4,937 research outputs found

    The Evolution of First Person Vision Methods: A Survey

    Full text link
    The emergence of new wearable technologies such as action cameras and smart-glasses has increased the interest of computer vision scientists in the First Person perspective. Nowadays, this field is attracting attention and investments of companies aiming to develop commercial devices with First Person Vision recording capabilities. Due to this interest, an increasing demand of methods to process these videos, possibly in real-time, is expected. Current approaches present a particular combinations of different image features and quantitative methods to accomplish specific objectives like object detection, activity recognition, user machine interaction and so on. This paper summarizes the evolution of the state of the art in First Person Vision video analysis between 1997 and 2014, highlighting, among others, most commonly used features, methods, challenges and opportunities within the field.Comment: First Person Vision, Egocentric Vision, Wearable Devices, Smart Glasses, Computer Vision, Video Analytics, Human-machine Interactio

    Resident Physicians' Preparedness to Provide Cross-Cultural Care: Implications for Clinical Care and Medical Education Policy

    Get PDF
    Recommends integrating cross-cultural training into medical school curricula, training faculty to ensure useful instruction and mentoring, and mandatory and formal evaluation of residents' cross-cultural communication skills

    Safeguarding the Lives of Children Affected by Boko Haram: Application of the SAFE Model of Child Protection to a Rights-Based Situation Analysis

    Get PDF
    The Boko Haram insurgency in northeast Nigeria is responsible for the highest number of lives lost in Africa in the past decade. The country has witnessed significant violations of the United Nations Convention on the Rights of the Child, which Nigeria has signed and ratified. For instance, Nigeria had the second-highest number of children recruited to armed groups and the third-highest number of abductions in 2018. Current humanitarian efforts primarily target camps for internally displaced persons, while state strategies focus mainly on addressing security through combatant-targeted interventions. However, there is a need for more rights-based, integrated, and multifaceted approaches to tackle the interrelated threats to the security of children and their families affected by the conflict. This paper uses the SAFE model of child protection—which examines the interrelatedness of safety, access, family, and education and economic security—to analyze the challenges of children and youth affected by the conflict. We highlight the need for a gendered approach; strategies that address poverty and cultural and governance barriers; and interdisciplinary, context-specific, and autonomous child protection systems. The paper calls for urgent and increased attention to the core rights and human security needs of these children to avoid a replay of negative outcomes of conflict, where the costs and consequences propagate a cycle of violence and disadvantage

    Topological mass in seven dimensions and dualities in four dimensions

    Full text link
    The massive topologically and self dual theories en seven dimensions are considered. The local duality between these theories is established and the dimensional reduction lead to the different dualities for massive antisymmetric fields in four dimensions.Comment: 7 page

    LĂ©vy-Ito Models in Finance

    Get PDF
    We present an overview of the broad class of financial models in which the prices of assets are L Ă©vy-Ito processes driven by an n-dimensional Brownian motion and an independent Poisson random measure. The Poisson random measure is associated with an n-dimensional LĂ©vy process. Each model consists of a pricing kernel, a money market account, and one or more risky assets. We show how the excess rate of return above the interest rate can be calculated for risky assets in such models, thus showing the relationship between risk and return when asset prices have jumps. The framework is applied to a variety of asset classes, allowing one to construct new models as well as interesting generalizations of familiar models

    Application of large area SiPMs for the readout of a plastic scintillator based timing detector

    Full text link
    In this study an array of eight 6 mm x 6 mm area SiPMs was coupled to the end of a long plastic scintillator counter which was exposed to a 2.5 GeV/c muon beam at the CERN PS. Timing characteristics of bars with dimensions 150 cm x 6 cm x 1 cm and 120 cm x 11 cm x 2.5 cm have been studied. An 8-channel SiPM anode readout ASIC (MUSIC R1) based on a novel low input impedance current conveyor has been used to read out and amplify SiPMs independently and sum the signals at the end. Prospects for applications in large-scale particle physics detectors with timing resolution below 100 ps are provided in light of the results

    Application of large area SiPMs for the readout of a plastic scintillator based timing detector

    Full text link
    In this study an array of eight 6 mm x 6 mm area SiPMs was coupled to the end of a long plastic scintillator counter which was exposed to a 2.5 GeV/c muon beam at the CERN PS. Timing characteristics of bars with dimensions 150 cm x 6 cm x 1 cm and 120 cm x 11 cm x 2.5 cm have been studied. An 8-channel SiPM anode readout ASIC (MUSIC R1) based on a novel low input impedance current conveyor has been used to read out and amplify SiPMs independently and sum the signals at the end. Prospects for applications in large-scale particle physics detectors with timing resolution below 100 ps are provided in light of the results
    • …
    corecore