scholarly journals Automatic Transformation of a Video Using Multimodal Information for an Engaging Exploration Experience

2020 ◽  
Vol 10 (9) ◽  
pp. 3056
Author(s):  
Fahim A. Salim ◽  
Fasih Haider ◽  
Saturnino Luz ◽  
Owen Conlan

Exploring the content of a video is typically inefficient due to the linear streamed nature of its media and the lack of interactivity. While different approaches have been proposed for enhancing the exploration experience of video content, the general view of video content has remained basically the same, that is, a continuous stream of images. It is our contention that such a conservative view on video limits its potential value as a content source. This paper presents An Alternative Representation of Video via feature Extraction (RAAVE), a novel approach to transform videos from a linear stream of content into an adaptive interactive multimedia document and thereby enhance the exploration potential of video content by providing a more engaging user experience. We explore the idea of viewing video as a diverse multimedia content source, opening new opportunities and applications to explore and consume video content. A modular framework and algorithm for the representation engine and template collection is described. The representation engine based approach is evaluated through development of a prototype system grounded on the design of the proposed approach, allowing users to perform multiple content exploration tasks within a video. The evaluation demonstrated RAAVE’s ability to provide users with a more engaging, efficient and effective experience than a typical multimedia player while performing video exploration tasks.

Author(s):  
Nick Bryan-Kinns

This chapter presents a conceptual framework which supports reuse in hypermedia applications. Reuse is important in hypermedia, and especially hypervideo, as it is rich in content but often costly to capture, store and annotate. The framework’s use is illustrated through three different example hypervideo applications which exhibit several forms of reuse. This chapter goes beyond the notion of reuse of parts of hypermedia applications and considers the reuse of classes of structure of hypermedia applications, and the issues relating to such reuse. Future systems can be developed which utilise this approach to modeling video content as illustrated in Bryan-Kinns (1998; 2000). The key contribution of this chapter is the illustration of a novel approach to modeling video, rather than how this could be implemented as discussed in other chapters.


Author(s):  
LI-PHENG KHOO ◽  
LIAN-YIN ZHAI

The efficient use of critical machines or equipment in a manufacturing system requires reliable information about their current operating conditions. This information is often used as a basis for machine condition monitoring and fault diagnosis—which essentially is an endeavor of knowledge extraction. Rough set theory provides a novel way to knowledge acquisition, especially when dealing with vagueness and uncertainty. It focuses on the discovery of patterns in incomplete and/or inconsistent data. However, rough set theory requires the data analyzed to be in discrete manner. This paper proposes a novel approach to the treatment of continuous-valued attributes in multi-concept classification for mechanical diagnosis using rough set theory. Based on the proposed approach, a prototype system called RClass-Plus has been developed. RClass-Plus is validated using a case study on mechanical fault diagnosis. Details of the validation are described.


2014 ◽  
Vol 933 ◽  
pp. 675-681
Author(s):  
Zhe Ying Xu ◽  
Yan Yan ◽  
Guo Xin Wang ◽  
Lin Gong

With the establishment of more and more management information systems in the enterprises, many heterogeneous databases have been produced, resulting in the phenomenon of the information island. This paper puts forward a method based on ontology to integrate the heterogeneous databases and presents the framework of the integration method. In this framework A method based on relational database is presented to build the mixed ontology structure Common VocabularyLocal Ontology. The mixed ontology structure is used to establish the semantic web for enterprises. This novel approach exploits the multithreading combined with semantic web to implement parallel retrieval on an integrated platform. The application that this prototype system of the integration method has been implemented in a research institute verifies the method could effectively analyze the user's intention, thereby improving the reuse of knowledge.


Author(s):  
BO-REN BAI ◽  
BERLIN CHEN ◽  
HSIN-MIN WANG

In light of the rapid growth of Chinese information resources on the Internet, this study investigates a novel approach that deals with the problem of Chinese text and spoken document retrieval using both text and speech queries. By properly utilizing the monosyllabic structure of the Chinese language, the proposed approach estimates the statistical similarity between the text/speech queries and the text/spoken documents at the phonetic level using the syllable-based statistical information. The investigation successfully implemented a prototype system with an interface supporting some user-friendly functions and the initial test results demonstrate the feasibility of the proposed approach.


2018 ◽  
Vol 2018 ◽  
pp. 1-16 ◽  
Author(s):  
Shuhui Zhang ◽  
Xiangxu Meng ◽  
Lianhai Wang ◽  
Lijuan Xu ◽  
Xiaohui Han

Most existing virtual machine introspection (VMI) technologies analyze the status of a target virtual machine under the assumption that the operating system (OS) version and kernel structure information are known at the hypervisor level. In this paper, we propose a model of virtual machine (VM) security monitoring based on memory introspection. Using a hardware-based approach to acquire the physical memory of the host machine in real time, the security of the host machine and VM can be diagnosed. Furthermore, a novel approach for VM memory forensics based on the virtual machine control structure (VMCS) is put forward. By analyzing the memory of the host machine, the running VMs can be detected and their high-level semantic information can be reconstructed. Then, malicious activity in the VMs can be identified in a timely manner. Moreover, by mutually analyzing the memory content of the host machine and VMs, VM escape may be detected. Compared with previous memory introspection technologies, our solution can automatically reconstruct the comprehensive running state of a target VM without any prior knowledge and is strongly resistant to attacks with high reliability. We developed a prototype system called the VEDefender. Experimental results indicate that our system can handle the VMs of mainstream Linux and Windows OS versions with high efficiency and does not influence the performance of the host machine and VMs.


Author(s):  
Mark A. Hale ◽  
James I. Craig ◽  
Dimitri N. Mavris

Abstract The design framework research community utilizes the internet as a facilitator for collaborative activities. The internet provides a platform independent interface and geographic distribution. Information can be easily represented to the end-user using the HyperText Markup Language and can be coded in a reasonable timeframe. A shortcoming of exploiting this technology further is the reliance on existing Web servers to interface with analysis tools and design services. In this case, interactive components require auxiliary processes (called CGI scripts) to be started by the server that are used in an inefficient manner. This model does not provide the user-oriented capability required by standalone applications. Java offers improvements in client-side processing but a server bottleneck still exists. A novel approach using lean-servers is introduced as an alternative method for providing an efficient server-side computing model. In this case, internet requests are brokered directly by the design application by providing a gateway to the application’s programming interface using a HyperText Transfer Protocol compliant layer. This allows requests to be managed directly by the application rather than requiring auxiliary services. Step-by-step directions for implementing this approach using a case study of an existing design framework are given in this paper. A prototype system, called the Systems Programming Architecture for Collaborative Engineering, is described as one scenario for implementing the lean-server technology. Usability of the approach is demonstrated through a Design of Experiments example that is representative of modern design methods. This example also demonstrates collaboration because it executes asynchronously with multi-user intervention at any time during the process. In hindsight, the lean-server approach is an enabling technology for collaborative design and focuses future research direction on the establishment of collaborative design practices.


Author(s):  
CHIA-JUNG CHANG ◽  
JUN-WEI HSIEH ◽  
YUNG-SHENG CHEN ◽  
WEN-FONG HU

This paper presents a novel approach to track multiple moving objects using the level-set method. The proposed method can track different objects no matter if they are rigid, nonrigid, merged, split, with shadows, or without shadows. At the first stage, the paper proposes an edge-based camera compensation technique for dealing with the problem of object tracking when the background is not static. Then, after camera compensation, different moving pixels can be easily extracted through a subtraction technique. Thus, a speed function with three ingredients, i.e. pixel motions, object variances and background variances, can be accordingly defined for guiding the process of object boundary detection. According to the defined speed function, different object boundaries can be efficiently detected and tracked by a curve evolution technique, i.e. the level-set-based method. Once desired objects have been extracted, in order to further understand the video content, this paper takes advantage of a relation table to identify and observe different behaviors of tracked objects. However, the above analysis sometimes fails due to the existence of shadows. To avoid this problem, this paper adopts a technique of Gaussian shadow modeling to remove all unwanted shadows. Experimental results show that the proposed method is much more robust and powerful than other traditional methods.


2019 ◽  
Vol 27 (1) ◽  
pp. 2-25 ◽  
Author(s):  
Mutlaq Jalimid Alotaibi ◽  
Steven Furnell ◽  
Nathan Clarke

Purpose It is widely acknowledged that non-compliance of employees with information security polices is one of the major challenges facing organisations. This paper aims to propose a model that is intended to provide a comprehensive framework for raising the level of compliance amongst end-users, with the aim of monitoring, measuring and responding to users’ behaviour with an information security policy. Design/methodology/approach The proposed model is based on two main concepts: a taxonomy of the response strategy to non-compliant behaviour and a compliance points system. The response taxonomy comprises two categories: awareness raising and enforcement of the security policy. The compliance points system is used to reward compliant behaviour and penalise non-compliant behaviour. Findings A prototype system has been developed to simulate the proposed model and work as a real system that responds to the behaviour of users (reflecting both violations and compliance behaviour). In addition, the model has been evaluated by interviewing experts from academic and industry. They considered the proposed model to offers a novel approach for managing end users’ behaviour with the information security policies. Research limitations/implications Psychological factors were out of the research scope at this stage. The proposed model may have some psychological impacts upon users; therefore, this issue needs to be considered by studying the potential impacts and the best solutions. Originality/value Users being compliant with the information security policies of their organisation is the key to strengthen information security. Therefore, when employees have a good level of compliance with security policies, this positively affects the overall security of an organisation.


2012 ◽  
Vol 27 (1) ◽  
pp. 81-87 ◽  
Author(s):  
Jorma Jokela ◽  
Monica Rådestad ◽  
Dan Gryth ◽  
Helené Nilsson ◽  
Anders Rüter ◽  
...  

AbstractIntroduction: In mass-casualty situations, communications and information management to improve situational awareness is a major challenge for responders. In this study, the feasibility of a prototype system that utilizes commercially available, low-cost components, including Radio Frequency Identification (RFID) and mobile phone technology, was tested in two simulated mass-casualty incidents.Methods: The feasibility and the direct benefits of the system were evaluated in two simulated mass-casualty situations: one in Finland involving a passenger ship accident resulting in multiple drowning/hypothermia patients, and another at a major airport in Sweden using an aircraft crash scenario. Both simulations involved multiple agencies and functioned as test settings for comparing the disaster management’s situational awareness with and without using the RFID-based system. Triage documentation was done using both an RFID-based system, which automatically sent the data to the Medical Command, and a traditional method using paper triage tags. The situational awareness was measured by comparing the availability of up-to date information at different points in the care chain using both systems.Results: Information regarding the numbers and status or triage classification of the casualties was available approximately one hour earlier using the RFID system compared to the data obtained using the traditional method.Conclusions: The tested prototype system was quick, stable, and easy to use, and proved to work seamlessly even in harsh field conditions. It surpassed the paper-based system in all respects except simplicity of use. It also improved the general view of the mass-casualty situations, and enhanced medical emergency readiness in a multi-organizational medical setting. The tested technology is feasible in a mass-casualty incident; further development and testing should take place.


Author(s):  
Xiaodan Hu ◽  
Avery Ma ◽  
Ahmed Gawish ◽  
Mark Lamm ◽  
Paul Fieguth

Shifted Superposition (SSPOS) is a resolution enhancement methodwhere apparent high-resolution content is displayed using a lowresolutionprojection system with an opto-mechanical shifter. WhileSSPOS-enhanced projectors have been showing promising resultsin still images, they still suffer from motion artifacts in video contents.Motivated by this, we present a novel approach to apparentprojector resolution enhancement for videos via motion-basedblurring module. We propose the use of a motion detection moduleand a blurring module to compensate for both SSPOS-resulted andnatural motion artifacts in the video content. To accomplish this,we combine both local and global motion estimation algorithms togenerate accurate dense flow fields. The detected motion regionsare enhanced using directional Gaussian filters. Preliminary resultsshow that the proposed method can produce accurate densemotion vectors and significantly reduce the artifacts in videos.


Sign in / Sign up

Export Citation Format

Share Document