13 research outputs found

    Taming of Monsters: The Postdramatic Case for Copenhagen

    Get PDF
    Analysis of Michael Frayn\u27s manipulation of perspective in his works, the implications of a postdramatic interpretation of Copenhagen, the production process of the show, and reflections on the performance

    Multi-Object Tracking in Heterogeneous environments (MOTHe) for animal video recordings

    Get PDF
    Aerial imagery and video recordings of animals are used for many areas of research such as animal behaviour, behavioural neuroscience and field biology. Many automated methods are being developed to extract data from such high-resolution videos. Most of the available tools are developed for videos taken under idealised laboratory conditions. Therefore, the task of animal detection and tracking for videos taken in natural settings remains challenging due to heterogeneous environments. Methods that are useful for field conditions are often difficult to implement and thus remain inaccessible to empirical researchers. To address this gap, we present an open-source package called Multi-Object Tracking in Heterogeneous environments (MOTHe), a Python-based application that uses a basic convolutional neural network for object detection. MOTHe offers a graphical interface to automate the various steps related to animal tracking such as training data generation, animal detection in complex backgrounds and visually tracking animals in the videos. Users can also generate training data and train a new model which can be used for object detection tasks for a completely new dataset. MOTHe doesn’t require any sophisticated infrastructure and can be run on basic desktop computing units. We demonstrate MOTHe on six video clips in varying background conditions. These videos are from two species in their natural habitat—wasp colonies on their nests (up to 12 individuals per colony) and antelope herds in four different habitats (up to 156 individuals in a herd). Using MOTHe, we are able to detect and track individuals in all these videos. MOTHe is available as an open-source GitHub repository with a detailed user guide and demonstrations at: https://github.com/tee-lab/MOTHe-GUI

    Portable and Secure Medical Data Management System (semester?), IPRO 304: Portable and Secure Medical Data Management System IPRO 304 IPRO Day Presentation Sp06

    No full text
    The goal of this project is to design software to support the secure use of portable memory as a medium for transferring secure data. Envision yourself carrying around sensitive data (e.g., passwords, account numbers) on a flash drive that: 1. is secure from unauthorized access, and 2. will not attack another machine on installation (e.g., with a virus). A flash drive is initialized to contain user data as well as an application that allows these data to be manipulated in a consistent way by various entities. Depending on the entity, different data are visible and changeable.Deliverables for IPRO 304: Portable and Secure Medical Data Management System for the Fall 2006 semeste

    Portable and Secure Medical Data Management System (semester?), IPRO 304

    No full text
    The goal of this project is to design software to support the secure use of portable memory as a medium for transferring secure data. Envision yourself carrying around sensitive data (e.g., passwords, account numbers) on a flash drive that: 1. is secure from unauthorized access, and 2. will not attack another machine on installation (e.g., with a virus). A flash drive is initialized to contain user data as well as an application that allows these data to be manipulated in a consistent way by various entities. Depending on the entity, different data are visible and changeable.Deliverables for IPRO 304: Portable and Secure Medical Data Management System for the Fall 2006 semeste

    Portable and Secure Medical Data Management System (semester?), IPRO 304: Portable and Secure Medical Data Management System IPRO 304 Poster Sp06

    No full text
    The goal of this project is to design software to support the secure use of portable memory as a medium for transferring secure data. Envision yourself carrying around sensitive data (e.g., passwords, account numbers) on a flash drive that: 1. is secure from unauthorized access, and 2. will not attack another machine on installation (e.g., with a virus). A flash drive is initialized to contain user data as well as an application that allows these data to be manipulated in a consistent way by various entities. Depending on the entity, different data are visible and changeable.Deliverables for IPRO 304: Portable and Secure Medical Data Management System for the Fall 2006 semeste

    Portable and Secure Medical Data Management System (semester?), IPRO 304: Portable and Secure Medical Data Management System IPRO 304 Final Report Sp06

    No full text
    The goal of this project is to design software to support the secure use of portable memory as a medium for transferring secure data. Envision yourself carrying around sensitive data (e.g., passwords, account numbers) on a flash drive that: 1. is secure from unauthorized access, and 2. will not attack another machine on installation (e.g., with a virus). A flash drive is initialized to contain user data as well as an application that allows these data to be manipulated in a consistent way by various entities. Depending on the entity, different data are visible and changeable.Deliverables for IPRO 304: Portable and Secure Medical Data Management System for the Fall 2006 semeste

    Portable and Secure Medical Data Management System (semester?), IPRO 304: Portable and Secure Medical Data Management System IPRO 304 Abstract Sp06

    No full text
    The goal of this project is to design software to support the secure use of portable memory as a medium for transferring secure data. Envision yourself carrying around sensitive data (e.g., passwords, account numbers) on a flash drive that: 1. is secure from unauthorized access, and 2. will not attack another machine on installation (e.g., with a virus). A flash drive is initialized to contain user data as well as an application that allows these data to be manipulated in a consistent way by various entities. Depending on the entity, different data are visible and changeable.Deliverables for IPRO 304: Portable and Secure Medical Data Management System for the Fall 2006 semeste
    corecore