20 research outputs found

    Definition of Requirements for Accessing Multilingual Information and Opinions

    Get PDF
    With the development of the Internet and satellite television, access to thousands of programs and messages in different languages became widespread. Unfortunately, even well educated people do not speak sufficiently in more than two or three foreign languages, while most know only one, and this significantly limits the access to this information. In this paper, we define requirements for an automated system for Accessing Multilingual Information and opinionS (AMIS) that will help in the understanding of multimedia content transmitted in different languages, with simultaneous comparison to counterparts in their native language user. The concept of understanding we use will provide access to any information, regardless of the language in which it is presented. We believe that the AMIS project can have a immense and positive impact on the integration and awareness of society in social and cultural terms

    Definition of Requirements for Accessing Multilingual Information and Opinions

    Get PDF
    With the development of the Internet and satellite television, access to thousands of programs and messages in different languages became widespread. Unfortunately, even well educated people do not speak sufficiently in more than two or three foreign languages, while most know only one, and this significantly limits the access to this information. In this paper, we define requirements for an automated system for Accessing Multilingual Information and opinionS (AMIS) that will help in the understanding of multimedia content transmitted in different languages, with simultaneous comparison to counterparts in their native language user. The concept of understanding we use will provide access to any information, regardless of the language in which it is presented. We believe that the AMIS project can have a immense and positive impact on the integration and awareness of society in social and cultural terms

    Evaluation of Improved Components of AMIS Project for Speech Recognition, Machine Translation and Video/Audio/Text Summarization

    Get PDF
    International audienceTo evaluate a system that automatically summarizes video files (image and audio) and text, how the system works, and the quality of the results should be considered. With this objective, the authors have performed two types of evaluation: objective and subjective. The actual assessment is performed mainly automatically, while the individual assessment is based directly on the opinion of people, who evaluate the system by answering a set of questions, which are then processed to obtain the targeted conclusions. One of the purposes of the described research is to try to narrow the space of possible summarization scenarios. Meanwhile, in the light of individual results obtained, the researchers cannot unambiguously indicate one single scenario, recommended as the only one for further development. However, the researchers can state with certainty that the new development of scene 1, which has received many negative evaluations among professionals, should be discontinued. Considering the results of the set of questions about the quality of the complete system, the end-users have evaluated the scenario 3, and they think that the quality is excellent, obtaining results over 70% on a scale of 0 to 100

    INACT—INDECT Advanced Image Cataloguing Tool

    Full text link

    Summarizing videos into a target language: Methodology, architectures and evaluation

    Get PDF
    International audienceThe aim of the work is to report the results of the Chist-Era project AMIS (Access Multilingual Information opinionS). The purpose of AMIS is to answer the following question: How to make the information in a foreign language accessible for everyone? This issue is not limited to translate a source video into a target language video since the objective is to provide only the main idea of an Arabic video in English. This objective necessitates developing research in several areas that are not, all arrived at a maturity state: Video summarization, Speech recognition, Machine translation, Audio summarization and Speech segmentation. In this article we present several possible architectures to achieve our objective, yet we focus on only one of them. The scientific locks are be presented, and we explain how to deal with them. One of the big challenges of this work is to conceive a way to evaluate objectively a system composed of several components knowing that each of them has its limits and can propagate errors through the first component. Also, a subjective evaluation procedure is proposed in which several annotators have been mobilized to test the quality of the achieved summaries

    Administracja, zarządzanie i handel zagraniczny w warunkach integracji. Materiały konferencyjne - Zarządzanie bezpieczeństwem

    Get PDF
    Ze wstępu: "Bezpieczeństwo jest w coraz wyższej cenie. Zajmują się nim naukowcy oraz praktycy z różnych dziedzin. W najszerszym wymiarze pojęcie „bezpieczeństwo” sprowadzić można do słów: stan niezagrożenia, spokoju, pewności. Takie ogólne ujęcie problematyki bezpieczeństwa sprawia, że różne podmioty podchodzą wybiórczo do tych bardzo ważnych zarówno dla pojedynczych ludzi, jak i społeczeństwa zagadnień. Inaczej postrzegają i interpretują bezpieczeństwo politycy, prawnicy, ekonomiści, wojskowi, policjanci, lekarze, pedagodzy, a inaczej zwyczajni ludzie. W ich ujęciu bezpieczeństwo to: 1) stan świadomości człowieka, w którym czuje się on wolny od jakichkolwiek zagrożeń, pociągający za sobą poczucie spokoju i komfortu; 2) niczym niezakłócone współistnienie człowieka z innymi ludźmi i środowiskiem przyrodniczym; 3) stan bez lęku i niepokoju o siebie i innych, pewność jutra; 4) brak zagrożenia utraty zdrowia, mienia i życia, komfort psychiczny umożliwiający realizację życiowych marzeń i celów; 5) sytuacja, w której człowiekowi nic nie zagraża, a w nagłych i nieprzewidzianych sytuacjach może liczyć na pomoc i wsparcie innych."(...

    Analiza metody wyszukiwania obrazów przez podanie przykładu w sieciach nakładkowych (Peer to Peer)

    No full text
    Zawiera bibliogr.Nowadays the traditional division between content producers and consumers is becoming blurry. The mass production and availability of content creates a new challenge. It is not enough to create content and make it available in the Internet. It is necessary to allow the content to be easily searched for and accessed by other users. We are used to searching for items in the network with sets of keywords. Users, however, have no incentive to tag each of their movies and photographs with keywords. This is where advanced multimedia search methods, such as Query by Example can be successfully utilized. Another emerging problem is the economical effort required to set up a new multimedia service. The volume of the multimedia data, requirements on storage space, computation power and bandwidth allow only the largest market vendors to easily introduce new multimedia services. An answer to this problem is the departure from the traditional client-server architecture to a Peer-to-Peer network, in which network upkeep costs are shared among the network users. This dissertation presents the work in the cross-domain area of Peer-to-Peer networking and advanced multimedia search methods. The author identifies and solves the problems encountered during the application of the Query by Example search technique in both structured and unstructured Peer-to-Peer overlays. The author proves that implementation of Query by Example service in Peer-to-Peer overlays is possible while maintaining the quality offered by centralized solution and the benefits of Peer-to-Peer overlays at the same time.W dzisiejszych czasach tradycyjny podział na producentów i konsumentów treści multimedialnych zaciera się. Masowa produkcja i dostępność treści jest wyzwaniem dla mechanizmów wyszukiwania danych. Stworzyć nowej treści i umieszczenie jej w Internecie jest niewystarczające, by udostępnić ją innym użytkownikom. Należy jednocześnie umożliwić jej skuteczne wyszukiwanie. Jesteśmy przyzwyczajeni do wyszukiwania treści przez podanie zestawu słów kluczowych. Jednak twórcy treści multimedialnych nie mają motywacji do tworzenia opisów słownych swoich zdjęć czy filmów. W rozwiązaniu tego problemu pomocne są zaawansowane metody wyszukiwania takie jak na przykład wyszukiwanie przez podanie przykładu. Innym problemem jest wydatek ekonomiczny, jaki należy ponieść w celu uruchomienia nowej usługi multimedialnej w sieci. Objętość danych multimedialnych, a więc konieczność posiadania odpowiedniej przestrzeni dyskowej, mocy obliczeniowej i pasma powoduje, że takie przedsięwzięcie jest możliwe jedynie dla największych przedsiębiorstw. Rozwiązaniem tego problemu jest rezygnacja z tradycyjnej architektury klient-serwer na rzecz architektury sieci nakładkowej (Peer-to-Peer), w której koszty utrzymania dzielone są pomiędzy klientów takiej sieci. Praca ta przedstawia koncepcję wdrożenia mechanizmu wyszukiwania przez podanie przykładu w architekturach sieci nakładkowych. Autor identyfikuje i rozwiązuje problemy napotkanie przy wdrażaniu takiej usługi i dowodzi, że jakość takiego rozwiązania pod względem dokładności wyszukiwania nie ustępuje rozwiązaniu scentralizowanemu.pełny teks

    Performance analysis of a query by example image search method in peer to peer overlays ph. d. thesis /

    No full text
    Tyt. z ekranu tytułowego.Praca doktorska. Akademia Górniczo-Hutnicza im. Stanisława Staszica (Kraków), 2011.Zawiera bibliogr.Dostępna także w wersji drukowanej.Tryb dostępu: Internet.Motivation and Goal of the Research, Concept of the P2P QbE System, P2P Architectures, Client-Server Architecture, Centralised, Unstructured, Hybrid, Structured P2P, Metadata Management, Metadata Systems, Dublin Core, MPEG-7, Search Methods, Architectures of Metadata, Classification Based on Input Method, Classification of Search Methods Based on Complexity, Advanced Search Methods, Users, Search Benchmarking, Benchmarked Parameters, Search Accuracy Benchmarking, Simulation Tools, Image Database, Measurement of QbE Accuracy in Local Database, Measurement Methodology, QbE Methods, Description of the Experiment, Application of QbE in an Unstructured P2P Overlay, Implementation of the QbE Service, File Distribution, Popularity, Simulation Setup, Application of QbE in a Structured P2P Overlay, Routing in CAN Overlay, Implementation of the QbE Service in the CAN Overlay, Simulation Setup, Comparision of QbE in Structured and Unstructured P2P Overlay

    An Efficient Approach to Face Emotion Recognition with Convolutional Neural Networks

    No full text
    Solutions for emotion recognition are becoming more popular every year, especially with the growth of computer vision. In this paper, classification of emotions is conducted based on images processed with convolutional neural networks (CNNs). Several models are proposed, both custom and transfer learning types. Furthermore, combinations of them as ensembles, alongside various methods of dataset modification, are presented. In the beginning, the models were tested on the original FER2013 dataset. Then, dataset filtering and augmentation were introduced, and the models were retrained accordingly. Two methods of emotion classification were examined: a multi-class classification, and a binary classification. In the former approach, the model returns the probability for each class. In the latter, separate models for each single class are prepared, together with an adequate dataset based on FER2013. Each model recognizes a single emotion from the others. The obtained results and a comparison of the applied methods across different models is presented and discussed

    Automated Detection of Firearms and Knives in a CCTV Image

    No full text
    Closed circuit television systems (CCTV) are becoming more and more popular and are being deployed in many offices, housing estates and in most public spaces. Monitoring systems have been implemented in many European and American cities. This makes for an enormous load for the CCTV operators, as the number of camera views a single operator can monitor is limited by human factors. In this paper, we focus on the task of automated detection and recognition of dangerous situations for CCTV systems. We propose algorithms that are able to alert the human operator when a firearm or knife is visible in the image. We have focused on limiting the number of false alarms in order to allow for a real-life application of the system. The specificity and sensitivity of the knife detection are significantly better than others published recently. We have also managed to propose a version of a firearm detection algorithm that offers a near-zero rate of false alarms. We have shown that it is possible to create a system that is capable of an early warning in a dangerous situation, which may lead to faster and more effective response times and a reduction in the number of potential victims
    corecore