1,192 research outputs found

    Content-based video retrieval: three example systems from TRECVid

    Get PDF
    The growth in available online video material over the internet is generally combined with user-assigned tags or content description, which is the mechanism by which we then access such video. However, user-assigned tags have limitations for retrieval and often we want access where the content of the video itself is directly matched against a user’s query rather than against some manually assigned surrogate tag. Content-based video retrieval techniques are not yet scalable enough to allow interactive searching on internet-scale, but the techniques are proving robust and effective for smaller collections. In this paper we show 3 exemplar systems which demonstrate the state of the art in interactive, content-based retrieval of video shots, and these three are just three of the more than 20 systems developed for the 2007 iteration of the annual TRECVid benchmarking activity. The contribution of our paper is to show that retrieving from video using content-based methods is now viable, that it works, and that there are many systems which now do this, such as the three outlined herein. These systems, and others can provide effective search on hundreds of hours of video content and are samples of the kind of content-based search functionality we can expect to see on larger video archives when issues of scale are addressed

    Combined Intra- and Inter-domain Traffic Engineering using Hot-Potato Aware Link Weights Optimization

    Full text link
    A well-known approach to intradomain traffic engineering consists in finding the set of link weights that minimizes a network-wide objective function for a given intradomain traffic matrix. This approach is inadequate because it ignores a potential impact on interdomain routing. Indeed, the resulting set of link weights may trigger BGP to change the BGP next hop for some destination prefixes, to enforce hot-potato routing policies. In turn, this results in changes in the intradomain traffic matrix that have not been anticipated by the link weights optimizer, possibly leading to degraded network performance. We propose a BGP-aware link weights optimization method that takes these effects into account, and even turns them into an advantage. This method uses the interdomain traffic matrix and other available BGP data, to extend the intradomain topology with external virtual nodes and links, on which all the well-tuned heuristics of a classical link weights optimizer can be applied. A key innovative asset of our method is its ability to also optimize the traffic on the interdomain peering links. We show, using an operational network as a case study, that our approach does so efficiently at almost no extra computational cost.Comment: 12 pages, Short version to be published in ACM SIGMETRICS 2008, International Conference on Measurement and Modeling of Computer Systems, June 2-6, 2008, Annapolis, Maryland, US

    Enabling environmental fingerprinting with an NFC-powered sensor board

    Get PDF
    Abstract. In recent times, people have become concerned about their environmental conditions, amid deteriorating global statistics on bad air quality, global warming and UV light exposure. Conventional technologies for reading environmental conditions are expensive, bulky and situated, yet, people are mobile and need portable tools to be aware of their immediate environmental conditions on demand. Smartphones are now widely used, endowed with sensors and wireless communication technologies such as Bluetooth, and Near Field Communication (NFC) for external sensor connectivity, making smartphones a viable tool for fingerprinting the environment. This thesis outlines the design, evaluation and implementation of a mobile-enabled system for environmental data collection using a portable NFC powered sensor board. The name of the system developed in this thesis is the S3 system. The S3 system is a two-tier system which consists of S3 Android application and an online dashboard with a data repository. The S3 Android application is used for collecting and visualising environmental data; temperature, humidity, UV, ambient light, with a smartphone and a credit card-size NFC powered sensor board. The sensor data is then periodically synced to the online data repository. Additional features of the S3 application include automated feedback sampling, introductory tutorial, and user preference settings. The thesis further details the design and implementation process with scenarios, use cases, paper sketches, expert review of sketches, interface mockups, evaluation of prototype with a user study, quantitative and qualitative analysis of user study data, and finally the implementation of the S3 application. The thesis also presents a test run to demonstrate the capabilities of the S3 system as a mobile-enabled solution for crowdsourced environmental fingerprint datasets. To the end user, the work in this thesis provides the S3 application and the NFC powered sensor card as a portable tool for personalised environmental fingerprinting. On the other hand, the intervention in this thesis will have an impact on research since the crowdsourced environmental fingerprint datasets can be valuable datasets for research. As a TEKES project, the solution also provides a proof of concept for further improvement and deployment into the commercial software market

    Informational Urbanism. A Conceptual Framework of Smart Cities

    Get PDF
    Contemporary and future cities are often labeled as “smart cities,” “digital cities” or “ubiquitous cities,” “knowledge cities,” and “creative cities.” Informational urbanism includes all aspects of information and (tacit as well as explicit) knowledge with regard to urban regions. “Informational city” (or “smart city” in a broader sense) is an umbrella term uniting the divergent trends of information-related city research. Informational urbanism is an interdisciplinary endeavor incorporating on the one side computer science and information science as well as on the other side urban studies, city planning, architecture, city economics, and city sociology. In this article, we present both, a conceptual framework for research on smart cities as well as results from our empirical studies on smart cities all over the world. The framework consists of seven building blocks, namely information and knowledge related infrastructures, economy, politics (e-governance) and administration (e-government), spaces (spaces of flows and spaces of places), location factors, the people’s information behavior, and problem areas. \

    From Keyword Search to Exploration: How Result Visualization Aids Discovery on the Web

    No full text
    A key to the Web's success is the power of search. The elegant way in which search results are returned is usually remarkably effective. However, for exploratory search in which users need to learn, discover, and understand novel or complex topics, there is substantial room for improvement. Human computer interaction researchers and web browser designers have developed novel strategies to improve Web search by enabling users to conveniently visualize, manipulate, and organize their Web search results. This monograph offers fresh ways to think about search-related cognitive processes and describes innovative design approaches to browsers and related tools. For instance, while key word search presents users with results for specific information (e.g., what is the capitol of Peru), other methods may let users see and explore the contexts of their requests for information (related or previous work, conflicting information), or the properties that associate groups of information assets (group legal decisions by lead attorney). We also consider the both traditional and novel ways in which these strategies have been evaluated. From our review of cognitive processes, browser design, and evaluations, we reflect on the future opportunities and new paradigms for exploring and interacting with Web search results

    An empirical investigation of smartphone technology acceptance among Universiti Utara Malaysia students

    Get PDF
    This study investigated smartphone technology acceptance among Universiti Utara Malaysian (UUM) students by using the Technology Acceptance Model (TAM). The rapid diffusion of computer technology into smartphone increases smartphone penetration among Universiti Utara Malaysia students. The aim of this study was to determine the relationship of Perceived Ease of Use (PEU) and Perceived Usefulness (PU) as independent variables, and Attitude (ATT) and Behavioural intention (BI) as dependent variables on Smartphone Technology Acceptance among Universiti Utara Malaysia students. In addition, in this research Gender was used as a moderator to test the relationship between Attitude (ATT) and Behavioural intention (BI). In order to collect data a total of 500 questionnaires were distributed to (UUM) final year and postgraduate students in three colleges COB, CAS and COLGIS. The hypothesis results showed that there was a significant relationship among the four variables except Gender. This was because Gender failed to moderate in explaining the relationship between Attitude (ATT) and Behavioural intention (BI). On the other hand the statistical result showed that there was partial mediation effect of Perceived Usefulness (PU) on the relationship between Perceived Ease (PEU) of Use and Attitude (ATT) on Smartphone Technology Acceptance among Universiti Utara Malaysian students. Furthermore the researcher found that there was a significant relationship between both the dependent variables - Attitude (ATT) and Behavioural intention (BI) on smartphone technology acceptance among UUM students. The overall finding showed that technology advancement and breakthrough design of smartphone technology are the key factors that attract Universiti Utara Malaysia students to accept smartphone technology. On the other hand, usefulness and ease of use of the smartphone technology play important roles in influencing (UUM) students to have the intention to use smartphone technology in accomplishing their personal tasks. This is because the usefulness of smartphone technology with promising results makes (UUM) students rely heavily on this device

    Scheduling of routing table calculation schemes in open shortest path first using artificial neural network

    Get PDF
    Internet topology changes due to events such as router or link goes up and down. Topology changes trigger routing protocol to undergo convergence process which eventually prepares new shortest routes needed for packet delivery. Real-time applications (e.g. VoIP) are increasingly being deployed in internet nowadays and require the routing protocols to have quick convergence times in the range of milliseconds. To speed-up its convergence time and better serve real-time applications, a new routing table calculation scheduling schemes for Interior Gateway Routing Protocol called Open Shortest Path First (OSPF) is proposed in this research. The proposed scheme optimizes the scheduling of OSPF routing table calculations using Artificial Neural Network technique called Generalized Regression Neural Network. The scheme determines the suitable hold time based on three parameters: LSA-inter arrival time, the number of important control message in queue, and the computing utilization of the routers. The GRNN scheme is tested using Scalable Simulation Framework (SSFNet version 2.0) network simulator. Two kind of network topology with several link down scenarios used to test GRNN scheme and existing scheme (fixed hold time scheme). Results shows that GRNN provide faster convergence time compared to the existing scheme

    Improving Intrusion Prevention, Detection and Response

    Get PDF
    Merged with duplicate record 10026.1/479 on 10.04.2017 by CS (TIS)In the face of a wide range of attacks. Intrusion Detection Systems (IDS) and other Internet security tools represent potentially valuable safeguards to identify and combat the problems facing online systems. However, despite the fact that a variety o f commercial and open source solutions are available across a range of operating systems and network platforms, it is notable that the deployment of IDS is often markedly less than other well-known network security countermeasures and other tools may often be used in an ineffective manner. This thesis considers the challenges that users may face while using IDS, by conducting a web-based questionnaire to assess these challenges. The challenges that are used in the questionnaire were gathered from the well-established literature. The participants responses varies between being with or against selecting them as challenges but all the listed challenges approved that they are consider problems in the IDS field. The aim of the research is to propose a novel set of Human Computer Interaction-Security (HCI-S) usability criteria based on the findings of the web-based questionnaire. Moreover, these criteria were inspired from previous literature in the field of HCI. The novelty of the criteria is that they focus on the security aspects. The new criteria were promising when they were applied to Norton 360, a well known Internet security suite. Testing the alerts issued by security software was the initial step before testing other security software. Hence, a set of security software were selected and some alerts were triggered as a result of performing a penetration test conducted within a test-bed environment using the network scanner Nmap. The findings reveal that four of the HCI-S usability criteria were not fully addressed by all of these security software. Another aim of this thesis is to consider the development of a prototype to address the HCI-S usability criteria that seem to be overlooked in the existing security solutions. The thesis conducts a practical user trial and the findings are promising and attempt to find a proper solution to solve this problem. For instance, to take advantage of previous security decisions, it would be desirable for a system to consider the user's previous decisions on similar alerts, and modify alerts accordingly to account for the user's previous behaviour. Moreover, in order to give users a level of fiexibility, it is important to enable them to make informed decisions, and to be able to recover from them if needed. It is important to address the proposed criteria that enable users to confirm / recover the impact of their decision, maintain an awareness of system status all the time, and to offer responses that match users' expectations. The outcome of the current study is a set of a proposed 16 HCI-S usability criteria that can be used to design and to assess security alerts issued by any Internet security suite. These criteria are not equally important and they vary between high, medium and low.The embassy of the arab republic of Egypt (cultural centre & educational bureau) in Londo

    Design criteria for Indoor Positioning Systems in hospitals using technological, organizational and individual perspectives

    Get PDF
    This dissertation considers three different studies that handle Indoor Positioning Systems (IPS) in hospitals. Study 1 uses the Reasoned Action Approach by questioning hospital visitors and employees about their intention to use IPS in hospitals. Study 2 reviews IPS in hospitals. Study 3 is based on the results of the first two studies. It handles expert interviews that were conducted with different hospitals and IPS developers to evaluate the determined propositions. Then, the insights were used to conduct and evaluate experiments by testing an ultrasound-based IPS for hospitals
    corecore