal acoustic events, such as screams or gunshots are introduced. Two types of detectors are employed to detect impulsive sounds and vocal activity. A Support Vector Machine (SVM) classifier is used to discern between the different classes of...
-
Complexity analysis of the Pawlak’s flowgraph extension for re-identification in multi-camera surveillance system
PublicationThe idea of Pawlak’s flowgraph turned out to be a useful and convenient container for a knowledge of objects’ behaviour and movements within the area observed with a multi-camera surveillance system. Utilization of the flowgraph for modelling behaviour admittedly requires certain extensions and enhancements, but it allows for combining many rules into a one data structure and for obtaining parameters describing how objects tend...
-
Bartłomiej Mróz dr inż.
People -
Neural Architecture Search for Skin Lesion Classification
PublicationDeep neural networks have achieved great success in many domains. However, successful deployment of such systems is determined by proper manual selection of the neural architecture. This is a tedious and time-consuming process that requires expert knowledge. Different tasks need very different architectures to obtain satisfactory results. The group of methods called the neural architecture search (NAS) helps to find effective architecture...
-
ANNALS OF MICROBIOLOGY
Journals -
Kamila Kokot-Kanikuła mgr
PeopleKamila Kokot-Kanikuła is a digital media senior librarian at Gdańsk University of Technology (GUT) Library. She works in Digital Archive and Multimedia Creation Department and her main areas of interests include early printed books, digital libraries, Open Access and Open Science. In the Pomeranian Digital Library (PDL) Project she is responsible for creating annual digital plans, transferring files on digital platform, and promoting...
-
Design of a Multidomain IMS/NGN Service Stratum
PublicationThe paper continues our research concerning the Next Generation Network (NGN), which is standardized for delivering multimedia services with strict quality and includes elements of the IP Multimedia Subsystem (IMS). A design algorithm for a multidomain IMS/NGN service stratum is proposed, which calculates the necessary CSCF servers CPU message processing times and link bandwidths with respect to the given maximum values of mean...
-
Approximation of Message Inter-Arrival and Inter-Departure Time Distributions in IMS/NGN Architecture Using Phase-Type Distributions
PublicationCurrently it is assumed that requirements of the information society for delivering multimedia services will be satisfied by the Next Generation Network (NGN) architecture, which includes elements of the IP Multimedia Subsystem (IMS) solution. In order to guarantee Quality of Service (QoS), NGN has to be appropriately designed and dimensioned. Therefore, proper traffic models should be proposed and applied. This requires determination...
-
Sound engineering as our commitment to its creators in Poland
PublicationSound engineering is an interdisciplinary and rapidly expanding domain. It covers many aspects, such as sound perception, studio and sound mastering technology, music information retrieval including content-based search systems and automatic music transcription frameworks, sound synthesis, sound restoration, electroacoustics, and other ones constituting multimedia technology. Moreover, machine learning methods applied to the topics...
-
Testbed analysis of video and VoIP transsmission performance in IEEE 802.11 b/g/n networks
PublicationThe aim of the work is to analyze capabilities and limitations of different implementations of IEEE 802.11 technologies (IEEE 802.11 b/g/n), utilized for both video streaming and VoIP calls directed to mobile devices. Our preliminary research showed that results obtained with currently popular simulation tools can be drastically different than these possible in real-world environment, so, in order to correctly evaluate performance...
-
Real-Time connection Between Immerse 3D Vizualization Laboratory and Kaskada Platform
PublicationMultimedia stream processing into two cooperative different systems (cluster platform and virtual lab) is considered. The considered selected information about the systems is presented and the idea of its communication when executing the distributed application is proposed. A general schema of the communication architecture is given. Tests of data transmission quality are considered and their results are presented.
-
Annals of Warsaw University of Life Sciences- SGGW - Agriculture
Journals -
Analele universitatii din Craiova.Istorie (Annals of the University of Craiova.History)
Journals