The Crossroads Of Embracing Content Management: Using The Beaglebone Black Microcomputer To Host Omeka., 2015 Northern Kentucky University
The Crossroads Of Embracing Content Management: Using The Beaglebone Black Microcomputer To Host Omeka., Michael D. Wells, Craig Rosenbeck
Annual Conference on Information and Religion
As organizations are concerned about managing their content, it would be advantageous to know alternatives to outsourcing the content management to "the cloud". When decisions need to made because of budget or staffing restrictions, alternative solutions can be a challenge. The purpose of this presentation is to explore an alternative solution to host digital content in house for small libraries. This work seeks to explore using the single board computer called "BeagleBone Black", to host the institutional repository software Omeka. There are advantages to being able to host organizational content in house, and this solution could be an alternative that ...
Pl-X (Roborodentia), 2015 California Polytechnic State University - San Luis Obispo
Pl-X (Roborodentia), Kelly Leung, William Luo, Jeffrey Tang
Pl-x is the name of the robot that will be competing in Roborodentia, an annual autonomous robot competition. This year the competition involves moving rings from one end of a course to the opposite end of the course.
Antics: A Cross-Platform Mobile Game, 2015 California State University - San Bernardino
Antics: A Cross-Platform Mobile Game, Gerren D. Willis
Electronic Theses, Projects, and Dissertations
Recent technologies have made it increasingly easier for independent developers to build and deploy gaming applications for mobile devices. The focus of this master's project is to investigate one such set of technologies, which include Adobe AIR, Starling and Feathers, that allow games to be written in ActionScript and run on both Android and iOS devices. For this purpose, I chose to use these technologies to design and implement the game ANTics proposed by Whim Independent Studios, a start up game studio in San Bernardino. ANTics is written in ActionScript and runs on Adobe AIR. It can be deployed ...
Presentation On Evaluating The Creation And Preservation Challenges Of Photogrammetry-Based 3d Models, 2015 University of Connecticut - Storrs
Presentation On Evaluating The Creation And Preservation Challenges Of Photogrammetry-Based 3d Models, Michael J. Bennett
UConn Libraries Presentations
No abstract provided.
Evaluating The Creation And Preservation Challenges Of Photogrammetry-Based 3d Models, 2015 University of Connecticut - Storrs
Evaluating The Creation And Preservation Challenges Of Photogrammetry-Based 3d Models, Michael J. Bennett
UConn Libraries Published Works
Though the roots of photogrammetry can be traced back to photography’s earliest days, only recent advances in both digital technology and software applications have put the possibilities of 3D modeling from 2D source images in the hands of the greater cultural heritage community. The possibilities of such 3D digital rendering are many. With these possibilities come unique digital preservation challenges. This study explores basic close-range photogrammetry as applied to sample archival objects. Additionally, the latest BagIt and ZIP-based bundling formats along with repository-based solutions are also surveyed as potential 3D data management and archiving aggregators for resulting 3D models.
Design And Development Of Personal Geoservices For Universities, 2015 Dublin Institute of Technology
Design And Development Of Personal Geoservices For Universities, James Carswell, Andrea Ballatore, Thoa Pham, Junjun Yin, Linh Truonghong
Personal GeoServices are emerging as an interaction paradigm linking users to information rich environments like a university campus or to Big Data sources like the Internet of Things by delivering spatially intelligent web-services. OpenStreetMap (OSM) constitutes a valuable source of spatial base-data that can be extracted, integrated, and utilised with such heterogeneous data sources for free. In this paper, we present a Personal GeoServices application built on OSM spatial data and university-specific business data for staff, faculty, and students. While generic products such as Google Maps and Google Earth enable basic forms of spatial exploration, the domain of a university ...
Image Segmentation Using Fuzzy-Spatial Taxon Cut, 2015 U.C. Berkeley
Image Segmentation Using Fuzzy-Spatial Taxon Cut, Lauren Barghout
Images convey multiple meanings that depend on the context in which the viewer perceptually organizes the scene. This presents a problem for automated image segmentation, because it adds uncertainty to the process of selecting which objects to include or not include within a segment. I’ll discuss the implementation of a fuzzy-logic-natural-vision-processing engine that solves this problem by assuming the scene architecture prior to processing. The scene architecture, a standardized natural-scene-perception-taxonomy comprised of a hierarchy of nested spatial-taxons. Spatial-taxons are regions (pixel-sets) that are figure-like, in that they are perceived as having a contour, are either `thing-like', or a `group ...
Co-Design Of Anytime Computation And Robust Control (Supplimental), 2015 University of Pennsylvania
Co-Design Of Anytime Computation And Robust Control (Supplimental), Yash Vardhan Pant, Kartik Mohta, Houssam Abbas, Truong X Nghiem, Joesph Deveitti, Rahul Mangharam
Real-Time and Embedded Systems Lab (mLAB)
No abstract provided.
Two Correspondence Problems Easier Than One, 2015 Purdue University
Two Correspondence Problems Easier Than One, Aaron Michaux, Zygmunt Pizlo
Computer vision research rarely makes use of symmetry in stereo reconstruction despite its established importance in perceptual psychology. Such stereo reconstructions produce visually satisfying figures with precisely located points and lines, even when input images have low or moderate resolution. However, because few invariants exist, there are no known general approaches to solving symmetry correspondence on real images. The problem is significantly easier when combined with the binocular correspondence problem, because each correspondence problem provides strong non-overlapping constraints on the solution space. We demonstrate a system that leverages these constraints to produce accurate stereo models from pairs of binocular images ...
Secure And Reliabe Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, 2015 University of Southern Mississippi
Secure And Reliabe Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad
Sensor nodes collect data from the physical world then exchange it until it reaches the intended destination. This information can be sensitive, such as battlefield surveillance. Therefore, providing secure and continuous data transmissions among sensor nodes in wireless network environments is crucial. Wireless sensor networks (WSN) have limited resources, limited computation capabilities, and the exchange of data through the air and deployment in accessible areas makes the energy, security, and routing major concerns in WSN. In this research we are looking at security issues for the above reasons. WSN is susceptible to malicious activities such as hacking and physical ...
Abstraction-Tree For Closed-Loop Model Checking Of Medical Devices, 2015 University of Pennsylvania
Abstraction-Tree For Closed-Loop Model Checking Of Medical Devices, Zhihao Jiang, Houssam Abbas, Pieter J. Mosterman, Rahul Mangharam
Real-Time and Embedded Systems Lab (mLAB)
No abstract provided.
Privacy-Preserving Accountable Cloud Storage, 2015 Iowa State University
Privacy-Preserving Accountable Cloud Storage, Ka Yang, Jinsheng Zhang, Wensheng Zhang, Daji Qiao
Computer Science Technical Reports
In cloud storage services, a wide range of sensitive information may be leaked to the host server via the exposure of access pattern albeit data is encrypted. Many security-provable schemes have been proposed to preserve the access pattern privacy; however, they may be vulnerable to attacks towards data integrity or availability from malicious users. This is due to the fact that, preserving access pattern privacy requires data to be frequently re-encrypted and re-positioned at the storage server, which can easily conceal the traces that are needed for account- ability support to detect misbehaviors and identify attackers. To address this issue ...
Video Event Recognition And Prediction Based On Temporal Structure Analysis, 2015 Northeastern University
Video Event Recognition And Prediction Based On Temporal Structure Analysis, Kang Li
Computer Engineering Dissertations
The increasing ubiquitousness of multimedia information in today's world has positioned video as a favored information vehicle, and given rise to an astonishing generation of social media and surveillance footage. Consumer-grade video is becoming abundant on the Internet, and it is now easier than ever to download multimedia material of any kind and quality. This raises a series of technological demands for automatic video understanding, which has motivated the research community to guide its steps towards a better attainment of such capabilities. As a result, current trends on cognitive vision promise to recognize complex events and self-adapt to different ...
Guaranteeing Data Storage Security In Cloud Computing, 2015 Innovative Research Publications
Guaranteeing Data Storage Security In Cloud Computing, Innovative Research Publications Irp India, Viswanath Aiyer, Rohit Bhutkar, Sagar Anvekar, Dinesh Chavan
Innovative Research Publications IRP India
Cloud Computing has been imagined as the next generation structural engineering of IT Enterprise. .By using the homomorphic token with dispersed verification of eradication coded information, our plan attains to the combination of capacity rightness protection and information blunder limitation, i.e., the identification of getting rowdy server(s)
Cpas - Campus Parking Availability System, 2015 University of Tennessee - Knoxville
Cpas - Campus Parking Availability System, Jacob Lambert
University of Tennessee Honors Thesis Projects
No abstract provided.
Pitch Detection Of Speech Signal Using Wavelet Transform, 2015 Innovative Research Publications
Pitch Detection Of Speech Signal Using Wavelet Transform, Innovative Research Publications Irp India, Amin Shadravan Lalezari, Jalil Shirazi
Innovative Research Publications IRP India
Pitch frequency is the fundamental frequency of a speech signal. It is one of the most important parameters for speech signal processing. The simulated results on Keele pitch reference database show that the performance of the proposed wavelet transform based pitch detection algorithm is obviously better than the original AMDF and its improvements based algorithms
Vcare: A Personal Emergency Response System To Promote Safe And Independent Living Among Elders Staying By Themselves In Community Or Residential Settings, Priyankar Bhattacharjee
Dissertations & Student Research in Computer Electronics & Engineering
‘Population aging’ is a growing concern for most of us living in the twenty first century, primarily because many of us in the next few years will have a senior person to care for - spending money towards their healthcare expenditures AND/OR having to balance a full-time job with the responsibility of care-giving, travelling from another city to be with this elderly citizen who might be our parent, grand-parent or even community elders. As informal care-givers, if somehow we were able to monitor the day-to-day activities of our elderly dependents, and be alerted when wrong happens to them that would ...
Developing An Application For Evolutionary Search For Computational Models Of Cellular Development, 2015 Boise State University
Developing An Application For Evolutionary Search For Computational Models Of Cellular Development, Nicolas Scott Cornia
Boise State University Theses and Dissertations
VPEvolve is a free and open source application that utilizes a Visual Programming Environment (VPE) for the setup of the Genetic Algorithm (GA), for optimization of computational models. Specifically, the User Interface uses connected glyphs to represent the genetic operators of mutation, reproduction, fitness and selection. These glyphs give the user an intuitive way to set the parameters for the GA, and better visualization of the population's flow through these operators.
VPEvolve is currently being developed alongside research being done in Biocomputing to create models of cellular regeneration based on the regenerative properties of Planaria or flatworms. Since these ...
Robust And Real-Time Stereo Matching On Parallel Graphics Hardware Using Gradient-Based Disparity Refinement, 2015 University of Nebraska-Lincoln
Robust And Real-Time Stereo Matching On Parallel Graphics Hardware Using Gradient-Based Disparity Refinement, Jedrzej Kowalczuk
Electrical Engineering Theses and Dissertations
Computer vision attempts to provide camera-equipped machines with visual perception, i.e., the capability to comprehend their surroundings through the analysis and understanding of images. The ability to perceive depth is a vital component of visual perception that enables machines to interpret the three-dimensional structure of their surroundings and allows them to navigate through the environment. In computer vision, depth perception is achieved via stereo matching, a process that identifies correspondences between pixels in images acquired using a pair of horizontally offset cameras. It is possible to calculate depths from correspondences or, more specifically, the positional offsets (disparities) between pixels ...
Privacy In Cooperative Distributed Systems: Modeling And Protection Framework, 2015 The University of Western Ontario
Privacy In Cooperative Distributed Systems: Modeling And Protection Framework, Afshan Samani
University of Western Ontario - Electronic Thesis and Dissertation Repository
A new form of computation is emerging rapidly with cloud computing, mobile computing, wearable computing and the Internet-of-Things. All can be characterized as a class of “Cooperative Distributed Systems” (CDS) in open environment. A major driver of the growth is the exponential adoption by people and organizations within all aspects of their day-to-day matters. In this context, users’ requirements for privacy protection are becoming essential and complex beyond the traditional approaches. This requires a formal treatment of “privacy” as a fundamental computation concept in CDS paradigm.
The objective is to develop a comprehensive formal model for “privacy” as base to ...