Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 36

Full-Text Articles in Entire DC Network

Mobile Visibility Querying For Lbs, James Carswell, Keith Gardiner, Junjun Jin Dec 2010

Mobile Visibility Querying For Lbs, James Carswell, Keith Gardiner, Junjun Jin

Articles

This article describes research carried out in the area of mobile spatial interaction (MSI) and the development of a 3D mobile version of a 2D web-based directional query processor. The TellMe application integrates location (from GPS, GSM, WiFi) and orientation (from magnetometer/accelerometer) sensor technologies into an enhanced spatial query processing module capable of exploiting a mobile device’s position and orientation for querying real-world spatial datasets. This article outlines our technique for combining these technologies and the architecture needed to deploy them on a sensor enabled smartphone (i.e. Nokia Navigator 6210). With all these sensor technologies now available on off-the-shelf devices, …


Visual Salience And Reference Resolution In Situated Dialogues: A Corpus-Based Evaluation., Niels Schütte, John D. Kelleher, Brian Mac Namee Nov 2010

Visual Salience And Reference Resolution In Situated Dialogues: A Corpus-Based Evaluation., Niels Schütte, John D. Kelleher, Brian Mac Namee

Conference papers

Dialogues between humans and robots are necessarily situated and so, often, a shared visual context is present. Exophoric references are very frequent in situated dialogues, and are particularly important in the presence of a shared visual context - for example when a human is verbally guiding a tele-operated mobile robot. We present an approach to automatically resolving exophoric referring expressions in a situated dialogue based on the visual salience of possible referents. We evaluate the effectiveness of this approach and a range of different salience metrics using data from the SCARE corpus which we have augmented with visual information. The …


Situating Spatial Templates For Human-Robot Interaction, John D. Kelleher, Robert J. Ross, Brian Mac Namee, Colm Sloan Nov 2010

Situating Spatial Templates For Human-Robot Interaction, John D. Kelleher, Robert J. Ross, Brian Mac Namee, Colm Sloan

Conference papers

People often refer to objects by describing the object's spatial location relative to another object. Due to their ubiquity in situated discourse, the ability to use 'locative expressions' is fundamental to human-robot dialogue systems. A key component of this ability are computational models of spatial term semantics. These models bridge the grounding gap between spatial language and sensor data. Within the Artificial Intelligence and Robotics communities, spatial template based accounts, such as the Attention Vector Sum model (Regier and Carlson, 2001), have found considerable application in mediating situated human-machine communication (Gorniak, 2004; Brenner et a., 2007; Kelleher and Costello, 2009). …


Suitability Review Of Common Synchronous, Live Online-Classroom Tools, Arnold Hensman Oct 2010

Suitability Review Of Common Synchronous, Live Online-Classroom Tools, Arnold Hensman

Conference Papers

While virtual learning environments (VLEs) such as Moodle and WebCT are now ubiquitous in most higher education institutes, live synchronous virtual classroom software is merely gaining in popularity. The first online meeting tools were tailored towards business requirements for remotely held meetings rather than educational purposes. The recent expansion of virtual classroom tools specific to education has changed this. Such software offers the standard features of streamed voice and video, yet purposely provides an array of additional features specifically designed to conduct classes online. While VLEs work optimally as a compliment to standard courses, Virtual-classrooms such as Adobe Connect Pro …


A Framework For The Comparison Of Virtual Classroom Systems, Daniel Mcsweeney Oct 2010

A Framework For The Comparison Of Virtual Classroom Systems, Daniel Mcsweeney

Conference Papers

The increase in demand for open and distance learning has resulted in many higher education providers investing in virtual classroom systems. These systems can be an essential component in the delivery of flexible and online courses. While many institutions correctly place a greater emphasis on the pedagogical development of flexible courses, poor selection or implementation of virtual classroom software can reduce the pedagogical effectiveness of such courses and in some cases render them unworkable for both lecturing staff and students.

Changes in vendor offerings, the continual evolution of end user technology, developments in mobile devices and improvements in internet infrastructure …


Investigating Ultrasonic Positioning On Mobile Phones, Viacheslav Filonenko, Charlie Cullen, James Carswell Sep 2010

Investigating Ultrasonic Positioning On Mobile Phones, Viacheslav Filonenko, Charlie Cullen, James Carswell

Conference papers

In this paper we evaluate the innate ability of mobile phone speakers to produce ultrasound and the possible uses of this ability for accurate indoor positioning. The frequencies in question are a range between 20 and 22 KHz, which is high enough to be inaudible but low enough to be generated by standard sound hardware. A range of tones is generated at different volume settings on several popular modern mobile phones with the aim of finding points of failure. Our results indicate that it is possible to generate the given range of frequencies without significant distortions, provided the signal volume …


Cloud Computing:Strategies For Cloud Computing Adoption, Faith Shimba Sep 2010

Cloud Computing:Strategies For Cloud Computing Adoption, Faith Shimba

Dissertations

The advent of cloud computing in recent years has sparked an interest from different organisations, institutions and users to take advantage of web applications. This is a result of the new economic model for the Information Technology (IT) department that cloud computing promises. The model promises a shift from an organisation required to invest heavily for limited IT resources that are internally managed, to a model where the organisation can buy or rent resources that are managed by a cloud provider, and pay per use. Cloud computing also promises scalability of resources and on-demand availability of resources.

Although, the adoption …


3dq: Threat Dome Visibility Querying On Mobile Devices, James Carswell, Keith Gardiner, Junjun Yin Aug 2010

3dq: Threat Dome Visibility Querying On Mobile Devices, James Carswell, Keith Gardiner, Junjun Yin

Articles

3DQ (Three Dimensional Query) is our mobile spatial interaction (MSI) prototype for location and orientation aware mobile devices (i.e. today's sensor enabled smartphones). The prototype tailors a military style threat dome query calculation using MSI with hidden query removal functionality for reducing “information overload” on these off-the-shelf devices. The effect gives a more accurate and expected query result for Location-Based Services (LBS) applications by returning information on only those objects visible within a user’s 3D field-of-view. Our standardised XML based request/response design enables any mobile device, regardless of operating system and/or programming language, to access the 3DQ web-service interfaces.


Topology In Composite Spatial Terms, John D. Kelleher, Robert J. Ross Aug 2010

Topology In Composite Spatial Terms, John D. Kelleher, Robert J. Ross

Conference papers

People often refer to objects by describing the object's spatial location relative to another object, e.g. the book on the right of the table. This type of referring expression is called a spatial locative expression. Spatial locatives have three major components: (1) the target object that is being located (the book), (2) the landmark object relative to which the target is being located (the table), and (3) the description of the spatial relationship that exists between the target and the landmark (on the right of ). In English spatial relationships are often described using spatial prepositions. The set of English …


Proceedings Of The Sixth International Natural Language Generation Conference (Inlg 2010)., John D. Kelleher, Brian Mac Namee, Ielka Van Der Sluis Jul 2010

Proceedings Of The Sixth International Natural Language Generation Conference (Inlg 2010)., John D. Kelleher, Brian Mac Namee, Ielka Van Der Sluis

Conference papers

No abstract provided.


Information Hiding Using Stochastic Diffusion For The Covert Transmission Of Encrypted Images, Jonathan Blackledge Jun 2010

Information Hiding Using Stochastic Diffusion For The Covert Transmission Of Encrypted Images, Jonathan Blackledge

Conference papers

A principal weakness of all encryption systems is that the output data can be `seen' to be encrypted. In other words, encrypted data provides a 'flag' on the potential value of the information that has been encrypted. In this paper, we provide a novel approach to `hiding' encrypted data in a digital image. We consider an approach in which a plaintext image is encrypted with a cipher using the processes of `stochastic diffusion' and the output quantized into a 1-bit array generating a binary image cipher-text. This output is then `embedded' in a host image which is undertaken either in …


Handling Concept Drift In Text Data Stream Constrained By High Labelling Cost, Patrick Lindstrom, Sarah Jane Delany, Brian Mac Namee May 2010

Handling Concept Drift In Text Data Stream Constrained By High Labelling Cost, Patrick Lindstrom, Sarah Jane Delany, Brian Mac Namee

Conference papers

In many real-world classification problems the concept being modelled is not static but rather changes over time - a situation known as concept drift. Most techniques for handling concept drift rely on the true classifications of test instances being available shortly after classification so that classifiers can be retrained to handle the drift. However, in applications where labelling instances with their true class has a high cost this is not reasonable. In this paper we present an approach for keeping a classifier up-to-date in a concept drift domain which is constrained by a high cost of labelling. We use …


Measuring Variations Of Mimicry By Means Of Prosodic Cues In Task-Based Scenarios And Conversational Speech, Brian Vaughan, Celine De Looze Mar 2010

Measuring Variations Of Mimicry By Means Of Prosodic Cues In Task-Based Scenarios And Conversational Speech, Brian Vaughan, Celine De Looze

Other resources

Here, we address the measurement of mimicry, that is when speakers’ speech variations look like parallel patterns.

As a definition of mimicry, we often read in the literature description such as mimicry is “The situation where the observed behaviours of two inter-actants although dissimilar at the start of the interaction are moving towards behavioral matching”. These types of descriptions imply that mimicry is a linear phenomenon and that speakers tend to imitate over time. However, it can be assumed, especially when studying spontaneous speech, that there are rather phases of mimicry and non-mimicry and that mimicry should be rather …


Clustering Weblogs On The Basis Of A Topic Detection Method, Fernando Perez-Tellez, David Pinto, John Cardiff, Paolo Rosso Jan 2010

Clustering Weblogs On The Basis Of A Topic Detection Method, Fernando Perez-Tellez, David Pinto, John Cardiff, Paolo Rosso

Conference Papers

In recent years we have seen a vast increase in the volume of information published on weblog sites and also the creation of new web technologies where people discuss actual events. The need for automatic tools to organize this massive amount of information is clear, but the particular characteristics of weblogs such as shortness and overlapping vocabulary make this task difficult. In this work, we present a novel methodology to cluster weblog posts according to the topics discussed therein. This methodology is based on a generative probabilistic model in conjunction with a Self-Term Expansion methodology. We present our results which …


A Computational Analysis Of Cognitive Effort, Luca Longo, Stephen Barrett Jan 2010

A Computational Analysis Of Cognitive Effort, Luca Longo, Stephen Barrett

Books/Book Chapters

Cognitive effort is a concept of unquestionable utility in understanding human behaviour. However, cognitive effort has been defined in several ways in literature and in everyday life, suffering from a partial understanding. It is common to say “Pay more attention in studying that subject” or “How much effort did you spend in resolving that task?”, but what does it really mean? This contribution tries to clarify the concept of cognitive effort, by introducing its main influencing factors and by presenting a formalism which provides us with a tool for precise discussion. The formalism is implementable as a computational concept and …


Seeing Is Believing: Body Motion Dominates In Multisensory Conversations, Cathy Ennis, Rachel Mcdonnell, Carol O'Sullivan Jan 2010

Seeing Is Believing: Body Motion Dominates In Multisensory Conversations, Cathy Ennis, Rachel Mcdonnell, Carol O'Sullivan

Articles

In many scenes with human characters, interacting groups are an important factor for maintaining a sense of realism. However, little is known about what makes these characters appear realistic. In this paper, we investigate human sensitivity to audio mismatches (i.e., when individuals’ voices are not matched to their gestures) and visual desynchronization (i.e., when the body motions of the individuals in a group are mis-aligned in time) in virtual human conversers. Using motion capture data from a range of both polite conversations and arguments, we conduct a series of perceptual experiments and determine some factors that contribute to the plausibility …


Authentication Of Biometric Features Using Texture Coding For Id Cards, Jonathan Blackledge, Eugene Coyle Jan 2010

Authentication Of Biometric Features Using Texture Coding For Id Cards, Jonathan Blackledge, Eugene Coyle

Conference papers

The use of image based information exchange has grown rapidly over the years in terms of both e-to-e image storage and transmission and in terms of maintaining paper documents in electronic form. Further, with the dramatic improvements in the quality of COTS (Commercial-Off-The-Shelf) printing and scanning devices, the ability to counterfeit electronic and printed documents has become a widespread problem. Consequently, there has been an increasing demand to develop digital watermarking techniques which can be applied to both electronic and printed images (and documents) that can be authenticated, prevent unauthorized copying of their content and, in the case of printed …


Encryption Using Deterministic Chaos, Jonathan Blackledge, Nikolai Ptitsyn Jan 2010

Encryption Using Deterministic Chaos, Jonathan Blackledge, Nikolai Ptitsyn

Articles

The concepts of randomness, unpredictability, complexity and entropy form the basis of modern cryptography and a cryptosystem can be interpreted as the design of a key-dependent bijective transformation that is unpredictable to an observer for a given computational resource. For any cryptosystem, including a Pseudo-Random Number Generator (PRNG), encryption algorithm or a key exchange scheme, for example, a cryptanalyst has access to the time series of a dynamic system and knows the PRNG function (the algorithm that is assumed to be based on some iterative process) which is taken to be in the public domain by virtue of the Kerchhoff-Shannon …


On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn Jan 2010

On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn

Conference papers

Cloud computing is expected to grow considerably in the future because it has so many advantages with regard to sale and cost, change management, next generation architectures, choice and agility. However, one of the principal concerns for users of the Cloud is lack of control and above all, data security. This paper considers an approach to encrypting information before it is ‘place’ on the Cloud where each user has access to their own encryption algorithm, an algorithm that is based on a set of Iterative Function Systems that outputs a chaotic number stream, designed to produce a cryptographically secure cipher. …


An Optical Machine Vision System For Applications In Cytopathology, Jonathan Blackledge, Dmitry Dubovitskiy Jan 2010

An Optical Machine Vision System For Applications In Cytopathology, Jonathan Blackledge, Dmitry Dubovitskiy

Articles

This paper discusses a new approach to the processes of object detection, recognition and classification in a digital image focusing on problem in Cytopathology. A unique self learning procedure is presented in order to incorporate expert knowledge. The classification method is based on the application of a set of features which includes fractal parameters such as the Lacunarity and Fourier dimension. Thus, the approach includes the characterisation of an object in terms of its fractal properties and texture characteristics. The principal issues associated with object recognition are presented which include the basic model and segmentation algorithms. The self-learning procedure for …


The Extent Of Clientelism In Irish Politics: Evidence From Classifying Dáil Questions On A Local-National Dimension, Sarah Jane Delany, Richard Sinnott, Niall O'Reilly Jan 2010

The Extent Of Clientelism In Irish Politics: Evidence From Classifying Dáil Questions On A Local-National Dimension, Sarah Jane Delany, Richard Sinnott, Niall O'Reilly

Conference papers

The availability of the full text of Irish parliamentary questions offers opportunities for using machine learning techniques to examine the currently much discussed role of elected representatives (TDs) in the Irish parliamentary system. Bluntly, are TDs mainly national legislators or “constituency messenger boys”? This paper presents an initial investigation into the use of automated text classification techniques to categorise parliamentary questions from 1922 up to 2008 as national or local. The approach uses a bag of words representation, standard feature reduction methods and an SVM classifier. Initial results show there is very little evidence in the corpus of parliamentary questions …


A Study Of Accomodation Of Prosodic And Temporal Features In Spoken Dialogues In View Of Speech Technology Applications, Spyridon Kousidis Jan 2010

A Study Of Accomodation Of Prosodic And Temporal Features In Spoken Dialogues In View Of Speech Technology Applications, Spyridon Kousidis

Doctoral

Inter-speaker accommodation is a well-known property of human speech and human interaction in general. Broadly it refers to the behavioural patterns of two (or more) interactants and the effect of the (verbal and non-verbal) behaviour of each to that of the other(s). Implementation of this
behavior in spoken dialogue systems is desirable as an improvement on the naturalness of humanmachine interaction. However, traditional qualitative descriptions of accommodation phenomena do not provide sufficient information for such an implementation. Therefore, a quantitative
description of inter-speaker accommodation is required. This thesis proposes a methodology of monitoring accommodation during a human or humancomputer dialogue, …


Computational Micromodel For Epigenetic Mechanisms, Karthika Raghavan, Heather J. Ruskin, Dimitri Perrin, Francois Goasmat, John Burns Jan 2010

Computational Micromodel For Epigenetic Mechanisms, Karthika Raghavan, Heather J. Ruskin, Dimitri Perrin, Francois Goasmat, John Burns

Articles

Characterization of the epigenetic profile of humans since the initial breakthrough on the human genome project has strongly established the key role of histone modifications and DNA methylation. These dynamic elements interact to determine the normal level of expression or methylation status of the constituent genes in the genome. Recently, considerable evidence has been put forward to demonstrate that environmental stress implicitly alters epigenetic patterns causing imbalance that can lead to cancer initiation. This chain of consequences has motivated attempts to computationally model the influence of histone modification and DNA methylation in gene expression and investigate their intrinsic interdependency. In …


Mobile Mapping System Lidar Data Framework, P. Lewis, C. Mcelhinney, Bianca Schoen-Phelan, T. Mccarthy Jan 2010

Mobile Mapping System Lidar Data Framework, P. Lewis, C. Mcelhinney, Bianca Schoen-Phelan, T. Mccarthy

Articles

Mobile Mapping Systems (MMSs) for infrastructural monitoring and mapping arebecoming more prevalent as the availability and affordability of solutions that generate high accuracy geospatial data has matured.However, no existent methodology or systemexists where all theLiDAR, video, navigation,infrared and multispectraldata sources,collected from thismobile platform are integrated into a single, comprehensivedata management solution. Based on empirical experience there is a need for an MMS-data management framework where these types of data can be dynamically accessed and integratedto enable different projects with varying objectives todynamically accessdifferent MMS-data for, in one example, use in feature extraction algorithms. In this paper we introduce the LiDAR …


Enhancing 3d Lidar Data Handling, Debra Laefer, Michela Bertolotto, Bianca Schoen-Phelan Jan 2010

Enhancing 3d Lidar Data Handling, Debra Laefer, Michela Bertolotto, Bianca Schoen-Phelan

Articles

more evident than in the limited capabilities of Spatial Information Systems (SIS) to manipulate data from aerial Light Detection and Ranging (LiDAR). Currently, multiple software packages are needed to conduct three-dimensional (3D) analysis of LiDAR data. This workflow heavily relies on importing and exporting different file formats, thus potentially losing accuracy and increasing costs. Ideally, all required functionality would be available within a single system. New functionalities in Oracle Spatial combined with our enhanced 3D-indexing for hosting and analysing offer a critical breakthrough in this area.


Motion In Augmented Reality Games: An Engine For Creating Plausible Physical Interactions In Augmented Reality Games, Brian Mac Namee, David Beaney, Qingqing Dong Jan 2010

Motion In Augmented Reality Games: An Engine For Creating Plausible Physical Interactions In Augmented Reality Games, Brian Mac Namee, David Beaney, Qingqing Dong

Articles

The next generation of Augmented Reality (AR) games will require real and virtual objects to coexist in motion in immersive game environments. This will require the illusion that real and virtual objects interact physically together in a plausible way. The Motion in Augmented Reality Games (MARG) engine described in this paper has been developed to allow these kinds of game environments. The paper describes the design and implementation of the MARG engine and presents two proof-of-concept AR games that have been developed using it. Evaluations of these games have been performed and are presented to show that the MARG engine …


Assessing The Application Of 3d Collaborative Interfaces Within An Immersive Virtual University, Gavin Mcardle, Bianca Schoen-Phelan, Michela Bortolotto Jan 2010

Assessing The Application Of 3d Collaborative Interfaces Within An Immersive Virtual University, Gavin Mcardle, Bianca Schoen-Phelan, Michela Bortolotto

Articles

The need to stimulate and engage students is of paramount importance within any learning scenario. Despite this, recent developments in online learning have failed to take this requirement into account. As a result e-learning courses which utilise traditional online learning management systems have a higher dropout rate than their classroom based counterparts. The attrition rate is attributed to boredom with the interfaces used to deliver learning material and also to the lack of opportunities to interact socially with others. Furthermore, being in a virtual environment imposes a whole new set of challenges onto users due to the distinct lack of …


Tunepal: The Traditional Musician's Toolbox, Bryan Duggan Jan 2010

Tunepal: The Traditional Musician's Toolbox, Bryan Duggan

Conference papers

In this paper we present Tunepal, a search engine and music retrieval tool for traditional musicians that runs on an iPhone/iPod Touch (2nd generation)/iPad. Tunepal connects musicians the scores and metadata of 13,290 traditional Irish, Welsh, Scottish and Breton dance tunes. These tunes are drawn from community sources, such as the website thesession.org and “standard” references including O’Neills Dance Music of Ireland and Brendan Breathneach’s Ceol Rince Na hÉireann series. Tunes can be retrieved by typing in a title or by playing a twelve second extract from the tune on a traditional instrument. Tunepal can be used in sitiu in …


Scalable Multi-Modal Avatar Interface For Multi-User Environments, Brian Mac Namee, Mark Dunne, John D. Kelleher Jan 2010

Scalable Multi-Modal Avatar Interface For Multi-User Environments, Brian Mac Namee, Mark Dunne, John D. Kelleher

Conference papers

This research outlines an Intelligent Virtual Agent (IVA) interface, where multiple users will be able to interact with 3D avatars. This will take place in a distributed multi-modal environ- ment where the LOK8 Avatar System (AS) will need to locate it’s users from a crowd, using face tracking and novel 3D animation techniques.


Cbtv: Visualising Case Bases For Similarity Measure Design And Selection, Brian Mac Namee, Sarah Jane Delany Jan 2010

Cbtv: Visualising Case Bases For Similarity Measure Design And Selection, Brian Mac Namee, Sarah Jane Delany

Conference papers

In CBR the design and selection of similarity measures is paramount. Selection can benefit from the use of exploratory visualisation- based techniques in parallel with techniques such as cross-validation ac- curacy comparison. In this paper we present the Case Base Topology Viewer (CBTV) which allows the application of different similarity mea- sures to a case base to be visualised so that system designers can explore the case base and the associated decision boundary space. We show, using a range of datasets and similarity measure types, how the idiosyncrasies of particular similarity measures can be illustrated and compared in CBTV allowing …