WorldWideScience

Sample records for video copy protection

  1. Robust Adaptable Video Copy Detection

    DEFF Research Database (Denmark)

    Assent, Ira; Kremer, Hardy

    2009-01-01

    Video copy detection should be capable of identifying video copies subject to alterations e.g. in video contrast or frame rates. We propose a video copy detection scheme that allows for adaptable detection of videos that are altered temporally (e.g. frame rate change) and/or visually (e.g. change...... in contrast). Our query processing combines filtering and indexing structures for efficient multistep computation of video copies under this model. We show that our model successfully identifies altered video copies and does so more reliably than existing models....

  2. TNO at TRECVID 2008, Combining Audio and Video Fingerprinting for Robust Copy Detection

    NARCIS (Netherlands)

    Doets, P.J.; Eendebak, P.T.; Ranguelova, E.; Kraaij, W.

    2009-01-01

    TNO has evaluated a baseline audio and a video fingerprinting system based on robust hashing for the TRECVID 2008 copy detection task. We participated in the audio, the video and the combined audio-video copy detection task. The audio fingerprinting implementation clearly outperformed the video

  3. Privacy-protecting video surveillance

    Science.gov (United States)

    Wickramasuriya, Jehan; Alhazzazi, Mohanned; Datt, Mahesh; Mehrotra, Sharad; Venkatasubramanian, Nalini

    2005-02-01

    Forms of surveillance are very quickly becoming an integral part of crime control policy, crisis management, social control theory and community consciousness. In turn, it has been used as a simple and effective solution to many of these problems. However, privacy-related concerns have been expressed over the development and deployment of this technology. Used properly, video cameras help expose wrongdoing but typically come at the cost of privacy to those not involved in any maleficent activity. This work describes the design and implementation of a real-time, privacy-protecting video surveillance infrastructure that fuses additional sensor information (e.g. Radio-frequency Identification) with video streams and an access control framework in order to make decisions about how and when to display the individuals under surveillance. This video surveillance system is a particular instance of a more general paradigm of privacy-protecting data collection. In this paper we describe in detail the video processing techniques used in order to achieve real-time tracking of users in pervasive spaces while utilizing the additional sensor data provided by various instrumented sensors. In particular, we discuss background modeling techniques, object tracking and implementation techniques that pertain to the overall development of this system.

  4. Watermarking scar as an ultimate copy protection

    Science.gov (United States)

    Braci, Sofiane; Miraoui, Abdelkader; Delpha, Claude; Boyer, Rémy

    2010-02-01

    Strong and powerful attacks are able to make the watermark extraction impossible even if there is some watermarking. In this work, we call this residual information the scar and we use it to prove the existence of an attacked watermark. We evaluate the Scar by the mutual information between the embedded watermark and the attacked copies. It is well known that the mutual information between two random variables gives an evaluation of the shared information between the two variables. Thus, the attack can compromise the correct decoding by removing partialy the watermarking information. However, it is possible to make the watermarking existence proof possible when the mutual information between the embedded message and the attacked copies is above a certain threshold. We propose a practical way to use the scar by measuring the correlation between the attacked watermark and the original one.

  5. What is Worth Copying is Worth Protecting

    DEFF Research Database (Denmark)

    Teilmann-Lock, Stina

    2012-01-01

    A Danish Supreme Court decision from 1907 (U.07.619) - involving a classic Royal Porcelain coffee pot designed by Arnold Krogh - affirmed that there was no protection under Danish copyright law for a work of applied art. The following year the Danish Government changed the copyright act......, and the Danish design industry has since enjoyed legal protection. This chapter is a study of the ways in which Danish courts have, over the past hundred years, interpreted copyright law so as to extend legal protection to radical and experimental design objects, unimagined in 1908....

  6. What is Worth Copying is Worth Protecting

    DEFF Research Database (Denmark)

    Teilmann-Lock, Stina

    2012-01-01

    , and the Danish design industry has since enjoyed legal protection. This chapter is a study of the ways in which Danish courts have, over the past hundred years, interpreted copyright law so as to extend legal protection to radical and experimental design objects, unimagined in 1908.......A Danish Supreme Court decision from 1907 (U.07.619) - involving a classic Royal Porcelain coffee pot designed by Arnold Krogh - affirmed that there was no protection under Danish copyright law for a work of applied art. The following year the Danish Government changed the copyright act...

  7. What is Worth Copying is Worth Protecting

    DEFF Research Database (Denmark)

    Teilmann-Lock, Stina

    2012-01-01

    A Danish Supreme Court decision from 1907 (U.07.619) - involving a classic Royal Porcelain coffee pot designed by Arnold Krogh - affirmed that there was no protection under Danish copyright law for a work of applied art. The following year the Danish Government changed the copyright act, and the ......A Danish Supreme Court decision from 1907 (U.07.619) - involving a classic Royal Porcelain coffee pot designed by Arnold Krogh - affirmed that there was no protection under Danish copyright law for a work of applied art. The following year the Danish Government changed the copyright act...

  8. Detection and localization of copy-paste forgeries in digital videos.

    Science.gov (United States)

    Singh, Raahat Devender; Aggarwal, Naveen

    2017-12-01

    Amidst the continual march of technology, we find ourselves relying on digital videos to proffer visual evidence in several highly sensitive areas such as journalism, politics, civil and criminal litigation, and military and intelligence operations. However, despite being an indispensable source of information with high evidentiary value, digital videos are also extremely vulnerable to conscious manipulations. Therefore, in a situation where dependence on video evidence is unavoidable, it becomes crucial to authenticate the contents of this evidence before accepting them as an accurate depiction of reality. Digital videos can suffer from several kinds of manipulations, but perhaps, one of the most consequential forgeries is copy-paste forgery, which involves insertion/removal of objects into/from video frames. Copy-paste forgeries alter the information presented by the video scene, which has a direct effect on our basic understanding of what that scene represents, and so, from a forensic standpoint, the challenge of detecting such forgeries is especially significant. In this paper, we propose a sensor pattern noise based copy-paste detection scheme, which is an improved and forensically stronger version of an existing noise-residue based technique. We also study a demosaicing artifact based image forensic scheme to estimate the extent of its viability in the domain of video forensics. Furthermore, we suggest a simplistic clustering technique for the detection of copy-paste forgeries, and determine if it possess the capabilities desired of a viable and efficacious video forensic scheme. Finally, we validate these schemes on a set of realistically tampered MJPEG, MPEG-2, MPEG-4, and H.264/AVC encoded videos in a diverse experimental set-up by varying the strength of post-production re-compressions and transcodings, bitrates, and sizes of the tampered regions. Such an experimental set-up is representative of a neutral testing platform and simulates a real

  9. A comprehensive Software Copy Protection and Digital Rights Management platform

    Directory of Open Access Journals (Sweden)

    Ayman Mohammad Bahaa-Eldin

    2014-09-01

    Full Text Available This article proposes a Powerful and Flexible System for Software Copy Protection (SCP and Digital Rights Management (DRM based on Public Key Infrastructure (PKI standards. Software protection is achieved through a multi-phase methodology with both static and dynamic processing of the executable file. The system defeats most of the attacks and cracking techniques and makes sure that the protected software is never in a flat form, with a suitable portion of it always being encrypted during execution. A novel performance-tuning algorithm is proposed to lower the overhead of the protection process to its minimum depending on the software dynamic execution behavior. All system calls to access resources and objects such as files, and input/output devices are intercepted and encapsulated with secure rights management code to enforce the required license model. The system can be integrated with hardware authentication techniques (like dongles, and to Internet based activation and DRM servers over the cloud. The system is flexible to apply any model of licensing including state-based license such as expiration dates and number of trials. The usage of a standard markup language (XrML to describe the license makes it easier to apply new licensing operations like re-sale and content rental.

  10. Towards a Video Passive Content Fingerprinting Method for Partial-Copy Detection Robust against Non-Simulated Attacks.

    Directory of Open Access Journals (Sweden)

    Zobeida Jezabel Guzman-Zavaleta

    Full Text Available Passive content fingerprinting is widely used for video content identification and monitoring. However, many challenges remain unsolved especially for partial-copies detection. The main challenge is to find the right balance between the computational cost of fingerprint extraction and fingerprint dimension, without compromising detection performance against various attacks (robustness. Fast video detection performance is desirable in several modern applications, for instance, in those where video detection involves the use of large video databases or in applications requiring real-time video detection of partial copies, a process whose difficulty increases when videos suffer severe transformations. In this context, conventional fingerprinting methods are not fully suitable to cope with the attacks and transformations mentioned before, either because the robustness of these methods is not enough or because their execution time is very high, where the time bottleneck is commonly found in the fingerprint extraction and matching operations. Motivated by these issues, in this work we propose a content fingerprinting method based on the extraction of a set of independent binary global and local fingerprints. Although these features are robust against common video transformations, their combination is more discriminant against severe video transformations such as signal processing attacks, geometric transformations and temporal and spatial desynchronization. Additionally, we use an efficient multilevel filtering system accelerating the processes of fingerprint extraction and matching. This multilevel filtering system helps to rapidly identify potential similar video copies upon which the fingerprint process is carried out only, thus saving computational time. We tested with datasets of real copied videos, and the results show how our method outperforms state-of-the-art methods regarding detection scores. Furthermore, the granularity of our method makes

  11. Copy Protection in Jet Set Willy: developing methodology for retrogame archaeology

    Directory of Open Access Journals (Sweden)

    John Aycock

    2017-04-01

    Full Text Available Video games, and more generally computer games, are unquestionably technological artefacts that have cultural significance. Old computer games in particular had to function under technical constraints that would be alien to many modern programmers, while at the same time providing something novel and at first foreign to consumers. How did their creators accomplish their technical feats, and what impact did that have for the player-consumer? The study of 'retro' computer games' implementation is one topic within the nascent area of archaeogaming. Digital rights management (DRM continues to be a major issue in the protection and distribution of content in electronic form. In this article, we study an early example of the implementation of copy protection in the 1984 game Jet Set Willy, something that comprises both physical and digital artefacts. It acts as a vehicle to illustrate a number of methods that we used to understand game implementation, culminating in a full reconstruction of the technique. The methods we cover include: 'traditional' research, along with its limitations in this context; code and data analysis; hypothesis testing; reconstruction. Through this positivist experimental approach, our results are both independently verifiable and repeatable. We also approach the complex context of early DRM, its hacks and workarounds by the player community, and what precipitated the design choices made for this particular game.

  12. A Reusable Software Copy Protection Using Hash Result and Asymetrical Encryption

    Directory of Open Access Journals (Sweden)

    Aswin Wibisurya

    2014-12-01

    Full Text Available Desktop application is one of the most popular types of application being used in computer due to the one time install simplicity and the quick accessibility from the moment the computer being turned on. Limitation of the copy and usage of desktop applications has long been an important issue to application providers. For security concerns, software copy protection is usually integrated with the application. However, developers seek to reuse the copy protection component of the software. This paper proposes an approach of reusable software copy protection which consists of a certificate validator on the client computer and a certificate generator on the server. The certificate validator integrity is protected using hashing result while all communications are encrypted using asymmetrical encryption to ensure the security of this approach.

  13. Protection of Video Packets over a Wireless Rayleigh Fading Link: FEC versus ARQ

    Directory of Open Access Journals (Sweden)

    Marc Moeneclaey

    2008-07-01

    Full Text Available Video content can be provided to an end user by transmitting video data as a sequence of internet protocol (IP packets over the network. When the network contains a wireless link, packet erasures occur because of occasional deep fades. In order to maintain a sufficient video quality at the end user, video packets must be protected against erasures by means of a suitable form of error control. In this contribution, we investigate two types of error control: (1 forward error correction (FEC, which involves the transmission of parity packets that enables recovery of a limited number of erased video packets, and (2 the use of an automatic repeat request (ARQ protocol, where the receiver requests the retransmission of video packets that have been erased. We point out that FEC and ARQ considerably reduce the probability of unrecoverable packet loss, because both error control techniques provide a diversity gain, as compared to the case where no protection against erasures is applied. We derive a simple analytical expression for the diversity gain resulting from FEC or ARQ, in terms of the channel coherence time, the allowable latency, and (for FEC the allowable overhead or (for ARQ the time interval between (retransmissions of copies of a same packet. In the case of HDTV transmission over a 60 GHz indoor wireless link, ARQ happens to outperform FEC.

  14. Video Waterscrambling: Towards a Video Protection Scheme Based on the Disturbance of Motion Vectors

    Science.gov (United States)

    Bodo, Yann; Laurent, Nathalie; Laurent, Christophe; Dugelay, Jean-Luc

    2004-12-01

    With the popularity of high-bandwidth modems and peer-to-peer networks, the contents of videos must be highly protected from piracy. Traditionally, the models utilized to protect this kind of content are scrambling and watermarking. While the former protects the content against eavesdropping (a priori protection), the latter aims at providing a protection against illegal mass distribution (a posteriori protection). Today, researchers agree that both models must be used conjointly to reach a sufficient level of security. However, scrambling works generally by encryption resulting in an unintelligible content for the end-user. At the moment, some applications (such as e-commerce) may require a slight degradation of content so that the user has an idea of the content before buying it. In this paper, we propose a new video protection model, called waterscrambling, whose aim is to give such a quality degradation-based security model. This model works in the compressed domain and disturbs the motion vectors, degrading the video quality. It also allows embedding of a classical invisible watermark enabling protection against mass distribution. In fact, our model can be seen as an intermediary solution to scrambling and watermarking.

  15. Video Waterscrambling: Towards a Video Protection Scheme Based on the Disturbance of Motion Vectors

    Directory of Open Access Journals (Sweden)

    Yann Bodo

    2004-10-01

    Full Text Available With the popularity of high-bandwidth modems and peer-to-peer networks, the contents of videos must be highly protected from piracy. Traditionally, the models utilized to protect this kind of content are scrambling and watermarking. While the former protects the content against eavesdropping (a priori protection, the latter aims at providing a protection against illegal mass distribution (a posteriori protection. Today, researchers agree that both models must be used conjointly to reach a sufficient level of security. However, scrambling works generally by encryption resulting in an unintelligible content for the end-user. At the moment, some applications (such as e-commerce may require a slight degradation of content so that the user has an idea of the content before buying it. In this paper, we propose a new video protection model, called waterscrambling, whose aim is to give such a quality degradation-based security model. This model works in the compressed domain and disturbs the motion vectors, degrading the video quality. It also allows embedding of a classical invisible watermark enabling protection against mass distribution. In fact, our model can be seen as an intermediary solution to scrambling and watermarking.

  16. An intelligent video framework for homeland protection

    Science.gov (United States)

    Tu, Peter H.; Doretto, Gianfranco; Krahnstoever, Nils O.; Perera, A. G. Amitha; Wheeler, Frederick W.; Liu, Xiaoming; Rittscher, Jens; Sebastian, Thomas B.; Yu, Ting; Harding, Kevin G.

    2007-04-01

    This paper presents an overview of Intelligent Video work currently under development at the GE Global Research Center and other research institutes. The image formation process is discussed in terms of illumination, methods for automatic camera calibration and lessons learned from machine vision. A variety of approaches for person detection are presented. Crowd segmentation methods enabling the tracking of individuals through dense environments such as retail and mass transit sites are discussed. It is shown how signature generation based on gross appearance can be used to reacquire targets as they leave and enter disjoint fields of view. Camera calibration information is used to further constrain the detection of people and to synthesize a top-view, which fuses all camera views into a composite representation. It is shown how site-wide tracking can be performed in this unified framework. Human faces are an important feature as both a biometric identifier and as a method for determining the focus of attention via head pose estimation. It is shown how automatic pan-tilt- zoom control; active shape/appearance models and super-resolution methods can be used to enhance the face capture and analysis problem. A discussion of additional features that can be used for inferring intent is given. These include body-part motion cues and physiological phenomena such as thermal images of the face.

  17. Reducing video-quality fluctuations for streaming scalable video using unequal error protection, retransmission, and interleaving.

    Science.gov (United States)

    Gan, Tong; Gan, Lu; Ma, Kai-Kuang

    2006-04-01

    Forward error correction based multiple description (MD-FEC) transcoding for transmitting embedded bitstream over the packet erasure networks has been extensively studied in the past. In the existing work, a single embedded source bitstream, e.g., the bitstream of a group of pictures (GOP) encoded using three-dimensional set partitioning in hierarchical trees is optimally protected unequal error protection (UEP) in the rate-distortion sense. However, most of the previous work on transmitting embedded video using MD-FEC assumed that one GOP is transmitted only once, and did not consider the chance of retransmission. This may lead to noticeable video quality variations due to varying channel conditions. In this paper, a novel window-based packetization scheme is proposed, which combats bursty packet loss by combining the following three techniques: UEP, retransmission, and GOP-level interleaving. In particular, two retransmission mechanisms, namely segment-wise retransmission and byte-wise retransmission, are proposed based on different types of receiver feedback. Moreover, two levels of rate allocations are introduced: intra-GOP rate allocation minimizes the distortion of individual GOP; while inter-GOP rate allocation intends to reduce video quality fluctuations by adaptively allocating bandwidth according to video signal characteristics and client buffer status. In this way, more consistent video quality can be achieved under various packet loss probabilities, as demonstrated by our experimental results.

  18. Tools for Protecting the Privacy of Specific Individuals in Video

    Directory of Open Access Journals (Sweden)

    Chen Datong

    2007-01-01

    Full Text Available This paper presents a system for protecting the privacy of specific individuals in video recordings. We address the following two problems: automatic people identification with limited labeled data, and human body obscuring with preserved structure and motion information. In order to address the first problem, we propose a new discriminative learning algorithm to improve people identification accuracy using limited training data labeled from the original video and imperfect pairwise constraints labeled from face obscured video data. We employ a robust face detection and tracking algorithm to obscure human faces in the video. Our experiments in a nursing home environment show that the system can obtain a high accuracy of people identification using limited labeled data and noisy pairwise constraints. The study result indicates that human subjects can perform reasonably well in labeling pairwise constraints with the face masked data. For the second problem, we propose a novel method of body obscuring, which removes the appearance information of the people while preserving rich structure and motion information. The proposed approach provides a way to minimize the risk of exposing the identities of the protected people while maximizing the use of the captured data for activity/behavior analysis.

  19. PET protection optimization for streaming scalable videos with multiple transmissions.

    Science.gov (United States)

    Xiong, Ruiqin; Taubman, David S; Sivaraman, Vijay

    2013-11-01

    This paper investigates priority encoding transmission (PET) protection for streaming scalably compressed video streams over erasure channels, for the scenarios where a small number of retransmissions are allowed. In principle, the optimal protection depends not only on the importance of each stream element, but also on the expected channel behavior. By formulating a collection of hypotheses concerning its own behavior in future transmissions, limited-retransmission PET (LR-PET) effectively constructs channel codes spanning multiple transmission slots and thus offers better protection efficiency than the original PET. As the number of transmission opportunities increases, the optimization for LR-PET becomes very challenging because the number of hypothetical retransmission paths increases exponentially. As a key contribution, this paper develops a method to derive the effective recovery-probability versus redundancy-rate characteristic for the LR-PET procedure with any number of transmission opportunities. This significantly accelerates the protection assignment procedure in the original LR-PET with only two transmissions, and also makes a quick and optimal protection assignment feasible for scenarios where more transmissions are possible. This paper also gives a concrete proof to the redundancy embedding property of the channel codes formed by LR-PET, which allows for a decoupled optimization for sequentially dependent source elements with convex utility-length characteristic. This essentially justifies the source-independent construction of the protection convex hull for LR-PET.

  20. Adaptive Transformation for Robust Privacy Protection in Video Surveillance

    Directory of Open Access Journals (Sweden)

    Mukesh Saini

    2012-01-01

    Full Text Available Privacy is a big concern in current video surveillance systems. Due to privacy issues, many strategic places remain unmonitored leading to security threats. The main problem with existing privacy protection methods is that they assume availability of accurate region of interest (RoI detectors that can detect and hide the privacy sensitive regions such as faces. However, the current detectors are not fully reliable, leading to breaches in privacy protection. In this paper, we propose a privacy protection method that adopts adaptive data transformation involving the use of selective obfuscation and global operations to provide robust privacy even with unreliable detectors. Further, there are many implicit privacy leakage channels that have not been considered by researchers for privacy protection. We block both implicit and explicit channels of privacy leakage. Experimental results show that the proposed method incurs 38% less distortion of the information needed for surveillance in comparison to earlier methods of global transformation; while still providing near-zero privacy loss.

  1. Streaming Video Games: Copyright Infringement or Protected Speech?

    Directory of Open Access Journals (Sweden)

    Eirik Evert Elias Jungar

    2016-12-01

    Full Text Available Streaming video games, that is, live broadcasting playing video games on the internet, is incredibly popular. Millions tune into twitch.tv daily to watch eSport tournaments, their favourite streamer, and chat with other viewers. But all is not rosy in the world of streaming games. Recently, some game developers have aggressively exercised their copyright to, firstly, claim part of the streamers’ revenue, and secondly, control the context in which their game is shown. The article analyzes whether game developers have, and should have, such rights under EU copyright law. Reaching the conclusion that video game streams infringe the game developer’s right to communicate their works to the public, I argue that freedom of expression can and should be used to rein in their rights in certain cases. Subjecting the lawfulness of streams to game developers’ good will risks stifling the expressions of streamers. The streamers, their audience, and even the copyright holders, would be worse off for it.

  2. Error Protection of Wavelet Scalable Video Streaming Using Wyner-Ziv Technique over a Lossy Network

    Science.gov (United States)

    Liu, Benjian; Xu, Ke

    This paper presents a novel error resilience scheme for wavelet scalable video coding. We use Wyner-Ziv codec to produce extra bits protecting the important parts of the embedded video streaming. At the same time these bits also as the second description of important parts are transmitted over auxiliary channel to the receiver for error resilience. The errors in the embedded video streaming can be corrected by Wyner-Ziv description which regards the decoded frame as side information. Moreover, Wyner-Ziv decoder utilizes a coarse estimated version of the corrupted parts exploiting frame correlation in wavelet video decoder to generate a refine version. Simulation results show that our proposed method can achieve much better performance compared with Forward Error Correction code. Meanwhile, this error resilient algorithm can achieve 2-3 dB PSNR gains over the motion compensation error concealment.

  3. A recombinant rabies virus encoding two copies of the glycoprotein gene confers protection in dogs against a virulent challenge.

    Science.gov (United States)

    Liu, Xiaohui; Yang, Youtian; Sun, Zhaojin; Chen, Jing; Ai, Jun; Dun, Can; Fu, Zhen F; Niu, Xuefeng; Guo, Xiaofeng

    2014-01-01

    The rabies virus (RABV) glycoprotein (G) is the principal antigen responsible for the induction of virus neutralizing antibodies (VNA) and is the major modality of protective immunity in animals. A recombinant RABV HEP-Flury strain was generated by reverse genetics to encode two copies of the G-gene (referred to as HEP-dG). The biological properties of HEP-dG were compared to those of the parental virus (HEP-Flury strain). The HEP-dG recombinant virus grew 100 times more efficiently in BHK-21 cell than the parental virus, yet the virulence of the dG recombinant virus in suckling mice was lower than the parental virus. The HEP-dG virus can improve the expression of G-gene mRNA and the G protein and produce more offspring viruses in cells. The amount of G protein revealed a positive relationship with immunogenicity in mice and dogs. The inactivated HEP-dG recombinant virus induced higher levels of VNA and conferred better protection against virulent RABV in mice and dogs than the inactivated parental virus and a commercial vaccine. The protective antibody persisted for at least 12 months. These data demonstrate that the HEP-dG is stable, induces a strong VNA response and confers protective immunity more effectively than the RABV HEP-Flury strain. HEP-dG could be a potential candidate in the development of novel inactivated rabies vaccines.

  4. Distributed video streaming using multiple description coding and unequal error protection.

    Science.gov (United States)

    Kim, Joohee; Mersereau, Russell M; Altunbasak, Yucel

    2005-07-01

    This paper presents a distributed video streaming framework using unbalanced multiple description coding (MDC) and unequal error protection. In the proposed video streaming framework, two senders simultaneously stream complementary descriptions to a single receiver over different paths. To minimize the overall distortion and exploit the benefits of multipath transport when the characteristics of each path are different, an unbalanced MDC method for wavelet-based coders combined with a TCP-friendly rate allocation algorithm is proposed. The proposed rate allocation algorithm adjusts the transmission rates and the channel coding rates for all senders in a coordinated fashion to minimize the overall distortion. Simulation results show that the proposed unbalanced MDC combined with our rate allocation algorithm achieves about 1-6 dB higher peal signal-to-noise ratio compared to conventional balanced MDC when the available bandwidths along the two paths are different under time-varying network conditions.

  5. Error protection and interleaving for wireless transmission of JPEG 2000 images and video.

    Science.gov (United States)

    Baruffa, Giuseppe; Micanti, Paolo; Frescura, Fabrizio

    2009-02-01

    The transmission of JPEG 2000 images or video over wireless channels has to cope with the high probability and burstyness of errors introduced by Gaussian noise, linear distortions, and fading. At the receiver side, there is distortion due to the compression performed at the sender side, and to the errors introduced in the data stream by the channel. Progressive source coding can also be successfully exploited to protect different portions of the data stream with different channel code rates, based upon the relative importance that each portion has on the reconstructed image. Unequal Error Protection (UEP) schemes are generally adopted, which offer a close to the optimal solution. In this paper, we present a dichotomic technique for searching the optimal UEP strategy, which lends ideas from existing algorithms, for the transmission of JPEG 2000 images and video over a wireless channel. Moreover, we also adopt a method of virtual interleaving to be used for the transmission of high bit rate streams over packet loss channels, guaranteeing a large PSNR advantage over a plain transmission scheme. These two protection strategies can also be combined to maximize the error correction capabilities.

  6. Unequal Protection of Video Streaming through Adaptive Modulation with a Trizone Buffer over Bluetooth Enhanced Data Rate

    Directory of Open Access Journals (Sweden)

    Rouzbeh Razavi

    2007-12-01

    Full Text Available Bluetooth enhanced data rate wireless channel can support higher-quality video streams compared to previous versions of Bluetooth. Packet loss when transmitting compressed data has an effect on the delivered video quality that endures over multiple frames. To reduce the impact of radio frequency noise and interference, this paper proposes adaptive modulation based on content type at the video frame level and content importance at the macroblock level. Because the bit rate of protected data is reduced, the paper proposes buffer management to reduce the risk of buffer overflow. A trizone buffer is introduced, with a varying unequal protection policy in each zone. Application of this policy together with adaptive modulation results in up to 4 dB improvement in objective video quality compared to fixed rate scheme for an additive white Gaussian noise channel and around 10 dB for a Gilbert-Elliott channel. The paper also reports a consistent improvement in video quality over a scheme that adapts to channel conditions by varying the data rate without accounting for the video frame packet type or buffer congestion.

  7. Unequal Protection of Video Streaming through Adaptive Modulation with a Trizone Buffer over Bluetooth Enhanced Data Rate

    Directory of Open Access Journals (Sweden)

    Razavi Rouzbeh

    2008-01-01

    Full Text Available Abstract Bluetooth enhanced data rate wireless channel can support higher-quality video streams compared to previous versions of Bluetooth. Packet loss when transmitting compressed data has an effect on the delivered video quality that endures over multiple frames. To reduce the impact of radio frequency noise and interference, this paper proposes adaptive modulation based on content type at the video frame level and content importance at the macroblock level. Because the bit rate of protected data is reduced, the paper proposes buffer management to reduce the risk of buffer overflow. A trizone buffer is introduced, with a varying unequal protection policy in each zone. Application of this policy together with adaptive modulation results in up to 4 dB improvement in objective video quality compared to fixed rate scheme for an additive white Gaussian noise channel and around 10 dB for a Gilbert-Elliott channel. The paper also reports a consistent improvement in video quality over a scheme that adapts to channel conditions by varying the data rate without accounting for the video frame packet type or buffer congestion.

  8. Optimal PET protection for streaming scalably compressed video streams with limited retransmission based on incomplete feedback.

    Science.gov (United States)

    Xiong, Ruiqin; Taubman, David; Sivaraman, Vijay

    2010-09-01

    For streaming scalably compressed video streams over unreliable networks, Limited-Retransmission Priority Encoding Transmission (LR-PET) outperforms PET remarkably since the opportunity to retransmit is fully exploited by hypothesizing the possible future retransmission behavior before the retransmission really occurs. For the retransmission to be efficient in such a scheme, it is critical to get adequate acknowledgment from a previous transmission before deciding what data to retransmit. However, in many scenarios, the presence of a stochastic packet delay process results in frequent late acknowledgements, while imperfect feedback channels can impair the server's knowledge of what the client has received. This paper proposes an extended LR-PET scheme, which optimizes PET-protection of transmitted bitstreams, recognizing that the received feedback information is likely to be incomplete. Similar to the original LR-PET, the behavior of future retransmissions is hypothesized in the optimization objective of each transmission opportunity. As the key contribution, we develop a method to efficiently derive the effective recovery probability versus redundancy rate characteristic for the extended LR-PET communication process. This significantly simplifies the ultimate protection assignment procedure. This paper also demonstrates the advantage of the proposed strategy over several alternative strategies.

  9. High Mitochondrial DNA Copy Number Is a Protective Factor From Vision Loss in Heteroplasmic Leber's Hereditary Optic Neuropathy (LHON).

    Science.gov (United States)

    Bianco, Angelica; Bisceglia, Luigi; Russo, Luciana; Palese, Luigi L; D'Agruma, Leonardo; Emperador, Sonia; Montoya, Julio; Guerriero, Silvana; Petruzzella, Vittoria

    2017-04-01

    Leber's hereditary optic neuropathy (LHON) is a mitochondrial disease that typically causes bilateral blindness in young men. It is characterized by as yet undisclosed genetic and environmental factors affecting the incomplete penetrance. We identified 27 LHON subjects who possess heteroplasmic primary LHON mutations. Mitochondrial DNA (mtDNA) copy number was evaluated. The presence of centrocecal scotoma, an edematous, hyperemic optic nerve head, and vascular tortuosity, as well as telangiectasia was recognized in affected subjects. We found higher cellular mtDNA content in peripheral blood cells of unaffected heteroplasmic mutation carriers with respect to the affected. The increase of cellular mtDNA content prevents complete loss of vision despite the presence of a heteroplasmic state of LHON primary mutation, suggesting that it is a key factor responsible for penetrance of LHON.

  10. Original Copies

    DEFF Research Database (Denmark)

    Sørensen, Tim Flohr

    2013-01-01

    This article explores inter-artefactual relations in the Nordic Bronze Age. Notions of copying and imitation have been dominant in the description of a number of bronze and flint artefacts from period I of the Nordic Bronze Age (ca. 1700–1500 BC). It has been argued that local bronze manufacturer...

  11. OPTIMISATION OF OCCUPATIONAL RADIATION PROTECTION IN IMAGE-GUIDED INTERVENTIONS: EXPLORING VIDEO RECORDINGS AS A TOOL IN THE PROCESS.

    Science.gov (United States)

    Almén, Anja; Sandblom, Viktor; Rystedt, Hans; von Wrangel, Alexa; Ivarsson, Jonas; Båth, Magnus; Lundh, Charlotta

    2016-06-01

    The overall purpose of this work was to explore how video recordings can contribute to the process of optimising occupational radiation protection in image-guided interventions. Video-recorded material from two image-guided interventions was produced and used to investigate to what extent it is conceivable to observe and assess dose-affecting actions in video recordings. Using the recorded material, it was to some extent possible to connect the choice of imaging techniques to the medical events during the procedure and, to a less extent, to connect these technical and medical issues to the occupational exposure. It was possible to identify a relationship between occupational exposure level to staff and positioning and use of shielding. However, detailed values of the dose rates were not possible to observe on the recordings, and the change in occupational exposure level from adjustments of exposure settings was not possible to identify. In conclusion, the use of video recordings is a promising tool to identify dose-affecting instances, allowing for a deeper knowledge of the interdependency between the management of the medical procedure, the applied imaging technology and the occupational exposure level. However, for a full information about the dose-affecting actions, the equipment used and the recording settings have to be thoroughly planned. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  12. Comprehensive Protection of Data-Partitioned Video for Broadband Wireless IPTV Streaming

    Directory of Open Access Journals (Sweden)

    Laith Al-Jobouri

    2012-01-01

    Full Text Available This paper examines the threat to video streaming from slow and fast fading, traffic congestion, and channel packet drops. The proposed response is a combination of: rateless channel coding, which is adaptively applied; data-partitioned source coding to exploit prioritized packetization; and duplicate slice provision, which is the focus of the evaluation in this paper. The paper also considers the distribution of intra-refresh macroblocks as a means of avoiding sudden data rate increases. When error bursts occur, this paper shows that duplicate slices are certainly necessary but this provision is more effective for medium quality video than it is for high quality video. The percentage of intra-refresh macroblocks can be low and still reduce the impact of temporal error propagation.

  13. Tunneling Horizontal IEC 61850 Traffic through Audio Video Bridging Streams for Flexible Microgrid Control and Protection

    Directory of Open Access Journals (Sweden)

    Michael Short

    2016-03-01

    Full Text Available In this paper, it is argued that some low-level aspects of the usual IEC 61850 mapping to Ethernet are not well suited to microgrids due to their dynamic nature and geographical distribution as compared to substations. It is proposed that the integration of IEEE time-sensitive networking (TSN concepts (which are currently implemented as audio video bridging (AVB technologies within an IEC 61850 / Manufacturing Message Specification framework provides a flexible and reconfigurable platform capable of overcoming such issues. A prototype test platform and bump-in-the-wire device for tunneling horizontal traffic through AVB are described. Experimental results are presented for sending IEC 61850 GOOSE (generic object oriented substation events and SV (sampled values messages through AVB tunnels. The obtained results verify that IEC 61850 event and sampled data may be reliably transported within the proposed framework with very low latency, even over a congested network. It is argued that since AVB streams can be flexibly configured from one or more central locations, and bandwidth reserved for their data ensuring predictability of delivery, this gives a solution which seems significantly more reliable than a pure MMS-based solution.

  14. Theoretical Framework for Evaluating Partial Checksum Protection in Wireless Video Streaming

    DEFF Research Database (Denmark)

    Korhonen, Jari; Forchhammer, Søren; Larsen, Knud J.

    2012-01-01

    The benefits of passing partially corrupted packets to the application instead of discarding them have been debated actively, since Lightweight User Data gram Protocol (UDP Lite) was introduced. UDP Lite allows partial check summing in order to omit bit errors in the non-critical part of the packet...... payload. Several studies have shown that data throughput over a link prone to bit errors can be significantly improved with partial check summing. However, the higher throughput comes at the cost of bit errors appearing in the non-critical parts of the payload. Therefore, the overall benefit depends...... highly on the capability of coping with errors at the application layer. In this paper, we present a theoretical framework for defining the optimal level of partial checksum protection, assuming that the bit error characteristics and the perceptual impact of bit errors appearing in the non...

  15. Re-thinking copyright through the copy in Russia

    NARCIS (Netherlands)

    Sezneva, O.

    2013-01-01

    How one copy of a film or a single is made illegal, while its identical twin is treated as legitimate? By drawing from the material collected in Russia on the illegal copying and distribution of video and musical contents, this paper moves beyond the definition of media piracy in legal terms, and

  16. Quantum copying: A review

    Directory of Open Access Journals (Sweden)

    Mark Hillery

    2000-07-01

    Full Text Available Quantum information is stored in two-level quantum systems known as qubits. The no-cloning theorem states that the state of an unknown qubit cannot be copied. This is in contrast to classical information which can be copied. If one drops the requirement that the copies be perfect it is possible to design quantum copiers. This paper presents a short review of the theory of quantum copying.

  17. Fingerprint multicast in secure video streaming.

    Science.gov (United States)

    Zhao, H Vicky; Liu, K J Ray

    2006-01-01

    Digital fingerprinting is an emerging technology to protect multimedia content from illegal redistribution, where each distributed copy is labeled with unique identification information. In video streaming, huge amount of data have to be transmitted to a large number of users under stringent latency constraints, so the bandwidth-efficient distribution of uniquely fingerprinted copies is crucial. This paper investigates the secure multicast of anticollusion fingerprinted video in streaming applications and analyzes their performance. We first propose a general fingerprint multicast scheme that can be used with most spread spectrum embedding-based multimedia fingerprinting systems. To further improve the bandwidth efficiency, we explore the special structure of the fingerprint design and propose a joint fingerprint design and distribution scheme. From our simulations, the two proposed schemes can reduce the bandwidth requirement by 48% to 87%, depending on the number of users, the characteristics of video sequences, and the network and computation constraints. We also show that under the constraint that all colluders have the same probability of detection, the embedded fingerprints in the two schemes have approximately the same collusion resistance. Finally, we propose a fingerprint drift compensation scheme to improve the quality of the reconstructed sequences at the decoder's side without introducing extra communication overhead.

  18. The Art of Copying

    DEFF Research Database (Denmark)

    Christensen, Hans Dam

    2017-01-01

    This article discusses copies within the field of art museums by way of mapping strategies for copy practices. This mapping leans heavily towards parts of the writings of Jacques Derrida (1930–2004). Against the backdrop of this theoretical premise, the article distinguishes five main strategies....... An informational copy is just as unique as an original object of art, and at the same time, it defines the original and is itself defined by this opposition. Lastly, the strategy for the imagined relation between original and copy follows. This strategy is dependent upon several of the previous approaches, and...

  19. Video-Based Learning vs Traditional Lecture for Instructing Emergency Medicine Residents in Disaster Medicine Principles of Mass Triage, Decontamination, and Personal Protective Equipment.

    Science.gov (United States)

    Curtis, Henry A; Trang, Karen; Chason, Kevin W; Biddinger, Paul D

    2018-01-10

    Introduction Great demands have been placed on disaster medicine educators. There is a need to develop innovative methods to educate Emergency Physicians in the ever-expanding body of disaster medicine knowledge. The authors sought to demonstrate that video-based learning (VBL) could be a promising alternative to traditional learning methods for teaching disaster medicine core competencies. Hypothesis/Problem The objective was to compare VBL to traditional lecture (TL) for instructing Emergency Medicine residents in the American College of Emergency Physicians (ACEP; Irving, Texas USA) disaster medicine core competencies of patient triage and decontamination. A randomized, controlled pilot study compared two methods of instruction for mass triage, decontamination, and personal protective equipment (PPE). Emergency Medicine resident learning was measured with a knowledge quiz, a Likert scale measuring comfort, and a practical exercise. An independent samples t-test compared the scoring of the VBL with the TL group. Twenty-six residents were randomized to VBL (n=13) or TL (n=13). Knowledge score improvement following video (14.9%) versus lecture (14.1%) did not differ significantly between the groups (P=.74). Comfort score improvement also did not differ (P=.64) between video (18.3%) and lecture groups (15.8%). In the practical skills assessment, the VBL group outperformed the TL group overall (70.4% vs 55.5%; PMedicine residents in the ACEP disaster medicine core competencies of patient triage and decontamination. Curtis HA , Trang K , Chason KW , Biddinger PD . Video-based learning vs traditional lecture for instructing emergency medicine residents in disaster medicine principles of mass triage, decontamination, and personal protective equipment.

  20. Video microblogging

    DEFF Research Database (Denmark)

    Bornoe, Nis; Barkhuus, Louise

    2010-01-01

    Microblogging is a recently popular phenomenon and with the increasing trend for video cameras to be built into mobile phones, a new type of microblogging has entered the arena of electronic communication: video microblogging. In this study we examine video microblogging, which is the broadcasting...... of short videos. A series of semi-structured interviews offers an understanding of why and how video microblogging is used and what the users post and broadcast....

  1. Copy-writing Post-Soviet Russia. Viktor Pelevin's work in Postcolonial Terms

    NARCIS (Netherlands)

    Noordenbos, Boris; Brouwer, S

    2008-01-01

    The copywriters and creatives in Viktor Pelevin's novel Generation "II" (1999) both 'copy' and 'write' Russian identity. Through advertising texts, video scripts, and written scenario's for Russia's stage-set democracy, the commercial elite makes Russia into a superficial and virtual copy of 'the

  2. Video demystified

    CERN Document Server

    Jack, Keith

    2004-01-01

    This international bestseller and essential reference is the "bible" for digital video engineers and programmers worldwide. This is by far the most informative analog and digital video reference available, includes the hottest new trends and cutting-edge developments in the field. Video Demystified, Fourth Edition is a "one stop" reference guide for the various digital video technologies. The fourth edition is completely updated with all new chapters on MPEG-4, H.264, SDTV/HDTV, ATSC/DVB, and Streaming Video (Video over DSL, Ethernet, etc.), as well as discussions of the latest standards throughout. The accompanying CD-ROM is updated to include a unique set of video test files in the newest formats. *This essential reference is the "bible" for digital video engineers and programmers worldwide *Contains all new chapters on MPEG-4, H.264, SDTV/HDTV, ATSC/DVB, and Streaming Video *Completely revised with all the latest and most up-to-date industry standards.

  3. Video games: good, bad, or other?

    Science.gov (United States)

    Prot, Sara; McDonald, Katelyn A; Anderson, Craig A; Gentile, Douglas A

    2012-06-01

    Video games are a pervasive pastime among children and adolescents. The growing popularity of video games has instigated a debate among parents, researchers, video game producers, and policymakers concerning potential harmful and helpful effects of video games on children. This article provides an overview of research findings on the positive and negative effects of video games, thus providing an empirical answer to the question, are video games good or bad? The article also provides some guidelines to help pediatricians, parents, and other caregivers protect children from negative effects and to maximize positive effects of video games. Copyright © 2012 Elsevier Inc. All rights reserved.

  4. A near infra-red video system as a protective diagnostic for electron cyclotron resonance heating operation in the Wendelstein 7-X stellarator.

    Science.gov (United States)

    Preynas, M; Laqua, H P; Marsen, S; Reintrog, A; Corre, Y; Moncada, V; Travere, J-M

    2015-11-01

    The Wendelstein 7-X stellarator is a large nuclear fusion device based at Max-Planck-Institut für Plasmaphysik in Greifswald in Germany. The main plasma heating system for steady state operation in W7-X is electron cyclotron resonance heating (ECRH). During operation, part of plama facing components will be directly heated by the non-absorbed power of 1 MW rf beams of ECRH. In order to avoid damages of such components made of graphite tiles during the first operational phase, a near infra-red video system has been developed as a protective diagnostic for safe and secure ECRH operation. Both the mechanical design housing the camera and the optical system are very flexible and respect the requirements of steady state operation. The full system including data acquisition and control system has been successfully tested in the vacuum vessel, including on-line visualization and data storage of the four cameras equipping the ECRH equatorial launchers of W7-X.

  5. A near infra-red video system as a protective diagnostic for electron cyclotron resonance heating operation in the Wendelstein 7-X stellarator

    Energy Technology Data Exchange (ETDEWEB)

    Preynas, M.; Laqua, H. P.; Marsen, S.; Reintrog, A. [Max-Planck-Institut für Plasmaphysik (IPP), D-17491 Greifswald (Germany); Corre, Y.; Moncada, V.; Travere, J.-M. [IRFM, CEA-Cadarache, 13108 Saint Paul lez Durance Cedex (France)

    2015-11-15

    The Wendelstein 7-X stellarator is a large nuclear fusion device based at Max-Planck-Institut für Plasmaphysik in Greifswald in Germany. The main plasma heating system for steady state operation in W7-X is electron cyclotron resonance heating (ECRH). During operation, part of plama facing components will be directly heated by the non-absorbed power of 1 MW rf beams of ECRH. In order to avoid damages of such components made of graphite tiles during the first operational phase, a near infra-red video system has been developed as a protective diagnostic for safe and secure ECRH operation. Both the mechanical design housing the camera and the optical system are very flexible and respect the requirements of steady state operation. The full system including data acquisition and control system has been successfully tested in the vacuum vessel, including on-line visualization and data storage of the four cameras equipping the ECRH equatorial launchers of W7-X.

  6. Estimation of Web video multiplicity

    Science.gov (United States)

    Cheung, SenChing S.; Zakhor, Avideh

    1999-12-01

    With ever more popularity of video web-publishing, many popular contents are being mirrored, reformatted, modified and republished, resulting in excessive content duplication. While such redundancy provides fault tolerance for continuous availability of information, it could potentially create problems for multimedia search engines in that the search results for a given query might become repetitious, and cluttered with a large number of duplicates. As such, developing techniques for detecting similarity and duplication is important to multimedia search engines. In addition, content providers might be interested in identifying duplicates of their content for legal, contractual or other business related reasons. In this paper, we propose an efficient algorithm called video signature to detect similar video sequences for large databases such as the web. The idea is to first form a 'signature' for each video sequence by selection a small number of its frames that are most similar to a number of randomly chosen seed images. Then the similarity between any tow video sequences can be reliably estimated by comparing their respective signatures. Using this method, we achieve 85 percent recall and precision ratios on a test database of 377 video sequences. As a proof of concept, we have applied our proposed algorithm to a collection of 1800 hours of video corresponding to around 45000 clips from the web. Our results indicate that, on average, every video in our collection from the web has around five similar copies.

  7. Digital video.

    Science.gov (United States)

    Johnson, Don; Johnson, Mike

    2004-04-01

    The process of digital capture, editing, and archiving video has become an important aspect of documenting arthroscopic surgery. Recording the arthroscopic findings before and after surgery is an essential part of the patient's medical record. The hardware and software has become more reasonable to purchase, but the learning curve to master the software is steep. Digital video is captured at the time of arthroscopy to a hard disk, and written to a CD at the end of the operative procedure. The process of obtaining video of open procedures is more complex. Outside video of the procedure is recorded on digital tape with a digital video camera. The camera must be plugged into a computer to capture the video on the hard disk. Adobe Premiere software is used to edit the video and render the finished video to the hard drive. This finished video is burned onto a CD. We outline the choice of computer hardware and software for the manipulation of digital video. The techniques of backup and archiving the completed projects and files also are outlined. The uses of digital video for education and the formats that can be used in PowerPoint presentations are discussed.

  8. The Hegemony of the Copy

    DEFF Research Database (Denmark)

    Graulund, Rune

    2017-01-01

    copies, of handwrittenmanuscripts, and mechanically printed books. Finally, it asks what the impactof digital memory and digital copying has had in terms of our currentconception of copy and original and, in particular, examines the manner inwhich an increase in memory storage capacity can be seen to go...... that of the book, in order to provide some fairlywell-known arguments regarding pre-mechanical as well as mechanical reproduction.In particular, it examines the differences between manuscriptculture and print culture as we see them expressed in the production (andreproduction) of master copies and subsequent...

  9. Immersive video

    Science.gov (United States)

    Moezzi, Saied; Katkere, Arun L.; Jain, Ramesh C.

    1996-03-01

    Interactive video and television viewers should have the power to control their viewing position. To make this a reality, we introduce the concept of Immersive Video, which employs computer vision and computer graphics technologies to provide remote users a sense of complete immersion when viewing an event. Immersive Video uses multiple videos of an event, captured from different perspectives, to generate a full 3D digital video of that event. That is accomplished by assimilating important information from each video stream into a comprehensive, dynamic, 3D model of the environment. Using this 3D digital video, interactive viewers can then move around the remote environment and observe the events taking place from any desired perspective. Our Immersive Video System currently provides interactive viewing and `walkthrus' of staged karate demonstrations, basketball games, dance performances, and typical campus scenes. In its full realization, Immersive Video will be a paradigm shift in visual communication which will revolutionize television and video media, and become an integral part of future telepresence and virtual reality systems.

  10. Small Vocabulary with Saliency Matching for Video Copy Detection

    DEFF Research Database (Denmark)

    Ren, Huamin; Moeslund, Thomas B.; Tang, Sheng

    2013-01-01

    of vocabulary. BoW descriptors under a small vocabulary can be both robust and efficient, while keeping high recall rate compared with large vocabulary. However, the high false positives exists in small vocabulary also limits its application. To address this problem in small vocabulary, we propose a novel...

  11. ENERGY STAR Certified Audio Video

    Data.gov (United States)

    U.S. Environmental Protection Agency — Certified models meet all ENERGY STAR requirements as listed in the Version 3.0 ENERGY STAR Program Requirements for Audio Video Equipment that are effective as of...

  12. Counting copy number and calories.

    Science.gov (United States)

    White, Stefan

    2015-08-01

    Copy number variation (CNV) at several genomic loci has been associated with different human traits and diseases, but in many cases the findings could not be replicated. A new study provides insights into the degree of variation present at the amylase locus and calls into question a previous association between amylase copy number and body mass index.

  13. Video games

    OpenAIRE

    Kolář, Vojtěch

    2012-01-01

    This thesis is based on a detailed analysis of various topics related to the question of whether video games can be art. In the first place it analyzes the current academic discussion on this subject and confronts different opinions of both supporters and objectors of the idea, that video games can be a full-fledged art form. The second point of this paper is to analyze the properties, that are inherent to video games, in order to find the reason, why cultural elite considers video games as i...

  14. Environmental Protection Agency

    Science.gov (United States)

    ... United States Environmental Protection Agency Search Search U.S. Environmental Protection Agency Contact Us Share White House Infrastructure ... Response Respuesta a huracanes California wildfires update U.S. Environmental Protection Agency Video Highlights EPA provides over $3. ...

  15. Robust Watermarking of Video Streams

    Directory of Open Access Journals (Sweden)

    T. Polyák

    2006-01-01

    Full Text Available In the past few years there has been an explosion in the use of digital video data. Many people have personal computers at home, and with the help of the Internet users can easily share video files on their computer. This makes possible the unauthorized use of digital media, and without adequate protection systems the authors and distributors have no means to prevent it.Digital watermarking techniques can help these systems to be more effective by embedding secret data right into the video stream. This makes minor changes in the frames of the video, but these changes are almost imperceptible to the human visual system. The embedded information can involve copyright data, access control etc. A robust watermark is resistant to various distortions of the video, so it cannot be removed without affecting the quality of the host medium. In this paper I propose a video watermarking scheme that fulfills the requirements of a robust watermark. 

  16. 36 CFR 1254.88 - What are the rules for the Motion Picture, Sound, and Video Research Room at the National...

    Science.gov (United States)

    2010-07-01

    ... Motion Picture, Sound, and Video Research Room at the National Archives at College Park? 1254.88 Section... to Using Copying Equipment § 1254.88 What are the rules for the Motion Picture, Sound, and Video.... (c) We provide you with a copy of the Motion Picture, Sound, and Video Research Room rules and a...

  17. Video Podcasts

    DEFF Research Database (Denmark)

    Nortvig, Anne Mette; Sørensen, Birgitte Holm

    2016-01-01

    This project’s aim was to support and facilitate master’s students’ preparation and collaboration by making video podcasts of short lectures available on YouTube prior to students’ first face-to-face seminar. The empirical material stems from group interviews, from statistical data created through...... YouTube analytics and from surveys answered by students after the seminar. The project sought to explore how video podcasts support learning and reflection online and how students use and reflect on the integration of online activities in the videos. Findings showed that students engaged actively...

  18. The blessing effect of an extra copy of chromosome 21

    African Journals Online (AJOL)

    Solaf M. Elsayed

    2014-02-25

    Feb 25, 2014 ... toma cell lines [3,4]. The presence of an extra copy of chromosome 21 also protects against the progression of tumours where several genes are involved, all mapped to chromosome 21: COL18A1 gene ... mast cell migration and adhesion [7]. ... proliferation and inducing apoptosis of synovial fibroblasts.

  19. Akademisk video

    DEFF Research Database (Denmark)

    Frølunde, Lisbeth

    2017-01-01

    Dette kapitel har fokus på metodiske problemstillinger, der opstår i forhold til at bruge (digital) video i forbindelse med forskningskommunikation, ikke mindst online. Video har længe været benyttet i forskningen til dataindsamling og forskningskommunikation. Med digitaliseringen og internettet er...... der dog opstået nye muligheder og udfordringer i forhold til at formidle og distribuere forskningsresultater til forskellige målgrupper via video. Samtidig er klassiske metodologiske problematikker som forskerens positionering i forhold til det undersøgte stadig aktuelle. Både klassiske og nye...... problemstillinger diskuteres i kapitlet, som rammesætter diskussionen ud fra forskellige positioneringsmuligheder: formidler, historiefortæller, eller dialogist. Disse positioner relaterer sig til genrer inden for ’akademisk video’. Afslutningsvis præsenteres en metodisk værktøjskasse med redskaber til planlægning...

  20. Video Analytics

    DEFF Research Database (Denmark)

    This book collects the papers presented at two workshops during the 23rd International Conference on Pattern Recognition (ICPR): the Third Workshop on Video Analytics for Audience Measurement (VAAM) and the Second International Workshop on Face and Facial Expression Recognition (FFER) from Real...... World Videos. The workshops were run on December 4, 2016, in Cancun in Mexico. The two workshops together received 13 papers. Each paper was then reviewed by at least two expert reviewers in the field. In all, 11 papers were accepted to be presented at the workshops. The topics covered in the papers...

  1. Copy number variation and mutation

    Science.gov (United States)

    Clark, Brian; Weidner, Jacob; Wabick, Kevin

    2009-11-01

    Until very recently, the standard model of DNA included two genes for each trait. This dated model has given way to a model that includes copies of some genes well in excess of the canonical two. Copy number variations in the human genome play critical roles in causing or aggravating a number of syndromes and diseases while providing increased resistance to others. We explore the role of mutation, crossover, inversion, and reproduction in determining copy number variations in a numerical simulation of a population. The numerical model consists of a population of individuals, where each individual is represented by a single strand of DNA with the same number of genes. Each gene is initially assigned to one of two traits. Fitness of the individual is determined by the two most fit genes for trait one, and trait two genetic material is treated as a reservoir of junk DNA. After a sufficient number of generations, during which the genetic distribution is allowed to reach a steady-state, the mean numberof genes per trait and the copy number variation are recorded. Here, we focus on the role of mutation and compare simulation results to theory.

  2. Video Analytics

    DEFF Research Database (Denmark)

    This book collects the papers presented at two workshops during the 23rd International Conference on Pattern Recognition (ICPR): the Third Workshop on Video Analytics for Audience Measurement (VAAM) and the Second International Workshop on Face and Facial Expression Recognition (FFER) from Real W...

  3. Copying and learning in testing

    DEFF Research Database (Denmark)

    Nielsen, Mie Femø; Caglio, Agnese

    2015-01-01

    are carefully curated to support and fruitfully disrupt – rather than interfere with – the aesthetic experience. So, while micro-analysis of video and audio might promise deep insights, significant challenges remain if such approaches are to be effectively leveraged. By opening this work up to the research...

  4. Video Analytics

    DEFF Research Database (Denmark)

    This book collects the papers presented at two workshops during the 23rd International Conference on Pattern Recognition (ICPR): the Third Workshop on Video Analytics for Audience Measurement (VAAM) and the Second International Workshop on Face and Facial Expression Recognition (FFER) from Real...... include: re-identification, consumer behavior analysis, utilizing pupillary response for task difficulty measurement, logo detection, saliency prediction, classification of facial expressions, face recognition, face verification, age estimation, super-resolution, pose estimation, and pain recognition...

  5. Video Analytics

    DEFF Research Database (Denmark)

    include: re-identification, consumer behavior analysis, utilizing pupillary response for task difficulty measurement, logo detection, saliency prediction, classification of facial expressions, face recognition, face verification, age estimation, super-resolution, pose estimation, and pain recognition......This book collects the papers presented at two workshops during the 23rd International Conference on Pattern Recognition (ICPR): the Third Workshop on Video Analytics for Audience Measurement (VAAM) and the Second International Workshop on Face and Facial Expression Recognition (FFER) from Real...

  6. 14 CFR 187.7 - Copies; seal.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Copies; seal. 187.7 Section 187.7... REGULATIONS FEES § 187.7 Copies; seal. The fees for furnishing photostatic or similar copies of documents and for affixation of the seal for a certification or validation are the same as those provided in subpart...

  7. 22 CFR 92.76 - Copying documents.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Copying documents. 92.76 Section 92.76 Foreign..., Translating and Procuring Documents § 92.76 Copying documents. (a) Consular authority. The consular officer is authorized to have documents, or abstracts therefrom, copied at a Foreign Service post, if he deems it...

  8. Copying and evolution of neuronal topology.

    Directory of Open Access Journals (Sweden)

    Chrisantha Fernando

    Full Text Available We propose a mechanism for copying of neuronal networks that is of considerable interest for neuroscience for it suggests a neuronal basis for causal inference, function copying, and natural selection within the human brain. To date, no model of neuronal topology copying exists. We present three increasingly sophisticated mechanisms to demonstrate how topographic map formation coupled with Spike-Time Dependent Plasticity (STDP can copy neuronal topology motifs. Fidelity is improved by error correction and activity-reverberation limitation. The high-fidelity topology-copying operator is used to evolve neuronal topologies. Possible roles for neuronal natural selection are discussed.

  9. The roles of vocal and visual interactions in social learning zebra finches: A video playback experiment.

    Science.gov (United States)

    Guillette, Lauren M; Healy, Susan D

    2017-06-01

    The transmission of information from an experienced demonstrator to a naïve observer often depends on characteristics of the demonstrator, such as familiarity, success or dominance status. Whether or not the demonstrator pays attention to and/or interacts with the observer may also affect social information acquisition or use by the observer. Here we used a video-demonstrator paradigm first to test whether video demonstrators have the same effect as using live demonstrators in zebra finches, and second, to test the importance of visual and vocal interactions between the demonstrator and observer on social information use by the observer. We found that female zebra finches copied novel food choices of male demonstrators they saw via live-streaming video while they did not consistently copy from the demonstrators when they were seen in playbacks of the same videos. Although naive observers copied in the absence of vocalizations by the demonstrator, as they copied from playback of videos with the sound off, females did not copy where there was a mis-match between the visual information provided by the video and vocal information from a live male that was out of sight. Taken together these results suggest that video demonstration is a useful methodology for testing social information transfer, at least in a foraging context, but more importantly, that social information use varies according to the vocal interactions, or lack thereof, between the observer and the demonstrator. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.

  10. Patterns, correlates, and reduction of homework copying

    Science.gov (United States)

    Palazzo, David J.; Lee, Young-Jin; Warnakulasooriya, Rasil; Pritchard, David E.

    2010-06-01

    Submissions to an online homework tutor were analyzed to determine whether they were copied. The fraction of copied submissions increased rapidly over the semester, as each weekly deadline approached and for problems later in each assignment. The majority of students, who copied less than 10% of their problems, worked steadily over the three days prior to the deadline, whereas repetitive copiers (those who copied >30% of their submitted problems) exerted little effort early. Importantly, copying homework problems that require an analytic answer correlates with a 2(σ) decline over the semester in relative score for similar problems on exams but does not significantly correlate with the amount of conceptual learning as measured by pretesting and post-testing. An anonymous survey containing questions used in many previous studies of self-reported academic dishonesty showed ˜1/3 less copying than actually was detected. The observed patterns of copying, free response questions on the survey, and interview data suggest that time pressure on students who do not start their homework in a timely fashion is the proximate cause of copying. Several measures of initial ability in math or physics correlated with copying weakly or not at all. Changes in course format and instructional practices that previous self-reported academic dishonesty surveys and/or the observed copying patterns suggested would reduce copying have been accompanied by more than a factor of 4 reduction of copying from ˜11% of all electronic problems to less than 3%. As expected (since repetitive copiers have approximately three times the chance of failing), this was accompanied by a reduction in the overall course failure rate. Survey results indicate that students copy almost twice as much written homework as online homework and show that students nationally admit to more academic dishonesty than MIT students.

  11. Patterns, correlates, and reduction of homework copying

    Directory of Open Access Journals (Sweden)

    David J. Palazzo

    2010-03-01

    Full Text Available Submissions to an online homework tutor were analyzed to determine whether they were copied. The fraction of copied submissions increased rapidly over the semester, as each weekly deadline approached and for problems later in each assignment. The majority of students, who copied less than 10% of their problems, worked steadily over the three days prior to the deadline, whereas repetitive copiers (those who copied >30% of their submitted problems exerted little effort early. Importantly, copying homework problems that require an analytic answer correlates with a 2(σ decline over the semester in relative score for similar problems on exams but does not significantly correlate with the amount of conceptual learning as measured by pretesting and post-testing. An anonymous survey containing questions used in many previous studies of self-reported academic dishonesty showed ∼1/3 less copying than actually was detected. The observed patterns of copying, free response questions on the survey, and interview data suggest that time pressure on students who do not start their homework in a timely fashion is the proximate cause of copying. Several measures of initial ability in math or physics correlated with copying weakly or not at all. Changes in course format and instructional practices that previous self-reported academic dishonesty surveys and/or the observed copying patterns suggested would reduce copying have been accompanied by more than a factor of 4 reduction of copying from ∼11% of all electronic problems to less than 3%. As expected (since repetitive copiers have approximately three times the chance of failing, this was accompanied by a reduction in the overall course failure rate. Survey results indicate that students copy almost twice as much written homework as online homework and show that students nationally admit to more academic dishonesty than MIT students.

  12. Automated Identification and Reconstruction of YouTube Video Access

    Directory of Open Access Journals (Sweden)

    Jonathan Patterson

    2012-06-01

    Full Text Available YouTube is one of the most popular video-sharing websites on the Internet, allowing users to upload, view and share videos with other users all over the world. YouTube contains many different types of videos, from homemade sketches to instructional and educational tutorials, and therefore attracts a wide variety of users with different interests. The majority of YouTube visits are perfectly innocent, but there may be circumstances where YouTube video access is related to a digital investigation, e.g. viewing instructional videos on how to perform potentially unlawful actions or how to make unlawful articles.When a user accesses a YouTube video through their browser, certain digital artefacts relating to that video access may be left on their system in a number of different locations. However, there has been very little research published in the area of YouTube video artefacts.The paper discusses the identification of some of the artefacts that are left by the Internet Explorer web browser on a Windows system after accessing a YouTube video. The information that can be recovered from these artefacts can include the video ID, the video name and possibly a cached copy of the video itself. In addition to identifying the artefacts that are left, the paper also investigates how these artefacts can be brought together and analysed to infer specifics about the user’s interaction with the YouTube website, for example whether the video was searched for or visited as a result of a suggestion after viewing a previous video.The result of this research is a Python based prototype that will analyse a mounted disk image, automatically extract the artefacts related to YouTube visits and produce a report summarising the YouTube video accesses on a system.

  13. Exchanging digital video of laryngeal examinations.

    Science.gov (United States)

    Crump, John M; Deutsch, Thomas

    2004-03-01

    Laryngeal examinations, especially stroboscopic examinations, are increasingly recorded using digital video formats on computer media, rather than using analog formats on videotape. It would be useful to share these examinations with other medical professionals in formats that would facilitate reliable and high-quality playback on a personal computer by the recipients. Unfortunately, a personal computer is not well designed for reliable presentation of artifact-free video. It is particularly important that laryngeal video play without artifacts of motion or color because these are often the characteristics of greatest clinical interest. With proper tools and procedures, and with reasonable compromises in image resolution and the duration of the examination, digital video of laryngeal examinations can be reliably exchanged. However, the tools, procedures, and formats for recording, converting to another digital format ("transcoding"), communicating, copying, and playing digital video with a personal computer are not familiar to most medical professionals. Some understanding of digital video and the tools available is required of those wanting to exchange digital video. Best results are achieved by recording to a digital format best suited for recording (such as MJPEG or DV),judiciously selecting a segment of the recording for sharing, and converting to a format suited to distribution (such as MPEG1 or MPEG2) using a medium suited to the situation (such as e-mail attachment, CD-ROM, a "clip" within a Microsoft PowerPoint presentation, or DVD-Video). If digital video is sent to a colleague, some guidance on playing files and using a PC media player is helpful.

  14. Broadcast copies reveal the quantumness of correlations.

    Science.gov (United States)

    Piani, M; Christandl, M; Mora, C E; Horodecki, P

    2009-06-26

    We study the quantumness of bipartite correlations by proposing a quantity that combines a measure of total correlations-mutual information-with the notion of broadcast copies-i.e., generally nonfactorized copies-of bipartite states. By analyzing how our quantity increases with the number of broadcast copies, we are able to classify classical, separable, and entangled states. This motivates the definition of the broadcast regularization of mutual information, the asymptotic minimal mutual information per broadcast copy, which we show to have many properties of an entanglement measure.

  15. Breaking the COPI monopoly on Golgi recycling.

    Science.gov (United States)

    Storrie, B; Pepperkok, R; Nilsson, T

    2000-09-01

    The unexpected discovery of a transport pathway from the Golgi to the endoplasmic reticulum (ER) independent of COPI coat proteins sheds light on how Golgi resident enzymes and protein toxins gain access to the ER from as far as the trans Golgi network. This new pathway provides an explanation for how membrane is recycled to allow for an apparent concentration of anterograde cargo at distinct stages of the secretory pathway. As signal-mediated COPI-dependent recycling also involves the concentration of resident proteins into retrograde COPI vesicles, the main bulk of lipids must be recycled, possibly through a COPI-independent pathway.

  16. NEI You Tube Videos: Amblyopia

    Medline Plus

    Full Text Available ... NEI YouTube Videos > NEI YouTube Videos: Amblyopia NEI YouTube Videos YouTube Videos Home Age-Related Macular Degeneration ... Retinopathy of Prematurity Science Spanish Videos Webinars NEI YouTube Videos: Amblyopia Embedded video for NEI YouTube Videos: ...

  17. NEI You Tube Videos: Amblyopia

    Medline Plus

    Full Text Available ... YouTube Videos > NEI YouTube Videos: Amblyopia NEI YouTube Videos YouTube Videos Home Age-Related Macular Degeneration Amblyopia ... of Prematurity Science Spanish Videos Webinars NEI YouTube Videos: Amblyopia Embedded video for NEI YouTube Videos: Amblyopia ...

  18. NEI You Tube Videos: Amblyopia

    Science.gov (United States)

    ... YouTube Videos > NEI YouTube Videos: Amblyopia NEI YouTube Videos YouTube Videos Home Age-Related Macular Degeneration Amblyopia ... of Prematurity Science Spanish Videos Webinars NEI YouTube Videos: Amblyopia Embedded video for NEI YouTube Videos: Amblyopia ...

  19. Rheumatoid Arthritis Educational Video Series

    Medline Plus

    Full Text Available ... Rheumatoid Arthritis Educational Video Series Rheumatoid Arthritis Educational Video Series This series of five videos was designed ... Activity Role of Body Weight in Osteoarthritis Educational Videos for Patients Rheumatoid Arthritis Educational Video Series Psoriatic ...

  20. 61214++++','DOAJ-ART-EN'); return false;" href="+++++https://jual.nipissingu.ca/wp-content/uploads/sites/25/2014/06/v61214.m4v">61214++++">Jailed - Video

    Directory of Open Access Journals (Sweden)

    Cameron CULBERT

    2012-07-01

    Full Text Available As the public education system in Northern Ontario continues to take a downward spiral, a plethora of secondary school students are being placed in an alternative educational environment. Juxtaposing the two educational settings reveals very similar methods and characteristics of educating our youth as opposed to using a truly alternative approach to education. This video reviews the relationship between public education and alternative education in a remote Northern Ontario setting. It is my belief that the traditional methods of teaching are not appropriate in educating at risk students in alternative schools. Paper and pencil worksheets do not motivate these students to learn and succeed. Alternative education should emphasize experiential learning, a just in time curriculum based on every unique individual and the students true passion for everyday life. Cameron Culbert was born on February 3rd, 1977 in North Bay, Ontario. His teenage years were split between attending public school and his willed curriculum on the ski hill. Culbert spent 10 years (1996-2002 & 2006-2010 competing for Canada as an alpine ski racer. His passion for teaching and coaching began as an athlete and has now transferred into the classroom and the community. As a graduate of Nipissing University (BA, BEd, MEd. Camerons research interests are alternative education, physical education and technology in the classroom. Currently Cameron is an active educator and coach in Northern Ontario.

  1. Video Design Games

    DEFF Research Database (Denmark)

    Smith, Rachel Charlotte; Christensen, Kasper Skov; Iversen, Ole Sejer

    We introduce Video Design Games to train educators in teaching design. The Video Design Game is a workshop format consisting of three rounds in which participants observe, reflect and generalize based on video snippets from their own practice. The paper reports on a Video Design Game workshop...

  2. Video surveillance using JPEG 2000

    Science.gov (United States)

    Dufaux, Frederic; Ebrahimi, Touradj

    2004-11-01

    This paper describes a video surveillance system which is composed of three key components, smart cameras, a server, and clients, connected through IP-networks in wired or wireless configurations. The system has been designed so as to protect the privacy of people under surveillance. Smart cameras are based on JPEG 2000 compression where an analysis module allows for events detection and regions of interest identification. The resulting regions of interest can then be encoded with better quality and scrambled. Compressed video streams are scrambled and signed for the purpose of privacy and data integrity verification using JPSEC compliant methods. The same bitstream may also be protected for robustness to transmission errors based on JPWL compliant methods. The server receives, stores, manages and transmits the video sequences on wired and wireless channels to a variety of clients and users with different device capabilities, channel characteristics and preferences. Use of seamless scalable coding of video sequences prevents any need for transcoding operations at any point in the system.

  3. Characterization of social video

    Science.gov (United States)

    Ostrowski, Jeffrey R.; Sarhan, Nabil J.

    2009-01-01

    The popularity of social media has grown dramatically over the World Wide Web. In this paper, we analyze the video popularity distribution of well-known social video websites (YouTube, Google Video, and the AOL Truveo Video Search engine) and characterize their workload. We identify trends in the categories, lengths, and formats of those videos, as well as characterize the evolution of those videos over time. We further provide an extensive analysis and comparison of video content amongst the main regions of the world.

  4. Preservation Copying Endangered Historic Negative Collections

    DEFF Research Database (Denmark)

    Kejser, Ulla Bøgvad

    2008-01-01

    This article discusses preservation copying of unstable B&W nitrate and acetate still photographic negatives. It focuses on evaluating two different strategies for preserving the copies from a point of view of quality and cost-effectiveness. The evaluated strategies are preservation of the master...

  5. Copy-Editing: The Cambridge Handbook.

    Science.gov (United States)

    Butcher, Judith

    This handbook is designed as a reference manual for copy editors who prepare typescript for printing. It deals with the following topics: the copy editor's function; the work to be done at each stage in the production process; some difficult points of spelling, capitalization, and other features collectively known as "house style"; the parts of a…

  6. Hacking DNA copy number for circuit engineering.

    Science.gov (United States)

    Wu, Feilun; You, Lingchong

    2017-07-27

    DNA copy number represents an essential parameter in the dynamics of synthetic gene circuits but typically is not explicitly considered. A new study demonstrates how dynamic control of DNA copy number can serve as an effective strategy to program robust oscillations in gene expression circuits.

  7. The Rhetoric of the Implicit and the Politics of Representation in the Age of Copy-and-Paste

    Science.gov (United States)

    Adami, Elisabetta

    2012-01-01

    The paper discusses the effects of copy-and-paste on the rhetoric and politics of communication in digital environments, by examining direct and indirect (mis)quotation and referencing in "YouTube" video-exchanges and by providing further examples in one-to-one communication via "Facebook" and email. The forwarding of (snippets of) artefacts in…

  8. Coping with the DVD Dilemma: Region Codes and Copy Protection

    Science.gov (United States)

    Ecke, Peter

    2005-01-01

    German teachers' use of DVDs, purchased abroad, has become increasingly difficult through restrictions imposed by the motion pictures industry on DVDs, DVD-playing equipment and software. In addition, the law, in particular through the Digital Millennium Copyright Act (DMCA), has imposed restrictions that negatively affect the fair use of digital…

  9. [Is there protection against copying? Thoughts about plagiarism].

    Science.gov (United States)

    Schubert, András; Glänzel, Wolfgang

    2015-12-13

    There are at least two reasons why more and more cases of suspected plagiarism are perceived in the scientific literature. On one hand, the ever increasing pressure for publication makes it easier for authors, reviewers and editors to infringe or overlook this serious ethical misdemeanor; on the other hand, with the development of text analysis software, detecting text similarities has become a simple task. The judgement of actual cases, however, requires well-grounded professional knowledge and prudent human decisions.

  10. Video visual analytics

    OpenAIRE

    Höferlin, Markus Johannes

    2013-01-01

    The amount of video data recorded world-wide is tremendously growing and has already reached hardly manageable dimensions. It originates from a wide range of application areas, such as surveillance, sports analysis, scientific video analysis, surgery documentation, and entertainment, and its analysis represents one of the challenges in computer science. The vast amount of video data renders manual analysis by watching the video data impractical. However, automatic evaluation of video material...

  11. 76 FR 21741 - Twenty-First Century Communications and Video Programming Accessibility Act; Announcement of Town...

    Science.gov (United States)

    2011-04-18

    ... Governmental Affairs Bureau, 202-418-2498 (voice), 202-418-1169 (TTY), or [email protected] (e-mail); or... gaps in video programming through the provision of video description on television and closed...

  12. Chimpanzees copy dominant and knowledgeable individuals

    DEFF Research Database (Denmark)

    Kendal, Rachel; Hopper, Lydia M.; Whiten, Andrew

    2015-01-01

    of chimpanzees (Pan troglodytes) to a novel extractive foraging device and, by fitting statistical models, isolated four simultaneously operating transmission biases. These include biases to copy (i) higher-ranking and (ii) expert individuals, and to copy others when (iii) uncertain or (iv) of low rank. High......-ranking individuals were relatively un-strategic in their use of acquired knowledge, which, combined with the bias for others to observe them, may explain reports that high innovation rates (in juveniles and subordinates) do not generate a correspondingly high frequency of traditions in chimpanzees. Given...... the typically low rank of immigrants in chimpanzees, a ‘copying dominants’ bias may contribute to the observed maintenance of distinct cultural repertoires in neighboring communities despite sharing similar ecology and knowledgeable migrants. Thus, a copying dominants strategy may, as often proposed...

  13. Copy Number Variation across European Populations

    Science.gov (United States)

    Chen, Wanting; Hayward, Caroline; Wright, Alan F.; Hicks, Andrew A.; Vitart, Veronique; Knott, Sara; Wild, Sarah H.; Pramstaller, Peter P.; Wilson, James F.; Rudan, Igor; Porteous, David J.

    2011-01-01

    Genome analysis provides a powerful approach to test for evidence of genetic variation within and between geographical regions and local populations. Copy number variants which comprise insertions, deletions and duplications of genomic sequence provide one such convenient and informative source. Here, we investigate copy number variants from genome wide scans of single nucleotide polymorphisms in three European population isolates, the island of Vis in Croatia, the islands of Orkney in Scotland and the South Tyrol in Italy. We show that whereas the overall copy number variant frequencies are similar between populations, their distribution is highly specific to the population of origin, a finding which is supported by evidence for increased kinship correlation for specific copy number variants within populations. PMID:21829696

  14. Copy number variation across European populations.

    Directory of Open Access Journals (Sweden)

    Wanting Chen

    Full Text Available Genome analysis provides a powerful approach to test for evidence of genetic variation within and between geographical regions and local populations. Copy number variants which comprise insertions, deletions and duplications of genomic sequence provide one such convenient and informative source. Here, we investigate copy number variants from genome wide scans of single nucleotide polymorphisms in three European population isolates, the island of Vis in Croatia, the islands of Orkney in Scotland and the South Tyrol in Italy. We show that whereas the overall copy number variant frequencies are similar between populations, their distribution is highly specific to the population of origin, a finding which is supported by evidence for increased kinship correlation for specific copy number variants within populations.

  15. Local Reasoning about a Copying Garbage Collector

    DEFF Research Database (Denmark)

    Torp-Smith, Noah; Birkedal, Lars; Reynolds, John C.

    2008-01-01

    We present a programming language, model, and logic appropriate for implementing and reasoning about a memory management system. We state semantically what is meant by correctness of a copying garbage collector, and employ a variant of the novel separation logics to formally specify partial...... correctness of Cheney’s copying garbage collector in our program logic. Finally, we prove that our implementation of Cheney’s algorithm meets its specification using the logic we have given and auxiliary variables. Udgivelsesdato: 2008...

  16. Acoustic Neuroma Educational Video

    Medline Plus

    Full Text Available ... support group for me? Find a Group Upcoming Events Video Library Photo Gallery One-on-One Support ... group for me? Find a group Back Upcoming events Video Library Photo Gallery One-on-One Support ...

  17. Video Games and Citizenship

    National Research Council Canada - National Science Library

    Bourgonjon, Jeroen; Soetaert, Ronald

    2013-01-01

    ... by exploring a particular aspect of digitization that affects young people, namely video games. They explore the new social spaces which emerge in video game culture and how these spaces relate to community building and citizenship...

  18. Videos, Podcasts and Livechats

    Medline Plus

    Full Text Available ... Doctor Find a Provider Meet the Team Blog Articles News Resources Links Videos Podcasts Webinars For the ... Doctor Find a Provider Meet the Team Blog Articles News Provider Directory Donate Resources Links Videos Podcasts ...

  19. Videos, Podcasts and Livechats

    Medline Plus

    Full Text Available ... Doctor Find a Provider Meet the Team Blog Articles & Stories News Resources Links Videos Podcasts Webinars For ... Doctor Find a Provider Meet the Team Blog Articles & Stories News Provider Directory Donate Resources Links Videos ...

  20. Digital Video in Research

    DEFF Research Database (Denmark)

    Frølunde, Lisbeth

    2012-01-01

    questions of our media literacy pertaining to authoring multimodal texts (visual, verbal, audial, etc.) in research practice and the status of multimodal texts in academia. The implications of academic video extend to wider issues of how researchers harness opportunities to author different types of texts......Is video becoming “the new black” in academia, if so, what are the challenges? The integration of video in research methodology (for collection, analysis) is well-known, but the use of “academic video” for dissemination is relatively new (Eriksson and Sørensen). The focus of this paper is academic...... video, or short video essays produced for the explicit purpose of communicating research processes, topics, and research-based knowledge (see the journal of academic videos: www.audiovisualthinking.org). Video is increasingly used in popular showcases for video online, such as YouTube and Vimeo, as well...

  1. Acoustic Neuroma Educational Video

    Medline Plus

    Full Text Available ... Back Support Groups Is a support group for me? Find a Group Upcoming Events Video Library Photo ... Support Groups Back Is a support group for me? Find a group Back Upcoming events Video Library ...

  2. Acoustic Neuroma Educational Video

    Medline Plus

    Full Text Available ... group for me? Find a Group Upcoming Events Video Library Photo Gallery One-on-One Support ANetwork ... for me? Find a group Back Upcoming events Video Library Photo Gallery One-on-One Support Back ...

  3. Videos, Podcasts and Livechats

    Medline Plus

    Full Text Available ... the Team Blog Articles & Stories News Resources Links Videos Podcasts Webinars For the Media For Clinicians For ... Family Caregivers Glossary Menu In this section Links Videos Podcasts Webinars For the Media For Clinicians For ...

  4. Videos, Podcasts and Livechats

    Science.gov (United States)

    ... the Team Blog Articles & Stories News Resources Links Videos Podcasts Webinars For the Media For Clinicians For ... Family Caregivers Glossary Menu In this section Links Videos Podcasts Webinars For the Media For Clinicians For ...

  5. Videos, Podcasts and Livechats

    Medline Plus

    Full Text Available ... a Provider Meet the Team Blog Articles & Stories News Resources Links Videos Podcasts Webinars For the Media ... a Provider Meet the Team Blog Articles & Stories News Provider Directory Donate Resources Links Videos Podcasts Webinars ...

  6. Acoustic Neuroma Educational Video

    Medline Plus

    Full Text Available ... for me? Find a Group Upcoming Events Video Library Photo Gallery One-on-One Support ANetwork Peer ... me? Find a group Back Upcoming events Video Library Photo Gallery One-on-One Support Back ANetwork ...

  7. Video Screen Capture Basics

    Science.gov (United States)

    Dunbar, Laura

    2014-01-01

    This article is an introduction to video screen capture. Basic information of two software programs, QuickTime for Mac and BlueBerry Flashback Express for PC, are also discussed. Practical applications for video screen capture are given.

  8. Videos, Podcasts and Livechats

    Medline Plus

    Full Text Available ... News Resources Links Videos Podcasts Webinars For the Media For Clinicians For Policymakers For Family Caregivers Glossary ... this section Links Videos Podcasts Webinars For the Media For Clinicians For Policymakers For Family Caregivers Glossary ...

  9. Transmission of compressed video

    Science.gov (United States)

    Pasch, H. L.

    1990-09-01

    An overview of video coding is presented. The aim is not to give a technical summary of possible coding techniques, but to address subjects related to video compression in general and to the transmission of compressed video in more detail. Bit rate reduction is in general possible by removing redundant information; removing information the eye does not use anyway; and reducing the quality of the video. The codecs which are used for reducing the bit rate, can be divided into two groups: Constant Bit rate Codecs (CBC's), which keep the bit rate constant, but vary the video quality; and Variable Bit rate Codecs (VBC's), which keep the video quality constant by varying the bit rate. VBC's can be in general reach a higher video quality than CBC's using less bandwidth, but need a transmission system that allows the bandwidth of a connection to fluctuate in time. The current and the next generation of the PSTN does not allow this; ATM might. There are several factors which influence the quality of video: the bit error rate of the transmission channel, slip rate, packet loss rate/packet insertion rate, end-to-end delay, phase shift between voice and video, and bit rate. Based on the bit rate of the coded video, the following classification of coded video can be made: High Definition Television (HDTV); Broadcast Quality Television (BQTV); video conferencing; and video telephony. The properties of these classes are given. The video conferencing and video telephony equipment available now and in the next few years can be divided into three categories: conforming to 1984 CCITT standard for video conferencing; conforming to 1988 CCITT standard; and conforming to no standard.

  10. Making good physics videos

    Science.gov (United States)

    Lincoln, James

    2017-05-01

    Online videos are an increasingly important way technology is contributing to the improvement of physics teaching. Students and teachers have begun to rely on online videos to provide them with content knowledge and instructional strategies. Online audiences are expecting greater production value, and departments are sometimes requesting educators to post video pre-labs or to flip our classrooms. In this article, I share my advice on creating engaging physics videos.

  11. Desktop video conferencing

    OpenAIRE

    Potter, Ray; Roberts, Deborah

    2007-01-01

    This guide aims to provide an introduction to Desktop Video Conferencing. You may be familiar with video conferencing, where participants typically book a designated conference room and communicate with another group in a similar room on another site via a large screen display. Desktop video conferencing (DVC), as the name suggests, allows users to video conference from the comfort of their own office, workplace or home via a desktop/laptop Personal Computer. DVC provides live audio and visua...

  12. 47 CFR 79.3 - Video description of video programming.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Video description of video programming. 79.3... CLOSED CAPTIONING AND VIDEO DESCRIPTION OF VIDEO PROGRAMMING § 79.3 Video description of video programming. (a) Definitions. For purposes of this section the following definitions shall apply: (1...

  13. Video Self-Modeling

    Science.gov (United States)

    Buggey, Tom; Ogle, Lindsey

    2012-01-01

    Video self-modeling (VSM) first appeared on the psychology and education stage in the early 1970s. The practical applications of VSM were limited by lack of access to tools for editing video, which is necessary for almost all self-modeling videos. Thus, VSM remained in the research domain until the advent of camcorders and VCR/DVD players and,…

  14. Tracing Sequential Video Production

    DEFF Research Database (Denmark)

    Otrel-Cass, Kathrin; Khalid, Md. Saifuddin

    2015-01-01

    With an interest in learning that is set in collaborative situations, the data session presents excerpts from video data produced by two of fifteen students from a class of 5th semester techno-anthropology course. Students used video cameras to capture the time they spent working with a scientist...... video, nature of the interactional space, and material and spatial semiotics....

  15. Developing a Promotional Video

    Science.gov (United States)

    Epley, Hannah K.

    2014-01-01

    There is a need for Extension professionals to show clientele the benefits of their program. This article shares how promotional videos are one way of reaching audiences online. An example is given on how a promotional video has been used and developed using iMovie software. Tips are offered for how professionals can create a promotional video and…

  16. Smart sensing surveillance video system

    Science.gov (United States)

    Hsu, Charles; Szu, Harold

    2016-05-01

    An intelligent video surveillance system is able to detect and identify abnormal and alarming situations by analyzing object movement. The Smart Sensing Surveillance Video (S3V) System is proposed to minimize video processing and transmission, thus allowing a fixed number of cameras to be connected on the system, and making it suitable for its applications in remote battlefield, tactical, and civilian applications including border surveillance, special force operations, airfield protection, perimeter and building protection, and etc. The S3V System would be more effective if equipped with visual understanding capabilities to detect, analyze, and recognize objects, track motions, and predict intentions. In addition, alarm detection is performed on the basis of parameters of the moving objects and their trajectories, and is performed using semantic reasoning and ontologies. The S3V System capabilities and technologies have great potential for both military and civilian applications, enabling highly effective security support tools for improving surveillance activities in densely crowded environments. It would be directly applicable to solutions for emergency response personnel, law enforcement, and other homeland security missions, as well as in applications requiring the interoperation of sensor networks with handheld or body-worn interface devices.

  17. Low AMY1 Gene Copy Number Is Associated with Increased Body Mass Index in Prepubertal Boys.

    Directory of Open Access Journals (Sweden)

    M Loredana Marcovecchio

    Full Text Available Genome-wide association studies have identified more than 60 single nucleotide polymorphisms associated with Body Mass Index (BMI. Additional genetic variants, such as copy number variations (CNV, have also been investigated in relation to BMI. Recently, the highly polymorphic CNV in the salivary amylase (AMY1 gene, encoding an enzyme implicated in the first step of starch digestion, has been associated with obesity in adults and children. We assessed the potential association between AMY1 copy number and a wide range of BMI in a population of Italian school-children.744 children (354 boys, 390 girls, mean age (±SD: 8.4±1.4years underwent anthropometric assessments (height, weight and collection of saliva samples for DNA extraction. AMY1 copies were evaluated by quantitative PCR.A significant increase of BMI z-score by decreasing AMY1 copy number was observed in boys (β: -0.117, p = 0.033, but not in girls. Similarly, waist circumference (β: -0.155, p = 0.003, adjusted for age was negatively influenced by AMY1 copy number in boys. Boys with 8 or more AMY1 copy numbers presented a significant lower BMI z-score (p = 0.04 and waist circumference (p = 0.01 when compared to boys with less than 8 copy numbers.In this pediatric-only, population-based study, a lower AMY1 copy number emerged to be associated with increased BMI in boys. These data confirm previous findings from adult studies and support a potential role of a higher copy number of the salivary AMY1 gene in protecting from excess weight gain.

  18. Identifying single copy orthologs in Metazoa.

    Directory of Open Access Journals (Sweden)

    Christopher J Creevey

    2011-12-01

    Full Text Available The identification of single copy (1-to-1 orthologs in any group of organisms is important for functional classification and phylogenetic studies. The Metazoa are no exception, but only recently has there been a wide-enough distribution of taxa with sufficiently high quality sequenced genomes to gain confidence in the wide-spread single copy status of a gene.Here, we present a phylogenetic approach for identifying overlooked single copy orthologs from multigene families and apply it to the Metazoa. Using 18 sequenced metazoan genomes of high quality we identified a robust set of 1,126 orthologous groups that have been retained in single copy since the last common ancestor of Metazoa. We found that the use of the phylogenetic procedure increased the number of single copy orthologs found by over a third more than standard taxon-count approaches. The orthologs represented a wide range of functional categories, expression profiles and levels of divergence.To demonstrate the value of our set of single copy orthologs, we used them to assess the completeness of 24 currently published metazoan genomes and 62 EST datasets. We found that the annotated genes in published genomes vary in coverage from 79% (Ciona intestinalis to 99.8% (human with an average of 92%, suggesting a value for the underlying error rate in genome annotation, and a strategy for identifying single copy orthologs in larger datasets. In contrast, the vast majority of EST datasets with no corresponding genome sequence available are largely under-sampled and probably do not accurately represent the actual genomic complement of the organisms from which they are derived.

  19. Using Photogrammetry to Estimate Tank Waste Volumes from Video

    Energy Technology Data Exchange (ETDEWEB)

    Field, Jim G. [Washington River Protection Solutions, LLC, Richland, WA (United States)

    2013-03-27

    Washington River Protection Solutions (WRPS) contracted with HiLine Engineering & Fabrication, Inc. to assess the accuracy of photogrammetry tools as compared to video Camera/CAD Modeling System (CCMS) estimates. This test report documents the results of using photogrammetry to estimate the volume of waste in tank 241-C-I04 from post-retrieval videos and results using photogrammetry to estimate the volume of waste piles in the CCMS test video.

  20. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  1. Intelligent video surveillance systems

    CERN Document Server

    Dufour, Jean-Yves

    2012-01-01

    Belonging to the wider academic field of computer vision, video analytics has aroused a phenomenal surge of interest since the current millennium. Video analytics is intended to solve the problem of the incapability of exploiting video streams in real time for the purpose of detection or anticipation. It involves analyzing the videos using algorithms that detect and track objects of interest over time and that indicate the presence of events or suspect behavior involving these objects.The aims of this book are to highlight the operational attempts of video analytics, to identify possi

  2. VBR video traffic models

    CERN Document Server

    Tanwir, Savera

    2014-01-01

    There has been a phenomenal growth in video applications over the past few years. An accurate traffic model of Variable Bit Rate (VBR) video is necessary for performance evaluation of a network design and for generating synthetic traffic that can be used for benchmarking a network. A large number of models for VBR video traffic have been proposed in the literature for different types of video in the past 20 years. Here, the authors have classified and surveyed these models and have also evaluated the models for H.264 AVC and MVC encoded video and discussed their findings.

  3. Flip Video for Dummies

    CERN Document Server

    Hutsko, Joe

    2010-01-01

    The full-color guide to shooting great video with the Flip Video camera. The inexpensive Flip Video camera is currently one of the hottest must-have gadgets. It's portable and connects easily to any computer to transfer video you shoot onto your PC or Mac. Although the Flip Video camera comes with a quick-start guide, it lacks a how-to manual, and this full-color book fills that void! Packed with full-color screen shots throughout, Flip Video For Dummies shows you how to shoot the best possible footage in a variety of situations. You'll learn how to transfer video to your computer and then edi

  4. Creating Single-Copy Genetic Circuits.

    Science.gov (United States)

    Lee, Jeong Wook; Gyorgy, Andras; Cameron, D Ewen; Pyenson, Nora; Choi, Kyeong Rok; Way, Jeffrey C; Silver, Pamela A; Del Vecchio, Domitilla; Collins, James J

    2016-07-21

    Synthetic biology is increasingly used to develop sophisticated living devices for basic and applied research. Many of these genetic devices are engineered using multi-copy plasmids, but as the field progresses from proof-of-principle demonstrations to practical applications, it is important to develop single-copy synthetic modules that minimize consumption of cellular resources and can be stably maintained as genomic integrants. Here we use empirical design, mathematical modeling, and iterative construction and testing to build single-copy, bistable toggle switches with improved performance and reduced metabolic load that can be stably integrated into the host genome. Deterministic and stochastic models led us to focus on basal transcription to optimize circuit performance and helped to explain the resulting circuit robustness across a large range of component expression levels. The design parameters developed here provide important guidance for future efforts to convert functional multi-copy gene circuits into optimized single-copy circuits for practical, real-world use. Copyright © 2016 Elsevier Inc. All rights reserved.

  5. [A new laser scan system for video ophthalmoscopy. Initial clinical experiences also in relation to digital image processing].

    Science.gov (United States)

    Fabian, E; Mertz, M; Hofmann, H; Wertheimer, R; Foos, C

    1990-06-01

    The clinical advantages of a scanning laser ophthalmoscope (SLO) and video imaging of fundus pictures are described. Image quality (contrast, depth of field) and imaging possibilities (confocal stop) are assessed. Imaging with different lasers (argon, He-Ne) and changes in imaging rendered possible by confocal alignment of the imaging optics are discussed. Hard copies from video images are still of inferior quality compared to fundus photographs. Methods of direct processing and retrieval of digitally stored SLO video fundus images are illustrated by examples. Modifications for a definitive laser scanning system - in regard to the field of view and the quality of hard copies - are proposed.

  6. Passive detection of copy-move forgery in digital images: state-of-the-art.

    Science.gov (United States)

    Al-Qershi, Osamah M; Khoo, Bee Ee

    2013-09-10

    Currently, digital images and videos have high importance because they have become the main carriers of information. However, the relative ease of tampering with images and videos makes their authenticity untrustful. Digital image forensics addresses the problem of the authentication of images or their origins. One main branch of image forensics is passive image forgery detection. Images could be forged using different techniques, and the most common forgery is the copy-move, in which a region of an image is duplicated and placed elsewhere in the same image. Active techniques, such as watermarking, have been proposed to solve the image authenticity problem, but those techniques have limitations because they require human intervention or specially equipped cameras. To overcome these limitations, several passive authentication methods have been proposed. In contrast to active methods, passive methods do not require any previous information about the image, and they take advantage of specific detectable changes that forgeries can bring into the image. In this paper, we describe the current state-of-the-art of passive copy-move forgery detection methods. The key current issues in developing a robust copy-move forgery detector are then identified, and the trends of tackling those issues are addressed. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  7. Films/Videos: Guidance for Children's Sound and Safe Development.

    Science.gov (United States)

    Stanford, Beverly Hardcastle

    1993-01-01

    Three videos for adults chronicle the life works of Erik Erikson and Jean Piaget, two giants in the child development field, and three videos for children candidly and sensitively address common problems experienced by children, such as being afraid to read aloud in class, dealing with bullies, and protecting themselves from attack by strangers.…

  8. Using video in childbirth research.

    Science.gov (United States)

    Harte, J Davis; Homer, Caroline Se; Sheehan, Athena; Leap, Nicky; Foureur, Maralyn

    2017-03-01

    Conducting video-research in birth settings raises challenges for ethics review boards to view birthing women and research-midwives as capable, autonomous decision-makers. This study aimed to gain an understanding of how the ethical approval process was experienced and to chronicle the perceived risks and benefits. The Birth Unit Design project was a 2012 Australian ethnographic study that used video recording to investigate the physical design features in the hospital birthing space that might influence both verbal and non-verbal communication and the experiences of childbearing women, midwives and supporters. Participants and research context: Six women, 11 midwives and 11 childbirth supporters were filmed during the women's labours in hospital birth units and interviewed 6 weeks later. Ethical considerations: The study was approved by an Australian Health Research Ethics Committee after a protracted process of negotiation. The ethics committee was influenced by a traditional view of research as based on scientific experiments resulting in a poor understanding of video-ethnographic research, a paradigmatic view of the politics and practicalities of modern childbirth processes, a desire to protect institutions from litigation, and what we perceived as a paternalistic approach towards protecting participants, one that was at odds with our aim to facilitate situations in which women could make flexible, autonomous decisions about how they might engage with the research process. The perceived need for protection was overly burdensome and against the wishes of the participants themselves; ultimately, this limited the capacity of the study to improve care for women and babies. Recommendations are offered for those involved in ethical approval processes for qualitative research in childbirth settings. The complexity of issues within childbirth settings, as in most modern healthcare settings, should be analysed using a variety of research approaches, beyond efficacy

  9. Multimedia authentication for copyright protection

    Science.gov (United States)

    Yin, Mingsheng

    2017-06-01

    Multimedia contents are easy to be copied and modified, so it is important to use authentication technology to ensure reliability and copyright security. Multimedia authentication technology is usually divided into digital signature and digital watermarking. In this paper, we introduce some basic image and video authentication technology, such as PCA algorithm and image signature method based on DCT coefficient, LSB -based digital image watermark, SVD-based digital image watermark, and video watermark. Through these digital content security technology, digital contents can be ensured security

  10. Understanding Video Games

    DEFF Research Database (Denmark)

    Heide Smith, Jonas; Tosca, Susana Pajares; Egenfeldt-Nielsen, Simon

    From Pong to PlayStation 3 and beyond, Understanding Video Games is the first general introduction to the exciting new field of video game studies. This textbook traces the history of video games, introduces the major theories used to analyze games such as ludology and narratology, reviews...... the economics of the game industry, examines the aesthetics of game design, surveys the broad range of game genres, explores player culture, and addresses the major debates surrounding the medium, from educational benefits to the effects of violence. Throughout the book, the authors ask readers to consider...... larger questions about the medium: * What defines a video game? * Who plays games? * Why do we play games? * How do games affect the player? Extensively illustrated, Understanding Video Games is an indispensable and comprehensive resource for those interested in the ways video games are reshaping...

  11. Collaborative Video Sketching

    DEFF Research Database (Denmark)

    Henningsen, Birgitte; Gundersen, Peter Bukovica; Hautopp, Heidi

    2017-01-01

    This paper introduces to what we define as a collaborative video sketching process. This process links various sketching techniques with digital storytelling approaches and creative reflection processes in video productions. Traditionally, sketching has been used by designers across various...... forms and through empirical examples, we present and discuss the video recording of sketching sessions, as well as development of video sketches by rethinking, redoing and editing the recorded sessions. The empirical data is based on workshop sessions with researchers and students from universities...... and university colleges and primary and secondary school teachers. As researchers, we have had different roles in these action research case studies where various video sketching techniques were applied.The analysis illustrates that video sketching can take many forms, and two common features are important...

  12. Reflections on academic video

    Directory of Open Access Journals (Sweden)

    Thommy Eriksson

    2012-11-01

    Full Text Available As academics we study, research and teach audiovisual media, yet rarely disseminate and mediate through it. Today, developments in production technologies have enabled academic researchers to create videos and mediate audiovisually. In academia it is taken for granted that everyone can write a text. Is it now time to assume that everyone can make a video essay? Using the online journal of academic videos Audiovisual Thinking and the videos published in it as a case study, this article seeks to reflect on the emergence and legacy of academic audiovisual dissemination. Anchoring academic video and audiovisual dissemination of knowledge in two critical traditions, documentary theory and semiotics, we will argue that academic video is in fact already present in a variety of academic disciplines, and that academic audiovisual essays are bringing trends and developments that have long been part of academic discourse to their logical conclusion.

  13. EZBC video streaming with channel coding and error concealment

    Science.gov (United States)

    Bajic, Ivan V.; Woods, John W.

    2003-06-01

    In this text we present a system for streaming video content encoded using the motion-compensated Embedded Zero Block Coder (EZBC). The system incorporates unequal loss protection in the form of multiple description FEC (MD-FEC) coding, which provides adequate protection for the embedded video bitstream when the loss process is not very bursty. The adverse effects of burst losses are reduced using a novel motion-compensated error concealmet method.

  14. Sound for digital video

    CERN Document Server

    Holman, Tomlinson

    2013-01-01

    Achieve professional quality sound on a limited budget! Harness all new, Hollywood style audio techniques to bring your independent film and video productions to the next level.In Sound for Digital Video, Second Edition industry experts Tomlinson Holman and Arthur Baum give you the tools and knowledge to apply recent advances in audio capture, video recording, editing workflow, and mixing to your own film or video with stunning results. This fresh edition is chockfull of techniques, tricks, and workflow secrets that you can apply to your own projects from preproduction

  15. Green Power Partnership Videos

    Science.gov (United States)

    The Green Power Partnership develops videos on a regular basis that explore a variety of topics including, Green Power partnership, green power purchasing, Renewable energy certificates, among others.

  16. Error resilience technique for video coding using concealment

    Science.gov (United States)

    Li, Rong; Yu, Sheng-sheng; Zhu, Li

    2009-10-01

    The traditional error resilience technique has been widely used in video coding. Many literatures have shown that with the technique's help, the video coding bit stream can been protected and the reconstructed image will get high improvement. In this paper, we review the error resilience for video coding and give the experiment of this new technology. These techniques are based on coding simultaneously for synchronization and error protection or detection. We apply the techniques to improve the performance of the multiplexing protocol and also to improve the robustness of the coded video. The techniques proposed for the video also have the advantage of simple trans-coding with bit streams complying in H.263.

  17. Security and Privacy in Video Surveillance: Requirements and Challenges

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.

    2014-01-01

    Use of video surveillance has substantially increased in the last few decades. Modern video surveillance systems are equipped with techniques that allow traversal of data in an effective and efficient manner, giving massive powers to operators and potentially compromising the privacy of anyone...... observed by the system. Several techniques to protect the privacy of individuals have therefore been proposed, but very little research work has focused on the specific security requirements of video surveillance data (in transit or in storage) and on authorizing access to this data. In this paper, we...... present a general model of video surveillance systems that will help identify the major security and privacy requirements for a video surveillance system and we use this model to identify practical challenges in ensuring the security of video surveillance data in all stages (in transit and at rest). Our...

  18. Research on Agricultural Surveillance Video of Intelligent Tracking

    Science.gov (United States)

    Cai, Lecai; Xu, Jijia; Liangping, Jin; He, Zhiyong

    Intelligent video tracking technology is the digital video processing and analysis of an important field of application in the civilian and military defense have a wide range of applications. In this paper, a systematic study on the surveillance video of the Smart in the agricultural tracking, particularly in target detection and tracking problem of the study, respectively for the static background of the video sequences of moving targets detection and tracking algorithm, the goal of agricultural production for rapid detection and tracking algorithm and Mean Shift-based translation and rotation of the target tracking algorithm. Experimental results show that the system can effectively and accurately track the target in the surveillance video. Therefore, in agriculture for the intelligent video surveillance tracking study, whether it is from the environmental protection or social security, economic efficiency point of view, are very meaningful.

  19. Video over DSL with LDGM Codes for Interactive Applications

    Directory of Open Access Journals (Sweden)

    Laith Al-Jobouri

    2016-05-01

    Full Text Available Digital Subscriber Line (DSL network access is subject to error bursts, which, for interactive video, can introduce unacceptable latencies if video packets need to be re-sent. If the video packets are protected against errors with Forward Error Correction (FEC, calculation of the application-layer channel codes themselves may also introduce additional latency. This paper proposes Low-Density Generator Matrix (LDGM codes rather than other popular codes because they are more suitable for interactive video streaming, not only for their computational simplicity but also for their licensing advantage. The paper demonstrates that a reduction of up to 4 dB in video distortion is achievable with LDGM Application Layer (AL FEC. In addition, an extension to the LDGM scheme is demonstrated, which works by rearranging the columns of the parity check matrix so as to make it even more resilient to burst errors. Telemedicine and video conferencing are typical target applications.

  20. Report on Disclosure Issues Related to the Use of Copy Control and Digital Rights Management Technologies. OECD Digital Economy Papers, No. 115

    Science.gov (United States)

    OECD Publishing (NJ1), 2006

    2006-01-01

    This report analyses the disclosure issues raised by technically-imposed restrictions on the use of digital content. It focuses on the application of copy control and digital rights management technologies in three areas: copy-protected CDs; online music, and DVD regional coding. In each of these areas, the report examines the kinds of…

  1. Video inpainting under constrained camera motion.

    Science.gov (United States)

    Patwardhan, Kedar A; Sapiro, Guillermo; Bertalmío, Marcelo

    2007-02-01

    A framework for inpainting missing parts of a video sequence recorded with a moving or stationary camera is presented in this work. The region to be inpainted is general: it may be still or moving, in the background or in the foreground, it may occlude one object and be occluded by some other object. The algorithm consists of a simple preprocessing stage and two steps of video inpainting. In the preprocessing stage, we roughly segment each frame into foreground and background. We use this segmentation to build three image mosaics that help to produce time consistent results and also improve the performance of the algorithm by reducing the search space. In the first video inpainting step, we reconstruct moving objects in the foreground that are "occluded" by the region to be inpainted. To this end, we fill the gap as much as possible by copying information from the moving foreground in other frames, using a priority-based scheme. In the second step, we inpaint the remaining hole with the background. To accomplish this, we first align the frames and directly copy when possible. The remaining pixels are filled in by extending spatial texture synthesis techniques to the spatiotemporal domain. The proposed framework has several advantages over state-of-the-art algorithms that deal with similar types of data and constraints. It permits some camera motion, is simple to implement, fast, does not require statistical models of background nor foreground, works well in the presence of rich and cluttered backgrounds, and the results show that there is no visible blurring or motion artifacts. A number of real examples taken with a consumer hand-held camera are shown supporting these findings.

  2. Acoustic Neuroma Educational Video

    Medline Plus

    Full Text Available ... a Group Upcoming Events Video Library Photo Gallery One-on-One Support ANetwork Peer Support Program Community Connections Overview ... group Back Upcoming events Video Library Photo Gallery One-on-One Support Back ANetwork Peer Support Program ...

  3. Reviews in instructional video

    NARCIS (Netherlands)

    van der Meij, Hans

    2017-01-01

    This study investigates the effectiveness of a video tutorial for software training whose construction was based on a combination of insights from multimedia learning and Demonstration-Based Training. In the videos, a model of task performance was enhanced with instructional features that were

  4. Digital Video Editing

    Science.gov (United States)

    McConnell, Terry

    2004-01-01

    Monica Adams, head librarian at Robinson Secondary in Fairfax country, Virginia, states that librarians should have the technical knowledge to support projects related to digital video editing. The process of digital video editing and the cables, storage issues and the computer system with software is described.

  5. AudioMove Video

    DEFF Research Database (Denmark)

    2012-01-01

    Live drawing video experimenting with low tech techniques in the field of sketching and visual sense making. In collaboration with Rune Wehner and Teater Katapult.......Live drawing video experimenting with low tech techniques in the field of sketching and visual sense making. In collaboration with Rune Wehner and Teater Katapult....

  6. Making Good Physics Videos

    Science.gov (United States)

    Lincoln, James

    2017-01-01

    Online videos are an increasingly important way technology is contributing to the improvement of physics teaching. Students and teachers have begun to rely on online videos to provide them with content knowledge and instructional strategies. Online audiences are expecting greater production value, and departments are sometimes requesting educators…

  7. SECRETS OF SONG VIDEO

    Directory of Open Access Journals (Sweden)

    Chernyshov Alexander V.

    2014-04-01

    Full Text Available The article focuses on the origins of the song videos as TV and Internet-genre. In addition, it considers problems of screen images creation depending on the musical form and the text of a songs in connection with relevant principles of accent and phraseological video editing and filming techniques as well as with additional frames and sound elements.

  8. Acoustic Neuroma Educational Video

    Medline Plus

    Full Text Available ... support group for me? Find a Group Upcoming Events Video Library Photo Gallery One-on-One Support ANetwork Peer ... group for me? Find a group Back Upcoming events Video Library Photo Gallery One-on-One Support Back ANetwork ...

  9. Personal Digital Video Stories

    DEFF Research Database (Denmark)

    Ørngreen, Rikke; Henningsen, Birgitte Sølbeck; Louw, Arnt Vestergaard

    2016-01-01

    agenda focusing on video productions in combination with digital storytelling, followed by a presentation of the digital storytelling features. The paper concludes with a suggestion to initiate research in what is identified as Personal Digital Video (PDV) Stories within longitudinal settings, while...

  10. The Video Generation.

    Science.gov (United States)

    Provenzo, Eugene F., Jr.

    1992-01-01

    Video games are neither neutral nor harmless but represent very specific social and symbolic constructs. Research on the social content of today's video games reveals that sex bias and gender stereotyping are widely evident throughout the Nintendo games. Violence and aggression also pervade the great majority of the games. (MLF)

  11. Rheumatoid Arthritis Educational Video Series

    Medline Plus

    Full Text Available ... Patient Webcasts / Rheumatoid Arthritis Educational Video Series Rheumatoid Arthritis Educational Video Series This series of five videos ... member of our patient care team. Managing Your Arthritis Managing Your Arthritis Managing Chronic Pain and Depression ...

  12. Rheumatoid Arthritis Educational Video Series

    Medline Plus

    Full Text Available ... Corner / Patient Webcasts / Rheumatoid Arthritis Educational Video Series Rheumatoid Arthritis Educational Video Series This series of five videos was designed to help you learn more about Rheumatoid Arthritis (RA). You will learn how the diagnosis of ...

  13. Rheumatoid Arthritis Educational Video Series

    Science.gov (United States)

    ... Corner / Patient Webcasts / Rheumatoid Arthritis Educational Video Series Rheumatoid Arthritis Educational Video Series This series of five videos was designed to help you learn more about Rheumatoid Arthritis (RA). You will learn how the diagnosis of ...

  14. NEI You Tube Videos: Amblyopia

    Medline Plus

    Full Text Available ... questions Clinical Studies Publications Catalog Photos and Images Spanish Language Information Grants and Funding Extramural Research Division ... Low Vision Refractive Errors Retinopathy of Prematurity Science Spanish Videos Webinars NEI YouTube Videos: Amblyopia Embedded video ...

  15. Social video content delivery

    CERN Document Server

    Wang, Zhi; Zhu, Wenwu

    2016-01-01

    This brief presents new architecture and strategies for distribution of social video content. A primary framework for socially-aware video delivery and a thorough overview of the possible approaches is provided. The book identifies the unique characteristics of socially-aware video access and social content propagation, revealing the design and integration of individual modules that are aimed at enhancing user experience in the social network context. The change in video content generation, propagation, and consumption for online social networks, has significantly challenged the traditional video delivery paradigm. Given the massive amount of user-generated content shared in online social networks, users are now engaged as active participants in the social ecosystem rather than as passive receivers of media content. This revolution is being driven further by the deep penetration of 3G/4G wireless networks and smart mobile devices that are seamlessly integrated with online social networking and media-sharing s...

  16. Online Interactive Video Vignettes (IVVs)

    Science.gov (United States)

    Laws, Priscilla

    2016-03-01

    Interest in on-line learning is increasing rapidly. A few years ago members of the LivePhoto Physics Group1 received collaborative NSF Grants2 to create short, single-topic, on-line activities that invite introductory physics students to make individual predictions about a phenomenon and test them though video observations or analysis. Each Vignette is designed for web delivery as: (1) an ungraded homework assignment or (2) an exercise to prepare for a class or tutorial session. Sample IVVs are available at the ComPadre website http://www.compadre.org/ivv/. Portions of Vignettes on mechanics topics including Projectile Motion, Circular Motion, the Bullet-Block phenomenon, and Newton's Third Law will be presented. Those attending this talk will be asked to guess what predictions students are likely to make about phenomena in various IVVs. These predictions can be compared to those made by students who completed Vignettes. Finally, research on the impact of Vignettes on student learning and attitudes will be discussed. Co-PI Robert Teese, Rochester Institute of Technology.

  17. Thermodynamics of Computational Copying in Biochemical Systems

    Science.gov (United States)

    Ouldridge, Thomas E.; Govern, Christopher C.; ten Wolde, Pieter Rein

    2017-04-01

    Living cells use readout molecules to record the state of receptor proteins, similar to measurements or copies in typical computational devices. But is this analogy rigorous? Can cells be optimally efficient, and if not, why? We show that, as in computation, a canonical biochemical readout network generates correlations; extracting no work from these correlations sets a lower bound on dissipation. For general input, the biochemical network cannot reach this bound, even with arbitrarily slow reactions or weak thermodynamic driving. It faces an accuracy-dissipation trade-off that is qualitatively distinct from and worse than implied by the bound, and more complex steady-state copy processes cannot perform better. Nonetheless, the cost remains close to the thermodynamic bound unless accuracy is extremely high. Additionally, we show that biomolecular reactions could be used in thermodynamically optimal devices under exogenous manipulation of chemical fuels, suggesting an experimental system for testing computational thermodynamics.

  18. Laser thermographic technologies for hard copy recording

    Science.gov (United States)

    Bessmel'tsev, Viktor P.; Baev, Sergej G.

    1995-04-01

    Methods of hard copies recording based on thermal interaction of the beam from CO2 or YAG lasers with various kinds of films on any substrates have been developed. The recording processes are single-step and require no additional development. Among them are: (1) Laser thermodestruction of thin mask layers or of a material surface on any kinds of substrates. (2) Laser thermochemical reactions of thermal decomposition of metal salts in solid state phase on a surface of various hygroscopic substrates. The laser recording devices using the methods, described above have been developed and are manufactured now; they allow one to record hard copies with a size of up to 27 X 31 inches, a resolution of 4000 dpi.

  19. [Create or copy... Which is the difference?].

    Science.gov (United States)

    López P, Ricardo

    2009-01-01

    Creating and copying are two different processes; we must not confuse creativity with plagiarism. However, this distinction is problematic, because there is no possibility of creating from scratch, this implies that any creative act necessarily arises from accumulative experience, inevitably producing a continuity between old and new. Even so it is necessary to establish clearly the difference between creating and copying. It is not desirable that a matter of such importance remains in the nebula or that the relationship between creativity and ethics is kept unaware. There are many cases of plagiarism, but this cannot be a consolation. There is no gain when the existence of a plagiarism is ignored or concealed and less when it is unjustified.

  20. Does copying idioms foster their recall?

    OpenAIRE

    Stengers, Helene; Deconinck, Julie; Eyckmans, June

    2014-01-01

    This paper describes an experiment that was set up to measure the relative mnemonic effects of enhanced attention to form versus attention to meaning during the acquisition of L2 figurative idioms. Intermediate L2 English students were presented with online exercises on a set of 25 English idioms that they were unfamiliar with. In the first series of exercises, all participants were invited to elaborate on the meaning of the idioms. Afterwards, half of the participants were requested to copy ...

  1. The Gluon Propagator without lattice Gribov copies

    CERN Document Server

    Alexandrou, C; Follana, E; Forcrand, Ph. de

    2001-01-01

    We study the gluon propagator on the lattice using the Laplacian gauge which is free of lattice Gribov copies. We compare our results with those obtained in the Landau gauge on the lattice, as well as with various approximate solutions of the Dyson Schwinger equations. We find a finite value $\\sim (250 \\rm{MeV})^{-2}$ for the zero-momentum propagator, and a pole mass $\\sim 640 \\pm 110$ MeV.

  2. CameraCast: flexible access to remote video sensors

    Science.gov (United States)

    Kong, Jiantao; Ganev, Ivan; Schwan, Karsten; Widener, Patrick

    2007-01-01

    New applications like remote surveillance and online environmental or traffic monitoring are making it increasingly important to provide flexible and protected access to remote video sensor devices. Current systems use application-level codes like web-based solutions to provide such access. This requires adherence to user-level APIs provided by such services, access to remote video information through given application-specific service and server topologies, and that the data being captured and distributed is manipulated by third party service codes. CameraCast is a simple, easily used system-level solution to remote video access. It provides a logical device API so that an application can identically operate on local vs. remote video sensor devices, using its own service and server topologies. In addition, the application can take advantage of API enhancements to protect remote video information, using a capability-based model for differential data protection that offers fine grain control over the information made available to specific codes or machines, thereby limiting their ability to violate privacy or security constraints. Experimental evaluations of CameraCast show that the performance of accessing remote video information approximates that of accesses to local devices, given sufficient networking resources. High performance is also attained when protection restrictions are enforced, due to an efficient kernel-level realization of differential data protection.

  3. Credibility and Authenticity of Digitally Signed Videos in Traffic

    Directory of Open Access Journals (Sweden)

    Ivan Grgurević

    2008-11-01

    Full Text Available The paper presents the possibilities of insuring the credibilityand authenticity of the surveillance camera video by digitalsigning, using the public key infrastructure as part of interoperabletraffic and information system in the future intelligenttransport systems. The surveillance camera video is a sequenceof individual frames and a unique digital print, i. e. hash valueis calculated for each of these. By encryption of the hash valuesof the frames using private encryption key of the surveillancecentre, digital signatures are created and they are stored in thedatabase. The surveillance centre can issue a copy of the videoto all the interested subjects for scientific and research workand investigation. Regardless of the scope, each subsequentmanipulation of the video copy contents will certainly changethe hash value of all the frames. The procedure of determiningthe authenticity and credibility of videos is reduced to the comparisonof the hash values of the frames stored in the databaseof the surveillance centre with the values obtained from the interestedsubjects such as the traffic experts and investigators,surveillance-security services etc.

  4. Genomic copy number variation in Mus musculus.

    Science.gov (United States)

    Locke, M Elizabeth O; Milojevic, Maja; Eitutis, Susan T; Patel, Nisha; Wishart, Andrea E; Daley, Mark; Hill, Kathleen A

    2015-07-04

    Copy number variation is an important dimension of genetic diversity and has implications in development and disease. As an important model organism, the mouse is a prime candidate for copy number variant (CNV) characterization, but this has yet to be completed for a large sample size. Here we report CNV analysis of publicly available, high-density microarray data files for 351 mouse tail samples, including 290 mice that had not been characterized for CNVs previously. We found 9634 putative autosomal CNVs across the samples affecting 6.87% of the mouse reference genome. We find significant differences in the degree of CNV uniqueness (single sample occurrence) and the nature of CNV-gene overlap between wild-caught mice and classical laboratory strains. CNV-gene overlap was associated with lipid metabolism, pheromone response and olfaction compared to immunity, carbohydrate metabolism and amino-acid metabolism for wild-caught mice and classical laboratory strains, respectively. Using two subspecies of wild-caught Mus musculus, we identified putative CNVs unique to those subspecies and show this diversity is better captured by wild-derived laboratory strains than by the classical laboratory strains. A total of 9 genic copy number variable regions (CNVRs) were selected for experimental confirmation by droplet digital PCR (ddPCR). The analysis we present is a comprehensive, genome-wide analysis of CNVs in Mus musculus, which increases the number of known variants in the species and will accelerate the identification of novel variants in future studies.

  5. Video recording of ophthalmic surgery--ethical and legal considerations.

    Science.gov (United States)

    Turnbull, Andrew M J; Emsley, Elizabeth S

    2014-01-01

    Video documenting is increasingly used in ophthalmic training and research, with many ophthalmologists routinely recording their surgical cases. Although this modality represents an excellent means of improving technique and advancing knowledge, there are major ethical and legal considerations with its use. Informed consent to record is required in most situations. Patients should be advised of any risk of identification and the purpose of the recording. Systems should be in place to deal with issues such as data storage, withdrawal of consent, and patients requesting copies of their recording. Privacy and security of neither patients nor health care professionals should be compromised. Ownership and distribution of video recordings, the potential for their use in medical litigation, the ethics and legality of editing and the impact on surgeon performance are other factors to consider. Although video recording of ophthalmic surgery is useful and technically simple to accomplish, patient safety and welfare must always remain paramount. Copyright © 2014 Elsevier Inc. All rights reserved.

  6. A new video programme

    CERN Multimedia

    CERN video productions

    2011-01-01

    "What's new @ CERN?", a new monthly video programme, will be broadcast on the Monday of every month on webcast.cern.ch. Aimed at the general public, the programme will cover the latest CERN news, with guests and explanatory features. Tune in on Monday 3 October at 4 pm (CET) to see the programme in English, and then at 4:20 pm (CET) for the French version.   var flash_video_player=get_video_player_path(); insert_player_for_external('Video/Public/Movies/2011/CERN-MOVIE-2011-129/CERN-MOVIE-2011-129-0753-kbps-640x360-25-fps-audio-64-kbps-44-kHz-stereo', 'mms://mediastream.cern.ch/MediaArchive/Video/Public/Movies/2011/CERN-MOVIE-2011-129/CERN-MOVIE-2011-129-Multirate-200-to-753-kbps-640x360-25-fps.wmv', 'false', 480, 360, 'https://mediastream.cern.ch/MediaArchive/Video/Public/Movies/2011/CERN-MOVIE-2011-129/CERN-MOVIE-2011-129-posterframe-640x360-at-10-percent.jpg', '1383406', true, 'Video/Public/Movies/2011/CERN-MOVIE-2011-129/CERN-MOVIE-2011-129-0600-kbps-maxH-360-25-fps-...

  7. Gamifying Video Object Segmentation.

    Science.gov (United States)

    Spampinato, Concetto; Palazzo, Simone; Giordano, Daniela

    2017-10-01

    Video object segmentation can be considered as one of the most challenging computer vision problems. Indeed, so far, no existing solution is able to effectively deal with the peculiarities of real-world videos, especially in cases of articulated motion and object occlusions; limitations that appear more evident when we compare the performance of automated methods with the human one. However, manually segmenting objects in videos is largely impractical as it requires a lot of time and concentration. To address this problem, in this paper we propose an interactive video object segmentation method, which exploits, on one hand, the capability of humans to identify correctly objects in visual scenes, and on the other hand, the collective human brainpower to solve challenging and large-scale tasks. In particular, our method relies on a game with a purpose to collect human inputs on object locations, followed by an accurate segmentation phase achieved by optimizing an energy function encoding spatial and temporal constraints between object regions as well as human-provided location priors. Performance analysis carried out on complex video benchmarks, and exploiting data provided by over 60 users, demonstrated that our method shows a better trade-off between annotation times and segmentation accuracy than interactive video annotation and automated video object segmentation approaches.

  8. Interactive video algorithms and technologies

    CERN Document Server

    Hammoud, Riad

    2006-01-01

    This book covers both algorithms and technologies of interactive videos, so that businesses in IT and data managements, scientists and software engineers in video processing and computer vision, coaches and instructors that use video technology in teaching, and finally end-users will greatly benefit from it. This book contains excellent scientific contributions made by a number of pioneering scientists and experts from around the globe. It consists of five parts. The first part introduces the reader to interactive video and video summarization and presents effective methodologies for automatic abstraction of a single video sequence, a set of video sequences, and a combined audio-video sequence. In the second part, a list of advanced algorithms and methodologies for automatic and semi-automatic analysis and editing of audio-video documents are presented. The third part tackles a more challenging level of automatic video re-structuring, filtering of video stream by extracting of highlights, events, and meaningf...

  9. 49 CFR 1310.6 - Furnishing copies of tariff publications.

    Science.gov (United States)

    2010-10-01

    ... REQUIREMENTS FOR HOUSEHOLD GOODS CARRIERS § 1310.6 Furnishing copies of tariff publications. (a) Copies of... transportation of household goods, as described in § 1310.4(a)(1), carriers may assess charges for furnishing...

  10. Copying and pasting of examinations within the electronic medical record.

    Science.gov (United States)

    Thielke, Stephen; Hammond, Kenric; Helbig, Susan

    2007-06-01

    Electronic patient records often include text that has been copied and pasted from other records. A type of copying that involves the highest risk for confusion, medical error, and medico-legal harm is the copying of the clinical examination. We studied this phenomenon using an automated text categorization algorithm to detect copied exams in a set of 167,076 VA records. Exam copying occurred frequently, in about 3% of all exams, or in 25% of patient charts. Thirteen percent of all authors had copied at least one exam, and 3% of authors had copied an exam from another author. There were significant differences between service types and levels of training of the authors. We speculate that copying and pasting of exams degrades the quality of the medical record, and that studying this behavior is integral to our understanding of phenomenology of the electronic medical record.

  11. 40 CFR 264.53 - Copies of contingency plan.

    Science.gov (United States)

    2010-07-01

    ... police departments, fire departments, hospitals, and State and local emergency response teams that may be called upon to provide emergency services. ... Contingency Plan and Emergency Procedures § 264.53 Copies of contingency plan. A copy of the contingency plan...

  12. Enhanced Video Surveillance (EVS) with speckle imaging

    Energy Technology Data Exchange (ETDEWEB)

    Carrano, C J

    2004-01-13

    Enhanced Video Surveillance (EVS) with Speckle Imaging is a high-resolution imaging system that substantially improves resolution and contrast in images acquired over long distances. This technology will increase image resolution up to an order of magnitude or greater for video surveillance systems. The system's hardware components are all commercially available and consist of a telescope or large-aperture lens assembly, a high-performance digital camera, and a personal computer. The system's software, developed at LLNL, extends standard speckle-image-processing methods (used in the astronomical community) to solve the atmospheric blurring problem associated with imaging over medium to long distances (hundreds of meters to tens of kilometers) through horizontal or slant-path turbulence. This novel imaging technology will not only enhance national security but also will benefit law enforcement, security contractors, and any private or public entity that uses video surveillance to protect their assets.

  13. Categorizing Video Game Audio

    DEFF Research Database (Denmark)

    Westerberg, Andreas Rytter; Schoenau-Fog, Henrik

    2015-01-01

    This paper dives into the subject of video game audio and how it can be categorized in order to deliver a message to a player in the most precise way. A new categorization, with a new take on the diegetic spaces, can be used a tool of inspiration for sound- and game-designers to rethink how...... they can use audio in video games. The conclusion of this study is that the current models' view of the diegetic spaces, used to categorize video game audio, is not t to categorize all sounds. This can however possibly be changed though a rethinking of how the player interprets audio....

  14. Brains on video games

    OpenAIRE

    Bavelier, Daphne; Green, C. Shawn; Han, Doug Hyun; Renshaw, Perry F.; Merzenich, Michael M.; Gentile, Douglas A.

    2011-01-01

    The popular press is replete with stories about the effects of video and computer games on the brain. Sensationalist headlines claiming that video games ‘damage the brain’ or ‘boost brain power’ do not do justice to the complexities and limitations of the studies involved, and create a confusing overall picture about the effects of gaming on the brain. Here, six experts in the field shed light on our current understanding of the positive and negative ways in which playing video games can affe...

  15. High Dynamic Range Video

    CERN Document Server

    Myszkowski, Karol

    2008-01-01

    This book presents a complete pipeline forHDR image and video processing fromacquisition, through compression and quality evaluation, to display. At the HDR image and video acquisition stage specialized HDR sensors or multi-exposure techniques suitable for traditional cameras are discussed. Then, we present a practical solution for pixel values calibration in terms of photometric or radiometric quantities, which are required in some technically oriented applications. Also, we cover the problem of efficient image and video compression and encoding either for storage or transmission purposes, in

  16. 3D video

    CERN Document Server

    Lucas, Laurent; Loscos, Céline

    2013-01-01

    While 3D vision has existed for many years, the use of 3D cameras and video-based modeling by the film industry has induced an explosion of interest for 3D acquisition technology, 3D content and 3D displays. As such, 3D video has become one of the new technology trends of this century.The chapters in this book cover a large spectrum of areas connected to 3D video, which are presented both theoretically and technologically, while taking into account both physiological and perceptual aspects. Stepping away from traditional 3D vision, the authors, all currently involved in these areas, provide th

  17. Single-copy insertion of transgenes in Caenorhabditis elegans

    DEFF Research Database (Denmark)

    Frøkjaer-Jensen, Christian; Davis, M Wayne; Hopkins, Christopher E

    2008-01-01

    developed a method that inserts a single copy of a transgene into a defined site. Mobilization of a Mos1 transposon generates a double-strand break in noncoding DNA. The break is repaired by copying DNA from an extrachromosomal template into the chromosomal site. Homozygous single-copy insertions can...

  18. 19 CFR 151.64 - Extra copy of entry summary.

    Science.gov (United States)

    2010-04-01

    ... TREASURY (CONTINUED) EXAMINATION, SAMPLING, AND TESTING OF MERCHANDISE Wool and Hair § 151.64 Extra copy of entry summary. One extra copy of the entry summary covering wool or hair subject to duty at a rate per clean kilogram shall be filed in addition to the copies otherwise required. ...

  19. A procurement decision model for a video rental store — A case study

    African Journals Online (AJOL)

    eral; hence the video rental store owner (the decision maker) is required to procure new titles periodically. The question addressed in this paper is how to determine which movie titles to acquire, and how many copies of each in order to best maximise profit. An approx- imated demand function is presented, and attributes of ...

  20. Adaptive and ubiquitous video streaming over Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Malik Mubashir Hassan

    2016-10-01

    Full Text Available In recent years, with the dramatic improvement on scalability of H.264/MPEG-4 standard and growing demand for new multimedia services have spurred the research on scalable video streaming over wireless networks in both industry and academia. Video streaming applications are increasingly being deployed in Wireless Mesh Networks (WMNs. However, robust streaming of video over WMNs poses many challenges due to varying nature of wireless networks. Bit-errors, packet-losses and burst-packet-losses are very common in such type of networks, which severely influence the perceived video quality at receiving end. Therefore, a carefully-designed error recovery scheme must be employed. In this paper, we propose an interactive and ubiquitous video streaming scheme for Scalable Video Coding (SVC based video streaming over WMNs towards heterogeneous receivers. Intelligently taking the benefit of path diversity, the proposed scheme initially calculates the quality of all candidate paths and then based on quality of path it decides adaptively the size and level of error protection for all packets in order to combat the effect of losses on perceived quality of reconstructed video at receiving end. Our experimental results show that the proposed streaming approach can react to varying channel conditions with less degradation in video quality.

  1. Videos, Podcasts and Livechats

    Medline Plus

    Full Text Available ... Care Disease Types FAQ Handout for Patients and Families Is It Right for You How to Get ... For the Media For Clinicians For Policymakers For Family Caregivers Glossary Menu In this section Links Videos ...

  2. Videos, Podcasts and Livechats

    Medline Plus

    Full Text Available ... Donate Search Search What Is It Definition Pediatric Palliative Care Disease Types FAQ Handout for Patients and Families ... Policymakers For Family Caregivers Glossary Resources Browse our palliative care resources below: Links Videos Podcasts Webinars For the ...

  3. Acoustic Neuroma Educational Video

    Medline Plus

    Full Text Available ... Click to learn more... LOGIN CALENDAR DONATE NEWS Home Learn Back Learn about acoustic neuroma AN Facts ... Vision & Values Leadership & Staff Annual Reports Shop ANA Home Learn Educational Video Ronson and Kerri Albany Support ...

  4. Videos, Podcasts and Livechats

    Medline Plus

    Full Text Available ... Donate Search Search What Is It Definition Pediatric Palliative Care Disease Types FAQ Handout for Patients and ... Policymakers For Family Caregivers Glossary Resources Browse our palliative care resources below: Links Videos Podcasts Webinars For ...

  5. Acoustic Neuroma Educational Video

    Medline Plus

    Full Text Available ... Click to learn more... LOGIN CALENDAR DONATE NEWS Home Learn Back Learn about acoustic neuroma AN Facts ... Vision & Values Leadership & Staff Annual Reports Shop ANA Home Learn Educational Video Howard of NJ Gloria hiking ...

  6. Acoustic Neuroma Educational Video

    Medline Plus

    Full Text Available ... Mission, Vision & Values Shop ANA Leadership & Staff Annual Reports Acoustic Neuroma Association 600 Peachtree Parkway Suite 108 ... About ANA Mission, Vision & Values Leadership & Staff Annual Reports Shop ANA Home Learn Educational Video English English ...

  7. Videos, Podcasts and Livechats

    Medline Plus

    Full Text Available ... Disease Types Stories FAQ Handout for Patients and Families Is It Right for You How to Get ... For the Media For Clinicians For Policymakers For Family Caregivers Glossary Menu In this section Links Videos ...

  8. Videos, Podcasts and Livechats

    Medline Plus

    Full Text Available ... Search Search What Is It Definition Pediatric Palliative Care Disease Types FAQ Handout for Patients and Families ... For Family Caregivers Glossary Resources Browse our palliative care resources below: Links Videos Podcasts Webinars For the ...

  9. Acoustic Neuroma Educational Video

    Medline Plus

    Full Text Available ... Educational Video Scott at the Grand Canyon Proton Center load more hold SHIFT key to load all load all Stay Connected with ANA Newly Diagnosed Living with AN Healthcare Providers Acoustic Neuroma Association Donate Now Newly Diagnosed ...

  10. The video violence debate.

    Science.gov (United States)

    Lande, R G

    1993-04-01

    Some researchers and theorists are convinced that graphic scenes of violence on television and in movies are inextricably linked to human aggression. Others insist that a link has not been conclusively established. This paper summarizes scientific studies that have informed these two perspectives. Although many instances of children and adults imitating video violence have been documented, no court has imposed liability for harm allegedly resulting from a video program, an indication that considerable doubt still exists about the role of video violence in stimulating human aggression. The author suggests that a small group of vulnerable viewers are probably more impressionable and therefore more likely to suffer deleterious effects from violent programming. He proposes that research on video violence be narrowed to identifying and describing the vulnerable viewer.

  11. Acoustic Neuroma Educational Video

    Medline Plus

    Full Text Available ... a patient kit Keywords Join/Renew Programs Back Support Groups Is a support group for me? Find ... Events Video Library Photo Gallery One-on-One Support ANetwork Peer Support Program Community Connections Overview Find ...

  12. Acoustic Neuroma Educational Video

    Medline Plus

    Full Text Available ... Click to learn more... LOGIN CALENDAR DONATE NEWS Home Learn Back Learn about acoustic neuroma AN Facts ... Vision & Values Leadership & Staff Annual Reports Shop ANA Home Learn Educational Video English English Arabic Catalan Chinese ( ...

  13. Video i VIA

    DEFF Research Database (Denmark)

    2012-01-01

    Artiklen beskriver et udviklingsprojekt, hvor 13 grupper af lærere på tværs af fag og uddannelser producerede video til undervsioningsbrug. Der beskrives forskellige tilgange og anvendelser samt læringen i projektet...

  14. Videos, Podcasts and Livechats

    Medline Plus

    Full Text Available ... to your Doctor Find a Provider Meet the Team Blog Articles & Stories News Resources Links Videos Podcasts ... to your Doctor Find a Provider Meet the Team Blog Articles & Stories News Provider Directory Donate Resources ...

  15. Acoustic Neuroma Educational Video

    Medline Plus

    Full Text Available ... Click to learn more... LOGIN CALENDAR DONATE NEWS Home Learn Back Learn about acoustic neuroma AN Facts ... Vision & Values Leadership & Staff Annual Reports Shop ANA Home Learn Educational Video Keck Medicine of USC ANWarriors ...

  16. Videos, Podcasts and Livechats

    Medline Plus

    Full Text Available ... illness: Toby’s palliative care story Access the Provider Directory Handout for Patients and Families Is it Right ... Provider Meet the Team Blog Articles News Provider Directory Donate Resources Links Videos Podcasts Webinars For the ...

  17. Acoustic Neuroma Educational Video

    Medline Plus

    Full Text Available ... Click to learn more... LOGIN EVENTS DONATE NEWS Home Learn Back Learn about acoustic neuroma AN Facts ... Vision & Values Leadership & Staff Annual Reports Shop ANA Home Learn Educational Video Scott at the Grand Canyon ...

  18. Acoustic Neuroma Educational Video

    Medline Plus

    Full Text Available ... Is a support group for me? Find a Group Upcoming Events Video Library Photo Gallery One-on-One Support ANetwork Peer Support Program Community Connections Overview Find a Meeting ...

  19. Photos and Videos

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Observers are required to take photos and/or videos of all incidentally caught sea turtles, marine mammals, seabirds and unusual or rare fish. On the first 3...

  20. Videos, Podcasts and Livechats

    Medline Plus

    Full Text Available ... All rights reserved. GetPalliativeCare.org does not provide medical advice, diagnosis or treatment. ... the Team Blog Articles & Stories News Provider Directory Donate Resources Links Videos ...

  1. SEFIS Video Data

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This is a fishery-independent survey that collects data on reef fish in southeast US waters using multiple gears, including chevron traps, video cameras, ROVs,...

  2. NEI You Tube Videos: Amblyopia

    Medline Plus

    Full Text Available ... search for current job openings visit HHS USAJobs Home > NEI YouTube Videos > NEI YouTube Videos: Amblyopia NEI YouTube Videos YouTube Videos Home Age-Related Macular Degeneration Amblyopia Animations Blindness Cataract ...

  3. NEI You Tube Videos: Amblyopia

    Medline Plus

    Full Text Available ... Amaurosis Low Vision Refractive Errors Retinopathy of Prematurity Science Spanish Videos Webinars NEI YouTube Videos: Amblyopia Embedded video for NEI YouTube Videos: Amblyopia NEI Home Contact Us A-Z Site Map NEI on Social Media Information in Spanish (Información en español) Website, ...

  4. Studenterproduceret video til eksamen

    DEFF Research Database (Denmark)

    Jensen, Kristian Nøhr; Hansen, Kenneth

    2016-01-01

    Formålet med denne artikel er at vise, hvordan læringsdesign og stilladsering kan anvendes til at skabe en ramme for studenterproduceret video til eksamen på videregående uddannelser. Artiklen tager udgangspunkt i en problemstilling, hvor uddannelsesinstitutionerne skal håndtere og koordinere...... de fagfaglige og mediefaglige undervisere et redskab til at fokusere og koordinere indsatsen frem mod målet med, at de studerende producerer og anvender video til eksamen....

  5. Video Editing System

    Science.gov (United States)

    Schlecht, Leslie E.; Kutler, Paul (Technical Monitor)

    1998-01-01

    This is a proposal for a general use system based, on the SGI IRIS workstation platform, for recording computer animation to videotape. In addition, this system would provide features for simple editing and enhancement. Described here are a list of requirements for the system, and a proposed configuration including the SGI VideoLab Integrator, VideoMedia VLAN animation controller and the Pioneer rewritable laserdisc recorder.

  6. Video Games and Citizenship

    OpenAIRE

    Bourgonjon, Jeroen; Soetaert, Ronald

    2013-01-01

    In their article "Video Games and Citizenship" Jeroen Bourgonjon and Ronald Soetaert argue that digitization problematizes and broadens our perspective on culture and popular media, and that this has important ramifications for our understanding of citizenship. Bourgonjon and Soetaert respond to the call of Gert Biesta for the contextualized study of young people's practices by exploring a particular aspect of digitization that affects young people, namely video games. They explore the new so...

  7. Android Video Streaming

    Science.gov (United States)

    2014-05-01

    be processed by a nearby high -performance computing asset and returned to a squad of Soldiers with annotations indicating the location of friendly and...is to change the resolution, bitrate, and/or framerate of the video being transmitted to the client, reducing the bandwidth requirements of the...video. This solution is typically not viable because a progressive download is required to have a constant resolution, bitrate, and framerate because

  8. Robust video object cosegmentation.

    Science.gov (United States)

    Wang, Wenguan; Shen, Jianbing; Li, Xuelong; Porikli, Fatih

    2015-10-01

    With ever-increasing volumes of video data, automatic extraction of salient object regions became even more significant for visual analytic solutions. This surge has also opened up opportunities for taking advantage of collective cues encapsulated in multiple videos in a cooperative manner. However, it also brings up major challenges, such as handling of drastic appearance, motion pattern, and pose variations, of foreground objects as well as indiscriminate backgrounds. Here, we present a cosegmentation framework to discover and segment out common object regions across multiple frames and multiple videos in a joint fashion. We incorporate three types of cues, i.e., intraframe saliency, interframe consistency, and across-video similarity into an energy optimization framework that does not make restrictive assumptions on foreground appearance and motion model, and does not require objects to be visible in all frames. We also introduce a spatio-temporal scale-invariant feature transform (SIFT) flow descriptor to integrate across-video correspondence from the conventional SIFT-flow into interframe motion flow from optical flow. This novel spatio-temporal SIFT flow generates reliable estimations of common foregrounds over the entire video data set. Experimental results show that our method outperforms the state-of-the-art on a new extensive data set (ViCoSeg).

  9. Digital image forensics for photographic copying

    Science.gov (United States)

    Yin, Jing; Fang, Yanmei

    2012-03-01

    Image display technology has greatly developed over the past few decades, which make it possible to recapture high-quality images from the display medium, such as a liquid crystal display(LCD) screen or a printed paper. The recaptured images are not regarded as a separate image class in the current research of digital image forensics, while the content of the recaptured images may have been tempered. In this paper, two sets of features based on the noise and the traces of double JPEG compression are proposed to identify these recaptured images. Experimental results showed that our proposed features perform well for detecting photographic copying.

  10. Getting DNA copy numbers without control samples.

    Science.gov (United States)

    Ortiz-Estevez, Maria; Aramburu, Ander; Rubio, Angel

    2012-08-16

    The selection of the reference to scale the data in a copy number analysis has paramount importance to achieve accurate estimates. Usually this reference is generated using control samples included in the study. However, these control samples are not always available and in these cases, an artificial reference must be created. A proper generation of this signal is crucial in terms of both noise and bias.We propose NSA (Normality Search Algorithm), a scaling method that works with and without control samples. It is based on the assumption that genomic regions enriched in SNPs with identical copy numbers in both alleles are likely to be normal. These normal regions are predicted for each sample individually and used to calculate the final reference signal. NSA can be applied to any CN data regardless the microarray technology and preprocessing method. It also finds an optimal weighting of the samples minimizing possible batch effects. Five human datasets (a subset of HapMap samples, Glioblastoma Multiforme (GBM), Ovarian, Prostate and Lung Cancer experiments) have been analyzed. It is shown that using only tumoral samples, NSA is able to remove the bias in the copy number estimation, to reduce the noise and therefore, to increase the ability to detect copy number aberrations (CNAs). These improvements allow NSA to also detect recurrent aberrations more accurately than other state of the art methods. NSA provides a robust and accurate reference for scaling probe signals data to CN values without the need of control samples. It minimizes the problems of bias, noise and batch effects in the estimation of CNs. Therefore, NSA scaling approach helps to better detect recurrent CNAs than current methods. The automatic selection of references makes it useful to perform bulk analysis of many GEO or ArrayExpress experiments without the need of developing a parser to find the normal samples or possible batches within the data. The method is available in the open-source R package

  11. Getting DNA copy numbers without control samples

    Directory of Open Access Journals (Sweden)

    Ortiz-Estevez Maria

    2012-08-01

    Full Text Available Abstract Background The selection of the reference to scale the data in a copy number analysis has paramount importance to achieve accurate estimates. Usually this reference is generated using control samples included in the study. However, these control samples are not always available and in these cases, an artificial reference must be created. A proper generation of this signal is crucial in terms of both noise and bias. We propose NSA (Normality Search Algorithm, a scaling method that works with and without control samples. It is based on the assumption that genomic regions enriched in SNPs with identical copy numbers in both alleles are likely to be normal. These normal regions are predicted for each sample individually and used to calculate the final reference signal. NSA can be applied to any CN data regardless the microarray technology and preprocessing method. It also finds an optimal weighting of the samples minimizing possible batch effects. Results Five human datasets (a subset of HapMap samples, Glioblastoma Multiforme (GBM, Ovarian, Prostate and Lung Cancer experiments have been analyzed. It is shown that using only tumoral samples, NSA is able to remove the bias in the copy number estimation, to reduce the noise and therefore, to increase the ability to detect copy number aberrations (CNAs. These improvements allow NSA to also detect recurrent aberrations more accurately than other state of the art methods. Conclusions NSA provides a robust and accurate reference for scaling probe signals data to CN values without the need of control samples. It minimizes the problems of bias, noise and batch effects in the estimation of CNs. Therefore, NSA scaling approach helps to better detect recurrent CNAs than current methods. The automatic selection of references makes it useful to perform bulk analysis of many GEO or ArrayExpress experiments without the need of developing a parser to find the normal samples or possible batches within the

  12. Adaptive Error Resilience for Video Streaming

    Directory of Open Access Journals (Sweden)

    Lakshmi R. Siruvuri

    2009-01-01

    Full Text Available Compressed video sequences are vulnerable to channel errors, to the extent that minor errors and/or small losses can result in substantial degradation. Thus, protecting compressed data against channel errors is imperative. The use of channel coding schemes can be effective in reducing the impact of channel errors, although this requires that extra parity bits to be transmitted, thus utilizing more bandwidth. However, this can be ameliorated if the transmitter can tailor the parity data rate based on its knowledge regarding current channel conditions. This can be achieved via feedback from the receiver to the transmitter. This paper describes a channel emulation system comprised of a server/proxy/client combination that utilizes feedback from the client to adapt the number of Reed-Solomon parity symbols used to protect compressed video sequences against channel errors.

  13. Identification of copy number variants in horses

    KAUST Repository

    Doan, R.

    2012-03-01

    Copy number variants (CNVs) represent a substantial source of genetic variation in mammals. However, the occurrence of CNVs in horses and their subsequent impact on phenotypic variation is unknown. We performed a study to identify CNVs in 16 horses representing 15 distinct breeds (Equus caballus) and an individual gray donkey (Equus asinus) using a whole-exome tiling array and the array comparative genomic hybridization methodology. We identified 2368 CNVs ranging in size from 197 bp to 3.5 Mb. Merging identical CNVs from each animal yielded 775 CNV regions (CNVRs), involving 1707 protein- and RNA-coding genes. The number of CNVs per animal ranged from 55 to 347, with median and mean sizes of CNVs of 5.3 kb and 99.4 kb, respectively. Approximately 6% of the genes investigated were affected by a CNV. Biological process enrichment analysis indicated CNVs primarily affected genes involved in sensory perception, signal transduction, and metabolism. CNVs also were identified in genes regulating blood group antigens, coat color, fecundity, lactation, keratin formation, neuronal homeostasis, and height in other species. Collectively, these data are the first report of copy number variation in horses and suggest that CNVs are common in the horse genome and may modulate biological processes underlying different traits observed among horses and horse breeds.

  14. DIGITAL WATERMARKING SCHEMES FOR AUTHORIZATION AGAINST COPYING OR PIRACY OF COLOR IMAGES

    OpenAIRE

    Dheerendra S Tomar; Keshav S Rawat,

    2010-01-01

    This paper presents digital watermarking methods for authorization against copying or piracy of color images. Watermarking is a very important field for copyrights of various electronic documents and media. With images widely available on the Internet, it may sometimes be desirable to use watermarks. Digital watermarking is the processing of combined information into a digital signal. A watermark is a secondary image, which is overlaid on the host image, and provides a means of protecting the...

  15. Deep video deblurring

    KAUST Repository

    Su, Shuochen

    2016-11-25

    Motion blur from camera shake is a major problem in videos captured by hand-held devices. Unlike single-image deblurring, video-based approaches can take advantage of the abundant information that exists across neighboring frames. As a result the best performing methods rely on aligning nearby frames. However, aligning images is a computationally expensive and fragile procedure, and methods that aggregate information must therefore be able to identify which regions have been accurately aligned and which have not, a task which requires high level scene understanding. In this work, we introduce a deep learning solution to video deblurring, where a CNN is trained end-to-end to learn how to accumulate information across frames. To train this network, we collected a dataset of real videos recorded with a high framerate camera, which we use to generate synthetic motion blur for supervision. We show that the features learned from this dataset extend to deblurring motion blur that arises due to camera shake in a wide range of videos, and compare the quality of results to a number of other baselines.

  16. Talking Video in 'Everyday Life'

    DEFF Research Database (Denmark)

    McIlvenny, Paul

    For better or worse, video technologies have made their way into many domains of social life, for example in the domain of therapeutics. Techniques such as Marte Meo, Video Interaction Guidance (ViG), Video-Enhanced Reflection on Communication, Video Home Training and Video intervention....../prevention (VIP) all promote the use of video as a therapeutic tool. This paper focuses on media therapeutics and the various in situ uses of video technologies in the mass media for therapeutic purposes. Reality TV parenting programmes such as Supernanny, Little Angels, The House of Tiny Tearaways, Honey, We......’re Killing the Kids, and Driving Mum and Dad Mad all use video as a prominent element of not only the audiovisual spectacle of reality television but also the interactional therapy, counselling, coaching and/or instruction intrinsic to these programmes. Thus, talk-on-video is used to intervene...

  17. [Research on potential interaction between mitochondrial DNA copy number and related factors on risk of hypertension in coal miners].

    Science.gov (United States)

    Guo, J Y; Lei, L J; Qiao, N; Fan, G Q; Sun, C M; Huang, J J; Wang, T

    2017-01-10

    Objective: To investigate the effects of mitochondrial DNA (mtDNA) copy number in peripheral blood and related factors on the risk of hypertension in coal miners. Methods: A case-control study was conducted in 378 coal miners with hypertension and 325 healthy coal miners recruited from Datong Coal Mine Group. A standard questionnaire was used to collect their general information, such as demographic characteristics, habits and occupational history. Fluorescence quantitative PCR was performed to detect the copy number of mtDNA. Logistic regression model was applied for identifying the related risk factors of hypertension and analyzing the interaction between mtDNA copy number and risk factors. Results: The prevalence of hypertension of high mtDNA copy number was lower than mtDNA copy numberin 0-5.67 group, but the difference was not statistically significant (P=0.414). Alcohol drinking (OR=1.80, 95% CI: 1.26-2.56), family history of hypertension (OR=1.74, 95% CI: 1.20- 2.50), work shifts (OR=0.69, 95% CI: 0.48-0.99), education level (P=0.012) and family monthly income level (P=0.001) were related to the prevalence of hypertension. There were potential interactions between mtDNA copy number and alcohol drinking, family monthly income level, family history of hypertension, respectively. Alcohol drinking was a risk factor for hypertension [1.77 (1.25-2.50)]. Potential interactions between mtDNA copy number and alcohol drinking reduced the risk of hypertension (OR=1.20, 95% CI: 1.07-1.35). Family history of hypertension was a risk factor for hypertension [1.81(1.26-2.59)]. Potential interactions between mtDNA copy number and family history of hypertension reduced the risk of hypertension (OR=1.24, 95%CI: 1.09-1.41). Family monthly income level was a protect factor for hypertension [0.55(0.46-0.66)]. Potential interactions between mtDNA copy number and family monthly income level increased the protection role of hypertension (OR=0.90, 95% CI: 0.86-0.94). Conclusion: mt

  18. Video y desarrollo rural

    Directory of Open Access Journals (Sweden)

    Fraser Colin

    2015-01-01

    Full Text Available Las primeras experiencias de video rural fueron realizadas en Perú y México. El proyecto peruano es conocido como CESPAC (Centro de Servicios de Pedagogía Audiovisual para la Capacitación. Con financiamiento externo de la FAO fue iniciado en la década del 70. El proyecto mexicano fue bautizado con el nombre de PRODERITH (Programa de Desarrollo Rural Integrado del Trópico Húmedo. Su componente de video rural tuvo un éxito muy particular a nivel de base.La evaluación concluyó en que el video rural como sistema de comunicación social para el desarrollo es excelente y de bajo costo

  19. A Big Video Manifesto

    DEFF Research Database (Denmark)

    Mcilvenny, Paul Bruce; Davidsen, Jacob

    2017-01-01

    For the last few years, we have witnessed a hype about the potential results and insights that quantitative big data can bring to the social sciences. The wonder of big data has moved into education, traffic planning, and disease control with a promise of making things better with big numbers...... and beautiful visualisations. However, we also need to ask what the tools of big data can do both for the Humanities and for more interpretative approaches and methods. Thus, we prefer to explore how the power of computation, new sensor technologies and massive storage can also help with video-based qualitative...... inquiry, such as video ethnography, ethnovideo, performance documentation, anthropology and multimodal interaction analysis. That is why we put forward, half-jokingly at first, a Big Video manifesto to spur innovation in the Digital Humanities....

  20. Online video examination

    DEFF Research Database (Denmark)

    Qvist, Palle

    courses are accredited to the master programme. The programme is online, worldwide and on demand. It recruits students from all over the world. The programme is organized exemplary in accordance the principles in the problem-based and project-based learning method used at Aalborg University where students......The Master programme in Problem-Based Learning in Engineering and Science, MPBL (www.mpbl.aau.dk), at Aalborg University, is an international programme offering formalized staff development. The programme is also offered in smaller parts as single subject courses (SSC). Passed single subject...... have large influence on their own teaching, learning and curriculum. The programme offers streamed videos in combination with other learning resources. It is a concept which offers video as pure presentation - video lectures - but also as an instructional tool which gives the students the possibility...

  1. Brains on video games.

    Science.gov (United States)

    Bavelier, Daphne; Green, C Shawn; Han, Doug Hyun; Renshaw, Perry F; Merzenich, Michael M; Gentile, Douglas A

    2011-11-18

    The popular press is replete with stories about the effects of video and computer games on the brain. Sensationalist headlines claiming that video games 'damage the brain' or 'boost brain power' do not do justice to the complexities and limitations of the studies involved, and create a confusing overall picture about the effects of gaming on the brain. Here, six experts in the field shed light on our current understanding of the positive and negative ways in which playing video games can affect cognition and behaviour, and explain how this knowledge can be harnessed for educational and rehabilitation purposes. As research in this area is still in its early days, the contributors of this Viewpoint also discuss several issues and challenges that should be addressed to move the field forward.

  2. Double-Copy Constructions and Unitarity Cuts

    CERN Document Server

    Bern, Zvi; Nohle, Josh

    2016-01-01

    The duality between color and kinematics enables the construction of multiloop gravity integrands directly from corresponding gauge-theory integrands. This has led to new nontrivial insights into the structure of gravity theories, including the discovery of enhanced ultraviolet cancellations. To continue to gain deeper understandings and probe these new properties, it is crucial to further improve techniques for constructing multiloop gravity integrands. In this paper, we show by example how one can alleviate difficulties encountered at the multiloop level by relaxing the color-kinematics duality conditions to hold manifestly only on unitarity cuts instead of globally on loop integrands. As an example, we use a minimal ansatz to construct an integrand for the two-loop four-point nonsupersymmetric pure Yang-Mills amplitude in $D$ dimensions that is compatible with these relaxed color-kinematics duality constraints. We then immediately obtain a corresponding gravity integrand through the double-copy procedure. ...

  3. Copy number variation in the bovine genome

    DEFF Research Database (Denmark)

    Fadista, João; Thomsen, Bo; Holm, Lars-Erik

    2010-01-01

    to genetic variation in cattle. Results We designed and used a set of NimbleGen CGH arrays that tile across the assayable portion of the cattle genome with approximately 6.3 million probes, at a median probe spacing of 301 bp. This study reports the highest resolution map of copy number variation...... in the cattle genome, with 304 CNV regions (CNVRs) being identified among the genomes of 20 bovine samples from 4 dairy and beef breeds. The CNVRs identified covered 0.68% (22 Mb) of the genome, and ranged in size from 1.7 to 2,031 kb (median size 16.7 kb). About 20% of the CNVs co-localized with segmental...

  4. Comparing Android Applications to Find Copying

    Directory of Open Access Journals (Sweden)

    Larry Melling

    2012-03-01

    Full Text Available The Android smartphone operating system includes a Java mobile development platform that provides for rapid development and deployment of a wide variety of applications. The open nature of the platform means that reverse engineering of applications is relatively easy, and many developers are concerned as applications similar to their own show up in the Android marketplace and want to know if these applications are pirated. Fortunately, the same characteristics that make an Android application easy to reverse engineer and copy also provide opportunities for Android developers to compare downloaded applications to their own. This paper describes the process for comparing a developer’s application with a downloaded application and defines an identifiability metric to quantify the degree to which an application can be identified by its bytecode.

  5. Video library for video imaging detection at intersection stop lines.

    Science.gov (United States)

    2010-04-01

    The objective of this activity was to record video that could be used for controlled : evaluation of video image vehicle detection system (VIVDS) products and software upgrades to : existing products based on a list of conditions that might be diffic...

  6. The standardised copy of pentagons test

    Science.gov (United States)

    2011-01-01

    Background The 'double-diamond copy' task is a simple paper and pencil test part of the Bender-Gestalt Test and the Mini Mental State Examination (MMSE). Although it is a widely used test, its method of scoring is crude and its psychometric properties are not adequately known. The aim of the present study was to develop a sensitive and reliable method of administration and scoring. Methods The study sample included 93 normal control subjects (53 women and 40 men) aged 35.87 ± 12.62 and 127 patients suffering from schizophrenia (54 women and 73 men) aged 34.07 ± 9.83. Results The scoring method was based on the frequencies of responses of healthy controls and proved to be relatively reliable with Cronbach's α equal to 0.61, test-retest correlation coefficient equal to 0.41 and inter-rater reliability equal to 0.52. The factor analysis produced two indices and six subscales of the Standardised Copy of Pentagons Test (SCPT). The total score as well as most of the individual items and subscales distinguished between controls and patients. The discriminant function correctly classified 63.44% of controls and 75.59% of patients. Discussion The SCPT seems to be a satisfactory, reliable and valid instrument, which is easy to administer, suitable for use in non-organic psychiatric patients and demands minimal time. Further research is necessary to test its psychometric properties and its usefulness and applications as a neuropsychological test. PMID:21481250

  7. Genomic characteristics of cattle copy number variations

    Directory of Open Access Journals (Sweden)

    Matukumalli Lakshmi K

    2011-02-01

    Full Text Available Abstract Background Copy number variation (CNV represents another important source of genetic variation complementary to single nucleotide polymorphism (SNP. High-density SNP array data have been routinely used to detect human CNVs, many of which have significant functional effects on gene expression and human diseases. In the dairy industry, a large quantity of SNP genotyping results are becoming available and can be used for CNV discovery to understand and accelerate genetic improvement for complex traits. Results We performed a systematic analysis of CNV using the Bovine HapMap SNP genotyping data, including 539 animals of 21 modern cattle breeds and 6 outgroups. After correcting genomic waves and considering the pedigree information, we identified 682 candidate CNV regions, which represent 139.8 megabases (~4.60% of the genome. Selected CNVs were further experimentally validated and we found that copy number "gain" CNVs were predominantly clustered in tandem rather than existing as interspersed duplications. Many CNV regions (~56% overlap with cattle genes (1,263, which are significantly enriched for immunity, lactation, reproduction and rumination. The overlap of this new dataset and other published CNV studies was less than 40%; however, our discovery of large, high frequency (> 5% of animals surveyed CNV regions showed 90% agreement with other studies. These results highlight the differences and commonalities between technical platforms. Conclusions We present a comprehensive genomic analysis of cattle CNVs derived from SNP data which will be a valuable genomic variation resource. Combined with SNP detection assays, gene-containing CNV regions may help identify genes undergoing artificial selection in domesticated animals.

  8. User aware video streaming

    Science.gov (United States)

    Kerofsky, Louis; Jagannath, Abhijith; Reznik, Yuriy

    2015-03-01

    We describe the design of a video streaming system using adaptation to viewing conditions to reduce the bitrate needed for delivery of video content. A visual model is used to determine sufficient resolution needed under various viewing conditions. Sensors on a mobile device estimate properties of the viewing conditions, particularly the distance to the viewer. We leverage the framework of existing adaptive bitrate streaming systems such as HLS, Smooth Streaming or MPEG-DASH. The client rate selection logic is modified to include a sufficient resolution computed using the visual model and the estimated viewing conditions. Our experiments demonstrate significant bitrate savings compare to conventional streaming methods which do not exploit viewing conditions.

  9. Contextual analysis of videos

    CERN Document Server

    Thida, Myo; Monekosso, Dorothy

    2013-01-01

    Video context analysis is an active and vibrant research area, which provides means for extracting, analyzing and understanding behavior of a single target and multiple targets. Over the last few decades, computer vision researchers have been working to improve the accuracy and robustness of algorithms to analyse the context of a video automatically. In general, the research work in this area can be categorized into three major topics: 1) counting number of people in the scene 2) tracking individuals in a crowd and 3) understanding behavior of a single target or multiple targets in the scene.

  10. Video-based rendering

    CERN Document Server

    Magnor, Marcus A

    2005-01-01

    Driven by consumer-market applications that enjoy steadily increasing economic importance, graphics hardware and rendering algorithms are a central focus of computer graphics research. Video-based rendering is an approach that aims to overcome the current bottleneck in the time-consuming modeling process and has applications in areas such as computer games, special effects, and interactive TV. This book offers an in-depth introduction to video-based rendering, a rapidly developing new interdisciplinary topic employing techniques from computer graphics, computer vision, and telecommunication en

  11. CERN Video News

    CERN Multimedia

    2003-01-01

    From Monday you can see on the web the new edition of CERN's Video News. Thanks to a collaboration between the audiovisual teams at CERN and Fermilab, you can see a report made by the American laboratory. The clip concerns the LHC magnets that are being constructed at Fermilab. Also in the programme: the spectacular rotation of one of the ATLAS coils, the arrival at CERN of the first American magnet made at Brookhaven, the story of the discovery 20 years ago of the W and Z bosons at CERN. http://www.cern.ch/video or Bulletin web page.

  12. Video special effects editing in MPEG-2 compressed video

    OpenAIRE

    Fernando, WAC; Canagarajah, CN; Bull, David

    2000-01-01

    With the increase of digital technology in video production, several types of complex video special effects editing have begun to appear in video clips. In this paper we consider fade-out and fade-in special effects editing in MPEG-2 compressed video without full frame decompression and motion estimation. We estimated the DCT coefficients and use these coefficients together with the existing motion vectors to produce these special effects editing in compressed domain. Results show that both o...

  13. Innovative Solution to Video Enhancement

    Science.gov (United States)

    2001-01-01

    Through a licensing agreement, Intergraph Government Solutions adapted a technology originally developed at NASA's Marshall Space Flight Center for enhanced video imaging by developing its Video Analyst(TM) System. Marshall's scientists developed the Video Image Stabilization and Registration (VISAR) technology to help FBI agents analyze video footage of the deadly 1996 Olympic Summer Games bombing in Atlanta, Georgia. VISAR technology enhanced nighttime videotapes made with hand-held camcorders, revealing important details about the explosion. Intergraph's Video Analyst System is a simple, effective, and affordable tool for video enhancement and analysis. The benefits associated with the Video Analyst System include support of full-resolution digital video, frame-by-frame analysis, and the ability to store analog video in digital format. Up to 12 hours of digital video can be stored and maintained for reliable footage analysis. The system also includes state-of-the-art features such as stabilization, image enhancement, and convolution to help improve the visibility of subjects in the video without altering underlying footage. Adaptable to many uses, Intergraph#s Video Analyst System meets the stringent demands of the law enforcement industry in the areas of surveillance, crime scene footage, sting operations, and dash-mounted video cameras.

  14. Perpustakaan Nasional Republik Indonesia Sebagai Sumber Copy Cataloging

    Directory of Open Access Journals (Sweden)

    Arief Wicaksono

    2016-12-01

    Full Text Available Copy cataloging is a process to copy metada from one to other library catalogs. The study found that the sources for copy cataloging from the National library are online catalog, National Main Catalog (Katalog Induk Nasional, and Indonesian National Bibliography (Bibliografi Nasional Indonesia. For Indonesian National Bibliography, its copy cataloging has minimum download fiture in MARC and XML format. In order to be used widely, the National Library have promoted and conducted short workshops on copy cataloging along with e-library function. The study also found that there were libraries that have used its national library fiture into their libraries. However, as a general case in Indonesian libraries, copy cataloging, in which it has advantages, still remains lack of use for many libraries.

  15. Copy-move forgery detection in digital image

    Science.gov (United States)

    Alamro, Loai; Yusoff, Nooraini

    2016-08-01

    Copy-move is considered as one of the most popular kind of digital image tempering, in which one or more parts of a digital image are copied and pasted into different locations. Geometric transformation is among the major challenges in detecting copy-move forgery of a digital image. In such forgery, the copied and moved parts of a forged image are either rotated or/and re-scaled. Hence, in this study we propose a combination of Discrete Wavelet Transform (DWT) and Speeded Up Robust Features (SURF) to detect a copy-move activity. The experiments results prove that the proposed method is superior with overall accuracy 95%. The copy-move attacks in digital image has been successfully detected and the method is also can detect the fraud parts exposed to rotation and scaling issue.

  16. A video annotation methodology for interactive video sequence generation

    NARCIS (Netherlands)

    C.A. Lindley; R.A. Earnshaw; J.A. Vince

    2001-01-01

    textabstractThe FRAMES project within the RDN CRC (Cooperative Research Centre for Research Data Networks) has developed an experimental environment for dynamic virtual video sequence synthesis from databases of video data. A major issue for the development of dynamic interactive video applications

  17. Streaming Video--The Wave of the Video Future!

    Science.gov (United States)

    Brown, Laura

    2004-01-01

    Videos and DVDs give the teachers more flexibility than slide projectors, filmstrips, and 16mm films but teachers and students are excited about a new technology called streaming. Streaming allows the educators to view videos on demand via the Internet, which works through the transfer of digital media like video, and voice data that is received…

  18. Beyond Copying: A Comparison of Multi-Component Interventions on Chinese Early Literacy Skills

    Science.gov (United States)

    Wang, Ying; McBride, Catherine

    2017-01-01

    This study assessed the effects of three intervention programs for Chinese literacy development in kindergartners: the copying (Copy) program; a combined program of copying and Pinyin knowledge (Copy + Pinyin); and a combined program of copying and morphological awareness (Copy + MA). Ninety-seven kindergarteners aged 5-7 years in mainland China…

  19. NEI You Tube Videos: Amblyopia

    Medline Plus

    Full Text Available ... Grants and Funding Extramural Research Division of Extramural Science Programs Division of Extramural Activities Extramural Contacts NEI ... Amaurosis Low Vision Refractive Errors Retinopathy of Prematurity Science Spanish Videos Webinars NEI YouTube Videos: Amblyopia Embedded ...

  20. Rheumatoid Arthritis Educational Video Series

    Medline Plus

    Full Text Available ... Corner / Patient Webcasts / Rheumatoid Arthritis Educational Video Series Rheumatoid Arthritis Educational Video Series This series of five ... was designed to help you learn more about Rheumatoid Arthritis (RA). You will learn how the diagnosis ...

  1. Rheumatoid Arthritis Educational Video Series

    Medline Plus

    Full Text Available ... Our Staff Rheumatology Specialty Centers You are here: Home / Patient Corner / Patient Webcasts / Rheumatoid Arthritis Educational Video ... to take a more active role in your care. The information in these videos should not take ...

  2. Rheumatoid Arthritis Educational Video Series

    Medline Plus

    Full Text Available ... will allow you to take a more active role in your care. The information in these videos ... Stategies to Increase your Level of Physical Activity Role of Body Weight in Osteoarthritis Educational Videos for ...

  3. Rheumatoid Arthritis Educational Video Series

    Medline Plus

    Full Text Available ... here. Will You Support the Education of Arthritis Patients? Each year, over 1 million people visit this ... of Body Weight in Osteoarthritis Educational Videos for Patients Rheumatoid Arthritis Educational Video Series Psoriatic Arthritis 101 ...

  4. Videos & Tools: MedlinePlus

    Science.gov (United States)

    ... of this page: https://medlineplus.gov/videosandcooltools.html Videos & Tools To use the sharing features on this page, please enable JavaScript. Watch health videos on topics such as anatomy, body systems, and ...

  5. Health Videos: MedlinePlus

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/anatomyvideos.html.htm Health Videos To use the sharing features on this page, please enable JavaScript. These animated videos show the anatomy of body parts and organ ...

  6. Scanning laser video camera/ microscope

    Science.gov (United States)

    Wang, C. P.; Bow, R. T.

    1984-10-01

    A laser scanning system capable of scanning at standard video rate has been developed. The scanning mirrors, circuit design and system performance, as well as its applications to video cameras and ultra-violet microscopes, are discussed.

  7. Astronomy Video Contest

    Science.gov (United States)

    McFarland, John

    2008-05-01

    During Galileo's lifetime his staunchest supporter was Johannes Kepler, Imperial Mathematician to the Holy Roman Emperor. Johannes Kepler will be in St. Louis to personally offer a tribute to Galileo. Set Galileo's astronomy discoveries to music and you get the newest song by the well known acappella group, THE CHROMATICS. The song, entitled "Shoulders of Giants” was written specifically for IYA-2009 and will be debuted at this conference. The song will also be used as a base to create a music video by synchronizing a person's own images to the song's lyrics and tempo. Thousands of people already do this for fun and post their videos on YOU TUBE and other sites. The ASTRONOMY VIDEO CONTEST will be launched as a vehicle to excite, enthuse and educate people about astronomy and science. It will be an annual event administered by the Johannes Kepler Project and will continue to foster the goals of IYA-2009 for years to come. During this presentation the basic categories, rules, and prizes for the Astronomy Video Contest will be covered and finally the new song "Shoulders of Giants” by THE CHROMATICS will be unveiled

  8. Provocative Video Scenarios

    DEFF Research Database (Denmark)

    Caglio, Agnese

    This paper presents the use of ”provocative videos”, as a tool to support and deepen findings from ethnographic investigation on the theme of remote videocommunication. The videos acted as a resource to also investigate potential for novel technologies supporting continuous connection between...

  9. Fast Aerial Video Stitching

    Directory of Open Access Journals (Sweden)

    Jing Li

    2014-10-01

    Full Text Available The highly efficient and robust stitching of aerial video captured by unmanned aerial vehicles (UAVs is a challenging problem in the field of robot vision. Existing commercial image stitching systems have seen success with offline stitching tasks, but they cannot guarantee high-speed performance when dealing with online aerial video sequences. In this paper, we present a novel system which has an unique ability to stitch high-frame rate aerial video at a speed of 150 frames per second (FPS. In addition, rather than using a high-speed vision platform such as FPGA or CUDA, our system is running on a normal personal computer. To achieve this, after the careful comparison of the existing invariant features, we choose the FAST corner and binary descriptor for efficient feature extraction and representation, and present a spatial and temporal coherent filter to fuse the UAV motion information into the feature matching. The proposed filter can remove the majority of feature correspondence outliers and significantly increase the speed of robust feature matching by up to 20 times. To achieve a balance between robustness and efficiency, a dynamic key frame-based stitching framework is used to reduce the accumulation errors. Extensive experiments on challenging UAV datasets demonstrate that our approach can break through the speed limitation and generate an accurate stitching image for aerial video stitching tasks.

  10. Video Content Foraging

    NARCIS (Netherlands)

    van Houten, Ynze; Schuurman, Jan Gerrit; Verhagen, Pleunes Willem; Enser, Peter; Kompatsiaris, Yiannis; O’Connor, Noel E.; Smeaton, Alan F.; Smeulders, Arnold W.M.

    2004-01-01

    With information systems, the real design problem is not increased access to information, but greater efficiency in finding useful information. In our approach to video content browsing, we try to match the browsing environment with human information processing structures by applying ideas from

  11. Internet video search

    NARCIS (Netherlands)

    Snoek, C.G.M.; Smeulders, A.W.M.

    2011-01-01

    In this tutorial, we focus on the challenges in internet video search, present methods how to achieve state-of-the-art performance while maintaining efficient execution, and indicate how to obtain improvements in the near future. Moreover, we give an overview of the latest developments and future

  12. Videos, Podcasts and Livechats

    Medline Plus

    Full Text Available ... Donate Resources Links Videos Podcasts Webinars For the Media For Clinicians For Policymakers For Family Caregivers Glossary Sign Up for Our Blog Subscribe to Blog Enter your email address to subscribe to this blog and receive notifications of new posts by email. Email Address CLOSE Home About ...

  13. Scalable Video Coding

    NARCIS (Netherlands)

    Choupani, R.

    2017-01-01

    With the rapid improvements in digital communication technologies, distributing high-definition visual information has become more widespread. However, the available technologies were not sufficient to support the rising demand for high-definition video. This situation is further complicated when

  14. Video processing project

    CSIR Research Space (South Africa)

    Globisch, R

    2009-03-01

    Full Text Available Video processing source code for algorithms and tools used in software media pipelines (e.g. image scalers, colour converters, etc.) The currently available source code is written in C++ with their associated libraries and DirectShow- Filters....

  15. Video narrativer i sygeplejerskeuddannelsen

    DEFF Research Database (Denmark)

    Jensen, Inger

    2009-01-01

    I artiklen gives nogle bud på hvordan video narrativer kan bruges i sygeplejerskeuddannelsen som triggers, der åbner for diskussioner og udvikling af meningsfulde holdninger til medmennesker. Det belyses også hvordan undervisere i deres didaktiske overvejelser kan inddrage elementer fra teori om...

  16. Streaming-video produktion

    DEFF Research Database (Denmark)

    Grønkjær, Poul

    2004-01-01

     E-learning Lab på Aalborg Universitet har i forbindelse med forskningsprojektet Virtuelle Læringsformer og Læringsmiljøer foretaget en række praktiske eksperimenter med streaming-video produktioner. Hensigten med denne artikel er at formidle disse erfaringer. Artiklen beskriver hele produktionsf...... E-learning Lab på Aalborg Universitet har i forbindelse med forskningsprojektet Virtuelle Læringsformer og Læringsmiljøer foretaget en række praktiske eksperimenter med streaming-video produktioner. Hensigten med denne artikel er at formidle disse erfaringer. Artiklen beskriver hele...... produktionsforløbet: fra ide til færdigt produkt, forskellige typer af præsentationer, dramaturgiske overvejelser samt en konceptskitse. Streaming-video teknologien er nu så udviklet med et så tilfredsstillende audiovisuelt udtryk at vi kan begynde at fokusere på, hvilket indhold der er velegnet til at blive gjort...... tilgængeligt uafhængigt af tid og sted. Afslutningsvis er der en række kildehenvisninger, blandt andet en oversigt over de streaming-video produktioner, som denne artikel bygger på....

  17. Characteristics of Instructional Videos

    Science.gov (United States)

    Beheshti, Mobina; Taspolat, Ata; Kaya, Omer Sami; Sapanca, Hamza Fatih

    2018-01-01

    Nowadays, video plays a significant role in education in terms of its integration into traditional classes, the principal delivery system of information in classes particularly in online courses as well as serving as a foundation of many blended classes. Hence, education is adopting a modern approach of instruction with the target of moving away…

  18. Videos, Podcasts and Livechats

    Medline Plus

    Full Text Available Home About Donate Search Search What Is It Definition Pediatric Palliative Care Disease Types FAQ Handout for Patients and Families Is It Right for You How to Get It Talk to your Doctor Find a Provider Meet the Team Blog Articles & Stories News Resources Links Videos Podcasts ...

  19. Mobiele video voor bedrijfscommunicatie

    NARCIS (Netherlands)

    Niamut, O.A.; Weerdt, C.A. van der; Havekes, A.

    2009-01-01

    Het project Penta Mobilé liep van juni tot november 2009 en had als doel de mogelijkheden van mobiele video voor bedrijfscommunicatie toepassingen in kaart te brengen. Dit onderzoek werd uitgevoerd samen met vijf (‘Penta’) partijen: Business Tales, Condor Digital, European Communication Projects

  20. Acoustic Neuroma Educational Video

    Medline Plus

    Full Text Available ... Surgery What is acoustic neuroma Diagnosing Symptoms Side effects ... Groups Is a support group for me? Find a Group Upcoming Events Video Library Photo Gallery One-on-One Support ANetwork Peer Support Program Community Connections Overview Find a Meeting ...

  1. Developing a Video Steganography Toolkit

    OpenAIRE

    Ridgway, James; Stannett, Mike

    2014-01-01

    Although techniques for separate image and audio steganography are widely known, relatively little has been described concerning the hiding of information within video streams ("video steganography"). In this paper we review the current state of the art in this field, and describe the key issues we have encountered in developing a practical video steganography system. A supporting video is also available online at http://www.youtube.com/watch?v=YhnlHmZolRM

  2. Genetic association studies of copy-number variation: should assignment of copy number states precede testing?

    Directory of Open Access Journals (Sweden)

    Patrick Breheny

    Full Text Available Recently, structural variation in the genome has been implicated in many complex diseases. Using genomewide single nucleotide polymorphism (SNP arrays, researchers are able to investigate the impact not only of SNP variation, but also of copy-number variants (CNVs on the phenotype. The most common analytic approach involves estimating, at the level of the individual genome, the underlying number of copies present at each location. Once this is completed, tests are performed to determine the association between copy number state and phenotype. An alternative approach is to carry out association testing first, between phenotype and raw intensities from the SNP array at the level of the individual marker, and then aggregate neighboring test results to identify CNVs associated with the phenotype. Here, we explore the strengths and weaknesses of these two approaches using both simulations and real data from a pharmacogenomic study of the chemotherapeutic agent gemcitabine. Our results indicate that pooled marker-level testing is capable of offering a dramatic increase in power (> 12-fold over CNV-level testing, particularly for small CNVs. However, CNV-level testing is superior when CNVs are large and rare; understanding these tradeoffs is an important consideration in conducting association studies of structural variation.

  3. Maritime Mobile Force Protection (MMFP) Program

    Science.gov (United States)

    2010-05-28

    swimmers - some capabilities currently exist to protect moored vessels, but once an HVU (i.e., ballistic missile submarine, aircraft carrier , or...with vertical scrolling support Integrated stylus holder (only with touchscreen model) Interface Port replicator External video Headphones

  4. NEI You Tube Videos: Amblyopia

    Medline Plus

    Full Text Available ... NEI YouTube Videos: Amblyopia NEI YouTube Videos YouTube Videos Home Age-Related Macular Degeneration Amblyopia Animations Blindness Cataract Convergence Insufficiency Diabetic Eye Disease Dilated Eye Exam Dry Eye For Kids Glaucoma ...

  5. SPECIAL REPORT: Creating Conference Video

    Directory of Open Access Journals (Sweden)

    Noel F. Peden

    2008-12-01

    Full Text Available Capturing video at a conference is easy. Doing it so the product is useful is another matter. Many subtle problems come into play so that video and audio obtained can be used to create a final product. This article discusses what the author learned in the two years of shooting and editing video for Code4Lib conference.

  6. CERN Video News on line

    CERN Multimedia

    2003-01-01

    The latest CERN video news is on line. In this issue : an interview with the Director General and reports on the new home for the DELPHI barrel and the CERN firemen's spectacular training programme. There's also a vintage video news clip from 1954. See: www.cern.ch/video or Bulletin web page

  7. We All Stream for Video

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    More than ever, teachers are using digital video to enhance their lessons. In fact, the number of schools using video streaming increased from 30 percent to 45 percent between 2004 and 2006, according to Market Data Retrieval. Why the popularity? For starters, video-streaming products are easy to use. They allow teachers to punctuate lessons with…

  8. Social Properties of Mobile Video

    Science.gov (United States)

    Mitchell, April Slayden; O'Hara, Kenton; Vorbau, Alex

    Mobile video is now an everyday possibility with a wide array of commercially available devices, services, and content. These new technologies have created dramatic shifts in the way video-based media can be produced, consumed, and delivered by people beyond the familiar behaviors associated with fixed TV and video technologies. Such technology revolutions change the way users behave and change their expectations in regards to their mobile video experiences. Building upon earlier studies of mobile video, this paper reports on a study using diary techniques and ethnographic interviews to better understand how people are using commercially available mobile video technologies in their everyday lives. Drawing on reported episodes of mobile video behavior, the study identifies the social motivations and values underpinning these behaviors that help characterize mobile video consumption beyond the simplistic notion of viewing video only to kill time. This paper also discusses the significance of user-generated content and the usage of video in social communities through the description of two mobile video technology services that allow users to create and share content. Implications for adoption and design of mobile video technologies and services are discussed as well.

  9. Video Analysis of Rolling Cylinders

    Science.gov (United States)

    Phommarach, S.; Wattanakasiwich, P.; Johnston, I.

    2012-01-01

    In this work, we studied the rolling motion of solid and hollow cylinders down an inclined plane at different angles. The motions were captured on video at 300 frames s[superscript -1], and the videos were analyzed frame by frame using video analysis software. Data from the real motion were compared with the theory of rolling down an inclined…

  10. Video Games and Digital Literacies

    Science.gov (United States)

    Steinkuehler, Constance

    2010-01-01

    Today's youth are situated in a complex information ecology that includes video games and print texts. At the basic level, video game play itself is a form of digital literacy practice. If we widen our focus from the "individual player + technology" to the online communities that play them, we find that video games also lie at the nexus of a…

  11. Rheumatoid Arthritis Educational Video Series

    Medline Plus

    Full Text Available ... Corner / Patient Webcasts / Rheumatoid Arthritis Educational Video Series Rheumatoid Arthritis Educational Video Series This series of five videos ... Your Arthritis Managing Chronic Pain and Depression in Arthritis Nutrition & Rheumatoid Arthritis Arthritis and Health-related Quality of Life ...

  12. Content-Adaptive Packetization and Streaming of Wavelet Video over IP Networks

    Directory of Open Access Journals (Sweden)

    Chien-Peng Ho

    2007-03-01

    Full Text Available This paper presents a framework of content-adaptive packetization scheme for streaming of 3D wavelet-based video content over lossy IP networks. The tradeoff between rate and distortion is controlled by jointly adapting scalable source coding rate and level of forward error correction (FEC protection. A content dependent packetization mechanism with data-interleaving and Reed-Solomon protection for wavelet-based video codecs is proposed to provide unequal error protection. This paper also tries to answer an important question for scalable video streaming systems: given extra bandwidth, should one increase the level of channel protection for the most important packets, or transmit more scalable source data? Experimental results show that the proposed framework achieves good balance between quality of the received video and level of error protection under bandwidth-varying lossy IP networks.

  13. Content-Adaptive Packetization and Streaming of Wavelet Video over IP Networks

    Directory of Open Access Journals (Sweden)

    Ho Chien-Peng

    2007-01-01

    Full Text Available This paper presents a framework of content-adaptive packetization scheme for streaming of 3D wavelet-based video content over lossy IP networks. The tradeoff between rate and distortion is controlled by jointly adapting scalable source coding rate and level of forward error correction (FEC protection. A content dependent packetization mechanism with data-interleaving and Reed-Solomon protection for wavelet-based video codecs is proposed to provide unequal error protection. This paper also tries to answer an important question for scalable video streaming systems: given extra bandwidth, should one increase the level of channel protection for the most important packets, or transmit more scalable source data? Experimental results show that the proposed framework achieves good balance between quality of the received video and level of error protection under bandwidth-varying lossy IP networks.

  14. Enhanced video display and navigation for networked streaming video and networked video playlists

    Science.gov (United States)

    Deshpande, Sachin

    2006-01-01

    In this paper we present an automatic enhanced video display and navigation capability for networked streaming video and networked video playlists. Our proposed method uses Synchronized Multimedia Integration Language (SMIL) as presentation language and Real Time Streaming Protocol (RTSP) as network remote control protocol to automatically generate a "enhanced video strip" display for easy navigation. We propose and describe two approaches - a smart client approach and a smart server approach. We also describe a prototype system implementation of our proposed approach.

  15. A Review on Video/Image Authentication and Tamper Detection Techniques

    Science.gov (United States)

    Parmar, Zarna; Upadhyay, Saurabh

    2013-02-01

    With the innovations and development in sophisticated video editing technology and a wide spread of video information and services in our society, it is becoming increasingly significant to assure the trustworthiness of video information. Therefore in surveillance, medical and various other fields, video contents must be protected against attempt to manipulate them. Such malicious alterations could affect the decisions based on these videos. A lot of techniques are proposed by various researchers in the literature that assure the authenticity of video information in their own way. In this paper we present a brief survey on video authentication techniques with their classification. These authentication techniques are generally classified into following categories: digital signature based techniques, watermark based techniques, and other authentication techniques.

  16. Copy Number Variations in Tilapia Genomes.

    Science.gov (United States)

    Li, Bi Jun; Li, Hong Lian; Meng, Zining; Zhang, Yong; Lin, Haoran; Yue, Gen Hua; Xia, Jun Hong

    2017-02-01

    Discovering the nature and pattern of genome variation is fundamental in understanding phenotypic diversity among populations. Although several millions of single nucleotide polymorphisms (SNPs) have been discovered in tilapia, the genome-wide characterization of larger structural variants, such as copy number variation (CNV) regions has not been carried out yet. We conducted a genome-wide scan for CNVs in 47 individuals from three tilapia populations. Based on 254 Gb of high-quality paired-end sequencing reads, we identified 4642 distinct high-confidence CNVs. These CNVs account for 1.9% (12.411 Mb) of the used Nile tilapia reference genome. A total of 1100 predicted CNVs were found overlapping with exon regions of protein genes. Further association analysis based on linear model regression found 85 CNVs ranging between 300 and 27,000 base pairs significantly associated to population types (R (2) > 0.9 and P > 0.001). Our study sheds first insights on genome-wide CNVs in tilapia. These CNVs among and within tilapia populations may have functional effects on phenotypes and specific adaptation to particular environments.

  17. Digital Video Teach Yourself VISUALLY

    CERN Document Server

    Watson, Lonzell

    2010-01-01

    Tips and techniques for shooting and sharing superb digital videos. Never before has video been more popular-or more accessible to the home photographer. Now you can create YouTube-worthy, professional-looking video, with the help of this richly illustrated guide. In a straightforward, simple, highly visual format, Teach Yourself VISUALLY Digital Video demystifies the secrets of great video. With colorful screenshots and illustrations plus step-by-step instructions, the book explains the features of your camera and their capabilities, and shows you how to go beyond "auto" to manually

  18. Vocal copying of individually distinctive signature whistles in bottlenose dolphins

    Science.gov (United States)

    King, Stephanie L.; Sayigh, Laela S.; Wells, Randall S.; Fellner, Wendi; Janik, Vincent M.

    2013-01-01

    Vocal learning is relatively common in birds but less so in mammals. Sexual selection and individual or group recognition have been identified as major forces in its evolution. While important in the development of vocal displays, vocal learning also allows signal copying in social interactions. Such copying can function in addressing or labelling selected conspecifics. Most examples of addressing in non-humans come from bird song, where matching occurs in an aggressive context. However, in other animals, addressing with learned signals is very much an affiliative signal. We studied the function of vocal copying in a mammal that shows vocal learning as well as complex cognitive and social behaviour, the bottlenose dolphin (Tursiops truncatus). Copying occurred almost exclusively between close associates such as mother–calf pairs and male alliances during separation and was not followed by aggression. All copies were clearly recognizable as such because copiers consistently modified some acoustic parameters of a signal when copying it. We found no evidence for the use of copying in aggression or deception. This use of vocal copying is similar to its use in human language, where the maintenance of social bonds appears to be more important than the immediate defence of resources. PMID:23427174

  19. 36 CFR 1254.64 - Will NARA certify copies?

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Will NARA certify copies? 1254.64 Section 1254.64 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS... Materials General Information § 1254.64 Will NARA certify copies? Yes, the responsible director of a unit...

  20. 40 CFR 265.53 - Copies of contingency plan.

    Science.gov (United States)

    2010-07-01

    ...) Submitted to all local police departments, fire departments, hospitals, and State and local emergency response teams that may be called upon to provide emergency services. ... DISPOSAL FACILITIES Contingency Plan and Emergency Procedures § 265.53 Copies of contingency plan. A copy...

  1. 7 CFR 3404.2 - Public inspection, copying, and indexing.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Public inspection, copying, and indexing. 3404.2 Section 3404.2 Agriculture Regulations of the Department of Agriculture (Continued) COOPERATIVE STATE... inspection, copying, and indexing. 5 U.S.C. 552(a)(2) requires that certain materials be made available for...

  2. 7 CFR 3701.2 - Public inspection, copying, and indexing.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Public inspection, copying, and indexing. 3701.2 Section 3701.2 Agriculture Regulations of the Department of Agriculture (Continued) ECONOMIC RESEARCH SERVICE, DEPARTMENT OF AGRICULTURE PUBLIC INFORMATION § 3701.2 Public inspection, copying, and indexing. 5...

  3. 7 CFR 510.2 - Public inspection, copying, and indexing.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Public inspection, copying, and indexing. 510.2 Section 510.2 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL RESEARCH SERVICE, DEPARTMENT OF AGRICULTURE PUBLIC INFORMATION § 510.2 Public inspection, copying, and indexing. 5...

  4. 7 CFR 3801.2 - Public inspection, copying, and indexing.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Public inspection, copying, and indexing. 3801.2 Section 3801.2 Agriculture Regulations of the Department of Agriculture (Continued) WORLD AGRICULTURAL... inspection, copying, and indexing. 5 U.S.C. 552(a)(2) requires that certain materials be made available for...

  5. An Evidence-Informed Picture of Course-Related Copying

    Science.gov (United States)

    Graham, Rumi

    2016-01-01

    Recent changes in Canadian copyright law have prompted Canada's educational institutions to reexamine their need for a blanket copying license. Users' rights under the amended Copyright Act now include fair dealing for purposes of education, and the Supreme Court has established that copying short excerpts for classroom use can qualify as fair…

  6. Cache-based memory copy hardware accelerator for multicore systems

    NARCIS (Netherlands)

    Duarte, F.; Wong, S.

    2010-01-01

    In this paper, we present a new architecture of the cache-based memory copy hardware accelerator in a multicore system supporting message passing. The accelerator is able to accelerate memory data movements, in particular memory copies. We perform an analytical analysis based on open-queuing theory

  7. Representing videos in tangible products

    Science.gov (United States)

    Fageth, Reiner; Weiting, Ralf

    2014-03-01

    Videos can be taken with nearly every camera, digital point and shoot cameras, DSLRs as well as smartphones and more and more with so-called action cameras mounted on sports devices. The implementation of videos while generating QR codes and relevant pictures out of the video stream via a software implementation was contents in last years' paper. This year we present first data about what contents is displayed and how the users represent their videos in printed products, e.g. CEWE PHOTOBOOKS and greeting cards. We report the share of the different video formats used, the number of images extracted out of the video in order to represent the video, the positions in the book and different design strategies compared to regular books.

  8. DATA PROTECTION TECHNOLOGIES IN THE DISTANCE LEARNING SYSTEMS

    OpenAIRE

    Inna V. Herasymenko

    2015-01-01

    This article focuses on data protection in the support systems of distance learning. Different security tools such as hardware, software, transformation security and organizational protection are considered. There are analyzed key places that require protection and suggested possible options for their protection, such as the use of CAPTCHA for registration, protection for the IP-address and service of copy protection. Testing of the proposed security tools was piloted in terms of e-learning c...

  9. Segmentation and accuracy in copying and drawing: experts and beginners.

    Science.gov (United States)

    Tchalenko, John

    2009-03-01

    As part of an ongoing investigation into real-world copying and drawing, I recorded the eye-hand drawing strategies of 16 subjects with drawing experiences ranging from expert to novice while they copied a line drawing of a standing nude. The experts produced accurate copies whereas all the beginners produced marked inaccuracies of overall scaling, proportion and shape. Analysis of eye and hand movements showed that the experts alone segmented the original drawing into simple line sections that were copied one at a time using a direct eye-hand strategy not requiring intermediary encoding to visual memory. The results suggest that segmentation into simple lines defines the task-specific process of accurate copying, and that this process is restricted to experts, i.e. acquired through training and practice. Additional preliminary tests also suggest that a similar process may apply to drawing a model from life.

  10. The double copy: Bremsstrahlung and accelerating black holes

    CERN Document Server

    Luna, Andres; Nicholson, Isobel; O'Connell, Donal; White, Chris D

    2016-01-01

    Advances in our understanding of perturbation theory suggest the existence of a correspondence between classical general relativity and Yang-Mills theory. A concrete example of this correspondence, which is known as the double copy, was recently introduced for the case of stationary Kerr-Schild spacetimes. Building on this foundation, we examine the simple time-dependent case of an accelerating, radiating point source. The gravitational solution, which generalises the Schwarzschild solution, includes a non-trivial stress-energy tensor. This stress-energy tensor corresponds to a gauge theoretic current in the double copy. We interpret both of these sources as representing the radiative part of the field. Furthermore, in the simple example of Bremsstrahlung, we determine a scattering amplitude describing the radiation, maintaining the double copy throughout. Our results provide the strongest evidence yet that the classical double copy is directly related to the BCJ double copy for scattering amplitudes.

  11. The double copy: Bremsstrahlung and accelerating black holes

    Energy Technology Data Exchange (ETDEWEB)

    Luna, Andrés [School of Physics and Astronomy, University of Glasgow,Glasgow G12 8QQ, Scotland (United Kingdom); Monteiro, Ricardo [Theoretical Physics Department, CERN,Geneva (Switzerland); Nicholson, Isobel [Higgs Centre for Theoretical Physics, School of Physics and Astronomy,The University of Edinburgh,Edinburgh EH9 3JZ, Scotland (United Kingdom); O’Connell, Donal [Higgs Centre for Theoretical Physics, School of Physics and Astronomy,The University of Edinburgh,Edinburgh EH9 3JZ, Scotland (United Kingdom); Kavli Institute for Theoretical Physics, University of California,Santa Barbara, CA 93106-4030 (United States); White, Chris D. [School of Physics and Astronomy, University of Glasgow,Glasgow G12 8QQ, Scotland (United Kingdom)

    2016-06-06

    Advances in our understanding of perturbation theory suggest the existence of a correspondence between classical general relativity and Yang-Mills theory. A concrete example of this correspondence, which is known as the double copy, was recently introduced for the case of stationary Kerr-Schild spacetimes. Building on this foundation, we examine the simple time-dependent case of an accelerating, radiating point source. The gravitational solution, which generalises the Schwarzschild solution, includes a non-trivial stress-energy tensor. This stress-energy tensor corresponds to a gauge theoretic current in the double copy. We interpret both of these sources as representing the radiative part of the field. Furthermore, in the simple example of Bremsstrahlung, we determine a scattering amplitude describing the radiation, maintaining the double copy throughout. Our results provide the strongest evidence yet that the classical double copy is directly related to the BCJ double copy for scattering amplitudes.

  12. Geotail Video News Release

    Science.gov (United States)

    1992-01-01

    The Geotail mission, part of the International Solar Terrestrial Physics (ISTP) program, measures global energy flow and transformation in the magnetotail to increase understanding of fundamental magnetospheric processes. The satellite was launched on July 24, 1992 onboard a Delta II rocket. This video shows with animation the solar wind, and its effect on the Earth. The narrator explains that the Geotail spacecraft was designed and built by the Institute of Space and Astronautical Science (ISAS), the Japanese Space Agency. The mission objectives are reviewed by one of the scientist in a live view. The video also shows an animation of the orbit, while the narrator explains the orbit and the reason for the small launch window.

  13. CARACTERIZACION VOZ Y VIDEO

    Directory of Open Access Journals (Sweden)

    Octavio José Salcedo Parra

    2011-11-01

    Full Text Available La motivación para caracterizar el tráfico de voz y video está en la necesidad de las empresas proveedoras de servicio en mantener redes de transporte de información con capacidades acordes a los requerimientos de los usuarios.  Poder determinar en forma oportuna como los elementos técnicos que hacen parte de las redes afectan su desempeño, teniendo en cuenta que cada tipo de servicio es afectado en mayor o menor medida por dichos elementos dentro de los que tenemos el jitter, las demoras y las pérdidas de paquetes entre otros. El presente trabajo muestra varios casos de caracterización de tráfico tanto de voz como de video en las que se utilizan una diversidad de técnicas para diferentes tipos de servicio.

  14. The War over Internet Piracy: Fearing Lawsuits, College Officials Crack down on Illegal Downloading of Music and Videos on Campus

    Science.gov (United States)

    Galuszka, Peter

    2004-01-01

    For years, recording companies have been waging a losing war against millions of Net-savvy college students who download and copy digital music or videos and sell or swap them. Many students make illegal use of high-speed computer links owned by universities as administrators catch the flak. Meanwhile, the recording industry and artists claim…

  15. Video Pulses: User-Based Modeling of Interesting Video Segments

    Directory of Open Access Journals (Sweden)

    Markos Avlonitis

    2014-01-01

    Full Text Available We present a user-based method that detects regions of interest within a video in order to provide video skims and video summaries. Previous research in video retrieval has focused on content-based techniques, such as pattern recognition algorithms that attempt to understand the low-level features of a video. We are proposing a pulse modeling method, which makes sense of a web video by analyzing users' Replay interactions with the video player. In particular, we have modeled the user information seeking behavior as a time series and the semantic regions as a discrete pulse of fixed width. Then, we have calculated the correlation coefficient between the dynamically detected pulses at the local maximums of the user activity signal and the pulse of reference. We have found that users' Replay activity significantly matches the important segments in information-rich and visually complex videos, such as lecture, how-to, and documentary. The proposed signal processing of user activity is complementary to previous work in content-based video retrieval and provides an additional user-based dimension for modeling the semantics of a social video on the web.

  16. Solid state video cameras

    CERN Document Server

    Cristol, Y

    2013-01-01

    Solid State Video Cameras reviews the state of the art in the field of solid-state television cameras as compiled from patent literature. Organized into 10 chapters, the book begins with the basic array types of solid-state imagers and appropriate read-out circuits and methods. Documents relating to improvement of picture quality, such as spurious signal suppression, uniformity correction, or resolution enhancement, are also cited. The last part considerssolid-state color cameras.

  17. The video lecture

    OpenAIRE

    Crook, Charles; Schofield, Louise

    2017-01-01

    Vocabulary for describing the structures, roles, and relationships characteristic of traditional, or ‘offline’, education has been seamlessly applied to the designs of ‘online’ education. One example is the lecture, delivered as a video recording. The purpose of this research is to consider the concept of ‘lecture’ as realised in both offline and online contexts. We explore how media differences entail different student experiences and how these differences relate to design decisions associat...

  18. The Future of Video

    OpenAIRE

    Li, F.

    2016-01-01

    Executive Summary \\ud \\ud A range of technological innovations (e.g. smart phones and digital cameras), infrastructural advances (e.g. broadband and 3G/4G wireless networks) and platform developments (e.g. YouTube, Facebook, Snapchat, Instagram, Amazon, and Netflix) are collectively transforming the way video is produced, distributed, consumed, archived – and importantly, monetised. Changes have been observed well beyond the mainstream TV and film industries, and these changes are increasingl...

  19. Referred sensations elicited by video-mediated mirroring of hands.

    Directory of Open Access Journals (Sweden)

    Simon Hoermann

    Full Text Available Humans readily perceive ownership of a limb even when it is artificially induced as in the case of using a mirror reflection. However, mirror reflections are very constrained perceptions which do not allow transformations and varied contexts as often occurs in real life. The extent to which perceived limb ownership occurs with video-mediated manipulations is not known, particularly given the perception would no longer be a precise copy (reflection of a person's own limb. The present study directly compared referred sensations of the limbs with the use of a mirror reflection to those obtained with a new video-mediated setup to assess perceived ownership. Manipulations that could not be performed with a standard mirror reflection, such as reversal of the spatial positions of the limbs, were also investigated to examine how far the perceived ownership effects could be pushed. Across a series of experiments, data on the quality, intensity and location of referred sensations were collected and analyzed together with measures of hand ownership and participants' experience of the two setups. Results reveal that participants felt referred sensations in both the optical and the video-mediated setup, and that video-mediated manipulations of hand-position reversals produced equal to stronger effects of ownership compared with the mirror reflection. These findings open up new possibilities for scientific experimentation and therapy that are discussed in the paper.

  20. Improved intra-block copy and motion search methods for screen content coding

    Science.gov (United States)

    Rapaka, Krishna; Pang, Chao; Sole, Joel; Karczewicz, Marta; Li, Bin; Xu, Jizheng

    2015-09-01

    Screen content video coding extension of HEVC (SCC) is being developed by Joint Collaborative Team on Video Coding (JCT-VC) of ISO/IEC MPEG and ITU-T VCEG. Screen content usually features a mix of camera captured content and a significant proportion of rendered graphics, text, or animation. These two types of content exhibit distinct characteristics requiring different compression scheme to achieve better coding efficiency. This paper presents an efficient block matching schemes for coding screen content to better capture the spatial and temporal characteristics. The proposed schemes are mainly categorized as a) hash based global region block matching for intra block copy b) selective search based local region block matching for inter frame prediction c) hash based global region block matching for inter frame prediction. In the first part, a hash-based full frame block matching algorithm is designed for intra block copy to handle the repeating patterns and large motions when the reference picture constituted already decoded samples of the current picture. In the second part, a selective local area block matching algorithm is designed for inter motion estimation to handle sharp edges, high spatial frequencies and non-monotonic error surface. In the third part, a hash based full frame block matching algorithm is designed for inter motion estimation to handle repeating patterns and large motions across the temporal reference picture. The proposed schemes are compared against HM-13.0+RExt-6.0, which is the state-of-art screen content coding. The first part provides a luma BD-rate gains of -26.6%, -15.6%, -11.4% for AI, RA and LD TGM configurations. The second part provides a luma BD-rate gains of -10.1%, -12.3% for RA and LD TGM configurations. The third part provides a luma BD-rate gains of -12.2%, -11.5% for RA and LD TGM configurations.

  1. Video time encoding machines.

    Science.gov (United States)

    Lazar, Aurel A; Pnevmatikakis, Eftychios A

    2011-03-01

    We investigate architectures for time encoding and time decoding of visual stimuli such as natural and synthetic video streams (movies, animation). The architecture for time encoding is akin to models of the early visual system. It consists of a bank of filters in cascade with single-input multi-output neural circuits. Neuron firing is based on either a threshold-and-fire or an integrate-and-fire spiking mechanism with feedback. We show that analog information is represented by the neural circuits as projections on a set of band-limited functions determined by the spike sequence. Under Nyquist-type and frame conditions, the encoded signal can be recovered from these projections with arbitrary precision. For the video time encoding machine architecture, we demonstrate that band-limited video streams of finite energy can be faithfully recovered from the spike trains and provide a stable algorithm for perfect recovery. The key condition for recovery calls for the number of neurons in the population to be above a threshold value.

  2. Robotic video photogrammetry system

    Science.gov (United States)

    Gustafson, Peter C.

    1997-07-01

    For many years, photogrammetry has been in use at TRW. During that time, needs have arisen for highly repetitive measurements. In an effort to satisfy these needs in a timely manner, a specialized Robotic Video Photogrammetry System (RVPS) was developed by TRW in conjunction with outside vendors. The primary application for the RVPS has strict accuracy requirements that demand significantly more images than the previously used film-based system. The time involved in taking these images was prohibitive but by automating the data acquisition process, video techniques became a practical alternative to the more traditional film- based approach. In fact, by applying video techniques, measurement productivity was enhanced significantly. Analysis involved was also brought `on-board' to the RVPS, allowing shop floor acquisition and delivery of results. The RVPS has also been applied in other tasks and was found to make a critical improvement in productivity, allowing many more tests to be run in a shorter time cycle. This paper will discuss the creation of the system and TRW's experiences with the RVPS. Highlighted will be the lessons learned during these efforts and significant attributes of the process not common to the standard application of photogrammetry for industrial measurement. As productivity and ease of use continue to drive the application of photogrammetry in today's manufacturing climate, TRW expects several systems, with technological improvements applied, to be in use in the near future.

  3. Utilizing Video Games

    Science.gov (United States)

    Blaize, L.

    Almost from its birth, the computer and video gaming industry has done an admirable job of communicating the vision and attempting to convey the experience of traveling through space to millions of gamers from all cultures and demographics. This paper will propose several approaches the 100 Year Starship Study can take to use the power of interactive media to stir interest in the Starship and related projects among a global population. It will examine successful gaming franchises from the past that are relevant to the mission and consider ways in which the Starship Study could cooperate with game development studios to bring the Starship vision to those franchises and thereby to the public. The paper will examine ways in which video games can be used to crowd-source research aspects for the Study, and how video games are already considering many of the same topics that will be examined by this Study. Finally, the paper will propose some mechanisms by which the 100 Year Starship Study can establish very close ties with the gaming industry and foster cooperation in pursuit of the Study's goals.

  4. Video Malware - Behavioral Analysis

    Directory of Open Access Journals (Sweden)

    Rajdeepsinh Dodia

    2015-04-01

    Full Text Available Abstract The counts of malware attacks exploiting the internet increasing day by day and has become a serious threat. The latest malware spreading out through the media players embedded using the video clip of funny in nature to lure the end users. Once it is executed and installed then the behavior of the malware is in the malware authors hand. The spread of the malware emulates through Internet USB drives sharing of the files and folders can be anything which makes presence concealed. The funny video named as it connected to the film celebrity where the malware variant was collected from the laptop of the terror outfit organization .It runs in the backend which it contains malicious code which steals the user sensitive information like banking credentials username amp password and send it to the remote host user called command amp control. The stealed data is directed to the email encapsulated in the malicious code. The potential malware will spread through the USB and other devices .In summary the analysis reveals the presence of malicious code in executable video file and its behavior.

  5. Converting hard copy documents for electronic dissemination

    Energy Technology Data Exchange (ETDEWEB)

    Hoffman, F.

    1994-12-31

    Since the advent of computer systems, the goal of a paperless office, and even a paperless society, has been pursued. While the normal paper flow in an organization is far from totally automated, particularly for items requiring signatures or authorizations, electronic information dissemination is becoming an almost simple task. The reasons for providing on-line documents are many and include faster and easier access for everyone, elimination of printing costs, reduction of wasted shelf and desk space, and the security of having a centrally-located, always up-to-date document. New computer software even provides the user with the ability to annotate documents and to have bookmarks so that the old scribbled-in and dog-eared manual can be replaced without loosing this `customizability`. Moreover, new hypermedia capabilities mean that documents can be read in a non-linear fashion and can include color figures and photographs, audio, and even animation sequences, capabilities which exceed those of paper. The proliferation of network-based information servers, coupled with the growth of the Internet, has enticed academic, governmental, and even commercial organizations to provide increasing numbers of documents and data bases in electronic form via the network, not just to internal staff, but to the public as well. Much of this information, which includes everything from mundane company procedures to spiffy marketing brochures, was previously published only in hard copy. Converting existing documents to electronic form and producing only electronic versions of new documents poses some interesting challenges to the maintainer or author.

  6. Copy Number Profiling of Brazilian Astrocytomas

    Directory of Open Access Journals (Sweden)

    Lucas Tadeu Bidinotto

    2016-07-01

    Full Text Available Copy number alterations (CNA are one of the driving mechanisms of glioma tumorigenesis, and are currently used as important biomarkers in the routine setting. Therefore, we performed CNA profiling of 65 astrocytomas of distinct malignant grades (WHO grade I–IV of Brazilian origin, using array-CGH and microsatellite instability analysis (MSI, and investigated their correlation with TERT and IDH1 mutational status and clinico-pathological features. Furthermore, in silico analysis using the Oncomine database was performed to validate our findings and extend the findings to gene expression level. We found that the number of genomic alterations increases in accordance with glioma grade. In glioblastomas (GBM, the most common alterations were gene amplifications (PDGFRA, KIT, KDR, EGFR, and MET and deletions (CDKN2A and PTEN. Log-rank analysis correlated EGFR amplification and/or chr7 gain with better survival of the patients. MSI was observed in 11% of GBMs. A total of 69% of GBMs presented TERT mutation, whereas IDH1 mutation was most frequent in diffuse (85.7% and anaplastic (100% astrocytomas. The combination of 1p19q deletion and TERT and IDH1 mutational status separated tumor groups that showed distinct age of diagnosis and outcome. In silico validation pointed to less explored genes that may be worthy of future investigation, such as CDK2, DMRTA1, and MTAP. Herein, using an extensive integrated analysis, we indicated potentially important genes, not extensively studied in gliomas, that could be further explored to assess their biological and clinical impact in astrocytomas.

  7. Video as a Tool to Increase Understanding and Support for the Endangered Species Act

    Science.gov (United States)

    Kleinhenz, Peter N.; Parker, Michael S.

    2017-01-01

    Research into the effectiveness of video as a tool to educate students about environmental issues and cause a change in their attitudes toward them in a classroom setting is limited. We sought to add to this sparse body of research. We created three videos that showcased a species in a different stage of protection under the Endangered Species…

  8. Age and violent-content labels make video games forbidden fruits for youth

    NARCIS (Netherlands)

    Nije Bijvank, M.; Konijn, E.A.; Bushman, B.J.; Roelofsma, P.H.M.P.

    2009-01-01

    OBJECTIVE. To protect minors from exposure to video games with objectionable content (eg, violence and sex), the Pan European Game Information developed a classification system for video games (eg, 18+). We tested the hypothesis that this classification system may actually increase the

  9. aCNViewer: Comprehensive genome-wide visualization of absolute copy number and copy neutral variations.

    Science.gov (United States)

    Renault, Victor; Tost, Jörg; Pichon, Fabien; Wang-Renault, Shu-Fang; Letouzé, Eric; Imbeaud, Sandrine; Zucman-Rossi, Jessica; Deleuze, Jean-François; How-Kit, Alexandre

    2017-01-01

    Copy number variations (CNV) include net gains or losses of part or whole chromosomal regions. They differ from copy neutral loss of heterozygosity (cn-LOH) events which do not induce any net change in the copy number and are often associated with uniparental disomy. These phenomena have long been reported to be associated with diseases and particularly in cancer. Losses/gains of genomic regions are often correlated with lower/higher gene expression. On the other hand, loss of heterozygosity (LOH) and cn-LOH are common events in cancer and may be associated with the loss of a functional tumor suppressor gene. Therefore, identifying recurrent CNV and cn-LOH events can be important as they may highlight common biological components and give insights into the development or mechanisms of a disease. However, no currently available tools allow a comprehensive whole-genome visualization of recurrent CNVs and cn-LOH in groups of samples providing absolute quantification of the aberrations leading to the loss of potentially important information. To overcome these limitations, we developed aCNViewer (Absolute CNV Viewer), a visualization tool for absolute CNVs and cn-LOH across a group of samples. aCNViewer proposes three graphical representations: dendrograms, bi-dimensional heatmaps showing chromosomal regions sharing similar abnormality patterns, and quantitative stacked histograms facilitating the identification of recurrent absolute CNVs and cn-LOH. We illustrated aCNViewer using publically available hepatocellular carcinomas (HCCs) Affymetrix SNP Array data (Fig 1A). Regions 1q and 8q present a similar percentage of total gains but significantly different copy number gain categories (p-value of 0.0103 with a Fisher exact test), validated by another cohort of HCCs (p-value of 5.6e-7) (Fig 2B). aCNViewer is implemented in python and R and is available with a GNU GPLv3 license on GitHub https://github.com/FJD-CEPH/aCNViewer and Docker https

  10. An Adaptive Systematic Lossy Error Protection Scheme for Broadcast Applications Based on Frequency Filtering and Unequal Picture Protection

    Directory of Open Access Journals (Sweden)

    Marie Ramon

    2009-01-01

    Full Text Available Systematic lossy error protection (SLEP is a robust error resilient mechanism based on principles of Wyner-Ziv (WZ coding for video transmission over error-prone networks. In an SLEP scheme, the video bitstream is separated into two parts: a systematic part consisting of a video sequence transmitted without channel coding, and additional information consisting of a WZ supplementary stream. This paper presents an adaptive SLEP scheme in which the WZ stream is obtained by frequency filtering in the transform domain. Additionally, error resilience varies adaptively depending on the characteristics of compressed video. We show that the proposed SLEP architecture achieves graceful degradation of reconstructed video quality in the presence of increasing transmission errors. Moreover, it provides good performances in terms of error protection as well as reconstructed video quality if compared to solutions based on coarser quantization, while offering an interesting embedded scheme to apply digital video format conversion.

  11. Video Analysis: Lessons from Professional Video Editing Practice

    Directory of Open Access Journals (Sweden)

    Eric Laurier

    2008-09-01

    Full Text Available In this paper we join a growing body of studies that learn from vernacular video analysts quite what video analysis as an intelligible course of action might be. Rather than pursuing epistemic questions regarding video as a number of other studies of video analysis have done, our concern here is with the crafts of producing the filmic. As such we examine how audio and video clips are indexed and brought to hand during the logging process, how a first assembly of the film is built at the editing bench and how logics of shot sequencing relate to wider concerns of plotting, genre and so on. In its conclusion we make a number of suggestions about the future directions of studying video and film editors at work. URN: urn:nbn:de:0114-fqs0803378

  12. Surveillance Video Synopsis in GIS

    Directory of Open Access Journals (Sweden)

    Yujia Xie

    2017-10-01

    Full Text Available Surveillance videos contain a considerable amount of data, wherein interesting information to the user is sparsely distributed. Researchers construct video synopsis that contain key information extracted from a surveillance video for efficient browsing and analysis. Geospatial–temporal information of a surveillance video plays an important role in the efficient description of video content. Meanwhile, current approaches of video synopsis lack the introduction and analysis of geospatial-temporal information. Owing to the preceding problems mentioned, this paper proposes an approach called “surveillance video synopsis in GIS”. Based on an integration model of video moving objects and GIS, the virtual visual field and the expression model of the moving object are constructed by spatially locating and clustering the trajectory of the moving object. The subgraphs of the moving object are reconstructed frame by frame in a virtual scene. Results show that the approach described in this paper comprehensively analyzed and created fusion expression patterns between video dynamic information and geospatial–temporal information in GIS and reduced the playback time of video content.

  13. Recognizing problem video game use.

    Science.gov (United States)

    Porter, Guy; Starcevic, Vladan; Berle, David; Fenech, Pauline

    2010-02-01

    It has been increasingly recognized that some people develop problem video game use, defined here as excessive use of video games resulting in various negative psychosocial and/or physical consequences. The main objectives of the present study were to identify individuals with problem video game use and compare them with those without problem video game use on several variables. An international, anonymous online survey was conducted, using a questionnaire with provisional criteria for problem video game use, which the authors have developed. These criteria reflect the crucial features of problem video game use: preoccupation with and loss of control over playing video games and multiple adverse consequences of this activity. A total of 1945 survey participants completed the survey. Respondents who were identified as problem video game users (n = 156, 8.0%) differed significantly from others (n = 1789) on variables that provided independent, preliminary validation of the provisional criteria for problem video game use. They played longer than planned and with greater frequency, and more often played even though they did not want to and despite believing that they should not do it. Problem video game users were more likely to play certain online role-playing games, found it easier to meet people online, had fewer friends in real life, and more often reported excessive caffeine consumption. People with problem video game use can be identified by means of a questionnaire and on the basis of the present provisional criteria, which require further validation. These findings have implications for recognition of problem video game users among individuals, especially adolescents, who present to mental health services. Mental health professionals need to acknowledge the public health significance of the multiple negative consequences of problem video game use.

  14. High Definition Video Streaming Using H.264 Video Compression

    OpenAIRE

    Bechqito, Yassine

    2009-01-01

    This thesis presents high definition video streaming using H.264 codec implementation. The experiment carried out in this study was done for an offline streaming video but a model for live high definition streaming is introduced, as well. Prior to the actual experiment, this study describes digital media streaming. Also, the different technologies involved in video streaming are covered. These include streaming architecture and a brief overview on H.264 codec as well as high definition t...

  15. An analysis of lecture video utilization in undergraduate medical education: associations with performance in the courses

    Directory of Open Access Journals (Sweden)

    Chandrasekhar Arcot

    2009-01-01

    Full Text Available Abstract Background Increasing numbers of medical schools are providing videos of lectures to their students. This study sought to analyze utilization of lecture videos by medical students in their basic science courses and to determine if student utilization was associated with performance on exams. Methods Streaming videos of lectures (n = 149 to first year and second year medical students (n = 284 were made available through a password-protected server. Server logs were analyzed over a 10-week period for both classes. For each lecture, the logs recorded time and location from which students accessed the file. A survey was administered at the end of the courses to obtain additional information about student use of the videos. Results There was a wide disparity in the level of use of lecture videos by medical students with the majority of students accessing the lecture videos sparingly (60% of the students viewed less than 10% of the available videos. The anonymous student survey revealed that students tended to view the videos by themselves from home during weekends and prior to exams. Students who accessed lecture videos more frequently had significantly (p Conclusion We conclude that videos of lectures are used by relatively few medical students and that individual use of videos is associated with the degree to which students are having difficulty with the subject matter.

  16. Mitochondrial DNA copy number in peripheral blood and melanoma risk.

    Directory of Open Access Journals (Sweden)

    Jie Shen

    Full Text Available Mitochondrial DNA (mtDNA copy number in peripheral blood has been suggested as risk modifier in various types of cancer. However, its influence on melanoma risk is unclear. We evaluated the association between mtDNA copy number in peripheral blood and melanoma risk in 500 melanoma cases and 500 healthy controls from an ongoing melanoma study. The mtDNA copy number was measured using real-time polymerase chain reaction. Overall, mean mtDNA copy number was significantly higher in cases than in controls (1.15 vs 0.99, P<0.001. Increased mtDNA copy number was associated with a 1.45-fold increased risk of melanoma (95% confidence interval: 1.12-1.97. Significant joint effects between mtDNA copy number and variables related to pigmentation and history of sunlight exposure were observed. This study supports an association between increased mtDNA copy number and melanoma risk that is independent on the known melanoma risk factors (pigmentation and history of sunlight exposure.

  17. The Kerr-Schild double copy in curved spacetime

    Science.gov (United States)

    Bahjat-Abbas, Nadia; Luna, Andrés; White, Chris D.

    2017-12-01

    The double copy is a much-studied relationship between scattering amplitudes in gauge and gravity theories, that has subsequently been extended to classical field solutions. In nearly all previous examples, the graviton field is defined around Minkowski space. Recently, it has been suggested that one may set up a double copy for gravitons defined around a non-trivial background. We investigate this idea from the point of view of the classical double copy. First, we use Kerr-Schild spacetimes to construct graviton solutions in curved space, as double copies of gauge fields on non-zero gauge backgrounds. Next, we find that we can reinterpret such cases in terms of a graviton on a non-Minkowski background, whose single copy is a gauge field in the same background spacetime. The latter type of double copy persists even when the background is not of Kerr-Schild form, and we provide examples involving conformally flat metrics. Our results will be useful in extending the remit of the double copy, including to possible cosmological applications.

  18. Video Quality Prediction over Wireless 4G

    KAUST Repository

    Lau, Chun Pong

    2013-04-14

    In this paper, we study the problem of video quality prediction over the wireless 4G network. Video transmission data is collected from a real 4G SCM testbed for investigating factors that affect video quality. After feature transformation and selection on video and network parameters, video quality is predicted by solving as regression problem. Experimental results show that the dominated factor on video quality is the channel attenuation and video quality can be well estimated by our models with small errors.

  19. Rate-Adaptive Video Compression (RAVC) Universal Video Stick (UVS)

    Science.gov (United States)

    Hench, David L.

    2009-05-01

    The H.264 video compression standard, aka MPEG 4 Part 10 aka Advanced Video Coding (AVC) allows new flexibility in the use of video in the battlefield. This standard necessitates encoder chips to effectively utilize the increased capabilities. Such chips are designed to cover the full range of the standard with designers of individual products given the capability of selecting the parameters that differentiate a broadcast system from a video conferencing system. The SmartCapture commercial product and the Universal Video Stick (UVS) military versions are about the size of a thumb drive with analog video input and USB (Universal Serial Bus) output and allow the user to select the parameters of imaging to the. Thereby, allowing the user to select video bandwidth (and video quality) using four dimensions of quality, on the fly, without stopping video transmission. The four dimensions are: 1) spatial, change from 720 pixel x 480 pixel to 320 pixel x 360 pixel to 160 pixel x 180 pixel, 2) temporal, change from 30 frames/ sec to 5 frames/sec, 3) transform quality with a 5 to 1 range, 4) and Group of Pictures (GOP) that affects noise immunity. The host processor simply wraps the H.264 network abstraction layer packets into the appropriate network packets. We also discuss the recently adopted scalable amendment to H.264 that will allow limit RAVC at any point in the communication chain by throwing away preselected packets.

  20. Video Tracking dalam Digital Compositing untuk Paska Produksi Video

    Directory of Open Access Journals (Sweden)

    Ardiyan Ardiyan

    2012-04-01

    Full Text Available Video Tracking is one of the processes in video postproduction and motion picture digitally. The ability of video tracking method in the production is helpful to realize the concept of the visual. It is considered in the process of visual effects making. This paper presents how the tracking process and its benefits in visual needs, especially for video and motion picture production. Some of the things involved in the process of tracking such as failure to do so are made clear in this discussion. 

  1. A chromosome 8 gene-cluster polymorphism with low human beta-defensin 2 gene copy number predisposes to Crohn disease of the colon.

    Science.gov (United States)

    Fellermann, Klaus; Stange, Daniel E; Schaeffeler, Elke; Schmalzl, Hartmut; Wehkamp, Jan; Bevins, Charles L; Reinisch, Walter; Teml, Alexander; Schwab, Matthias; Lichter, Peter; Radlwimmer, Bernhard; Stange, Eduard F

    2006-09-01

    Defensins are endogenous antimicrobial peptides that protect the intestinal mucosa against bacterial invasion. It has been suggested that deficient defensin expression may underlie the chronic inflammation of Crohn disease (CD). The DNA copy number of the beta-defensin gene cluster on chromosome 8p23.1 is highly polymorphic within the healthy population, which suggests that the defective beta-defensin induction in colonic CD could be due to low beta-defensin-gene copy number. Here, we tested this hypothesis, using genomewide DNA copy number profiling by array-based comparative genomic hybridization and quantitative polymerase-chain-reaction analysis of the human beta-defensin 2 (HBD-2) gene. We showed that healthy individuals, as well as patients with ulcerative colitis, have a median of 4 (range 2-10) HBD-2 gene copies per genome. In a surgical cohort with ileal or colonic CD and in a second large cohort with inflammatory bowel diseases, those with ileal resections/disease exhibited a normal median HBD-2 copy number of 4, whereas those with colonic CD had a median of only 3 copies per genome (P=.008 for the surgical cohort; P=.032 for the second cohort). Overall, the copy number distribution in colonic CD was shifted to lower numbers compared with controls (P=.002 for both the surgical cohort and the cohort with inflammatory bowel diseases). Individuals with or = 4 copies (odds ratio 3.06; 95% confidence interval 1.46-6.45). An HBD-2 gene copy number of < 4 was associated with diminished mucosal HBD-2 mRNA expression (P=.033). In conclusion, a lower HBD-2 gene copy number in the beta-defensin locus predisposes to colonic CD, most likely through diminished beta-defensin expression.

  2. Video – ned med overliggeren

    DEFF Research Database (Denmark)

    Langebæk, Rikke

    2010-01-01

    Århus – nov 2010 ’Podcast og Video i Undervisningen’ Video – helt ned på jorden Rikke Langebæk, DVM, Phd-studerende, Seniordyrlæge, Institut for Mindre Husdyrs Sygdomme, LIFE, KU Anvendelsen af video i undervisningen har mange iøjnefaldende fordele, og der er nok mange, der drømmer om at implemen......Århus – nov 2010 ’Podcast og Video i Undervisningen’ Video – helt ned på jorden Rikke Langebæk, DVM, Phd-studerende, Seniordyrlæge, Institut for Mindre Husdyrs Sygdomme, LIFE, KU Anvendelsen af video i undervisningen har mange iøjnefaldende fordele, og der er nok mange, der drømmer om...

  3. On the relative importance of audio and video in the presence of packet losses

    DEFF Research Database (Denmark)

    Korhonen, Jari; Reiter, Ulrich; Myakotnykh, Eugene

    2010-01-01

    In streaming applications, unequal protection of audio and video tracks may be necessary to maintain the optimal perceived overall quality. For this purpose, the application should be aware of the relative importance of audio and video in an audiovisual sequence. In this paper, we propose a subje...... and video quality, but also that the currently used classification criteria for content are not sufficient to predict the users’ preference...... a subjective test arrangement for finding the optimal tradeoff between subjective audio and video qualities in situations when it is not possible to have perfect quality for both modalities concurrently. Our results show that content poses a significant impact on the preferred compromise between audio...

  4. Video Games and Adolescent Fighting

    OpenAIRE

    Ward, Michael R.

    2010-01-01

    Psychologists have found positive correlations between playing violent video games and violent and antisocial attitudes. However, these studies typically do not control for other covariates, particularly sex, that are known to be associated with both video game play and aggression. This study exploits the Youth Risk Behavior Survey, which includes questions on video game play and fighting as well as basic demographic information. With both parametric and nonparametric estimators, as there is ...

  5. Women as Video Game Consumers

    OpenAIRE

    Kiviranta, Hanna

    2017-01-01

    The purpose of this Thesis is to study women as video game consumers through the games that they play. This was done by case studies on the content of five video games from genres that statistically are popular amongst women. To introduce the topic and to build the theoretical framework, the key terms and the video game industry are introduced. The reader is acquainted with theories on consumer behaviour, buying processes and factors that influence our consuming habits. These aspects are...

  6. Quality scalable video data stream

    OpenAIRE

    Wiegand, T.; Kirchhoffer, H.; Schwarz, H

    2008-01-01

    An apparatus for generating a quality-scalable video data stream (36) is described which comprises means (42) for coding a video signal (18) using block-wise transformation to obtain transform blocks (146, 148) of transformation coefficient values for a picture (140) of the video signal, a predetermined scan order (154, 156, 164, 166) with possible scan positions being defined among the transformation coefficient values within the transform blocks so that in each transform block, for each pos...

  7. Port Video and Logo

    OpenAIRE

    Whitehead, Stuart; Rush, Joshua

    2013-01-01

    Logo PDF files should be accessible by any PDF reader such as Adobe Reader. SVG files of the logo are vector graphics accessible by programs such as Inkscape or Adobe Illustrator. PNG files are image files of the logo that should be able to be opened by any operating system's default image viewer. The final report is submitted in both .doc (Microsoft Word) and .pdf formats. The video is submitted in .avi format and can be viewed with Windows Media Player or VLC. Audio .wav files are also ...

  8. Video, videoarte, iconoclasmo

    OpenAIRE

    Roncallo Dow, Sergio; Universidad de la Sabana

    2013-01-01

    El propósito de este artículo es realizar un acercamiento a la forma-video y al videoarte desde una perspectiva estética. Para ello, en un primer momento, se hace una reflexión a propósito del estatuto de la imagen en occidente buscado evidenciar su carácter oscuro y el temor que parece haber suscitado desde siempre. Este punto se trabaja sobre algunos postulados platónicos que nos llevan a pensar un posible camino de la superación del iconoclasmo a través del surrealismo, el cine y la fotogr...

  9. Intellectual Video Filming

    DEFF Research Database (Denmark)

    Juel, Henrik

    Like everyone else university students of the humanities are quite used to watching Hollywood productions and professional TV. It requires some didactic effort to redirect their eyes and ears away from the conventional mainstream style and on to new and challenging ways of using the film media...... in favour of worthy causes. However, it is also very rewarding to draw on the creativity, enthusiasm and rapidly improving technical skills of young students, and to guide them to use video equipment themselves for documentary, for philosophical film essays and intellectual debate. In the digital era...

  10. Identification of Copy Number Variations in Xiang and Kele Pigs.

    Science.gov (United States)

    Xie, Jian; Li, Rongrong; Li, Sheng; Ran, Xueqin; Wang, Jiafu; Jiang, Jicai; Zhao, Pengju

    2016-01-01

    Xiang and Kele pigs are two well-known local Chinese pig breeds that possess rich genetic resources and have enormous economic and scientific value. We performed a comprehensive genomic analysis of the copy number variations (CNVs) in these breeds. CNVs are one of the most important forms of genomic variation and have profound effects on phenotypic variation. In this study, PorcineSNP60 genotyping data from 98 Xiang pigs and 22 Kele pigs were used to identify CNVs. In total, 172 candidate CNV regions (CNVRs) were identified, ranging from 3.19 kb to 8175.26 kb and covering 80.41 Mb of the pig genome. Approximately 56.40% (97/172) of the CNVRs overlapped with those identified in seven previous studies, and 43.60% (75/172) of the identified CNVRs were novel. Of the identified CNVRs, 82 (47 gain, 33 loss, and two gain-loss events that covered 4.58 Mb of the pig genome) were found only in a Xiang population with a large litter size. In contrast, 13 CNVRs (8 gain and 5 loss events) were unique to a Xiang population with small litter sizes, and 30 CNVRs (14 loss and 16 gain events) were unique to Kele pigs. The CNVRs span approximately 660 annotated Sus scrofa genes that are significantly enriched for specific biological functions, such as sensory perception, cognition, reproduction, ATP biosynthetic processes, and neurological processes. Many CNVR-associated genes, particularly the genes involved in reproductive traits, differed between the Xiang populations with large and small litter sizes, and these genes warrant further investigation due to their importance in determining the reproductive performance of Xiang pigs. Our results provide meaningful information about genomic variation, which may be useful in future assessments of the associations between CNVs and important phenotypes in Xiang and Kele pigs to ultimately help protect these rare breeds.

  11. Privacy information management for video surveillance

    Science.gov (United States)

    Luo, Ying; Cheung, Sen-ching S.

    2013-05-01

    The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been proposed to automatically redact images of trusted individuals in the surveillance video. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris patterns as they are immutable and highly discriminative. In this paper, we propose a privacy data management system to be used in a privacy-aware video surveillance system. The privacy status of a subject is anonymously determined based on her iris pattern. For a trusted subject, the surveillance video is redacted and the original imagery is considered to be the privacy information. Our proposed system allows a subject to access her privacy information via the same biometric signal for privacy status determination. Two secure protocols, one for privacy information encryption and the other for privacy information retrieval are proposed. Error control coding is used to cope with the variability in iris patterns and efficient implementation is achieved using surrogate data records. Experimental results on a public iris biometric database demonstrate the validity of our framework.

  12. CHARACTER RECOGNITION OF VIDEO SUBTITLES\\

    Directory of Open Access Journals (Sweden)

    Satish S Hiremath

    2016-11-01

    Full Text Available An important task in content based video indexing is to extract text information from videos. The challenges involved in text extraction and recognition are variation of illumination on each video frame with text, the text present on the complex background and different font size of the text. Using various image processing algorithms like morphological operations, blob detection and histogram of oriented gradients the character recognition of video subtitles is implemented. Segmentation, feature extraction and classification are the major steps of character recognition. Several experimental results are shown to demonstrate the performance of the proposed algorithm

  13. ABOUT SOUNDS IN VIDEO GAMES

    Directory of Open Access Journals (Sweden)

    Denikin Anton A.

    2012-12-01

    Full Text Available The article considers the aesthetical and practical possibilities for sounds (sound design in video games and interactive applications. Outlines the key features of the game sound, such as simulation, representativeness, interactivity, immersion, randomization, and audio-visuality. The author defines the basic terminology in study of game audio, as well as identifies significant aesthetic differences between film sounds and sounds in video game projects. It is an attempt to determine the techniques of art analysis for the approaches in study of video games including aesthetics of their sounds. The article offers a range of research methods, considering the video game scoring as a contemporary creative practice.

  14. Austin Community College Video Game Development Certificate

    Science.gov (United States)

    McGoldrick, Robert

    2008-01-01

    The Video Game Development program is designed and developed by leaders in the Austin video game development industry, under the direction of the ACC Video Game Advisory Board. Courses are taught by industry video game developers for those who want to become video game developers. The program offers a comprehensive approach towards learning what's…

  15. Dependence of gene copy number variation on reproductive processes

    Science.gov (United States)

    Weidner, Jacob; Wabick, Kevin; Clark, Brian

    2009-11-01

    DNA is divided into genes, which are generally thought to come in pairs and code for a trait or part of a trait. Recently, evidence shows that there are multiple copies of a non-trivial number of genes and that the number of copies of some genes varies greatly from individual to individual. The role of fundamental processes including mutation, crossover, and inversion in determining the number of copies of specific genes is not understood. We report on the relationship between these fundamental processes and copy number variation as investigated via a numerical simulation. In the simulation, individuals are modeled by a single strand of DNA consisting of a set number of genes assigned to different traits. Individuals reproduce according to their fitness as calculated with the two most fit genes assigned to one specific trait.

  16. HD-CNV: hotspot detector for copy number variants

    National Research Council Canada - National Science Library

    Butler, Jenna L; Osborne Locke, Marjorie Elizabeth; Hill, Kathleen A; Daley, Mark

    2013-01-01

    ... (hotspot detector for copy number variants) is a tool for downstream analysis of previously identified CNV regions from multiple samples, and it detects recurrent regions by finding cliques in an interval graph generated from the input...

  17. SnapVideo: Personalized Video Generation for a Sightseeing Trip.

    Science.gov (United States)

    Zhang, Luming; Jing, Peiguang; Su, Yuting; Zhang, Chao; Shaoz, Ling

    2017-11-01

    Leisure tourism is an indispensable activity in urban people's life. Due to the popularity of intelligent mobile devices, a large number of photos and videos are recorded during a trip. Therefore, the ability to vividly and interestingly display these media data is a useful technique. In this paper, we propose SnapVideo, a new method that intelligently converts a personal album describing of a trip into a comprehensive, aesthetically pleasing, and coherent video clip. The proposed framework contains three main components. The scenic spot identification model first personalizes the video clips based on multiple prespecified audience classes. We then search for some auxiliary related videos from YouTube 1 according to the selected photos. To comprehensively describe a scenery, the view generation module clusters the crawled video frames into a number of views. Finally, a probabilistic model is developed to fit the frames from multiple views into an aesthetically pleasing and coherent video clip, which optimally captures the semantics of a sightseeing trip. Extensive user studies demonstrated the competitiveness of our method from an aesthetic point of view. Moreover, quantitative analysis reflects that semantically important spots are well preserved in the final video clip. 1 https://www.youtube.com/.

  18. Studenterproduceret video til eksamen

    Directory of Open Access Journals (Sweden)

    Kenneth Hansen

    2016-05-01

    Full Text Available Formålet med denne artikel er at vise, hvordan læringsdesign og stilladsering kan anvendes til at skabe en ramme for studenterproduceret video til eksamen på videregående uddannelser. Artiklen tager udgangspunkt i en problemstilling, hvor uddannelsesinstitutionerne skal håndtere og koordinere undervisning inden for både det faglige område og mediefagligt område og sikre en balance mellem en fagfaglighed og en mediefaglig tilgang. Ved at dele opgaven ud på flere faglige resurser, er der mere koordinering, men man kommer omkring problemet med krav til underviserne om dobbelt faglighed ved medieproduktioner. Med afsæt i Lanarca Declarationens perspektiver på læringsdesign og hovedsageligt Jerome Bruners principper for stilladsering, sammensættes en model for understøttelse af videoproduktion af studerende på videregående uddannelser. Ved at anvende denne model for undervisningssessioner og forløb får de fagfaglige og mediefaglige undervisere et redskab til at fokusere og koordinere indsatsen frem mod målet med, at de studerende producerer og anvender video til eksamen.

  19. Impact of Video Education on Influenza Vaccination in Pregnancy.

    Science.gov (United States)

    Goodman, Kenneth; Mossad, Sherif B; Taksler, Glen B; Emery, Jonathan; Schramm, Sarah; Rothberg, Michael B

    2015-01-01

    Despite influenza vaccination being an integral part of prenatal care, vaccination rates remain low. To evaluate the impact of pre-visit video education on patients' vaccination health beliefs and vaccination rate. From November 2013-January 2014 unvaccinated patients seen for routine prenatal carewere randomized into 2 study groups: pre-visit vaccination video education or control. Pre- and post-video health beliefs were assessed on a 5-point scale, and unvaccinated participants were subsequently interviewed by phone. In 105 randomized participants, intervention positively influenced health beliefs, as demonstrated by differences in mean pre- versus post-video scores for intervention versus control: vaccination may harm mother (difference = -0.05, p = 0.009) and baby (difference = -0.44, p = 0.015), and vaccination can protect mother (difference = 0.49, p = 0.003) and baby (difference = 0.59, p = 0.001). Vaccination rates were 28% intervention and 25% control (p = 0.70). Provider recommendation was associated with vaccination (47% if recommended vs. 12% if not, p vaccine safety as primary reasons for remaining unvaccinated. Video education positively influenced vaccination health beliefs without impacting vaccination rates. Physician's recommendation was strongly associated with participant's decision to become vaccinated and may be most effective when emphasizing influenza vaccination's protective impact on the newborn,.

  20. Error Resilience in Current Distributed Video Coding Architectures

    Directory of Open Access Journals (Sweden)

    Tonoli Claudia

    2009-01-01

    Full Text Available In distributed video coding the signal prediction is shifted at the decoder side, giving therefore most of the computational complexity burden at the receiver. Moreover, since no prediction loop exists before transmission, an intrinsic robustness to transmission errors has been claimed. This work evaluates and compares the error resilience performance of two distributed video coding architectures. In particular, we have considered a video codec based on the Stanford architecture (DISCOVER codec and a video codec based on the PRISM architecture. Specifically, an accurate temporal and rate/distortion based evaluation of the effects of the transmission errors for both the considered DVC architectures has been performed and discussed. These approaches have been also compared with H.264/AVC, in both cases of no error protection, and simple FEC error protection. Our evaluations have highlighted in all cases a strong dependence of the behavior of the various codecs to the content of the considered video sequence. In particular, PRISM seems to be particularly well suited for low-motion sequences, whereas DISCOVER provides better performance in the other cases.

  1. Error and Congestion Resilient Video Streaming over Broadband Wireless

    Directory of Open Access Journals (Sweden)

    Laith Al-Jobouri

    2015-04-01

    Full Text Available In this paper, error resilience is achieved by adaptive, application-layer rateless channel coding, which is used to protect H.264/Advanced Video Coding (AVC codec data-partitioned videos. A packetization strategy is an effective tool to control error rates and, in the paper, source-coded data partitioning serves to allocate smaller packets to more important compressed video data. The scheme for doing this is applied to real-time streaming across a broadband wireless link. The advantages of rateless code rate adaptivity are then demonstrated in the paper. Because the data partitions of a video slice are each assigned to different network packets, in congestion-prone wireless networks the increased number of packets per slice and their size disparity may increase the packet loss rate from buffer overflows. As a form of congestion resilience, this paper recommends packet-size dependent scheduling as a relatively simple way of alleviating the buffer-overflow problem arising from data-partitioned packets. The paper also contributes an analysis of data partitioning and packet sizes as a prelude to considering scheduling regimes. The combination of adaptive channel coding and prioritized packetization for error resilience with packet-size dependent packet scheduling results in a robust streaming scheme specialized for broadband wireless and real-time streaming applications such as video conferencing, video telephony, and telemedicine.

  2. Gene copy-number polymorphism caused by retrotransposition in humans.

    Directory of Open Access Journals (Sweden)

    Daniel R Schrider

    Full Text Available The era of whole-genome sequencing has revealed that gene copy-number changes caused by duplication and deletion events have important evolutionary, functional, and phenotypic consequences. Recent studies have therefore focused on revealing the extent of variation in copy-number within natural populations of humans and other species. These studies have found a large number of copy-number variants (CNVs in humans, many of which have been shown to have clinical or evolutionary importance. For the most part, these studies have failed to detect an important class of gene copy-number polymorphism: gene duplications caused by retrotransposition, which result in a new intron-less copy of the parental gene being inserted into a random location in the genome. Here we describe a computational approach leveraging next-generation sequence data to detect gene copy-number variants caused by retrotransposition (retroCNVs, and we report the first genome-wide analysis of these variants in humans. We find that retroCNVs account for a substantial fraction of gene copy-number differences between any two individuals. Moreover, we show that these variants may often result in expressed chimeric transcripts, underscoring their potential for the evolution of novel gene functions. By locating the insertion sites of these duplicates, we are able to show that retroCNVs have had an important role in recent human adaptation, and we also uncover evidence that positive selection may currently be driving multiple retroCNVs toward fixation. Together these findings imply that retroCNVs are an especially important class of polymorphism, and that future studies of copy-number variation should search for these variants in order to illuminate their potential evolutionary and functional relevance.

  3. DNA replication stress restricts ribosomal DNA copy number.

    Science.gov (United States)

    Salim, Devika; Bradford, William D; Freeland, Amy; Cady, Gillian; Wang, Jianmin; Pruitt, Steven C; Gerton, Jennifer L

    2017-09-01

    Ribosomal RNAs (rRNAs) in budding yeast are encoded by ~100-200 repeats of a 9.1kb sequence arranged in tandem on chromosome XII, the ribosomal DNA (rDNA) locus. Copy number of rDNA repeat units in eukaryotic cells is maintained far in excess of the requirement for ribosome biogenesis. Despite the importance of the repeats for both ribosomal and non-ribosomal functions, it is currently not known how "normal" copy number is determined or maintained. To identify essential genes involved in the maintenance of rDNA copy number, we developed a droplet digital PCR based assay to measure rDNA copy number in yeast and used it to screen a yeast conditional temperature-sensitive mutant collection of essential genes. Our screen revealed that low rDNA copy number is associated with compromised DNA replication. Further, subculturing yeast under two separate conditions of DNA replication stress selected for a contraction of the rDNA array independent of the replication fork blocking protein, Fob1. Interestingly, cells with a contracted array grew better than their counterparts with normal copy number under conditions of DNA replication stress. Our data indicate that DNA replication stresses select for a smaller rDNA array. We speculate that this liberates scarce replication factors for use by the rest of the genome, which in turn helps cells complete DNA replication and continue to propagate. Interestingly, tumors from mini chromosome maintenance 2 (MCM2)-deficient mice also show a loss of rDNA repeats. Our data suggest that a reduction in rDNA copy number may indicate a history of DNA replication stress, and that rDNA array size could serve as a diagnostic marker for replication stress. Taken together, these data begin to suggest the selective pressures that combine to yield a "normal" rDNA copy number.

  4. Using DMA for copying performance counter data to memory

    Science.gov (United States)

    Gara, Alan; Salapura, Valentina; Wisniewski, Robert W

    2013-12-31

    A device for copying performance counter data includes hardware path that connects a direct memory access (DMA) unit to a plurality of hardware performance counters and a memory device. Software prepares an injection packet for the DMA unit to perform copying, while the software can perform other tasks. In one aspect, the software that prepares the injection packet runs on a processing core other than the core that gathers the hardware performance data.

  5. DNA replication stress restricts ribosomal DNA copy number.

    Directory of Open Access Journals (Sweden)

    Devika Salim

    2017-09-01

    Full Text Available Ribosomal RNAs (rRNAs in budding yeast are encoded by ~100-200 repeats of a 9.1kb sequence arranged in tandem on chromosome XII, the ribosomal DNA (rDNA locus. Copy number of rDNA repeat units in eukaryotic cells is maintained far in excess of the requirement for ribosome biogenesis. Despite the importance of the repeats for both ribosomal and non-ribosomal functions, it is currently not known how "normal" copy number is determined or maintained. To identify essential genes involved in the maintenance of rDNA copy number, we developed a droplet digital PCR based assay to measure rDNA copy number in yeast and used it to screen a yeast conditional temperature-sensitive mutant collection of essential genes. Our screen revealed that low rDNA copy number is associated with compromised DNA replication. Further, subculturing yeast under two separate conditions of DNA replication stress selected for a contraction of the rDNA array independent of the replication fork blocking protein, Fob1. Interestingly, cells with a contracted array grew better than their counterparts with normal copy number under conditions of DNA replication stress. Our data indicate that DNA replication stresses select for a smaller rDNA array. We speculate that this liberates scarce replication factors for use by the rest of the genome, which in turn helps cells complete DNA replication and continue to propagate. Interestingly, tumors from mini chromosome maintenance 2 (MCM2-deficient mice also show a loss of rDNA repeats. Our data suggest that a reduction in rDNA copy number may indicate a history of DNA replication stress, and that rDNA array size could serve as a diagnostic marker for replication stress. Taken together, these data begin to suggest the selective pressures that combine to yield a "normal" rDNA copy number.

  6. Video consultation use by Australian general practitioners: video vignette study.

    Science.gov (United States)

    Jiwa, Moyez; Meng, Xingqiong

    2013-06-19

    There is unequal access to health care in Australia, particularly for the one-third of the population living in remote and rural areas. Video consultations delivered via the Internet present an opportunity to provide medical services to those who are underserviced, but this is not currently routine practice in Australia. There are advantages and shortcomings to using video consultations for diagnosis, and general practitioners (GPs) have varying opinions regarding their efficacy. The aim of this Internet-based study was to explore the attitudes of Australian GPs toward video consultation by using a range of patient scenarios presenting different clinical problems. Overall, 102 GPs were invited to view 6 video vignettes featuring patients presenting with acute and chronic illnesses. For each vignette, they were asked to offer a differential diagnosis and to complete a survey based on the theory of planned behavior documenting their views on the value of a video consultation. A total of 47 GPs participated in the study. The participants were younger than Australian GPs based on national data, and more likely to be working in a larger practice. Most participants (72%-100%) agreed on the differential diagnosis in all video scenarios. Approximately one-third of the study participants were positive about video consultations, one-third were ambivalent, and one-third were against them. In all, 91% opposed conducting a video consultation for the patient with symptoms of an acute myocardial infarction. Inability to examine the patient was most frequently cited as the reason for not conducting a video consultation. Australian GPs who were favorably inclined toward video consultations were more likely to work in larger practices, and were more established GPs, especially in rural areas. The survey results also suggest that the deployment of video technology will need to focus on follow-up consultations. Patients with minor self-limiting illnesses and those with medical

  7. The value of patch-choice copying in fruit flies.

    Directory of Open Access Journals (Sweden)

    Shane Golden

    Full Text Available Many animals copy the choices of others but the functional and mechanistic explanations for copying are still not fully resolved. We relied on novel behavioral protocols to quantify the value of patch-choice copying in fruit flies. In a titration experiment, we quantified how much nutritional value females were willing to trade for laying eggs on patches already occupied by larvae (social patches. Females were highly sensitive to nutritional quality, which was positively associated with their offspring success. Females, however, perceived social, low-nutrition patches (33% of the nutrients as equally valuable as non-social, high-nutrition ones (100% of the nutrients. In follow-up experiments, we could not, however, either find informational benefits from copying others or detect what females' offspring may gain from developing with older larvae. Because patch-choice copying in fruit flies is a robust phenomenon in spite of potential costs due to competition, we suggest that it is beneficial in natural settings, where fruit flies encounter complex dynamics of microbial communities, which include, in addition to the preferred yeast species they feed on, numerous harmful fungi and bacteria. We suggest that microbial ecology underlies many cases of copying in nature.

  8. Instructional Effectiveness of Video Media.

    Science.gov (United States)

    Wetzel, C. Douglas; And Others

    This volume is a blend of media research, cognitive science research, and tradecraft knowledge regarding video production techniques. The research covers: visual learning; verbal-auditory information; news broadcasts; the value of motion and animation in film and video; simulation (including realism and fidelity); the relationship of text and…

  9. Negotiation for Strategic Video Games

    OpenAIRE

    Afiouni, Einar Nour; Øvrelid, Leif Julian

    2013-01-01

    This project aims to examine the possibilities of using game theoretic concepts and multi-agent systems in modern video games with real time demands. We have implemented a multi-issue negotiation system for the strategic video game Civilization IV, evaluating different negotiation techniques with a focus on the use of opponent modeling to improve negotiation results.

  10. Perancangan Video Game Legenda Anglingdarma

    OpenAIRE

    Siswanto, Jefry Yosua; Ardianto, Deny Tri; Srisanto, Erandaru

    2014-01-01

    Video game dapat digunakan untuk membawakan sebuah cerita rakyat dari negeri masing-masing.Bagi negara-negara yang industri game-nya belum maju, hal ini dapat digunakan sebagai solusi untuk memperkenalkan cerita rakyat.Untuk itu video game ini dibuat agar setidaknya dapat membantu mengenalkan kembali cerita rakyat Indonesia.Dibuat dengan teknik ilustrasi untuk mempermudah pengenalan dan memberikan daya tarik sendiri.

  11. The Art of Video Games

    Science.gov (United States)

    Johnson, Mark M.

    2012-01-01

    The Smithsonian American Art Museum has created and will tour an exhibition on a most unusual but extremely popular art form--"The Art of Video Games." As one of the largest and first of its type, this exhibition will document and explore a 40-year evolution of video games as an artistic medium, with a focus on striking visual effects and the…

  12. Video Streaming in Online Learning

    Science.gov (United States)

    Hartsell, Taralynn; Yuen, Steve Chi-Yin

    2006-01-01

    The use of video in teaching and learning is a common practice in education today. As learning online becomes more of a common practice in education, streaming video and audio will play a bigger role in delivering course materials to online learners. This form of technology brings courses alive by allowing online learners to use their visual and…

  13. Teaching Idioms: Video or Lecture.

    Science.gov (United States)

    Kenyon, Patricia; Daly, Kimberly

    1991-01-01

    A study evaluated the effectiveness of video instruction in teaching the meanings and uses of idioms to 20 deaf adolescents. Students improved their knowledge and use of idioms more when exposed to the video/discussion approach than to the lecture/discussion approach. (DB)

  14. Video Games as Moral Educators?

    Science.gov (United States)

    Khoo, Angeline

    2012-01-01

    The growing interest in video gaming is matched by a corresponding increase in concerns about the harmful effects on children and adolescents. There are numerous studies on aggression and addiction which spark debates on the negative effects of video gaming. At the same time, there are also studies demonstrating prosocial effects. This paper…

  15. NEI You Tube Videos: Amblyopia

    Medline Plus

    Full Text Available ... National Eye Institute’s mission is to “conduct and support research, training, health information dissemination, and other programs ... search for current job openings visit HHS USAJobs Home > NEI YouTube Videos > NEI YouTube Videos: Amblyopia NEI ...

  16. Epistemic Authority, Lies, and Video

    DEFF Research Database (Denmark)

    Andersen, Rune Saugmann

    2013-01-01

    This article analyses how videos of violent protests become politically powerful arguments able to intervene in debates about security. It does so by looking at a series of videos taken by police authorities and protesters during street battles in Copenhagen in August 2009, when protesters oppose...

  17. Coastal monitoring through video systems: best practices and architectural design of a new video monitoring station in Jesolo (Veneto, Italy)

    Science.gov (United States)

    Archetti, Renata; Vacchi, Matteo; Carniel, Sandro; Benetazzo, Alvise

    2013-04-01

    Measuring the location of the shoreline and monitoring foreshore changes through time represent a fundamental task for correct coastal management at many sites around the world. Several authors demonstrated video systems to be an essential tool for increasing the amount of data available for coastline management. These systems typically sample at least once per hour and can provide long-term datasets showing variations over days, events, months, seasons and years. In the past few years, due to the wide diffusion of video cameras at relatively low price, the use of video cameras and of video images analysis for environmental control has increased significantly. Even if video monitoring systems were often used in the research field they are most often applied with practical purposes including: i) identification and quantification of shoreline erosion, ii) assessment of coastal protection structure and/or beach nourishment performance, and iii) basic input to engineering design in the coastal zone iv) support for integrated numerical model validation Here we present the guidelines for the creation of a new video monitoring network in the proximity of the Jesolo beach (NW of the Adriatic Sea, Italy), Within this 10 km-long tourist district several engineering structures have been built in recent years, with the aim of solving urgent local erosion problems; as a result, almost all types of protection structures are present at this site: groynes, detached breakwaters.The area investigated experienced severe problems of coastal erosion in the past decades, inclusding a major one in the last November 2012. The activity is planned within the framework of the RITMARE project, that is also including other monitoring and scientific activities (bathymetry survey, waves and currents measurements, hydrodynamics and morphodynamic modeling). This contribution focuses on best practices to be adopted in the creation of the video monitoring system, and briefly describes the

  18. Protecting personal data in camera surveillance practices

    NARCIS (Netherlands)

    Dubbeld, L.

    2005-01-01

    This paper explores in which ways privacy (in particular, data protection principles) comes to the fore in the day-to-day operation of a public video surveillance system. Starting from current European legal perspectives on data protection, and building on an empirical case study, the meanings and

  19. Watermarking textures in video games

    Science.gov (United States)

    Liu, Huajian; Berchtold, Waldemar; Schäfer, Marcel; Lieb, Patrick; Steinebach, Martin

    2014-02-01

    Digital watermarking is a promising solution to video game piracy. In this paper, based on the analysis of special challenges and requirements in terms of watermarking textures in video games, a novel watermarking scheme for DDS textures in video games is proposed. To meet the performance requirements in video game applications, the proposed algorithm embeds the watermark message directly in the compressed stream in DDS files and can be straightforwardly applied in watermark container technique for real-time embedding. Furthermore, the embedding approach achieves high watermark payload to handle collusion secure fingerprinting codes with extreme length. Hence, the scheme is resistant to collusion attacks, which is indispensable in video game applications. The proposed scheme is evaluated in aspects of transparency, robustness, security and performance. Especially, in addition to classical objective evaluation, the visual quality and playing experience of watermarked games is assessed subjectively in game playing.

  20. Video game induced knuckle pad.

    Science.gov (United States)

    Rushing, Mary E; Sheehan, Daniel J; Davis, Loretta S

    2006-01-01

    Controversy and concern surround the video game playing fascination of children. Scientific reports have explored the negative effects of video games on youth, with a growing number recognizing the actual physical implications of this activity. We offer another reason to discourage children's focus on video games: knuckle pads. A 13-year-old black boy presented with an asymptomatic, slightly hyperpigmented plaque over his right second distal interphalangeal joint. A punch biopsy specimen confirmed knuckle pad as the diagnosis, and a traumatic etiology from video game playing was suspected. Knuckle pads can be painful, cosmetically unappealing, and refractory to treatment. They can now be recognized as yet another potential adverse consequence of chronic video game playing.

  1. Distributed source coding of video

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Van Luong, Huynh

    2015-01-01

    A foundation for distributed source coding was established in the classic papers of Slepian-Wolf (SW) [1] and Wyner-Ziv (WZ) [2]. This has provided a starting point for work on Distributed Video Coding (DVC), which exploits the source statistics at the decoder side offering shifting processing...... steps, conventionally performed at the video encoder side, to the decoder side. Emerging applications such as wireless visual sensor networks and wireless video surveillance all require lightweight video encoding with high coding efficiency and error-resilience. The video data of DVC schemes differ from...... the assumptions of SW and WZ distributed coding, e.g. by being correlated in time and nonstationary. Improving the efficiency of DVC coding is challenging. This paper presents some selected techniques to address the DVC challenges. Focus is put on pin-pointing how the decoder steps are modified to provide...

  2. [Video documentation in forensic practice].

    Science.gov (United States)

    Schyma, C; Schyma, P

    1995-01-01

    The authors report in part 1 about their experiences with the Canon Ex1 Hi camcorder and the possibilities of documentation with the modern video technique. Application examples in legal medicine and criminalistics are described autopsy, scene, reconstruction of crimes etc. The online video documentation of microscopic sessions makes the discussion of findings easier. The use of video films for instruction produces a good resonance. The use of the video documentation can be extended by digitizing (Part 2). Two frame grabbers are presented, with which we obtained good results in digitizing of images captured from video. The best quality of images is achieved by online use of an image analysis chain. Corel 5.0 and PicEd Cora 4.0 allow complete image processings and analysis. The digital image processing influences the objectivity of the documentation. The applicabilities of image libraries are discussed.

  3. Color image and video enhancement

    CERN Document Server

    Lecca, Michela; Smolka, Bogdan

    2015-01-01

    This text covers state-of-the-art color image and video enhancement techniques. The book examines the multivariate nature of color image/video data as it pertains to contrast enhancement, color correction (equalization, harmonization, normalization, balancing, constancy, etc.), noise removal and smoothing. This book also discusses color and contrast enhancement in vision sensors and applications of image and video enhancement.   ·         Focuses on enhancement of color images/video ·         Addresses algorithms for enhancing color images and video ·         Presents coverage on super resolution, restoration, in painting, and colorization.

  4. Smart Streaming for Online Video Services

    OpenAIRE

    Chen, Liang; Zhou, Yipeng; Chiu, Dah Ming

    2013-01-01

    Bandwidth consumption is a significant concern for online video service providers. Practical video streaming systems usually use some form of HTTP streaming (progressive download) to let users download the video at a faster rate than the video bitrate. Since users may quit before viewing the complete video, however, much of the downloaded video will be "wasted". To the extent that users' departure behavior can be predicted, we develop smart streaming that can be used to improve user QoE with ...

  5. Personalized video summarization based on group scoring

    OpenAIRE

    Darabi, K; G. Ghinea

    2014-01-01

    In this paper an expert-based model for generation of personalized video summaries is suggested. The video frames are initially scored and annotated by multiple video experts. Thereafter, the scores for the video segments that have been assigned the higher priorities by end users will be upgraded. Considering the required summary length, the highest scored video frames will be inserted into a personalized final summary. For evaluation purposes, the video summaries generated by our system have...

  6. Marin Tsunami (video)

    Science.gov (United States)

    Filmed and edited by: Loeffler, Kurt; Gesell, Justine

    2010-01-01

    Tsunamis are a constant threat to the coasts of our world. Although tsunamis are infrequent along the West coast of the United States, it is possible and necessary to prepare for potential tsunami hazards to minimize loss of life and property. Community awareness programs are important, as they strive to create an informed society by providing education and training. The Marin coast could be struck by a tsunami. Whether you live in Marin County, visit the beaches, or rent or own a home near the coast, it is vital to understand the tsunami threat and take preparation seriously. Marin Tsunami tells the story of what several West Marin communities are doing to be prepared. This video was produced by the US Geological Survey (USGS) in cooperation with the Marin Office of Emergency Services.

  7. Mitochondrial DNA Copy Number in Sleep Duration Discordant Monozygotic Twins.

    Science.gov (United States)

    Wrede, Joanna E; Mengel-From, Jonas; Buchwald, Dedra; Vitiello, Michael V; Bamshad, Michael; Noonan, Carolyn; Christiansen, Lene; Christensen, Kaare; Watson, Nathaniel F

    2015-10-01

    Mitochondrial DNA (mtDNA) copy number is an important component of mitochondrial function and varies with age, disease, and environmental factors. We aimed to determine whether mtDNA copy number varies with habitual differences in sleep duration within pairs of monozygotic twins. Academic clinical research center. 15 sleep duration discordant monozygotic twin pairs (30 twins, 80% female; mean age 42.1 years [SD 15.0]). Sleep duration was phenotyped with wrist actigraphy. Each twin pair included a "normal" (7-9 h/24) and "short" (sleeping twin. Fasting peripheral blood leukocyte DNA was assessed for mtDNA copy number via the n-fold difference between qPCR measured mtDNA and nuclear DNA creating an mtDNA measure without absolute units. We used generalized estimating equation linear regression models accounting for the correlated data structure to assess within-pair effects of sleep duration on mtDNA copy number. Mean within-pair sleep duration difference per 24 hours was 94.3 minutes (SD 62.6 min). We found reduced sleep duration (β = 0.06; 95% CI 0.004, 0.12; P sleep efficiency (β = 0.51; 95% CI 0.06, 0.95; P sleep duration was associated with a decrease in mtDNA copy number of 0.06. Likewise, a 1% decrease in actigraphy-defined sleep efficiency was associated with a decrease in mtDNA copy number of 0.51. Reduced sleep duration and sleep efficiency were associated with reduced mitochondrial DNA copy number in sleep duration discordant monozygotic twins offering a potential mechanism whereby short sleep impairs health and longevity through mitochondrial stress. © 2015 Associated Professional Sleep Societies, LLC.

  8. Accelerating video carving from unallocated space

    Science.gov (United States)

    Kalva, Hari; Parikh, Anish; Srinivasan, Avinash

    2013-03-01

    Video carving has become an essential tool in digital forensics. Video carving enables recovery of deleted video files from hard disks. Processing data to extract videos is a computationally intensive task. In this paper we present two methods to accelerate video carving: a method to accelerate fragment extraction, and a method to accelerate combining of these fragments into video segments. Simulation results show that complexity of video fragment extraction can be reduced by as much as 75% with minimal impact on the videos recovered.

  9. Forensic analysis of video file formats

    National Research Council Canada - National Science Library

    Gloe, Thomas; Fischer, André; Kirchner, Matthias

    2014-01-01

    .... In combination, such characteristics can help to authenticate digital video files in forensic settings by distinguishing between original and post-processed videos, verifying the purported source...

  10. Video Quality Prediction Models Based on Video Content Dynamics for H.264 Video over UMTS Networks

    Directory of Open Access Journals (Sweden)

    Asiya Khan

    2010-01-01

    Full Text Available The aim of this paper is to present video quality prediction models for objective non-intrusive, prediction of H.264 encoded video for all content types combining parameters both in the physical and application layer over Universal Mobile Telecommunication Systems (UMTS networks. In order to characterize the Quality of Service (QoS level, a learning model based on Adaptive Neural Fuzzy Inference System (ANFIS and a second model based on non-linear regression analysis is proposed to predict the video quality in terms of the Mean Opinion Score (MOS. The objective of the paper is two-fold. First, to find the impact of QoS parameters on end-to-end video quality for H.264 encoded video. Second, to develop learning models based on ANFIS and non-linear regression analysis to predict video quality over UMTS networks by considering the impact of radio link loss models. The loss models considered are 2-state Markov models. Both the models are trained with a combination of physical and application layer parameters and validated with unseen dataset. Preliminary results show that good prediction accuracy was obtained from both the models. The work should help in the development of a reference-free video prediction model and QoS control methods for video over UMTS networks.

  11. Intelligent network video understanding modern video surveillance systems

    CERN Document Server

    Nilsson, Fredrik

    2008-01-01

    Offering ready access to the security industry's cutting-edge digital future, Intelligent Network Video provides the first complete reference for all those involved with developing, implementing, and maintaining the latest surveillance systems. Pioneering expert Fredrik Nilsson explains how IP-based video surveillance systems provide better image quality, and a more scalable and flexible system at lower cost. A complete and practical reference for all those in the field, this volume:Describes all components relevant to modern IP video surveillance systemsProvides in-depth information about ima

  12. Practical, Real-Time, and Robust Watermarking on the Spatial Domain for High-Definition Video Contents

    Science.gov (United States)

    Kim, Kyung-Su; Lee, Hae-Yeoun; Im, Dong-Hyuck; Lee, Heung-Kyu

    Commercial markets employ digital right management (DRM) systems to protect valuable high-definition (HD) quality videos. DRM system uses watermarking to provide copyright protection and ownership authentication of multimedia contents. We propose a real-time video watermarking scheme for HD video in the uncompressed domain. Especially, our approach is in aspect of practical perspectives to satisfy perceptual quality, real-time processing, and robustness requirements. We simplify and optimize human visual system mask for real-time performance and also apply dithering technique for invisibility. Extensive experiments are performed to prove that the proposed scheme satisfies the invisibility, real-time processing, and robustness requirements against video processing attacks. We concentrate upon video processing attacks that commonly occur in HD quality videos to display on portable devices. These attacks include not only scaling and low bit-rate encoding, but also malicious attacks such as format conversion and frame rate change.

  13. Food preference and copying behaviour in zebra finches, Taeniopygia guttata.

    Science.gov (United States)

    Guillette, Lauren M; Morgan, Kate V; Hall, Zachary J; Bailey, Ida E; Healy, Susan D

    2014-11-01

    As a social species zebra finches might be expected to copy the food choices of more experienced conspecifics. This prediction has been tested previously by presenting observers with two demonstrator birds that differ in some way (e.g., sex, familiarity), each feeding on a different colour food source. However, if the observer subsequently exhibits a preference, it is unclear whether it has copied the choice of one demonstrator or avoided the choice of the other. Furthermore, this choice may actually be influenced by pre-existing preferences, a potential bias that is rarely tested. Here we examine whether apparent copying or avoidance can be explained by pre-existing preferences. In Experiment 1, observers had the opportunity to watch a conspecific forage from one of the two differently coloured food hoppers. In Experiment 2, the observers did not have this opportunity. In both experiments observers were subsequently tested for their food hopper preference and all but one preferred one colour over the other. In Experiment 1 some observers showed evidence for copying, while others seemed to avoid the colour preferred by the demonstrator. In Experiment 2 females generally preferred the white hopper. Pre-existing colour preferences could, therefore, explain the apparent copying/avoidance we observed. This article is part of a Special Issue entitled: Cognition in the wild. Copyright © 2014 Elsevier B.V. All rights reserved.

  14. Copy number variation of FCGR genes in etiopathogenesis of sarcoidosis.

    Directory of Open Access Journals (Sweden)

    Marlena Typiak

    Full Text Available We have previously revealed that, in contrast to polymorphism of FCGR2B and FCGR3B, polymorphism of FCGR2A, FCGR2C and FCGR3A genes, encoding receptors for Fc fragment of immunoglobulin G (Fcγ receptors, play a role in increased level of circulating immune complexes with occurrence of Mycobacterium tuberculosis heat shock proteins in patients with sarcoidosis. However, this immunocomplexemia might also be caused by decreased clearance by immune cells due to a changed copy number of FCGR genes. Thus, the next step of our study was to evaluate copy number variation of FCGR2A, FCGR2B, FCGR2C, FCGR3A and FCGR3B in this disease. The analysis was carried out by real-time quantitative PCR on 104 patients and 110 healthy volunteers. Despite previously detected variation in allele/genotype frequencies of FCGR in sarcoidosis and its particular stages, there was no copy number variation of the tested genes between sarcoidosis or its stages and healthy control, as well as between stages themselves. A relevant increase in copy number of FCGR2C and FCGR3B in Stage IV of sarcoidosis vs. other stages and controls was detected, but this observation was based on a limited number of Stage IV patients. Hence, polymorphism of FCGR genes seems to be more important than their copy number variation in etiopathogenesis of sarcoidosis in patients from the Polish population.

  15. Endogenous RNA interference is driven by copy number

    Science.gov (United States)

    Cruz, Cristina; Houseley, Jonathan

    2014-01-01

    A plethora of non-protein coding RNAs are produced throughout eukaryotic genomes, many of which are transcribed antisense to protein-coding genes and could potentially instigate RNA interference (RNAi) responses. Here we have used a synthetic RNAi system to show that gene copy number is a key factor controlling RNAi for transcripts from endogenous loci, since transcripts from multi-copy loci form double stranded RNA more efficiently than transcripts from equivalently expressed single-copy loci. Selectivity towards transcripts from high-copy DNA is therefore an emergent property of a minimal RNAi system. The ability of RNAi to selectively degrade transcripts from high-copy loci would allow suppression of newly emerging transposable elements, but such a surveillance system requires transcription. We show that low-level genome-wide pervasive transcription is sufficient to instigate RNAi, and propose that pervasive transcription is part of a defense mechanism capable of directing a sequence-independent RNAi response against transposable elements amplifying within the genome. DOI: http://dx.doi.org/10.7554/eLife.01581.001 PMID:24520161

  16. Spontaneously broken Yang-Mills-Einstein supergravities as double copies

    Science.gov (United States)

    Chiodaroli, Marco; Günaydin, Murat; Johansson, Henrik; Roiban, Radu

    2017-06-01

    Color/kinematics duality and the double-copy construction have proved to be systematic tools for gaining new insight into gravitational theories. Extending our earlier work, in this paper we introduce new double-copy constructions for large classes of spontaneously-broken Yang-Mills-Einstein theories with adjoint Higgs fields. One gauge-theory copy entering the construction is a spontaneously-broken (super-)Yang-Mills theory, while the other copy is a bosonic Yang-Mills-scalar theory with trilinear scalar interactions that display an explicitly-broken global symmetry. We show that the kinematic numerators of these gauge theories can be made to obey color/kinematics duality by exhibiting particular additional Lie-algebraic relations. We discuss in detail explicit examples with N=2 supersymmetry, focusing on Yang-Mills-Einstein supergravity theories belonging to the generic Jordan family in four and five dimensions, and identify the map between the supergravity and double-copy fields and parameters. We also briefly discuss the application of our results to N=4 supergravity theories. The constructions are illustrated by explicit examples of tree-level and one-loop scattering amplitudes.

  17. Copy-move forgery detection from printed images

    Science.gov (United States)

    Amerini, Irene; Caldelli, Roberto; Del Bimbo, Alberto; Di Fuccia, Andrea; Saravo, Luigi; Rizzo, Anna Paola

    2014-02-01

    Counterfeiting digital images through a copy-move forgery is one of the most common ways of manipulating the semantic content of a picture, whereby a portion of the image is copy-pasted elsewhere into the same image. It could happen, however, instead of a digital image only its analog version may be available. Scanned or recaptured (by a digital camera) printed documents are widely used in a number of different scenarios, for example a photo published on a newspaper or a magazine. In this paper, the problem of detecting and localizing copy-move forgeries from a printed picture is focused. The copy-move manipulation is detected by verifying the presence of duplicated patches in the scanned image by using a SIFT-based method, tailored for printed image case. Printing and scanning/recapturing scenario is quite challenging because it involves different kinds of distortions. The goal is to experimentally investigate the requirement set under which reliable copy-move forgery detection is possible. We carry out a series of experiments, to pursue all the different issues involved in this application scenario by considering diverse kinds of print and re-acquisition circumstances. Experimental results point out that forgery detection is still successful though with reduced performances, as expected.

  18. Interactive Video, The Next Step

    Science.gov (United States)

    Strong, L. R.; Wold-Brennon, R.; Cooper, S. K.; Brinkhuis, D.

    2012-12-01

    Video has the ingredients to reach us emotionally - with amazing images, enthusiastic interviews, music, and video game-like animations-- and it's emotion that motivates us to learn more about our new interest. However, watching video is usually passive. New web-based technology is expanding and enhancing the video experience, creating opportunities to use video with more direct interaction. This talk will look at an Educaton and Outreach team's experience producing video-centric curriculum using innovative interactive media tools from TED-Ed and FlixMaster. The Consortium for Ocean Leadership's Deep Earth Academy has partnered with the Center for Dark Energy Biosphere Investigations (C-DEBI) to send educators and a video producer aboard three deep sea research expeditions to the Juan de Fuca plate to install and service sub-seafloor observatories. This collaboration between teachers, students, scientists and media producers has proved a productive confluence, providing new ways of understanding both ground-breaking science and the process of science itself - by experimenting with new ways to use multimedia during ocean-going expeditions and developing curriculum and other projects post-cruise.

  19. An evaluation of the efficacy of video displays for use with chimpanzees (Pan troglodytes).

    Science.gov (United States)

    Hopper, Lydia M; Lambeth, Susan P; Schapiro, Steven J

    2012-05-01

    Video displays for behavioral research lend themselves particularly well to studies with chimpanzees (Pan troglodytes), as their vision is comparable to humans', yet there has been no formal test of the efficacy of video displays as a form of social information for chimpanzees. To address this, we compared the learning success of chimpanzees shown video footage of a conspecific compared to chimpanzees shown a live conspecific performing the same novel task. Footage of an unfamiliar chimpanzee operating a bidirectional apparatus was presented to 24 chimpanzees (12 males, 12 females), and their responses were compared to those of a further 12 chimpanzees given the same task but with no form of information. Secondly, we also compared the responses of the chimpanzees in the video display condition to responses of eight chimpanzees from a previously published study of ours, in which chimpanzees observed live models. Chimpanzees shown a video display were more successful than those in the control condition and showed comparable success to those that saw a live model. Regarding fine-grained copying (i.e. the direction that the door was pushed), only chimpanzees that observed a live model showed significant matching to the model's methods with their first response. Yet, when all the responses made by the chimpanzees were considered, comparable levels of matching were shown by chimpanzees in both the live and video conditions. © 2012 Wiley Periodicals, Inc.

  20. Layered Video Transmission on Adaptive OFDM Wireless Systems

    Directory of Open Access Journals (Sweden)

    D. Dardari

    2004-09-01

    Full Text Available Future wireless video transmission systems will consider orthogonal frequency division multiplexing (OFDM as the basic modulation technique due to its robustness and low complexity implementation in the presence of frequency-selective channels. Recently, adaptive bit loading techniques have been applied to OFDM showing good performance gains in cable transmission systems. In this paper a multilayer bit loading technique, based on the so called “ordered subcarrier selection algorithm,” is proposed and applied to a Hiperlan2-like wireless system at 5 GHz for efficient layered multimedia transmission. Different schemes realizing unequal error protection both at coding and modulation levels are compared. The strong impact of this technique in terms of video quality is evaluated for MPEG-4 video transmission.

  1. Comparison of Video Steganography Methods for Watermark Embedding

    Directory of Open Access Journals (Sweden)

    Griberman David

    2016-05-01

    Full Text Available The paper focuses on the comparison of video steganography methods for the purpose of digital watermarking in the context of copyright protection. Four embedding methods that use Discrete Cosine and Discrete Wavelet Transforms have been researched and compared based on their embedding efficiency and fidelity. A video steganography program has been developed in the Java programming language with all of the researched methods implemented for experiments. The experiments used 3 video containers with different amounts of movement. The impact of the movement has been addressed in the paper as well as the ways of potential improvement of embedding efficiency using adaptive embedding based on the movement amount. Results of the research have been verified using a survey with 17 participants.

  2. Video systems for alarm assessment

    Energy Technology Data Exchange (ETDEWEB)

    Greenwoll, D.A.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Ebel, P.E. (BE, Inc., Barnwell, SC (United States))

    1991-09-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing closed-circuit television systems for video alarm assessment. There is a section on each of the major components in a video system: camera, lens, lighting, transmission, synchronization, switcher, monitor, and recorder. Each section includes information on component selection, procurement, installation, test, and maintenance. Considerations for system integration of the components are contained in each section. System emphasis is focused on perimeter intrusion detection and assessment systems. A glossary of video terms is included. 13 figs., 9 tabs.

  3. Lossless Compression of Broadcast Video

    DEFF Research Database (Denmark)

    Martins, Bo; Eriksen, N.; Faber, E.

    1998-01-01

    We investigate several techniques for lossless and near-lossless compression of broadcast video.The emphasis is placed on the emerging international standard for compression of continous-tone still images, JPEG-LS, due to its excellent compression performance and moderatecomplexity. Except for one...... artificial sequence containing uncompressible data all the 4:2:2, 8-bit test video material easily compresses losslessly to a rate below 125 Mbit/s. At this rate, video plus overhead can be contained in a single telecom 4th order PDH channel or a single STM-1 channel. Difficult 4:2:2, 10-bit test material...

  4. Unequal Error Protection Techniques Based on Wyner-Ziv Coding

    Directory of Open Access Journals (Sweden)

    Liang Liang

    2009-01-01

    Full Text Available Compressed video is very sensitive to channel errors. A few bit losses can stop the entire decoding process. Therefore, protecting compressed video is always necessary for reliable visual communications. Utilizing unequal error protection schemes that assign different protection levels to the different elements in a compressed video stream is an efficient and effective way to combat channel errors. Three such schemes, based on Wyner-Ziv coding, are described herein. These schemes independently provide different protection levels to motion information and the transform coefficients produced by an H.264/AVC encoder. One method adapts the protection levels to the content of each frame, while another utilizes feedback regarding the latest channel packet loss rate to adjust the protection levels. All three methods demonstrate superior error resilience to using equal error protection in the face of packet losses.

  5. Nuclear copies of mitochondrial genes: another problem for ancient DNA.

    Science.gov (United States)

    den Tex, Robert-Jan; Maldonado, Jesus E; Thorington, Richard; Leonard, Jennifer A

    2010-10-01

    The application of ancient DNA techniques is subject to many problems caused primarily by low quality and by low quantity of DNA. For these reasons most studies employing ancient DNA rely on the characterization of mitochondrial DNA, which is present in many more copies per cell than nuclear DNA and hence more copies are likely to survive. We used universal and taxon specific mitochondrial primers to amplify DNA from museum specimens, and found many instances where the amplification of nuclear copies of the mitochondrial gene (numts) instead of the targeted mitochondrial fragment had occurred. Furthermore, the likelihood of amplifying numts increased dramatically when universal primers were utilized. Here we suggest that ancient DNA practitioners must consider the possibility that numts can be amplified at higher rates than previously thought. This is another complication for ancient DNA studies, but it also suggests that more extensive inclusion of nuclear markers in ancient DNA studies should be feasible.

  6. Copy-number variants in neurodevelopmental disorders: promises and challenges.

    LENUS (Irish Health Repository)

    Merikangas, Alison K

    2012-02-01

    Copy-number variation (CNV) is the most prevalent type of structural variation in the human genome. There is emerging evidence that copy-number variants (CNVs) provide a new vista on understanding susceptibility to neuropsychiatric disorders. Some challenges in the interpretation of current CNV studies include the use of overlapping samples, differing phenotypic definitions, an absence of population norms for CNVs and a lack of consensus in methods for CNV detection and analysis. Here, we review current CNV association study methods and results in autism spectrum disorders (ASD) and schizophrenia, and provide suggestions for design approaches to future studies that might maximize the translation of this work to etiological understanding.

  7. Quantum State Discrimination Using the Minimum Average Number of Copies.

    Science.gov (United States)

    Slussarenko, Sergei; Weston, Morgan M; Li, Jun-Gang; Campbell, Nicholas; Wiseman, Howard M; Pryde, Geoff J

    2017-01-20

    In the task of discriminating between nonorthogonal quantum states from multiple copies, the key parameters are the error probability and the resources (number of copies) used. Previous studies have considered the task of minimizing the average error probability for fixed resources. Here we introduce a new state discrimination task: minimizing the average resources for a fixed admissible error probability. We show that this new task is not performed optimally by previously known strategies, and derive and experimentally test a detection scheme that performs better.

  8. Mitochondrial DNA Copy Number in Sleep Duration Discordant Monozygotic Twins

    DEFF Research Database (Denmark)

    Wrede, Joanna E; Mengel-From, Jonas; Buchwald, Dedra

    2015-01-01

    . SETTING: Academic clinical research center. PARTICIPANTS: 15 sleep duration discordant monozygotic twin pairs (30 twins, 80% female; mean age 42.1 years [SD 15.0]). DESIGN: Sleep duration was phenotyped with wrist actigraphy. Each twin pair included a "normal" (7-9 h/24) and "short" (... with a decrease in mtDNA copy number of 0.51. CONCLUSIONS: Reduced sleep duration and sleep efficiency were associated with reduced mtDNA copy number in sleep duration discordant monozygotic twins offering a potential mechanism whereby short sleep impairs health and longevity through mitochondrial stress....

  9. Chromosome Conformation Capture Carbon Copy (5C) in Budding Yeast.

    Science.gov (United States)

    Belton, Jon-Matthew; Dekker, Job

    2015-06-01

    Chromosome conformation capture carbon copy (5C) is a high-throughput method for detecting ligation products of interest in a chromosome conformation capture (3C) library. 5C uses ligation-mediated amplification (LMA) to generate carbon copies of 3C ligation product junctions using single-stranded oligonucleotide probes. This procedure produces a 5C library of short DNA molecules which represent the interactions between the corresponding restriction fragments. The 5C library can be amplified using universal primers containing the Illumina paired-end adaptor sequences for subsequent high-throughput sequencing. © 2015 Cold Spring Harbor Laboratory Press.

  10. Lyme Disease and YouTubeTM: A Cross-Sectional Study of Video Contents.

    Science.gov (United States)

    Basch, Corey H; Mullican, Lindsay A; Boone, Kwanza D; Yin, Jingjing; Berdnik, Alyssa; Eremeeva, Marina E; Fung, Isaac Chun-Hai

    2017-08-01

    Lyme disease is the most common tick-borne disease. People seek health information on Lyme disease from YouTubeTM videos. In this study, we investigated if the contents of Lyme disease-related YouTubeTM videos varied by their sources. Most viewed English YouTubeTM videos (n = 100) were identified and manually coded for contents and sources. Within the sample, 40 videos were consumer-generated, 31 were internet-based news, 16 were professional, and 13 were TV news. Compared with consumer-generated videos, TV news videos were more likely to mention celebrities (odds ratio [OR], 10.57; 95% confidence interval [CI], 2.13-52.58), prevention of Lyme disease through wearing protective clothing (OR, 5.63; 95% CI, 1.23-25.76), and spraying insecticides (OR, 7.71; 95% CI, 1.52-39.05). A majority of the most popular Lyme disease-related YouTubeTM videos were not created by public health professionals. Responsible reporting and creative video-making facilitate Lyme disease education. Partnership with YouTubeTM celebrities to co-develop educational videos may be a future direction.

  11. Copy number variation in glutathione S-transferases M1 and T1 and ischemic vascular disease: four studies and meta-analyses

    DEFF Research Database (Denmark)

    Nørskov, Marianne S; Frikke-Schmidt, Ruth; Loft, Steffen

    2011-01-01

    Glutathione S-transferases (GSTs) M1 and T1 detoxify products of oxidative stress and may protect against atherosclerosis and ischemic vascular disease (IVD). We tested the hypothesis that copy number variation (CNV) in GSTM1 and GSTT1 genes, known to be associated with stepwise decreases...

  12. Are violent video games harmful?

    Science.gov (United States)

    Porter, Guy; Starcevic, Vladan

    2007-10-01

    The aim of this paper is to revisit the controversial issue of the association of violent video games and aggressive behaviour. Several lines of evidence suggest that there is a link between exposure to violent video games and aggressive behaviour. However, methodological shortcomings of research conducted so far make several interpretations of this relationship possible. Thus, aggressive behaviour may be a consequence of playing violent video games, an expression of hostile traits that existed before exposure to these games, and/or it may be a result of several possible combinations of these and other factors. Mental health professionals need to be aware of these potentially negative effects of violent video games when assessing patients who present with aggression. There is a need for prospective, long-term studies similar to those evaluating the effects of television and film violence on children and adolescents.

  13. Rheumatoid Arthritis Educational Video Series

    Medline Plus

    Full Text Available ... Arthritis Center since 2000, currently serving as the Nurse Manager. She is a critical member of our patient care ... of Body Weight in Osteoarthritis Educational Videos for ...

  14. Handheld CAT Video Game Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The proposed project is to design, develop and fabricate a handheld video game console for astronauts during long space flight. This portable hardware runs...

  15. Rheumatoid Arthritis Educational Video Series

    Medline Plus

    Full Text Available ... will allow you to take a more active role in your care. The information in these videos ... Arthritis and Health-related Quality of Life Rehabilitation Management for Rheumatoid Arthritis Patients Rehabilitation of Older Adult ...

  16. NEI You Tube Videos: Amblyopia

    Medline Plus

    Full Text Available ... Intern Program Diversity In Vision Research & Ophthalmology (DIVRO) Student Training Programs To search for current job openings visit HHS USAJobs Home > NEI YouTube Videos > ...

  17. Rheumatoid Arthritis Educational Video Series

    Medline Plus

    Full Text Available ... Studies The Camille Julia Morgan Arthritis Research and Education Fund About Us Appointment Information Contact Us Our Faculty Our Staff Rheumatology Specialty Centers You are here: Home / Patient Corner / Patient Webcasts / Rheumatoid Arthritis Educational Video ...

  18. Rheumatoid Arthritis Educational Video Series

    Medline Plus

    Full Text Available ... is Happening to the Joints? Rheumatoid Arthritis: Gaining Control – Working with your Rheumatologist Rheumatoid Arthritis: Additional Conditions ... Hopkins Stategies to Increase your Level of Physical Activity Role of Body Weight in Osteoarthritis Educational Videos ...

  19. VIDEO GAMES AND THE ELDERLY

    National Research Council Canada - National Science Library

    Goldstein, Jeffrey; Cajko, Lara; Oosterbroek, Mark; Michielsen, Moniek; Van Houten, Oscar; Salverda, Femke

    1997-01-01

    This study examined the effects of playing video games (Super Tetris) on the reaction time, cognitive/perceptual adaptability, and emotional well-being of 22 noninstitutionalized elderly people aged 69 to 90...

  20. Rheumatoid Arthritis Educational Video Series

    Medline Plus

    Full Text Available ... to take a more active role in your care. The information in these videos should not take ... She is a critical member of our patient care team. Managing Your Arthritis Managing Your Arthritis Managing ...

  1. Video in foreign language teaching

    Directory of Open Access Journals (Sweden)

    Joe Hambrook

    2013-02-01

    Full Text Available Much of the attention paid to video in foreign language teaching is focused upon a relatively small amount of commercially produced and distributed material. This paper briefly describes the development of this material in the EFLIESL field; looks at some current issues and concerns, and considers future possibilities with particular reference to computer assisted interactive video. Heelwat van die aandag wat video geniet as hulpmiddel by tweedetaalonderrig is toegespits op 'n relatief klein hoeveelheid kommersieel vervaardigde en verspreide materiaal. Hierdie artikel beskryf kortliks die ontwikkeling van bogenoemde materiaal waar dit Engels as tweede of vreemde taal betref. Verder word daar aandag gegee aan huidige tendense en toekomstige moontlikhede word oorweeg, met spesifieke verwysing na rekenaarondersteunde interaktiewe video.

  2. NEI You Tube Videos: Amblyopia

    Medline Plus

    Full Text Available ... and Aging Program African American Program Training and Jobs Fellowships NEI Summer Intern Program Diversity In Vision ... DIVRO) Student Training Programs To search for current job openings visit HHS USAJobs Home > NEI YouTube Videos > ...

  3. Rheumatoid Arthritis Educational Video Series

    Medline Plus

    Full Text Available ... for Patients with Rheumatoid Arthritis Yoga for Arthritis Yoga Poses for Arthritis Patients from Johns Hopkins Stategies to Increase your Level of Physical Activity Role of Body Weight in Osteoarthritis Educational Videos for Patients Rheumatoid ...

  4. Application of EPON Technology in Transmission Line Video Monitoring

    Directory of Open Access Journals (Sweden)

    Xia Zongze

    2015-01-01

    Full Text Available The operating condition of transmission lines directly determines the efficiency of the power system. Therefore, faced with a complex operating environment, it is extremely important to protect transmission line video monitoring. At present, the technology widely used in the power distribution and network communication in domestic power industry is EPON technology. This technology has a broad application prospect on the transmission of electrical circuit video monitoring information. On this basis, this paper carries out a further research on the application of EPON technology in transmission line video monitoring. This paper firstly proposes the design principle of transmission line video monitoring, and on this basis, it carries out a comparative analysis of merits and demerits of different types of EPON networking schemes. In addition, quantification is given for the EPON networking power consumption, so as to obtain a complete EPON combining scheme which is combined with specific examples to validate, and finally realize that the EPON technology has a certain application value because it is in line with various indicators after application in transmission line video monitoring.

  5. Video redaction: a survey and comparison of enabling technologies

    Science.gov (United States)

    Sah, Shagan; Shringi, Ameya; Ptucha, Raymond; Burry, Aaron; Loce, Robert

    2017-09-01

    With the prevalence of video recordings from smart phones, dash cams, body cams, and conventional surveillance cameras, privacy protection has become a major concern, especially in light of legislation such as the Freedom of Information Act. Video redaction is used to obfuscate sensitive and personally identifiable information. Today's typical workflow involves simple detection, tracking, and manual intervention. Automated methods rely on accurate detection mechanisms being paired with robust tracking methods across the video sequence to ensure the redaction of all sensitive information while minimizing spurious obfuscations. Recent studies have explored the use of convolution neural networks and recurrent neural networks for object detection and tracking. The present paper reviews the redaction problem and compares a few state-of-the-art detection, tracking, and obfuscation methods as they relate to redaction. The comparison introduces an evaluation metric that is specific to video redaction performance. The metric can be evaluated in a manner that allows balancing the penalty for false negatives and false positives according to the needs of particular application, thereby assisting in the selection of component methods and their associated hyperparameters such that the redacted video has fewer frames that require manual review.

  6. Query-by-Emoji Video Search

    NARCIS (Netherlands)

    Cappallo, S.; Mensink, T.; Snoek, C.G.M.

    2015-01-01

    This technical demo presents Emoji2Video, a query-by-emoji interface for exploring video collections. Ideogram-based video search and representation presents an opportunity for an intuitive, visual interface and concise non-textual summary of video contents, in a form factor that is ideal for small

  7. How usability is visible in video games

    OpenAIRE

    Saari, M

    2017-01-01

    Abstract As video games have become have become more popular and as popular as music and movies, the need for more video game developers have increased also. But even though there are more people developing video games, there still exists usability issues in video games like also in general computer software. The purpose of the thesis is to find out how usa...

  8. Indexing, Browsing, and Searching of Digital Video.

    Science.gov (United States)

    Smeaton, Alan F.

    2004-01-01

    Presents a literature review that covers the following topics related to indexing, browsing, and searching of digital video: video coding and standards; conventional approaches to accessing digital video; automatically structuring and indexing digital video; searching, browsing, and summarization; measurement and evaluation of the effectiveness of…

  9. In search of video event semantics

    NARCIS (Netherlands)

    Mazloom, M.

    2016-01-01

    In this thesis we aim to represent an event in a video using semantic features. We start from a bank of concept detectors for representing events in video. At first we considered the relevance of concepts to the event inside the video representation. We address the problem of video event

  10. Documenting Laboratory Procedures with Video.

    Science.gov (United States)

    Wyttenbach, Robert A

    2015-01-01

    Demonstrating laboratory procedures in person during class time can be time-consuming. When procedures are done under a microscope, live demonstration is also impractical because of the limited number of students who can view the demonstration at once. Creating videos beforehand, which students can watch before class and review during lab sessions, solves both of these problems. This article suggests ways to make and distribute high quality video of microscopic procedures.

  11. Developing an accessible video player

    Directory of Open Access Journals (Sweden)

    Juan José Rodríguez Soler

    2012-05-01

    Full Text Available Online Channels in financial institutions allows customers with disabilities to access services in a convenient way for them.However, one of the current challenges of this sector is to improve web accessibility and to incorporate technological resources to provide access to multimedia and video content, which has become a new form of internet communication.The present work shows in detail the strategy followed when designing and developing the new video player used by Bankinter for these purposes.

  12. Video i VIA - et udviklingsprojekt

    DEFF Research Database (Denmark)

    Kjærgaard, Hanne Wacher; Jelsbak, Vibe Alopaeus

    2012-01-01

    Tekst- og videorapport over projekt, hvor 15 grupper af undervisere i VIA UC arbejdede med produktion og pædagogisk anvendelse af video i deres undervisning. Forskellige kategorier, anvendelser og respons.......Tekst- og videorapport over projekt, hvor 15 grupper af undervisere i VIA UC arbejdede med produktion og pædagogisk anvendelse af video i deres undervisning. Forskellige kategorier, anvendelser og respons....

  13. Scaffolding With and Through Videos

    DEFF Research Database (Denmark)

    Otrel-Cass, Kathrin; Khoo, Elaine; Cowie, Bronwen

    2012-01-01

    to consider must be expanded. This article explicates theoretical and practical ideas related to teachers’ application of their ICT technology, pedagogy, and content knowledge (TPACK) in science. The article unpacks the social and technological dimensions of teachers’ use of TPACK when they use digital videos...... to scaffold learning. It showcases the intricate interplay between teachers’ knowledge about content, digital video technology, and students’ learning needs based on a qualitative study of two science teachers and their students in a New Zealand primary school....

  14. Initial laboratory evaluation of color video cameras: Phase 2

    Energy Technology Data Exchange (ETDEWEB)

    Terry, P.L.

    1993-07-01

    Sandia National Laboratories has considerable experience with monochrome video cameras used in alarm assessment video systems. Most of these systems, used for perimeter protection, were designed to classify rather than to identify intruders. The monochrome cameras were selected over color cameras because they have greater sensitivity and resolution. There is a growing interest in the identification function of security video systems for both access control and insider protection. Because color camera technology is rapidly changing and because color information is useful for identification purposes, Sandia National Laboratories has established an on-going program to evaluate the newest color solid-state cameras. Phase One of the Sandia program resulted in the SAND91-2579/1 report titled: Initial Laboratory Evaluation of Color Video Cameras. The report briefly discusses imager chips, color cameras, and monitors, describes the camera selection, details traditional test parameters and procedures, and gives the results reached by evaluating 12 cameras. Here, in Phase Two of the report, we tested 6 additional cameras using traditional methods. In addition, all 18 cameras were tested by newly developed methods. This Phase 2 report details those newly developed test parameters and procedures, and evaluates the results.

  15. Considerations when using videos in lamaze classes.

    Science.gov (United States)

    Hotelling, Barbara A

    2012-01-01

    There are enough worthwhile videos available today so that a Lamaze Certified Childbirth Educator could literally teach an entire class series using only videos and feedback discussion. In this column, the author explores considerations in choosing videos for adult learners in Lamaze birth classes. Some things to consider when using videos should be the adult learner's attention span, whether the video increases fear of birth or empowers the learner, and if the video is appropriate for the culture of the class participants. Finally, the author provides a list of some of the many wonderful videos available to Lamaze birth educators.

  16. Medan Video Game Center (High Tech Architecture)

    OpenAIRE

    Roni,

    2014-01-01

    Medan Video Game Center construction is intended to facilitate the people who are enthusiast about video game in Medan. This building also can be a place for organized event – event that is related to video game such as video game exhibition, or video game competition. Besides that, Medan Video Game Center construction also as education place which there is contain a video game academy and vehicle simulator room. The building design use double skin façade concept that highlights the supportin...

  17. Video quality assessment for web content mirroring

    Science.gov (United States)

    He, Ye; Fei, Kevin; Fernandez, Gustavo A.; Delp, Edward J.

    2014-03-01

    Due to the increasing user expectation on watching experience, moving web high quality video streaming content from the small screen in mobile devices to the larger TV screen has become popular. It is crucial to develop video quality metrics to measure the quality change for various devices or network conditions. In this paper, we propose an automated scoring system to quantify user satisfaction. We compare the quality of local videos with the videos transmitted to a TV. Four video quality metrics, namely Image Quality, Rendering Quality, Freeze Time Ratio and Rate of Freeze Events are used to measure video quality change during web content mirroring. To measure image quality and rendering quality, we compare the matched frames between the source video and the destination video using barcode tools. Freeze time ratio and rate of freeze events are measured after extracting video timestamps. Several user studies are conducted to evaluate the impact of each objective video quality metric on the subjective user watching experience.

  18. Searching for videos : the structure of video interaction in the framework of information foraging theory

    NARCIS (Netherlands)

    van Houten, Ynze Abe

    2009-01-01

    Video plays an important role in our highly visual culture, and we are confronted with it constantly. Given the overabundance of video available, the attention of someone searching for video needs to be allocated efficiently among the video sources. Searching for Videos studies how to support

  19. TEM Video Compressive Sensing

    Energy Technology Data Exchange (ETDEWEB)

    Stevens, Andrew; Kovarik, Libor; Abellan, Patricia; Yuan, Xin; Carin, Lawrence; Browning, Nigel D.

    2015-08-01

    One of the main limitations of imaging at high spatial and temporal resolution during in-situ TEM experiments is the frame rate of the camera being used to image the dynamic process. While the recent development of direct detectors has provided the hardware to achieve frame rates approaching 0.1ms, the cameras are expensive and must replace existing detectors. In this paper, we examine the use of coded aperture compressive sensing methods [1, 2, 3, 4] to increase the framerate of any camera with simple, low-cost hardware modifications. The coded aperture approach allows multiple sub-frames to be coded and integrated into a single camera frame during the acquisition process, and then extracted upon readout using statistical compressive sensing inversion. Our simulations show that it should be possible to increase the speed of any camera by at least an order of magnitude. Compressive Sensing (CS) combines sensing and compression in one operation, and thus provides an approach that could further improve the temporal resolution while correspondingly reducing the electron dose rate. Because the signal is measured in a compressive manner, fewer total measurements are required. When applied to TEM video capture, compressive imaging couled improve acquisition speed and reduce the electron dose rate. CS is a recent concept, and has come to the forefront due the seminal work of Candès [5]. Since the publication of Candès, there has been enormous growth in the application of CS and development of CS variants. For electron microscopy applications, the concept of CS has also been recently applied to electron tomography [6], and reduction of electron dose in scanning transmission electron microscopy (STEM) imaging [7]. To demonstrate the applicability of coded aperture CS video reconstruction for atomic level imaging, we simulate compressive sensing on observations of Pd nanoparticles and Ag nanoparticles during exposure to high temperatures and other environmental conditions

  20. Children's Video Games as Interactive Racialization

    OpenAIRE

    Martin, Cathlena

    2008-01-01

    Cathlena Martin explores in her paper "Children's Video Games as Interactive Racialization" selected children's video games. Martin argues that children's video games often act as reinforcement for the games' television and film counterparts and their racializing characteristics and features. In Martin's analysis the video games discussed represent media through which to analyze racial identities and ideologies. In making the case for positive female minority leads in children's video games, ...

  1. Digital video transcoding for transmission and storage

    CERN Document Server

    Sun, Huifang; Chen, Xuemin

    2004-01-01

    Professionals in the video and multimedia industries need a book that explains industry standards for video coding and how to convert the compressed information between standards. Digital Video Transcoding for Transmission and Storage answers this demand while also supplying the theories and principles of video compression and transcoding technologies. Emphasizing digital video transcoding techniques, this book summarizes its content via examples of practical methods for transcoder implementation. It relates almost all of its featured transcoding technologies to practical applications.This vol

  2. 19 CFR 210.55 - Content of service copies.

    Science.gov (United States)

    2010-04-01

    ... Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Temporary Relief § 210.55 Content of service copies. (a) Any... information about each element of the violation alleged in the complaint and the motion to enable each...

  3. Y chromosome TSPY copy numbers and semen quality

    NARCIS (Netherlands)

    Nickkholgh, Bita; Noordam, Michiel J.; Hovingh, Suzanne E.; van Pelt, Ans M. M.; van der Veen, Fulco; Repping, Sjoerd

    2010-01-01

    Objective: To determine whether variation in testis-specific protein Y-encoded (TSPY) gene copy number affects semen quality. Design: Nested case-control study. Setting: University hospital. Patient(s): From a consecutive cohort of 1,016 male partners of subfertile couples, unselected for sperm

  4. Conservatism and "copy-if-better" in chimpanzees (Pan troglodytes).

    Science.gov (United States)

    van Leeuwen, Edwin J C; Call, Josep

    2017-05-01

    Social learning is predicted to evolve in socially living animals provided the learning process is not random but biased by certain socio-ecological factors. One bias of particular interest for the emergence of (cumulative) culture is the tendency to forgo personal behaviour in favour of relatively better variants observed in others, also known as the "copy-if-better" strategy. We investigated whether chimpanzees employ copy-if-better in a simple token-exchange paradigm controlling for individual and random social learning. After being trained on one token-type, subjects were confronted with a conspecific demonstrator who either received the same food reward as the subject (control condition) or a higher value food reward than the subject (test condition) for exchanging another token-type. In general, the chimpanzees persisted in exchanging the token-type they were trained on individually, indicating a form of conservatism consistent with previous studies. However, the chimpanzees were more inclined to copy the demonstrator in the test compared to the control condition, indicating a tendency to employ a copy-if-better strategy. We discuss the validity of our results by considering alternative explanations and relate our findings to the emergence of cumulative culture.

  5. 7 CFR 3601.2 - Public inspection, copying, and indexing.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Public inspection, copying, and indexing. 3601.2 Section 3601.2 Agriculture Regulations of the Department of Agriculture (Continued) NATIONAL AGRICULTURAL... indexing. 5 U.S.C. 552(a)(2) requires that certain materials be made available for public inspection and...

  6. Comparative Copy Number Variation From Whole Genome Sequencing

    NARCIS (Netherlands)

    Janevski, A.; Varadan, V.; Kamalakaran, S.; Banerjee, N.; Dimitrova, D.

    2011-01-01

    Whole genome sequencing enables a high resolution view of the humangenome and enables unique insights into copy number variations in anunprecedented scale. Numerous tools and studies have already been introduced that provide confirmatory and new genomic variability datain individuals and across

  7. 19 CFR 103.4 - Public inspection and copying.

    Science.gov (United States)

    2010-04-01

    ... copying, in a reading room or otherwise, the matters described in paragraphs (a) (1) through (3) of this... frequent basis and are available for purchase at each of the public reading rooms listed in § 103.1, at a.... No matter, described in paragraphs (a) (1) through (3) of this section which is required by this...

  8. Genomic Copy Number Variation in Disorders of Cognitive Development

    Science.gov (United States)

    Morrow, Eric M.

    2010-01-01

    Objective: To highlight recent discoveries in the area of genomic copy number variation in neuropsychiatric disorders including intellectual disability, autism, and schizophrenia. To emphasize new principles emerging from this area, involving the genetic architecture of disease, pathophysiology, and diagnosis. Method: Review of studies published…

  9. From Copy-and-Paste to Trace-and-Learn

    DEFF Research Database (Denmark)

    Klitgård, Ida

    2009-01-01

    of them even use the term ‹copy-and-paste› to illustrate this, suggesting that their perception is closely linked to their use of the internet. This generally one-dimensional perception calls for immediate repair work in the teaching of English academic writing in International Study Programmes...

  10. The role of mutation in genetic copy number variation

    Science.gov (United States)

    Clark, B. K.; Weidner, Jacob; Wabick, Kevin

    2010-03-01

    Until very recently, the standard model of DNA included two genes for each trait. This dated model has given way to a model that includes copies of some genes well in excess of the canonical two. Copy number variations in the human genome play critical roles in causing or aggravating a number of syndromes and diseases while providing increased resistance to others. We explore the role of mutation, crossover, inversion, and reproduction in determining copy number variations in a numerical simulation of a population. The numerical model consists of a population of individuals, where each individual is represented by a single strand of DNA with the same number of genes. Each gene is initially assigned to one of two traits. Fitness of the individual is determined by the two most fit genes for trait one, and trait two genetic material is treated as a reservoir of junk DNA. After a sufficient number of generations, during which the genetic distribution is allowed to reach a steady-state, the mean number of genes per trait and the copy number variation are recorded. Here, we focus on the role of mutation and compare simulation results to theory.

  11. 27 CFR 31.192 - Photographic copies of records.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Photographic copies of records. 31.192 Section 31.192 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS ALCOHOL BEVERAGE DEALERS Records and Reports Retention of...

  12. Estimation of copy number alterations from exome sequencing data.

    Directory of Open Access Journals (Sweden)

    Rafael Valdés-Mas

    Full Text Available Exome sequencing constitutes an important technology for the study of human hereditary diseases and cancer. However, the ability of this approach to identify copy number alterations in primary tumor samples has not been fully addressed. Here we show that somatic copy number alterations can be reliably estimated using exome sequencing data through a strategy that we have termed exome2cnv. Using data from 86 paired normal and primary tumor samples, we identified losses and gains of complete chromosomes or large genomic regions, as well as smaller regions affecting a minimum of one gene. Comparison with high-resolution comparative genomic hybridization (CGH arrays revealed a high sensitivity and a low number of false positives in the copy number estimation between both approaches. We explore the main factors affecting sensitivity and false positives with real data, and provide a side by side comparison with CGH arrays. Together, these results underscore the utility of exome sequencing to study cancer samples by allowing not only the identification of substitutions and indels, but also the accurate estimation of copy number alterations.

  13. Righting the Wrongs of Writing: Copy Editors Speak Out

    Science.gov (United States)

    Alexander, Jaclyn J.; Wall, Judy

    1975-01-01

    The major part of APGA Press production editors' jobs is copy editing manuscripts before they are set in type. Two APGA Press Staff members use specific examples to illustrate the grammatical and stylistic errors that cause problems for them and, if not corrected, for readers. (Author)

  14. 22 CFR 1471.4 - Copies and service.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Copies and service. 1471.4 Section 1471.4 Foreign Relations FOREIGN SERVICE LABOR RELATIONS BOARD; FEDERAL LABOR RELATIONS AUTHORITY; GENERAL COUNSEL OF THE FEDERAL LABOR RELATIONS AUTHORITY; AND THE FOREIGN SERVICE IMPASSE DISPUTES PANEL FOREIGN...

  15. Memorizing and copying visual patterns: a Piagetian interpretation.

    Science.gov (United States)

    Chap, J B; Ross, B M

    1979-06-01

    Six-, 8-, 10-, and 12-year-old children (10 boys and 10 girls) reconstructed two visual patterns from immediate memory, while other 5- and 6-year-old children (10 boys and 10 girls) reconstructed the identical patterns by direct copying. Patterns were simple and composed entirely of circles or squares as component items. Four results were emphasized: (a) Numerous errors mady by the copying groups led to the conclusion that memory loss is often overestimated in young children. Since an independent estimate of perceptual encoding errors is rarely carried out, encoding mistakes are often included among forgetting errors. (b) One pattern was both copied and remembered more poorly than the other in accord with a Piagetian interpretation of a conceptual conflict inherent in the pattern design between spatial and numerical correspondence of component pattern items. (c) A memory strategy emphasizing configuration preservation was suggested for the 6-year-olds who made slightly fewer memory than copying errors for two configural scoring categories. (d) Performance in an unrelated planning-for-memory task significantly differentiated between better and worse performers on the visual pattern memory task.

  16. Copy number variations in affective disorders and meta-analysis

    DEFF Research Database (Denmark)

    Olsen, Line; Hansen, Thomas; Djurovic, Srdjan

    2011-01-01

    In two recent studies 10 copy number variants (CNV) were found to be overrepresented either among patients suffering from affective disorders in an Amish family or in the Wellcome Trust Case-Control Consortium study. Here, we investigate if these variants are associated with affective disorders...

  17. Robust watermarking of video objects for MPEG-4 applications

    Science.gov (United States)

    Bas, Patrick; Boulgouris, Nikolaos V.; Koravos, Filippos D.; Chassery, Jean-Marc; Strintzis, Michael G.; Macq, Benoit M. M.

    2001-12-01

    This paper presents two different watermarking schemes devoted to protect video objects. The first presented scheme performs embedding and detection in the uncompressed domain. It has been developed to enable signature detection after object manipulations such as rotations, translations and VOL modifications. To achieve these requirements, the first scheme exploits the shape of the object using CPA analysis: a random sequence is transformed to fit the scale and the orientation of the object. The detection of the mark is performed applying an inverse transform and calculating a correlation between the random sequence and the transformed object. The second scheme is based on compressed-domain processing of video objects. Two different signals are embedded, one for synchronization recovery and another for copyright protection. Both signals are embedded and detected in the compressed domain. During detection, first synchronization recovery is performed and then the copyright watermark is extracted.

  18. Rate Adaptive Selective Segment Assignment for Reliable Wireless Video Transmission

    Directory of Open Access Journals (Sweden)

    Sajid Nazir

    2012-01-01

    Full Text Available A reliable video communication system is proposed based on data partitioning feature of H.264/AVC, used to create a layered stream, and LT codes for erasure protection. The proposed scheme termed rate adaptive selective segment assignment (RASSA is an adaptive low-complexity solution to varying channel conditions. The comparison of the results of the proposed scheme is also provided for slice-partitioned H.264/AVC data. Simulation results show competitiveness of the proposed scheme compared to optimized unequal and equal error protection solutions. The simulation results also demonstrate that a high visual quality video transmission can be maintained despite the adverse effect of varying channel conditions and the number of decoding failures can be reduced.

  19. Real-time Digital Video Watermark Embedding System based on Software in Commodity PC

    Science.gov (United States)

    Yamada, Takaaki; Echizen, Isao; Tezuka, Satoru; Yoshiura, Hiroshi

    Emerging broadband networks and high performance of PCs provide new business opportunities of the live video streaming services for the Internet users in sport events or in music concerts. Digital watermarking for video helps to protect the copyright of the video content and the real-time processing is an essential requirement. For the small start of new business, it should be achieved by flexible software without special equipments. This paper describes a novel real-time watermarking system implemented on a commodity PC. We propose the system architecture and methods to shorten watermarking time by reusing the estimated watermark imperceptibility among neighboring frames. A prototype system enables real time processing in a series of capturing NTSC signals, watermarking the video, encoding it to MPEG4 in QGVA, 1Mbps, 30fps style and storing the video for 12 hours in maximum

  20. Automated Video Quality Assessment for Deep-Sea Video

    Science.gov (United States)

    Pirenne, B.; Hoeberechts, M.; Kalmbach, A.; Sadhu, T.; Branzan Albu, A.; Glotin, H.; Jeffries, M. A.; Bui, A. O. V.

    2015-12-01

    Video provides a rich source of data for geophysical analysis, often supplying detailed information about the environment when other instruments may not. This is especially true of deep-sea environments, where direct visual observations cannot be made. As computer vision techniques improve and volumes of video data increase, automated video analysis is emerging as a practical alternative to labor-intensive manual analysis. Automated techniques can be much more sensitive to video quality than their manual counterparts, so performing quality assessment before doing full analysis is critical to producing valid results.Ocean Networks Canada (ONC), an initiative of the University of Victoria, operates cabled ocean observatories that supply continuous power and Internet connectivity to a broad suite of subsea instruments from the coast to the deep sea, including video and still cameras. This network of ocean observatories has produced almost 20,000 hours of video (about 38 hours are recorded each day) and an additional 8,000 hours of logs from remotely operated vehicle (ROV) dives. We begin by surveying some ways in which deep-sea video poses challenges for automated analysis, including: 1. Non-uniform lighting: Single, directional, light sources produce uneven luminance distributions and shadows; remotely operated lighting equipment are also susceptible to technical failures. 2. Particulate noise: Turbidity and marine snow are often present in underwater video; particles in the water column can have sharper focus and higher contrast than the objects of interest due to their proximity to the light source and can also influence the camera's autofocus and auto white-balance routines. 3. Color distortion (low contrast): The rate of absorption of light in water varies by wavelength, and is higher overall than in air, altering apparent colors and lowering the contrast of objects at a distance.We also describe measures under development at ONC for detecting and mitigating

  1. Automated analysis and annotation of basketball video

    Science.gov (United States)

    Saur, Drew D.; Tan, Yap-Peng; Kulkarni, Sanjeev R.; Ramadge, Peter J.

    1997-01-01

    Automated analysis and annotation of video sequences are important for digital video libraries, content-based video browsing and data mining projects. A successful video annotation system should provide users with useful video content summary in a reasonable processing time. Given the wide variety of video genres available today, automatically extracting meaningful video content for annotation still remains hard by using current available techniques. However, a wide range video has inherent structure such that some prior knowledge about the video content can be exploited to improve our understanding of the high-level video semantic content. In this paper, we develop tools and techniques for analyzing structured video by using the low-level information available directly from MPEG compressed video. Being able to work directly in the video compressed domain can greatly reduce the processing time and enhance storage efficiency. As a testbed, we have developed a basketball annotation system which combines the low-level information extracted from MPEG stream with the prior knowledge of basketball video structure to provide high level content analysis, annotation and browsing for events such as wide- angle and close-up views, fast breaks, steals, potential shots, number of possessions and possession times. We expect our approach can also be extended to structured video in other domains.

  2. 22 CFR 212.22 - Protection of personal privacy.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying details...

  3. Copy-number and gene dependency analysis reveals partial copy loss of wild-type SF3B1 as a novel cancer vulnerability. | Office of Cancer Genomics

    Science.gov (United States)

    Genomic instability is a hallmark of human cancer, and results in widespread somatic copy number alterations. We used a genome-scale shRNA viability screen in human cancer cell lines to systematically identify genes that are essential in the context of particular copy-number alterations (copy-number associated gene dependencies). The most enriched class of copy-number associated gene dependencies was CYCLOPS (Copy-number alterations Yielding Cancer Liabilities Owing to Partial losS) genes, and spliceosome components were the most prevalent.

  4. Analisis dan Simulasi Video Watermarking Menggunakan Metode Dual Tree Complex Wavelet Transform (DT-CWT dan Singular Value Decomposition (SVD

    Directory of Open Access Journals (Sweden)

    Arina Fadhilah

    2016-08-01

    Full Text Available Video piracy is the act of obtaining, copying, and selling or distributing videos that already had the copyright without the consent of the copyright owner. Watermarking is a process which embeds an additional information in the host video signal so that the embedded watermark cannot be seen and difficult to be erased or altered. Video watermarking in this journal used a mp4 format video and two different watermark images. Host video frames are divided into two equal lots, some of the frames are embedded by watermark image 1, and the others are embedded by watermark images 2. The methods used are Dual-Tree Complex Wavelet Transform (DTCWT and Singular Value Decomposition (SVD. The two watermarks are embedded and extracted in each subband at a depth level 1 to level 4 DTCWT - SVD with the aim of seeking the best subband and the best level for embedding and extracting. In the extraction testing, watermarked video is given several attacks before extraction process. Based on the MOS and PSNR value the DTCWT-SVD level for embedding process is level 4, and based on the MOS and MSE value, the best extraction images are produced from the level 3. The best subband for embedding watermark are the subbands with three parts such as {1,5}{1,1}{1,2} and {1,5}{1,2}{1,2}.

  5. Advantage of using allele-specific copy numbers when testing for association in regions with common copy number variants.

    Directory of Open Access Journals (Sweden)

    Gaëlle Marenne

    Full Text Available Copy number variants (CNV can be called from SNP-arrays; however, few studies have attempted to combine both CNV and SNP calls to test for association with complex diseases. Even when SNPs are located within CNVs, two separate association analyses are necessary, to compare the distribution of bi-allelic genotypes in cases and controls (referred to as SNP-only strategy and the number of copies of a region (referred to as CNV-only strategy. However, when disease susceptibility is actually associated with allele specific copy-number states, the two strategies may not yield comparable results, raising a series of questions about the optimal analytical approach. We performed simulations of the performance of association testing under different scenarios that varied genotype frequencies and inheritance models. We show that the SNP-only strategy lacks power under most scenarios when the SNP is located within a CNV; frequently it is excluded from analysis as it does not pass quality control metrics either because of an increased rate of missing calls or a departure from fitness for Hardy-Weinberg proportion. The CNV-only strategy also lacks power because the association testing depends on the allele which copy number varies. The combined strategy performs well in most of the scenarios. Hence, we advocate the use of this combined strategy when testing for association with SNPs located within CNVs.

  6. Scalable video transmission over Rayleigh fading channels using LDPC codes

    Science.gov (United States)

    Bansal, Manu; Kondi, Lisimachos P.

    2005-03-01

    In this paper, we investigate an important problem of efficiently utilizing the available resources for video transmission over wireless channels while maintaining a good decoded video quality and resilience to channel impairments. Our system consists of the video codec based on 3-D set partitioning in hierarchical trees (3-D SPIHT) algorithm and employs two different schemes using low-density parity check (LDPC) codes for channel error protection. The first method uses the serial concatenation of the constant-rate LDPC code and rate-compatible punctured convolutional (RCPC) codes. Cyclic redundancy check (CRC) is used to detect transmission errors. In the other scheme, we use the product code structure consisting of a constant rate LDPC/CRC code across the rows of the `blocks' of source data and an erasure-correction systematic Reed-Solomon (RS) code as the column code. In both the schemes introduced here, we use fixed-length source packets protected with unequal forward error correction coding ensuring a strictly decreasing protection across the bitstream. A Rayleigh flat-fading channel with additive white Gaussian noise (AWGN) is modeled for the transmission. The rate-distortion optimization algorithm is developed and carried out for the selection of source coding and channel coding rates using Lagrangian optimization. The experimental results demonstrate the effectiveness of this system under different wireless channel conditions and both the proposed methods (LDPC+RCPC/CRC and RS+LDPC/CRC) outperform the more conventional schemes such as those employing RCPC/CRC.

  7. Attacking Automatic Video Analysis Algorithms: A Case Study of Google Cloud Video Intelligence API

    OpenAIRE

    Hosseini, Hossein; Xiao, Baicen; Clark, Andrew; Poovendran, Radha

    2017-01-01

    Due to the growth of video data on Internet, automatic video analysis has gained a lot of attention from academia as well as companies such as Facebook, Twitter and Google. In this paper, we examine the robustness of video analysis algorithms in adversarial settings. Specifically, we propose targeted attacks on two fundamental classes of video analysis algorithms, namely video classification and shot detection. We show that an adversary can subtly manipulate a video in such a way that a human...

  8. Instructional video for teaching venepuncture.

    Science.gov (United States)

    Pan, Michael; Harcharik, Sara; Moskalenko, Marina; Luber, Adam; Bernardo, Sebastian; Levitt, Jacob

    2014-10-01

    Safe venepuncture technique is a critical skill for health care professionals, to avoid accidental occupational injury. This study investigates whether watching an instructional video improves medical students' ability to perform venepuncture safely. This was a randomised, controlled, assessor-blinded trial that evaluated the utility of an instructional video, with the primary outcome of the ability to perform venepuncture safely. Forty-two second-year medical students were recruited and randomised to receive either video instruction (group A, n = 20) or no intervention (group B, n = 22). Prior to the study, all students attended an instructor-led workshop on venepuncture. During the study, students were paired and instructed to perform venepuncture on a partner. Performance was assessed using a points-based checklist. Pre- and post-study surveys were conducted to assess confidence with technique. The mean total checklist score was higher in group A than in group B, with values of 14.15 and 9.18, respectively (p video performed venepuncture more effectively and reported greater confidence with the technique. Medical students can benefit from having access to an instructional video on venepuncture as an adjunct to the standard curriculum. Safe venepuncture technique is a critical skill for health care professionals. © 2014 John Wiley & Sons Ltd.

  9. Probabilistic recognition of human faces from video

    DEFF Research Database (Denmark)

    Zhou, Saohua; Krüger, Volker; Chellappa, Rama

    2003-01-01

    Recognition of human faces using a gallery of still or video images and a probe set of videos is systematically investigated using a probabilistic framework. In still-to-video recognition, where the gallery consists of still images, a time series state space model is proposed to fuse temporal...... demonstrate that, due to the propagation of the identity variable over time, a degeneracy in posterior probability of the identity variable is achieved to give improved recognition. The gallery is generalized to videos in order to realize video-to-video recognition. An exemplar-based learning strategy...... of the identity variable produces the recognition result. The model formulation is very general and it allows a variety of image representations and transformations. Experimental results using videos collected by NIST/USF and CMU illustrate the effectiveness of this approach for both still-to-video and video...

  10. Video databases: automatic retrieval based on content.

    Science.gov (United States)

    Bolle, R. M.; Yeo, B.-L.; Yeung, M.

    Digital video databases are becoming more and more pervasive and finding video of interest in large databases is rapidly becoming a problem. Intelligent means of quick content-based video retrieval and content-based rapid video viewing is, therefore, an important topic of research. Video is a rich source of data, it contains visual and audio information, and in many cases, there is text associated with the video. Content-based video retrieval should use all this information in an efficient and effective way. From a human perspective, a video query can be viewed as an iterated sequence of navigating, searching, browsing, and viewing. This paper addresses video search in terms of these phases.

  11. Video Stabilization Using Feature Point Matching

    Science.gov (United States)

    Kulkarni, Shamsundar; Bormane, D. S.; Nalbalwar, S. L.

    2017-01-01

    Video capturing by non-professionals will lead to unanticipated effects. Such as image distortion, image blurring etc. Hence, many researchers study such drawbacks to enhance the quality of videos. In this paper an algorithm is proposed to stabilize jittery videos. A stable output video will be attained without the effect of jitter which is caused due to shaking of handheld camera during video recording. Firstly, salient points from each frame from the input video is identified and processed followed by optimizing and stabilize the video. Optimization includes the quality of the video stabilization. This method has shown good result in terms of stabilization and it discarded distortion from the output videos recorded in different circumstances.

  12. Mengolah Data Video Analog menjadi Video Digital Sederhana

    Directory of Open Access Journals (Sweden)

    Nick Soedarso

    2010-10-01

    Full Text Available Nowadays, editing technology has entered the digital age. Technology will demonstrate the evidence of processing analog to digital data has become simpler since editing technology has been integrated in the society in all aspects. Understanding the technique of processing analog to digital data is important in producing a video. To utilize this technology, the introduction of equipments is fundamental to understand the features. The next phase is the capturing process that supports the preparation in editing process from scene to scene; therefore, it will become a watchable video.   

  13. Video game addiction: The push to pathologize video games

    DEFF Research Database (Denmark)

    Nielsen, Rune Kristian Lundedal; Ferguson, Christopher; Bean, Anthony

    2017-01-01

    ” is not a stable construct and clinical impairment might be low. Third, pathologizing gaming behavior has fallout beyond the therapeutic setting. In light of continuing controversies, it is argued that the currently proposed categories of video game addiction disorders are premature....... and necessity of the overarching construct. This raises multiple concerns. First, the current approaches to understanding “gaming addiction” are rooted in substance abuse research and approaches do not necessarily translate to media consumption. Second, some research has indicated that “video game addiction...

  14. Mobile Video in Everyday Social Interactions

    Science.gov (United States)

    Reponen, Erika; Lehikoinen, Jaakko; Impiö, Jussi

    Video recording has become a spontaneous everyday activity for many people, thanks to the video capabilities of modern mobile phones. Internet connectivity of mobile phones enables fluent sharing of captured material even real-time, which makes video an up-and-coming everyday interaction medium. In this article we discuss the effect of the video camera in the social environment, everyday life situations, mainly based on a study where four groups of people used digital video cameras in their normal settings. We also reflect on another study of ours, relating to real-time mobile video communication and discuss future views. The aim of our research is to understand the possibilities in the domain of mobile video. Live and delayed sharing seem to have their special characteristics, live video being used as a virtual window between places whereas delayed video usage has more scope for good-quality content. While this novel way of interacting via mobile video enables new social patterns, it also raises new concerns for privacy and trust between participating persons in all roles, largely due to the widely spreading possibilities of videos. Video in a social situation affects cameramen (who record), targets (who are recorded), passers-by (who are unintentionally in the situation), and the audience (who follow the videos or recording situations) but also the other way around, the participants affect the video by their varying and evolving personal and communicational motivations for recording.

  15. Diversity-Aware Multi-Video Summarization

    Science.gov (United States)

    Panda, Rameswar; Mithun, Niluthpol Chowdhury; Roy-Chowdhury, Amit K.

    2017-10-01

    Most video summarization approaches have focused on extracting a summary from a single video; we propose an unsupervised framework for summarizing a collection of videos. We observe that each video in the collection may contain some information that other videos do not have, and thus exploring the underlying complementarity could be beneficial in creating a diverse informative summary. We develop a novel diversity-aware sparse optimization method for multi-video summarization by exploring the complementarity within the videos. Our approach extracts a multi-video summary which is both interesting and representative in describing the whole video collection. To efficiently solve our optimization problem, we develop an alternating minimization algorithm that minimizes the overall objective function with respect to one video at a time while fixing the other videos. Moreover, we introduce a new benchmark dataset, Tour20, that contains 140 videos with multiple human created summaries, which were acquired in a controlled experiment. Finally, by extensive experiments on the new Tour20 dataset and several other multi-view datasets, we show that the proposed approach clearly outperforms the state-of-the-art methods on the two problems-topic-oriented video summarization and multi-view video summarization in a camera network.

  16. Color spaces in digital video

    Energy Technology Data Exchange (ETDEWEB)

    Gaunt, R.

    1997-05-01

    Whether it`s photography, computer graphics, publishing, or video; each medium has a defined color space, or gamut, which defines the extent that a given set of RGB colors can be mixed. When converting from one medium to another, an image must go through some form of conversion which maps colors into the destination color space. The conversion process isn`t always straight forward, easy, or reversible. In video, two common analog composite color spaces are Y`tjv (used in PAL) and Y`IQ (used in NTSC). These two color spaces have been around since the beginning of color television, and are primarily used in video transmission. Another analog scheme used in broadcast studios is Y`, R`-Y`, B`-Y` (used in Betacam and Mll) which is a component format. Y`, R`-Y`,B`-Y` maintains the color information of RGB but in less space. From this, the digital component video specification, ITU-Rec. 601-4 (formerly CCIR Rec. 601) was based. The color space for Rec. 601 is symbolized as Y`CbCr. Digital video formats such as DV, Dl, Digital-S, etc., use Rec. 601 to define their color gamut. Digital composite video (for D2 tape) is digitized analog Y`UV and is seeing decreased use. Because so much information is contained in video, segments of any significant length usually require some form of data compression. All of the above mentioned analog video formats are a means of reducing the bandwidth of RGB video. Video bulk storage devices, such as digital disk recorders, usually store frames in Y`CbCr format, even if no other compression method is used. Computer graphics and computer animations originate in RGB format because RGB must be used to calculate lighting and shadows. But storage of long animations in RGB format is usually cost prohibitive and a 30 frame-per-second data rate of uncompressed RGB is beyond most computers. By taking advantage of certain aspects of the human visual system, true color 24-bit RGB video images can be compressed with minimal loss of visual information

  17. Video Analytics for Business Intelligence

    CERN Document Server

    Porikli, Fatih; Xiang, Tao; Gong, Shaogang

    2012-01-01

    Closed Circuit TeleVision (CCTV) cameras have been increasingly deployed pervasively in public spaces including retail centres and shopping malls. Intelligent video analytics aims to automatically analyze content of massive amount of public space video data and has been one of the most active areas of computer vision research in the last two decades. Current focus of video analytics research has been largely on detecting alarm events and abnormal behaviours for public safety and security applications. However, increasingly CCTV installations have also been exploited for gathering and analyzing business intelligence information, in order to enhance marketing and operational efficiency. For example, in retail environments, surveillance cameras can be utilised to collect statistical information about shopping behaviour and preference for marketing (e.g., how many people entered a shop; how many females/males or which age groups of people showed interests to a particular product; how long did they stay in the sho...

  18. Video streaming into the mainstream.

    Science.gov (United States)

    Garrison, W

    2001-12-01

    Changes in Internet technology are making possible the delivery of a richer mixture of media through data streaming. High-quality, dynamic content, such as video and audio, can be incorporated into Websites simply, flexibly and interactively. Technologies such as G3 mobile communication, ADSL, cable and satellites enable new ways of delivering medical services, information and learning. Systems such as Quicktime, Windows Media and Real Video provide reliable data streams as video-on-demand and users can tailor the experience to their own interests. The Learning Development Centre at the University of Portsmouth have used streaming technologies together with e-learning tools such as dynamic HTML, Flash, 3D objects and online assessment successfully to deliver on-line course content in economics and earth science. The Lifesign project--to develop, catalogue and stream health sciences media for teaching--is described and future medical applications are discussed.

  19. Return of the Vision Video

    DEFF Research Database (Denmark)

    Vistisen, Peter; Poulsen, Søren Bolvig

    2017-01-01

    This paper examines the role of corporate vision videos as a possible setting for participation when exploring the future potentials (and pitfalls) of new technological concepts. We propose that through the recent decade’s rise web 2.0 platforms, and the viral effects of user sharing, the corporate...... vision video of today might take on a significantly different role than before, and act as a participatory design approach. This address the changing landscaping for participatory and user-involved design processes, in the wake of new digital forms of participation, communication and collaboration, which...... have radically changed the possible power dynamics of the production life cycle of new product developments. Through a case study, we pose the question of whether the online engagements around corporate vision videos can be viewed as a form of participation in a design process, and thus revitalize...

  20. Ethnographic Video as Design Specs

    DEFF Research Database (Denmark)

    Buur, Jacob; Fraser, Euan; Oinonen, Soila

    2010-01-01

    Ethnographic video is used extensively in some industrial corporations to document field studies and to convey an understanding of what is 'out there' to HCI designers and developers of new technologies. The basic assumption is that ethnography through questioning the prevailing conceptions...... and recommendations is surely ideal and appropriate in many cases, there are situations, in which a bolder engagement is called for to ensure an impact on the development process. In this paper we explore how video can function to initiate 'requirement specs' discussions rather than just as inspiration or field data....... We investigate how video specs can support an engineering development process, and help set clear limitations for which solutions might work, and which might not, while retaining some of the richness of the field studies....

  1. Video game addiction: Impact on teenagers' lifestyle.

    Science.gov (United States)

    Sharma, Manoj Kumar; Mahindru, Poornima

    2015-01-01

    Use of video games as a leisure-time activity has increased among teenagers. Excessive use of video games is associated with psychosocial dysfunctions in the user's life. Two teenagers came for consultation to our Service for Healthy Use of Technology (SHUT) clinic for management of addiction due to video games. They were assessed using a clinical interview as well as the General Health Questionnaire and Griffith criteria for video games. The cases emphasize the addictive potential of video games and their association with lifestyle changes. Addiction to video games has implications for screening and intervention among teenagers. Copyright 2015, NMJI.

  2. MPEG-4 video compression optimization research

    Science.gov (United States)

    Wei, Xianmin

    2011-10-01

    In order to make a large amount of video data compression and effectively with limited network bandwidth to transfer smoothly, this article using the MPEG-4 compression technology to compress video stream. In the network transmission, according to the characteristics of video stream, for transmission technology to carry out full analysis and optimization, and combining current network bandwidth status and protocol, to establish one network model with transferring and playback video streaming effectively. Through a combination of these two areas, significantly improved compression and storage of video files and network transmission efficiency, increased video processing power.

  3. Two-terminal video coding.

    Science.gov (United States)

    Yang, Yang; Stanković, Vladimir; Xiong, Zixiang; Zhao, Wei

    2009-03-01

    Following recent works on the rate region of the quadratic Gaussian two-terminal source coding problem and limit-approaching code designs, this paper examines multiterminal source coding of two correlated, i.e., stereo, video sequences to save the sum rate over independent coding of both sequences. Two multiterminal video coding schemes are proposed. In the first scheme, the left sequence of the stereo pair is coded by H.264/AVC and used at the joint decoder to facilitate Wyner-Ziv coding of the right video sequence. The first I-frame of the right sequence is successively coded by H.264/AVC Intracoding and Wyner-Ziv coding. An efficient stereo matching algorithm based on loopy belief propagation is then adopted at the decoder to produce pixel-level disparity maps between the corresponding frames of the two decoded video sequences on the fly. Based on the disparity maps, side information for both motion vectors and motion-compensated residual frames of the right sequence are generated at the decoder before Wyner-Ziv encoding. In the second scheme, source splitting is employed on top of classic and Wyner-Ziv coding for compression of both I-frames to allow flexible rate allocation between the two sequences. Experiments with both schemes on stereo video sequences using H.264/AVC, LDPC codes for Slepian-Wolf coding of the motion vectors, and scalar quantization in conjunction with LDPC codes for Wyner-Ziv coding of the residual coefficients give a slightly lower sum rate than separate H.264/AVC coding of both sequences at the same video quality.

  4. Economical Video Monitoring of Traffic

    Science.gov (United States)

    Houser, B. C.; Paine, G.; Rubenstein, L. D.; Parham, O. Bruce, Jr.; Graves, W.; Bradley, C.

    1986-01-01

    Data compression allows video signals to be transmitted economically on telephone circuits. Telephone lines transmit television signals to remote traffic-control center. Lines also carry command signals from center to TV camera and compressor at highway site. Video system with television cameras positioned at critical points on highways allows traffic controllers to determine visually, almost immediately, exact cause of traffic-flow disruption; e.g., accidents, breakdowns, or spills, almost immediately. Controllers can then dispatch appropriate emergency services and alert motorists to minimize traffic backups.

  5. The art of digital video

    CERN Document Server

    Watkinson, John

    2013-01-01

    The industry ""bible"" is back and it's better than ever. The Art of Digital Video has served as the ultimate reference guide for those working with digital video for generations. Now this classic has been revised and re-written by international consultant and industry leader John Watkinson to include important technical updates on this ever-evolving topic. The format has also been improved to include optional sections that provide additional information that you can choose to skip or investigate further, depending on your interests and comfort level with the s

  6. Digital video for the desktop

    CERN Document Server

    Pender, Ken

    1999-01-01

    Practical introduction to creating and editing high quality video on the desktop. Using examples from a variety of video applications, benefit from a professional's experience, step-by-step, through a series of workshops demonstrating a wide variety of techniques. These include producing short films, multimedia and internet presentations, animated graphics and special effects.The opportunities for the independent videomaker have never been greater - make sure you bring your understanding fully up to date with this invaluable guide.No prior knowledge of the technology is assumed, with explanati

  7. Industrial Relevance of Chromosomal Copy Number Variation in Saccharomyces Yeasts

    Science.gov (United States)

    Gorter de Vries, Arthur R.; Pronk, Jack T.

    2017-01-01

    ABSTRACT Chromosomal copy number variation (CCNV) plays a key role in evolution and health of eukaryotes. The unicellular yeast Saccharomyces cerevisiae is an important model for studying the generation, physiological impact, and evolutionary significance of CCNV. Fundamental studies of this yeast have contributed to an extensive set of methods for analyzing and introducing CCNV. Moreover, these studies provided insight into the balance between negative and positive impacts of CCNV in evolutionary contexts. A growing body of evidence indicates that CCNV not only frequently occurs in industrial strains of Saccharomyces yeasts but also is a key contributor to the diversity of industrially relevant traits. This notion is further supported by the frequent involvement of CCNV in industrially relevant traits acquired during evolutionary engineering. This review describes recent developments in genome sequencing and genome editing techniques and discusses how these offer opportunities to unravel contributions of CCNV in industrial Saccharomyces strains as well as to rationally engineer yeast chromosomal copy numbers and karyotypes. PMID:28341679

  8. Copy number variation of KIR genes influences HIV-1 control

    DEFF Research Database (Denmark)

    Pelak, Kimberly; Need, Anna C; Fellay, Jacques

    2011-01-01

    A genome-wide screen for large structural variants showed that a copy number variant (CNV) in the region encoding killer cell immunoglobulin-like receptors (KIR) associates with HIV-1 control as measured by plasma viral load at set point in individuals of European ancestry. This CNV encompasses...... the KIR3DL1-KIR3DS1 locus, encoding receptors that interact with specific HLA-Bw4 molecules to regulate the activation of lymphocyte subsets including natural killer (NK) cells. We quantified the number of copies of KIR3DS1 and KIR3DL1 in a large HIV-1 positive cohort, and showed that an increase in KIR3...... amounts of these activating and inhibitory KIR play a role in regulating the peripheral expansion of highly antiviral KIR3DS1+ NK cells, which may determine differences in HIV-1 control following infection....

  9. HD-CNV: hotspot detector for copy number variants.

    Science.gov (United States)

    Butler, Jenna L; Osborne Locke, Marjorie Elizabeth; Hill, Kathleen A; Daley, Mark

    2013-01-15

    Copy number variants (CNVs) are a major source of genetic variation. Comparing CNVs between samples is important in elucidating their potential effects in a wide variety of biological contexts. HD-CNV (hotspot detector for copy number variants) is a tool for downstream analysis of previously identified CNV regions from multiple samples, and it detects recurrent regions by finding cliques in an interval graph generated from the input. It creates a unique graphical representation of the data, as well as summary spreadsheets and UCSC (University of California, Santa Cruz) Genome Browser track files. The interval graph, when viewed with other software or by automated graph analysis, is useful in identifying genomic regions of interest for further study. HD-CNV is an open source Java code and is freely available, with tutorials and sample data from http://daleylab.org. jcamer7@uwo.ca

  10. Analysis of the Multi-Phase Copying Garbage Collection Algorithm

    Energy Technology Data Exchange (ETDEWEB)

    Podhorszki, Norbert [ORNL

    2009-01-01

    The multi-phase copying garbage collection was designed to avoid the need for large amount of reserved memory usually required for the copying types of garbage collection algorithms. The collection is performed in multiple phases using the available free memory. This paper proves that the number of phases depends on the size of the reserved memory and the ratio of the garbage and accessible objects. The performance of the implemented algorithm is tested in a fine-grained parallel Prolog system. We find that reserving only 10% of memory for garbage collection is sufficient for good performance in practice. Additionally, an improvement of the generic algorithm specifically for the tested parallel Prolog system is described.

  11. What does motor efference copy represent? Evidence from speech production.

    Science.gov (United States)

    Niziolek, Caroline A; Nagarajan, Srikantan S; Houde, John F

    2013-10-09

    How precisely does the brain predict the sensory consequences of our actions? Efference copy is thought to reflect the predicted sensation of self-produced motor acts, such as the auditory feedback heard while speaking. Here, we use magnetoencephalographic imaging (MEG-I) in human speakers to demonstrate that efference copy prediction does not track movement variability across repetitions of the same motor task. Specifically, spoken vowels were less accurately predicted when they were less similar to a speaker's median production, even though the prediction is thought to be based on the very motor commands that generate each vowel. Auditory cortical responses to less prototypical speech productions were less suppressed, resembling responses to speech errors, and were correlated with later corrective movement, suggesting that the suppression may be functionally significant for error correction. The failure of the motor system to accurately predict less prototypical speech productions suggests that the efferent-driven suppression does not reflect a sensory prediction, but a sensory goal.

  12. Nonoverlapping Blocks Based Copy-Move Forgery Detection

    Directory of Open Access Journals (Sweden)

    Yu Sun

    2018-01-01

    Full Text Available In order to solve the problem of high computational complexity in block-based methods for copy-move forgery detection, we divide image into texture part and smooth part to deal with them separately. Keypoints are extracted and matched in texture regions. Instead of using all the overlapping blocks, we use nonoverlapping blocks as candidates in smooth regions. Clustering blocks with similar color into a group can be regarded as a preprocessing operation. To avoid mismatching due to misalignment, we update candidate blocks by registration before projecting them into hash space. In this way, we can reduce computational complexity and improve the accuracy of matching at the same time. Experimental results show that the proposed method achieves better performance via comparing with the state-of-the-art copy-move forgery detection algorithms and exhibits robustness against JPEG compression, rotation, and scaling.

  13. GEAR: genomic enrichment analysis of regional DNA copy number changes.

    Science.gov (United States)

    Kim, Tae-Min; Jung, Yu-Chae; Rhyu, Mun-Gan; Jung, Myeong Ho; Chung, Yeun-Jun

    2008-02-01

    We developed an algorithm named GEAR (genomic enrichment analysis of regional DNA copy number changes) for functional interpretation of genome-wide DNA copy number changes identified by array-based comparative genomic hybridization. GEAR selects two types of chromosomal alterations with potential biological relevance, i.e. recurrent and phenotype-specific alterations. Then it performs functional enrichment analysis using a priori selected functional gene sets to identify primary and clinical genomic signatures. The genomic signatures identified by GEAR represent functionally coordinated genomic changes, which can provide clues on the underlying molecular mechanisms related to the phenotypes of interest. GEAR can help the identification of key molecular functions that are activated or repressed in the tumor genomes leading to the improved understanding on the tumor biology. GEAR software is available with online manual in the website, http://www.systemsbiology.co.kr/GEAR/.

  14. An Evaluation of Video-to-Video Face Verification

    NARCIS (Netherlands)

    Poh, N.; Chan, C.H.; Kittler, J.; Marcel, S.; Mc Cool, C.; Argones Rúa, E.; Alba Castro, J.L.; Villegas, M.; Paredes, R.; Štruc, V.; Pavešić, N.; Salah, A.A.; Fang, H.; Costen, N.

    2010-01-01

    Person recognition using facial features, e.g., mug-shot images, has long been used in identity documents. However, due to the widespread use of web-cams and mobile devices embedded with a camera, it is now possible to realize facial video recognition, rather than resorting to just still images. In

  15. Blink patterns: reading from a computer screen versus hard copy.

    Science.gov (United States)

    Chu, Christina A; Rosenfield, Mark; Portello, Joan K

    2014-03-01

    Many subjects experience ocular and visual symptoms during computer use. Previous studies have reported a reduced blink rate during computer operation and suggested that this may account for some of the symptoms, particularly dry eye. However, these earlier investigations failed to include an appropriate control condition. To determine whether it is computer screen viewing that produces the change in blink rate, the present study compared blink patterns when reading from either a desktop computer monitor or a hard copy printed text under equivalent viewing conditions. Subjects (N = 25) were required to perform a continuous 20-minute reading task from either a desktop computer screen or a printed hard copy page at a viewing distance of 50 cm. Identical text was used in the two sessions, which was matched for size and contrast. Target viewing angle and luminance were similar for the two conditions. Subjects were videotaped during the task to determine their blink rate and amplitude. Immediately after the task, subjects completed a questionnaire regarding ocular symptoms experienced during the trial. Mean blink rates for the computer and hard copy conditions were 14.9 and 13.6 blinks per minute, respectively (p = 0.58). However, a significantly higher percentage of incomplete blinks was observed for the computer condition (7.02 vs. 4.33%; p = 0.02). No significant correlation was found between the symptom score and the percentage of incomplete blinks. When compared with an equivalent hard copy control condition, blink rates were not reduced during computer operation. It is proposed that the previously observed differences in blink rate are more likely to be produced by changes in cognitive demand rather than the method of presentation. However, a higher percentage of incomplete blinks was noted during computer operation, which may have been associated with visual fatigue.

  16. Detecting student copying in a corpus of science laboratory reports

    OpenAIRE

    Atwell, ES; Gent, JP; Medori, JDM; Souter, DC

    2003-01-01

    This case study is an evaluation of generic, general-purpose plagiarism detection systems applied to a specific domain and task: detecting intra-class student copying in a corpus of Biomedical Science laboratory reports. From the outset, our project had the practical, pragmatic aim to find a workable solution to a specific problem. Biomedical Science undergraduates learn experimental methods by working through a series of laboratory experiments and reporting on their results. These laboratory...

  17. Performance evaluation of DNA copy number segmentation methods.

    Science.gov (United States)

    Pierre-Jean, Morgane; Rigaill, Guillem; Neuvial, Pierre

    2015-07-01

    A number of bioinformatic or biostatistical methods are available for analyzing DNA copy number profiles measured from microarray or sequencing technologies. In the absence of rich enough gold standard data sets, the performance of these methods is generally assessed using unrealistic simulation studies, or based on small real data analyses. To make an objective and reproducible performance assessment, we have designed and implemented a framework to generate realistic DNA copy number profiles of cancer samples with known truth. These profiles are generated by resampling publicly available SNP microarray data from genomic regions with known copy-number state. The original data have been extracted from dilutions series of tumor cell lines with matched blood samples at several concentrations. Therefore, the signal-to-noise ratio of the generated profiles can be controlled through the (known) percentage of tumor cells in the sample. This article describes this framework and its application to a comparison study between methods for segmenting DNA copy number profiles from SNP microarrays. This study indicates that no single method is uniformly better than all others. It also helps identifying pros and cons of the compared methods as a function of biologically informative parameters, such as the fraction of tumor cells in the sample and the proportion of heterozygous markers. This comparison study may be reproduced using the open source and cross-platform R package jointseg, which implements the proposed data generation and evaluation framework: http://r-forge.r-project.org/R/?group_id=1562. © The Author 2014. Published by Oxford University Press.

  18. Copy number variants in patients with short stature

    OpenAIRE

    van Duyvenvoorde, Hermine A.; Lui, Julian C.; Kant, Sarina G; Oostdijk, Wilma; Gijsbers, Antoinet CJ; Hoffer, Mariëtte JV; Karperien, Marcel; Walenkamp, Marie JE; Noordam, Cees; Voorhoeve, Paul G; Mericq, Verónica; Alberto M. Pereira; Claahsen-van der Grinten, Hedi L.; van Gool, Sandy A; Breuning, Martijn H

    2013-01-01

    Height is a highly heritable and classic polygenic trait. Recent genome-wide association studies (GWAS) have revealed that at least 180 genetic variants influence adult height. However, these variants explain only about 10% of the phenotypic variation in height. Genetic analysis of short individuals can lead to the discovery of novel rare gene defects with a large effect on growth. In an effort to identify novel genes associated with short stature, genome-wide analysis for copy number variant...

  19. High Resolution Analysis of Copy Number Mutation in Breast Cancer

    Science.gov (United States)

    2005-05-01

    Pon , in Polysaccharides in Medic- copy number at high resolution throughout the other diseases, we must distinguish abnormal inal Applications, S...was determined to in- leles . In all experiments, there were a total of silico from the human genome sequence as- volve an interchromosomal duplication...well (3), although we do not explore that approach here. PON ) = e -pb o#regular( - )#deviated [1] The negative log likelihood function satisfies an

  20. The copying power of one-state tree transducers

    DEFF Research Database (Denmark)

    Engelfriet, Joost; Skyum, Sven

    1982-01-01

    One-state deterministic top-down tree transducers (or, tree homomorphisms) cannot handle “prime copying,” i.e., their class of output (string) languages is not closed under the operation L → {$(w$)f(n) short parallel w ε L, f(n) greater-or-equal, slanted 1}, where f is any integer function whose ......, to the syntax-directed translation of context-free languages, and to the tree transducer hierarchy....

  1. Mapping copy number variation by population-scale genome sequencing

    DEFF Research Database (Denmark)

    Mills, Ryan E.; Walter, Klaudia; Stewart, Chip

    2011-01-01

    , copy number variants) based on whole genome DNA sequencing data from 185 human genomes, integrating evidence from complementary SV discovery approaches with extensive experimental validations. Our map encompassed 22,025 deletions and 6,000 additional SVs, including insertions and tandem duplications...... differences in the size spectra of SVs originating from distinct formation mechanisms, and constructed a map of SV hotspots formed by common mechanisms. Our analytical framework and SV map serves as a resource for sequencing-based association studies....

  2. 36 CFR 1290.6 - Originals and copies.

    Science.gov (United States)

    2010-07-01

    ... production or a reproduction that has been treated as the official record maintained to chronicle government...; (5) In the case of sound and video recordings, the original recording, whenever available (otherwise... Section 1290.6 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION JFK...

  3. Comparison of medical students' learning approaches between electronic and hard copy team-based learning.

    Science.gov (United States)

    Sharaf, Fawzy; Alnohair, Sultan

    2017-01-01

    To compare the students' perception of team-based learning (TBL): The paper (hard copy) compared with the e-copy (electronic copy) in the family medicine course of the fifth year medical students, Qassim University College of Medicine. A cross-sectional study was conducted during the family medicine course in 2015-2016 to compare the hard copy and the e-copy TBL sessions. We used Google drive to distribute, collect and analyze the questionnaire. The results of the e-copy TBL are shown and displayed directly with each session to the students, which was not the same as practiced with hard copy. We used also SPSS (version 17 for Windows) for more statistical analysis. The total number of respondents of students in each was 96; a phase of TBL phase 1 (hard copy) and phase 2 (e-copy). Male were 64 (66.7%) and females 32 (33.3%). The first three knowledge questions showed no difference between the mean score between paper and e-copy TBL, but of the perception questions showed a significant difference between the paper and e-copy TBL. The results of the survey showed that the students prefer e-copy TBL as a course format, as it was an attraction for most of the students and making them even more successful in the key exam and e-copy TBL develop the skills needed to work productively in task-groups.

  4. DATA PROTECTION TECHNOLOGIES IN THE DISTANCE LEARNING SYSTEMS

    Directory of Open Access Journals (Sweden)

    Inna V. Herasymenko

    2015-06-01

    Full Text Available This article focuses on data protection in the support systems of distance learning. Different security tools such as hardware, software, transformation security and organizational protection are considered. There are analyzed key places that require protection and suggested possible options for their protection, such as the use of CAPTCHA for registration, protection for the IP-address and service of copy protection. Testing of the proposed security tools was piloted in terms of e-learning course "Information Technologies of Systems Analysis".

  5. Ubiquitous UAVs: a cloud based framework for storing, accessing and processing huge amount of video footage in an efficient way

    Science.gov (United States)

    Efstathiou, Nectarios; Skitsas, Michael; Psaroudakis, Chrysostomos; Koutras, Nikolaos

    2017-09-01

    Nowadays, video surveillance cameras are used for the protection and monitoring of a huge number of facilities worldwide. An important element in such surveillance systems is the use of aerial video streams originating from onboard sensors located on Unmanned Aerial Vehicles (UAVs). Video surveillance using UAVs represent a vast amount of video to be transmitted, stored, analyzed and visualized in a real-time way. As a result, the introduction and development of systems able to handle huge amount of data become a necessity. In this paper, a new approach for the collection, transmission and storage of aerial videos and metadata is introduced. The objective of this work is twofold. First, the integration of the appropriate equipment in order to capture and transmit real-time video including metadata (i.e. position coordinates, target) from the UAV to the ground and, second, the utilization of the ADITESS Versatile Media Content Management System (VMCMS-GE) for storing of the video stream and the appropriate metadata. Beyond the storage, VMCMS-GE provides other efficient management capabilities such as searching and processing of videos, along with video transcoding. For the evaluation and demonstration of the proposed framework we execute a use case where the surveillance of critical infrastructure and the detection of suspicious activities is performed. Collected video Transcodingis subject of this evaluation as well.

  6. Scattering on plane waves and the double copy

    Science.gov (United States)

    Adamo, Tim; Casali, Eduardo; Mason, Lionel; Nekovar, Stefan

    2018-01-01

    Perturbatively around flat space, the scattering amplitudes of gravity are related to those of Yang–Mills by colour-kinematic duality, under which gravitational amplitudes are obtained as the ‘double copy’ of the corresponding gauge theory amplitudes. We consider the question of how to extend this relationship to curved scattering backgrounds, focusing on certain ‘sandwich’ plane waves. We calculate the 3-point amplitudes on these backgrounds and find that a notion of double copy remains in the presence of background curvature: graviton amplitudes on a gravitational plane wave are the double copy of gluon amplitudes on a gauge field plane wave. This is non-trivial in that it requires a non-local replacement rule for the background fields and the momenta and polarization vectors of the fields scattering on the backgrounds. It must also account for new ‘tail’ terms arising from scattering off the background. These encode a memory effect in the scattering amplitudes, which naturally double copies as well.

  7. Mitochondrial DNA copy number variation across human cancers.

    Science.gov (United States)

    Reznik, Ed; Miller, Martin L; Şenbabaoğlu, Yasin; Riaz, Nadeem; Sarungbam, Judy; Tickoo, Satish K; Al-Ahmadie, Hikmat A; Lee, William; Seshan, Venkatraman E; Hakimi, A Ari; Sander, Chris

    2016-02-22

    Mutations, deletions, and changes in copy number of mitochondrial DNA (mtDNA), are observed throughout cancers. Here, we survey mtDNA copy number variation across 22 tumor types profiled by The Cancer Genome Atlas project. We observe a tendency for some cancers, especially of the bladder, breast, and kidney, to be depleted of mtDNA, relative to matched normal tissue. Analysis of genetic context reveals an association between incidence of several somatic alterations, including IDH1 mutations in gliomas, and mtDNA content. In some but not all cancer types, mtDNA content is correlated with the expression of respiratory genes, and anti-correlated to the expression of immune response and cell-cycle genes. In tandem with immunohistochemical evidence, we find that some tumors may compensate for mtDNA depletion to sustain levels of respiratory proteins. Our results highlight the extent of mtDNA copy number variation in tumors and point to related therapeutic opportunities.

  8. Global variation in copy number in the human genome.

    Science.gov (United States)

    Redon, Richard; Ishikawa, Shumpei; Fitch, Karen R; Feuk, Lars; Perry, George H; Andrews, T Daniel; Fiegler, Heike; Shapero, Michael H; Carson, Andrew R; Chen, Wenwei; Cho, Eun Kyung; Dallaire, Stephanie; Freeman, Jennifer L; González, Juan R; Gratacòs, Mònica; Huang, Jing; Kalaitzopoulos, Dimitrios; Komura, Daisuke; MacDonald, Jeffrey R; Marshall, Christian R; Mei, Rui; Montgomery, Lyndal; Nishimura, Kunihiro; Okamura, Kohji; Shen, Fan; Somerville, Martin J; Tchinda, Joelle; Valsesia, Armand; Woodwark, Cara; Yang, Fengtang; Zhang, Junjun; Zerjal, Tatiana; Zhang, Jane; Armengol, Lluis; Conrad, Donald F; Estivill, Xavier; Tyler-Smith, Chris; Carter, Nigel P; Aburatani, Hiroyuki; Lee, Charles; Jones, Keith W; Scherer, Stephen W; Hurles, Matthew E

    2006-11-23

    Copy number variation (CNV) of DNA sequences is functionally significant but has yet to be fully ascertained. We have constructed a first-generation CNV map of the human genome through the study of 270 individuals from four populations with ancestry in Europe, Africa or Asia (the HapMap collection). DNA from these individuals was screened for CNV using two complementary technologies: single-nucleotide polymorphism (SNP) genotyping arrays, and clone-based comparative genomic hybridization. A total of 1,447 copy number variable regions (CNVRs), which can encompass overlapping or adjacent gains or losses, covering 360 megabases (12% of the genome) were identified in these populations. These CNVRs contained hundreds of genes, disease loci, functional elements and segmental duplications. Notably, the CNVRs encompassed more nucleotide content per genome than SNPs, underscoring the importance of CNV in genetic diversity and evolution. The data obtained delineate linkage disequilibrium patterns for many CNVs, and reveal marked variation in copy number among populations. We also demonstrate the utility of this resource for genetic disease studies.

  9. Genome Architecture and Its Roles in Human Copy Number Variation

    Directory of Open Access Journals (Sweden)

    Lu Chen

    2014-12-01

    Full Text Available Besides single-nucleotide variants in the human genome, large-scale genomic variants, such as copy number variations (CNVs, are being increasingly discovered as a genetic source of human diversity and the pathogenic factors of diseases. Recent experimental findings have shed light on the links between different genome architectures and CNV mutagenesis. In this review, we summarize various genomic features and discuss their contributions to CNV formation. Genomic repeats, including both low-copy and high-copy repeats, play important roles in CNV instability, which was initially known as DNA recombination events. Furthermore, it has been found that human genomic repeats can also induce DNA replication errors and consequently result in CNV mutations. Some recent studies showed that DNA replication timing, which reflects the high-order information of genomic organization, is involved in human CNV mutations. Our review highlights that genome architecture, from DNA sequence to high-order genomic organization, is an important molecular factor in CNV mutagenesis and human genomic instability.

  10. Copy number variation of KIR genes influences HIV-1 control

    DEFF Research Database (Denmark)

    Pelak, Kimberly; Need, Anna C; Fellay, Jacques

    2011-01-01

    A genome-wide screen for large structural variants showed that a copy number variant (CNV) in the region encoding killer cell immunoglobulin-like receptors (KIR) associates with HIV-1 control as measured by plasma viral load at set point in individuals of European ancestry. This CNV encompasses...... the KIR3DL1-KIR3DS1 locus, encoding receptors that interact with specific HLA-Bw4 molecules to regulate the activation of lymphocyte subsets including natural killer (NK) cells. We quantified the number of copies of KIR3DS1 and KIR3DL1 in a large HIV-1 positive cohort, and showed that an increase in KIR3...... individuals with multiple copies of KIR3DL1, in the presence of KIR3DS1 and the appropriate ligands, inhibit HIV-1 replication more robustly, and associated with a significant expansion in the frequency of KIR3DS1+, but not KIR3DL1+, NK cells in their peripheral blood. Our results suggest that the relative...

  11. A Secure and Robust Object-Based Video Authentication System

    Directory of Open Access Journals (Sweden)

    Dajun He

    2004-10-01

    Full Text Available An object-based video authentication system, which combines watermarking, error correction coding (ECC, and digital signature techniques, is presented for protecting the authenticity between video objects and their associated backgrounds. In this system, a set of angular radial transformation (ART coefficients is selected as the feature to represent the video object and the background, respectively. ECC and cryptographic hashing are applied to those selected coefficients to generate the robust authentication watermark. This content-based, semifragile watermark is then embedded into the objects frame by frame before MPEG4 coding. In watermark embedding and extraction, groups of discrete Fourier transform (DFT coefficients are randomly selected, and their energy relationships are employed to hide and extract the watermark. The experimental results demonstrate that our system is robust to MPEG4 compression, object segmentation errors, and some common object-based video processing such as object translation, rotation, and scaling while securely preventing malicious object modifications. The proposed solution can be further incorporated into public key infrastructure (PKI.

  12. Innovative Video Diagnostic Equipment for Material Science

    Science.gov (United States)

    Capuano, G.; Titomanlio, D.; Soellner, W.; Seidel, A.

    2012-01-01

    Materials science experiments under microgravity increasingly rely on advanced optical systems to determine the physical properties of the samples under investigation. This includes video systems with high spatial and temporal resolution. The acquisition, handling, storage and transmission to ground of the resulting video data are very challenging. Since the available downlink data rate is limited, the capability to compress the video data significantly without compromising the data quality is essential. We report on the development of a Digital Video System (DVS) for EML (Electro Magnetic Levitator) which provides real-time video acquisition, high compression using advanced Wavelet algorithms, storage and transmission of a continuous flow of video with different characteristics in terms of image dimensions and frame rates. The DVS is able to operate with the latest generation of high-performance cameras acquiring high resolution video images up to 4Mpixels@60 fps or high frame rate video images up to about 1000 fps@512x512pixels.

  13. Camcorder 101: Buying and Using Video Cameras.

    Science.gov (United States)

    Catron, Louis E.

    1991-01-01

    Lists nine practical applications of camcorders to theater companies and programs. Discusses the purchase of video gear, camcorder features, accessories, the use of the camcorder in the classroom, theater management, student uses, and video production. (PRA)

  14. Intelligent Model for Video Survillance Security System

    Directory of Open Access Journals (Sweden)

    J. Vidhya

    2013-12-01

    Full Text Available Video surveillance system senses and trails out all the threatening issues in the real time environment. It prevents from security threats with the help of visual devices which gather the information related to videos like CCTV’S and IP (Internet Protocol cameras. Video surveillance system has become a key for addressing problems in the public security. They are mostly deployed on the IP based network. So, all the possible security threats exist in the IP based application might also be the threats available for the reliable application which is available for video surveillance. In result, it may increase cybercrime, illegal video access, mishandling videos and so on. Hence, in this paper an intelligent model is used to propose security for video surveillance system which ensures safety and it provides secured access on video.

  15. Special Needs: Planning for Adulthood (Videos)

    Medline Plus

    Full Text Available ... Special Needs: Planning for Adulthood (Video) KidsHealth > For Parents > Special Needs: Planning for Adulthood (Video) Print A A A Young adults with special needs have many programs, services, and ...

  16. Video Surveillance: Privacy Issues and Legal Compliance

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.

    2015-01-01

    Pervasive usage of video surveillance is rapidly increasing in developed countries. Continuous security threats to public safety demand use of such systems. Contemporary video surveillance systems offer advanced functionalities which threaten the privacy of those recorded in the video....... There is a need to balance the usage of video surveillance against its negative impact on privacy. This chapter aims to highlight the privacy issues in video surveillance and provides a model to help identify the privacy requirements in a video surveillance system. The authors make a step in the direction...... of investigating the existing legal infrastructure for ensuring privacy in video surveillance and suggest guidelines in order to help those who want to deploy video surveillance while least compromising the privacy of people and complying with legal infrastructure....

  17. Electronic Eye: Streaming Video On-Demand.

    Science.gov (United States)

    Meulen, Kathleen

    2002-01-01

    Discusses the use of on-demand streaming video in school libraries. Explains how streaming works, considers advantages and technical issues, and describes products from three companies that are pioneering streaming in the educational video market. (LRW)

  18. Music Videos: The Look of the Sound

    Science.gov (United States)

    Aufderheide, Pat

    1986-01-01

    Asserts that music videos, rooted in mass marketing culture, are reshaping the language of advertising, affecting the flow of information. Raises question about the society that creates and receives music videos. (MS)

  19. Celiac Family Health Education Video Series

    Medline Plus

    Full Text Available ... Program Growth and Nutrition Program Celiac Disease Program | Videos Contact the Celiac Disease Program 1-617-355- ... live happy and productive lives. Each of our video segments provides practical information about celiac disease from ...

  20. Special Needs: Planning for Adulthood (Videos)

    Medline Plus

    Full Text Available ... Search English Español Special Needs: Planning for Adulthood (Video) KidsHealth / For Parents / Special Needs: Planning for Adulthood (Video) Print Young adults with special needs have many ...