scholarly journals An Interactive and Personalized Erasure Animation System for a Large Group of Participants

2019 ◽  
Vol 9 (20) ◽  
pp. 4426
Author(s):  
Hua Wang ◽  
Xiaoyu He ◽  
Mingge Pan

This paper introduces a system to realize interactive and personalized erasure animations by using mobile terminals, a shared display terminal, and a database server for a large group of participants. In the system, participants shake their mobile terminals with their hands. Their shaking data are captured by the database server. Then there are immersive and somatosensory erasure animations on the shared display terminal according to the participants’ shaking data in the database server. The system is implemented by a data preprocessing module and an interactive erasure animation module. The former is mainly responsible for the cleaning and semantic standardization of the personalized erasure shape data. The latter realizes the interactive erasure animation, which involves shaking the mobile terminal, visualizations of the erasure animation on the shared display terminal, and dynamic and personalized data editing. The experimental results show that the system can realize various styles of personalized erasure animation and can respond to more than 2000 shaking actions simultaneously and present the corresponding erasure animations on the shared display terminal in real time.

2013 ◽  
Vol 753-755 ◽  
pp. 2863-2869
Author(s):  
Min Li ◽  
Xing Gao ◽  
Ming Hong Liao ◽  
Jun Cong Lin

With the rapid growth of mobile terminal diversity and versatility, manual generation and maintenance of different versions of a manga image are currently required in mobile phone animation industry to achieve best display effect on various terminal configurations. This paper does researches on the real-time retargeting technique for manga images. By generating the importance map and analyzing the redundancy of feature lines in the manga image, combined with a retargeting algorithm, the solution proposed in this paper can solve the real-time retargeting of manga images on mobile terminals. For most of manga images, this solution can automatically generate a good resizing image with its key object outstanding based on screen resolution and size of the target terminal in real time.


Data ◽  
2020 ◽  
Vol 6 (1) ◽  
pp. 1
Author(s):  
Ahmed Elmogy ◽  
Hamada Rizk ◽  
Amany M. Sarhan

In data mining, outlier detection is a major challenge as it has an important role in many applications such as medical data, image processing, fraud detection, intrusion detection, and so forth. An extensive variety of clustering based approaches have been developed to detect outliers. However they are by nature time consuming which restrict their utilization with real-time applications. Furthermore, outlier detection requests are handled one at a time, which means that each request is initiated individually with a particular set of parameters. In this paper, the first clustering based outlier detection framework, (On the Fly Clustering Based Outlier Detection (OFCOD)) is presented. OFCOD enables analysts to effectively find out outliers on time with request even within huge datasets. The proposed framework has been tested and evaluated using two real world datasets with different features and applications; one with 699 records, and another with five millions records. The experimental results show that the performance of the proposed framework outperforms other existing approaches while considering several evaluation metrics.


2012 ◽  
Vol 249-250 ◽  
pp. 1147-1153
Author(s):  
Qiao Na Xing ◽  
Da Yuan Yan ◽  
Xiao Ming Hu ◽  
Jun Qin Lin ◽  
Bo Yang

Automatic equipmenttransportation in the wild complex terrain circumstances is very important in rescue or military. In this paper, an accompanying system based on the identification and tracking of infrared LEDmarkers is proposed. This system avoidsthe defect that visible-light identification method has. In addition, this paper presents a Kalman filter to predict where infraredmarkers may appear in the nextframe imageto reduce the searchingarea of infrared markers, which remarkablyimproves the identificationspeed of infrared markers. The experimental results show that the algorithm proposed in this paper is effective and feasible.


2017 ◽  
Vol 2017 ◽  
pp. 1-13 ◽  
Author(s):  
Davide Dardari ◽  
Nicoló Decarli ◽  
Anna Guerra ◽  
Ashraf Al-Rimawi ◽  
Víctor Marín Puchades ◽  
...  

In this paper, an ultrawideband localization system to improve the cyclists’ safety is presented. The architectural solutions proposed consist of tags placed on bikes, whose positions have to be estimated, and anchors, acting as reference nodes, located at intersections and/or on vehicles. The peculiarities of the localization system in terms of accuracy and cost enable its adoption with enhanced risk assessment units situated on the infrastructure/vehicle, depending on the architecture chosen, as well as real-time warning to the road users. Experimental results reveal that the localization error, in both static and dynamic conditions, is below 50 cm in most of the cases.


2013 ◽  
Vol 380-384 ◽  
pp. 3778-3781
Author(s):  
Wei Na Huang ◽  
Zheng Xiang Xie

Aiming at the absorption effect of fog suspended in the atmosphere on light, the paper established the removing-fog compensation adaptive model which can improve the atmospheric visibility and restore the normal work of outdoor system. The experimental results show that the removing fog image processed by the method of removing-fog compensation optimization can accord with the requirement of human visual, and it can be used in real-time video monitoring as the fast computing speed. The method not only can be used in foggy video which the fog distributed uniformly, and can assess the visual quality for the images processed.


2016 ◽  
Vol 16 (2) ◽  
pp. 69-84
Author(s):  
Chafik Arar ◽  
Mohamed Salah Khireddine

Abstract The paper proposes a new reliable fault-tolerant scheduling algorithm for real-time embedded systems. The proposed scheduling algorithm takes into consideration only one bus fault in multi-bus heterogeneous architectures, caused by hardware faults and compensated by software redundancy solutions. The proposed algorithm is based on both active and passive backup copies, to minimize the scheduling length of data on buses. In the experiments, this paper evaluates the proposed methods in terms of data scheduling length for a set of DAG benchmarks. The experimental results show the effectiveness of our technique.


1997 ◽  
pp. 345-364
Author(s):  
SungKil Lee ◽  
Huang-Cheng Kuo ◽  
N. Hürkan Balkir ◽  
YooHwan Kim ◽  
Gültekin Özsoyoğlu

1970 ◽  
Vol 1 (2) ◽  
Author(s):  
Cao Pengfei

In order to solve the problems existing in real-time video transmission of mobile terminals, this paper proposes the encapsulation method which is suitable for H.263 and H.264 video coding, and re- duces the extra waste of real-time transmission proto- col packets and to improve the transmission efficien- cy of the video. Experimental results show that the peak signal to noise ratio (PSNR) in H.263 and H.264 video coding mode is above 30 dB at the lowest frame rate and resolution, and the minimum requirement of video transmission has been satisfied. Rate of 24 Hz, the two encoding PSNR are more than 40 dB, videotransmission quality ideal. In addition, the two packet loss rate of about10%maximum, themaximumdelay of 400 ms or less, have reached the requirements of real-time videotransmission.


2019 ◽  
Vol 2 (2) ◽  
pp. 64-80
Author(s):  
Saleh Dwiyatno ◽  
Ayu Purnama Sari ◽  
Agus Irawan ◽  
Safig Safig

Information security is very important in today's technology. Information storage and crossing is currently no longer using paper media, but has used a lot of computer and internet media. PT. Torini Jaya Abadi is one that uses computer and internet media for information storage and crossing. However, there are disturbances such as heavy server access, which cannot be accessed and sometimes it cannot enter into the database server from the indication that the server might be exposed to a virus or DDoS (Distributed Danial of Service) type attacks occur on the server. Based on these problems, the author uses a honeypot to detect an attack based on alerts that have been accommodated in the log and can also provide information about the attacks that occur, from the results obtained honeyd is able to resemble an original system that pretends to have services that are not real , also able to detect attacks in real time and provide information from attackker, honeyd can emulate virtual hosts that are similar to the original computer, by obtaining logs from the honeyd admin system to find out information that occurs on the server, with honeyd network systems can help detect attacks in real time.


Sign in / Sign up

Export Citation Format

Share Document