Kooperativer Bibliotheksverbund

Berlin Brandenburg

and
and

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Conference Proceeding  (119)
Type of Medium
  • Conference Proceeding  (119)
Language
Year
  • 1
    Language: English
    In: 2012 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), March 2012, pp.925-931
    Description: The paper describes a method for keyterm extraction from messages of microblogs. The described approach utilizes the information obtained by the analysis of structure and content of Wikipedia. The algorithm is based on computation of "keyphraseness" measure for each term, i.e. an estimation of probability that it can be selected as a key in the text. The experimental study of the proposed technique demonstrated satisfactory results which significantly outpaces analogues. As a demonstration of possible application of the algorithm, the prototype of context-sensitive advertising system has been implemented. This system is able to obtain the descriptions of the goods relevant to the found keyterms from Amazon online store. Several suggestions are also made on how to utilize the information obtained by the analysis of Twitter messages in different auxiliary services.
    Keywords: Twitter ; Internet ; Blogs ; Encyclopedias ; Electronic Publishing ; Databases ; Keyterm Extraction ; Microblogging ; Twitter ; Wikipedia ; Context-Sensitive Advertising
    ISBN: 9781467316576
    ISBN: 1467316571
    Source: IEEE Conference Publications
    Source: IEEE Xplore
    Source: IEEE Journals & Magazines 
    Source: IEEE eBooks
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Language: English
    In: Journal of Physics: Conference Series, 2015, Vol.602(1), p.012004 (5pp)
    Description: The article presents the results of analysis of rheology properties of sandy-clay tailings (wastes) of kimberlite ore dressing of the diamond deposit (Russia, Arkhangelsk region). The coefficient of secondary compression as main parameter of soil's creep is defined by implementing standard one-dimensional consolidation test. The linear correlation between initial void ratio and coefficient of secondary compression of sandy-clay tailings were obtained. For numerical simulation of tailing's behaviour subject to its rheology properties in Soft Soil Creep (SSC) model (time independent behaviour) of PLAXIS software was used. According to laboratory tests calibration of SSC model was implemented. It allows predicting dam's safety and reliability for long-term outlook.
    Keywords: Numerische Simulation ; Rheologie ; Labortest ; Eichen (Abgleichen) ; Zeitverhalten ; Russland ; Weicher Boden ; Physics;
    ISSN: 1742-6588
    E-ISSN: 1742-6596
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Language: English
    In: 2017 IEEE East-West Design & Test Symposium (EWDTS), September 2017, pp.1-4
    Description: The area of SRAM on the chip has increased significantly in recent years (up to 90% in projects of 2014-2015). Thus, the development of the new techniques for accurate estimation of memory block characteristics due to technology variation is required. One of the main problems is the accurate estimation of the minimal voltage difference (MVD), that will reduce the pessimism in the evaluation of performance and yield analysis. In this work we have completed the comparative analysis of existing techniques (based on the worst case method) and the developed method of the accurate estimation of MVD. In the proposed method we use the technique of conditional probabilities, which allows improving the accuracy of estimation. The obtained experimental data shows the possibility of reducing MVD up to 17-22% with the SA number from 256 to 4096.
    Keywords: Yield Estimation ; Computational Modeling ; Standards ; Sram Cells ; Monte Carlo Methods ; Engineering
    E-ISSN: 2472-761X
    Source: IEEE Conference Publications
    Source: IEEE Xplore
    Source: IEEE Journals & Magazines 
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Language: English
    In: 26 September 2013, Vol.8856, pp.88561S-88561S-9
    Description: Visual privacy protection, i.e., obfuscation of personal visual information in video surveillance is an important and increasingly popular research topic. However, while many datasets are available for testing performance of various video analytics, little to nothing exists for evaluation of visual privacy tools. Since surveillance and privacy protection have contradictory objectives, the design principles of corresponding evaluation datasets should differ too. In this paper, we outline principles that need to be considered when building a dataset for privacy evaluation. Following these principles, we present new, and the first to our knowledge, Privacy Evaluation Video Dataset (PEViD). With the dataset, we provide XML-based annotations of various privacy regions, including face, accessories, skin regions, hair, body silhouette, and other personal information, and their descriptions. Via preliminary subjective tests, we demonstrate the flexibility and suitability of the dataset for privacy evaluations. The evaluation results also show the importance of secondary privacy regions that contain non-facial personal information for privacy- intelligibility tradeoff. We believe that PEViD dataset is equally suitable for evaluations of privacy protection tools using objective metrics and subjective assessments.
    Keywords: Engineering
    ISBN: 9780819497062
    ISBN: 0819497061
    ISSN: 0277786X
    E-ISSN: 1996756X
    Source: SPIE Digital Library - Proceedings
    Source: SPIE Digital Library - Journals
    Source: SPIE Digital Library - eBooks
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Language: English
    In: 2014 Sixth International Workshop on Quality of Multimedia Experience (QoMEX), September 2014, pp.232-237
    Description: Ultra High Definition (UHD) is one of the emerging immersive video technologies already available to public, as even some of the smartphones are capable of capturing UHD video. The increasingly widespread availability of UHD capable recording devices has important implications on privacy. This paper addresses the problem by proposing a publicly available UHD video dataset designed for evaluation of privacy issues. The dataset depicts typical surveillance scenarios of people fighting, exchanging bags, walking, and stealing, in an indoor and outdoor environment. The dataset also includes the data from the subjective assessment, which evaluated the impact of UHD on privacy compared to a currently common High Definition (HD) video and declining Standard Definition (SD) video. The results of the assessment not only demonstrate that UHD is a significantly more privacy intrusive technology when compared to HD and SD used today, but they also quantify the impact of intrusivness.
    Keywords: Data Privacy ; High Definition Video ; Privacy ; Video Sequences ; Visualization ; Surveillance ; Streaming Media ; Dataset ; Uhd Video ; Video Surveillance ; Privacy Evaluations ; Subjective Study
    Source: IEEE Conference Publications
    Source: IEEE Xplore
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Language: English
    In: 15 October 2012, Vol.8499, pp.84990J-84990J-12
    Description: High Dynamic Range (HDR) imaging is expected to become one of the technologies that could shape next generation of consumer digital photography. Manufacturers are rolling out cameras and displays capable of capturing and rendering HDR images. The popularity and full public adoption of HDR content is however hindered by the lack of standards in evaluation of quality, file formats, and compression, as well as large legacy base of Low Dynamic Range (LDR) displays that are unable to render HDR. To facilitate wide spread of HDR usage, the backward compatibility of HDR technology with commonly used legacy image storage, rendering, and compression is necessary. Although many tone-mapping algorithms were developed for generating viewable LDR images from HDR content, there is no consensus on which algorithm to use and under which conditions. This paper, via a series of subjective evaluations, demonstrates the dependency of perceived quality of the tone-mapped LDR images on environmental parameters and image content. Based on the results of subjective tests, it proposes to extend JPEG file format, as the most popular image format, in a backward compatible manner to also deal with HDR pictures. To this end, the paper provides an architecture to achieve such backward compatibility with JPEG and demonstrates efficiency of a simple implementation of this framework when compared to the state of the art HDR image compression.
    Keywords: Engineering
    ISBN: 9780819492166
    ISBN: 0819492167
    ISSN: 0277786X
    Source: SPIE Digital Library - Proceedings
    Source: SPIE Digital Library - Journals
    Source: SPIE Digital Library - eBooks
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Language: English
    In: 2018 International Conference on Actual Problems of Electron Devices Engineering (APEDE), September 2018, pp.175-179
    Description: The paper is focused on the technique of reducing CMOS leakage power consumption with using of sleep transistors. The discussed technique uses three-modal sleep unit with additional «drowsy» mode. Such "drowsy" mode reduces the transition time between active and sleep modes, providing an acceptable reduction of leakage power. The efficiency of the considered technique was evaluated for ISCAS'85 benchmark circuits designed on transistors with a channel length equal to 30 nm. Simulation results of test circuits with footer three-modal sleep transistors show, that technique allows to reduce transition time between modes by ~40% and reduces leakage by ~70-75%.
    Keywords: Switching Circuits ; Transistors ; Microelectronics ; Energy Efficiency ; Integrated Circuits ; Cmos Technology ; Power Demand
    ISBN: 9781538643327
    Source: IEEE Conference Publications
    Source: IEEE Xplore
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Conference Proceeding
    Conference Proceeding
    Language: English
    In: 2013 10th IEEE International Conference on Advanced Video and Signal Based Surveillance, August 2013, pp.208-213
    Description: The widespread use of digital video surveillance systems has also increased the concerns for violation of privacy rights. Since video surveillance systems are invasive, it is a challenge to find an acceptable balance between privacy of the public under surveillance and the functionalities of the systems. Tools for protection of visual privacy available today lack either all or some of the important properties such as security of protected visual data, reversibility (ability to undo privacy protection), simplicity, and independence from the video encoding used. To overcome these shortcomings, in this paper, we propose a morphing-based privacy protection method and focus on its robustness, reversibility, and security properties. We morph faces from a standard FERET dataset and run face detection and recognition algorithms on the resulted images to demonstrate that morphed faces retain the likeness of a face, while making them unrecognizable, which ensures the protection of privacy. Our experiments also demonstrate the influence of morphing strength on robustness and security. We also show how to determine the right parameters of the method.
    Keywords: Face ; Interpolation ; Accuracy ; Face Recognition ; Privacy ; Security ; Robustness
    Source: IEEE Conference Publications
    Source: IEEE Xplore
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Language: English
    In: 2014 IEEE International Conference on Image Processing (ICIP), October 2014, pp.3423-3425
    Description: JPEG scrambling tool is a flexible web-based tool with an intuitive and simple to use GUI and interface to secure visual information in a region of interest (ROI) of JPEG images. The tool demonstrates an efficient integration and use of security tools in JPEG image format by an example of scrambling privacy filter, which enables a variety of security services such as confidentiality, integrity verification, source authentication, and conditional access.
    Keywords: Transform Coding ; Image Coding ; Graphical User Interfaces ; Decoding ; Privacy ; Discrete Cosine Transforms ; Security ; Secure Jpeg ; Demonstration ; Scrambling ; Web Interface ; Applied Sciences
    ISSN: 1522-4880
    E-ISSN: 2381-8549
    Source: IEEE Conference Publications
    Source: IEEE Xplore
    Source: IEEE Journals & Magazines 
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Language: English
    In: 2018 26th European Signal Processing Conference (EUSIPCO), September 2018, pp.2375-2379
    Description: With the increasing amount of video being consumed by people daily, there is a danger of the rise in maliciously modified video content (i.e., 'fake news') that could be used to damage innocent people or to impose a certain agenda, e.g., meddle in elections. In this paper, we consider audio manipulations in video of a person speaking to the camera. Such manipulation is easy to perform, for instance, one can just replace a part of audio, while it can dramatically change the message and the meaning of the video. With the goal to develop an automated system that can detect these audio-visual speaker inconsistencies, we consider several approaches proposed for lip-syncing and dubbing detection, based on convolutional and recurrent networks and compare them with systems that are based on more traditional classifiers. We evaluated these methods on publicly available databases VidTIMIT, AMI, and GRID, for which we generated sets of tampered data.
    Keywords: Databases ; Feature Extraction ; Mouth ; Support Vector Machines ; Face ; Visualization ; Principal Component Analysis
    ISSN: 22195491
    E-ISSN: 2076-1465
    Source: IEEE Conference Publications
    Source: IEEE Xplore
    Source: IEEE Journals & Magazines 
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages