correct image
Recently Published Documents


TOTAL DOCUMENTS

40
(FIVE YEARS 12)

H-INDEX

7
(FIVE YEARS 1)

2021 ◽  
Vol 12 (2) ◽  
pp. 119-134 ◽  
Author(s):  
Caius Dobrescu ◽  
Roxana Eichel ◽  
Dorottya Molnár-Kovács ◽  
Sándor Kálai ◽  
Anna Keszeg

Our article focuses on a corpus of crime television series reflecting upon differences between western and eastern Europe – a phenomenon that we will address as the ‘West–East slope’. The series figure as instances of the struggle for recognition at the level of the social imaginary, between western and eastern Europe. Addressing the double logic of the western narrative on eastern Europe and the eastern narrative of western Europe, one of our main findings is that the recognition aesthetics of eastern Europe produced a multi-layered representation of the West varying from country to country. On the other hand in western productions, there is still a bias towards a more politically correct image of easternness, a state of affairs that is questioned by eastern European attempts to produce their original contents.


2021 ◽  
Vol 12 ◽  
Author(s):  
Alex M. Silver ◽  
Leanne Elliott ◽  
Emily J. Braham ◽  
Heather J. Bachman ◽  
Elizabeth Votruba-Drzal ◽  
...  

Recent evidence suggests that infants and toddlers may recognize counting as numerically relevant long before they are able to count or understand the cardinal meaning of number words. The Give-N task, which asks children to produce sets of objects in different quantities, is commonly used to test children’s cardinal number knowledge and understanding of exact number words but does not capture children’s preliminary understanding of number words and is difficult to administer remotely. Here, we asked whether toddlers correctly map number words to the referred quantities in a two-alternative forced choice Point-to-X task (e.g., “Which has three?”). Two- to three-year-old toddlers (N = 100) completed a Give-N task and a Point-to-X task through in-person testing or online via videoconferencing software. Across number-word trials in Point-to-X, toddlers pointed to the correct image more often than predicted by chance, indicating that they had some understanding of the prompted number word that allowed them to rule out incorrect responses, despite limited understanding of exact cardinal values. No differences in Point-to-X performance were seen for children tested in-person versus remotely. Children with better understanding of exact number words as indicated on the Give-N task also answered more trials correctly in Point-to-X. Critically, in-depth analyses of Point-to-X performance for children who were identified as 1- or 2-knowers on Give-N showed that 1-knowers do not show a preliminary understanding of numbers above their knower-level, whereas 2-knowers do. As researchers move to administering assessments remotely, the Point-to-X task promises to be an easy-to-administer alternative to Give-N for measuring children’s emerging number knowledge and capturing nuances in children’s number-word knowledge that Give-N may miss.


Author(s):  
A. V. Gaboutchian ◽  
V. A. Knyaz ◽  
H. Y. Simonyan ◽  
G. R. Petrosyan ◽  
D. V. Korost ◽  
...  

Abstract. Findings from Bronze Age burials of Shengavit settlement have become a source of multiple studies referred to anthropological, and especially odontological, research based on 3d imaging and image processing techniques. The currently presented case is an example of palaeopathological analysis of bone tissue resorption caused by complications of dental pathologies. Thus by analogy with diagnostic procedures in clinical dentistry, conventional x-ray based cone-beam tomographic scanning have been applied and have shown its effectiveness as a study method. Through CBCT imaging we managed to reveal a hidden pathological process in the body of the studied semi-mandible fragment, though initially another pathological area located on the same finding was planned to be studied. Application of micro-computed tomography has improved analytical, or diagnostic, part of the current palaepathological study. It has brought to finding unusual morphological features hypothetically causing bone resorption as a complication of dental pathological conditions. However our intention to obtain 3d reconstructions as evidence supporting the most likely version required several attempts to correct image processing in line with the increase of imaging resolution.


Author(s):  
Harsh Arora

Most ecommerce companies have their receive to pay process as predominantly manual, leading to non-reliability of payments & delayed visibility for sellers and requirement of additional manpower for scaling up for buyers. With the correct image and pdf processing tools, it is possible to automate this process for more efficient and cost-effective results. The research paper focuses on automating the task of invoice processing which is predominantly done manually. The idea is to save time, effort, and costs while eliminating human errors from the process. There are several existing image and pdf processing tools of which we will discuss pdftotext, tesseract and tesseract4.


2020 ◽  
Vol 16 (3) ◽  
pp. 119-143
Author(s):  
V. O. Bobrovnikov ◽  
M. I. Kayaev

The paper is an attempt at writing of the new conceptual biography of a renowned Muslim reformist leader in late tsarist and early Soviet Caucasus. After ‘Ali al- Ghumuqi more known under the name of Kayaev (1878–1943) from the Dagestani village of Ghumuq fell the victim of the Stalinist political repressions and then was gradually rehabilitated, historians often presented him a leftist journalist and politician close to the Bolsheviks, sometimes also a bibliophile who collected one of the largest private libraries of Muslim Oriental manuscripts and documents. Seriously revising this not very correct image the authors of this article investigate rather his academic research activities that allow rethinking Kayaev as a Muslim historian revisionist. The focus is made on his Oriental source studies that traced the future development of the famous Dagestani school of academic Oriental studies in the twentieth century, as well as on Kayaev’s original treatment of Muslim historiography he considered through the lenses of Muslim peoples’ development as principal historical actors.


Author(s):  
Y. Dong ◽  
R. Lei ◽  
D. Fan ◽  
L. Gu ◽  
S. Ji

Abstract. High-precision satellite image geolocation is the basis for advanced processing of satellite image data. Aiming at the optimization of the satellite image positioning accuracy based on rational polynomial coefficients (RPC), we propose an RPC image-space bias model that combines object-space information. Based on a comprehensive analysis of the full-link error of the satellite image geometric imaging process, the real object coordinates are introduced into the RPC correction to make the bias model better fit the actual error. Experiments were performed using several image datasets from the Chinese satellite TianHui-1 (TH-1) and compared with the traditional RPC bias model. The results show that our model has strong robustness and can better correct image positioning errors. Compared with traditional bias models, it can improve the accuracy of plane positioning by approximately 1 pixel.


2020 ◽  
Vol 496 (4) ◽  
pp. 4209-4220 ◽  
Author(s):  
R J-L Fétick ◽  
L M Mugnier ◽  
T Fusco ◽  
B Neichel

ABSTRACT One of the major limitations of using adaptive optics (AO) to correct image post-processing is the lack of knowledge about the system’s point spread function (PSF). The PSF is not always available as direct imaging on isolated point-like objects, such as stars. The use of AO telemetry to predict the PSF also suffers from serious limitations and requires complex and yet not fully operational algorithms. A very attractive solution is to estimate the PSF directly from the scientific images themselves, using blind or myopic post-processing approaches. We demonstrate that such approaches suffer from severe limitations when a joint restitution of object and PSF parameters is performed. As an alternative, here we propose a marginalized PSF identification that overcomes this limitation. In this case, the PSF is used for image post-processing. Here we focus on deconvolution, a post-processing technique to restore the object, given the image and the PSF. We show that the PSF estimated by marginalization provides good-quality deconvolution. The full process of marginalized PSF estimation and deconvolution constitutes a successful blind deconvolution technique. It is tested on simulated data to measure its performance. It is also tested on experimental AO images of the asteroid 4-Vesta taken by the Spectro-Polarimetric High-contrast Exoplanet Research (SPHERE)/Zurich Imaging Polarimeter (Zimpol) on the Very Large Telescope to demonstrate application to on-sky data.


2020 ◽  
Author(s):  
Sean Benson ◽  
Regina Beets-Tan

AbstractGenerative adversarial networks (GANs) are known to be a powerful tool in order to correct image aberrations, and even predict entirely synthetic images. We describe and demonstrate a method to use GANs trained from multi-modal magnetic resonance images as a 3-channel input. The training of the generative network was performed using only healthy images together with pseudo-random irregular masks. The dataset consisted of just 20 people. The resulting model was then used to detect anomalies real patient images in which the anomaly was a tumour. The search was performed using no prior knowledge of the tumour location, if indeed a tumour was present. Resulting accuracies are observed to vary significantly on the size of the anomaly. The area under the receiver operator characteristic curve is observed to be greater than 0.75 for anomaly sizes greater than 4 cm2.


2020 ◽  
Vol 1 (1) ◽  
pp. 26-31
Author(s):  
Winia Waziana ◽  
Febriansyah

Abstrak Perkembangan teknologi yang semakin pesat banyak perubahan dalam gaya hidup masyarakat. banyaknya penggunaan komputer, terutama untuk kehidupan sehari-hari. Para pengguna komputer berasal dari kalangan dan umur. Penggunaannya bisa berupa browsing, e-mail, bermain game, dan sebagainya. dengan game yang dikemas secara simple dan menarik bermanfaat sebagai media hiburan yang bersifat pembelajaran bagi anak-anak, serta dapat menjadi media alternatif bagi guru,dan orang tua dalam merangsang kerja otak anak serta menumbuhkan gairah anak untuk “belajar sambil bermain”. Tujuan penelitian ini untuk menghasilkan aplikasi pembelajaran berbasis game. Penulis mengumpulkan data, melakukan pengamatan, melihat, dan menganalisa secara langsung kepada objek. Diawal game ini dijalankan langsung memunculkan game quiz memilih gambar yang benar sesuai dengan soal. Game ini diawali dengan halaman depan,terdapat tombol menu halaman2 sampai dengan halaman5 terdapat soal,dan halaman ke 6 hasil skor. Abstract Technological developments that intensified many changes in lifestyle community. the large number of computer use, especially for everyday life. Computer users come from circles and age. Its use can be browsing, e-mail, play games, and so on. with the games packaged in simple and interesting useful as a medium of entertainment that is learning for young children, and can be an alternative media for teachers, and parents in stimulating the brain works as well as cultivate a passion the children to "learn while playing". The purpose of this research is to produce a game-based learning applications. Authors gather data, conduct observations, view and analyze directly to the object. The beginning of the game run directly bring up games quiz choose the correct image in accordance with the problem. This game starts with the front page, there is a menu button halaman2 until Page2 there is reserved, and the results page of the score. Kata kunci: Pembelajaran, Game Quiz, Untuk Anak-Anak Usia Dini


Visual cryptography is a cryptographic mechanism that gets applied in visual information protection for secured transfer of data. The encryption makes the decryption a mechanical operation.The secret image gets converted into several share images. The share images are distorted/ noisy images which will give the correct image only when placed in the right combination. This paper reviews various visual encryption and decryption mechanism with the safe transmission of information from the literature. This paper about visual cryptography discusses, general access structure, halftone, colour, progressive, region incrementing, extended visual cryptography, colour extended visual cryptography, XOR and OR visual cryptography and the applications of visual cryptography. The applications discussed here are banking security, steganography, crime records, intelligence communication, multilayered Id cards and fingerprint records. The paper provides an overview of advances in VCS where each technique overcomes the problem(s) faced in the other manner.


Sign in / Sign up

Export Citation Format

Share Document