Signing Avatars

Author(s):  
Nicoletta Adamo-Villani ◽  
Kyle Hayward

The chapter focuses on signing avatars and their potential to improve deaf education. In sections 1 and 2, the authors give an overview of what signing avatars are and the benefits of using animated characters for deaf education. In section 3, they explain how signing avatars are created. In particular, in subsection 3.1, they describe different types of 3D models and skeletal deformation systems, and in subsection 3.2 the authors discuss a variety of methods used to animate manual and non-manual signs. In section 4 they report the state of the art in signing avatars’ research and development and we discuss existing limitations and future trends. Section 5 includes a case study on the production of the signing avatars for SMILE™ and Mathsigner™ Conclusive remarks are presented in section 6.

Author(s):  
Kabil Jaballah ◽  
Mohamed Jemni

Signing avatars are becoming common thanks to their potential to improve deaf education. These 3D animated characters are able to perform manual and non-manual signs. As they tap the natural skills of deaf individuals and thanks to the advances in 3D humanoids modeling and animation technologies, 3D signing avatars are getting increasing interest. They are actually used for multiple purposes in multiple fields. Deaf parents, teacher, telecommunications’ companies and many other agencies are involving in this area for different reasons. In this paper, the authors report the state of the art in signing avatars research and development as well as the purposes for which 3D signing characters are being used. They discussed the methods and the technologies adopted to create 3D signed contents. A case study of five 3D Sign Language generation systems will be highlighted. The authors will consider their architectures, linguistic representations, the modeling and the animation techniques that have been undertaken. They conducted a study to compare the performance of the available systems regarding the understandability of the generated signed contents. By the end of the survey, the authors bring the lessons learned from this study.


2012 ◽  
Vol 591-593 ◽  
pp. 2118-2122
Author(s):  
Hou Yao Zhu ◽  
Chun Liang Zhang ◽  
Bao Jian Yang

This paper introduces the need for the development of fault diagnosis technology. Then the fault diagnosis procedures and principles were analyzed. The common faults of rotating machinery were classified and elaborated in detail, and presented different types of fault vibration signal amplitude-frequency diagram. Then the paper mainly described the fault diagnosis of rotating machinery commonly used method, an overview of domestic and foreign research and development, future trends and prospects of the fault diagnosis technology.


2002 ◽  
Vol 2 (2/3) ◽  
Author(s):  
Christoph Muller ◽  
Daniel Boos

Railway stations have become places between 'public' and 'private'. In this exploratory case study, we are looking at the CCTV system at the Zurich main station, the largest railway station in Switzerland. This railway station is used by train passengers, by customers frequenting the station's shopping area, and by persons trespassing in the station. Looking at different types of CCTV systems, we examine the motivations that have been leading to the installation of the cameras, about their functionality and their effects on passengers and customers. Based on our observations, we are going to present a typology of different uses of CCTV systems: (1) access control, (2) conduct control, (3) registering evidence, (4) flow control and the planning of deployment. As a conclusion, we will have a look at some future trends in the use of CCTV in railway stations, focussing on (a) individualization, (b) automation, and (c) commodification. In the last part of our presentation, we are going to ask about the limits of the spreading of CCTV systems in railway stations, focussing on the efficiency on one hand and on several possibilities for opposition on the other hand.


2019 ◽  
Vol 2019 ◽  
pp. 1-20 ◽  
Author(s):  
Mohamed Amine Ferrag ◽  
Leandros Maglaras ◽  
Abdelouahid Derhab

Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the purpose of this investigation is to summarise the factors that hinder biometrics models’ development and deployment on a large scale, including human physiological (e.g., face, eyes, fingerprints-palm, or electrocardiogram) and behavioral features (e.g., signature, voice, gait, or keystroke). The different machine learning and data mining methods used by authentication and authorization schemes for mobile IoT devices are provided. Threat models and countermeasures used by biometrics-based authentication schemes for mobile IoT devices are also presented. More specifically, we analyze the state of the art of the existing biometric-based authentication schemes for IoT devices. Based on the current taxonomy, we conclude our paper with different types of challenges for future research efforts in biometrics-based authentication schemes for IoT devices.


1969 ◽  
Vol 15 (4) ◽  
Author(s):  
Klaus J Nickisch ◽  
Joachim M Greuel ◽  
Kerstin M Bode-Greuel

Biotechnology investors are increasingly concerned about taking the risk of investing in the development of innovative drugs, and pharmaceutical companies are worried about maintaining their high profitability in the future. The question is how to build a portfolio of research and development (R&D) projects that fulfils the financial expectations of investors and shareholders. State-of-the-art net present value algorithms are applied to different types of projects at entry into development in order to evaluate their financial attractiveness and their ability to generate adequate returns. Based on the currently applied cost of capital for pharmaceutical and biotechnology companies the attractiveness of the so-called blockbuster model is clearly supported. The increasingly favoured specialty model, however, will only provide sufficient returns to biotechnology investors if significant sales volumes are reached. Complementing a company's development portfolio with risk-reduced projects could be an attractive way to ensure sustained growth for both biotechnology and pharmaceutical companies.


2017 ◽  
Vol 1 (1) ◽  
pp. 1-16
Author(s):  
John Harner ◽  
Lee Cerveny ◽  
Rebecca Gronewold

Natural resource managers need up-to-date information about how people interact with public lands and the meanings these places hold for use in planning and decision-making. This case study explains the use of public participatory Geographic Information System (GIS) to generate and analyze spatial patterns of the uses and values people hold for the Browns Canyon National Monument in Colorado. Participants drew on maps and answered questions at both live community meetings and online sessions to develop a series of maps showing detailed responses to different types of resource uses and landscape values. Results can be disaggregated by interaction types, different meaningful values, respondent characteristics, seasonality, or frequency of visit. The study was a test for the Bureau of Land Management and US Forest Service, who jointly manage the monument as they prepare their land management plan. If the information generated is as helpful throughout the entire planning process as initial responses seem, this protocol could become a component of the Bureau’s planning tool kit.


Sign in / Sign up

Export Citation Format

Share Document