880 research outputs found

    I Am Error

    Get PDF
    I Am Error is a platform study of the Nintendo Family Computer (or Famicom), a videogame console first released in Japan in July 1983 and later exported to the rest of the world as the Nintendo Entertainment System (or NES). The book investigates the underlying computational architecture of the console and its effects on the creative works (e.g. videogames) produced for the platform. I Am Error advances the concept of platform as a shifting configuration of hardware and software that extends even beyond its ‘native’ material construction. The book provides a deep technical understanding of how the platform was programmed and engineered, from code to silicon, including the design decisions that shaped both the expressive capabilities of the machine and the perception of videogames in general. The book also considers the platform beyond the console proper, including cartridges, controllers, peripherals, packaging, marketing, licensing, and play environments. Likewise, it analyzes the NES’s extension and afterlife in emulation and hacking, birthing new genres of creative expression such as ROM hacks and tool-assisted speed runs. I Am Error considers videogames and their platforms to be important objects of cultural expression, alongside cinema, dance, painting, theater and other media. It joins the discussion taking place in similar burgeoning disciplines—code studies, game studies, computational theory—that engage digital media with critical rigor and descriptive depth. But platform studies is not simply a technical discussion—it also keeps a keen eye on the cultural, social, and economic forces that influence videogames. No platform exists in a vacuum: circuits, code, and console alike are shaped by the currents of history, politics, economics, and culture—just as those currents are shaped in kind

    New Model for Geospatial Coverages in JSON : Coverage Implementation Schema and Its Implementation With JavaScript

    Get PDF
    Map browsers currently in place present maps and geospatial information using common image formats such as JPEG or PNG, usually created from a service on demand. This is a clear approach for a simple visualization map browser but prevents the browser from modifying the visualization since the content of the image file represents the intensity of colors of each pixel. In a desktop GIS, a coverage dataset is an array of values quantifying a certain property in each pixel of a subdomain of the space. The standard used to describe and distribute coverages is called web coverage service (WCS). Traditionally, encoding of coverages was too complex for map browsers implemented in JavaScript, relegating the WCS to a data download, a process that creates a file that will be later used in a desktop GIS. The combination of a coverage implementation schema in JSON, binary arrays, and HTML5 canvas makes it possible that web map browsers can be directly implemented in JavaScript

    Automation of a Remote Telescope Imaging System

    Get PDF
    SRI International is working with the High Frequency Active Auroral Research Project to develop instrumentation for researching the properties of the ionosphere. The project team developed a web-based interface that allows remote control of an optical imaging system located in Alaska. The interface provides control of the on-site cameras, optics, and mount for researchers at SRI. Data that is collected by the system is returned to SRI autonomously. The project concluded with on-site testing of the system

    Saliency-Aware Spatio-Temporal Artifact Detection for Compressed Video Quality Assessment

    Full text link
    Compressed videos often exhibit visually annoying artifacts, known as Perceivable Encoding Artifacts (PEAs), which dramatically degrade video visual quality. Subjective and objective measures capable of identifying and quantifying various types of PEAs are critical in improving visual quality. In this paper, we investigate the influence of four spatial PEAs (i.e. blurring, blocking, bleeding, and ringing) and two temporal PEAs (i.e. flickering and floating) on video quality. For spatial artifacts, we propose a visual saliency model with a low computational cost and higher consistency with human visual perception. In terms of temporal artifacts, self-attention based TimeSFormer is improved to detect temporal artifacts. Based on the six types of PEAs, a quality metric called Saliency-Aware Spatio-Temporal Artifacts Measurement (SSTAM) is proposed. Experimental results demonstrate that the proposed method outperforms state-of-the-art metrics. We believe that SSTAM will be beneficial for optimizing video coding techniques

    Dynamic load balancing in image retargeting using pipeline architecture

    Get PDF
    In today’s smart world demand of efficient multimedia based communication has increased at a rapid rate. Diversity on display sizes of gadgets used for multimedia communication confines the quality of images. Image retargeting is used as the focal solution to this problem which results in images with appropriate sizes. Enormously mounting demand of image retargeting expedites the rate of increment in computational load. This research paper expatiate and experiments a dynamic load balancing based three phase image retargeting methodology using pipeline architecture. In the first phase of image retargeting resize operation is performed on input image which results in multiple sized image copies of the same image. In the second phase resized images undergo quantization operation. In the final phase lossless compression is performed to have an expedient image. In the proposed exhibit think, we have done statistical analysis of results obtained, to confirm an impartial dynamic load balancing with a better degree of underlying resource utilization. We extend the approach to achieve significant storage optimization using three phase image retargeting

    Using False Colors to Protect Visual Privacy of Sensitive Content

    Get PDF
    Many privacy protection tools have been proposed for preserving privacy. Tools for protection of visual privacy available today lack either all or some of the important properties that are expected from such tools. Therefore, in this paper, we propose a simple yet effective method for privacy protection based on false color visualization, which maps color palette of an image into a different color palette, possibly after a compressive point transformation of the original pixel data, distorting the details of the original image. This method does not require any prior face detection or other sensitive regions detection and, hence, unlike typical privacy protection methods, it is less sensitive to inaccurate computer vision algorithms. It is also secure as the look-up tables can be encrypted, reversible as table look-ups can be inverted, flexible as it is independent of format or encoding, adjustable as the final result can be computed by interpolating the false color image with the original using different degrees of interpolation, less distracting as it does not create visually unpleasant artifacts, and selective as it preserves better semantic structure of the input. Four different color scales and four different compression functions, one which the proposed method relies, are evaluated via objective (three face recognition algorithms) and subjective (50 human subjects in an online-based study) assessments using faces from FERET public dataset. The evaluations demonstrate that DEF and RBS color scales lead to the strongest privacy protection, while compression functions add little to the strength of privacy protection. Statistical analysis also shows that recognition algorithms and human subjects perceive the proposed protection similarly

    Thesis Inquiry & Process: Something About Reality

    Get PDF
    This thesis documents the employment of a system of Process and Inquiry as it serves as a structural foundation for an investigation of the manner in which Reality is represented in visual portraiture. Through a vigorous exploration of the concept of Reality and its singular nature, it is hypothesized that intrinsically unique experiences could potentially be communicated through the perceptive abilities of the emotional quotient. The effects of media, timing, complexity, abstraction, and authenticity are examined for their effect on the apparent clarity of concepts transmitted in this manner. The inquiry ultimately manifests in the daily creation of self-portraiture, as well as a multimedia exhibition inspired by the theatrical arts, that speak to the communal understanding of the Human Experience

    Data Hiding and Its Applications

    Get PDF
    Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others
    • …
    corecore