1,624,925 research outputs found

    Gesture controlled interactive rendering in a panoramic scene

    Get PDF
    The demonstration described hereafter covers technical work carried out in the FascinatE project [1], related to the interactive retrieval and rendering of high-resolution panoramic scenes. The scenes have been captured by a special panoramic camera (the OMNICAM) [2] with is capturing high resolution video featuring a wide angle (180 degrees) field of view. Users can access the content by interacting based on a novel device-less and markerless gesture-based system that allows them to interact as naturally as possible, permitting the user to control the rendering of the scene by zooming, panning or framing through the panoramic scenePeer ReviewedPostprint (published version

    An approach to restrict viewing of media

    Get PDF
    Nowadays, the issue of copyright infringement of media contents becomes more vital since the media content is published on the internet for easy access to users.Due to that, the authors’ work affect adversely if their work can be copied or downloaded, modified or shared illegally by unauthorized users.In this paper, we proposed a method to restrict the viewing of images to control the media content accessibility.The method is using basic encryption scheme in order to prevent copyright violations, means, user who does not have specific player and/or with correct password can still view the grey-scale part of the media work in order to accomplish the marketing purposes.The encryption scheme integrates with certain properties such frequency and/or date time which will be used as a salt parameter for Password Based Key Derivation Function 2 (PBKDF2). The method also uses Color Lookup Table (CLUT) as an input to encrypt color table which the decryption process relies on the properties and the correct password

    Don't keep it under your hat: A Fez design description and case study

    Get PDF
    Fez is the University of Queensland’s (UQ) new digital repository management and workflow system. Robust and scalable, the open source system is Fedora-based and provides easy access to electronic content like theses, book chapters, articles and research output. Fez is based on PHP and MySQL and provides a user-friendly front-end to Fedora 2.1.1+. Highly flexible and configurable, Fez is an advanced administration and content management tool for digital repositories. This case study will show how Fez can be easily customised to manage a large, multi-user content entry project with complex security requirements. This capability is highlighted in UQ’s current Research Assessment Exercise (RAE), which will see international expert panels assessing multiple research articles from the University’s academic staff. Academic staff from different schools and centres must nominate their top three research works from the last five years to be deposited into Fez for review. Specific content models were developed to meet the reporting requirements of the RAE, including a 'citation view' facility, with links to either the object's digital object identifier or to a locally housed version of the file to grant reviewers full access to materials. To simplify metadata creation, Fez was integrated with data feeds from UQ central human resource systems to provide rich form controls based on cutting-edge AJAX technology. For example, an 'author suggest' control was developed to assist users by predicting an author’s name as it is typed, based on an institutional academic staff list. Fez is also being prepared for federated authentication and authorization based on the international standard eduPerson attributes, implemented with Shibboleth technology. This will assist future RAE processes by allowing external reviewers to authenticate using their own institutions central identity provider and Fez will be able to apply access control rules for these external reviewers based on their individual eduPerson attributes

    ebooks publication: the technology, the contents, the how to do; a challenge to the competences share and team work.

    Get PDF
    Producing eBooks is a complex task. Although they follow the well know book metaphor, Adobe Acrobat (1) eBooks may also include audiovisual media, hyperlinking structures, other interactive content and information layers. The process of production goes through an iterative cycle, where content authors team with designers, programmers, media producers and information architects. Its then crucial to optimize this process using software tools to help structuring the content, faciliting groupworking and metadata annotation. In this paper, we propose a new tool aiming the easy description of the relationships amongst different pieces of content and the fast prototyping of the navigation schema of the eBook. This tool intends to provide an usability tested and friendly rich interface application. We expect to provide drag-&-drop hierarchy folders and contextual help in a cross-platform setting based in the Macromedia Flex (2) software. Content should be separated from style, as we expect authors not to care on the graphic design issues. The content structure follows IMS Content Packaging (3) standard and metadata annotation of each type of content use IMS Learning Resource Metadata (4). Contents are grouped in folders equivalent to CISCO Reusable Learning Objects (5), in order to better express the instructional design of the eBooks. We expect that these structures contents can be exported in three different ways: a rapid prototyping HTML view of the navigation, a SCORM learning object for use in Learning Management Systems like Moodle (6) and an editable Acrobat PDF-X (7) version for final production. Groupwork facilities, version and access control, storage and reuse shall be controlled using the Exlibris Digitool (8) digital library, providing a way for central management with distributed access. This tool is in beta stage of development and will soon be tested with real authors. The paper will describe the tool and present the first usability results

    MedSurv: a software application for creating, conducting and managing medical surveys and questionnaires

    Get PDF
    MedSurv is a system designed for the rapid creation and maintenance of research surveys and questionnaires that does not require programmer intervention. MedSurv is built with medical surveys in mind and utilizes a group-based permission control with additional security features to help ensure compliance with applicable healthcare regulations. MedSurv is designed as a module for DotNetNuke [1], an open source portal and content management system built with ASP.Net technology, and therefore can be deployed and managed as intranet, extranet, and web sites. At the same time, all data is stored at the researcher\u27s institution to guarantee the required data privacy. Thanks to its built-in support for user authentication and user roles, there is no need to create such functionality from scratch. However, a group-based permissions system is added to MedSurv to support sufficient granularity for access control. Although from the data access point of view data storage acts as a relational table, MedSurv uses a solution that we call virtual tables. The premise behind such a solution is that the structure of the tables is itself stored in a set of relational tables within the database, essentially creating a miniature database within the database. This additional layer is transparent to the user and removes the need for any programming or database knowledge. At the same time it gives the user the flexibility of changing the survey at runtime. Unlike a traditional structure that may require database developer\u27s involvement each time a survey is added or changed, with virtual tables there is very low developer and database administration need after launch. MedSurv allows for creating complex medical surveys and is, in particular, used to develop questionnaires for research driven data collection in the Department of Gastroenterology

    Understanding & controlling user privacy in social media via exposure

    Get PDF
    The recent popularity of Online Social Media sites (OSM) like Facebook and Twitter have led to a renewed discussion about user privacy. In fact, numerous recent news reports and research studies on user privacy stress the OSM users’ urgent need for better privacy control mechanisms. Thus, today, a key research question is: how do we provide improved privacy protection to OSM users for their social content? In this thesis, we propose a systematic approach to address this question. We start with the access control model, the dominant privacy model in OSMs today. We show that, while useful, the access control model does not capture many theoretical and practical aspects of privacy. Thus, we propose a new model, which we term the exposure control model. We define exposure for a piece of content as the set of people who actually view the content. We demonstrate that our model is a significant improvement over access control to capture users’ privacy requirements. Next, we investigate the effectiveness of our model to protect users’ privacy in three real world scenarios: (1) Understanding and controlling exposure using social access control lists (SACLs) (2) Controlling exposure by limiting large-scale social data aggregators and (3) Understanding and controlling longitudinal exposure in OSMs, i.e., how users control exposure of their old OSM content. We show that, in each of these cases, the exposure control-based approach helps us to design improved privacy control mechanisms.Die PopularitĂ€t von sozialen Netzwerken (SN), wie Facebook, haben zu einer erneuten Diskussion ĂŒber die PrivatsphĂ€re gefĂŒhrt. Wissenschaftliche Publikationen untersuchen die PrivatsphĂ€re und zeigen wie dringend SN Benutzer besseren Datenschutz benoötigen. Eine zentrale Herausforderung fĂŒr in diesem Bereich ist: Wie kann der Schutz der PrivatsphĂ€re von SN Benutzern und ihren Inhalten garantiert werden? Diese Doktorarbeit schlĂ€gt AnsĂ€tze vor, die diese Frage beantworten. Wir untersuchen das PrivatsphĂ€remodel, das Access Control Modell, in SN. Wir zeigen auf, dass das Access Control Modell theoretische und praktische Aspekte der PrivatsphĂ€re nicht erfasst. Deshalb schlagen wir das Expositionssteuerunsgmodell vor und definieren Exposition fĂŒr einen Inhalt als die Menge der Personen, die einen Beitrag ansieht. Unser Modell stellt eine bedeutende Verbesserung zu dem Access Control Modell dar. Wir untersuchen die EffektivitĂ€t unseres Modells, indem wir den Datenschutz der Benutzer in drei realen Szenarien schĂŒtzen: (1) VerstĂ€ndnis und Steuerung der Exposition von Inhalten mit Sozialen Access Control Listen (SACLs), (2) Steuerung der Exposition durch Begrenzung der umfassenden sozialen Datenaggregation und (3) VerstĂ€ndnis und Steuerung von Langzeitexposition in SN, z.B. wie Benutzer Exposition alter Inhalte begrenzen. In diesen FĂ€llen fĂŒrt Expositionssteuerungsmethoden zu einem verbesserten PrivatsphĂ€resteuerungsmechanismus

    Posession of Extreme Pornography: Where\u27s the Harm?

    Get PDF
    For decades, the traditional Western liberal approach to obscene material has been that while the availability of such material may be restricted, individuals are free to possess it so long as they do not distribute to others. Prior to the advent of the Internet, traditional means of control were effective in limiting the availability of such material. However, free of traditional restrictions the Internet allows easy access to a vast array of pornographic material, some of which challenges the most liberal of societies including images of child abuse, sexual violence, bestiality, and necrophilia. In 2008, the UK became one of the first Western countries to criminalize the possession of ‘‘extreme pornographic material.” This article considers the rationales used to justify such an offence and in particular the parallels drawn with possession of child pornography. Although ostensibly justified by arguments based on the prevention of harm, the offence is more clearly explained as a reaction to the difficulty of enforcing existing obscenity laws. A person’s right to read and view what they please in private is therefore sacrificed for the need to restrict the availability of online content. Such an approach may be applied to obscene material more generally, or any other prohibited online content such as terrorism-related material. It is argued that a more nuanced approach may allow the production and distribution of such material to be targeted, while allowing the sanctity of a person’s library to remain untouched

    The Impact Of Using YouTube In EFL Classroom On Enhancing EFL Students' Content Learning

    Get PDF
    Information technology has opened up prospects for rich and innovative approaches to tackle educational issues and provide solutions to the increasing demands for learning resources. YouTube, a video-sharing website that allows users to upload, view, and share video clips, offers access to new and dynamic opportunities for effective and non-traditional patterns of teaching and learning. In Saudi Arabia, this technology has not been exploited much for educational purposes. The present study aims at experimenting the impact of integrating YouTube technology into English as a foreign language (EFL) instruction on enhancing EFL college students’ learning of the content of the course: “Observation in Schools 2”. This course is one of five courses taught in the program “Elementary School Teacher of English” which aims at developing certain observation skills for effective teaching in elementary school. Such skills could include using particular frames or lenses to gain insight about the classroom and teaching and learning, and developing methods of observing and recording. For the purpose of the study, a quasi experimental design was adopted. Based on such design, two groups of second year college students at the Department of Curriculum and Instruction in the Faculty of Education at Princess Noura University in Riyadh, Saudi Arabia, were randomly assigned to the experimental and the control groups of the study. There were forty- five students in the control group and fifty-one in the experimental group. A pre-posttest covering the theoretical background of the course "Observation in School 2" was developed to be administered to all subjects of the sample before and after the experiment.  Subjects of the experimental group were instructed the theoretical background of the course through the use of YouTube videos about observing the classroom, combined with discussion and power point presentation. Students of the control group were taught the same content through the usual lecture-based method. Instruction was provided to both groups by the researcher and took place throughout the second term of the academic year in 2011 for a period of 6 weeks, 2 hours per week. Statistical procedures were applied on the data obtained using a t-test, and major findings yielded results favourable to the use of the YouTube technology. The study shows positive gains for the experimental group students’ outcomes as a result of the integration of video technology in instruction. Thus, it was recommended that YouTube should be considered as an effective instructional tool for enhancing content learning of EFL college students and as an important teaching resource in classrooms

    MULTIPASS: gestion des consentements pour accéder aux données des exploitations dans une chaßne de confiance afin de favoriser l'émergence de nouveaux services pour les agriculteurs

    Get PDF
    12th EFITA International Conference, Rhode island, GRC, 27-/06/2019 - 29/06/2019International audienceWith the emergence of digital technologies, farms become a relevant source of data to meet the challenges of multi-performance agriculture. Beyond the services provided, access to farmers' data depends on a clear understanding of their use, which must be done in a transparent way. Several codes of conduct at a national or international level push for a voluntary commitment to respect some good practices in the use of agricultural data. To provide a tool and answer farmer's questions on the control of their data and the transparency of the data processing, the partners of the MULTIPASS project, have imagined an interoperable ecosystem of farmer consents management, protecting farmers from no consented uses of their data.Farmers' expectations of such an ecosystem have been expressed during workshops. They want to better identify existing data flows, including actors, data processes, and data clusters. Based on the farmers' expectations, the MULTIPASS project stakeholders have proposed the architecture of an ecosystem integrating two consent management tools as "pilots". This ecosystem should take in charge the interoperability between each consent management tools or with future tools. This solution is based on a shared typology of data and data processes as well as on the specifications of the consent message content. All these elements should be easily accessible to meet the interoperability need of the ecosystem. It is also based on a router, which provides unified access to consent management tools (using API). In particular, it provides the farmer (beneficiary) with an exhaustive view of his/her consents (which can be distributed on several consent management systems), meeting farmers' expectations for transparency. It is also the point where a data provider can check whether the consent required to provide data exists, without needing to know which consent management system is concerned. In this project, the stakeholders want to demonstrate to agricultural professional organizations the benefits and feasibility of a consent management ecosystem. By strengthening the confidence of farmers to share data, the project will allow the emergence of new knowledge and new services

    Towards Tactile Internet in Beyond 5G Era: Recent Advances, Current Issues and Future Directions

    Get PDF
    Tactile Internet (TI) is envisioned to create a paradigm shift from the content-oriented communications to steer/control-based communications by enabling real-time transmission of haptic information (i.e., touch, actuation, motion, vibration, surface texture) over Internet in addition to the conventional audiovisual and data traffics. This emerging TI technology, also considered as the next evolution phase of Internet of Things (IoT), is expected to create numerous opportunities for technology markets in a wide variety of applications ranging from teleoperation systems and Augmented/Virtual Reality (AR/VR) to automotive safety and eHealthcare towards addressing the complex problems of human society. However, the realization of TI over wireless media in the upcoming Fifth Generation (5G) and beyond networks creates various non-conventional communication challenges and stringent requirements in terms of ultra-low latency, ultra-high reliability, high data-rate connectivity, resource allocation, multiple access and quality-latency-rate tradeoff. To this end, this paper aims to provide a holistic view on wireless TI along with a thorough review of the existing state-of-the-art, to identify and analyze the involved technical issues, to highlight potential solutions and to propose future research directions. First, starting with the vision of TI and recent advances and a review of related survey/overview articles, we present a generalized framework for wireless TI in the Beyond 5G Era including a TI architecture, the main technical requirements, the key application areas and potential enabling technologies. Subsequently, we provide a comprehensive review of the existing TI works by broadly categorizing them into three main paradigms; namely, haptic communications, wireless AR/VR, and autonomous, intelligent and cooperative mobility systems. Next, potential enabling technologies across physical/Medium Access Control (MAC) and network layers are identified and discussed in detail. Also, security and privacy issues of TI applications are discussed along with some promising enablers. Finally, we present some open research challenges and recommend promising future research directions
    • 

    corecore