WorldWideScience

Sample records for video copy protection

  1. Video copy protection and detection framework (VPD) for e-learning systems

    Science.gov (United States)

    ZandI, Babak; Doustarmoghaddam, Danial; Pour, Mahsa R.

    2013-03-01

    This Article reviews and compares the copyright issues related to the digital video files, which can be categorized as contended based and Digital watermarking copy Detection. Then we describe how to protect a digital video by using a special Video data hiding method and algorithm. We also discuss how to detect the copy right of the file, Based on expounding Direction of the technology of the video copy detection, and Combining with the own research results, brings forward a new video protection and copy detection approach in terms of plagiarism and e-learning systems using the video data hiding technology. Finally we introduce a framework for Video protection and detection in e-learning systems (VPD Framework).

  2. Robust Adaptable Video Copy Detection

    DEFF Research Database (Denmark)

    Assent, Ira; Kremer, Hardy

    2009-01-01

    in contrast). Our query processing combines filtering and indexing structures for efficient multistep computation of video copies under this model. We show that our model successfully identifies altered video copies and does so more reliably than existing models.......Video copy detection should be capable of identifying video copies subject to alterations e.g. in video contrast or frame rates. We propose a video copy detection scheme that allows for adaptable detection of videos that are altered temporally (e.g. frame rate change) and/or visually (e.g. change...

  3. Small Vocabulary with Saliency Matching for Video Copy Detection

    DEFF Research Database (Denmark)

    Ren, Huamin; Moeslund, Thomas B.; Tang, Sheng

    2013-01-01

    The importance of copy detection has led to a substantial amount of research in recent years, among which Bag of visual Words (BoW) plays an important role due to its ability to effectively handling occlusion and some minor transformations. One crucial issue in BoW approaches is the size of vocab......The importance of copy detection has led to a substantial amount of research in recent years, among which Bag of visual Words (BoW) plays an important role due to its ability to effectively handling occlusion and some minor transformations. One crucial issue in BoW approaches is the size...... matching algorithm based on salient visual words selection. More specifically, the variation of visual words across a given video are represented as trajectories and those containing locally asymptotically stable points are selected as salient visual words. Then we attempt to measure the similarity of two...... videos through saliency matching merely based on the selected salient visual words to remove false positives. Our experiments show that a small codebook with saliency matching is quite competitive in video copy detection. With the incorporation of the proposed saliency matching, the precision can...

  4. 'What is Worth Copying is Worth Protecting'

    DEFF Research Database (Denmark)

    Teilmann-Lock, Stina

    2012-01-01

    A Danish Supreme Court decision from 1907 (U.07.619) - involving a classic Royal Porcelain coffee pot designed by Arnold Krogh - affirmed that there was no protection under Danish copyright law for a work of applied art. The following year the Danish Government changed the copyright act......, and the Danish design industry has since enjoyed legal protection. This chapter is a study of the ways in which Danish courts have, over the past hundred years, interpreted copyright law so as to extend legal protection to radical and experimental design objects, unimagined in 1908....

  5. Detection and localization of copy-paste forgeries in digital videos.

    Science.gov (United States)

    Singh, Raahat Devender; Aggarwal, Naveen

    2017-12-01

    Amidst the continual march of technology, we find ourselves relying on digital videos to proffer visual evidence in several highly sensitive areas such as journalism, politics, civil and criminal litigation, and military and intelligence operations. However, despite being an indispensable source of information with high evidentiary value, digital videos are also extremely vulnerable to conscious manipulations. Therefore, in a situation where dependence on video evidence is unavoidable, it becomes crucial to authenticate the contents of this evidence before accepting them as an accurate depiction of reality. Digital videos can suffer from several kinds of manipulations, but perhaps, one of the most consequential forgeries is copy-paste forgery, which involves insertion/removal of objects into/from video frames. Copy-paste forgeries alter the information presented by the video scene, which has a direct effect on our basic understanding of what that scene represents, and so, from a forensic standpoint, the challenge of detecting such forgeries is especially significant. In this paper, we propose a sensor pattern noise based copy-paste detection scheme, which is an improved and forensically stronger version of an existing noise-residue based technique. We also study a demosaicing artifact based image forensic scheme to estimate the extent of its viability in the domain of video forensics. Furthermore, we suggest a simplistic clustering technique for the detection of copy-paste forgeries, and determine if it possess the capabilities desired of a viable and efficacious video forensic scheme. Finally, we validate these schemes on a set of realistically tampered MJPEG, MPEG-2, MPEG-4, and H.264/AVC encoded videos in a diverse experimental set-up by varying the strength of post-production re-compressions and transcodings, bitrates, and sizes of the tampered regions. Such an experimental set-up is representative of a neutral testing platform and simulates a real

  6. A comprehensive Software Copy Protection and Digital Rights Management platform

    Directory of Open Access Journals (Sweden)

    Ayman Mohammad Bahaa-Eldin

    2014-09-01

    Full Text Available This article proposes a Powerful and Flexible System for Software Copy Protection (SCP and Digital Rights Management (DRM based on Public Key Infrastructure (PKI standards. Software protection is achieved through a multi-phase methodology with both static and dynamic processing of the executable file. The system defeats most of the attacks and cracking techniques and makes sure that the protected software is never in a flat form, with a suitable portion of it always being encrypted during execution. A novel performance-tuning algorithm is proposed to lower the overhead of the protection process to its minimum depending on the software dynamic execution behavior. All system calls to access resources and objects such as files, and input/output devices are intercepted and encapsulated with secure rights management code to enforce the required license model. The system can be integrated with hardware authentication techniques (like dongles, and to Internet based activation and DRM servers over the cloud. The system is flexible to apply any model of licensing including state-based license such as expiration dates and number of trials. The usage of a standard markup language (XrML to describe the license makes it easier to apply new licensing operations like re-sale and content rental.

  7. Towards a Video Passive Content Fingerprinting Method for Partial-Copy Detection Robust against Non-Simulated Attacks.

    Directory of Open Access Journals (Sweden)

    Zobeida Jezabel Guzman-Zavaleta

    Full Text Available Passive content fingerprinting is widely used for video content identification and monitoring. However, many challenges remain unsolved especially for partial-copies detection. The main challenge is to find the right balance between the computational cost of fingerprint extraction and fingerprint dimension, without compromising detection performance against various attacks (robustness. Fast video detection performance is desirable in several modern applications, for instance, in those where video detection involves the use of large video databases or in applications requiring real-time video detection of partial copies, a process whose difficulty increases when videos suffer severe transformations. In this context, conventional fingerprinting methods are not fully suitable to cope with the attacks and transformations mentioned before, either because the robustness of these methods is not enough or because their execution time is very high, where the time bottleneck is commonly found in the fingerprint extraction and matching operations. Motivated by these issues, in this work we propose a content fingerprinting method based on the extraction of a set of independent binary global and local fingerprints. Although these features are robust against common video transformations, their combination is more discriminant against severe video transformations such as signal processing attacks, geometric transformations and temporal and spatial desynchronization. Additionally, we use an efficient multilevel filtering system accelerating the processes of fingerprint extraction and matching. This multilevel filtering system helps to rapidly identify potential similar video copies upon which the fingerprint process is carried out only, thus saving computational time. We tested with datasets of real copied videos, and the results show how our method outperforms state-of-the-art methods regarding detection scores. Furthermore, the granularity of our method makes

  8. A chaotic stream cipher and the usage in video protection

    International Nuclear Information System (INIS)

    Lian Shiguo; Sun Jinsheng; Wang Jinwei; Wang Zhiquan

    2007-01-01

    In this paper, a chaotic stream cipher is constructed and used to encrypt video data selectively. The stream cipher based on a discrete piecewise linear chaotic map satisfies the security requirement of cipher design. The video encryption scheme based on the stream cipher is secure in perception, efficient and format compliant, which is suitable for practical video protection. The video encryption scheme's performances prove the stream cipher's practicability

  9. Copy Protection in Jet Set Willy: developing methodology for retrogame archaeology

    Directory of Open Access Journals (Sweden)

    John Aycock

    2017-04-01

    Full Text Available Video games, and more generally computer games, are unquestionably technological artefacts that have cultural significance. Old computer games in particular had to function under technical constraints that would be alien to many modern programmers, while at the same time providing something novel and at first foreign to consumers. How did their creators accomplish their technical feats, and what impact did that have for the player-consumer? The study of 'retro' computer games' implementation is one topic within the nascent area of archaeogaming. Digital rights management (DRM continues to be a major issue in the protection and distribution of content in electronic form. In this article, we study an early example of the implementation of copy protection in the 1984 game Jet Set Willy, something that comprises both physical and digital artefacts. It acts as a vehicle to illustrate a number of methods that we used to understand game implementation, culminating in a full reconstruction of the technique. The methods we cover include: 'traditional' research, along with its limitations in this context; code and data analysis; hypothesis testing; reconstruction. Through this positivist experimental approach, our results are both independently verifiable and repeatable. We also approach the complex context of early DRM, its hacks and workarounds by the player community, and what precipitated the design choices made for this particular game.

  10. A Reusable Software Copy Protection Using Hash Result and Asymetrical Encryption

    Directory of Open Access Journals (Sweden)

    Aswin Wibisurya

    2014-12-01

    Full Text Available Desktop application is one of the most popular types of application being used in computer due to the one time install simplicity and the quick accessibility from the moment the computer being turned on. Limitation of the copy and usage of desktop applications has long been an important issue to application providers. For security concerns, software copy protection is usually integrated with the application. However, developers seek to reuse the copy protection component of the software. This paper proposes an approach of reusable software copy protection which consists of a certificate validator on the client computer and a certificate generator on the server. The certificate validator integrity is protected using hashing result while all communications are encrypted using asymmetrical encryption to ensure the security of this approach.

  11. Advanced digital video surveillance for safeguard and physical protection

    International Nuclear Information System (INIS)

    Kumar, R.

    2002-01-01

    Full text: Video surveillance is a very crucial component in safeguard and physical protection. Digital technology has revolutionized the surveillance scenario and brought in various new capabilities like better image quality, faster search and retrieval of video images, less storage space for recording, efficient transmission and storage of video, better protection of recorded video images, and easy remote accesses to live and recorded video etc. The basic safeguard requirement for verifiably uninterrupted surveillance has remained largely unchanged since its inception. However, changes to the inspection paradigm to admit automated review and remote monitoring have dramatically increased the demands on safeguard surveillance system. Today's safeguard systems can incorporate intelligent motion detection with very low rate of false alarm and less archiving volume, embedded image processing capability for object behavior and event based indexing, object recognition, efficient querying and report generation etc. It also demands cryptographically authenticating, encrypted, and highly compressed video data for efficient, secure, tamper indicating and transmission. In physical protection, intelligent on robust video motion detection, real time moving object detection and tracking from stationary and moving camera platform, multi-camera cooperative tracking, activity detection and recognition, human motion analysis etc. is going to play a key rote in perimeter security. Incorporation of front and video imagery exploitation tools like automatic number plate recognition, vehicle identification and classification, vehicle undercarriage inspection, face recognition, iris recognition and other biometric tools, gesture recognition etc. makes personnel and vehicle access control robust and foolproof. Innovative digital image enhancement techniques coupled with novel sensor design makes low cost, omni-directional vision capable, all weather, day night surveillance a reality

  12. Video Waterscrambling: Towards a Video Protection Scheme Based on the Disturbance of Motion Vectors

    Science.gov (United States)

    Bodo, Yann; Laurent, Nathalie; Laurent, Christophe; Dugelay, Jean-Luc

    2004-12-01

    With the popularity of high-bandwidth modems and peer-to-peer networks, the contents of videos must be highly protected from piracy. Traditionally, the models utilized to protect this kind of content are scrambling and watermarking. While the former protects the content against eavesdropping (a priori protection), the latter aims at providing a protection against illegal mass distribution (a posteriori protection). Today, researchers agree that both models must be used conjointly to reach a sufficient level of security. However, scrambling works generally by encryption resulting in an unintelligible content for the end-user. At the moment, some applications (such as e-commerce) may require a slight degradation of content so that the user has an idea of the content before buying it. In this paper, we propose a new video protection model, called waterscrambling, whose aim is to give such a quality degradation-based security model. This model works in the compressed domain and disturbs the motion vectors, degrading the video quality. It also allows embedding of a classical invisible watermark enabling protection against mass distribution. In fact, our model can be seen as an intermediary solution to scrambling and watermarking.

  13. Video Waterscrambling: Towards a Video Protection Scheme Based on the Disturbance of Motion Vectors

    Directory of Open Access Journals (Sweden)

    Yann Bodo

    2004-10-01

    Full Text Available With the popularity of high-bandwidth modems and peer-to-peer networks, the contents of videos must be highly protected from piracy. Traditionally, the models utilized to protect this kind of content are scrambling and watermarking. While the former protects the content against eavesdropping (a priori protection, the latter aims at providing a protection against illegal mass distribution (a posteriori protection. Today, researchers agree that both models must be used conjointly to reach a sufficient level of security. However, scrambling works generally by encryption resulting in an unintelligible content for the end-user. At the moment, some applications (such as e-commerce may require a slight degradation of content so that the user has an idea of the content before buying it. In this paper, we propose a new video protection model, called waterscrambling, whose aim is to give such a quality degradation-based security model. This model works in the compressed domain and disturbs the motion vectors, degrading the video quality. It also allows embedding of a classical invisible watermark enabling protection against mass distribution. In fact, our model can be seen as an intermediary solution to scrambling and watermarking.

  14. 36 CFR 1256.100 - What is the copying policy for USIA audiovisual records that either have copyright protection or...

    Science.gov (United States)

    2010-07-01

    ... for USIA audiovisual records that either have copyright protection or contain copyrighted material... Distribution of United States Information Agency Audiovisual Materials in the National Archives of the United States § 1256.100 What is the copying policy for USIA audiovisual records that either have copyright...

  15. Streaming Video Games: Copyright Infringement or Protected Speech?

    Directory of Open Access Journals (Sweden)

    Eirik Evert Elias Jungar

    2016-12-01

    Full Text Available Streaming video games, that is, live broadcasting playing video games on the internet, is incredibly popular. Millions tune into twitch.tv daily to watch eSport tournaments, their favourite streamer, and chat with other viewers. But all is not rosy in the world of streaming games. Recently, some game developers have aggressively exercised their copyright to, firstly, claim part of the streamers’ revenue, and secondly, control the context in which their game is shown. The article analyzes whether game developers have, and should have, such rights under EU copyright law. Reaching the conclusion that video game streams infringe the game developer’s right to communicate their works to the public, I argue that freedom of expression can and should be used to rein in their rights in certain cases. Subjecting the lawfulness of streams to game developers’ good will risks stifling the expressions of streamers. The streamers, their audience, and even the copyright holders, would be worse off for it.

  16. Candid camera : video surveillance system can help protect assets

    Energy Technology Data Exchange (ETDEWEB)

    Harrison, L.

    2009-11-15

    By combining closed-circuit cameras with sophisticated video analytics to create video sensors for use in remote areas, Calgary-based IntelliView Technologies Inc.'s explosion-proof video surveillance system can help the oil and gas sector monitor its assets. This article discussed the benefits, features, and applications of IntelliView's technology. Some of the benefits include a reduced need for on-site security and operating personnel and its patented analytics product known as the SmrtDVR, where the camera's images are stored. The technology can be used in temperatures as cold as minus 50 degrees Celsius and as high as 50 degrees Celsius. The product was commercialized in 2006 when it was used by Nexen Inc. It was concluded that false alarms set off by natural occurrences such as rain, snow, glare and shadows were a huge problem with analytics in the past, but that problem has been solved by IntelliView, which has its own source code, and re-programmed code. 1 fig.

  17. Protected information system for center of storing electronic copies of the criminal cases

    Directory of Open Access Journals (Sweden)

    A. V. Yanusko

    2011-03-01

    Full Text Available The article is devoted to describe of an security information complex, which realised in accordance to architecture of Unified infotelecommunication system of Russian ministry of internal affairs. Major attention focuses on the requirements for the technological realization of a trusted communication session, providing access to protected information resources.

  18. Use of remote video auditing to validate Ebola level II personal protective equipment competency.

    Science.gov (United States)

    Allar, Peter J; Frank-Cooper, Madalyn

    2015-06-01

    Faced with an Ebola-related mandate to regularly train frontline hospital staff with the donning and doffing of personal protective equipment, a community hospital's emergency department implemented remote video auditing (RVA) to assist in the training and remediation of its nursing staff. RVA was found to be useful in assessing performance and facilitating remediation. Copyright 2015, SLACK Incorporated.

  19. The ASDEX upgrade digital video processing system for real-time machine protection

    Energy Technology Data Exchange (ETDEWEB)

    Drube, Reinhard, E-mail: reinhard.drube@ipp.mpg.de [Max-Planck-Institut für Plasmaphysik, EURATOM Association, Boltzmannstr. 2, 85748 Garching (Germany); Neu, Gregor [Max-Planck-Institut für Plasmaphysik, EURATOM Association, Boltzmannstr. 2, 85748 Garching (Germany); Cole, Richard H.; Lüddecke, Klaus [Unlimited Computer Systems GmbH, Seeshaupterstr. 15, 82393 Iffeldorf (Germany); Lunt, Tilmann; Herrmann, Albrecht [Max-Planck-Institut für Plasmaphysik, EURATOM Association, Boltzmannstr. 2, 85748 Garching (Germany)

    2013-11-15

    Highlights: • We present the Real-Time Video diagnostic system of ASDEX Upgrade. • We show the implemented image processing algorithms for machine protection. • The way to achieve a robust operating multi-threading Real-Time system is described. -- Abstract: This paper describes the design, implementation, and operation of the Video Real-Time (VRT) diagnostic system of the ASDEX Upgrade plasma experiment and its integration with the ASDEX Upgrade Discharge Control System (DCS). Hot spots produced by heating systems erroneously or accidentally hitting the vessel walls, or from objects in the vessel reaching into the plasma outer border, show up as bright areas in the videos during and after the reaction. A system to prevent damage to the machine by allowing for intervention in a running discharge of the experiment was proposed and implemented. The VRT was implemented on a multi-core real-time Linux system. Up to 16 analog video channels (color and b/w) are acquired and multiple regions of interest (ROI) are processed on each video frame. Detected critical states can be used to initiate appropriate reactions – e.g. gracefully terminate the discharge. The system has been in routine operation since 2007.

  20. Optimal erasure protection for scalably compressed video streams with limited retransmission.

    Science.gov (United States)

    Taubman, David; Thie, Johnson

    2005-08-01

    This paper shows how the priority encoding transmission (PET) framework may be leveraged to exploit both unequal error protection and limited retransmission for RD-optimized delivery of streaming media. Previous work on scalable media protection with PET has largely ignored the possibility of retransmission. Conversely, the PET framework has not been harnessed by the substantial body of previous work on RD optimized hybrid forward error correction/automatic repeat request schemes. We limit our attention to sources which can be modeled as independently compressed frames (e.g., video frames), where each element in the scalable representation of each frame can be transmitted in one or both of two transmission slots. An optimization algorithm determines the level of protection which should be assigned to each element in each slot, subject to transmission bandwidth constraints. To balance the protection assigned to elements which are being transmitted for the first time with those which are being retransmitted, the proposed algorithm formulates a collection of hypotheses concerning its own behavior in future transmission slots. We show how the PET framework allows for a decoupled optimization algorithm with only modest complexity. Experimental results obtained with Motion JPEG2000 compressed video demonstrate that substantial performance benefits can be obtained using the proposed framework.

  1. Original Copies

    DEFF Research Database (Denmark)

    Sørensen, Tim Flohr

    2013-01-01

    of similarity by looking at artefactual similarity as the results of prototyping and as a production of simulacra. In this light, the concept of copying turns out to be more than simply a matter of trying to imitate an exotic or prestigious original, and it fundamentally raises the question how different a copy...

  2. Error-Resilient Unequal Error Protection of Fine Granularity Scalable Video Bitstreams

    Science.gov (United States)

    Cai, Hua; Zeng, Bing; Shen, Guobin; Xiong, Zixiang; Li, Shipeng

    2006-12-01

    This paper deals with the optimal packet loss protection issue for streaming the fine granularity scalable (FGS) video bitstreams over IP networks. Unlike many other existing protection schemes, we develop an error-resilient unequal error protection (ER-UEP) method that adds redundant information optimally for loss protection and, at the same time, cancels completely the dependency among bitstream after loss recovery. In our ER-UEP method, the FGS enhancement-layer bitstream is first packetized into a group of independent and scalable data packets. Parity packets, which are also scalable, are then generated. Unequal protection is finally achieved by properly shaping the data packets and the parity packets. We present an algorithm that can optimally allocate the rate budget between data packets and parity packets, together with several simplified versions that have lower complexity. Compared with conventional UEP schemes that suffer from bit contamination (caused by the bit dependency within a bitstream), our method guarantees successful decoding of all received bits, thus leading to strong error-resilience (at any fixed channel bandwidth) and high robustness (under varying and/or unclean channel conditions).

  3. Copy Counts

    Science.gov (United States)

    Beaumont, Lee R.

    1970-01-01

    The level of difficulty of straight copy, which is used to measure typewriting speed, is influenced by syllable intensity (the average number of syllables per word), stroke intensity (average number of strokes per word), and high-frequency words. (CH)

  4. VIDEO SURVEILLANCE: STANDPOINT OF THE EU AND NATIONAL LEGISLATION ON DATA PROTECTION

    Directory of Open Access Journals (Sweden)

    Claudia CLIZA

    2018-05-01

    Full Text Available Regulation (EU 2016/679 of the European Parliament and of the Council of April 27th, 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95/46/EC (“GDPR” entails a series of major changes in the field personal data protection. The new developments mainly concern the introduction of data protection controller, of specific rights of data subject, such as: the right to be forgotten and the right to data portability, as well as special provisions on minors. Notwithstanding, certain items seem at first sight to be left untreated by G.D.P.R., which is not true! GDPR applies to all data processing operations, even if not all of these are expressly regulated. One of these personal data modalities is represented by the video surveillance. Despite not expressly regulated by G.DP.R., this is one of the most commonly used means of personal data processing. The particular importance of this subject is given by the potential issues that may occur when the captured images clearly disclose the identity of a person, so that they lead to the unique identification of the data subject. In this case, the issue that arises is whether the processed data would somehow fall under the scope of special data, such as biometric data.

  5. Unequal Protection of Video Streaming through Adaptive Modulation with a Trizone Buffer over Bluetooth Enhanced Data Rate

    Directory of Open Access Journals (Sweden)

    Razavi Rouzbeh

    2008-01-01

    Full Text Available Abstract Bluetooth enhanced data rate wireless channel can support higher-quality video streams compared to previous versions of Bluetooth. Packet loss when transmitting compressed data has an effect on the delivered video quality that endures over multiple frames. To reduce the impact of radio frequency noise and interference, this paper proposes adaptive modulation based on content type at the video frame level and content importance at the macroblock level. Because the bit rate of protected data is reduced, the paper proposes buffer management to reduce the risk of buffer overflow. A trizone buffer is introduced, with a varying unequal protection policy in each zone. Application of this policy together with adaptive modulation results in up to 4 dB improvement in objective video quality compared to fixed rate scheme for an additive white Gaussian noise channel and around 10 dB for a Gilbert-Elliott channel. The paper also reports a consistent improvement in video quality over a scheme that adapts to channel conditions by varying the data rate without accounting for the video frame packet type or buffer congestion.

  6. Unequal Protection of Video Streaming through Adaptive Modulation with a Trizone Buffer over Bluetooth Enhanced Data Rate

    Directory of Open Access Journals (Sweden)

    Rouzbeh Razavi

    2007-12-01

    Full Text Available Bluetooth enhanced data rate wireless channel can support higher-quality video streams compared to previous versions of Bluetooth. Packet loss when transmitting compressed data has an effect on the delivered video quality that endures over multiple frames. To reduce the impact of radio frequency noise and interference, this paper proposes adaptive modulation based on content type at the video frame level and content importance at the macroblock level. Because the bit rate of protected data is reduced, the paper proposes buffer management to reduce the risk of buffer overflow. A trizone buffer is introduced, with a varying unequal protection policy in each zone. Application of this policy together with adaptive modulation results in up to 4 dB improvement in objective video quality compared to fixed rate scheme for an additive white Gaussian noise channel and around 10 dB for a Gilbert-Elliott channel. The paper also reports a consistent improvement in video quality over a scheme that adapts to channel conditions by varying the data rate without accounting for the video frame packet type or buffer congestion.

  7. Comprehensive Protection of Data-Partitioned Video for Broadband Wireless IPTV Streaming

    Directory of Open Access Journals (Sweden)

    Laith Al-Jobouri

    2012-01-01

    Full Text Available This paper examines the threat to video streaming from slow and fast fading, traffic congestion, and channel packet drops. The proposed response is a combination of: rateless channel coding, which is adaptively applied; data-partitioned source coding to exploit prioritized packetization; and duplicate slice provision, which is the focus of the evaluation in this paper. The paper also considers the distribution of intra-refresh macroblocks as a means of avoiding sudden data rate increases. When error bursts occur, this paper shows that duplicate slices are certainly necessary but this provision is more effective for medium quality video than it is for high quality video. The percentage of intra-refresh macroblocks can be low and still reduce the impact of temporal error propagation.

  8. Gauge field copies

    International Nuclear Information System (INIS)

    Bollini, C.G.; Giambiagi, J.J.; Tiomno, J.

    1979-01-01

    The construction of field strength copies without any gauge constraint is discussed. Several examples are given, one of which is not only a field strength copy but also (at the same time) a 'current copy'. (author) [pt

  9. Scaling up Copy Detection

    OpenAIRE

    Li, Xian; Dong, Xin Luna; Lyons, Kenneth B.; Meng, Weiyi; Srivastava, Divesh

    2015-01-01

    Recent research shows that copying is prevalent for Deep-Web data and considering copying can significantly improve truth finding from conflicting values. However, existing copy detection techniques do not scale for large sizes and numbers of data sources, so truth finding can be slowed down by one to two orders of magnitude compared with the corresponding techniques that do not consider copying. In this paper, we study {\\em how to improve scalability of copy detection on structured data}. Ou...

  10. Re-thinking copyright through the copy in Russia

    NARCIS (Netherlands)

    Sezneva, O.

    2013-01-01

    How one copy of a film or a single is made illegal, while its identical twin is treated as legitimate? By drawing from the material collected in Russia on the illegal copying and distribution of video and musical contents, this paper moves beyond the definition of media piracy in legal terms, and

  11. Quantum copying: A review

    Directory of Open Access Journals (Sweden)

    Mark Hillery

    2000-07-01

    Full Text Available Quantum information is stored in two-level quantum systems known as qubits. The no-cloning theorem states that the state of an unknown qubit cannot be copied. This is in contrast to classical information which can be copied. If one drops the requirement that the copies be perfect it is possible to design quantum copiers. This paper presents a short review of the theory of quantum copying.

  12. 40 CFR 265.53 - Copies of contingency plan.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Copies of contingency plan. 265.53... DISPOSAL FACILITIES Contingency Plan and Emergency Procedures § 265.53 Copies of contingency plan. A copy of the contingency plan and all revisions to the plan must be: (a) Maintained at the facility; and (b...

  13. 40 CFR 264.53 - Copies of contingency plan.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Copies of contingency plan. 264.53... Contingency Plan and Emergency Procedures § 264.53 Copies of contingency plan. A copy of the contingency plan... called upon to provide emergency services. [Comment: The contingency plan must be submitted to the...

  14. Fingerprint multicast in secure video streaming.

    Science.gov (United States)

    Zhao, H Vicky; Liu, K J Ray

    2006-01-01

    Digital fingerprinting is an emerging technology to protect multimedia content from illegal redistribution, where each distributed copy is labeled with unique identification information. In video streaming, huge amount of data have to be transmitted to a large number of users under stringent latency constraints, so the bandwidth-efficient distribution of uniquely fingerprinted copies is crucial. This paper investigates the secure multicast of anticollusion fingerprinted video in streaming applications and analyzes their performance. We first propose a general fingerprint multicast scheme that can be used with most spread spectrum embedding-based multimedia fingerprinting systems. To further improve the bandwidth efficiency, we explore the special structure of the fingerprint design and propose a joint fingerprint design and distribution scheme. From our simulations, the two proposed schemes can reduce the bandwidth requirement by 48% to 87%, depending on the number of users, the characteristics of video sequences, and the network and computation constraints. We also show that under the constraint that all colluders have the same probability of detection, the embedded fingerprints in the two schemes have approximately the same collusion resistance. Finally, we propose a fingerprint drift compensation scheme to improve the quality of the reconstructed sequences at the decoder's side without introducing extra communication overhead.

  15. The Art of Copying

    DEFF Research Database (Denmark)

    Christensen, Hans Dam

    2017-01-01

    This article discusses copies within the field of art museums by way of mapping strategies for copy practices. This mapping leans heavily towards parts of the writings of Jacques Derrida (1930–2004). Against the backdrop of this theoretical premise, the article distinguishes five main strategies....... An informational copy is just as unique as an original object of art, and at the same time, it defines the original and is itself defined by this opposition. Lastly, the strategy for the imagined relation between original and copy follows. This strategy is dependent upon several of the previous approaches, and...

  16. Video-Based Learning vs Traditional Lecture for Instructing Emergency Medicine Residents in Disaster Medicine Principles of Mass Triage, Decontamination, and Personal Protective Equipment.

    Science.gov (United States)

    Curtis, Henry A; Trang, Karen; Chason, Kevin W; Biddinger, Paul D

    2018-02-01

    Introduction Great demands have been placed on disaster medicine educators. There is a need to develop innovative methods to educate Emergency Physicians in the ever-expanding body of disaster medicine knowledge. The authors sought to demonstrate that video-based learning (VBL) could be a promising alternative to traditional learning methods for teaching disaster medicine core competencies. Hypothesis/Problem The objective was to compare VBL to traditional lecture (TL) for instructing Emergency Medicine residents in the American College of Emergency Physicians (ACEP; Irving, Texas USA) disaster medicine core competencies of patient triage and decontamination. A randomized, controlled pilot study compared two methods of instruction for mass triage, decontamination, and personal protective equipment (PPE). Emergency Medicine resident learning was measured with a knowledge quiz, a Likert scale measuring comfort, and a practical exercise. An independent samples t-test compared the scoring of the VBL with the TL group. Twenty-six residents were randomized to VBL (n=13) or TL (n=13). Knowledge score improvement following video (14.9%) versus lecture (14.1%) did not differ significantly between the groups (P=.74). Comfort score improvement also did not differ (P=.64) between video (18.3%) and lecture groups (15.8%). In the practical skills assessment, the VBL group outperformed the TL group overall (70.4% vs 55.5%; Plearning vs traditional lecture for instructing emergency medicine residents in disaster medicine principles of mass triage, decontamination, and personal protective equipment. Prehosp Disaster Med. 2018;33(1):7-12.

  17. "Dear Teacher, Johnny Copied."

    Science.gov (United States)

    Jackson, Louise A.; And Others

    1987-01-01

    Presents the problem of intentional or unintentional plagiarism on the part of young students, several possible causes for it, and offers ways teachers can help students avoid copying and understand the value of owning one's writing. (JC)

  18. Hard Copy Market Overview

    Science.gov (United States)

    Testan, Peter R.

    1987-04-01

    A number of Color Hard Copy (CHC) market drivers are currently indicating strong growth in the use of CHC technologies for the business graphics marketplace. These market drivers relate to product, software, color monitors and color copiers. The use of color in business graphics allows more information to be relayed than is normally the case in a monochrome format. The communicative powers of full-color computer generated output in the business graphics application area will continue to induce end users to desire and require color in their future applications. A number of color hard copy technologies will be utilized in the presentation graphics arena. Thermal transfer, ink jet, photographic and electrophotographic technologies are all expected to be utilized in the business graphics presentation application area in the future. Since the end of 1984, the availability of color application software packages has grown significantly. Sales revenue generated by business graphics software is expected to grow at a compound annual growth rate of just over 40 percent to 1990. Increased availability of packages to allow the integration of text and graphics is expected. Currently, the latest versions of page description languages such as Postscript, Interpress and DDL all support color output. The use of color monitors will also drive the demand for color hard copy in the business graphics market place. The availability of higher resolution screens is allowing color monitors to be easily used for both text and graphics applications in the office environment. During 1987, the sales of color monitors are expected to surpass the sales of monochrome monitors. Another major color hard copy market driver will be the color copier. In order to take advantage of the communications power of computer generated color output, multiple copies are required for distribution. Product introductions of a new generation of color copiers is now underway with additional introductions expected

  19. Copies, Concepts and Time

    Directory of Open Access Journals (Sweden)

    Anne Eriksen

    2017-09-01

    Full Text Available Copies are defined by their relation to an original. The understanding and evaluation of this relationship has been changing over time. A main argument of this article is that originals and copies are phenomena with no "natural" or essential meaning outside of their specific historical settings. The idea to be explored is how changing historicity regimes have transformed notions of originals and copies over time and how these differences also are reflected in the intrinsically temporal relation between the two concepts. The discussion will be framed by two theory sets. The first is Alexander Nagel and Christopher Woods investigation of two kinds of temporality that vied for dominance in works of art in the late Middle Ages and the Renaissance. The second is Walter Benjamins discussion of artwork in the "age of mechanical reproduction", i.e. the twentieth century. The second half of the article seeks to add to the historical complexity described by both theory sets by introducing a concept of tradition and discussing the early modern ideals of exemplarity, emulation and copiousness.

  20. Dashboard Videos

    Science.gov (United States)

    Gleue, Alan D.; Depcik, Chris; Peltier, Ted

    2012-01-01

    Last school year, I had a web link emailed to me entitled "A Dashboard Physics Lesson." The link, created and posted by Dale Basier on his "Lab Out Loud" blog, illustrates video of a car's speedometer synchronized with video of the road. These two separate video streams are compiled into one video that students can watch and analyze. After seeing…

  1. Copy-writing Post-Soviet Russia. Viktor Pelevin's work in Postcolonial Terms

    NARCIS (Netherlands)

    Noordenbos, Boris; Brouwer, S

    2008-01-01

    The copywriters and creatives in Viktor Pelevin's novel Generation "II" (1999) both 'copy' and 'write' Russian identity. Through advertising texts, video scripts, and written scenario's for Russia's stage-set democracy, the commercial elite makes Russia into a superficial and virtual copy of 'the

  2. Unselective Overimitators: The Evolutionary Implications of Children's Indiscriminate Copying of Successful and Prestigious Models

    Science.gov (United States)

    Chudek, Maciej; Baron, Andrew S.; Birch, Susan

    2016-01-01

    Children are both shrewd about whom to copy--they selectively learn from certain adults--and overimitators--they copy adults' obviously superfluous actions. Is overimitation also selective? Does selectivity change with age? In two experiments, 161 two- to seven-year-old children saw videos of one adult receiving better payoffs or more bystander…

  3. Video microblogging

    DEFF Research Database (Denmark)

    Bornoe, Nis; Barkhuus, Louise

    2010-01-01

    Microblogging is a recently popular phenomenon and with the increasing trend for video cameras to be built into mobile phones, a new type of microblogging has entered the arena of electronic communication: video microblogging. In this study we examine video microblogging, which is the broadcasting...... of short videos. A series of semi-structured interviews offers an understanding of why and how video microblogging is used and what the users post and broadcast....

  4. Video demystified

    CERN Document Server

    Jack, Keith

    2004-01-01

    This international bestseller and essential reference is the "bible" for digital video engineers and programmers worldwide. This is by far the most informative analog and digital video reference available, includes the hottest new trends and cutting-edge developments in the field. Video Demystified, Fourth Edition is a "one stop" reference guide for the various digital video technologies. The fourth edition is completely updated with all new chapters on MPEG-4, H.264, SDTV/HDTV, ATSC/DVB, and Streaming Video (Video over DSL, Ethernet, etc.), as well as discussions of the latest standards throughout. The accompanying CD-ROM is updated to include a unique set of video test files in the newest formats. *This essential reference is the "bible" for digital video engineers and programmers worldwide *Contains all new chapters on MPEG-4, H.264, SDTV/HDTV, ATSC/DVB, and Streaming Video *Completely revised with all the latest and most up-to-date industry standards.

  5. Video pedagogy

    OpenAIRE

    Länsitie, Janne; Stevenson, Blair; Männistö, Riku; Karjalainen, Tommi; Karjalainen, Asko

    2016-01-01

    The short film is an introduction to the concept of video pedagogy. The five categories of video pedagogy further elaborate how videos can be used as a part of instruction and learning process. Most pedagogical videos represent more than one category. A video itself doesn’t necessarily define the category – the ways in which the video is used as a part of pedagogical script are more defining factors. What five categories did you find? Did you agree with the categories, or are more...

  6. Video games: good, bad, or other?

    Science.gov (United States)

    Prot, Sara; McDonald, Katelyn A; Anderson, Craig A; Gentile, Douglas A

    2012-06-01

    Video games are a pervasive pastime among children and adolescents. The growing popularity of video games has instigated a debate among parents, researchers, video game producers, and policymakers concerning potential harmful and helpful effects of video games on children. This article provides an overview of research findings on the positive and negative effects of video games, thus providing an empirical answer to the question, are video games good or bad? The article also provides some guidelines to help pediatricians, parents, and other caregivers protect children from negative effects and to maximize positive effects of video games. Copyright © 2012 Elsevier Inc. All rights reserved.

  7. A near infra-red video system as a protective diagnostic for electron cyclotron resonance heating operation in the Wendelstein 7-X stellarator

    Energy Technology Data Exchange (ETDEWEB)

    Preynas, M.; Laqua, H. P.; Marsen, S.; Reintrog, A. [Max-Planck-Institut für Plasmaphysik (IPP), D-17491 Greifswald (Germany); Corre, Y.; Moncada, V.; Travere, J.-M. [IRFM, CEA-Cadarache, 13108 Saint Paul lez Durance Cedex (France)

    2015-11-15

    The Wendelstein 7-X stellarator is a large nuclear fusion device based at Max-Planck-Institut für Plasmaphysik in Greifswald in Germany. The main plasma heating system for steady state operation in W7-X is electron cyclotron resonance heating (ECRH). During operation, part of plama facing components will be directly heated by the non-absorbed power of 1 MW rf beams of ECRH. In order to avoid damages of such components made of graphite tiles during the first operational phase, a near infra-red video system has been developed as a protective diagnostic for safe and secure ECRH operation. Both the mechanical design housing the camera and the optical system are very flexible and respect the requirements of steady state operation. The full system including data acquisition and control system has been successfully tested in the vacuum vessel, including on-line visualization and data storage of the four cameras equipping the ECRH equatorial launchers of W7-X.

  8. Immersive video

    Science.gov (United States)

    Moezzi, Saied; Katkere, Arun L.; Jain, Ramesh C.

    1996-03-01

    Interactive video and television viewers should have the power to control their viewing position. To make this a reality, we introduce the concept of Immersive Video, which employs computer vision and computer graphics technologies to provide remote users a sense of complete immersion when viewing an event. Immersive Video uses multiple videos of an event, captured from different perspectives, to generate a full 3D digital video of that event. That is accomplished by assimilating important information from each video stream into a comprehensive, dynamic, 3D model of the environment. Using this 3D digital video, interactive viewers can then move around the remote environment and observe the events taking place from any desired perspective. Our Immersive Video System currently provides interactive viewing and `walkthrus' of staged karate demonstrations, basketball games, dance performances, and typical campus scenes. In its full realization, Immersive Video will be a paradigm shift in visual communication which will revolutionize television and video media, and become an integral part of future telepresence and virtual reality systems.

  9. Market Development of Video Games : Video game markets and marketing

    OpenAIRE

    Pu, Jun

    2010-01-01

    This diploma work focus on analysing the markets and marketing of video game industry. After the research of this study, I found out that console game markets are growing dramatically in the recent years. On the other hand, PC game markets (excluding online game markets) are growing slowly due to the problem of illegal copies. So my study will then focus on the development of console game markets and marketing. A new concept called Three Parties is introduced in chapter 5 to help ...

  10. ENERGY STAR Certified Audio Video

    Data.gov (United States)

    U.S. Environmental Protection Agency — Certified models meet all ENERGY STAR requirements as listed in the Version 3.0 ENERGY STAR Program Requirements for Audio Video Equipment that are effective as of...

  11. Video games

    OpenAIRE

    Kolář, Vojtěch

    2012-01-01

    This thesis is based on a detailed analysis of various topics related to the question of whether video games can be art. In the first place it analyzes the current academic discussion on this subject and confronts different opinions of both supporters and objectors of the idea, that video games can be a full-fledged art form. The second point of this paper is to analyze the properties, that are inherent to video games, in order to find the reason, why cultural elite considers video games as i...

  12. 40 CFR 267.53 - Who must have copies of the contingency plan?

    Science.gov (United States)

    2010-07-01

    ... contingency plan? 267.53 Section 267.53 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED... UNDER A STANDARDIZED PERMIT Contingency Plan and Emergency Procedures § 267.53 Who must have copies of the contingency plan? (a) You must maintain a copy of the plan with all revisions at the facility; and...

  13. Robust Watermarking of Video Streams

    Directory of Open Access Journals (Sweden)

    T. Polyák

    2006-01-01

    Full Text Available In the past few years there has been an explosion in the use of digital video data. Many people have personal computers at home, and with the help of the Internet users can easily share video files on their computer. This makes possible the unauthorized use of digital media, and without adequate protection systems the authors and distributors have no means to prevent it.Digital watermarking techniques can help these systems to be more effective by embedding secret data right into the video stream. This makes minor changes in the frames of the video, but these changes are almost imperceptible to the human visual system. The embedded information can involve copyright data, access control etc. A robust watermark is resistant to various distortions of the video, so it cannot be removed without affecting the quality of the host medium. In this paper I propose a video watermarking scheme that fulfills the requirements of a robust watermark. 

  14. Akademisk video

    DEFF Research Database (Denmark)

    Frølunde, Lisbeth

    2017-01-01

    Dette kapitel har fokus på metodiske problemstillinger, der opstår i forhold til at bruge (digital) video i forbindelse med forskningskommunikation, ikke mindst online. Video har længe været benyttet i forskningen til dataindsamling og forskningskommunikation. Med digitaliseringen og internettet ...

  15. A laboratory evaluation of color video monitors

    International Nuclear Information System (INIS)

    Terry, P.L.

    1993-07-01

    Sandia National Laboratories has considerable experience with monochrome video monitors used in alarm assessment video systems. Most of these systems, used for perimeter protection, were designed to classify rather than to identify intruders. There is a growing interest in the identification function of security video systems for both access control and insider protection. Because color video technology is rapidly changing and because color information is useful for identification purposes, Sandia National Laboratories established a program to evaluate the newest relevant color video equipment. This report documents the evaluation of an integral component, color monitors. It briefly discusses a critical parameter, dynamic range, details test procedures, and evaluates the results

  16. A laboratory evaluation of color video monitors

    Energy Technology Data Exchange (ETDEWEB)

    Terry, P.L.

    1993-07-01

    Sandia National Laboratories has considerable experience with monochrome video monitors used in alarm assessment video systems. Most of these systems, used for perimeter protection, were designed to classify rather than to identify intruders. There is a growing interest in the identification function of security video systems for both access control and insider protection. Because color video technology is rapidly changing and because color information is useful for identification purposes, Sandia National Laboratories established a program to evaluate the newest relevant color video equipment. This report documents the evaluation of an integral component, color monitors. It briefly discusses a critical parameter, dynamic range, details test procedures, and evaluates the results.

  17. Video Podcasts

    DEFF Research Database (Denmark)

    Nortvig, Anne Mette; Sørensen, Birgitte Holm

    2016-01-01

    This project’s aim was to support and facilitate master’s students’ preparation and collaboration by making video podcasts of short lectures available on YouTube prior to students’ first face-to-face seminar. The empirical material stems from group interviews, from statistical data created through...... YouTube analytics and from surveys answered by students after the seminar. The project sought to explore how video podcasts support learning and reflection online and how students use and reflect on the integration of online activities in the videos. Findings showed that students engaged actively...

  18. Video games.

    Science.gov (United States)

    Funk, Jeanne B

    2005-06-01

    The video game industry insists that it is doing everything possible to provide information about the content of games so that parents can make informed choices; however, surveys indicate that ratings may not reflect consumer views of the nature of the content. This article describes some of the currently popular video games, as well as developments that are on the horizon, and discusses the status of research on the positive and negative impacts of playing video games. Recommendations are made to help parents ensure that children play games that are consistent with their values.

  19. Video Comparator

    International Nuclear Information System (INIS)

    Rose, R.P.

    1978-01-01

    The Video Comparator is a comparative gage that uses electronic images from two sources, a standard and an unknown. Two matched video cameras are used to obtain the electronic images. The video signals are mixed and displayed on a single video receiver (CRT). The video system is manufactured by ITP of Chatsworth, CA and is a Tele-Microscope II, Model 148. One of the cameras is mounted on a toolmaker's microscope stand and produces a 250X image of a cast. The other camera is mounted on a stand and produces an image of a 250X template. The two video images are mixed in a control box provided by ITP and displayed on a CRT. The template or the cast can be moved to align the desired features. Vertical reference lines are provided on the CRT, and a feature on the cast can be aligned with a line on the CRT screen. The stage containing the casts can be moved using a Boeckleler micrometer equipped with a digital readout, and a second feature aligned with the reference line and the distance moved obtained from the digital display

  20. The Hegemony of the Copy

    DEFF Research Database (Denmark)

    Graulund, Rune

    2017-01-01

    This essay questions when the creative process leading tothe original can be said to be complete. When does the series of a pupil’sbotched attempts at perfection leading to “the” singular and unique object,text, tool, or artwork we recognise as the original expression of themaster craftsman stop......? Where is the cut-off point between the differentversions (copies) of earlier inferior iterations in the gestation process thatlead to the original, and final, superior original? This essay chiefly examinesthe manner in which text has been copied and stored in one particulartype of object, namely...... that of the book, in order to provide some fairlywell-known arguments regarding pre-mechanical as well as mechanical reproduction.In particular, it examines the differences between manuscriptculture and print culture as we see them expressed in the production (andreproduction) of master copies and subsequent...

  1. Video Golf

    Science.gov (United States)

    1995-01-01

    George Nauck of ENCORE!!! invented and markets the Advanced Range Performance (ARPM) Video Golf System for measuring the result of a golf swing. After Nauck requested their assistance, Marshall Space Flight Center scientists suggested video and image processing/computing technology, and provided leads on commercial companies that dealt with the pertinent technologies. Nauck contracted with Applied Research Inc. to develop a prototype. The system employs an elevated camera, which sits behind the tee and follows the flight of the ball down range, catching the point of impact and subsequent roll. Instant replay of the video on a PC monitor at the tee allows measurement of the carry and roll. The unit measures distance and deviation from the target line, as well as distance from the target when one is selected. The information serves as an immediate basis for making adjustments or as a record of skill level progress for golfers.

  2. Video conferencing made easy

    Science.gov (United States)

    Larsen, D. Gail; Schwieder, Paul R.

    1993-02-01

    Network video conferencing is advancing rapidly throughout the nation, and the Idaho National Engineering Laboratory (INEL), a Department of Energy (DOE) facility, is at the forefront of the development. Engineers at INEL/EG&G designed and installed a very unique DOE videoconferencing system, offering many outstanding features, that include true multipoint conferencing, user-friendly design and operation with no full-time operators required, and the potential for cost effective expansion of the system. One area where INEL/EG&G engineers made a significant contribution to video conferencing was in the development of effective, user-friendly, end station driven scheduling software. A PC at each user site is used to schedule conferences via a windows package. This software interface provides information to the users concerning conference availability, scheduling, initiation, and termination. The menus are 'mouse' controlled. Once a conference is scheduled, a workstation at the hubs monitors the network to initiate all scheduled conferences. No active operator participation is required once a user schedules a conference through the local PC; the workstation automatically initiates and terminates the conference as scheduled. As each conference is scheduled, hard copy notification is also printed at each participating site. Video conferencing is the wave of the future. The use of these user-friendly systems will save millions in lost productivity and travel cost throughout the nation. The ease of operation and conference scheduling will play a key role on the extent industry uses this new technology. The INEL/EG&G has developed a prototype scheduling system for both commercial and federal government use.

  3. Video conferencing made easy

    Science.gov (United States)

    Larsen, D. Gail; Schwieder, Paul R.

    1993-01-01

    Network video conferencing is advancing rapidly throughout the nation, and the Idaho National Engineering Laboratory (INEL), a Department of Energy (DOE) facility, is at the forefront of the development. Engineers at INEL/EG&G designed and installed a very unique DOE videoconferencing system, offering many outstanding features, that include true multipoint conferencing, user-friendly design and operation with no full-time operators required, and the potential for cost effective expansion of the system. One area where INEL/EG&G engineers made a significant contribution to video conferencing was in the development of effective, user-friendly, end station driven scheduling software. A PC at each user site is used to schedule conferences via a windows package. This software interface provides information to the users concerning conference availability, scheduling, initiation, and termination. The menus are 'mouse' controlled. Once a conference is scheduled, a workstation at the hubs monitors the network to initiate all scheduled conferences. No active operator participation is required once a user schedules a conference through the local PC; the workstation automatically initiates and terminates the conference as scheduled. As each conference is scheduled, hard copy notification is also printed at each participating site. Video conferencing is the wave of the future. The use of these user-friendly systems will save millions in lost productivity and travel cost throughout the nation. The ease of operation and conference scheduling will play a key role on the extent industry uses this new technology. The INEL/EG&G has developed a prototype scheduling system for both commercial and federal government use.

  4. OAS :: Videos

    Science.gov (United States)

    subscriptions Videos Photos Live Webcast Social Media Facebook @oasofficial Facebook Twitter @oas_official Audios Photos Social Media Facebook Twitter Newsletters Press and Communications Department Contact us at Rights Actions against Corruption C Children Civil Registry Civil Society Contact Us Culture Cyber

  5. Protective

    Directory of Open Access Journals (Sweden)

    Wessam M. Abdel-Wahab

    2013-10-01

    Full Text Available Many active ingredients extracted from herbal and medicinal plants are extensively studied for their beneficial effects. Antioxidant activity and free radical scavenging properties of thymoquinone (TQ have been reported. The present study evaluated the possible protective effects of TQ against the toxicity and oxidative stress of sodium fluoride (NaF in the liver of rats. Rats were divided into four groups, the first group served as the control group and was administered distilled water whereas the NaF group received NaF orally at a dose of 10 mg/kg for 4 weeks, TQ group was administered TQ orally at a dose of 10 mg/kg for 5 weeks, and the NaF-TQ group was first given TQ for 1 week and was secondly administered 10 mg/kg/day NaF in association with 10 mg/kg TQ for 4 weeks. Rats intoxicated with NaF showed a significant increase in lipid peroxidation whereas the level of reduced glutathione (GSH and the activity of superoxide dismutase (SOD, catalase (CAT, glutathione S-transferase (GST and glutathione peroxidase (GPx were reduced in hepatic tissues. The proper functioning of the liver was also disrupted as indicated by alterations in the measured liver function indices and biochemical parameters. TQ supplementation counteracted the NaF-induced hepatotoxicity probably due to its strong antioxidant activity. In conclusion, the results obtained clearly indicated the role of oxidative stress in the induction of NaF toxicity and suggested hepatoprotective effects of TQ against the toxicity of fluoride compounds.

  6. Copying and learning in testing

    DEFF Research Database (Denmark)

    Nielsen, Mie Femø; Caglio, Agnese

    2015-01-01

    are carefully curated to support and fruitfully disrupt – rather than interfere with – the aesthetic experience. So, while micro-analysis of video and audio might promise deep insights, significant challenges remain if such approaches are to be effectively leveraged. By opening this work up to the research...

  7. Local copying of orthogonal entangled quantum states

    International Nuclear Information System (INIS)

    Anselmi, Fabio; Chefles, Anthony; Plenio, Martin B

    2004-01-01

    In classical information theory one can, in principle, produce a perfect copy of any input state. In quantum information theory, the no cloning theorem prohibits exact copying of non-orthogonal states. Moreover, if we wish to copy multiparticle entangled states and can perform only local operations and classical communication (LOCC), then further restrictions apply. We investigate the problem of copying orthogonal, entangled quantum states with an entangled blank state under the restriction to LOCC. Throughout, the subsystems have finite dimension D. We show that if all of the states to be copied are non-maximally entangled, then novel LOCC copying procedures based on entanglement catalysis are possible. We then study in detail the LOCC copying problem where both the blank state and at least one of the states to be copied are maximally entangled. For this to be possible, we find that all the states to be copied must be maximally entangled. We obtain a necessary and sufficient condition for LOCC copying under these conditions. For two orthogonal, maximally entangled states, we provide the general solution to this condition. We use it to show that for D = 2, 3, any pair of orthogonal, maximally entangled states can be locally copied using a maximally entangled blank state. However, we also show that for any D which is not prime, one can construct pairs of such states for which this is impossible

  8. La videovigilancia laboral y el derecho a la protección de datos de carácter personal // Workplace video surveillance and right to the protection of personal data

    Directory of Open Access Journals (Sweden)

    Ana Gude Fernández

    2014-12-01

    3. CONCLUSIONS RESUMEN: Este trabajo tiene por objeto el examen de los problemas que plantea la videovigilancia laboral desde la perspectiva del derecho a la protección de los datos. La Ley Orgánica 5/1999, de 13 diciembre y su Reglamento de desarrollo son aplicables a las imágenes obtenidas por los empresarios a través de videocámaras de sus trabajadores; pues bien, el análisis de estos textos normativos así como de la jurisprudencia dictada sobre la materia, en especial la STC 29/2013 de 11 de febrero, constituyen el contenido principal de este estudio. ABSTRACT: This work focuses on workplace video surveillance and its implications from the viewpoint of the right to the protection of personal data. Organic Law 5/1999 and its development regulation applies to the images obtained by employers through use of video cameras. The analysis of these legal texts and of the jurisprudence, particularly of the Constitutional Court sentence of 11 February 2013, is the subject of this study.

  9. Patterns, correlates, and reduction of homework copying

    Directory of Open Access Journals (Sweden)

    David J. Palazzo

    2010-03-01

    Full Text Available Submissions to an online homework tutor were analyzed to determine whether they were copied. The fraction of copied submissions increased rapidly over the semester, as each weekly deadline approached and for problems later in each assignment. The majority of students, who copied less than 10% of their problems, worked steadily over the three days prior to the deadline, whereas repetitive copiers (those who copied >30% of their submitted problems exerted little effort early. Importantly, copying homework problems that require an analytic answer correlates with a 2(σ decline over the semester in relative score for similar problems on exams but does not significantly correlate with the amount of conceptual learning as measured by pretesting and post-testing. An anonymous survey containing questions used in many previous studies of self-reported academic dishonesty showed ∼1/3 less copying than actually was detected. The observed patterns of copying, free response questions on the survey, and interview data suggest that time pressure on students who do not start their homework in a timely fashion is the proximate cause of copying. Several measures of initial ability in math or physics correlated with copying weakly or not at all. Changes in course format and instructional practices that previous self-reported academic dishonesty surveys and/or the observed copying patterns suggested would reduce copying have been accompanied by more than a factor of 4 reduction of copying from ∼11% of all electronic problems to less than 3%. As expected (since repetitive copiers have approximately three times the chance of failing, this was accompanied by a reduction in the overall course failure rate. Survey results indicate that students copy almost twice as much written homework as online homework and show that students nationally admit to more academic dishonesty than MIT students.

  10. The roles of vocal and visual interactions in social learning zebra finches: A video playback experiment.

    Science.gov (United States)

    Guillette, Lauren M; Healy, Susan D

    2017-06-01

    The transmission of information from an experienced demonstrator to a naïve observer often depends on characteristics of the demonstrator, such as familiarity, success or dominance status. Whether or not the demonstrator pays attention to and/or interacts with the observer may also affect social information acquisition or use by the observer. Here we used a video-demonstrator paradigm first to test whether video demonstrators have the same effect as using live demonstrators in zebra finches, and second, to test the importance of visual and vocal interactions between the demonstrator and observer on social information use by the observer. We found that female zebra finches copied novel food choices of male demonstrators they saw via live-streaming video while they did not consistently copy from the demonstrators when they were seen in playbacks of the same videos. Although naive observers copied in the absence of vocalizations by the demonstrator, as they copied from playback of videos with the sound off, females did not copy where there was a mis-match between the visual information provided by the video and vocal information from a live male that was out of sight. Taken together these results suggest that video demonstration is a useful methodology for testing social information transfer, at least in a foraging context, but more importantly, that social information use varies according to the vocal interactions, or lack thereof, between the observer and the demonstrator. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.

  11. Countermeasures for unintentional and intentional video watermarking attacks

    Science.gov (United States)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  12. Airborne Video Surveillance

    National Research Council Canada - National Science Library

    Blask, Steven

    2002-01-01

    The DARPA Airborne Video Surveillance (AVS) program was established to develop and promote technologies to make airborne video more useful, providing capabilities that achieve a UAV force multiplier...

  13. Estimating the Probability of Traditional Copying, Conditional on Answer-Copying Statistics.

    Science.gov (United States)

    Allen, Jeff; Ghattas, Andrew

    2016-06-01

    Statistics for detecting copying on multiple-choice tests produce p values measuring the probability of a value at least as large as that observed, under the null hypothesis of no copying. The posterior probability of copying is arguably more relevant than the p value, but cannot be derived from Bayes' theorem unless the population probability of copying and probability distribution of the answer-copying statistic under copying are known. In this article, the authors develop an estimator for the posterior probability of copying that is based on estimable quantities and can be used with any answer-copying statistic. The performance of the estimator is evaluated via simulation, and the authors demonstrate how to apply the formula using actual data. Potential uses, generalizability to other types of cheating, and limitations of the approach are discussed.

  14. Console modification in the video game industry an empirical study of the technological protection measure reforms of the Australian Copyright Act 1968 (Cth)

    OpenAIRE

    Raval, Melchor Inigo

    2017-01-01

    The Australian-United States Free Trade Agreement expanded the access rights provisions, including the technological protection measures (TPM) and anti-circumvention prohibitions in the Copyright Act 1968 (Cth), to address the unauthorised distribution of copyrighted content, colloquially referred to as piracy. Copyright users object to these "paracopyright" principles being implemented as criminal penalties and restrictive Digital Rights Management (DRM). Evidence that piracy has persisted...

  15. Physics and Video Analysis

    Science.gov (United States)

    Allain, Rhett

    2016-05-01

    We currently live in a world filled with videos. There are videos on YouTube, feature movies and even videos recorded with our own cameras and smartphones. These videos present an excellent opportunity to not only explore physical concepts, but also inspire others to investigate physics ideas. With video analysis, we can explore the fantasy world in science-fiction films. We can also look at online videos to determine if they are genuine or fake. Video analysis can be used in the introductory physics lab and it can even be used to explore the make-believe physics embedded in video games. This book covers the basic ideas behind video analysis along with the fundamental physics principles used in video analysis. The book also includes several examples of the unique situations in which video analysis can be used.

  16. NEI You Tube Videos: Amblyopia

    Medline Plus

    Full Text Available ... YouTube Videos » NEI YouTube Videos: Amblyopia Listen NEI YouTube Videos YouTube Videos Home Age-Related Macular Degeneration ... Retinopathy of Prematurity Science Spanish Videos Webinars NEI YouTube Videos: Amblyopia Embedded video for NEI YouTube Videos: ...

  17. Social learning in nest-building birds watching live-streaming video demonstrators.

    Science.gov (United States)

    Guillette, Lauren M; Healy, Susan D

    2018-02-13

    Determining the role that social learning plays in construction behaviours, such as nest building or tool manufacture, could be improved if more experimental control could be gained over the exact public information that is provided by the demonstrator, to the observing individual. Using video playback allows the experimenter to choose what information is provided, but will only be useful in determining the role of social learning if observers attend to, and learn from, videos in a manner that is similar to live demonstration. The goal of the current experiment was to test whether live-streamed video presentations of nest building by zebra finches Taeniopygia guttata would lead observers to copy the material choice demonstrated to them. Here, males that had not previously built a nest were given an initial preference test between materials of two colours. Those observers then watched live-stream footage of a familiar demonstrator building a nest with material of the colour that the observer did not prefer. After this experience, observers were given the chance to build a nest with materials of the two colours. Although two-thirds of the observer males preferred material of the demonstrated colour after viewing the demonstrator build a nest with material of that colour more than they had previously, their preference for the demonstrated material was not as strong as that of observers that had viewed live demonstrator builders in a previous experiment. Our results suggest researchers should proceed with caution before using video demonstration in tests of social learning. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  18. A video authentication technique

    International Nuclear Information System (INIS)

    Johnson, C.S.

    1987-01-01

    Unattended video surveillance systems are particularly vulnerable to the substitution of false video images into the cable that connects the camera to the video recorder. New technology has made it practical to insert a solid state video memory into the video cable, freeze a video image from the camera, and hold this image as long as desired. Various techniques, such as line supervision and sync detection, have been used to detect video cable tampering. The video authentication technique described in this paper uses the actual video image from the camera as the basis for detecting any image substitution made during the transmission of the video image to the recorder. The technique, designed for unattended video systems, can be used for any video transmission system where a two-way digital data link can be established. The technique uses similar microprocessor circuitry at the video camera and at the video recorder to select sample points in the video image for comparison. The gray scale value of these points is compared at the recorder controller and if the values agree within limits, the image is authenticated. If a significantly different image was substituted, the comparison would fail at a number of points and the video image would not be authenticated. The video authentication system can run as a stand-alone system or at the request of another system

  19. Implications of the law on video recording in clinical practice.

    Science.gov (United States)

    Henken, Kirsten R; Jansen, Frank Willem; Klein, Jan; Stassen, Laurents P S; Dankelman, Jenny; van den Dobbelsteen, John J

    2012-10-01

    Technological developments allow for a variety of applications of video recording in health care, including endoscopic procedures. Although the value of video registration is recognized, medicolegal concerns regarding the privacy of patients and professionals are growing. A clear understanding of the legal framework is lacking. Therefore, this research aims to provide insight into the juridical position of patients and professionals regarding video recording in health care practice. Jurisprudence was searched to exemplify legislation on video recording in health care. In addition, legislation was translated for different applications of video in health care found in the literature. Three principles in Western law are relevant for video recording in health care practice: (1) regulations on privacy regarding personal data, which apply to the gathering and processing of video data in health care settings; (2) the patient record, in which video data can be stored; and (3) professional secrecy, which protects the privacy of patients including video data. Practical implementation of these principles in video recording in health care does not exist. Practical regulations on video recording in health care for different specifically defined purposes are needed. Innovations in video capture technology that enable video data to be made anonymous automatically can contribute to protection for the privacy of all the people involved.

  20. Hacking DNA copy number for circuit engineering.

    Science.gov (United States)

    Wu, Feilun; You, Lingchong

    2017-07-27

    DNA copy number represents an essential parameter in the dynamics of synthetic gene circuits but typically is not explicitly considered. A new study demonstrates how dynamic control of DNA copy number can serve as an effective strategy to program robust oscillations in gene expression circuits.

  1. Copy-Editing: The Cambridge Handbook.

    Science.gov (United States)

    Butcher, Judith

    This handbook is designed as a reference manual for copy editors who prepare typescript for printing. It deals with the following topics: the copy editor's function; the work to be done at each stage in the production process; some difficult points of spelling, capitalization, and other features collectively known as "house style"; the parts of a…

  2. Information security as a countermeasure against cheating in video games

    OpenAIRE

    Mikkelsen, Kevin Kjelgren

    2017-01-01

    Most cheating in video games is possible due to information being accessible outside the intended frames of the game developer. The issue of protecting sensitive information have been handled in many areas outside of video games for a long time now. The goal of this paper is to review these information security solutions that are in use in more security concerned areas today and to potentially find transferable approaches that can help protect important and sensitive information in video game...

  3. The Rhetoric of the Implicit and the Politics of Representation in the Age of Copy-and-Paste

    Science.gov (United States)

    Adami, Elisabetta

    2012-01-01

    The paper discusses the effects of copy-and-paste on the rhetoric and politics of communication in digital environments, by examining direct and indirect (mis)quotation and referencing in "YouTube" video-exchanges and by providing further examples in one-to-one communication via "Facebook" and email. The forwarding of (snippets of) artefacts in…

  4. Rare Disease Video Portal

    OpenAIRE

    Sánchez Bocanegra, Carlos Luis

    2011-01-01

    Rare Disease Video Portal (RD Video) is a portal web where contains videos from Youtube including all details from 12 channels of Youtube. Rare Disease Video Portal (RD Video) es un portal web que contiene los vídeos de Youtube incluyendo todos los detalles de 12 canales de Youtube. Rare Disease Video Portal (RD Video) és un portal web que conté els vídeos de Youtube i que inclou tots els detalls de 12 Canals de Youtube.

  5. [Is there protection against copying? Thoughts about plagiarism].

    Science.gov (United States)

    Schubert, András; Glänzel, Wolfgang

    2015-12-13

    There are at least two reasons why more and more cases of suspected plagiarism are perceived in the scientific literature. On one hand, the ever increasing pressure for publication makes it easier for authors, reviewers and editors to infringe or overlook this serious ethical misdemeanor; on the other hand, with the development of text analysis software, detecting text similarities has become a simple task. The judgement of actual cases, however, requires well-grounded professional knowledge and prudent human decisions.

  6. Preservation Copying Endangered Historic Negative Collections

    DEFF Research Database (Denmark)

    Kejser, Ulla Bøgvad

    2008-01-01

    This article discusses preservation copying of unstable B&W nitrate and acetate still photographic negatives. It focuses on evaluating two different strategies for preserving the copies from a point of view of quality and cost-effectiveness. The evaluated strategies are preservation of the master...... by describing essential characteristics of negatives, which must be passed on to the copies, and the required metadata and technical imaging specifications. Next the paper discusses strategies for preservation and makes an analysis with the LIFE2 Costing Model. The paper concludes that the most beneficial...... and cost-effective preservation solution for large format negatives is to keep the preservation copies as digital files. However, it also acknowledges that it is important to revisit such strategies regularly to monitor changes in user expectations, technologies and costs....

  7. COPI is required for enterovirus 71 replication.

    Directory of Open Access Journals (Sweden)

    Jianmin Wang

    Full Text Available Enterovirus 71 (EV71, a member of the Picornaviridae family, is found in Asian countries where it causes a wide range of human diseases. No effective therapy is available for the treatment of these infections. Picornaviruses undergo RNA replication in association with membranes of infected cells. COPI and COPII have been shown to be involved in the formation of picornavirus-induced vesicles. Replication of several picornaviruses, including poliovirus and Echovirus 11 (EV11, is dependent on COPI or COPII. Here, we report that COPI, but not COPII, is required for EV71 replication. Replication of EV71 was inhibited by brefeldin A and golgicide A, inhibitors of COPI activity. Furthermore, we found EV71 2C protein interacted with COPI subunits by co-immunoprecipitation and GST pull-down assay, indicating that COPI coatomer might be directed to the viral replication complex through viral 2C protein. Additionally, because the pathway is conserved among different species of enteroviruses, it may represent a novel target for antiviral therapies.

  8. Acoustic Neuroma Educational Video

    Medline Plus

    Full Text Available ... for me? Find a Group Upcoming Events Video Library Photo Gallery One-on-One Support ANetwork Peer ... me? Find a group Back Upcoming events Video Library Photo Gallery One-on-One Support Back ANetwork ...

  9. Videos, Podcasts and Livechats

    Medline Plus

    Full Text Available ... Doctor Find a Provider Meet the Team Blog Articles & Stories News Resources Links Videos Podcasts Webinars For ... Doctor Find a Provider Meet the Team Blog Articles & Stories News Provider Directory Donate Resources Links Videos ...

  10. Video Design Games

    DEFF Research Database (Denmark)

    Smith, Rachel Charlotte; Christensen, Kasper Skov; Iversen, Ole Sejer

    We introduce Video Design Games to train educators in teaching design. The Video Design Game is a workshop format consisting of three rounds in which participants observe, reflect and generalize based on video snippets from their own practice. The paper reports on a Video Design Game workshop...... in which 25 educators as part of a digital fabrication and design program were able to critically reflect on their teaching practice....

  11. Low AMY1 Gene Copy Number Is Associated with Increased Body Mass Index in Prepubertal Boys.

    Directory of Open Access Journals (Sweden)

    M Loredana Marcovecchio

    Full Text Available Genome-wide association studies have identified more than 60 single nucleotide polymorphisms associated with Body Mass Index (BMI. Additional genetic variants, such as copy number variations (CNV, have also been investigated in relation to BMI. Recently, the highly polymorphic CNV in the salivary amylase (AMY1 gene, encoding an enzyme implicated in the first step of starch digestion, has been associated with obesity in adults and children. We assessed the potential association between AMY1 copy number and a wide range of BMI in a population of Italian school-children.744 children (354 boys, 390 girls, mean age (±SD: 8.4±1.4years underwent anthropometric assessments (height, weight and collection of saliva samples for DNA extraction. AMY1 copies were evaluated by quantitative PCR.A significant increase of BMI z-score by decreasing AMY1 copy number was observed in boys (β: -0.117, p = 0.033, but not in girls. Similarly, waist circumference (β: -0.155, p = 0.003, adjusted for age was negatively influenced by AMY1 copy number in boys. Boys with 8 or more AMY1 copy numbers presented a significant lower BMI z-score (p = 0.04 and waist circumference (p = 0.01 when compared to boys with less than 8 copy numbers.In this pediatric-only, population-based study, a lower AMY1 copy number emerged to be associated with increased BMI in boys. These data confirm previous findings from adult studies and support a potential role of a higher copy number of the salivary AMY1 gene in protecting from excess weight gain.

  12. The Children's Video Marketplace.

    Science.gov (United States)

    Ducey, Richard V.

    This report examines a growing submarket, the children's video marketplace, which comprises broadcast, cable, and video programming for children 2 to 11 years old. A description of the tremendous growth in the availability and distribution of children's programming is presented, the economics of the children's video marketplace are briefly…

  13. Video Self-Modeling

    Science.gov (United States)

    Buggey, Tom; Ogle, Lindsey

    2012-01-01

    Video self-modeling (VSM) first appeared on the psychology and education stage in the early 1970s. The practical applications of VSM were limited by lack of access to tools for editing video, which is necessary for almost all self-modeling videos. Thus, VSM remained in the research domain until the advent of camcorders and VCR/DVD players and,…

  14. VBR video traffic models

    CERN Document Server

    Tanwir, Savera

    2014-01-01

    There has been a phenomenal growth in video applications over the past few years. An accurate traffic model of Variable Bit Rate (VBR) video is necessary for performance evaluation of a network design and for generating synthetic traffic that can be used for benchmarking a network. A large number of models for VBR video traffic have been proposed in the literature for different types of video in the past 20 years. Here, the authors have classified and surveyed these models and have also evaluated the models for H.264 AVC and MVC encoded video and discussed their findings.

  15. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  16. Intelligent video surveillance systems

    CERN Document Server

    Dufour, Jean-Yves

    2012-01-01

    Belonging to the wider academic field of computer vision, video analytics has aroused a phenomenal surge of interest since the current millennium. Video analytics is intended to solve the problem of the incapability of exploiting video streams in real time for the purpose of detection or anticipation. It involves analyzing the videos using algorithms that detect and track objects of interest over time and that indicate the presence of events or suspect behavior involving these objects.The aims of this book are to highlight the operational attempts of video analytics, to identify possi

  17. Video performance for high security applications

    International Nuclear Information System (INIS)

    Connell, Jack C.; Norman, Bradley C.

    2010-01-01

    The complexity of physical protection systems has increased to address modern threats to national security and emerging commercial technologies. A key element of modern physical protection systems is the data presented to the human operator used for rapid determination of the cause of an alarm, whether false (e.g., caused by an animal, debris, etc.) or real (e.g., a human adversary). Alarm assessment, the human validation of a sensor alarm, primarily relies on imaging technologies and video systems. Developing measures of effectiveness (MOE) that drive the design or evaluation of a video system or technology becomes a challenge, given the subjectivity of the application (e.g., alarm assessment). Sandia National Laboratories has conducted empirical analysis using field test data and mathematical models such as binomial distribution and Johnson target transfer functions to develop MOEs for video system technologies. Depending on the technology, the task of the security operator and the distance to the target, the Probability of Assessment (PAs) can be determined as a function of a variety of conditions or assumptions. PAs used as an MOE allows the systems engineer to conduct trade studies, make informed design decisions, or evaluate new higher-risk technologies. This paper outlines general video system design trade-offs, discusses ways video can be used to increase system performance and lists MOEs for video systems used in subjective applications such as alarm assessment.

  18. Gauge field copies and Higgs mechanism

    International Nuclear Information System (INIS)

    Gleiser, M.

    1982-07-01

    From the algebric classification of the possible solutions of the necessary and sufficient condition for the existence of gauge field copies in two possible classes the Higgs mechanism for the potential obtained from the difference between two copied potentials is applied. It is shown that for class I 'electric type' it is possible to construct a vector field that satisfies an electromagnetic wave equation. For class I 'magnetic type', a vector field that satisfies a non-linear equation as a consequence of the non-abelianity of the theory, is obtained. It is shown that for class II it's not possible to apply the Higgs mechanism. A possible physical interpretation for the 'gauge field copies' phenomenon, is obtained. (author) [pt

  19. The λ transformation and gravitational copies

    International Nuclear Information System (INIS)

    Silva, M.R. da.

    1984-01-01

    An Abelian symmetry already considered by Einstein with respect to his asymmetrical field theories is related to the gravitational and gauge field copy phenomenon. It is shown that gauge field copies arise out of a straightforward generalization of the λ - map. The connection between Einstein's work on the λ-transformation and the copy phenomenon is obtained with the help of the Frobenius Theorem on the existence of foliations on a differentiable manifold. A problem like the one above is usually treated within the language of (intrinsic) Differential Geometry; General Relativity and classical unified field theories are traditionally developed in a classical style, that gap, a long introduction is prepared where the same structures are studied from the traditional and from the more recent point of view. (author)

  20. Copying of holograms by spot scanning approach.

    Science.gov (United States)

    Okui, Makoto; Wakunami, Koki; Oi, Ryutaro; Ichihashi, Yasuyuki; Jackin, Boaz Jessie; Yamamoto, Kenji

    2018-05-20

    To replicate holograms, contact copying has conventionally been used. In this approach, a photosensitive material is fixed together with a master hologram and illuminated with a coherent beam. This method is simple and enables high-quality copies; however, it requires a large optical setup for large-area holograms. In this paper, we present a new method of replicating holograms that uses a relatively compact optical system even for the replication of large holograms. A small laser spot that irradiates only part of the hologram is used to reproduce the hologram by scanning the spot over the whole area of the hologram. We report on the results of experiments carried out to confirm the copy quality, along with a guide to design scanning conditions. The results show the potential effectiveness of the large-area hologram replication technology using a relatively compact apparatus.

  1. Flip Video for Dummies

    CERN Document Server

    Hutsko, Joe

    2010-01-01

    The full-color guide to shooting great video with the Flip Video camera. The inexpensive Flip Video camera is currently one of the hottest must-have gadgets. It's portable and connects easily to any computer to transfer video you shoot onto your PC or Mac. Although the Flip Video camera comes with a quick-start guide, it lacks a how-to manual, and this full-color book fills that void! Packed with full-color screen shots throughout, Flip Video For Dummies shows you how to shoot the best possible footage in a variety of situations. You'll learn how to transfer video to your computer and then edi

  2. Using Photogrammetry to Estimate Tank Waste Volumes from Video

    Energy Technology Data Exchange (ETDEWEB)

    Field, Jim G. [Washington River Protection Solutions, LLC, Richland, WA (United States)

    2013-03-27

    Washington River Protection Solutions (WRPS) contracted with HiLine Engineering & Fabrication, Inc. to assess the accuracy of photogrammetry tools as compared to video Camera/CAD Modeling System (CCMS) estimates. This test report documents the results of using photogrammetry to estimate the volume of waste in tank 241-C-I04 from post-retrieval videos and results using photogrammetry to estimate the volume of waste piles in the CCMS test video.

  3. Using Photogrammetry to Estimate Tank Waste Volumes from Video

    International Nuclear Information System (INIS)

    Field, Jim G.

    2013-01-01

    Washington River Protection Solutions (WRPS) contracted with HiLine Engineering and Fabrication, Inc. to assess the accuracy of photogrammetry tools as compared to video Camera/CAD Modeling System (CCMS) estimates. This test report documents the results of using photogrammetry to estimate the volume of waste in tank 241-C-I04 from post-retrieval videos and results using photogrammetry to estimate the volume of waste piles in the CCMS test video

  4. Video watermarking for mobile phone applications

    Science.gov (United States)

    Mitrea, M.; Duta, S.; Petrescu, M.; Preteux, F.

    2005-08-01

    Nowadays, alongside with the traditional voice signal, music, video, and 3D characters tend to become common data to be run, stored and/or processed on mobile phones. Hence, to protect their related intellectual property rights also becomes a crucial issue. The video sequences involved in such applications are generally coded at very low bit rates. The present paper starts by presenting an accurate statistical investigation on such a video as well as on a very dangerous attack (the StirMark attack). The obtained results are turned into practice when adapting a spread spectrum watermarking method to such applications. The informed watermarking approach was also considered: an outstanding method belonging to this paradigm has been adapted and re evaluated under the low rate video constraint. The experimental results were conducted in collaboration with the SFR mobile services provider in France. They also allow a comparison between the spread spectrum and informed embedding techniques.

  5. Improved Ordinary Measure and Image Entropy Theory based intelligent Copy Detection Method

    Directory of Open Access Journals (Sweden)

    Dengpan Ye

    2011-10-01

    Full Text Available Nowadays, more and more multimedia websites appear in social network. It brings some security problems, such as privacy, piracy, disclosure of sensitive contents and so on. Aiming at copyright protection, the copy detection technology of multimedia contents becomes a hot topic. In our previous work, a new computer-based copyright control system used to detect the media has been proposed. Based on this system, this paper proposes an improved media feature matching measure and an entropy based copy detection method. The Levenshtein Distance was used to enhance the matching degree when using for feature matching measure in copy detection. For entropy based copy detection, we make a fusion of the two features of entropy matrix of the entropy feature we extracted. Firstly,we extract the entropy matrix of the image and normalize it. Then, we make a fusion of the eigenvalue feature and the transfer matrix feature of the entropy matrix. The fused features will be used for image copy detection. The experiments show that compared to use these two kinds of features for image detection singly, using feature fusion matching method is apparent robustness and effectiveness. The fused feature has a high detection for copy images which have been received some attacks such as noise, compression, zoom, rotation and so on. Comparing with referred methods, the method proposed is more intelligent and can be achieved good performance.

  6. 4 CFR 22.7 - Copies and Service Thereof [Rule 7].

    Science.gov (United States)

    2010-01-01

    ...)], shall be provided to the Board by e-mail at [email protected], with a courtesy copy of the submission provided... delivery, express or priority mail, or approved commercial carrier (e.g., UPS or FedEx) within 2 business...

  7. Curvature tensor copies in affine geometry

    International Nuclear Information System (INIS)

    Srivastava, P.P.

    1981-01-01

    The sets of space-time and spin-connections which give rise to the same curvature tensor are constructed. The corresponding geometries are compared. Results are illustrated by an explicit calculation and comment on the copies in Einstein-Cartan and Weyl-Cartan geometries. (Author) [pt

  8. Two new statistics to detect answer copying

    NARCIS (Netherlands)

    Meijer, R.R.; Sotaridona, Leonardo

    2001-01-01

    Two new indices to detect answer copying on a multiple-choice test, S(1) and S(2) (subscripts), are proposed. The S(1) index is similar to the K-index (P. Holland, 1996) and the K-overscore(2), (K2) index (L. Sotaridona and R. Meijer, in press), but the distribution of the number of matching

  9. Two new indices to detect answer copying

    NARCIS (Netherlands)

    Sotaridona, Leonardo; Meijer, R.R.

    2003-01-01

    Two new indices to detect answer copying on a multiple-choice test—S1 and S2—were proposed. The S1 index is similar to the K index (Holland, 1996) and the K2 index (Sotaridona & Meijer, 2002) but the distribution of the number of matching incorrect answers of the source and the copier is modeled by

  10. Local Reasoning about a Copying Garbage Collector

    DEFF Research Database (Denmark)

    Torp-Smith, Noah; Birkedal, Lars; Reynolds, John C.

    2008-01-01

    We present a programming language, model, and logic appropriate for implementing and reasoning about a memory management system. We state semantically what is meant by correctness of a copying garbage collector, and employ a variant of the novel separation logics to formally specify partial corre...

  11. Video Toroid Cavity Imager

    Energy Technology Data Exchange (ETDEWEB)

    Gerald, Rex E. II; Sanchez, Jairo; Rathke, Jerome W.

    2004-08-10

    A video toroid cavity imager for in situ measurement of electrochemical properties of an electrolytic material sample includes a cylindrical toroid cavity resonator containing the sample and employs NMR and video imaging for providing high-resolution spectral and visual information of molecular characteristics of the sample on a real-time basis. A large magnetic field is applied to the sample under controlled temperature and pressure conditions to simultaneously provide NMR spectroscopy and video imaging capabilities for investigating electrochemical transformations of materials or the evolution of long-range molecular aggregation during cooling of hydrocarbon melts. The video toroid cavity imager includes a miniature commercial video camera with an adjustable lens, a modified compression coin cell imager with a fiat circular principal detector element, and a sample mounted on a transparent circular glass disk, and provides NMR information as well as a video image of a sample, such as a polymer film, with micrometer resolution.

  12. Digital Video in Research

    DEFF Research Database (Denmark)

    Frølunde, Lisbeth

    2012-01-01

    Is video becoming “the new black” in academia, if so, what are the challenges? The integration of video in research methodology (for collection, analysis) is well-known, but the use of “academic video” for dissemination is relatively new (Eriksson and Sørensen). The focus of this paper is academic......). In the video, I appear (along with other researchers) and two Danish film directors, and excerpts from their film. My challenges included how to edit the academic video and organize the collaborative effort. I consider video editing as a semiotic, transformative process of “reassembling” voices....... In the discussion, I review academic video in terms of relevance and implications for research practice. The theoretical background is social constructivist, combining social semiotics (Kress, van Leeuwen, McCloud), visual anthropology (Banks, Pink) and dialogic theory (Bakhtin). The Bakhtinian notion of “voices...

  13. Reflections on academic video

    Directory of Open Access Journals (Sweden)

    Thommy Eriksson

    2012-11-01

    Full Text Available As academics we study, research and teach audiovisual media, yet rarely disseminate and mediate through it. Today, developments in production technologies have enabled academic researchers to create videos and mediate audiovisually. In academia it is taken for granted that everyone can write a text. Is it now time to assume that everyone can make a video essay? Using the online journal of academic videos Audiovisual Thinking and the videos published in it as a case study, this article seeks to reflect on the emergence and legacy of academic audiovisual dissemination. Anchoring academic video and audiovisual dissemination of knowledge in two critical traditions, documentary theory and semiotics, we will argue that academic video is in fact already present in a variety of academic disciplines, and that academic audiovisual essays are bringing trends and developments that have long been part of academic discourse to their logical conclusion.

  14. Sound for digital video

    CERN Document Server

    Holman, Tomlinson

    2013-01-01

    Achieve professional quality sound on a limited budget! Harness all new, Hollywood style audio techniques to bring your independent film and video productions to the next level.In Sound for Digital Video, Second Edition industry experts Tomlinson Holman and Arthur Baum give you the tools and knowledge to apply recent advances in audio capture, video recording, editing workflow, and mixing to your own film or video with stunning results. This fresh edition is chockfull of techniques, tricks, and workflow secrets that you can apply to your own projects from preproduction

  15. Design considerations for computationally constrained two-way real-time video communication

    Science.gov (United States)

    Bivolarski, Lazar M.; Saunders, Steven E.; Ralston, John D.

    2009-08-01

    Today's video codecs have evolved primarily to meet the requirements of the motion picture and broadcast industries, where high-complexity studio encoding can be utilized to create highly-compressed master copies that are then broadcast one-way for playback using less-expensive, lower-complexity consumer devices for decoding and playback. Related standards activities have largely ignored the computational complexity and bandwidth constraints of wireless or Internet based real-time video communications using devices such as cell phones or webcams. Telecommunications industry efforts to develop and standardize video codecs for applications such as video telephony and video conferencing have not yielded image size, quality, and frame-rate performance that match today's consumer expectations and market requirements for Internet and mobile video services. This paper reviews the constraints and the corresponding video codec requirements imposed by real-time, 2-way mobile video applications. Several promising elements of a new mobile video codec architecture are identified, and more comprehensive computational complexity metrics and video quality metrics are proposed in order to support the design, testing, and standardization of these new mobile video codecs.

  16. The double copy: gravity from gluons

    Science.gov (United States)

    White, C. D.

    2018-04-01

    Three of the four fundamental forces in nature are described by so-called gauge theories, which include the effects of both relativity and quantum mechanics. Gravity, on the other hand, is described by General Relativity, and the lack of a well-behaved quantum theory - believed to be relevant at the centre of black holes, and at the Big Bang itself - remains a notorious unsolved problem. Recently a new correspondence, the double copy, has been discovered between scattering amplitudes (quantities related to the probability for particles to interact) in gravity, and their gauge theory counterparts. This has subsequently been extended to other quantities, providing gauge theory analogues of e.g. black holes. We here review current research on the double copy, and describe some possible applications.

  17. Wavelet-based audio embedding and audio/video compression

    Science.gov (United States)

    Mendenhall, Michael J.; Claypoole, Roger L., Jr.

    2001-12-01

    Watermarking, traditionally used for copyright protection, is used in a new and exciting way. An efficient wavelet-based watermarking technique embeds audio information into a video signal. Several effective compression techniques are applied to compress the resulting audio/video signal in an embedded fashion. This wavelet-based compression algorithm incorporates bit-plane coding, index coding, and Huffman coding. To demonstrate the potential of this audio embedding and audio/video compression algorithm, we embed an audio signal into a video signal and then compress. Results show that overall compression rates of 15:1 can be achieved. The video signal is reconstructed with a median PSNR of nearly 33 dB. Finally, the audio signal is extracted from the compressed audio/video signal without error.

  18. Video over DSL with LDGM Codes for Interactive Applications

    Directory of Open Access Journals (Sweden)

    Laith Al-Jobouri

    2016-05-01

    Full Text Available Digital Subscriber Line (DSL network access is subject to error bursts, which, for interactive video, can introduce unacceptable latencies if video packets need to be re-sent. If the video packets are protected against errors with Forward Error Correction (FEC, calculation of the application-layer channel codes themselves may also introduce additional latency. This paper proposes Low-Density Generator Matrix (LDGM codes rather than other popular codes because they are more suitable for interactive video streaming, not only for their computational simplicity but also for their licensing advantage. The paper demonstrates that a reduction of up to 4 dB in video distortion is achievable with LDGM Application Layer (AL FEC. In addition, an extension to the LDGM scheme is demonstrated, which works by rearranging the columns of the parity check matrix so as to make it even more resilient to burst errors. Telemedicine and video conferencing are typical target applications.

  19. The Video Generation.

    Science.gov (United States)

    Provenzo, Eugene F., Jr.

    1992-01-01

    Video games are neither neutral nor harmless but represent very specific social and symbolic constructs. Research on the social content of today's video games reveals that sex bias and gender stereotyping are widely evident throughout the Nintendo games. Violence and aggression also pervade the great majority of the games. (MLF)

  20. SECRETS OF SONG VIDEO

    Directory of Open Access Journals (Sweden)

    Chernyshov Alexander V.

    2014-04-01

    Full Text Available The article focuses on the origins of the song videos as TV and Internet-genre. In addition, it considers problems of screen images creation depending on the musical form and the text of a songs in connection with relevant principles of accent and phraseological video editing and filming techniques as well as with additional frames and sound elements.

  1. Reviews in instructional video

    NARCIS (Netherlands)

    van der Meij, Hans

    2017-01-01

    This study investigates the effectiveness of a video tutorial for software training whose construction was based on a combination of insights from multimedia learning and Demonstration-Based Training. In the videos, a model of task performance was enhanced with instructional features that were

  2. Videos - The National Guard

    Science.gov (United States)

    Legislative Liaison Small Business Programs Social Media State Websites Videos Featured Videos On Every Front 2:17 Always Ready, Always There National Guard Bureau Diversity and Inclusion Play Button 1:04 National Guard Bureau Diversity and Inclusion The ChalleNGe Ep.5 [Graduation] Play Button 3:51 The

  3. Rheumatoid Arthritis Educational Video Series

    Medline Plus

    Full Text Available ... Patient Webcasts / Rheumatoid Arthritis Educational Video Series Rheumatoid Arthritis Educational Video Series This series of five videos ... member of our patient care team. Managing Your Arthritis Managing Your Arthritis Managing Chronic Pain and Depression ...

  4. Rheumatoid Arthritis Educational Video Series

    Science.gov (United States)

    ... Corner / Patient Webcasts / Rheumatoid Arthritis Educational Video Series Rheumatoid Arthritis Educational Video Series This series of five videos ... Your Arthritis Managing Chronic Pain and Depression in Arthritis Nutrition & Rheumatoid Arthritis Arthritis and Health-related Quality of Life ...

  5. NEI You Tube Videos: Amblyopia

    Medline Plus

    Full Text Available ... YouTube Videos: Amblyopia Embedded video for NEI YouTube Videos: Amblyopia ... *PDF files require the free Adobe® Reader® software for viewing. This website is maintained by the ...

  6. NEI You Tube Videos: Amblyopia

    Medline Plus

    Full Text Available ... questions Clinical Studies Publications Catalog Photos and Images Spanish Language Information Grants and Funding Extramural Research Division ... Low Vision Refractive Errors Retinopathy of Prematurity Science Spanish Videos Webinars NEI YouTube Videos: Amblyopia Embedded video ...

  7. Online Interactive Video Vignettes (IVVs)

    Science.gov (United States)

    Laws, Priscilla

    2016-03-01

    Interest in on-line learning is increasing rapidly. A few years ago members of the LivePhoto Physics Group1 received collaborative NSF Grants2 to create short, single-topic, on-line activities that invite introductory physics students to make individual predictions about a phenomenon and test them though video observations or analysis. Each Vignette is designed for web delivery as: (1) an ungraded homework assignment or (2) an exercise to prepare for a class or tutorial session. Sample IVVs are available at the ComPadre website http://www.compadre.org/ivv/. Portions of Vignettes on mechanics topics including Projectile Motion, Circular Motion, the Bullet-Block phenomenon, and Newton's Third Law will be presented. Those attending this talk will be asked to guess what predictions students are likely to make about phenomena in various IVVs. These predictions can be compared to those made by students who completed Vignettes. Finally, research on the impact of Vignettes on student learning and attitudes will be discussed. Co-PI Robert Teese, Rochester Institute of Technology.

  8. Social video content delivery

    CERN Document Server

    Wang, Zhi; Zhu, Wenwu

    2016-01-01

    This brief presents new architecture and strategies for distribution of social video content. A primary framework for socially-aware video delivery and a thorough overview of the possible approaches is provided. The book identifies the unique characteristics of socially-aware video access and social content propagation, revealing the design and integration of individual modules that are aimed at enhancing user experience in the social network context. The change in video content generation, propagation, and consumption for online social networks, has significantly challenged the traditional video delivery paradigm. Given the massive amount of user-generated content shared in online social networks, users are now engaged as active participants in the social ecosystem rather than as passive receivers of media content. This revolution is being driven further by the deep penetration of 3G/4G wireless networks and smart mobile devices that are seamlessly integrated with online social networking and media-sharing s...

  9. Online video examination

    DEFF Research Database (Denmark)

    Qvist, Palle

    have large influence on their own teaching, learning and curriculum. The programme offers streamed videos in combination with other learning resources. It is a concept which offers video as pure presentation - video lectures - but also as an instructional tool which gives the students the possibility...... to construct their knowledge, collaboration and communication. In its first years the programme has used Skype video communication for collaboration and communication within and between groups, group members and their facilitators. Also exams have been mediated with the help of Skype and have for all students......, examiners and external examiners been a challenge and opportunity and has brought new knowledge and experience. This paper brings results from a questionnaire focusing on how the students experience the video examination....

  10. Gauge and non-gauge curvature tensor copies

    International Nuclear Information System (INIS)

    Srivastava, P.P.

    1982-10-01

    A procedure for constructing curvature tensor copies is discussed using the anholonomic geometrical framework. The corresponding geometries are compared and the notion of gauge copy is elucidated. An explicit calculation is also made. (author)

  11. Credibility and Authenticity of Digitally Signed Videos in Traffic

    Directory of Open Access Journals (Sweden)

    Ivan Grgurević

    2008-11-01

    Full Text Available The paper presents the possibilities of insuring the credibilityand authenticity of the surveillance camera video by digitalsigning, using the public key infrastructure as part of interoperabletraffic and information system in the future intelligenttransport systems. The surveillance camera video is a sequenceof individual frames and a unique digital print, i. e. hash valueis calculated for each of these. By encryption of the hash valuesof the frames using private encryption key of the surveillancecentre, digital signatures are created and they are stored in thedatabase. The surveillance centre can issue a copy of the videoto all the interested subjects for scientific and research workand investigation. Regardless of the scope, each subsequentmanipulation of the video copy contents will certainly changethe hash value of all the frames. The procedure of determiningthe authenticity and credibility of videos is reduced to the comparisonof the hash values of the frames stored in the databaseof the surveillance centre with the values obtained from the interestedsubjects such as the traffic experts and investigators,surveillance-security services etc.

  12. Mass-storage management for distributed image/video archives

    Science.gov (United States)

    Franchi, Santina; Guarda, Roberto; Prampolini, Franco

    1993-04-01

    The realization of image/video database requires a specific design for both database structures and mass storage management. This issue has addressed the project of the digital image/video database system that has been designed at IBM SEMEA Scientific & Technical Solution Center. Proper database structures have been defined to catalog image/video coding technique with the related parameters, and the description of image/video contents. User workstations and servers are distributed along a local area network. Image/video files are not managed directly by the DBMS server. Because of their wide size, they are stored outside the database on network devices. The database contains the pointers to the image/video files and the description of the storage devices. The system can use different kinds of storage media, organized in a hierarchical structure. Three levels of functions are available to manage the storage resources. The functions of the lower level provide media management. They allow it to catalog devices and to modify device status and device network location. The medium level manages image/video files on a physical basis. It manages file migration between high capacity media and low access time media. The functions of the upper level work on image/video file on a logical basis, as they archive, move and copy image/video data selected by user defined queries. These functions are used to support the implementation of a storage management strategy. The database information about characteristics of both storage devices and coding techniques are used by the third level functions to fit delivery/visualization requirements and to reduce archiving costs.

  13. 36 CFR 1290.6 - Originals and copies.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Originals and copies. 1290.6... ASSASSINATION RECORDS COLLECTION ACT OF 1992 (JFK ACT) § 1290.6 Originals and copies. (a) For purposes of determining whether originals or copies of assassination records will be made part of the President John F...

  14. Readability as a Factor in Magazine Ad Copy Recall.

    Science.gov (United States)

    Wesson, David A.

    1989-01-01

    Examines the relationship between advertising copy readability and advertising effectiveness. Finds that recall is improved when the copy style is either fairly easy or fairly hard to read. Suggests the value of considering copy readability as a potential contributor, though a minor one, to the success of magazine advertising. (RS)

  15. A new video programme

    CERN Multimedia

    CERN video productions

    2011-01-01

    "What's new @ CERN?", a new monthly video programme, will be broadcast on the Monday of every month on webcast.cern.ch. Aimed at the general public, the programme will cover the latest CERN news, with guests and explanatory features. Tune in on Monday 3 October at 4 pm (CET) to see the programme in English, and then at 4:20 pm (CET) for the French version.   var flash_video_player=get_video_player_path(); insert_player_for_external('Video/Public/Movies/2011/CERN-MOVIE-2011-129/CERN-MOVIE-2011-129-0753-kbps-640x360-25-fps-audio-64-kbps-44-kHz-stereo', 'mms://mediastream.cern.ch/MediaArchive/Video/Public/Movies/2011/CERN-MOVIE-2011-129/CERN-MOVIE-2011-129-Multirate-200-to-753-kbps-640x360-25-fps.wmv', 'false', 480, 360, 'https://mediastream.cern.ch/MediaArchive/Video/Public/Movies/2011/CERN-MOVIE-2011-129/CERN-MOVIE-2011-129-posterframe-640x360-at-10-percent.jpg', '1383406', true, 'Video/Public/Movies/2011/CERN-MOVIE-2011-129/CERN-MOVIE-2011-129-0600-kbps-maxH-360-25-fps-...

  16. Gamifying Video Object Segmentation.

    Science.gov (United States)

    Spampinato, Concetto; Palazzo, Simone; Giordano, Daniela

    2017-10-01

    Video object segmentation can be considered as one of the most challenging computer vision problems. Indeed, so far, no existing solution is able to effectively deal with the peculiarities of real-world videos, especially in cases of articulated motion and object occlusions; limitations that appear more evident when we compare the performance of automated methods with the human one. However, manually segmenting objects in videos is largely impractical as it requires a lot of time and concentration. To address this problem, in this paper we propose an interactive video object segmentation method, which exploits, on one hand, the capability of humans to identify correctly objects in visual scenes, and on the other hand, the collective human brainpower to solve challenging and large-scale tasks. In particular, our method relies on a game with a purpose to collect human inputs on object locations, followed by an accurate segmentation phase achieved by optimizing an energy function encoding spatial and temporal constraints between object regions as well as human-provided location priors. Performance analysis carried out on complex video benchmarks, and exploiting data provided by over 60 users, demonstrated that our method shows a better trade-off between annotation times and segmentation accuracy than interactive video annotation and automated video object segmentation approaches.

  17. Hierarchical video summarization

    Science.gov (United States)

    Ratakonda, Krishna; Sezan, M. Ibrahim; Crinon, Regis J.

    1998-12-01

    We address the problem of key-frame summarization of vide in the absence of any a priori information about its content. This is a common problem that is encountered in home videos. We propose a hierarchical key-frame summarization algorithm where a coarse-to-fine key-frame summary is generated. A hierarchical key-frame summary facilitates multi-level browsing where the user can quickly discover the content of the video by accessing its coarsest but most compact summary and then view a desired segment of the video with increasingly more detail. At the finest level, the summary is generated on the basis of color features of video frames, using an extension of a recently proposed key-frame extraction algorithm. The finest level key-frames are recursively clustered using a novel pairwise K-means clustering approach with temporal consecutiveness constraint. We also address summarization of MPEG-2 compressed video without fully decoding the bitstream. We also propose efficient mechanisms that facilitate decoding the video when the hierarchical summary is utilized in browsing and playback of video segments starting at selected key-frames.

  18. Medical video server construction.

    Science.gov (United States)

    Dańda, Jacek; Juszkiewicz, Krzysztof; Leszczuk, Mikołaj; Loziak, Krzysztof; Papir, Zdzisław; Sikora, Marek; Watza, Rafal

    2003-01-01

    The paper discusses two implementation options for a Digital Video Library, a repository used for archiving, accessing, and browsing of video medical records. Two crucial issues to be decided on are a video compression format and a video streaming platform. The paper presents numerous decision factors that have to be taken into account. The compression formats being compared are DICOM as a format representative for medical applications, both MPEGs, and several new formats targeted for an IP networking. The comparison includes transmission rates supported, compression rates, and at least options for controlling a compression process. The second part of the paper presents the ISDN technique as a solution for provisioning of tele-consultation services between medical parties that are accessing resources uploaded to a digital video library. There are several backbone techniques (like corporate LANs/WANs, leased lines or even radio/satellite links) available, however, the availability of network resources for hospitals was the prevailing choice criterion pointing to ISDN solutions. Another way to provide access to the Digital Video Library is based on radio frequency domain solutions. The paper describes possibilities of both, wireless and cellular network's data transmission service to be used as a medical video server transport layer. For the cellular net-work based solution two communication techniques are used: Circuit Switched Data and Packet Switched Data.

  19. CameraCast: flexible access to remote video sensors

    Science.gov (United States)

    Kong, Jiantao; Ganev, Ivan; Schwan, Karsten; Widener, Patrick

    2007-01-01

    New applications like remote surveillance and online environmental or traffic monitoring are making it increasingly important to provide flexible and protected access to remote video sensor devices. Current systems use application-level codes like web-based solutions to provide such access. This requires adherence to user-level APIs provided by such services, access to remote video information through given application-specific service and server topologies, and that the data being captured and distributed is manipulated by third party service codes. CameraCast is a simple, easily used system-level solution to remote video access. It provides a logical device API so that an application can identically operate on local vs. remote video sensor devices, using its own service and server topologies. In addition, the application can take advantage of API enhancements to protect remote video information, using a capability-based model for differential data protection that offers fine grain control over the information made available to specific codes or machines, thereby limiting their ability to violate privacy or security constraints. Experimental evaluations of CameraCast show that the performance of accessing remote video information approximates that of accesses to local devices, given sufficient networking resources. High performance is also attained when protection restrictions are enforced, due to an efficient kernel-level realization of differential data protection.

  20. Camera network video summarization

    Science.gov (United States)

    Panda, Rameswar; Roy-Chowdhury, Amit K.

    2017-05-01

    Networks of vision sensors are deployed in many settings, ranging from security needs to disaster response to environmental monitoring. Many of these setups have hundreds of cameras and tens of thousands of hours of video. The difficulty of analyzing such a massive volume of video data is apparent whenever there is an incident that requires foraging through vast video archives to identify events of interest. As a result, video summarization, that automatically extract a brief yet informative summary of these videos, has attracted intense attention in the recent years. Much progress has been made in developing a variety of ways to summarize a single video in form of a key sequence or video skim. However, generating a summary from a set of videos captured in a multi-camera network still remains as a novel and largely under-addressed problem. In this paper, with the aim of summarizing videos in a camera network, we introduce a novel representative selection approach via joint embedding and capped l21-norm minimization. The objective function is two-fold. The first is to capture the structural relationships of data points in a camera network via an embedding, which helps in characterizing the outliers and also in extracting a diverse set of representatives. The second is to use a capped l21-norm to model the sparsity and to suppress the influence of data outliers in representative selection. We propose to jointly optimize both of the objectives, such that embedding can not only characterize the structure, but also indicate the requirements of sparse representative selection. Extensive experiments on standard multi-camera datasets well demonstrate the efficacy of our method over state-of-the-art methods.

  1. Video frame processor

    International Nuclear Information System (INIS)

    Joshi, V.M.; Agashe, Alok; Bairi, B.R.

    1993-01-01

    This report provides technical description regarding the Video Frame Processor (VFP) developed at Bhabha Atomic Research Centre. The instrument provides capture of video images available in CCIR format. Two memory planes each with a capacity of 512 x 512 x 8 bit data enable storage of two video image frames. The stored image can be processed on-line and on-line image subtraction can also be carried out for image comparisons. The VFP is a PC Add-on board and is I/O mapped within the host IBM PC/AT compatible computer. (author). 9 refs., 4 figs., 19 photographs

  2. High Dynamic Range Video

    CERN Document Server

    Myszkowski, Karol

    2008-01-01

    This book presents a complete pipeline forHDR image and video processing fromacquisition, through compression and quality evaluation, to display. At the HDR image and video acquisition stage specialized HDR sensors or multi-exposure techniques suitable for traditional cameras are discussed. Then, we present a practical solution for pixel values calibration in terms of photometric or radiometric quantities, which are required in some technically oriented applications. Also, we cover the problem of efficient image and video compression and encoding either for storage or transmission purposes, in

  3. 3D video

    CERN Document Server

    Lucas, Laurent; Loscos, Céline

    2013-01-01

    While 3D vision has existed for many years, the use of 3D cameras and video-based modeling by the film industry has induced an explosion of interest for 3D acquisition technology, 3D content and 3D displays. As such, 3D video has become one of the new technology trends of this century.The chapters in this book cover a large spectrum of areas connected to 3D video, which are presented both theoretically and technologically, while taking into account both physiological and perceptual aspects. Stepping away from traditional 3D vision, the authors, all currently involved in these areas, provide th

  4. Collaborative Video Sketching

    DEFF Research Database (Denmark)

    Henningsen, Birgitte; Gundersen, Peter Bukovica; Hautopp, Heidi

    2017-01-01

    This paper introduces to what we define as a collaborative video sketching process. This process links various sketching techniques with digital storytelling approaches and creative reflection processes in video productions. Traditionally, sketching has been used by designers across various...... findings: 1) They are based on a collaborative approach. 2) The sketches act as a mean to externalizing hypotheses and assumptions among the participants. Based on our analysis we present an overview of factors involved in collaborative video sketching and shows how the factors relate to steps, where...... the participants: shape, record, review and edit their work, leading the participants to new insights about their work....

  5. Categorizing Video Game Audio

    DEFF Research Database (Denmark)

    Westerberg, Andreas Rytter; Schoenau-Fog, Henrik

    2015-01-01

    they can use audio in video games. The conclusion of this study is that the current models' view of the diegetic spaces, used to categorize video game audio, is not t to categorize all sounds. This can however possibly be changed though a rethinking of how the player interprets audio.......This paper dives into the subject of video game audio and how it can be categorized in order to deliver a message to a player in the most precise way. A new categorization, with a new take on the diegetic spaces, can be used a tool of inspiration for sound- and game-designers to rethink how...

  6. The assessment of online heath videos for surgery in Crohn's Disease.

    Science.gov (United States)

    Marshall, J H; Baker, D M; Lee, M J; Jones, G L; Lobo, A J; Brown, S R

    2018-02-10

    YouTube ™ is an open-access, non-peer reviewed video-hosting site and is used as a source of publicly available healthcare information. This study aimed to assess the thematic content of the most viewed videos relating to surgery and Crohn's Disease and to explore the viewer interactions to these videos. A search of YouTube ™ was carried out using one search string. The 50 most viewed videos were identified and categorised by source, content themes and assessed for viewer interactions. Video comments were used to describe the usefulness of the video content to viewers. The majority of videos were uploaded by patients (n=21).The remainder were uploaded by individual health care professionals (n=9), hospital/speciality associations (n=18) and industry (n=2). The median number of likes for patient videos was significantly higher than hospital/speciality association videos (p=content(n=27), and more comments asking for further information (n=14). The median number of likes for 'experience of surgery' (p=content of patient sourced videos focused on surgical and disease experience, suggesting these themes are important to patients.Current patient developed videos provide limited information, as reflected by viewers requesting further information. Storytelling patient-centred videos combined with clinical evidence may be a good model for future videos. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  7. Authorship and Moral Rights in Video Games

    Directory of Open Access Journals (Sweden)

    Julian Stein

    2015-10-01

    Full Text Available The complex and multimedia nature of video games results in several original and derivative works of copyright contained in a single game. Although there is no need to establish a new category of work and the current state of law offers comprehensive protection of the works, it also means there can be many different authors in a single production, so assignment of rights can be difficult.This interrelation of works and their respective authors can also have a negative effect on authors' moral rights, or, more specifically, the right to claim authorship and the right to object to derogatory treatment of the work.This article analyses the current law of the United Kingdom with regard to authorship and ownership of copyright in video games and underlying works before analysing and evaluating the moral rights of video games' contributors.

  8. Getting DNA copy numbers without control samples

    Directory of Open Access Journals (Sweden)

    Ortiz-Estevez Maria

    2012-08-01

    Full Text Available Abstract Background The selection of the reference to scale the data in a copy number analysis has paramount importance to achieve accurate estimates. Usually this reference is generated using control samples included in the study. However, these control samples are not always available and in these cases, an artificial reference must be created. A proper generation of this signal is crucial in terms of both noise and bias. We propose NSA (Normality Search Algorithm, a scaling method that works with and without control samples. It is based on the assumption that genomic regions enriched in SNPs with identical copy numbers in both alleles are likely to be normal. These normal regions are predicted for each sample individually and used to calculate the final reference signal. NSA can be applied to any CN data regardless the microarray technology and preprocessing method. It also finds an optimal weighting of the samples minimizing possible batch effects. Results Five human datasets (a subset of HapMap samples, Glioblastoma Multiforme (GBM, Ovarian, Prostate and Lung Cancer experiments have been analyzed. It is shown that using only tumoral samples, NSA is able to remove the bias in the copy number estimation, to reduce the noise and therefore, to increase the ability to detect copy number aberrations (CNAs. These improvements allow NSA to also detect recurrent aberrations more accurately than other state of the art methods. Conclusions NSA provides a robust and accurate reference for scaling probe signals data to CN values without the need of control samples. It minimizes the problems of bias, noise and batch effects in the estimation of CNs. Therefore, NSA scaling approach helps to better detect recurrent CNAs than current methods. The automatic selection of references makes it useful to perform bulk analysis of many GEO or ArrayExpress experiments without the need of developing a parser to find the normal samples or possible batches within the

  9. Getting DNA copy numbers without control samples.

    Science.gov (United States)

    Ortiz-Estevez, Maria; Aramburu, Ander; Rubio, Angel

    2012-08-16

    The selection of the reference to scale the data in a copy number analysis has paramount importance to achieve accurate estimates. Usually this reference is generated using control samples included in the study. However, these control samples are not always available and in these cases, an artificial reference must be created. A proper generation of this signal is crucial in terms of both noise and bias.We propose NSA (Normality Search Algorithm), a scaling method that works with and without control samples. It is based on the assumption that genomic regions enriched in SNPs with identical copy numbers in both alleles are likely to be normal. These normal regions are predicted for each sample individually and used to calculate the final reference signal. NSA can be applied to any CN data regardless the microarray technology and preprocessing method. It also finds an optimal weighting of the samples minimizing possible batch effects. Five human datasets (a subset of HapMap samples, Glioblastoma Multiforme (GBM), Ovarian, Prostate and Lung Cancer experiments) have been analyzed. It is shown that using only tumoral samples, NSA is able to remove the bias in the copy number estimation, to reduce the noise and therefore, to increase the ability to detect copy number aberrations (CNAs). These improvements allow NSA to also detect recurrent aberrations more accurately than other state of the art methods. NSA provides a robust and accurate reference for scaling probe signals data to CN values without the need of control samples. It minimizes the problems of bias, noise and batch effects in the estimation of CNs. Therefore, NSA scaling approach helps to better detect recurrent CNAs than current methods. The automatic selection of references makes it useful to perform bulk analysis of many GEO or ArrayExpress experiments without the need of developing a parser to find the normal samples or possible batches within the data. The method is available in the open-source R package

  10. Single-copy insertion of transgenes in Caenorhabditis elegans

    DEFF Research Database (Denmark)

    Frøkjaer-Jensen, Christian; Davis, M Wayne; Hopkins, Christopher E

    2008-01-01

    developed a method that inserts a single copy of a transgene into a defined site. Mobilization of a Mos1 transposon generates a double-strand break in noncoding DNA. The break is repaired by copying DNA from an extrachromosomal template into the chromosomal site. Homozygous single-copy insertions can...... be obtained in less than 2 weeks by injecting approximately 20 worms. We have successfully inserted transgenes as long as 9 kb and verified that single copies are inserted at the targeted site. Single-copy transgenes are expressed at endogenous levels and can be expressed in the female and male germlines....

  11. Parkinson's Disease Videos

    Medline Plus

    Full Text Available ... Nonmotor Symptoms of Parkinson's Disease Expert Briefings: Gait, Balance and Falls in Parkinson's Disease Expert Briefings: Coping ... Library is an extensive collection of books, fact sheets, videos, podcasts, and more. To get started, use ...

  12. Acoustic Neuroma Educational Video

    Medline Plus

    Full Text Available ... Facts What is acoustic neuroma? Diagnosing Symptoms Side Effects Keywords World Language Videos Questions to ask Choosing ... Surgery What is acoustic neuroma Diagnosing Symptoms Side effects Question To Ask Treatment Options Back Overview Observation ...

  13. Acoustic Neuroma Educational Video

    Medline Plus

    Full Text Available ... 8211 info@ANAUSA.org About ANA Mission, Vision & Values Leadership & Staff Annual Reports Shop ANA Home Learn Educational Video English English Arabic Catalan Chinese (Simplified) Chinese ( ...

  14. Videos, Podcasts and Livechats

    Medline Plus

    Full Text Available ... Care Disease Types FAQ Handout for Patients and Families Is It Right for You How to Get ... For the Media For Clinicians For Policymakers For Family Caregivers Glossary Menu In this section Links Videos ...

  15. Acoustic Neuroma Educational Video

    Medline Plus

    Full Text Available ... patient kit Treatment Options Overview Observation Radiation Surgery What is acoustic neuroma Diagnosing ... Back Community Patient Stories Share Your Story Video Stories Caregivers Milestones Gallery Submit Your Milestone Team ANA Volunteer ...

  16. Acoustic Neuroma Educational Video

    Medline Plus

    Full Text Available ... Support Groups Is a support group for me? Find a Group Upcoming Events Video Library Photo Gallery ... Support ANetwork Peer Support Program Community Connections Overview Find a Meeting Host a Meeting Volunteer Become a ...

  17. Photos and Videos

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Observers are required to take photos and/or videos of all incidentally caught sea turtles, marine mammals, seabirds and unusual or rare fish. On the first 3...

  18. Acoustic Neuroma Educational Video

    Medline Plus

    Full Text Available ... Mission, Vision & Values Shop ANA Leadership & Staff Annual Reports Acoustic Neuroma Association 600 Peachtree Parkway Suite 108 ... About ANA Mission, Vision & Values Leadership & Staff Annual Reports Shop ANA Home Learn Educational Video English English ...

  19. Videos, Podcasts and Livechats

    Medline Plus

    Full Text Available ... Search Search What Is It Definition Pediatric Palliative Care Disease Types FAQ Handout for Patients and Families ... For Family Caregivers Glossary Resources Browse our palliative care resources below: Links Videos Podcasts Webinars For the ...

  20. Acoustic Neuroma Educational Video

    Medline Plus

    Full Text Available ... About ANA Mission, Vision & Values Shop ANA Leadership & Staff Annual Reports Acoustic Neuroma Association 600 Peachtree Parkway ... ANAUSA.org About ANA Mission, Vision & Values Leadership & Staff Annual Reports Shop ANA Home Learn Educational Video ...

  1. Acoustic Neuroma Educational Video

    Medline Plus

    Full Text Available ... info@ANAUSA.org About ANA Mission, Vision & Values Leadership & Staff Annual Reports Shop ANA Home Learn Educational Video English English Arabic Catalan Chinese (Simplified) Chinese ( ...

  2. Videos, Podcasts and Livechats

    Medline Plus

    Full Text Available ... to your Doctor Find a Provider Meet the Team Blog Articles & Stories News Resources Links Videos Podcasts ... to your Doctor Find a Provider Meet the Team Blog Articles & Stories News Provider Directory Donate Resources ...

  3. Acoustic Neuroma Educational Video

    Medline Plus

    Full Text Available ... Click to learn more... LOGIN CALENDAR DONATE NEWS Home Learn Back Learn about acoustic neuroma AN Facts ... Vision & Values Leadership & Staff Annual Reports Shop ANA Home Learn Educational Video English English Arabic Catalan Chinese ( ...

  4. Videos, Podcasts and Livechats

    Medline Plus

    Full Text Available ... the Media For Clinicians For Policymakers For Family Caregivers Glossary Menu In this section Links Videos Podcasts ... the Media For Clinicians For Policymakers For Family Caregivers Glossary Resources Browse our palliative care resources below: ...

  5. Augmented video viewing: transforming video consumption into an active experience

    OpenAIRE

    WIJNANTS, Maarten; Leën, Jeroen; QUAX, Peter; LAMOTTE, Wim

    2014-01-01

    Traditional video productions fail to cater to the interactivity standards that the current generation of digitally native customers have become accustomed to. This paper therefore advertises the \\activation" of the video consumption process. In particular, it proposes to enhance HTML5 video playback with interactive features in order to transform video viewing into a dynamic pastime. The objective is to enable the authoring of more captivating and rewarding video experiences for end-users. T...

  6. Deception Detection in Videos

    OpenAIRE

    Wu, Zhe; Singh, Bharat; Davis, Larry S.; Subrahmanian, V. S.

    2017-01-01

    We present a system for covert automated deception detection in real-life courtroom trial videos. We study the importance of different modalities like vision, audio and text for this task. On the vision side, our system uses classifiers trained on low level video features which predict human micro-expressions. We show that predictions of high-level micro-expressions can be used as features for deception prediction. Surprisingly, IDT (Improved Dense Trajectory) features which have been widely ...

  7. Industrial-Strength Streaming Video.

    Science.gov (United States)

    Avgerakis, George; Waring, Becky

    1997-01-01

    Corporate training, financial services, entertainment, and education are among the top applications for streaming video servers, which send video to the desktop without downloading the whole file to the hard disk, saving time and eliminating copyrights questions. Examines streaming video technology, lists ten tips for better net video, and ranks…

  8. NEI You Tube Videos: Amblyopia

    Medline Plus

    Full Text Available ... search for current job openings visit HHS USAJobs Home >> NEI YouTube Videos >> NEI YouTube Videos: Amblyopia Listen NEI YouTube Videos YouTube Videos Home Age-Related Macular Degeneration Amblyopia Animations Blindness Cataract ...

  9. NEI You Tube Videos: Amblyopia

    Medline Plus

    Full Text Available ... Amaurosis Low Vision Refractive Errors Retinopathy of Prematurity Science Spanish Videos Webinars NEI YouTube Videos: Amblyopia Embedded video for NEI YouTube Videos: Amblyopia NEI Home Contact Us A-Z Site Map NEI on Social Media Information in Spanish (Información en español) Website, ...

  10. A Framework for Video Modeling

    NARCIS (Netherlands)

    Petkovic, M.; Jonker, Willem

    In recent years, research in video databases has increased greatly, but relatively little work has been done in the area of semantic content-based retrieval. In this paper, we present a framework for video modelling with emphasis on semantic content of video data. The video data model presented

  11. NEI You Tube Videos: Amblyopia

    Medline Plus

    Full Text Available ... search for current job openings visit HHS USAJobs Home » NEI YouTube Videos » NEI YouTube Videos: Amblyopia Listen NEI YouTube Videos YouTube Videos Home Age-Related Macular Degeneration Amblyopia Animations Blindness Cataract ...

  12. Robust video object cosegmentation.

    Science.gov (United States)

    Wang, Wenguan; Shen, Jianbing; Li, Xuelong; Porikli, Fatih

    2015-10-01

    With ever-increasing volumes of video data, automatic extraction of salient object regions became even more significant for visual analytic solutions. This surge has also opened up opportunities for taking advantage of collective cues encapsulated in multiple videos in a cooperative manner. However, it also brings up major challenges, such as handling of drastic appearance, motion pattern, and pose variations, of foreground objects as well as indiscriminate backgrounds. Here, we present a cosegmentation framework to discover and segment out common object regions across multiple frames and multiple videos in a joint fashion. We incorporate three types of cues, i.e., intraframe saliency, interframe consistency, and across-video similarity into an energy optimization framework that does not make restrictive assumptions on foreground appearance and motion model, and does not require objects to be visible in all frames. We also introduce a spatio-temporal scale-invariant feature transform (SIFT) flow descriptor to integrate across-video correspondence from the conventional SIFT-flow into interframe motion flow from optical flow. This novel spatio-temporal SIFT flow generates reliable estimations of common foregrounds over the entire video data set. Experimental results show that our method outperforms the state-of-the-art on a new extensive data set (ViCoSeg).

  13. Identification of copy number variants in horses

    KAUST Repository

    Doan, R.

    2012-03-01

    Copy number variants (CNVs) represent a substantial source of genetic variation in mammals. However, the occurrence of CNVs in horses and their subsequent impact on phenotypic variation is unknown. We performed a study to identify CNVs in 16 horses representing 15 distinct breeds (Equus caballus) and an individual gray donkey (Equus asinus) using a whole-exome tiling array and the array comparative genomic hybridization methodology. We identified 2368 CNVs ranging in size from 197 bp to 3.5 Mb. Merging identical CNVs from each animal yielded 775 CNV regions (CNVRs), involving 1707 protein- and RNA-coding genes. The number of CNVs per animal ranged from 55 to 347, with median and mean sizes of CNVs of 5.3 kb and 99.4 kb, respectively. Approximately 6% of the genes investigated were affected by a CNV. Biological process enrichment analysis indicated CNVs primarily affected genes involved in sensory perception, signal transduction, and metabolism. CNVs also were identified in genes regulating blood group antigens, coat color, fecundity, lactation, keratin formation, neuronal homeostasis, and height in other species. Collectively, these data are the first report of copy number variation in horses and suggest that CNVs are common in the horse genome and may modulate biological processes underlying different traits observed among horses and horse breeds.

  14. Hard-copy versus soft-copy with and without simple image manipulation for detection of pulmonary nodules and masses

    International Nuclear Information System (INIS)

    Kosuda, S.; Kaji, T.; Iwasaki, Y.; Kusano, S.; Kobayashi, H.; Watanabe, M.

    2000-01-01

    To compare interpretation performance on soft-copy presentations, with and without simple image manipulation, and on unmodified hard-copy presentations with regard to detection of pulmonary nodules and masses. Material and Methods: Fifty chest digital radiograph combinations of patients with a total of 60 nodules, 32 of which were 2.0 cm in diameter, were selected for the study. Three readers evaluated three separate image formats: unmodified hard- and soft-copies, and soft-copies with simple image manipulation of lung and mediastinum window settings, and zooming. The screen display was 1600x1200 pixels with 8 bits/pixel. Results: The sensitivity, accuracy, detectability, and Az value of the soft-copy systems were clearly inferior to hard-copy evaluation. The mean Az values were 0.921 for unmodified hard-copy, 0.820 for image-manipulated soft-copy, and 0.781 for unmodified soft-copy. Conclusion: Soft-copy interpretations were not as sensitive in detecting pulmonary nodules and masses as hard-copy evaluation

  15. Random Linear Network Coding for 5G Mobile Video Delivery

    Directory of Open Access Journals (Sweden)

    Dejan Vukobratovic

    2018-03-01

    Full Text Available An exponential increase in mobile video delivery will continue with the demand for higher resolution, multi-view and large-scale multicast video services. Novel fifth generation (5G 3GPP New Radio (NR standard will bring a number of new opportunities for optimizing video delivery across both 5G core and radio access networks. One of the promising approaches for video quality adaptation, throughput enhancement and erasure protection is the use of packet-level random linear network coding (RLNC. In this review paper, we discuss the integration of RLNC into the 5G NR standard, building upon the ideas and opportunities identified in 4G LTE. We explicitly identify and discuss in detail novel 5G NR features that provide support for RLNC-based video delivery in 5G, thus pointing out to the promising avenues for future research.

  16. Content-based video retrieval by example video clip

    Science.gov (United States)

    Dimitrova, Nevenka; Abdel-Mottaleb, Mohamed

    1997-01-01

    This paper presents a novel approach for video retrieval from a large archive of MPEG or Motion JPEG compressed video clips. We introduce a retrieval algorithm that takes a video clip as a query and searches the database for clips with similar contents. Video clips are characterized by a sequence of representative frame signatures, which are constructed from DC coefficients and motion information (`DC+M' signatures). The similarity between two video clips is determined by using their respective signatures. This method facilitates retrieval of clips for the purpose of video editing, broadcast news retrieval, or copyright violation detection.

  17. VideoSET: Video Summary Evaluation through Text

    OpenAIRE

    Yeung, Serena; Fathi, Alireza; Fei-Fei, Li

    2014-01-01

    In this paper we present VideoSET, a method for Video Summary Evaluation through Text that can evaluate how well a video summary is able to retain the semantic information contained in its original video. We observe that semantics is most easily expressed in words, and develop a text-based approach for the evaluation. Given a video summary, a text representation of the video summary is first generated, and an NLP-based metric is then used to measure its semantic distance to ground-truth text ...

  18. Comparing Android Applications to Find Copying

    Directory of Open Access Journals (Sweden)

    Larry Melling

    2012-03-01

    Full Text Available The Android smartphone operating system includes a Java mobile development platform that provides for rapid development and deployment of a wide variety of applications. The open nature of the platform means that reverse engineering of applications is relatively easy, and many developers are concerned as applications similar to their own show up in the Android marketplace and want to know if these applications are pirated. Fortunately, the same characteristics that make an Android application easy to reverse engineer and copy also provide opportunities for Android developers to compare downloaded applications to their own. This paper describes the process for comparing a developer’s application with a downloaded application and defines an identifiability metric to quantify the degree to which an application can be identified by its bytecode.

  19. Copy number variation in the bovine genome

    DEFF Research Database (Denmark)

    Fadista, João; Thomsen, Bo; Holm, Lars-Erik

    2010-01-01

    to genetic variation in cattle. Results We designed and used a set of NimbleGen CGH arrays that tile across the assayable portion of the cattle genome with approximately 6.3 million probes, at a median probe spacing of 301 bp. This study reports the highest resolution map of copy number variation...... in the cattle genome, with 304 CNV regions (CNVRs) being identified among the genomes of 20 bovine samples from 4 dairy and beef breeds. The CNVRs identified covered 0.68% (22 Mb) of the genome, and ranged in size from 1.7 to 2,031 kb (median size 16.7 kb). About 20% of the CNVs co-localized with segmental...... duplications, while 30% encompass genes, of which the majority is involved in environmental response. About 10% of the human orthologous of these genes are associated with human disease susceptibility and, hence, may have important phenotypic consequences. Conclusions Together, this analysis provides a useful...

  20. Deep video deblurring

    KAUST Repository

    Su, Shuochen

    2016-11-25

    Motion blur from camera shake is a major problem in videos captured by hand-held devices. Unlike single-image deblurring, video-based approaches can take advantage of the abundant information that exists across neighboring frames. As a result the best performing methods rely on aligning nearby frames. However, aligning images is a computationally expensive and fragile procedure, and methods that aggregate information must therefore be able to identify which regions have been accurately aligned and which have not, a task which requires high level scene understanding. In this work, we introduce a deep learning solution to video deblurring, where a CNN is trained end-to-end to learn how to accumulate information across frames. To train this network, we collected a dataset of real videos recorded with a high framerate camera, which we use to generate synthetic motion blur for supervision. We show that the features learned from this dataset extend to deblurring motion blur that arises due to camera shake in a wide range of videos, and compare the quality of results to a number of other baselines.

  1. The standardised copy of pentagons test

    Directory of Open Access Journals (Sweden)

    Terzoglou Vassiliki A

    2011-04-01

    Full Text Available Abstract Background The 'double-diamond copy' task is a simple paper and pencil test part of the Bender-Gestalt Test and the Mini Mental State Examination (MMSE. Although it is a widely used test, its method of scoring is crude and its psychometric properties are not adequately known. The aim of the present study was to develop a sensitive and reliable method of administration and scoring. Methods The study sample included 93 normal control subjects (53 women and 40 men aged 35.87 ± 12.62 and 127 patients suffering from schizophrenia (54 women and 73 men aged 34.07 ± 9.83. Results The scoring method was based on the frequencies of responses of healthy controls and proved to be relatively reliable with Cronbach's α equal to 0.61, test-retest correlation coefficient equal to 0.41 and inter-rater reliability equal to 0.52. The factor analysis produced two indices and six subscales of the Standardised Copy of Pentagons Test (SCPT. The total score as well as most of the individual items and subscales distinguished between controls and patients. The discriminant function correctly classified 63.44% of controls and 75.59% of patients. Discussion The SCPT seems to be a satisfactory, reliable and valid instrument, which is easy to administer, suitable for use in non-organic psychiatric patients and demands minimal time. Further research is necessary to test its psychometric properties and its usefulness and applications as a neuropsychological test.

  2. Selective encryption for H.264/AVC video coding

    Science.gov (United States)

    Shi, Tuo; King, Brian; Salama, Paul

    2006-02-01

    Due to the ease with which digital data can be manipulated and due to the ongoing advancements that have brought us closer to pervasive computing, the secure delivery of video and images has become a challenging problem. Despite the advantages and opportunities that digital video provide, illegal copying and distribution as well as plagiarism of digital audio, images, and video is still ongoing. In this paper we describe two techniques for securing H.264 coded video streams. The first technique, SEH264Algorithm1, groups the data into the following blocks of data: (1) a block that contains the sequence parameter set and the picture parameter set, (2) a block containing a compressed intra coded frame, (3) a block containing the slice header of a P slice, all the headers of the macroblock within the same P slice, and all the luma and chroma DC coefficients belonging to the all the macroblocks within the same slice, (4) a block containing all the ac coefficients, and (5) a block containing all the motion vectors. The first three are encrypted whereas the last two are not. The second method, SEH264Algorithm2, relies on the use of multiple slices per coded frame. The algorithm searches the compressed video sequence for start codes (0x000001) and then encrypts the next N bits of data.

  3. VNIIEF NMPC and A Maintenance Management Conference video surveillance

    International Nuclear Information System (INIS)

    Malone, T.

    1997-08-01

    This paper is part of ongoing Nuclear Materials Protection, Control and Accountability (NMPC and A) work with the All Russian Scientific Research Institute of Experimental Physics (VNIIEF), Sarov, Russia. The material presented in the paper is to provide guidance for the preparation of maintenance management for NMPC and A video assessment and surveillance subsystems being installed at VNIIEF. This paper discusses maintenance philosophies, performance testing, equipment inspection/setup, and record keeping for a video assessment and surveillance subsystem

  4. Ocean Science Video Challenge Aims to Improve Science Communication

    Science.gov (United States)

    Showstack, Randy

    2013-10-01

    Given today's enormous management and protection challenges related to the world's oceans, a new competition calls on ocean scientists to effectively communicate their research in videos that last up to 3 minutes. The Ocean 180 Video Challenge, named for the number of seconds in 3 minutes, aims to improve ocean science communication while providing high school and middle school teachers and students with new and interesting educational materials about current science topics.

  5. Multiple-copy entanglement transformation and entanglement catalysis

    International Nuclear Information System (INIS)

    Duan Runyao; Feng Yuan; Li Xin; Ying Mingsheng

    2005-01-01

    We prove that any multiple-copy entanglement transformation [S. Bandyopadhyay, V. Roychowdhury, and U. Sen, Phys. Rev. A 65, 052315 (2002)] can be implemented by a suitable entanglement-assisted local transformation [D. Jonathan and M. B. Plenio, Phys. Rev. Lett. 83, 3566 (1999)]. Furthermore, we show that the combination of multiple-copy entanglement transformation and the entanglement-assisted one is still equivalent to the pure entanglement-assisted one. The mathematical structure of multiple-copy entanglement transformations then is carefully investigated. Many interesting properties of multiple-copy entanglement transformations are presented, which exactly coincide with those satisfied by the entanglement-assisted ones. Most interestingly, we show that an arbitrarily large number of copies of state should be considered in multiple-copy entanglement transformations

  6. Brains on video games.

    Science.gov (United States)

    Bavelier, Daphne; Green, C Shawn; Han, Doug Hyun; Renshaw, Perry F; Merzenich, Michael M; Gentile, Douglas A

    2011-11-18

    The popular press is replete with stories about the effects of video and computer games on the brain. Sensationalist headlines claiming that video games 'damage the brain' or 'boost brain power' do not do justice to the complexities and limitations of the studies involved, and create a confusing overall picture about the effects of gaming on the brain. Here, six experts in the field shed light on our current understanding of the positive and negative ways in which playing video games can affect cognition and behaviour, and explain how this knowledge can be harnessed for educational and rehabilitation purposes. As research in this area is still in its early days, the contributors of this Viewpoint also discuss several issues and challenges that should be addressed to move the field forward.

  7. 38 CFR 1.526 - Copies of records and papers.

    Science.gov (United States)

    2010-07-01

    ... papers. 1.526 Section 1.526 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS... Copies of records and papers. (a) Any person desiring a copy of any record or document in the custody of... plain one-sided paper copies of a standard size (81/2″ × 11″; 81/2″ × 14″; 11″ × 14″) $0.15 per page...

  8. Video-based rendering

    CERN Document Server

    Magnor, Marcus A

    2005-01-01

    Driven by consumer-market applications that enjoy steadily increasing economic importance, graphics hardware and rendering algorithms are a central focus of computer graphics research. Video-based rendering is an approach that aims to overcome the current bottleneck in the time-consuming modeling process and has applications in areas such as computer games, special effects, and interactive TV. This book offers an in-depth introduction to video-based rendering, a rapidly developing new interdisciplinary topic employing techniques from computer graphics, computer vision, and telecommunication en

  9. CERN Video News

    CERN Document Server

    2003-01-01

    From Monday you can see on the web the new edition of CERN's Video News. Thanks to a collaboration between the audiovisual teams at CERN and Fermilab, you can see a report made by the American laboratory. The clip concerns the LHC magnets that are being constructed at Fermilab. Also in the programme: the spectacular rotation of one of the ATLAS coils, the arrival at CERN of the first American magnet made at Brookhaven, the story of the discovery 20 years ago of the W and Z bosons at CERN. http://www.cern.ch/video or Bulletin web page.

  10. Contextual analysis of videos

    CERN Document Server

    Thida, Myo; Monekosso, Dorothy

    2013-01-01

    Video context analysis is an active and vibrant research area, which provides means for extracting, analyzing and understanding behavior of a single target and multiple targets. Over the last few decades, computer vision researchers have been working to improve the accuracy and robustness of algorithms to analyse the context of a video automatically. In general, the research work in this area can be categorized into three major topics: 1) counting number of people in the scene 2) tracking individuals in a crowd and 3) understanding behavior of a single target or multiple targets in the scene.

  11. CS Seminar Videos

    OpenAIRE

    Ong, Derek; Tona, Glen; Gibb, Kyle; Parbadia, Sivani

    2013-01-01

    Main site for our project can be found at this URL: http://vtechworks.lib.vt.edu/handle/10919/19036. From here you can find videos of all the CS seminars and distinguished lectures given this semester. Each video has its own abstract and description. The files attached in this section are a final report in both raw Word Document and archival PDF formats and a presentation in both raw Powerpoint and archival PDF formats. Computer Science seminars are a very educational and interesting as...

  12. Video library for video imaging detection at intersection stop lines.

    Science.gov (United States)

    2010-04-01

    The objective of this activity was to record video that could be used for controlled : evaluation of video image vehicle detection system (VIVDS) products and software upgrades to : existing products based on a list of conditions that might be diffic...

  13. Potential usefulness of a video printer for producing secondary images from digitized chest radiographs

    Science.gov (United States)

    Nishikawa, Robert M.; MacMahon, Heber; Doi, Kunio; Bosworth, Eric

    1991-05-01

    Communication between radiologists and clinicians could be improved if a secondary image (copy of the original image) accompanied the radiologic report. In addition, the number of lost original radiographs could be decreased, since clinicians would have less need to borrow films. The secondary image should be simple and inexpensive to produce, while providing sufficient image quality for verification of the diagnosis. We are investigating the potential usefulness of a video printer for producing copies of radiographs, i.e. images printed on thermal paper. The video printer we examined (Seikosha model VP-3500) can provide 64 shades of gray. It is capable of recording images up to 1,280 pixels by 1,240 lines and can accept any raster-type video signal. The video printer was characterized in terms of its linearity, contrast, latitude, resolution, and noise properties. The quality of video-printer images was also evaluated in an observer study using portable chest radiographs. We found that observers could confirm up to 90 of the reported findings in the thorax using video- printer images, when the original radiographs were of high quality. The number of verified findings was diminished when high spatial resolution was required (e.g. detection of a subtle pneumothorax) or when a low-contrast finding was located in the mediastinal area or below the diaphragm (e.g. nasogastric tubes).

  14. The LivePhoto Physics videos and video analysis site

    Science.gov (United States)

    Abbott, David

    2009-09-01

    The LivePhoto site is similar to an archive of short films for video analysis. Some videos have Flash tools for analyzing the video embedded in the movie. Most of the videos address mechanics topics with titles like Rolling Pencil (check this one out for pedagogy and content knowledge—nicely done!), Juggler, Yo-yo, Puck and Bar (this one is an inelastic collision with rotation), but there are a few titles in other areas (E&M, waves, thermo, etc.).

  15. Multi-Task Video Captioning with Video and Entailment Generation

    OpenAIRE

    Pasunuru, Ramakanth; Bansal, Mohit

    2017-01-01

    Video captioning, the task of describing the content of a video, has seen some promising improvements in recent years with sequence-to-sequence models, but accurately learning the temporal and logical dynamics involved in the task still remains a challenge, especially given the lack of sufficient annotated data. We improve video captioning by sharing knowledge with two related directed-generation tasks: a temporally-directed unsupervised video prediction task to learn richer context-aware vid...

  16. Innovative Solution to Video Enhancement

    Science.gov (United States)

    2001-01-01

    Through a licensing agreement, Intergraph Government Solutions adapted a technology originally developed at NASA's Marshall Space Flight Center for enhanced video imaging by developing its Video Analyst(TM) System. Marshall's scientists developed the Video Image Stabilization and Registration (VISAR) technology to help FBI agents analyze video footage of the deadly 1996 Olympic Summer Games bombing in Atlanta, Georgia. VISAR technology enhanced nighttime videotapes made with hand-held camcorders, revealing important details about the explosion. Intergraph's Video Analyst System is a simple, effective, and affordable tool for video enhancement and analysis. The benefits associated with the Video Analyst System include support of full-resolution digital video, frame-by-frame analysis, and the ability to store analog video in digital format. Up to 12 hours of digital video can be stored and maintained for reliable footage analysis. The system also includes state-of-the-art features such as stabilization, image enhancement, and convolution to help improve the visibility of subjects in the video without altering underlying footage. Adaptable to many uses, Intergraph#s Video Analyst System meets the stringent demands of the law enforcement industry in the areas of surveillance, crime scene footage, sting operations, and dash-mounted video cameras.

  17. Practical method for appearance match between soft copy and hard copy

    Science.gov (United States)

    Katoh, Naoya

    1994-04-01

    CRT monitors are often used as a soft proofing device for the hard copy image output. However, what the user sees on the monitor does not match its output, even if the monitor and the output device are calibrated with CIE/XYZ or CIE/Lab. This is especially obvious when correlated color temperature (CCT) of CRT monitor's white point significantly differs from ambient light. In a typical office environment, one uses a computer graphic monitor having a CCT of 9300K in a room of white fluorescent light of 4150K CCT. In such a case, human visual system is partially adapted to the CRT monitor's white point and partially to the ambient light. The visual experiments were performed on the effect of the ambient lighting. Practical method for soft copy color reproduction that matches the hard copy image in appearance is presented in this paper. This method is fundamentally based on a simple von Kries' adaptation model and takes into account the human visual system's partial adaptation and contrast matching.

  18. Guerrilla Video: A New Protocol for Producing Classroom Video

    Science.gov (United States)

    Fadde, Peter; Rich, Peter

    2010-01-01

    Contemporary changes in pedagogy point to the need for a higher level of video production value in most classroom video, replacing the default video protocol of an unattended camera in the back of the classroom. The rich and complex environment of today's classroom can be captured more fully using the higher level, but still easily manageable,…

  19. Streaming Video--The Wave of the Video Future!

    Science.gov (United States)

    Brown, Laura

    2004-01-01

    Videos and DVDs give the teachers more flexibility than slide projectors, filmstrips, and 16mm films but teachers and students are excited about a new technology called streaming. Streaming allows the educators to view videos on demand via the Internet, which works through the transfer of digital media like video, and voice data that is received…

  20. Video Vectorization via Tetrahedral Remeshing.

    Science.gov (United States)

    Wang, Chuan; Zhu, Jie; Guo, Yanwen; Wang, Wenping

    2017-02-09

    We present a video vectorization method that generates a video in vector representation from an input video in raster representation. A vector-based video representation offers the benefits of vector graphics, such as compactness and scalability. The vector video we generate is represented by a simplified tetrahedral control mesh over the spatial-temporal video volume, with color attributes defined at the mesh vertices. We present novel techniques for simplification and subdivision of a tetrahedral mesh to achieve high simplification ratio while preserving features and ensuring color fidelity. From an input raster video, our method is capable of generating a compact video in vector representation that allows a faithful reconstruction with low reconstruction errors.

  1. Video Pedagogy as Political Activity.

    Science.gov (United States)

    Higgins, John W.

    1991-01-01

    Asserts that the education of students in the technology of video and audio production is a political act. Discusses the structure and style of production, and the ideologies and values contained therein. Offers alternative approaches to critical video pedagogy. (PRA)

  2. Rheumatoid Arthritis Educational Video Series

    Medline Plus

    Full Text Available ... will allow you to take a more active role in your care. The information in these videos ... Stategies to Increase your Level of Physical Activity Role of Body Weight in Osteoarthritis Educational Videos for ...

  3. NEI You Tube Videos: Amblyopia

    Medline Plus

    Full Text Available ... Eye Disease Dilated Eye Exam Dry Eye For Kids Glaucoma Healthy Vision Tips Leber Congenital Amaurosis Low Vision Refractive Errors Retinopathy of Prematurity Science Spanish Videos Webinars NEI YouTube Videos: Amblyopia Embedded ...

  4. Rheumatoid Arthritis Educational Video Series

    Medline Plus

    Full Text Available ... of Body Weight in Osteoarthritis Educational Videos for Patients Rheumatoid Arthritis Educational Video Series Psoriatic Arthritis 101 ... Patient to an Adult Rheumatologist Drug Information for Patients Arthritis Drug Information Sheets Benefits and Risks of ...

  5. Talking Video in 'Everyday Life'

    DEFF Research Database (Denmark)

    McIlvenny, Paul

    For better or worse, video technologies have made their way into many domains of social life, for example in the domain of therapeutics. Techniques such as Marte Meo, Video Interaction Guidance (ViG), Video-Enhanced Reflection on Communication, Video Home Training and Video intervention....../prevention (VIP) all promote the use of video as a therapeutic tool. This paper focuses on media therapeutics and the various in situ uses of video technologies in the mass media for therapeutic purposes. Reality TV parenting programmes such as Supernanny, Little Angels, The House of Tiny Tearaways, Honey, We...... observation and instruction (directives) relayed across different spaces; 2) the use of recorded video by participants to visualise, spatialise and localise talk and action that is distant in time and/or space; 3) the translating, stretching and cutting of social experience in and through the situated use...

  6. Parkinson's Disease Videos

    Medline Plus

    Full Text Available ... Is Initiated After Diagnosis? CareMAP: When Is It Time to Get Help? Unconditional Love CareMAP: Rest and Sleep: ... CareMAP: Mealtime and Swallowing: Part 1 ... of books, fact sheets, videos, podcasts, and more. To get started, use the search feature or check ...

  7. Fermilab | Publications and Videos

    Science.gov (United States)

    collection of particle physics books and journals. The Library also offers a range of services including Benefits Milestones Photos and videos Latest news For the media Particle Physics Neutrinos Fermilab and the computing Quantum initiatives Research and development Key discoveries Benefits of particle physics Particle

  8. Video processing project

    CSIR Research Space (South Africa)

    Globisch, R

    2009-03-01

    Full Text Available Video processing source code for algorithms and tools used in software media pipelines (e.g. image scalers, colour converters, etc.) The currently available source code is written in C++ with their associated libraries and DirectShow- Filters....

  9. Videos, Podcasts and Livechats

    Medline Plus

    Full Text Available ... Provider Meet the Team Blog Articles & Stories News Provider Directory Donate Resources Links Videos Podcasts Webinars For the Media For Clinicians For Policymakers For Family Caregivers Glossary Sign Up for ... Us Provider Directory What Is Palliative Care Definition Disease Types ...

  10. Video Game Controversies.

    Science.gov (United States)

    Funk, Jeanne B.; Buchman, Debra D.

    1995-01-01

    Reviews the literature on: (1) health-related effects of video games (VGs), including seizures, physiologic responses, and musculoskeletal injuries; (2) eye-hand coordination in VGs; (3) psychological adjustment related to VGs, including possible psychopathologies and violence-related effects; and (4) the educational impact of VGs. Also examines…

  11. Acoustic Neuroma Educational Video

    Medline Plus

    Full Text Available ... 30041 770-205-8211 info@ANAUSA.org The world’s #1 acoustic neuroma resource Click to learn more... ... is acoustic neuroma? Diagnosing Symptoms Side Effects Keywords World Language Videos Questions to ask Choosing a healthcare ...

  12. Mobiele video voor bedrijfscommunicatie

    NARCIS (Netherlands)

    Niamut, O.A.; Weerdt, C.A. van der; Havekes, A.

    2009-01-01

    Het project Penta Mobilé liep van juni tot november 2009 en had als doel de mogelijkheden van mobiele video voor bedrijfscommunicatie toepassingen in kaart te brengen. Dit onderzoek werd uitgevoerd samen met vijf (‘Penta’) partijen: Business Tales, Condor Digital, European Communication Projects

  13. Characteristics of Instructional Videos

    Science.gov (United States)

    Beheshti, Mobina; Taspolat, Ata; Kaya, Omer Sami; Sapanca, Hamza Fatih

    2018-01-01

    Nowadays, video plays a significant role in education in terms of its integration into traditional classes, the principal delivery system of information in classes particularly in online courses as well as serving as a foundation of many blended classes. Hence, education is adopting a modern approach of instruction with the target of moving away…

  14. Tracing Sequential Video Production

    DEFF Research Database (Denmark)

    Otrel-Cass, Kathrin; Khalid, Md. Saifuddin

    2015-01-01

    , for one week in 2014, and collected and analyzed visual data to learn about scientists’ practices. The visual material that was collected represented the agreed on material artifacts that should aid the students' reflective process to make sense of science technology practices. It was up to the student...... video, nature of the interactional space, and material and spatial semiotics....

  15. Fast Aerial Video Stitching

    Directory of Open Access Journals (Sweden)

    Jing Li

    2014-10-01

    Full Text Available The highly efficient and robust stitching of aerial video captured by unmanned aerial vehicles (UAVs is a challenging problem in the field of robot vision. Existing commercial image stitching systems have seen success with offline stitching tasks, but they cannot guarantee high-speed performance when dealing with online aerial video sequences. In this paper, we present a novel system which has an unique ability to stitch high-frame rate aerial video at a speed of 150 frames per second (FPS. In addition, rather than using a high-speed vision platform such as FPGA or CUDA, our system is running on a normal personal computer. To achieve this, after the careful comparison of the existing invariant features, we choose the FAST corner and binary descriptor for efficient feature extraction and representation, and present a spatial and temporal coherent filter to fuse the UAV motion information into the feature matching. The proposed filter can remove the majority of feature correspondence outliers and significantly increase the speed of robust feature matching by up to 20 times. To achieve a balance between robustness and efficiency, a dynamic key frame-based stitching framework is used to reduce the accumulation errors. Extensive experiments on challenging UAV datasets demonstrate that our approach can break through the speed limitation and generate an accurate stitching image for aerial video stitching tasks.

  16. Video narrativer i sygeplejerskeuddannelsen

    DEFF Research Database (Denmark)

    Jensen, Inger

    2009-01-01

    I artiklen gives nogle bud på hvordan video narrativer kan bruges i sygeplejerskeuddannelsen som triggers, der åbner for diskussioner og udvikling af meningsfulde holdninger til medmennesker. Det belyses også hvordan undervisere i deres didaktiske overvejelser kan inddrage elementer fra teori om...

  17. Copy Number Variations in Tilapia Genomes.

    Science.gov (United States)

    Li, Bi Jun; Li, Hong Lian; Meng, Zining; Zhang, Yong; Lin, Haoran; Yue, Gen Hua; Xia, Jun Hong

    2017-02-01

    Discovering the nature and pattern of genome variation is fundamental in understanding phenotypic diversity among populations. Although several millions of single nucleotide polymorphisms (SNPs) have been discovered in tilapia, the genome-wide characterization of larger structural variants, such as copy number variation (CNV) regions has not been carried out yet. We conducted a genome-wide scan for CNVs in 47 individuals from three tilapia populations. Based on 254 Gb of high-quality paired-end sequencing reads, we identified 4642 distinct high-confidence CNVs. These CNVs account for 1.9% (12.411 Mb) of the used Nile tilapia reference genome. A total of 1100 predicted CNVs were found overlapping with exon regions of protein genes. Further association analysis based on linear model regression found 85 CNVs ranging between 300 and 27,000 base pairs significantly associated to population types (R 2  > 0.9 and P > 0.001). Our study sheds first insights on genome-wide CNVs in tilapia. These CNVs among and within tilapia populations may have functional effects on phenotypes and specific adaptation to particular environments.

  18. Social Properties of Mobile Video

    Science.gov (United States)

    Mitchell, April Slayden; O'Hara, Kenton; Vorbau, Alex

    Mobile video is now an everyday possibility with a wide array of commercially available devices, services, and content. These new technologies have created dramatic shifts in the way video-based media can be produced, consumed, and delivered by people beyond the familiar behaviors associated with fixed TV and video technologies. Such technology revolutions change the way users behave and change their expectations in regards to their mobile video experiences. Building upon earlier studies of mobile video, this paper reports on a study using diary techniques and ethnographic interviews to better understand how people are using commercially available mobile video technologies in their everyday lives. Drawing on reported episodes of mobile video behavior, the study identifies the social motivations and values underpinning these behaviors that help characterize mobile video consumption beyond the simplistic notion of viewing video only to kill time. This paper also discusses the significance of user-generated content and the usage of video in social communities through the description of two mobile video technology services that allow users to create and share content. Implications for adoption and design of mobile video technologies and services are discussed as well.

  19. Putting Your Camp on Video.

    Science.gov (United States)

    Peterson, Michael

    1997-01-01

    Creating a video to use in marketing camp involves selecting a format, writing the script, determining the video's length, obtaining release forms from campers who appear in the video, determining strategies for filming, choosing a narrator, and renting a studio and a mixing engineer (videotape editor). Includes distribution tips. (LP)

  20. Rheumatoid Arthritis Educational Video Series

    Medline Plus

    Full Text Available ... Corner / Patient Webcasts / Rheumatoid Arthritis Educational Video Series Rheumatoid Arthritis Educational Video Series This series of five videos ... Your Arthritis Managing Chronic Pain and Depression in Arthritis Nutrition & Rheumatoid Arthritis Arthritis and Health-related Quality of Life ...

  1. Contemplation, Subcreation, and Video Games

    Directory of Open Access Journals (Sweden)

    Mark J. P. Wolf

    2018-04-01

    Full Text Available This essay asks how religion and theological ideas might be made manifest in video games, and particularly the creation of video games as a religious activity, looking at contemplative experiences in video games, and the creation and world-building of game worlds as a form of Tolkienian subcreation, which itself leads to contemplation regarding the creation of worlds.

  2. CERN Video News on line

    CERN Multimedia

    2003-01-01

    The latest CERN video news is on line. In this issue : an interview with the Director General and reports on the new home for the DELPHI barrel and the CERN firemen's spectacular training programme. There's also a vintage video news clip from 1954. See: www.cern.ch/video or Bulletin web page

  3. Vocal copying of individually distinctive signature whistles in bottlenose dolphins

    Science.gov (United States)

    King, Stephanie L.; Sayigh, Laela S.; Wells, Randall S.; Fellner, Wendi; Janik, Vincent M.

    2013-01-01

    Vocal learning is relatively common in birds but less so in mammals. Sexual selection and individual or group recognition have been identified as major forces in its evolution. While important in the development of vocal displays, vocal learning also allows signal copying in social interactions. Such copying can function in addressing or labelling selected conspecifics. Most examples of addressing in non-humans come from bird song, where matching occurs in an aggressive context. However, in other animals, addressing with learned signals is very much an affiliative signal. We studied the function of vocal copying in a mammal that shows vocal learning as well as complex cognitive and social behaviour, the bottlenose dolphin (Tursiops truncatus). Copying occurred almost exclusively between close associates such as mother–calf pairs and male alliances during separation and was not followed by aggression. All copies were clearly recognizable as such because copiers consistently modified some acoustic parameters of a signal when copying it. We found no evidence for the use of copying in aggression or deception. This use of vocal copying is similar to its use in human language, where the maintenance of social bonds appears to be more important than the immediate defence of resources. PMID:23427174

  4. 48 CFR 6302.25 - Copies of papers (Rule 25).

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Copies of papers (Rule 25). 6302.25 Section 6302.25 Federal Acquisition Regulations System DEPARTMENT OF TRANSPORTATION BOARD OF CONTRACT APPEALS RULES OF PROCEDURE 6302.25 Copies of papers (Rule 25). When books, records, papers, or...

  5. 19 CFR 210.55 - Content of service copies.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Content of service copies. 210.55 Section 210.55 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Temporary Relief § 210.55 Content of service copies. (a) Any...

  6. 44 CFR 5.85 - Authentication and attestation of copies.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Authentication and attestation of copies. 5.85 Section 5.85 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT... Authentication and attestation of copies. The Administrator, Deputy Administrators, Regional Administrators...

  7. Systematic biases in DNA copy number originate from isolation procedures

    NARCIS (Netherlands)

    van Heesch, S.; Mokry, M.; Boskova, V.; Junker, W.; Mehon, R.; Toonen, P.; de Bruijn, E.; Shull, J.D.; Aitman, T.J.; Cuppen, E.; Guryev, V.

    2013-01-01

    BACKGROUND: The ability to accurately detect DNA copy number variation in both a sensitive and quantitative manner is important in many research areas. However, genome-wide DNA copy number analyses are complicated by variations in detection signal. RESULTS: While GC content has been used to correct

  8. 25 CFR 571.13 - Copies of audit reports.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Copies of audit reports. 571.13 Section 571.13 Indians... MONITORING AND INVESTIGATIONS Audits § 571.13 Copies of audit reports. (a) Each tribe shall prepare and.../or reports as a result of the audit setting forth the results of each fiscal year. The submission...

  9. 1 CFR 18.1 - Original and copies required.

    Science.gov (United States)

    2010-01-01

    ... 1 General Provisions 1 2010-01-01 2010-01-01 false Original and copies required. 18.1 Section 18.1... PROCESSING OF DOCUMENTS PREPARATION AND TRANSMITTAL OF DOCUMENTS GENERALLY § 18.1 Original and copies... agency submitting a document to be filed and published in the Federal Register shall send an original and...

  10. The double copy: Bremsstrahlung and accelerating black holes

    CERN Document Server

    Luna, Andres; Nicholson, Isobel; O'Connell, Donal; White, Chris D

    2016-01-01

    Advances in our understanding of perturbation theory suggest the existence of a correspondence between classical general relativity and Yang-Mills theory. A concrete example of this correspondence, which is known as the double copy, was recently introduced for the case of stationary Kerr-Schild spacetimes. Building on this foundation, we examine the simple time-dependent case of an accelerating, radiating point source. The gravitational solution, which generalises the Schwarzschild solution, includes a non-trivial stress-energy tensor. This stress-energy tensor corresponds to a gauge theoretic current in the double copy. We interpret both of these sources as representing the radiative part of the field. Furthermore, in the simple example of Bremsstrahlung, we determine a scattering amplitude describing the radiation, maintaining the double copy throughout. Our results provide the strongest evidence yet that the classical double copy is directly related to the BCJ double copy for scattering amplitudes.

  11. Mitochondrial DNA Copy Number in Sleep Duration Discordant Monozygotic Twins

    DEFF Research Database (Denmark)

    Wrede, Joanna E; Mengel-From, Jonas; Buchwald, Dedra

    2015-01-01

    STUDY OBJECTIVES: Mitochondrial DNA (mtDNA) copy number is an important component of mitochondrial function and varies with age, disease, and environmental factors. We aimed to determine whether mtDNA copy number varies with habitual differences in sleep duration within pairs of monozygotic twins...... structure to assess within-pair effects of sleep duration on mtDNA copy number. MEASUREMENTS AND RESULTS: Mean within-pair sleep duration difference per 24 hours was 94.3 minutes (SD 62.6 min). We found reduced sleep duration (β = 0.06; 95% CI 0.004, 0.12; P sleep efficiency (β = 0.51; 95% CI 0.......06, 0.95; P DNA copy number within twin pairs. Thus every 1-minute decrease in actigraphy-defined sleep duration was associated with a decrease in mtDNA copy number of 0.06. Likewise, a 1% decrease in actigraphy-defined sleep efficiency was associated...

  12. Converting hard copy documents for electronic dissemination

    Energy Technology Data Exchange (ETDEWEB)

    Hoffman, F.

    1994-12-31

    Since the advent of computer systems, the goal of a paperless office, and even a paperless society, has been pursued. While the normal paper flow in an organization is far from totally automated, particularly for items requiring signatures or authorizations, electronic information dissemination is becoming an almost simple task. The reasons for providing on-line documents are many and include faster and easier access for everyone, elimination of printing costs, reduction of wasted shelf and desk space, and the security of having a centrally-located, always up-to-date document. New computer software even provides the user with the ability to annotate documents and to have bookmarks so that the old scribbled-in and dog-eared manual can be replaced without loosing this `customizability`. Moreover, new hypermedia capabilities mean that documents can be read in a non-linear fashion and can include color figures and photographs, audio, and even animation sequences, capabilities which exceed those of paper. The proliferation of network-based information servers, coupled with the growth of the Internet, has enticed academic, governmental, and even commercial organizations to provide increasing numbers of documents and data bases in electronic form via the network, not just to internal staff, but to the public as well. Much of this information, which includes everything from mundane company procedures to spiffy marketing brochures, was previously published only in hard copy. Converting existing documents to electronic form and producing only electronic versions of new documents poses some interesting challenges to the maintainer or author.

  13. Copy Number Variation in the Horse Genome

    Science.gov (United States)

    Ghosh, Sharmila; Qu, Zhipeng; Das, Pranab J.; Fang, Erica; Juras, Rytis; Cothran, E. Gus; McDonell, Sue; Kenney, Daniel G.; Lear, Teri L.; Adelson, David L.; Chowdhary, Bhanu P.; Raudsepp, Terje

    2014-01-01

    We constructed a 400K WG tiling oligoarray for the horse and applied it for the discovery of copy number variations (CNVs) in 38 normal horses of 16 diverse breeds, and the Przewalski horse. Probes on the array represented 18,763 autosomal and X-linked genes, and intergenic, sub-telomeric and chrY sequences. We identified 258 CNV regions (CNVRs) across all autosomes, chrX and chrUn, but not in chrY. CNVs comprised 1.3% of the horse genome with chr12 being most enriched. American Miniature horses had the highest and American Quarter Horses the lowest number of CNVs in relation to Thoroughbred reference. The Przewalski horse was similar to native ponies and draft breeds. The majority of CNVRs involved genes, while 20% were located in intergenic regions. Similar to previous studies in horses and other mammals, molecular functions of CNV-associated genes were predominantly in sensory perception, immunity and reproduction. The findings were integrated with previous studies to generate a composite genome-wide dataset of 1476 CNVRs. Of these, 301 CNVRs were shared between studies, while 1174 were novel and require further validation. Integrated data revealed that to date, 41 out of over 400 breeds of the domestic horse have been analyzed for CNVs, of which 11 new breeds were added in this study. Finally, the composite CNV dataset was applied in a pilot study for the discovery of CNVs in 6 horses with XY disorders of sexual development. A homozygous deletion involving AKR1C gene cluster in chr29 in two affected horses was considered possibly causative because of the known role of AKR1C genes in testicular androgen synthesis and sexual development. While the findings improve and integrate the knowledge of CNVs in horses, they also show that for effective discovery of variants of biomedical importance, more breeds and individuals need to be analyzed using comparable methodological approaches. PMID:25340504

  14. Copy number variation in the horse genome.

    Directory of Open Access Journals (Sweden)

    Sharmila Ghosh

    2014-10-01

    Full Text Available We constructed a 400K WG tiling oligoarray for the horse and applied it for the discovery of copy number variations (CNVs in 38 normal horses of 16 diverse breeds, and the Przewalski horse. Probes on the array represented 18,763 autosomal and X-linked genes, and intergenic, sub-telomeric and chrY sequences. We identified 258 CNV regions (CNVRs across all autosomes, chrX and chrUn, but not in chrY. CNVs comprised 1.3% of the horse genome with chr12 being most enriched. American Miniature horses had the highest and American Quarter Horses the lowest number of CNVs in relation to Thoroughbred reference. The Przewalski horse was similar to native ponies and draft breeds. The majority of CNVRs involved genes, while 20% were located in intergenic regions. Similar to previous studies in horses and other mammals, molecular functions of CNV-associated genes were predominantly in sensory perception, immunity and reproduction. The findings were integrated with previous studies to generate a composite genome-wide dataset of 1476 CNVRs. Of these, 301 CNVRs were shared between studies, while 1174 were novel and require further validation. Integrated data revealed that to date, 41 out of over 400 breeds of the domestic horse have been analyzed for CNVs, of which 11 new breeds were added in this study. Finally, the composite CNV dataset was applied in a pilot study for the discovery of CNVs in 6 horses with XY disorders of sexual development. A homozygous deletion involving AKR1C gene cluster in chr29 in two affected horses was considered possibly causative because of the known role of AKR1C genes in testicular androgen synthesis and sexual development. While the findings improve and integrate the knowledge of CNVs in horses, they also show that for effective discovery of variants of biomedical importance, more breeds and individuals need to be analyzed using comparable methodological approaches.

  15. Content-Adaptive Packetization and Streaming of Wavelet Video over IP Networks

    Directory of Open Access Journals (Sweden)

    Chien-Peng Ho

    2007-03-01

    Full Text Available This paper presents a framework of content-adaptive packetization scheme for streaming of 3D wavelet-based video content over lossy IP networks. The tradeoff between rate and distortion is controlled by jointly adapting scalable source coding rate and level of forward error correction (FEC protection. A content dependent packetization mechanism with data-interleaving and Reed-Solomon protection for wavelet-based video codecs is proposed to provide unequal error protection. This paper also tries to answer an important question for scalable video streaming systems: given extra bandwidth, should one increase the level of channel protection for the most important packets, or transmit more scalable source data? Experimental results show that the proposed framework achieves good balance between quality of the received video and level of error protection under bandwidth-varying lossy IP networks.

  16. aCNViewer: Comprehensive genome-wide visualization of absolute copy number and copy neutral variations.

    Directory of Open Access Journals (Sweden)

    Victor Renault

    Full Text Available Copy number variations (CNV include net gains or losses of part or whole chromosomal regions. They differ from copy neutral loss of heterozygosity (cn-LOH events which do not induce any net change in the copy number and are often associated with uniparental disomy. These phenomena have long been reported to be associated with diseases and particularly in cancer. Losses/gains of genomic regions are often correlated with lower/higher gene expression. On the other hand, loss of heterozygosity (LOH and cn-LOH are common events in cancer and may be associated with the loss of a functional tumor suppressor gene. Therefore, identifying recurrent CNV and cn-LOH events can be important as they may highlight common biological components and give insights into the development or mechanisms of a disease. However, no currently available tools allow a comprehensive whole-genome visualization of recurrent CNVs and cn-LOH in groups of samples providing absolute quantification of the aberrations leading to the loss of potentially important information.To overcome these limitations, we developed aCNViewer (Absolute CNV Viewer, a visualization tool for absolute CNVs and cn-LOH across a group of samples. aCNViewer proposes three graphical representations: dendrograms, bi-dimensional heatmaps showing chromosomal regions sharing similar abnormality patterns, and quantitative stacked histograms facilitating the identification of recurrent absolute CNVs and cn-LOH. We illustrated aCNViewer using publically available hepatocellular carcinomas (HCCs Affymetrix SNP Array data (Fig 1A. Regions 1q and 8q present a similar percentage of total gains but significantly different copy number gain categories (p-value of 0.0103 with a Fisher exact test, validated by another cohort of HCCs (p-value of 5.6e-7 (Fig 2B.aCNViewer is implemented in python and R and is available with a GNU GPLv3 license on GitHub https://github.com/FJD-CEPH/aCNViewer and Docker https://hub.docker.com/r/fjdceph/acnviewer/.aCNViewer@cephb.fr.

  17. aCNViewer: Comprehensive genome-wide visualization of absolute copy number and copy neutral variations.

    Science.gov (United States)

    Renault, Victor; Tost, Jörg; Pichon, Fabien; Wang-Renault, Shu-Fang; Letouzé, Eric; Imbeaud, Sandrine; Zucman-Rossi, Jessica; Deleuze, Jean-François; How-Kit, Alexandre

    2017-01-01

    Copy number variations (CNV) include net gains or losses of part or whole chromosomal regions. They differ from copy neutral loss of heterozygosity (cn-LOH) events which do not induce any net change in the copy number and are often associated with uniparental disomy. These phenomena have long been reported to be associated with diseases and particularly in cancer. Losses/gains of genomic regions are often correlated with lower/higher gene expression. On the other hand, loss of heterozygosity (LOH) and cn-LOH are common events in cancer and may be associated with the loss of a functional tumor suppressor gene. Therefore, identifying recurrent CNV and cn-LOH events can be important as they may highlight common biological components and give insights into the development or mechanisms of a disease. However, no currently available tools allow a comprehensive whole-genome visualization of recurrent CNVs and cn-LOH in groups of samples providing absolute quantification of the aberrations leading to the loss of potentially important information. To overcome these limitations, we developed aCNViewer (Absolute CNV Viewer), a visualization tool for absolute CNVs and cn-LOH across a group of samples. aCNViewer proposes three graphical representations: dendrograms, bi-dimensional heatmaps showing chromosomal regions sharing similar abnormality patterns, and quantitative stacked histograms facilitating the identification of recurrent absolute CNVs and cn-LOH. We illustrated aCNViewer using publically available hepatocellular carcinomas (HCCs) Affymetrix SNP Array data (Fig 1A). Regions 1q and 8q present a similar percentage of total gains but significantly different copy number gain categories (p-value of 0.0103 with a Fisher exact test), validated by another cohort of HCCs (p-value of 5.6e-7) (Fig 2B). aCNViewer is implemented in python and R and is available with a GNU GPLv3 license on GitHub https://github.com/FJD-CEPH/aCNViewer and Docker https

  18. A Proposal for User Fees for In-House Video-Cassette Dubbing of Commercial Educational Films

    Science.gov (United States)

    Seymour, Jim

    1973-01-01

    A proposal for one possible route to determining an equitable basis for school districts and other end-users of educational films to produce in-house video copies of those films, while not violating the rights of the holders of copyrights on the films. (Author)

  19. Geotail Video News Release

    Science.gov (United States)

    1992-01-01

    The Geotail mission, part of the International Solar Terrestrial Physics (ISTP) program, measures global energy flow and transformation in the magnetotail to increase understanding of fundamental magnetospheric processes. The satellite was launched on July 24, 1992 onboard a Delta II rocket. This video shows with animation the solar wind, and its effect on the Earth. The narrator explains that the Geotail spacecraft was designed and built by the Institute of Space and Astronautical Science (ISAS), the Japanese Space Agency. The mission objectives are reviewed by one of the scientist in a live view. The video also shows an animation of the orbit, while the narrator explains the orbit and the reason for the small launch window.

  20. Digital cinema video compression

    Science.gov (United States)

    Husak, Walter

    2003-05-01

    The Motion Picture Industry began a transition from film based distribution and projection to digital distribution and projection several years ago. Digital delivery and presentation offers the prospect to increase the quality of the theatrical experience for the audience, reduce distribution costs to the distributors, and create new business opportunities for the theater owners and the studios. Digital Cinema also presents an opportunity to provide increased flexibility and security of the movies for the content owners and the theater operators. Distribution of content via electronic means to theaters is unlike any of the traditional applications for video compression. The transition from film-based media to electronic media represents a paradigm shift in video compression techniques and applications that will be discussed in this paper.

  1. Studenterproduceret video til eksamen

    DEFF Research Database (Denmark)

    Jensen, Kristian Nøhr; Hansen, Kenneth

    2016-01-01

    Formålet med denne artikel er at vise, hvordan læringsdesign og stilladsering kan anvendes til at skabe en ramme for studenterproduceret video til eksamen på videregående uddannelser. Artiklen tager udgangspunkt i en problemstilling, hvor uddannelsesinstitutionerne skal håndtere og koordinere...... medieproduktioner. Med afsæt i Lanarca Declarationens perspektiver på læringsdesign og hovedsageligt Jerome Bruners principper for stilladsering, sammensættes en model for understøttelse af videoproduktion af studerende på videregående uddannelser. Ved at anvende denne model for undervisningssessioner og forløb får...... de fagfaglige og mediefaglige undervisere et redskab til at fokusere og koordinere indsatsen frem mod målet med, at de studerende producerer og anvender video til eksamen....

  2. Video material and epilepsy.

    Science.gov (United States)

    Harding, G F; Jeavons, P M; Edson, A S

    1994-01-01

    Nine patients who had epileptic attacks while playing computer games were studied in the laboratory. Patients had an EEG recorded as well as their response to intermittent photic stimulation (IPS) at flash rates of 1-60 fps. In addition, pattern sensitivity was assessed in all patients by a gratings pattern. Only 2 patients had no previous history of convulsions, and only 2 had a normal basic EEG. All but 1 were sensitive to IPS, and all but 1 were pattern sensitive. Most patients were male, but although this appears to conflict with previously published literature results regarding the sex ratio in photosensitivity, it was due to the male predominance of video game usage. We compared our results with those reported in the literature. Diagnosing video game epilepsy requires performing an EEG with IPS and pattern stimulation. We propose a standard method of testing.

  3. Solid state video cameras

    CERN Document Server

    Cristol, Y

    2013-01-01

    Solid State Video Cameras reviews the state of the art in the field of solid-state television cameras as compiled from patent literature. Organized into 10 chapters, the book begins with the basic array types of solid-state imagers and appropriate read-out circuits and methods. Documents relating to improvement of picture quality, such as spurious signal suppression, uniformity correction, or resolution enhancement, are also cited. The last part considerssolid-state color cameras.

  4. Mining Conversational Social Video

    OpenAIRE

    Biel, Joan-Isaac

    2013-01-01

    The ubiquity of social media in our daily life, the intense user participation, and the explo- sion of multimedia content have generated an extraordinary interest from computer and social scientists to investigate the traces left by users to understand human behavior online. From this perspective, YouTube can be seen as the largest collection of audiovisual human behavioral data, among which conversational video blogs (vlogs) are one of the basic formats. Conversational vlogs have evolved fro...

  5. Video Bandwidth Compression System.

    Science.gov (United States)

    1980-08-01

    scaling function, located between the inverse DPCM and inverse transform , on the decoder matrix multiplier chips. 1"V1 T.. ---- i.13 SECURITY...Bit Unpacker and Inverse DPCM Slave Sync Board 15 e. Inverse DPCM Loop Boards 15 f. Inverse Transform Board 16 g. Composite Video Output Board 16...36 a. Display Refresh Memory 36 (1) Memory Section 37 (2) Timing and Control 39 b. Bit Unpacker and Inverse DPCM 40 c. Inverse Transform Processor 43

  6. The Future of Video

    OpenAIRE

    Li, F.

    2016-01-01

    Executive Summary \\ud \\ud A range of technological innovations (e.g. smart phones and digital cameras), infrastructural advances (e.g. broadband and 3G/4G wireless networks) and platform developments (e.g. YouTube, Facebook, Snapchat, Instagram, Amazon, and Netflix) are collectively transforming the way video is produced, distributed, consumed, archived – and importantly, monetised. Changes have been observed well beyond the mainstream TV and film industries, and these changes are increasingl...

  7. Video game addiction, ADHD symptomatology, and video game reinforcement.

    Science.gov (United States)

    Mathews, Christine L; Morrell, Holly E R; Molle, Jon E

    2018-06-06

    Up to 23% of people who play video games report symptoms of addiction. Individuals with attention deficit hyperactivity disorder (ADHD) may be at increased risk for video game addiction, especially when playing games with more reinforcing properties. The current study tested whether level of video game reinforcement (type of game) places individuals with greater ADHD symptom severity at higher risk for developing video game addiction. Adult video game players (N = 2,801; Mean age = 22.43, SD = 4.70; 93.30% male; 82.80% Caucasian) completed an online survey. Hierarchical multiple linear regression analyses were used to test type of game, ADHD symptom severity, and the interaction between type of game and ADHD symptomatology as predictors of video game addiction severity, after controlling for age, gender, and weekly time spent playing video games. ADHD symptom severity was positively associated with increased addiction severity (b = .73 and .68, ps .05. The relationship between ADHD symptom severity and addiction severity did not depend on the type of video game played or preferred most, ps > .05. Gamers who have greater ADHD symptom severity may be at greater risk for developing symptoms of video game addiction and its negative consequences, regardless of type of video game played or preferred most. Individuals who report ADHD symptomatology and also identify as gamers may benefit from psychoeducation about the potential risk for problematic play.

  8. Detection of illegal transfer of videos over the Internet

    Science.gov (United States)

    Chaisorn, Lekha; Sainui, Janya; Manders, Corey

    2010-07-01

    In this paper, a method for detecting infringements or modifications of a video in real-time is proposed. The method first segments a video stream into shots, after which it extracts some reference frames as keyframes. This process is performed employing a Singular Value Decomposition (SVD) technique developed in this work. Next, for each input video (represented by its keyframes), ordinal-based signature and SIFT (Scale Invariant Feature Transform) descriptors are generated. The ordinal-based method employs a two-level bitmap indexing scheme to construct the index for each video signature. The first level clusters all input keyframes into k clusters while the second level converts the ordinal-based signatures into bitmap vectors. On the other hand, the SIFT-based method directly uses the descriptors as the index. Given a suspect video (being streamed or transferred on the Internet), we generate the signature (ordinal and SIFT descriptors) then we compute similarity between its signature and those signatures in the database based on ordinal signature and SIFT descriptors separately. For similarity measure, besides the Euclidean distance, Boolean operators are also utilized during the matching process. We have tested our system by performing several experiments on 50 videos (each about 1/2 hour in duration) obtained from the TRECVID 2006 data set. For experiments set up, we refer to the conditions provided by TRECVID 2009 on "Content-based copy detection" task. In addition, we also refer to the requirements issued in the call for proposals by MPEG standard on the similar task. Initial result shows that our framework is effective and robust. As compared to our previous work, on top of the achievement we obtained by reducing the storage space and time taken in the ordinal based method, by introducing the SIFT features, we could achieve an overall accuracy in F1 measure of about 96% (improved about 8%).

  9. Video segmentation using keywords

    Science.gov (United States)

    Ton-That, Vinh; Vong, Chi-Tai; Nguyen-Dao, Xuan-Truong; Tran, Minh-Triet

    2018-04-01

    At DAVIS-2016 Challenge, many state-of-art video segmentation methods achieve potential results, but they still much depend on annotated frames to distinguish between background and foreground. It takes a lot of time and efforts to create these frames exactly. In this paper, we introduce a method to segment objects from video based on keywords given by user. First, we use a real-time object detection system - YOLOv2 to identify regions containing objects that have labels match with the given keywords in the first frame. Then, for each region identified from the previous step, we use Pyramid Scene Parsing Network to assign each pixel as foreground or background. These frames can be used as input frames for Object Flow algorithm to perform segmentation on entire video. We conduct experiments on a subset of DAVIS-2016 dataset in half the size of its original size, which shows that our method can handle many popular classes in PASCAL VOC 2012 dataset with acceptable accuracy, about 75.03%. We suggest widely testing by combining other methods to improve this result in the future.

  10. Utilizing Video Games

    Science.gov (United States)

    Blaize, L.

    Almost from its birth, the computer and video gaming industry has done an admirable job of communicating the vision and attempting to convey the experience of traveling through space to millions of gamers from all cultures and demographics. This paper will propose several approaches the 100 Year Starship Study can take to use the power of interactive media to stir interest in the Starship and related projects among a global population. It will examine successful gaming franchises from the past that are relevant to the mission and consider ways in which the Starship Study could cooperate with game development studios to bring the Starship vision to those franchises and thereby to the public. The paper will examine ways in which video games can be used to crowd-source research aspects for the Study, and how video games are already considering many of the same topics that will be examined by this Study. Finally, the paper will propose some mechanisms by which the 100 Year Starship Study can establish very close ties with the gaming industry and foster cooperation in pursuit of the Study's goals.

  11. Security and Privacy in Video Surveillance: Requirements and Challenges

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.

    2014-01-01

    observed by the system. Several techniques to protect the privacy of individuals have therefore been proposed, but very little research work has focused on the specific security requirements of video surveillance data (in transit or in storage) and on authorizing access to this data. In this paper, we...... present a general model of video surveillance systems that will help identify the major security and privacy requirements for a video surveillance system and we use this model to identify practical challenges in ensuring the security of video surveillance data in all stages (in transit and at rest). Our...... study shows a gap between the identified security requirements and the proposed security solutions where future research efforts may focus in this domain....

  12. A spatial haplotype copying model with applications to genotype imputation.

    Science.gov (United States)

    Yang, Wen-Yun; Hormozdiari, Farhad; Eskin, Eleazar; Pasaniuc, Bogdan

    2015-05-01

    Ever since its introduction, the haplotype copy model has proven to be one of the most successful approaches for modeling genetic variation in human populations, with applications ranging from ancestry inference to genotype phasing and imputation. Motivated by coalescent theory, this approach assumes that any chromosome (haplotype) can be modeled as a mosaic of segments copied from a set of chromosomes sampled from the same population. At the core of the model is the assumption that any chromosome from the sample is equally likely to contribute a priori to the copying process. Motivated by recent works that model genetic variation in a geographic continuum, we propose a new spatial-aware haplotype copy model that jointly models geography and the haplotype copying process. We extend hidden Markov models of haplotype diversity such that at any given location, haplotypes that are closest in the genetic-geographic continuum map are a priori more likely to contribute to the copying process than distant ones. Through simulations starting from the 1000 Genomes data, we show that our model achieves superior accuracy in genotype imputation over the standard spatial-unaware haplotype copy model. In addition, we show the utility of our model in selecting a small personalized reference panel for imputation that leads to both improved accuracy as well as to a lower computational runtime than the standard approach. Finally, we show our proposed model can be used to localize individuals on the genetic-geographical map on the basis of their genotype data.

  13. The classical double copy for Taub–NUT spacetime

    Energy Technology Data Exchange (ETDEWEB)

    Luna, Andrés, E-mail: a.luna-godoy.1@research.gla.ac.uk [School of Physics and Astronomy, University of Glasgow, Glasgow G12 8QQ, Scotland (United Kingdom); Monteiro, Ricardo, E-mail: monteiro@maths.ox.ac.uk [Mathematical Institute, University of Oxford, Oxford OX2 6GG, England (United Kingdom); O' Connell, Donal, E-mail: donal@staffmail.ed.ac.uk [Higgs Centre for Theoretical Physics, School of Physics and Astronomy, The University of Edinburgh, Edinburgh EH9 3JZ, Scotland (United Kingdom); Kavli Institute for Theoretical Physics, University of California, Santa Barbara, CA 93106-4030 (United States); White, Chris D., E-mail: Christopher.White@glasgow.ac.uk [School of Physics and Astronomy, University of Glasgow, Glasgow G12 8QQ, Scotland (United Kingdom)

    2015-11-12

    The double copy is a much-studied relationship between gauge theory and gravity amplitudes. Recently, this was generalised to an infinite family of classical solutions to Einstein's equations, namely stationary Kerr–Schild geometries. In this paper, we extend this to the Taub–NUT solution in gravity, which has a double Kerr–Schild form. The single copy of this solution is a dyon, whose electric and magnetic charges are related to the mass and NUT charge in the gravity theory. Finally, we find hints that the classical double copy extends to curved background geometries.

  14. Age and violent-content labels make video games forbidden fruits for youth

    NARCIS (Netherlands)

    Nije Bijvank, M.; Konijn, E.A.; Bushman, B.J.; Roelofsma, P.H.M.P.

    2009-01-01

    OBJECTIVE. To protect minors from exposure to video games with objectionable content (eg, violence and sex), the Pan European Game Information developed a classification system for video games (eg, 18+). We tested the hypothesis that this classification system may actually increase the

  15. Video as a Tool to Increase Understanding and Support for the Endangered Species Act

    Science.gov (United States)

    Kleinhenz, Peter N.; Parker, Michael S.

    2017-01-01

    Research into the effectiveness of video as a tool to educate students about environmental issues and cause a change in their attitudes toward them in a classroom setting is limited. We sought to add to this sparse body of research. We created three videos that showcased a species in a different stage of protection under the Endangered Species…

  16. High Definition Video Streaming Using H.264 Video Compression

    OpenAIRE

    Bechqito, Yassine

    2009-01-01

    This thesis presents high definition video streaming using H.264 codec implementation. The experiment carried out in this study was done for an offline streaming video but a model for live high definition streaming is introduced, as well. Prior to the actual experiment, this study describes digital media streaming. Also, the different technologies involved in video streaming are covered. These include streaming architecture and a brief overview on H.264 codec as well as high definition t...

  17. Video Quality Prediction over Wireless 4G

    KAUST Repository

    Lau, Chun Pong

    2013-04-14

    In this paper, we study the problem of video quality prediction over the wireless 4G network. Video transmission data is collected from a real 4G SCM testbed for investigating factors that affect video quality. After feature transformation and selection on video and network parameters, video quality is predicted by solving as regression problem. Experimental results show that the dominated factor on video quality is the channel attenuation and video quality can be well estimated by our models with small errors.

  18. Video Quality Prediction over Wireless 4G

    KAUST Repository

    Lau, Chun Pong; Zhang, Xiangliang; Shihada, Basem

    2013-01-01

    In this paper, we study the problem of video quality prediction over the wireless 4G network. Video transmission data is collected from a real 4G SCM testbed for investigating factors that affect video quality. After feature transformation and selection on video and network parameters, video quality is predicted by solving as regression problem. Experimental results show that the dominated factor on video quality is the channel attenuation and video quality can be well estimated by our models with small errors.

  19. Portrayal of tobacco in Mongolian language YouTube videos: policy gaps.

    Science.gov (United States)

    Tsai, Feng-Jen; Sainbayar, Bolor

    2016-07-01

    This study examined how effectively current policy measures control depictions of tobacco in Mongolian language YouTube videos. A search of YouTube videos using the Mongolian term for 'tobacco', and employing 'relevance' and 'view count' criteria, resulted in a total sample of 120 videos, from which 38 unique videos were coded and analysed. Most videos were antismoking public service announcements; however, analyses of viewing patterns showed that pro-smoking videos accounted for about two-thirds of all views. Pro-smoking videos were also perceived more positively and had a like:dislike ratio of 4.6 compared with 3.5 and 1.5, respectively, for the magic trick and antismoking videos. Although Mongolia prohibits tobacco advertising, 3 of the pro-smoking videos were made by a tobacco company; additionally, 1 pro-smoking video promoted electronic cigarettes. Given the popularity of Mongolian YouTube videos that promote smoking, policy changes are urgently required to control this medium, and more effectively protect youth and young adults from insidious tobacco marketing. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  20. How to implement live video recording in the clinical environment: A practical guide for clinical services.

    Science.gov (United States)

    Lloyd, Adam; Dewar, Alistair; Edgar, Simon; Caesar, Dave; Gowens, Paul; Clegg, Gareth

    2017-06-01

    The use of video in healthcare is becoming more common, particularly in simulation and educational settings. However, video recording live episodes of clinical care is far less routine. To provide a practical guide for clinical services to embed live video recording. Using Kotter's 8-step process for leading change, we provide a 'how to' guide to navigate the challenges required to implement a continuous video-audit system based on our experience of video recording in our emergency department resuscitation rooms. The most significant hurdles in installing continuous video audit in a busy clinical area involve change management rather than equipment. Clinicians are faced with considerable ethical, legal and data protection challenges which are the primary barriers for services that pursue video recording of patient care. Existing accounts of video use rarely acknowledge the organisational and cultural dimensions that are key to the success of establishing a video system. This article outlines core implementation issues that need to be addressed if video is to become part of routine care delivery. By focussing on issues such as staff acceptability, departmental culture and organisational readiness, we provide a roadmap that can be pragmatically adapted by all clinical environments, locally and internationally, that seek to utilise video recording as an approach to improving clinical care. © 2017 John Wiley & Sons Ltd.

  1. 27 CFR 478.95 - Certified copy of license.

    Science.gov (United States)

    2010-04-01

    ... for copies. The fee may be paid by (a) cash, or (b) money order or check made payable to the Bureau of Alcohol, Tobacco, Firearms, and Explosives. (Approved by the Office of Management and Budget under control...

  2. The positioning logic and copy number control of genes in bacteria under stress

    Science.gov (United States)

    Zhang, Qiucen; Austin, Robert; Vyawahare, Saurabh; Lau, Alexandra

    2013-03-01

    Escherichia coli (E. coli) cells when challenged with sublethal concentrations of the genotoxic antibiotic ciprofloxacin cease to divide and form long filaments which contain multiple bacterial chromosomes. These filaments are individual mesoscopic environmental niches which provide protection for a community of chromosomes (as opposed to cells) under mutagenic stress and can provide an evolutionary fitness advantage within the niche. We use comparative genomic hybridization to show that the mesoscopic niche evolves within 20 minutes of ciprofloxacin exposure via replication of multiple copies of genes expressing ATP dependent transporters. We show that this rapid genomic amplification is done in a time efficient manner via placement of the genes encoding the pumps near the origin of replication on the bacterial chromosome. The de-amplification of multiple copies back to the wild type number is a function of the duration is a function of the ciprofloxacin exposure duration: the longer the exposure, the slower the removal of the multiple copies. The project described was supported by the National Science Foundation and the National Cancer Institute

  3. Designing a scalable video-on-demand server with data sharing

    Science.gov (United States)

    Lim, Hyeran; Du, David H. C.

    2001-01-01

    As current disk space and transfer speed increase, the bandwidth between a server and its disks has become critical for video-on-demand (VOD) services. Our VOD server consists of several hosts sharing data on disks through a ring-based network. Data sharing provided by the spatial-reuse ring network between servers and disks not only increases the utilization towards full bandwidth but also improves the availability of videos. Striping and replication methods are introduced in order to improve the efficiency of our VOD server system as well as the availability of videos. We consider tow kinds of resources of a VOD server system. Given a representative access profile, our intention is to propose an algorithm to find an initial condition, place videos on disks in the system successfully. If any copy of a video cannot be placed due to lack of resources, more servers/disks are added. When all videos are place on the disks by our algorithm, the final configuration is determined with indicator of how tolerable it is against the fluctuation in demand of videos. Considering it is a NP-hard problem, our algorithm generates the final configuration with O(M log M) at best, where M is the number of movies.

  4. Women as Video Game Consumers

    OpenAIRE

    Kiviranta, Hanna

    2017-01-01

    The purpose of this Thesis is to study women as video game consumers through the games that they play. This was done by case studies on the content of five video games from genres that statistically are popular amongst women. To introduce the topic and to build the theoretical framework, the key terms and the video game industry are introduced. The reader is acquainted with theories on consumer behaviour, buying processes and factors that influence our consuming habits. These aspects are...

  5. Quantum copying and simplification of the quantum Fourier transform

    Science.gov (United States)

    Niu, Chi-Sheng

    Theoretical studies of quantum computation and quantum information theory are presented in this thesis. Three topics are considered: simplification of the quantum Fourier transform in Shor's algorithm, optimal eavesdropping in the BB84 quantum cryptographic protocol, and quantum copying of one qubit. The quantum Fourier transform preceding the final measurement in Shor's algorithm is simplified by replacing a network of quantum gates with one that has fewer and simpler gates controlled by classical signals. This simplification results from an analysis of the network using the consistent history approach to quantum mechanics. The optimal amount of information which an eavesdropper can gain, for a given level of noise in the communication channel, is worked out for the BB84 quantum cryptographic protocol. The optimal eavesdropping strategy is expressed in terms of various quantum networks. A consistent history analysis of these networks using two conjugate quantum bases shows how the information gain in one basis influences the noise level in the conjugate basis. The no-cloning property of quantum systems, which is the physics behind quantum cryptography, is studied by considering copying machines that generate two imperfect copies of one qubit. The best qualities these copies can have are worked out with the help of the Bloch sphere representation for one qubit, and a quantum network is worked out for an optimal copying machine. If the copying machine does not have additional ancillary qubits, the copying process can be viewed using a 2-dimensional subspace in a product space of two qubits. A special representation of such a two-dimensional subspace makes possible a complete characterization of this type of copying. This characterization in turn leads to simplified eavesdropping strategies in the BB84 and the B92 quantum cryptographic protocols.

  6. SU(3) lattice gauge fixing with overrelaxation and Gribov copies

    Energy Technology Data Exchange (ETDEWEB)

    Paciello, M.L.; Taglienti, B. (INFN La Sapienza, Rome (Italy)); Parrinello, C. (Physics Dept., New York Univ., NY (United States)); Petrarca, S. (Theory Div., CERN, Geneva (Switzerland)); Vladikas, A. (Dipt. di Fisica, Univ. Tor Vergata, Rome (Italy) INFN Tor Vergata, Rome (Italy))

    1992-02-06

    We report on the phenomenology of SU(3) lattice Landau gauge fixing as obtained by using an overrelaxation algorithm. An interesting result obtained using this very efficient algorithm is that distinct Gribov copies are generated by simply modifying the value {omega} of the overrelaxation parameter for a fixed starting configuration. By generating random gauge equivalent configurations, we study the variation of the number of copies with the lattice volume and gauge coupling. (orig.).

  7. DNA replication stress restricts ribosomal DNA copy number

    Science.gov (United States)

    Salim, Devika; Bradford, William D.; Freeland, Amy; Cady, Gillian; Wang, Jianmin

    2017-01-01

    Ribosomal RNAs (rRNAs) in budding yeast are encoded by ~100–200 repeats of a 9.1kb sequence arranged in tandem on chromosome XII, the ribosomal DNA (rDNA) locus. Copy number of rDNA repeat units in eukaryotic cells is maintained far in excess of the requirement for ribosome biogenesis. Despite the importance of the repeats for both ribosomal and non-ribosomal functions, it is currently not known how “normal” copy number is determined or maintained. To identify essential genes involved in the maintenance of rDNA copy number, we developed a droplet digital PCR based assay to measure rDNA copy number in yeast and used it to screen a yeast conditional temperature-sensitive mutant collection of essential genes. Our screen revealed that low rDNA copy number is associated with compromised DNA replication. Further, subculturing yeast under two separate conditions of DNA replication stress selected for a contraction of the rDNA array independent of the replication fork blocking protein, Fob1. Interestingly, cells with a contracted array grew better than their counterparts with normal copy number under conditions of DNA replication stress. Our data indicate that DNA replication stresses select for a smaller rDNA array. We speculate that this liberates scarce replication factors for use by the rest of the genome, which in turn helps cells complete DNA replication and continue to propagate. Interestingly, tumors from mini chromosome maintenance 2 (MCM2)-deficient mice also show a loss of rDNA repeats. Our data suggest that a reduction in rDNA copy number may indicate a history of DNA replication stress, and that rDNA array size could serve as a diagnostic marker for replication stress. Taken together, these data begin to suggest the selective pressures that combine to yield a “normal” rDNA copy number. PMID:28915237

  8. DNA replication stress restricts ribosomal DNA copy number.

    Science.gov (United States)

    Salim, Devika; Bradford, William D; Freeland, Amy; Cady, Gillian; Wang, Jianmin; Pruitt, Steven C; Gerton, Jennifer L

    2017-09-01

    Ribosomal RNAs (rRNAs) in budding yeast are encoded by ~100-200 repeats of a 9.1kb sequence arranged in tandem on chromosome XII, the ribosomal DNA (rDNA) locus. Copy number of rDNA repeat units in eukaryotic cells is maintained far in excess of the requirement for ribosome biogenesis. Despite the importance of the repeats for both ribosomal and non-ribosomal functions, it is currently not known how "normal" copy number is determined or maintained. To identify essential genes involved in the maintenance of rDNA copy number, we developed a droplet digital PCR based assay to measure rDNA copy number in yeast and used it to screen a yeast conditional temperature-sensitive mutant collection of essential genes. Our screen revealed that low rDNA copy number is associated with compromised DNA replication. Further, subculturing yeast under two separate conditions of DNA replication stress selected for a contraction of the rDNA array independent of the replication fork blocking protein, Fob1. Interestingly, cells with a contracted array grew better than their counterparts with normal copy number under conditions of DNA replication stress. Our data indicate that DNA replication stresses select for a smaller rDNA array. We speculate that this liberates scarce replication factors for use by the rest of the genome, which in turn helps cells complete DNA replication and continue to propagate. Interestingly, tumors from mini chromosome maintenance 2 (MCM2)-deficient mice also show a loss of rDNA repeats. Our data suggest that a reduction in rDNA copy number may indicate a history of DNA replication stress, and that rDNA array size could serve as a diagnostic marker for replication stress. Taken together, these data begin to suggest the selective pressures that combine to yield a "normal" rDNA copy number.

  9. DNA replication stress restricts ribosomal DNA copy number.

    Directory of Open Access Journals (Sweden)

    Devika Salim

    2017-09-01

    Full Text Available Ribosomal RNAs (rRNAs in budding yeast are encoded by ~100-200 repeats of a 9.1kb sequence arranged in tandem on chromosome XII, the ribosomal DNA (rDNA locus. Copy number of rDNA repeat units in eukaryotic cells is maintained far in excess of the requirement for ribosome biogenesis. Despite the importance of the repeats for both ribosomal and non-ribosomal functions, it is currently not known how "normal" copy number is determined or maintained. To identify essential genes involved in the maintenance of rDNA copy number, we developed a droplet digital PCR based assay to measure rDNA copy number in yeast and used it to screen a yeast conditional temperature-sensitive mutant collection of essential genes. Our screen revealed that low rDNA copy number is associated with compromised DNA replication. Further, subculturing yeast under two separate conditions of DNA replication stress selected for a contraction of the rDNA array independent of the replication fork blocking protein, Fob1. Interestingly, cells with a contracted array grew better than their counterparts with normal copy number under conditions of DNA replication stress. Our data indicate that DNA replication stresses select for a smaller rDNA array. We speculate that this liberates scarce replication factors for use by the rest of the genome, which in turn helps cells complete DNA replication and continue to propagate. Interestingly, tumors from mini chromosome maintenance 2 (MCM2-deficient mice also show a loss of rDNA repeats. Our data suggest that a reduction in rDNA copy number may indicate a history of DNA replication stress, and that rDNA array size could serve as a diagnostic marker for replication stress. Taken together, these data begin to suggest the selective pressures that combine to yield a "normal" rDNA copy number.

  10. Using DMA for copying performance counter data to memory

    Science.gov (United States)

    Gara, Alan; Salapura, Valentina; Wisniewski, Robert W

    2013-12-31

    A device for copying performance counter data includes hardware path that connects a direct memory access (DMA) unit to a plurality of hardware performance counters and a memory device. Software prepares an injection packet for the DMA unit to perform copying, while the software can perform other tasks. In one aspect, the software that prepares the injection packet runs on a processing core other than the core that gathers the hardware performance data.

  11. Intellectual Video Filming

    DEFF Research Database (Denmark)

    Juel, Henrik

    in favour of worthy causes. However, it is also very rewarding to draw on the creativity, enthusiasm and rapidly improving technical skills of young students, and to guide them to use video equipment themselves for documentary, for philosophical film essays and intellectual debate. In the digital era......Like everyone else university students of the humanities are quite used to watching Hollywood productions and professional TV. It requires some didactic effort to redirect their eyes and ears away from the conventional mainstream style and on to new and challenging ways of using the film media...

  12. A Big Video Manifesto

    DEFF Research Database (Denmark)

    Mcilvenny, Paul Bruce; Davidsen, Jacob

    2017-01-01

    and beautiful visualisations. However, we also need to ask what the tools of big data can do both for the Humanities and for more interpretative approaches and methods. Thus, we prefer to explore how the power of computation, new sensor technologies and massive storage can also help with video-based qualitative......For the last few years, we have witnessed a hype about the potential results and insights that quantitative big data can bring to the social sciences. The wonder of big data has moved into education, traffic planning, and disease control with a promise of making things better with big numbers...

  13. Provocative Video Scenarios

    DEFF Research Database (Denmark)

    Caglio, Agnese

    This paper presents the use of ”provocative videos”, as a tool to support and deepen findings from ethnographic investigation on the theme of remote videocommunication. The videos acted as a resource to also investigate potential for novel technologies supporting continuous connection between...... households. They were deployed online as part of a 6 months research project in collaboration with the Danish electronics manifacturer Bang & Olufsen, involving participants from different continents. The intention is to propose the integration of tools that have been always seen as part of the design domain...

  14. Partitioning of copy-number genotypes in pedigrees

    Directory of Open Access Journals (Sweden)

    Andelfinger Gregor U

    2010-05-01

    Full Text Available Abstract Background Copy number variations (CNVs and polymorphisms (CNPs have only recently gained the genetic community's attention. Conservative estimates have shown that CNVs and CNPs might affect more than 10% of the genome and that they may be at least as important as single nucleotide polymorphisms in assessing human variability. Widely used tools for CNP analysis have been implemented in Birdsuite and PLINK for the purpose of conducting genetic association studies based on the unpartitioned total number of CNP copies provided by the intensities from Affymetrix's Genome-Wide Human SNP Array. Here, we are interested in partitioning copy number variations and polymorphisms in extended pedigrees for the purpose of linkage analysis on familial data. Results We have developed CNGen, a new software for the partitioning of copy number polymorphism using the integrated genotypes from Birdsuite with the Affymetrix platform. The algorithm applied to familial trios or extended pedigrees can produce partitioned copy number genotypes with distinct parental alleles. We have validated the algorithm using simulations on a complex pedigree structure using frequencies calculated from a real dataset of 300 genotyped samples from 42 pedigrees segregating a congenital heart defect phenotype. Conclusions CNGen is the first published software for the partitioning of copy number genotypes in pedigrees, making possible the use CNPs and CNVs for linkage analysis. It was implemented with the Python interpreter version 2.5.2. It was successfully tested on current Linux, Windows and Mac OS workstations.

  15. ABOUT SOUNDS IN VIDEO GAMES

    Directory of Open Access Journals (Sweden)

    Denikin Anton A.

    2012-12-01

    Full Text Available The article considers the aesthetical and practical possibilities for sounds (sound design in video games and interactive applications. Outlines the key features of the game sound, such as simulation, representativeness, interactivity, immersion, randomization, and audio-visuality. The author defines the basic terminology in study of game audio, as well as identifies significant aesthetic differences between film sounds and sounds in video game projects. It is an attempt to determine the techniques of art analysis for the approaches in study of video games including aesthetics of their sounds. The article offers a range of research methods, considering the video game scoring as a contemporary creative practice.

  16. On the relative importance of audio and video in the presence of packet losses

    DEFF Research Database (Denmark)

    Korhonen, Jari; Reiter, Ulrich; Myakotnykh, Eugene

    2010-01-01

    In streaming applications, unequal protection of audio and video tracks may be necessary to maintain the optimal perceived overall quality. For this purpose, the application should be aware of the relative importance of audio and video in an audiovisual sequence. In this paper, we propose...... a subjective test arrangement for finding the optimal tradeoff between subjective audio and video qualities in situations when it is not possible to have perfect quality for both modalities concurrently. Our results show that content poses a significant impact on the preferred compromise between audio...... and video quality, but also that the currently used classification criteria for content are not sufficient to predict the users’ preference...

  17. Privacy information management for video surveillance

    Science.gov (United States)

    Luo, Ying; Cheung, Sen-ching S.

    2013-05-01

    The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been proposed to automatically redact images of trusted individuals in the surveillance video. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris patterns as they are immutable and highly discriminative. In this paper, we propose a privacy data management system to be used in a privacy-aware video surveillance system. The privacy status of a subject is anonymously determined based on her iris pattern. For a trusted subject, the surveillance video is redacted and the original imagery is considered to be the privacy information. Our proposed system allows a subject to access her privacy information via the same biometric signal for privacy status determination. Two secure protocols, one for privacy information encryption and the other for privacy information retrieval are proposed. Error control coding is used to cope with the variability in iris patterns and efficient implementation is achieved using surrogate data records. Experimental results on a public iris biometric database demonstrate the validity of our framework.

  18. Austin Community College Video Game Development Certificate

    Science.gov (United States)

    McGoldrick, Robert

    2008-01-01

    The Video Game Development program is designed and developed by leaders in the Austin video game development industry, under the direction of the ACC Video Game Advisory Board. Courses are taught by industry video game developers for those who want to become video game developers. The program offers a comprehensive approach towards learning what's…

  19. Unattended video surveillance systems for international safeguards

    International Nuclear Information System (INIS)

    Johnson, C.S.

    1979-01-01

    The use of unattended video surveillance systems places some unique requirements on the systems and their hardware. The systems have the traditional requirements of video imaging, video storage, and video playback but also have some special requirements such as tamper safing. The technology available to meet these requirements and how it is being applied to unattended video surveillance systems are discussed in this paper

  20. Personal Digital Video Stories

    DEFF Research Database (Denmark)

    Ørngreen, Rikke; Henningsen, Birgitte Sølbeck; Louw, Arnt Vestergaard

    2016-01-01

    The drop-out rate among students attending vocational training institutions is higher than for other forms of education at the same entry level (in Denmark, but also generally in Europe). A recent Danish reform has aided students, who enter the first part of the basic program directly from primar...... students are at school and in practical placements with companies. This may increase students’ social engagement and interest in the subject matter, together with greater awareness of professional identity, which could help decrease drop-out rates for vocational training.......The drop-out rate among students attending vocational training institutions is higher than for other forms of education at the same entry level (in Denmark, but also generally in Europe). A recent Danish reform has aided students, who enter the first part of the basic program directly from primary...... multimedia and video productions in Vocational Educational Training (VET). These video productions focused on the subjects of their future profession, and increased students’ motivation and experience of professional pride. Through a semistructured literature review, the paper then argues for a research...

  1. SnapVideo: Personalized Video Generation for a Sightseeing Trip.

    Science.gov (United States)

    Zhang, Luming; Jing, Peiguang; Su, Yuting; Zhang, Chao; Shaoz, Ling

    2017-11-01

    Leisure tourism is an indispensable activity in urban people's life. Due to the popularity of intelligent mobile devices, a large number of photos and videos are recorded during a trip. Therefore, the ability to vividly and interestingly display these media data is a useful technique. In this paper, we propose SnapVideo, a new method that intelligently converts a personal album describing of a trip into a comprehensive, aesthetically pleasing, and coherent video clip. The proposed framework contains three main components. The scenic spot identification model first personalizes the video clips based on multiple prespecified audience classes. We then search for some auxiliary related videos from YouTube 1 according to the selected photos. To comprehensively describe a scenery, the view generation module clusters the crawled video frames into a number of views. Finally, a probabilistic model is developed to fit the frames from multiple views into an aesthetically pleasing and coherent video clip, which optimally captures the semantics of a sightseeing trip. Extensive user studies demonstrated the competitiveness of our method from an aesthetic point of view. Moreover, quantitative analysis reflects that semantically important spots are well preserved in the final video clip. 1 https://www.youtube.com/.

  2. 76 FR 82277 - Nomination of Existing Marine Protected Areas to the National System of Marine Protected Areas

    Science.gov (United States)

    2011-12-30

    [email protected] . A detailed electronic copy of the List of National System MPAs is available for....S.S. YSD Exempt Site H.M.C.S. Saint Francis Exempt Site French Van Gilder Exempt Site [[Page 82279...

  3. Error Resilience in Current Distributed Video Coding Architectures

    Directory of Open Access Journals (Sweden)

    Tonoli Claudia

    2009-01-01

    Full Text Available In distributed video coding the signal prediction is shifted at the decoder side, giving therefore most of the computational complexity burden at the receiver. Moreover, since no prediction loop exists before transmission, an intrinsic robustness to transmission errors has been claimed. This work evaluates and compares the error resilience performance of two distributed video coding architectures. In particular, we have considered a video codec based on the Stanford architecture (DISCOVER codec and a video codec based on the PRISM architecture. Specifically, an accurate temporal and rate/distortion based evaluation of the effects of the transmission errors for both the considered DVC architectures has been performed and discussed. These approaches have been also compared with H.264/AVC, in both cases of no error protection, and simple FEC error protection. Our evaluations have highlighted in all cases a strong dependence of the behavior of the various codecs to the content of the considered video sequence. In particular, PRISM seems to be particularly well suited for low-motion sequences, whereas DISCOVER provides better performance in the other cases.

  4. Error and Congestion Resilient Video Streaming over Broadband Wireless

    Directory of Open Access Journals (Sweden)

    Laith Al-Jobouri

    2015-04-01

    Full Text Available In this paper, error resilience is achieved by adaptive, application-layer rateless channel coding, which is used to protect H.264/Advanced Video Coding (AVC codec data-partitioned videos. A packetization strategy is an effective tool to control error rates and, in the paper, source-coded data partitioning serves to allocate smaller packets to more important compressed video data. The scheme for doing this is applied to real-time streaming across a broadband wireless link. The advantages of rateless code rate adaptivity are then demonstrated in the paper. Because the data partitions of a video slice are each assigned to different network packets, in congestion-prone wireless networks the increased number of packets per slice and their size disparity may increase the packet loss rate from buffer overflows. As a form of congestion resilience, this paper recommends packet-size dependent scheduling as a relatively simple way of alleviating the buffer-overflow problem arising from data-partitioned packets. The paper also contributes an analysis of data partitioning and packet sizes as a prelude to considering scheduling regimes. The combination of adaptive channel coding and prioritized packetization for error resilience with packet-size dependent packet scheduling results in a robust streaming scheme specialized for broadband wireless and real-time streaming applications such as video conferencing, video telephony, and telemedicine.

  5. The Legal Nature of Video Games – Adapting Copyright Law to Multimedia

    Directory of Open Access Journals (Sweden)

    Julian Simon Stein

    2015-06-01

    Full Text Available In Copyright Law, video games are still a contentious matter. The multimedia nature of games brings up the question on how to define their legal nature. While there are several original underlying works in video games such as computer programs, artistic works, musical works, dramatic works etc., video games enjoy protection as films or audiovisual works respectively in many jurisdictions, making video games an arrangement of a multiplicity of works. However, some have argued to define video games as a single 'multimedia work' rather than a product of many works of copyright.This article analyses the different types of original and derivative works contained in video games before evaluating the necessity and feasibility of a multimedia category of work, arguing in favour of the current system.

  6. Possibilities of Applying Video Surveillance and other ICT Tools and Services in the Production Process

    Directory of Open Access Journals (Sweden)

    Adis Rahmanović

    2018-02-01

    Full Text Available The paper presents the possibilities of applying Video surveillance and other ICT tools and services in the production process. The first part of the paper presented the system for controlling video surveillance for and the given opportunity of application of video surveillance for the security of the employees and the assets. In the second part of the paper an analysis of the system for controlling production is given and then a video surveillance of a work excavator. The next part of the paper presents integration of video surveillance and the accompanying tools. At the end of the paper, suggestions were also given for further works in the field of data protection and cryptography in video surveillance use.

  7. Mitochondrial DNA Copy Number in Sleep Duration Discordant Monozygotic Twins.

    Science.gov (United States)

    Wrede, Joanna E; Mengel-From, Jonas; Buchwald, Dedra; Vitiello, Michael V; Bamshad, Michael; Noonan, Carolyn; Christiansen, Lene; Christensen, Kaare; Watson, Nathaniel F

    2015-10-01

    Mitochondrial DNA (mtDNA) copy number is an important component of mitochondrial function and varies with age, disease, and environmental factors. We aimed to determine whether mtDNA copy number varies with habitual differences in sleep duration within pairs of monozygotic twins. Academic clinical research center. 15 sleep duration discordant monozygotic twin pairs (30 twins, 80% female; mean age 42.1 years [SD 15.0]). Sleep duration was phenotyped with wrist actigraphy. Each twin pair included a "normal" (7-9 h/24) and "short" (sleeping twin. Fasting peripheral blood leukocyte DNA was assessed for mtDNA copy number via the n-fold difference between qPCR measured mtDNA and nuclear DNA creating an mtDNA measure without absolute units. We used generalized estimating equation linear regression models accounting for the correlated data structure to assess within-pair effects of sleep duration on mtDNA copy number. Mean within-pair sleep duration difference per 24 hours was 94.3 minutes (SD 62.6 min). We found reduced sleep duration (β = 0.06; 95% CI 0.004, 0.12; P sleep efficiency (β = 0.51; 95% CI 0.06, 0.95; P sleep duration was associated with a decrease in mtDNA copy number of 0.06. Likewise, a 1% decrease in actigraphy-defined sleep efficiency was associated with a decrease in mtDNA copy number of 0.51. Reduced sleep duration and sleep efficiency were associated with reduced mitochondrial DNA copy number in sleep duration discordant monozygotic twins offering a potential mechanism whereby short sleep impairs health and longevity through mitochondrial stress. © 2015 Associated Professional Sleep Societies, LLC.

  8. Epistemic Authority, Lies, and Video

    DEFF Research Database (Denmark)

    Andersen, Rune Saugmann

    2013-01-01

    This article analyses how videos of violent protests become politically powerful arguments able to intervene in debates about security. It does so by looking at a series of videos taken by police authorities and protesters during street battles in Copenhagen in August 2009, when protesters opposed...

  9. Rheumatoid Arthritis Educational Video Series

    Medline Plus

    Full Text Available ... Patients from Johns Hopkins Stategies to Increase your Level of Physical Activity Role of Body Weight in Osteoarthritis Educational Videos for Patients Rheumatoid Arthritis Educational Video Series Psoriatic Arthritis 101 2010 E.S.C.A.P.E. Study Patient Update Transitioning the JRA ...

  10. Video Measurements: Quantity or Quality

    Science.gov (United States)

    Zajkov, Oliver; Mitrevski, Boce

    2012-01-01

    Students have problems with understanding, using and interpreting graphs. In order to improve the students' skills for working with graphs, we propose Manual Video Measurement (MVM). In this paper, the MVM method is explained and its accuracy is tested. The comparison with the standardized video data software shows that its accuracy is comparable…

  11. Encrypted IP video communication system

    Science.gov (United States)

    Bogdan, Apetrechioaie; Luminiţa, Mateescu

    2010-11-01

    Digital video transmission is a permanent subject of development, research and improvement. This field of research has an exponentially growing market in civil, surveillance, security and military aplications. A lot of solutions: FPGA, ASIC, DSP have been used for this purpose. The paper presents the implementation of an encrypted, IP based, video communication system having a competitive performance/cost ratio .

  12. Automatic summarization of narrative video

    NARCIS (Netherlands)

    Barbieri, M.

    2007-01-01

    The amount of digital video content available to users is rapidly increasing. Developments in computer, digital network, and storage technologies all contribute to broaden the offer of digital video. Only users’ attention and time remain scarce resources. Users face the problem of choosing the right

  13. Video Games as Moral Educators?

    Science.gov (United States)

    Khoo, Angeline

    2012-01-01

    The growing interest in video gaming is matched by a corresponding increase in concerns about the harmful effects on children and adolescents. There are numerous studies on aggression and addiction which spark debates on the negative effects of video gaming. At the same time, there are also studies demonstrating prosocial effects. This paper…

  14. NEI You Tube Videos: Amblyopia

    Medline Plus

    Full Text Available ... Amblyopia Listen NEI YouTube Videos YouTube Videos Home Age-Related Macular Degeneration Amblyopia Animations Blindness Cataract Convergence ... is maintained by the NEI Office of Science Communications, Public Liaison, and Education. Technical questions about this ...

  15. Video Streaming in Online Learning

    Science.gov (United States)

    Hartsell, Taralynn; Yuen, Steve Chi-Yin

    2006-01-01

    The use of video in teaching and learning is a common practice in education today. As learning online becomes more of a common practice in education, streaming video and audio will play a bigger role in delivering course materials to online learners. This form of technology brings courses alive by allowing online learners to use their visual and…

  16. Probabilistic Approaches to Video Retrieval

    NARCIS (Netherlands)

    Ianeva, Tzvetanka; Boldareva, L.; Westerveld, T.H.W.; Cornacchia, Roberto; Hiemstra, Djoerd; de Vries, A.P.

    Our experiments for TRECVID 2004 further investigate the applicability of the so-called “Generative Probabilistic Models to video retrieval��?. TRECVID 2003 results demonstrated that mixture models computed from video shot sequences improve the precision of “query by examples��? results when

  17. Commercially available video motion detectors

    International Nuclear Information System (INIS)

    1979-01-01

    A market survey of commercially available video motion detection systems was conducted by the Intrusion Detection Systems Technology Division of Sandia Laboratories. The information obtained from this survey is summarized in this report. The cutoff date for this information is May 1978. A list of commercially available video motion detection systems is appended

  18. Memory-cenric video processing

    NARCIS (Netherlands)

    Beric, A.; Meerbergen, van J.; Haan, de G.; Sethuraman, R.

    2008-01-01

    This work presents a domain-specific memory subsystem based on a two-level memory hierarchy. It targets the application domain of video post-processing applications including video enhancement and format conversion. These applications are based on motion compensation and/or broad class of content

  19. Negotiation for Strategic Video Games

    OpenAIRE

    Afiouni, Einar Nour; Øvrelid, Leif Julian

    2013-01-01

    This project aims to examine the possibilities of using game theoretic concepts and multi-agent systems in modern video games with real time demands. We have implemented a multi-issue negotiation system for the strategic video game Civilization IV, evaluating different negotiation techniques with a focus on the use of opponent modeling to improve negotiation results.

  20. The Art of Video Games

    Science.gov (United States)

    Johnson, Mark M.

    2012-01-01

    The Smithsonian American Art Museum has created and will tour an exhibition on a most unusual but extremely popular art form--"The Art of Video Games." As one of the largest and first of its type, this exhibition will document and explore a 40-year evolution of video games as an artistic medium, with a focus on striking visual effects and the…

  1. Special Needs: Planning for Adulthood (Videos)

    Medline Plus

    Full Text Available ... Videos for Educators Search English Español Special Needs: Planning for Adulthood (Video) KidsHealth / For Parents / Special Needs: Planning for Adulthood (Video) Print Young adults with special ...

  2. Special Needs: Planning for Adulthood (Videos)

    Medline Plus

    Full Text Available ... Staying Safe Videos for Educators Search English Español Special Needs: Planning for Adulthood (Video) KidsHealth / For Parents / Special Needs: Planning for Adulthood (Video) Print Young adults with ...

  3. Distributed source coding of video

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Van Luong, Huynh

    2015-01-01

    A foundation for distributed source coding was established in the classic papers of Slepian-Wolf (SW) [1] and Wyner-Ziv (WZ) [2]. This has provided a starting point for work on Distributed Video Coding (DVC), which exploits the source statistics at the decoder side offering shifting processing...... steps, conventionally performed at the video encoder side, to the decoder side. Emerging applications such as wireless visual sensor networks and wireless video surveillance all require lightweight video encoding with high coding efficiency and error-resilience. The video data of DVC schemes differ from...... the assumptions of SW and WZ distributed coding, e.g. by being correlated in time and nonstationary. Improving the efficiency of DVC coding is challenging. This paper presents some selected techniques to address the DVC challenges. Focus is put on pin-pointing how the decoder steps are modified to provide...

  4. Video game induced knuckle pad.

    Science.gov (United States)

    Rushing, Mary E; Sheehan, Daniel J; Davis, Loretta S

    2006-01-01

    Controversy and concern surround the video game playing fascination of children. Scientific reports have explored the negative effects of video games on youth, with a growing number recognizing the actual physical implications of this activity. We offer another reason to discourage children's focus on video games: knuckle pads. A 13-year-old black boy presented with an asymptomatic, slightly hyperpigmented plaque over his right second distal interphalangeal joint. A punch biopsy specimen confirmed knuckle pad as the diagnosis, and a traumatic etiology from video game playing was suspected. Knuckle pads can be painful, cosmetically unappealing, and refractory to treatment. They can now be recognized as yet another potential adverse consequence of chronic video game playing.

  5. Watermarking textures in video games

    Science.gov (United States)

    Liu, Huajian; Berchtold, Waldemar; Schäfer, Marcel; Lieb, Patrick; Steinebach, Martin

    2014-02-01

    Digital watermarking is a promising solution to video game piracy. In this paper, based on the analysis of special challenges and requirements in terms of watermarking textures in video games, a novel watermarking scheme for DDS textures in video games is proposed. To meet the performance requirements in video game applications, the proposed algorithm embeds the watermark message directly in the compressed stream in DDS files and can be straightforwardly applied in watermark container technique for real-time embedding. Furthermore, the embedding approach achieves high watermark payload to handle collusion secure fingerprinting codes with extreme length. Hence, the scheme is resistant to collusion attacks, which is indispensable in video game applications. The proposed scheme is evaluated in aspects of transparency, robustness, security and performance. Especially, in addition to classical objective evaluation, the visual quality and playing experience of watermarked games is assessed subjectively in game playing.

  6. Toy Trucks in Video Analysis

    DEFF Research Database (Denmark)

    Buur, Jacob; Nakamura, Nanami; Larsen, Rainer Rye

    2015-01-01

    discovered that using scale-models like toy trucks has a strongly encouraging effect on developers/designers to collaboratively make sense of field videos. In our analysis of such scale-model sessions, we found some quite fundamental patterns of how participants utilise objects; the participants build shared......Video fieldstudies of people who could be potential users is widespread in design projects. How to analyse such video is, however, often challenging, as it is time consuming and requires a trained eye to unlock experiential knowledge in people’s practices. In our work with industrialists, we have...... narratives by moving the objects around, they name them to handle the complexity, they experience what happens in the video through their hands, and they use the video together with objects to create alternative narratives, and thus alternative solutions to the problems they observe. In this paper we claim...

  7. Smart Streaming for Online Video Services

    OpenAIRE

    Chen, Liang; Zhou, Yipeng; Chiu, Dah Ming

    2013-01-01

    Bandwidth consumption is a significant concern for online video service providers. Practical video streaming systems usually use some form of HTTP streaming (progressive download) to let users download the video at a faster rate than the video bitrate. Since users may quit before viewing the complete video, however, much of the downloaded video will be "wasted". To the extent that users' departure behavior can be predicted, we develop smart streaming that can be used to improve user QoE with ...

  8. Screening for common copy-number variants in cancer genes.

    Science.gov (United States)

    Tyson, Jess; Majerus, Tamsin M O; Walker, Susan; Armour, John A L

    2010-12-01

    For most cases of colorectal cancer that arise without a family history of the disease, it is proposed that an appreciable heritable component of predisposition is the result of contributions from many loci. Although progress has been made in identifying single nucleotide variants associated with colorectal cancer risk, the involvement of low-penetrance copy number variants is relatively unexplored. We have used multiplex amplifiable probe hybridization (MAPH) in a fourfold multiplex (QuadMAPH), positioned at an average resolution of one probe per 2 kb, to screen a total of 1.56 Mb of genomic DNA for copy number variants around the genes APC, AXIN1, BRCA1, BRCA2, CTNNB1, HRAS, MLH1, MSH2, and TP53. Two deletion events were detected, one upstream of MLH1 in a control individual and the other in APC in a colorectal cancer patient, but these do not seem to correspond to copy number polymorphisms with measurably high population frequencies. In summary, by means of our QuadMAPH assay, copy number measurement data were of sufficient resolution and accuracy to detect any copy number variants with high probability. However, this study has demonstrated a very low incidence of deletion and duplication variants within intronic and flanking regions of these nine genes, in both control individuals and colorectal cancer patients. Copyright © 2010 Elsevier Inc. All rights reserved.

  9. Hard copies for digital medical images: an overview

    Science.gov (United States)

    Blume, Hartwig R.; Muka, Edward

    1995-04-01

    This paper is a condensed version of an invited overview on the technology of film hard-copies used in radiology. Because the overview was given to an essentially nonmedical audience, the reliance on film hard-copies in radiology is outlined in greater detail. The overview is concerned with laser image recorders generating monochrome prints on silver-halide films. The basic components of laser image recorders are sketched. The paper concentrates on the physical parameters - characteristic function, dynamic range, digitization resolution, modulation transfer function, and noise power spectrum - which define image quality and information transfer capability of the printed image. A preliminary approach is presented to compare the printed image quality with noise in the acquired image as well as with the noise of state-of- the-art cathode-ray-tube display systems. High-performance laser-image- recorder/silver-halide-film/light-box systems are well capable of reproducing acquired radiologic information. Most recently development was begun toward a display function standard for soft-copy display systems to facilitate similarity of image presentation between different soft-copy displays as well as between soft- and hard-copy displays. The standard display function is based on perceptional linearization. The standard is briefly reviewed to encourage the printer industry to adopt it, too.

  10. Ranking Highlights in Personal Videos by Analyzing Edited Videos.

    Science.gov (United States)

    Sun, Min; Farhadi, Ali; Chen, Tseng-Hung; Seitz, Steve

    2016-11-01

    We present a fully automatic system for ranking domain-specific highlights in unconstrained personal videos by analyzing online edited videos. A novel latent linear ranking model is proposed to handle noisy training data harvested online. Specifically, given a targeted domain such as "surfing," our system mines the YouTube database to find pairs of raw and their corresponding edited videos. Leveraging the assumption that an edited video is more likely to contain highlights than the trimmed parts of the raw video, we obtain pair-wise ranking constraints to train our model. The learning task is challenging due to the amount of noise and variation in the mined data. Hence, a latent loss function is incorporated to mitigate the issues caused by the noise. We efficiently learn the latent model on a large number of videos (about 870 min in total) using a novel EM-like procedure. Our latent ranking model outperforms its classification counterpart and is fairly competitive compared with a fully supervised ranking system that requires labels from Amazon Mechanical Turk. We further show that a state-of-the-art audio feature mel-frequency cepstral coefficients is inferior to a state-of-the-art visual feature. By combining both audio-visual features, we obtain the best performance in dog activity, surfing, skating, and viral video domains. Finally, we show that impressive highlights can be detected without additional human supervision for seven domains (i.e., skating, surfing, skiing, gymnastics, parkour, dog activity, and viral video) in unconstrained personal videos.

  11. Video Quality Prediction Models Based on Video Content Dynamics for H.264 Video over UMTS Networks

    Directory of Open Access Journals (Sweden)

    Asiya Khan

    2010-01-01

    Full Text Available The aim of this paper is to present video quality prediction models for objective non-intrusive, prediction of H.264 encoded video for all content types combining parameters both in the physical and application layer over Universal Mobile Telecommunication Systems (UMTS networks. In order to characterize the Quality of Service (QoS level, a learning model based on Adaptive Neural Fuzzy Inference System (ANFIS and a second model based on non-linear regression analysis is proposed to predict the video quality in terms of the Mean Opinion Score (MOS. The objective of the paper is two-fold. First, to find the impact of QoS parameters on end-to-end video quality for H.264 encoded video. Second, to develop learning models based on ANFIS and non-linear regression analysis to predict video quality over UMTS networks by considering the impact of radio link loss models. The loss models considered are 2-state Markov models. Both the models are trained with a combination of physical and application layer parameters and validated with unseen dataset. Preliminary results show that good prediction accuracy was obtained from both the models. The work should help in the development of a reference-free video prediction model and QoS control methods for video over UMTS networks.

  12. Measurement of locus copy number by hybridisation with amplifiable probes

    Science.gov (United States)

    Armour, John A. L.; Sismani, Carolina; Patsalis, Philippos C.; Cross, Gareth

    2000-01-01

    Despite its fundamental importance in genome analysis, it is only recently that systematic approaches have been developed to assess copy number at specific genetic loci, or to examine genomic DNA for submicroscopic deletions of unknown location. In this report we show that short probes can be recovered and amplified quantitatively following hybridisation to genomic DNA. This simple observation forms the basis of a new approach to determining locus copy number in complex genomes. The power and specificity of multiplex amplifiable probe hybridisation is demonstrated by the simultaneous assessment of copy number at a set of 40 human loci, including detection of deletions causing Duchenne muscular dystrophy and Prader–Willi/Angelman syndromes. Assembly of other probe sets will allow novel, technically simple approaches to a wide variety of genetic analyses, including the potential for extension to high resolution genome-wide screens for deletions and amplifications. PMID:10606661

  13. Measurement of locus copy number by hybridisation with amplifiable probes.

    Science.gov (United States)

    Armour, J A; Sismani, C; Patsalis, P C; Cross, G

    2000-01-15

    Despite its fundamental importance in genome analysis, it is only recently that systematic approaches have been developed to assess copy number at specific genetic loci, or to examine genomic DNA for submicro-scopic deletions of unknown location. In this report we show that short probes can be recovered and amplified quantitatively following hybridisation to genomic DNA. This simple observation forms the basis of a new approach to determining locus copy number in complex genomes. The power and specificity of multiplex amplifiable probe hybridisation is demonstrated by the simultaneous assessment of copy number at a set of 40 human loci, including detection of deletions causing Duchenne muscular dystrophy and Prader-Willi/Angelman syndromes. Assembly of other probe sets will allow novel, technically simple approaches to a wide variety of genetic analyses, including the potential for extension to high resolution genome-wide screens for deletions and amplifications.

  14. Interactive Video, The Next Step

    Science.gov (United States)

    Strong, L. R.; Wold-Brennon, R.; Cooper, S. K.; Brinkhuis, D.

    2012-12-01

    Video has the ingredients to reach us emotionally - with amazing images, enthusiastic interviews, music, and video game-like animations-- and it's emotion that motivates us to learn more about our new interest. However, watching video is usually passive. New web-based technology is expanding and enhancing the video experience, creating opportunities to use video with more direct interaction. This talk will look at an Educaton and Outreach team's experience producing video-centric curriculum using innovative interactive media tools from TED-Ed and FlixMaster. The Consortium for Ocean Leadership's Deep Earth Academy has partnered with the Center for Dark Energy Biosphere Investigations (C-DEBI) to send educators and a video producer aboard three deep sea research expeditions to the Juan de Fuca plate to install and service sub-seafloor observatories. This collaboration between teachers, students, scientists and media producers has proved a productive confluence, providing new ways of understanding both ground-breaking science and the process of science itself - by experimenting with new ways to use multimedia during ocean-going expeditions and developing curriculum and other projects post-cruise.

  15. Video personalization for usage environment

    Science.gov (United States)

    Tseng, Belle L.; Lin, Ching-Yung; Smith, John R.

    2002-07-01

    A video personalization and summarization system is designed and implemented incorporating usage environment to dynamically generate a personalized video summary. The personalization system adopts the three-tier server-middleware-client architecture in order to select, adapt, and deliver rich media content to the user. The server stores the content sources along with their corresponding MPEG-7 metadata descriptions. Our semantic metadata is provided through the use of the VideoAnnEx MPEG-7 Video Annotation Tool. When the user initiates a request for content, the client communicates the MPEG-21 usage environment description along with the user query to the middleware. The middleware is powered by the personalization engine and the content adaptation engine. Our personalization engine includes the VideoSue Summarization on Usage Environment engine that selects the optimal set of desired contents according to user preferences. Afterwards, the adaptation engine performs the required transformations and compositions of the selected contents for the specific usage environment using our VideoEd Editing and Composition Tool. Finally, two personalization and summarization systems are demonstrated for the IBM Websphere Portal Server and for the pervasive PDA devices.

  16. A comprehensive profile of DNA copy number variations in a Korean population: identification of copy number invariant regions among Koreans.

    Science.gov (United States)

    Jeon, Jae Pil; Shim, Sung Mi; Jung, Jong Sun; Nam, Hye Young; Lee, Hye Jin; Oh, Berm Seok; Kim, Kuchan; Kim, Hyung Lae; Han, Bok Ghee

    2009-09-30

    To examine copy number variations among the Korean population, we compared individual genomes with the Korean reference genome assembly using the publicly available Korean HapMap SNP 50 k chip data from 90 individuals. Korean individuals exhibited 123 copy number variation regions (CNVRs) covering 27.2 mb, equivalent to 1.0% of the genome in the copy number variation (CNV) analysis using the combined criteria of P value (Por= 0.25) among study subjects. In contrast, when compared to the Affymetrix reference genome assembly from multiple ethnic groups, considerably more CNVRs (n=643) were detected in larger proportions (5.0%) of the genome covering 135.1 mb even by more stringent criteria (Por=0.25), reflecting ethnic diversity of structural variations between Korean and other populations. Some CNVRs were validated by the quantitative multiplex PCR of short fluorescent fragment (QMPSF) method, and then copy number invariant regions were detected among the study subjects. These copy number invariant regions would be used as good internal controls for further CNV studies. Lastly, we demonstrated that the CNV information could stratify even a single ethnic population with a proper reference genome assembly from multiple heterogeneous populations.

  17. 29 CFR 1956.64 - Location of plan for inspection and copying.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Location of plan for inspection and copying. 1956.64... PLANS New Jersey § 1956.64 Location of plan for inspection and copying. A copy of the plan may be inspected and copied during normal business hours at the following locations: Office of State Programs, U.S...

  18. 29 CFR 1956.84 - Location of plan for inspection and copying.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Location of plan for inspection and copying. 1956.84... PLANS Illinois § 1956.84 Location of plan for inspection and copying. A copy of the plan may be inspected and copied during normal business hours at the following locations: Office of State Programs, U.S...

  19. From Copy-and-Paste to Trace-and-Learn

    DEFF Research Database (Denmark)

    Klitgård, Ida

    2009-01-01

    of them even use the term ‹copy-and-paste› to illustrate this, suggesting that their perception is closely linked to their use of the internet. This generally one-dimensional perception calls for immediate repair work in the teaching of English academic writing in International Study Programmes......This paper presents an investigation of both Danish and international second-semester BA-students' perceptions of the problem of plagiarism. Surprisingly, the investigation proves that the students unanimously perceive plagiarism as directly copying other people's texts or entire works. Some...

  20. Copy-number variants in neurodevelopmental disorders: promises and challenges.

    LENUS (Irish Health Repository)

    Merikangas, Alison K

    2012-02-01

    Copy-number variation (CNV) is the most prevalent type of structural variation in the human genome. There is emerging evidence that copy-number variants (CNVs) provide a new vista on understanding susceptibility to neuropsychiatric disorders. Some challenges in the interpretation of current CNV studies include the use of overlapping samples, differing phenotypic definitions, an absence of population norms for CNVs and a lack of consensus in methods for CNV detection and analysis. Here, we review current CNV association study methods and results in autism spectrum disorders (ASD) and schizophrenia, and provide suggestions for design approaches to future studies that might maximize the translation of this work to etiological understanding.

  1. Video and non-video feedback interventions for teen drivers.

    Science.gov (United States)

    2016-07-01

    In-vehicle feedback technologies, including some that use video, help parents monitor and mentor their young drivers. While different feedback technologies have been shown to reduce some risky driving behaviors, teens and parents cite privacy concern...

  2. Video systems for alarm assessment

    International Nuclear Information System (INIS)

    Greenwoll, D.A.; Matter, J.C.; Ebel, P.E.

    1991-09-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing closed-circuit television systems for video alarm assessment. There is a section on each of the major components in a video system: camera, lens, lighting, transmission, synchronization, switcher, monitor, and recorder. Each section includes information on component selection, procurement, installation, test, and maintenance. Considerations for system integration of the components are contained in each section. System emphasis is focused on perimeter intrusion detection and assessment systems. A glossary of video terms is included. 13 figs., 9 tabs

  3. Video systems for alarm assessment

    Energy Technology Data Exchange (ETDEWEB)

    Greenwoll, D.A.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Ebel, P.E. (BE, Inc., Barnwell, SC (United States))

    1991-09-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing closed-circuit television systems for video alarm assessment. There is a section on each of the major components in a video system: camera, lens, lighting, transmission, synchronization, switcher, monitor, and recorder. Each section includes information on component selection, procurement, installation, test, and maintenance. Considerations for system integration of the components are contained in each section. System emphasis is focused on perimeter intrusion detection and assessment systems. A glossary of video terms is included. 13 figs., 9 tabs.

  4. Comparison of Video Steganography Methods for Watermark Embedding

    Directory of Open Access Journals (Sweden)

    Griberman David

    2016-05-01

    Full Text Available The paper focuses on the comparison of video steganography methods for the purpose of digital watermarking in the context of copyright protection. Four embedding methods that use Discrete Cosine and Discrete Wavelet Transforms have been researched and compared based on their embedding efficiency and fidelity. A video steganography program has been developed in the Java programming language with all of the researched methods implemented for experiments. The experiments used 3 video containers with different amounts of movement. The impact of the movement has been addressed in the paper as well as the ways of potential improvement of embedding efficiency using adaptive embedding based on the movement amount. Results of the research have been verified using a survey with 17 participants.

  5. Video Watermarking Implementation Based on FPGA

    International Nuclear Information System (INIS)

    EL-ARABY, W.S.M.S.

    2012-01-01

    The sudden increase in watermarking interest is most likely due to the increase in concern over copyright protection of content. With the rapid growth of the Internet and the multimedia systems in distributed environments, digital data owners are now easier to transfer multimedia documents across the Internet. However, current technology does not protect their copyrights properly. This leads to wide interest of multimedia security and multimedia copyright protection and it has become a great concern to the public in recent years. In the early days, encryption and control access techniques were used to protect the ownership of media. Recently, the watermarking techniques are utilized to keep safely the copyrights. In this thesis, a fast and secure invisible video watermark technique has been introduced. The technique based mainly on DCT and Low Frequency using pseudo random number (PN) sequence generator for embedding algorithm. The system has been realized using VHDL and the results have been verified using MATLAB. The implementation of the introduced watermark system done using Xilinx chip (XCV800). The implementation results show that the total area of watermark technique is 45% of total FPGA area with maximum delay equals 16.393ns. The experimental results show that the two techniques have mean square error (MSE) equal to 0.0133 and peak signal to noise ratio (PSNR) equal to 66.8984db. The results have been demonstrated and compared with conventional watermark technique using DCT.

  6. Protecting personal data in camera surveillance practices

    NARCIS (Netherlands)

    Dubbeld, L.

    2005-01-01

    This paper explores in which ways privacy (in particular, data protection principles) comes to the fore in the day-to-day operation of a public video surveillance system. Starting from current European legal perspectives on data protection, and building on an empirical case study, the meanings and

  7. Robust efficient video fingerprinting

    Science.gov (United States)

    Puri, Manika; Lubin, Jeffrey

    2009-02-01

    We have developed a video fingerprinting system with robustness and efficiency as the primary and secondary design criteria. In extensive testing, the system has shown robustness to cropping, letter-boxing, sub-titling, blur, drastic compression, frame rate changes, size changes and color changes, as well as to the geometric distortions often associated with camcorder capture in cinema settings. Efficiency is afforded by a novel two-stage detection process in which a fast matching process first computes a number of likely candidates, which are then passed to a second slower process that computes the overall best match with minimal false alarm probability. One key component of the algorithm is a maximally stable volume computation - a three-dimensional generalization of maximally stable extremal regions - that provides a content-centric coordinate system for subsequent hash function computation, independent of any affine transformation or extensive cropping. Other key features include an efficient bin-based polling strategy for initial candidate selection, and a final SIFT feature-based computation for final verification. We describe the algorithm and its performance, and then discuss additional modifications that can provide further improvement to efficiency and accuracy.

  8. Are violent video games harmful?

    Science.gov (United States)

    Porter, Guy; Starcevic, Vladan

    2007-10-01

    The aim of this paper is to revisit the controversial issue of the association of violent video games and aggressive behaviour. Several lines of evidence suggest that there is a link between exposure to violent video games and aggressive behaviour. However, methodological shortcomings of research conducted so far make several interpretations of this relationship possible. Thus, aggressive behaviour may be a consequence of playing violent video games, an expression of hostile traits that existed before exposure to these games, and/or it may be a result of several possible combinations of these and other factors. Mental health professionals need to be aware of these potentially negative effects of violent video games when assessing patients who present with aggression. There is a need for prospective, long-term studies similar to those evaluating the effects of television and film violence on children and adolescents.

  9. NEI You Tube Videos: Amblyopia

    Medline Plus

    Full Text Available ... the special health problems and requirements of the blind.” News & Events Events Calendar NEI Press Releases News ... Videos Home Age-Related Macular Degeneration Amblyopia Animations Blindness Cataract Convergence Insufficiency Diabetic Eye Disease Dilated Eye ...

  10. Rheumatoid Arthritis Educational Video Series

    Medline Plus

    Full Text Available ... and what other conditions are associated with RA. Learning more about your condition will allow you to ... Arthritis Educational Video Series Psoriatic Arthritis 101 2010 E.S.C.A.P.E. Study Patient Update Transitioning ...

  11. NEI You Tube Videos: Amblyopia

    Medline Plus

    Full Text Available ... Diabetic Eye Disease Education Program Glaucoma Education Program Low Vision Education Program Hispanic/Latino Program Vision and Aging ... Kids Glaucoma Healthy Vision Tips Leber Congenital Amaurosis Low Vision Refractive Errors Retinopathy of Prematurity Science Spanish Videos ...

  12. NEI You Tube Videos: Amblyopia

    Medline Plus

    Full Text Available ... and Aging Program African American Program Training and Jobs Fellowships NEI Summer Intern Program Diversity In Vision ... DIVRO) Student Training Programs To search for current job openings visit HHS USAJobs Home >> NEI YouTube Videos >> ...

  13. Rheumatoid Arthritis Educational Video Series

    Medline Plus

    Full Text Available ... to take a more active role in your care. The information in these videos should not take ... She is a critical member of our patient care team. Managing Your Arthritis Managing Your Arthritis Managing ...

  14. Rheumatoid Arthritis Educational Video Series

    Medline Plus

    Full Text Available ... a more active role in your care. The information in these videos should not take the place of any advice you ... Management for Rheumatoid Arthritis Patients Rehabilitation of Older Adult ...

  15. Video over IP design guidebook.

    Science.gov (United States)

    2009-12-01

    Texas Department of Transportation (TxDOT) engineers are responsible for the design, evaluation, and : implementation of video solutions across the entire state. These installations occur with vast differences in : requirements, expectations, and con...

  16. Copy number variation of KIR genes influences HIV-1 control

    DEFF Research Database (Denmark)

    Pelak, Kimberly; Need, Anna C; Fellay, Jacques

    2011-01-01

    A genome-wide screen for large structural variants showed that a copy number variant (CNV) in the region encoding killer cell immunoglobulin-like receptors (KIR) associates with HIV-1 control as measured by plasma viral load at set point in individuals of European ancestry. This CNV encompasses t...

  17. Chimpanzees copy dominant and knowledgeable individuals: implications for cultural diversity.

    Science.gov (United States)

    Kendal, Rachel; Hopper, Lydia M; Whiten, Andrew; Brosnan, Sarah F; Lambeth, Susan P; Schapiro, Steven J; Hoppitt, Will

    2015-01-01

    Evolutionary theory predicts that natural selection will fashion cognitive biases to guide when, and from whom, individuals acquire social information, but the precise nature of these biases, especially in ecologically valid group contexts, remains unknown. We exposed four captive groups of chimpanzees ( Pan troglodytes ) to a novel extractive foraging device and, by fitting statistical models, isolated four simultaneously operating transmission biases. These include biases to copy (i) higher-ranking and (ii) expert individuals, and to copy others when (iii) uncertain or (iv) of low rank. High-ranking individuals were relatively un-strategic in their use of acquired knowledge, which, combined with the bias for others to observe them, may explain reports that high innovation rates (in juveniles and subordinates) do not generate a correspondingly high frequency of traditions in chimpanzees. Given the typically low rank of immigrants in chimpanzees, a 'copying dominants' bias may contribute to the observed maintenance of distinct cultural repertoires in neighboring communities despite sharing similar ecology and knowledgeable migrants. Thus, a copying dominants strategy may, as often proposed for conformist transmission, and perhaps in concert with it, restrict the accumulation of traditions within chimpanzee communities whilst maintaining cultural diversity.

  18. 37 CFR 360.25 - Copies of claims.

    Science.gov (United States)

    2010-07-01

    ... Section 360.25 Patents, Trademarks, and Copyrights COPYRIGHT ROYALTY BOARD, LIBRARY OF CONGRESS SUBMISSION OF ROYALTY CLAIMS FILING OF CLAIMS TO ROYALTY FEES COLLECTED UNDER COMPULSORY LICENSE Digital Audio Recording Devices and Media Royalty Claims § 360.25 Copies of claims. A claimant shall, for each claim...

  19. 37 CFR 360.5 - Copies of claims.

    Science.gov (United States)

    2010-07-01

    ... Section 360.5 Patents, Trademarks, and Copyrights COPYRIGHT ROYALTY BOARD, LIBRARY OF CONGRESS SUBMISSION OF ROYALTY CLAIMS FILING OF CLAIMS TO ROYALTY FEES COLLECTED UNDER COMPULSORY LICENSE Cable Claims... hand delivery or by mail, file an original and one copy of the claim to cable royalty fees. ...

  20. Using Copy Change with Trade Books to Teach Earth Science

    Science.gov (United States)

    Bintz, William P.; Wright, Pam; Sheffer, Julie

    2010-01-01

    Developing and implementing relevant, challenging, integrative, and exploratory curriculum is critical at all levels of schooling. This article describes one attempt to develop and implement an instance of interdisciplinary curriculum by using copy change with trade books to teach earth science. Specifically, it introduces trade books as a way to…

  1. Students Write, Then "Sell" Ad Copy to Class.

    Science.gov (United States)

    Galician, Mary Lou

    1986-01-01

    Describes a course in commercial copywriting for electronic media in which students must also present orally their copy to the class to drive home two points: (1) the writing has to sell products, and (2) the writer has to sell the spot or campaign to the client or employers. (HTH)

  2. Clinical findings and genetic screening for copy number variation ...

    African Journals Online (AJOL)

    to the Unified Parkinson's Disease Rating Scale (UPDRS), and patients were classified according to motor features. Genomic DNA was extracted and multiplex ligation-dependent probe amplification was used for detection of copy number variation (CNV) mutations in the known PD-causing genes. Results. Sixteen patients ...

  3. Conservatism and "copy-if-better" in chimpanzees (Pan troglodytes).

    Science.gov (United States)

    van Leeuwen, Edwin J C; Call, Josep

    2017-05-01

    Social learning is predicted to evolve in socially living animals provided the learning process is not random but biased by certain socio-ecological factors. One bias of particular interest for the emergence of (cumulative) culture is the tendency to forgo personal behaviour in favour of relatively better variants observed in others, also known as the "copy-if-better" strategy. We investigated whether chimpanzees employ copy-if-better in a simple token-exchange paradigm controlling for individual and random social learning. After being trained on one token-type, subjects were confronted with a conspecific demonstrator who either received the same food reward as the subject (control condition) or a higher value food reward than the subject (test condition) for exchanging another token-type. In general, the chimpanzees persisted in exchanging the token-type they were trained on individually, indicating a form of conservatism consistent with previous studies. However, the chimpanzees were more inclined to copy the demonstrator in the test compared to the control condition, indicating a tendency to employ a copy-if-better strategy. We discuss the validity of our results by considering alternative explanations and relate our findings to the emergence of cumulative culture.

  4. Industrial relevance of chromosomal copy number variation in Saccharomyces yeasts

    NARCIS (Netherlands)

    Gorter de Vries, A.R.; Pronk, J.T.; Daran, J.G.

    2017-01-01

    Chromosomal copy number variation (CCNV) plays a key role in evolution and health of eukaryotes. The unicellular yeast Saccharomyces cerevisiae is an important model for studying the generation, physiological impact, and evolutionary significance of CCNV. Fundamental studies of this yeast have

  5. 29 CFR 1905.7 - Form of documents; subscription; copies.

    Science.gov (United States)

    2010-07-01

    ... UNDER THE WILLIAMS-STEIGER OCCUPATIONAL SAFETY AND HEALTH ACT OF 1970 General § 1905.7 Form of documents... 29 Labor 5 2010-07-01 2010-07-01 false Form of documents; subscription; copies. 1905.7 Section 1905.7 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION...

  6. 75 FR 4031 - Streamlining Hard-Copy Postage Statement Processing

    Science.gov (United States)

    2010-01-26

    ... finalized postage statements from PostalOne! facilities are available online at the Business Customer...! facilities only. Copies of finalized postage statements are available online at the Business Customer Gateway... postage statements from PostalOne! facilities are available online at the Business Customer Gateway. 2. At...

  7. 37 CFR 203.5 - Inspection and copying.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Inspection and copying. 203.5 Section 203.5 Patents, Trademarks, and Copyrights COPYRIGHT OFFICE, LIBRARY OF CONGRESS COPYRIGHT OFFICE AND PROCEDURES FREEDOM OF INFORMATION ACT: POLICIES AND PROCEDURES Availability of Information § 203.5...

  8. HEP visualization and video technology

    International Nuclear Information System (INIS)

    Lebrun, P.; Swoboda, D.

    1994-01-01

    The use of scientific visualization for HEP analysis is briefly reviewed. The applications are highly interactive and very dynamical in nature. At Fermilab, E687, in collaboration with Visual Media Services, has produced a 1/2 hour video tape demonstrating the capability of SGI-EXPLORER applied to a Dalitz Analysis of Charm decay. This short contribution describes the authors experience with visualization and video technologies

  9. Video Inpainting of Complex Scenes

    OpenAIRE

    Newson, Alasdair; Almansa, Andrés; Fradet, Matthieu; Gousseau, Yann; Pérez, Patrick

    2015-01-01

    We propose an automatic video inpainting algorithm which relies on the optimisation of a global, patch-based functional. Our algorithm is able to deal with a variety of challenging situations which naturally arise in video inpainting, such as the correct reconstruction of dynamic textures, multiple moving objects and moving background. Furthermore, we achieve this in an order of magnitude less execution time with respect to the state-of-the-art. We are also able to achieve good quality result...

  10. Video Chat with Multiple Cameras

    OpenAIRE

    MacCormick, John

    2012-01-01

    The dominant paradigm for video chat employs a single camera at each end of the conversation, but some conversations can be greatly enhanced by using multiple cameras at one or both ends. This paper provides the first rigorous investigation of multi-camera video chat, concentrating especially on the ability of users to switch between views at either end of the conversation. A user study of 23 individuals analyzes the advantages and disadvantages of permitting a user to switch between views at...

  11. Intelligent control for scalable video processing

    NARCIS (Netherlands)

    Wüst, C.C.

    2006-01-01

    In this thesis we study a problem related to cost-effective video processing in software by consumer electronics devices, such as digital TVs. Video processing is the task of transforming an input video signal into an output video signal, for example to improve the quality of the signal. This

  12. Video enhancement : content classification and model selection

    NARCIS (Netherlands)

    Hu, H.

    2010-01-01

    The purpose of video enhancement is to improve the subjective picture quality. The field of video enhancement includes a broad category of research topics, such as removing noise in the video, highlighting some specified features and improving the appearance or visibility of the video content. The

  13. An introduction to video image compression and authentication technology for safeguards applications

    International Nuclear Information System (INIS)

    Johnson, C.S.

    1995-01-01

    Verification of a video image has been a major problem for safeguards for several years. Various verification schemes have been tried on analog video signals ever since the mid-1970's. These schemes have provided a measure of protection but have never been widely adopted. The development of reasonably priced complex video processing integrated circuits makes it possible to digitize a video image and then compress the resulting digital file into a smaller file without noticeable loss of resolution. Authentication and/or encryption algorithms can be more easily applied to digital video files that have been compressed. The compressed video files require less time for algorithm processing and image transmission. An important safeguards application for authenticated, compressed, digital video images is in unattended video surveillance systems and remote monitoring systems. The use of digital images in the surveillance system makes it possible to develop remote monitoring systems that send images over narrow bandwidth channels such as the common telephone line. This paper discusses the video compression process, authentication algorithm, and data format selected to transmit and store the authenticated images

  14. Lyme Disease and YouTube TM: A Cross-Sectional Study of Video Contents.

    Science.gov (United States)

    Basch, Corey H; Mullican, Lindsay A; Boone, Kwanza D; Yin, Jingjing; Berdnik, Alyssa; Eremeeva, Marina E; Fung, Isaac Chun-Hai

    2017-08-01

    Lyme disease is the most common tick-borne disease. People seek health information on Lyme disease from YouTube TM videos. In this study, we investigated if the contents of Lyme disease-related YouTube TM videos varied by their sources. Most viewed English YouTube TM videos (n = 100) were identified and manually coded for contents and sources. Within the sample, 40 videos were consumer-generated, 31 were internet-based news, 16 were professional, and 13 were TV news. Compared with consumer-generated videos, TV news videos were more likely to mention celebrities (odds ratio [OR], 10.57; 95% confidence interval [CI], 2.13-52.58), prevention of Lyme disease through wearing protective clothing (OR, 5.63; 95% CI, 1.23-25.76), and spraying insecticides (OR, 7.71; 95% CI, 1.52-39.05). A majority of the most popular Lyme disease-related YouTube TM videos were not created by public health professionals. Responsible reporting and creative video-making facilitate Lyme disease education. Partnership with YouTube TM celebrities to co-develop educational videos may be a future direction.

  15. Video redaction: a survey and comparison of enabling technologies

    Science.gov (United States)

    Sah, Shagan; Shringi, Ameya; Ptucha, Raymond; Burry, Aaron; Loce, Robert

    2017-09-01

    With the prevalence of video recordings from smart phones, dash cams, body cams, and conventional surveillance cameras, privacy protection has become a major concern, especially in light of legislation such as the Freedom of Information Act. Video redaction is used to obfuscate sensitive and personally identifiable information. Today's typical workflow involves simple detection, tracking, and manual intervention. Automated methods rely on accurate detection mechanisms being paired with robust tracking methods across the video sequence to ensure the redaction of all sensitive information while minimizing spurious obfuscations. Recent studies have explored the use of convolution neural networks and recurrent neural networks for object detection and tracking. The present paper reviews the redaction problem and compares a few state-of-the-art detection, tracking, and obfuscation methods as they relate to redaction. The comparison introduces an evaluation metric that is specific to video redaction performance. The metric can be evaluated in a manner that allows balancing the penalty for false negatives and false positives according to the needs of particular application, thereby assisting in the selection of component methods and their associated hyperparameters such that the redacted video has fewer frames that require manual review.

  16. Video Tutorial of Continental Food

    Science.gov (United States)

    Nurani, A. S.; Juwaedah, A.; Mahmudatussa'adah, A.

    2018-02-01

    This research is motivated by the belief in the importance of media in a learning process. Media as an intermediary serves to focus on the attention of learners. Selection of appropriate learning media is very influential on the success of the delivery of information itself both in terms of cognitive, affective and skills. Continental food is a course that studies food that comes from Europe and is very complex. To reduce verbalism and provide more real learning, then the tutorial media is needed. Media tutorials that are audio visual can provide a more concrete learning experience. The purpose of this research is to develop tutorial media in the form of video. The method used is the development method with the stages of analyzing the learning objectives, creating a story board, validating the story board, revising the story board and making video tutorial media. The results show that the making of storyboards should be very thorough, and detailed in accordance with the learning objectives to reduce errors in video capture so as to save time, cost and effort. In video capturing, lighting, shooting angles, and soundproofing make an excellent contribution to the quality of tutorial video produced. In shooting should focus more on tools, materials, and processing. Video tutorials should be interactive and two-way.

  17. Learning from Narrated Instruction Videos.

    Science.gov (United States)

    Alayrac, Jean-Baptiste; Bojanowski, Piotr; Agrawal, Nishant; Sivic, Josef; Laptev, Ivan; Lacoste-Julien, Simon

    2017-09-05

    Automatic assistants could guide a person or a robot in performing new tasks, such as changing a car tire or repotting a plant. Creating such assistants, however, is non-trivial and requires understanding of visual and verbal content of a video. Towards this goal, we here address the problem of automatically learning the main steps of a task from a set of narrated instruction videos. We develop a new unsupervised learning approach that takes advantage of the complementary nature of the input video and the associated narration. The method sequentially clusters textual and visual representations of a task, where the two clustering problems are linked by joint constraints to obtain a single coherent sequence of steps in both modalities. To evaluate our method, we collect and annotate a new challenging dataset of real-world instruction videos from the Internet. The dataset contains videos for five different tasks with complex interactions between people and objects, captured in a variety of indoor and outdoor settings. We experimentally demonstrate that the proposed method can automatically discover, learn and localize the main steps of a task input videos.

  18. Video Encryption and Decryption on Quantum Computers

    Science.gov (United States)

    Yan, Fei; Iliyasu, Abdullah M.; Venegas-Andraca, Salvador E.; Yang, Huamin

    2015-08-01

    A method for video encryption and decryption on quantum computers is proposed based on color information transformations on each frame encoding the content of the encoding the content of the video. The proposed method provides a flexible operation to encrypt quantum video by means of the quantum measurement in order to enhance the security of the video. To validate the proposed approach, a tetris tile-matching puzzle game video is utilized in the experimental simulations. The results obtained suggest that the proposed method enhances the security and speed of quantum video encryption and decryption, both properties required for secure transmission and sharing of video content in quantum communication.

  19. Initial laboratory evaluation of color video cameras: Phase 2

    Energy Technology Data Exchange (ETDEWEB)

    Terry, P.L.

    1993-07-01

    Sandia National Laboratories has considerable experience with monochrome video cameras used in alarm assessment video systems. Most of these systems, used for perimeter protection, were designed to classify rather than to identify intruders. The monochrome cameras were selected over color cameras because they have greater sensitivity and resolution. There is a growing interest in the identification function of security video systems for both access control and insider protection. Because color camera technology is rapidly changing and because color information is useful for identification purposes, Sandia National Laboratories has established an on-going program to evaluate the newest color solid-state cameras. Phase One of the Sandia program resulted in the SAND91-2579/1 report titled: Initial Laboratory Evaluation of Color Video Cameras. The report briefly discusses imager chips, color cameras, and monitors, describes the camera selection, details traditional test parameters and procedures, and gives the results reached by evaluating 12 cameras. Here, in Phase Two of the report, we tested 6 additional cameras using traditional methods. In addition, all 18 cameras were tested by newly developed methods. This Phase 2 report details those newly developed test parameters and procedures, and evaluates the results.

  20. Copy-number and gene dependency analysis reveals partial copy loss of wild-type SF3B1 as a novel cancer vulnerability. | Office of Cancer Genomics

    Science.gov (United States)

    Genomic instability is a hallmark of human cancer, and results in widespread somatic copy number alterations. We used a genome-scale shRNA viability screen in human cancer cell lines to systematically identify genes that are essential in the context of particular copy-number alterations (copy-number associated gene dependencies). The most enriched class of copy-number associated gene dependencies was CYCLOPS (Copy-number alterations Yielding Cancer Liabilities Owing to Partial losS) genes, and spliceosome components were the most prevalent.

  1. Real-time unmanned aircraft systems surveillance video mosaicking using GPU

    Science.gov (United States)

    Camargo, Aldo; Anderson, Kyle; Wang, Yi; Schultz, Richard R.; Fevig, Ronald A.

    2010-04-01

    Digital video mosaicking from Unmanned Aircraft Systems (UAS) is being used for many military and civilian applications, including surveillance, target recognition, border protection, forest fire monitoring, traffic control on highways, monitoring of transmission lines, among others. Additionally, NASA is using digital video mosaicking to explore the moon and planets such as Mars. In order to compute a "good" mosaic from video captured by a UAS, the algorithm must deal with motion blur, frame-to-frame jitter associated with an imperfectly stabilized platform, perspective changes as the camera tilts in flight, as well as a number of other factors. The most suitable algorithms use SIFT (Scale-Invariant Feature Transform) to detect the features consistent between video frames. Utilizing these features, the next step is to estimate the homography between two consecutives video frames, perform warping to properly register the image data, and finally blend the video frames resulting in a seamless video mosaick. All this processing takes a great deal of resources of resources from the CPU, so it is almost impossible to compute a real time video mosaic on a single processor. Modern graphics processing units (GPUs) offer computational performance that far exceeds current CPU technology, allowing for real-time operation. This paper presents the development of a GPU-accelerated digital video mosaicking implementation and compares it with CPU performance. Our tests are based on two sets of real video captured by a small UAS aircraft; one video comes from Infrared (IR) and Electro-Optical (EO) cameras. Our results show that we can obtain a speed-up of more than 50 times using GPU technology, so real-time operation at a video capture of 30 frames per second is feasible.

  2. Digital video transcoding for transmission and storage

    CERN Document Server

    Sun, Huifang; Chen, Xuemin

    2004-01-01

    Professionals in the video and multimedia industries need a book that explains industry standards for video coding and how to convert the compressed information between standards. Digital Video Transcoding for Transmission and Storage answers this demand while also supplying the theories and principles of video compression and transcoding technologies. Emphasizing digital video transcoding techniques, this book summarizes its content via examples of practical methods for transcoder implementation. It relates almost all of its featured transcoding technologies to practical applications.This vol

  3. Diavideos: a diabetes health video portal.

    Science.gov (United States)

    Sánchez-Bocanegra, C L; Rivero-Rodriguez, A; Fernández-Luque, L; Sevillano, J L

    2013-01-01

    Diavideos is a web platform that collects trustworthy diabetes health videos from YouTube and offers them in a easy way. YouTube is a big repository of health videos, but good content is sometimes mixed with misleading and harmful videos such as promoting anorexia [1]. Diavideos is a web portal that provides easy access to a repository of trustworthy diabetes videos. This poster describes Diavideos and explains the crawling method used to retrieve these videos from trusted channels.

  4. Visual Analytics and Storytelling through Video

    Energy Technology Data Exchange (ETDEWEB)

    Wong, Pak C.; Perrine, Kenneth A.; Mackey, Patrick S.; Foote, Harlan P.; Thomas, Jim

    2005-10-31

    This paper supplements a video clip submitted to the Video Track of IEEE Symposium on Information Visualization 2005. The original video submission applies a two-way storytelling approach to demonstrate the visual analytics capabilities of a new visualization technique. The paper presents our video production philosophy, describes the plot of the video, explains the rationale behind the plot, and finally, shares our production experiences with our readers.

  5. Children's Video Games as Interactive Racialization

    OpenAIRE

    Martin, Cathlena

    2008-01-01

    Cathlena Martin explores in her paper "Children's Video Games as Interactive Racialization" selected children's video games. Martin argues that children's video games often act as reinforcement for the games' television and film counterparts and their racializing characteristics and features. In Martin's analysis the video games discussed represent media through which to analyze racial identities and ideologies. In making the case for positive female minority leads in children's video games, ...

  6. Advantage of using allele-specific copy numbers when testing for association in regions with common copy number variants.

    Directory of Open Access Journals (Sweden)

    Gaëlle Marenne

    Full Text Available Copy number variants (CNV can be called from SNP-arrays; however, few studies have attempted to combine both CNV and SNP calls to test for association with complex diseases. Even when SNPs are located within CNVs, two separate association analyses are necessary, to compare the distribution of bi-allelic genotypes in cases and controls (referred to as SNP-only strategy and the number of copies of a region (referred to as CNV-only strategy. However, when disease susceptibility is actually associated with allele specific copy-number states, the two strategies may not yield comparable results, raising a series of questions about the optimal analytical approach. We performed simulations of the performance of association testing under different scenarios that varied genotype frequencies and inheritance models. We show that the SNP-only strategy lacks power under most scenarios when the SNP is located within a CNV; frequently it is excluded from analysis as it does not pass quality control metrics either because of an increased rate of missing calls or a departure from fitness for Hardy-Weinberg proportion. The CNV-only strategy also lacks power because the association testing depends on the allele which copy number varies. The combined strategy performs well in most of the scenarios. Hence, we advocate the use of this combined strategy when testing for association with SNPs located within CNVs.

  7. Enhancing Security and Privacy in Video Surveillance through Role-Oriented Access Control Mechanism

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim

    sensitive regions, e.g. faces, from the videos. However, very few research efforts have focused on addressing the security aspects of video surveillance data and on authorizing access to this data. Interestingly, while PETs help protect the privacy of individuals, they may also hinder the usefulness....... Pervasive usage of such systems gives substantial powers to those monitoring the videos and poses a threat to the privacy of anyone observed by the system. Aside from protecting privacy from the outside attackers, it is equally important to protect the privacy of individuals from the inside personnel...... involved in monitoring surveillance data to minimize the chances of misuse of the system, e.g. voyeurism. In this context, several techniques to protect the privacy of individuals, called privacy enhancing techniques (PET) have therefore been proposed in the literature which detect and mask the privacy...

  8. Recordable storage medium with protected data area

    NARCIS (Netherlands)

    2005-01-01

    The invention relates to a method of storing data on a rewritable data storage medium, to a corresponding storage medium, to a corresponding recording apparatus and to a corresponding playback apparatus. Copy-protective measures require that on rewritable storage media some data must be stored which

  9. Rate Adaptive Selective Segment Assignment for Reliable Wireless Video Transmission

    Directory of Open Access Journals (Sweden)

    Sajid Nazir

    2012-01-01

    Full Text Available A reliable video communication system is proposed based on data partitioning feature of H.264/AVC, used to create a layered stream, and LT codes for erasure protection. The proposed scheme termed rate adaptive selective segment assignment (RASSA is an adaptive low-complexity solution to varying channel conditions. The comparison of the results of the proposed scheme is also provided for slice-partitioned H.264/AVC data. Simulation results show competitiveness of the proposed scheme compared to optimized unequal and equal error protection solutions. The simulation results also demonstrate that a high visual quality video transmission can be maintained despite the adverse effect of varying channel conditions and the number of decoding failures can be reduced.

  10. Video game addiction: The push to pathologize video games

    DEFF Research Database (Denmark)

    Nielsen, Rune Kristian Lundedal; Ferguson, Christopher; Bean, Anthony

    2017-01-01

    With proposals to include “gaming disorder” in both the Diagnostic and Statistical Manual (DSM) and International Compendium of Diseases (ICD), the concept of video game addiction has gained traction. However, many aspects of this concept remain controversial. At present, little clarity has been...... achieved regarding diagnostic criteria and appropriate symptoms. It is unclear if symptoms that involve problematic video gaming behavior should be reified as a new disorder, or are the expression of underlying mental conditions. Nonetheless, the recent proposals around gaming disorder from respected...... and necessity of the overarching construct. This raises multiple concerns. First, the current approaches to understanding “gaming addiction” are rooted in substance abuse research and approaches do not necessarily translate to media consumption. Second, some research has indicated that “video game addiction...

  11. Investigation of radiation emissions from video display terminals

    International Nuclear Information System (INIS)

    Zuk, W.M.; Stuchly, M.A.; Dvorak, P.; Deslauriers, Y.

    1983-01-01

    This report presents and discusses the results of radiation emission measurements carried out on video display terminals (VDTs) by the Radiation Protection Bureau. While the report is not intended to be an exhaustive review of all of the world literature on the subject, the more important studies performed on VDTs are summarized and reviewed. Attention is drawn to recent information which has not yet become generally available

  12. Mobile Video in Everyday Social Interactions

    Science.gov (United States)

    Reponen, Erika; Lehikoinen, Jaakko; Impiö, Jussi

    Video recording has become a spontaneous everyday activity for many people, thanks to the video capabilities of modern mobile phones. Internet connectivity of mobile phones enables fluent sharing of captured material even real-time, which makes video an up-and-coming everyday interaction medium. In this article we discuss the effect of the video camera in the social environment, everyday life situations, mainly based on a study where four groups of people used digital video cameras in their normal settings. We also reflect on another study of ours, relating to real-time mobile video communication and discuss future views. The aim of our research is to understand the possibilities in the domain of mobile video. Live and delayed sharing seem to have their special characteristics, live video being used as a virtual window between places whereas delayed video usage has more scope for good-quality content. While this novel way of interacting via mobile video enables new social patterns, it also raises new concerns for privacy and trust between participating persons in all roles, largely due to the widely spreading possibilities of videos. Video in a social situation affects cameramen (who record), targets (who are recorded), passers-by (who are unintentionally in the situation), and the audience (who follow the videos or recording situations) but also the other way around, the participants affect the video by their varying and evolving personal and communicational motivations for recording.

  13. Perturbative quantum gravity as a double copy of gauge theory.

    Science.gov (United States)

    Bern, Zvi; Carrasco, John Joseph M; Johansson, Henrik

    2010-08-06

    In a previous paper we observed that (classical) tree-level gauge-theory amplitudes can be rearranged to display a duality between color and kinematics. Once this is imposed, gravity amplitudes are obtained using two copies of gauge-theory diagram numerators. Here we conjecture that this duality persists to all quantum loop orders and can thus be used to obtain multiloop gravity amplitudes easily from gauge-theory ones. As a nontrivial test, we show that the three-loop four-point amplitude of N=4 super-Yang-Mills theory can be arranged into a form satisfying the duality, and by taking double copies of the diagram numerators we obtain the corresponding amplitude of N=8 supergravity. We also remark on a nonsupersymmetric two-loop test based on pure Yang-Mills theory resulting in gravity coupled to an antisymmetric tensor and dilaton.

  14. The copying power of one-state tree transducers

    DEFF Research Database (Denmark)

    Engelfriet, Joost; Skyum, Sven

    1982-01-01

    One-state deterministic top-down tree transducers (or, tree homomorphisms) cannot handle “prime copying,” i.e., their class of output (string) languages is not closed under the operation L → {$(w$)f(n) short parallel w ε L, f(n) greater-or-equal, slanted 1}, where f is any integer function whose...... range contains numbers with arbitrarily large prime factors (such as a polynomial). The exact amount of nonclosure under these copying operations is established for several classes of input (tree) languages. These results are relevant to the extended definable (or, restricted parallel level) languages......, to the syntax-directed translation of context-free languages, and to the tree transducer hierarchy....

  15. Research on copying system of dynamic multiplex holographic stereograms

    Science.gov (United States)

    Fu, Huaiping; Yang, Hong; Zheng, Tong

    2003-05-01

    The most important advantage of holographic stereograms over conventional hologram is that they can produce 3D images at any desired scale with movement, holographers in many countries involved in the studies towards it. We began our works in the early 80's and accomplished two research projects automatic system for making synthetic holograms and multiplex synthetic rainbow holograms, Based on these works, a large scale holographic stereogram of an animated goldfish was made by us for practical advertisement. In order to meet the needs of the market, a copying system for making multiplex holographic stereograms, and a special kind of silver halide holographic film developed by us recently. The characteristic of the copying system and the property of the special silver-halide emulsion are introduced in this paper.

  16. Copy number variation of KIR genes influences HIV-1 control

    DEFF Research Database (Denmark)

    Pelak, Kimberly; Need, Anna C; Fellay, Jacques

    2011-01-01

    A genome-wide screen for large structural variants showed that a copy number variant (CNV) in the region encoding killer cell immunoglobulin-like receptors (KIR) associates with HIV-1 control as measured by plasma viral load at set point in individuals of European ancestry. This CNV encompasses...... the KIR3DL1-KIR3DS1 locus, encoding receptors that interact with specific HLA-Bw4 molecules to regulate the activation of lymphocyte subsets including natural killer (NK) cells. We quantified the number of copies of KIR3DS1 and KIR3DL1 in a large HIV-1 positive cohort, and showed that an increase in KIR3...... amounts of these activating and inhibitory KIR play a role in regulating the peripheral expansion of highly antiviral KIR3DS1+ NK cells, which may determine differences in HIV-1 control following infection....

  17. Industrial Relevance of Chromosomal Copy Number Variation in Saccharomyces Yeasts

    Science.gov (United States)

    Gorter de Vries, Arthur R.; Pronk, Jack T.

    2017-01-01

    ABSTRACT Chromosomal copy number variation (CCNV) plays a key role in evolution and health of eukaryotes. The unicellular yeast Saccharomyces cerevisiae is an important model for studying the generation, physiological impact, and evolutionary significance of CCNV. Fundamental studies of this yeast have contributed to an extensive set of methods for analyzing and introducing CCNV. Moreover, these studies provided insight into the balance between negative and positive impacts of CCNV in evolutionary contexts. A growing body of evidence indicates that CCNV not only frequently occurs in industrial strains of Saccharomyces yeasts but also is a key contributor to the diversity of industrially relevant traits. This notion is further supported by the frequent involvement of CCNV in industrially relevant traits acquired during evolutionary engineering. This review describes recent developments in genome sequencing and genome editing techniques and discusses how these offer opportunities to unravel contributions of CCNV in industrial Saccharomyces strains as well as to rationally engineer yeast chromosomal copy numbers and karyotypes. PMID:28341679

  18. Edge Antimagic Total Labeling on Two Copies of Path

    Science.gov (United States)

    Nurdin; Abrar, A. M.; Bhayangkara, A. R. M.; Muliani; Samsir, A. U.; Nahdi, M. R. An

    2018-03-01

    A graph G = (V(G), E(G)) denotes the vertex set and the edge set, respectively. A (p,q)-graph G is a graph such that |V(G) | = p and |E(G) | = q. Graph of order p and size q is called (a,d)-edge-anti magic total if there exists a bijection f : V(G) U E(G)→ {1,2,..., p + q} such that the edge weights w(u,v) = f(u) + f(uv) + f(v) form an arithmetic sequence {a, a + d, a + 2d,...,a + (q - 1)d} with the first term a and common difference d. Two copies of path is disjoint union of two path graph with same order (Pn ∪Pn ) denoted by 2Pn . In this paper we construct the (a,d)-edge-anti magic total labeling in two copies of path for some differences d.

  19. Copy-Right for Software and Computer Games: Strategies and Challenges

    Directory of Open Access Journals (Sweden)

    Hojatollah Ayoubi

    2009-11-01

    Full Text Available Copy-right has been initially used in cultural and art industries. From that time there have been two different approaches to the matter: the commercial-economic approach which is concerned with the rights of suppliers and investors; and the other approach, the cultural one, which is especially concerned with the rights of author. First approach is rooted in Anglo-American countries, while the other is originally French. Expansion of the computer market, and separating software and hardware markets caused to the so-called velvet-rubbery, which refers to the illegal reproduction in the market. Therefore, there were some struggles all over the world to protect rights of their producers. In present study, beside the domestic and international difficulties these strategies would encounter, this article has reviewed different strategies to face this challenge.

  20. Games as Cultural Heritage: Copyright Challenges for Preserving (Orphan) Video Games in the EU

    OpenAIRE

    Maier, Henrike

    2015-01-01

    The long-term preservation of complex works such as video games comes with many challenges. Emulation, currently the most adequate preservation strategy for video games, requires several acts that are technically possible, but closely governed and restricted by copyright law and technical protection measures. Without prior authorisation from the rightsholder(s), it is therefore difficult to legally emulate these works. However, games often have several rightsholders that are in some cases nea...

  1. Psychological needs, purpose in life, and problem video game playing among Chinese young adults

    OpenAIRE

    Wu, Anise M. S.; Lei, Lamis L. M.; Ku, L.

    2012-01-01

    The negative impacts of excessive and problematic video game playing on both children and adults are attracting increasing concern. Based on self-determination theory (SDT; Ryan & Deci, 2000), this study hypothesized that the three basic psychological needs of autonomy, competence, and relatedness are positively associated with purpose in life, which in turn acts as a protective factor against problem video game playing among Chinese young adult players. Through a questionnaire survey with a ...

  2. Impact of Mini-drone based Video Surveillance on Invasion of Privacy

    OpenAIRE

    Korshunov, Pavel; Bonetto, Margherita; Ebrahimi, Touradj; Ramponi, Giovanni

    2015-01-01

    An increase in adoption of video surveillance, affecting many aspects of daily lives, raises public concern about an intrusion into individual privacy. New sensing and surveillance technologies, such as mini-drones, threaten to eradicate boundaries of private space even more. Therefore, it is important to study the effect of mini-drones on privacy intrusion and to understand how existing protection privacy filters perform on a video captured by a mini-drone. To this end, we have built a publi...

  3. Probabilistic programmable quantum processors with multiple copies of program states

    International Nuclear Information System (INIS)

    Brazier, Adam; Buzek, Vladimir; Knight, Peter L.

    2005-01-01

    We examine the execution of general U(1) transformations on programmable quantum processors. We show that, with only the minimal assumption of availability of copies of the 1-qubit program state, the apparent advantage of existing schemes proposed by G. Vidal et al. [Phys. Rev. Lett. 88, 047905 (2002)] and M. Hillery et al. [Phys. Rev. A 65, 022301 (2003)] to execute a general U(1) transformation with greater probability using complex program states appears not to hold

  4. Probabilistic deletion of copies of linearly independent quantum states

    International Nuclear Information System (INIS)

    Feng Jian; Gao Yunfeng; Wang Jisuo; Zhan Mingsheng

    2002-01-01

    We show that each of two copies of the nonorthogonal states randomly selected from a certain set S can be probabilistically deleted by a general unitary-reduction operation if and only if the states are linearly independent. We derive a tight bound on the best possible deleting efficiencies. These results for 2→1 probabilistic deleting are also generalized into the case of N→M deleting (N,M positive integers and N>M)

  5. Multiple-copy state discrimination: Thinking globally, acting locally

    International Nuclear Information System (INIS)

    Higgins, B. L.; Pryde, G. J.; Wiseman, H. M.; Doherty, A. C.; Bartlett, S. D.

    2011-01-01

    We theoretically investigate schemes to discriminate between two nonorthogonal quantum states given multiple copies. We consider a number of state discrimination schemes as applied to nonorthogonal, mixed states of a qubit. In particular, we examine the difference that local and global optimization of local measurements makes to the probability of obtaining an erroneous result, in the regime of finite numbers of copies N, and in the asymptotic limit as N→∞. Five schemes are considered: optimal collective measurements over all copies, locally optimal local measurements in a fixed single-qubit measurement basis, globally optimal fixed local measurements, locally optimal adaptive local measurements, and globally optimal adaptive local measurements. Here an adaptive measurement is one in which the measurement basis can depend on prior measurement results. For each of these measurement schemes we determine the probability of error (for finite N) and the scaling of this error in the asymptotic limit. In the asymptotic limit, it is known analytically (and we verify numerically) that adaptive schemes have no advantage over the optimal fixed local scheme. Here we show moreover that, in this limit, the most naive scheme (locally optimal fixed local measurements) is as good as any noncollective scheme except for states with less than 2% mixture. For finite N, however, the most sophisticated local scheme (globally optimal adaptive local measurements) is better than any other noncollective scheme for any degree of mixture.

  6. Tragedy and Delirium in Montevideo: The Theater of Copi

    Directory of Open Access Journals (Sweden)

    Stefano Casi

    2017-11-01

    Full Text Available Nelle sue pièces comiche il drammaturgo franco-argentino Copi (1939-1987 si confronta con la tragedia, immergendo riferimenti e forme tragiche nell’umorismo e nel camp, all’interno di una cornice caratterizzata dal relativismo più estremo, in cui vita e morte coincidono e in cui ogni personaggio (spesso transgender afferma e nega la propria identità. Gli ‘eroi’ di Copi mostrano un difetto di volontà, che porta i loro sforzi titanici a diventare perdenti e a infrangersi contro risultati ridicoli o contro lo stallo. Le pièces oscillano tra «circo» e «tragedia», come dice il protagonista di Cachafaz (1981, definita dall’autore «tragedia barbara», in cui la tradizione del gauchesco argentino si coniuga con una visione cruenta e soprannaturale della tragedia, tra Macbeth e Le baccanti. Il linguaggio della commedia umoristica e camp è la base per la ricostruzione di un nuovo linguaggio tragico, e l’intero corpus teatrale di Copi non si presenta come parodia o dissacrazione, bensì come ‘riattivazione’ della tragedia nel secolo della sua ‘morte’ (Steiner.

  7. Familial cases of Norrie disease detected by copy number analysis.

    Science.gov (United States)

    Arai, Eisuke; Fujimaki, Takuro; Yanagawa, Ai; Fujiki, Keiko; Yokoyama, Toshiyuki; Okumura, Akihisa; Shimizu, Toshiaki; Murakami, Akira

    2014-09-01

    Norrie disease (ND, MIM#310600) is an X-linked disorder characterized by severe vitreoretinal dysplasia at birth. We report the results of causative NDP gene analysis in three male siblings with Norrie disease and describe the associated phenotypes. Three brothers with suspected Norrie disease and their mother presented for clinical examination. After obtaining informed consent, DNA was extracted from the peripheral blood of the proband, one of his brothers and his unaffected mother. Exons 1-3 of the NDP gene were amplified by polymerase chain reaction (PCR), and direct sequencing was performed. Multiplex ligation-dependent probe amplification (MLPA) was also performed to search for copy number variants in the NDP gene. The clinical findings of the three brothers included no light perception, corneal opacity, shallow anterior chamber, leukocoria, total retinal detachment and mental retardation. Exon 2 of the NDP gene was not amplified in the proband and one brother, even when the PCR primers for exon 2 were changed, whereas the other two exons showed no mutations by direct sequencing. MLPA analysis showed deletion of exon 2 of the NDP gene in the proband and one brother, while there was only one copy of exon 2 in the mother. Norrie disease was diagnosed in three patients from a Japanese family by clinical examination and was confirmed by genetic analysis. To localize the defect, confirmation of copy number variation by the MLPA method was useful in the present study.

  8. Genome Architecture and Its Roles in Human Copy Number Variation

    Directory of Open Access Journals (Sweden)

    Lu Chen

    2014-12-01

    Full Text Available Besides single-nucleotide variants in the human genome, large-scale genomic variants, such as copy number variations (CNVs, are being increasingly discovered as a genetic source of human diversity and the pathogenic factors of diseases. Recent experimental findings have shed light on the links between different genome architectures and CNV mutagenesis. In this review, we summarize various genomic features and discuss their contributions to CNV formation. Genomic repeats, including both low-copy and high-copy repeats, play important roles in CNV instability, which was initially known as DNA recombination events. Furthermore, it has been found that human genomic repeats can also induce DNA replication errors and consequently result in CNV mutations. Some recent studies showed that DNA replication timing, which reflects the high-order information of genomic organization, is involved in human CNV mutations. Our review highlights that genome architecture, from DNA sequence to high-order genomic organization, is an important molecular factor in CNV mutagenesis and human genomic instability.

  9. Scattering on plane waves and the double copy

    Science.gov (United States)

    Adamo, Tim; Casali, Eduardo; Mason, Lionel; Nekovar, Stefan

    2018-01-01

    Perturbatively around flat space, the scattering amplitudes of gravity are related to those of Yang–Mills by colour-kinematic duality, under which gravitational amplitudes are obtained as the ‘double copy’ of the corresponding gauge theory amplitudes. We consider the question of how to extend this relationship to curved scattering backgrounds, focusing on certain ‘sandwich’ plane waves. We calculate the 3-point amplitudes on these backgrounds and find that a notion of double copy remains in the presence of background curvature: graviton amplitudes on a gravitational plane wave are the double copy of gluon amplitudes on a gauge field plane wave. This is non-trivial in that it requires a non-local replacement rule for the background fields and the momenta and polarization vectors of the fields scattering on the backgrounds. It must also account for new ‘tail’ terms arising from scattering off the background. These encode a memory effect in the scattering amplitudes, which naturally double copies as well.

  10. Video Analytics for Business Intelligence

    CERN Document Server

    Porikli, Fatih; Xiang, Tao; Gong, Shaogang

    2012-01-01

    Closed Circuit TeleVision (CCTV) cameras have been increasingly deployed pervasively in public spaces including retail centres and shopping malls. Intelligent video analytics aims to automatically analyze content of massive amount of public space video data and has been one of the most active areas of computer vision research in the last two decades. Current focus of video analytics research has been largely on detecting alarm events and abnormal behaviours for public safety and security applications. However, increasingly CCTV installations have also been exploited for gathering and analyzing business intelligence information, in order to enhance marketing and operational efficiency. For example, in retail environments, surveillance cameras can be utilised to collect statistical information about shopping behaviour and preference for marketing (e.g., how many people entered a shop; how many females/males or which age groups of people showed interests to a particular product; how long did they stay in the sho...

  11. Distributed Video Coding: Iterative Improvements

    DEFF Research Database (Denmark)

    Luong, Huynh Van

    Nowadays, emerging applications such as wireless visual sensor networks and wireless video surveillance are requiring lightweight video encoding with high coding efficiency and error-resilience. Distributed Video Coding (DVC) is a new coding paradigm which exploits the source statistics...... and noise modeling and also learn from the previous decoded Wyner-Ziv (WZ) frames, side information and noise learning (SING) is proposed. The SING scheme introduces an optical flow technique to compensate the weaknesses of the block based SI generation and also utilizes clustering of DCT blocks to capture...... cross band correlation and increase local adaptivity in noise modeling. During decoding, the updated information is used to iteratively reestimate the motion and reconstruction in the proposed motion and reconstruction reestimation (MORE) scheme. The MORE scheme not only reestimates the motion vectors...

  12. 10 CFR 501.14 - Notice to Environmental Protection Agency.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Notice to Environmental Protection Agency. 501.14 Section 501.14 Energy DEPARTMENT OF ENERGY (CONTINUED) ALTERNATE FUELS ADMINISTRATIVE PROCEDURES AND SANCTIONS General Provisions § 501.14 Notice to Environmental Protection Agency. A copy of any proposed rule or order that imposes a prohibition, order that...

  13. 22 CFR 212.22 - Protection of personal privacy.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying details...

  14. Video game addiction: Impact on teenagers' lifestyle.

    Science.gov (United States)

    Sharma, Manoj Kumar; Mahindru, Poornima

    2015-01-01

    Use of video games as a leisure-time activity has increased among teenagers. Excessive use of video games is associated with psychosocial dysfunctions in the user's life. Two teenagers came for consultation to our Service for Healthy Use of Technology (SHUT) clinic for management of addiction due to video games. They were assessed using a clinical interview as well as the General Health Questionnaire and Griffith criteria for video games. The cases emphasize the addictive potential of video games and their association with lifestyle changes. Addiction to video games has implications for screening and intervention among teenagers. Copyright 2015, NMJI.

  15. Two-terminal video coding.

    Science.gov (United States)

    Yang, Yang; Stanković, Vladimir; Xiong, Zixiang; Zhao, Wei

    2009-03-01

    Following recent works on the rate region of the quadratic Gaussian two-terminal source coding problem and limit-approaching code designs, this paper examines multiterminal source coding of two correlated, i.e., stereo, video sequences to save the sum rate over independent coding of both sequences. Two multiterminal video coding schemes are proposed. In the first scheme, the left sequence of the stereo pair is coded by H.264/AVC and used at the joint decoder to facilitate Wyner-Ziv coding of the right video sequence. The first I-frame of the right sequence is successively coded by H.264/AVC Intracoding and Wyner-Ziv coding. An efficient stereo matching algorithm based on loopy belief propagation is then adopted at the decoder to produce pixel-level disparity maps between the corresponding frames of the two decoded video sequences on the fly. Based on the disparity maps, side information for both motion vectors and motion-compensated residual frames of the right sequence are generated at the decoder before Wyner-Ziv encoding. In the second scheme, source splitting is employed on top of classic and Wyner-Ziv coding for compression of both I-frames to allow flexible rate allocation between the two sequences. Experiments with both schemes on stereo video sequences using H.264/AVC, LDPC codes for Slepian-Wolf coding of the motion vectors, and scalar quantization in conjunction with LDPC codes for Wyner-Ziv coding of the residual coefficients give a slightly lower sum rate than separate H.264/AVC coding of both sequences at the same video quality.

  16. Video Browsing on Handheld Devices

    Science.gov (United States)

    Hürst, Wolfgang

    Recent improvements in processing power, storage space, and video codec development enable users now to playback video on their handheld devices in a reasonable quality. However, given the form factor restrictions of such a mobile device, screen size still remains a natural limit and - as the term "handheld" implies - always will be a critical resource. This is not only true for video but any data that is processed on such devices. For this reason, developers have come up with new and innovative ways to deal with large documents in such limited scenarios. For example, if you look at the iPhone, innovative techniques such as flicking have been introduced to skim large lists of text (e.g. hundreds of entries in your music collection). Automatically adapting the zoom level to, for example, the width of table cells when double tapping on the screen enables reasonable browsing of web pages that have originally been designed for large, desktop PC sized screens. A multi touch interface allows you to easily zoom in and out of large text documents and images using two fingers. In the next section, we will illustrate that advanced techniques to browse large video files have been developed in the past years, as well. However, if you look at state-of-the-art video players on mobile devices, normally just simple, VCR like controls are supported (at least at the time of this writing) that only allow users to just start, stop, and pause video playback. If supported at all, browsing and navigation functionality is often restricted to simple skipping of chapters via two single buttons for backward and forward navigation and a small and thus not very sensitive timeline slider.

  17. Digital video for the desktop

    CERN Document Server

    Pender, Ken

    1999-01-01

    Practical introduction to creating and editing high quality video on the desktop. Using examples from a variety of video applications, benefit from a professional's experience, step-by-step, through a series of workshops demonstrating a wide variety of techniques. These include producing short films, multimedia and internet presentations, animated graphics and special effects.The opportunities for the independent videomaker have never been greater - make sure you bring your understanding fully up to date with this invaluable guide.No prior knowledge of the technology is assumed, with explanati

  18. The art of digital video

    CERN Document Server

    Watkinson, John

    2013-01-01

    The industry ""bible"" is back and it's better than ever. The Art of Digital Video has served as the ultimate reference guide for those working with digital video for generations. Now this classic has been revised and re-written by international consultant and industry leader John Watkinson to include important technical updates on this ever-evolving topic. The format has also been improved to include optional sections that provide additional information that you can choose to skip or investigate further, depending on your interests and comfort level with the s

  19. 47 CFR 79.3 - Video description of video programming.

    Science.gov (United States)

    2010-10-01

    ... television audience measurement service, based on television viewership in the counties that make up each DMA... other distributor of video programming for residential reception that delivers such programming directly... the national audience share during prime time of nonbroadcast networks, as determined by Nielsen Media...

  20. CopyNumber450kCancer: baseline correction for accurate copy number calling from the 450k methylation array.

    Science.gov (United States)

    Marzouka, Nour-Al-Dain; Nordlund, Jessica; Bäcklin, Christofer L; Lönnerholm, Gudmar; Syvänen, Ann-Christine; Carlsson Almlöf, Jonas

    2016-04-01

    The Illumina Infinium HumanMethylation450 BeadChip (450k) is widely used for the evaluation of DNA methylation levels in large-scale datasets, particularly in cancer. The 450k design allows copy number variant (CNV) calling using existing bioinformatics tools. However, in cancer samples, numerous large-scale aberrations cause shifting in the probe intensities and thereby may result in erroneous CNV calling. Therefore, a baseline correction process is needed. We suggest the maximum peak of probe segment density to correct the shift in the intensities in cancer samples. CopyNumber450kCancer is implemented as an R package. The package with examples can be downloaded at http://cran.r-project.org nour.marzouka@medsci.uu.se Supplementary data are available at Bioinformatics online. © The Author 2015. Published by Oxford University Press.

  1. Automated Indexing and Search of Video Data in Large Collections with inVideo

    Directory of Open Access Journals (Sweden)

    Shuangbao Paul Wang

    2017-08-01

    Full Text Available In this paper, we present a novel system, inVideo, for automatically indexing and searching videos based on the keywords spoken in the audio track and the visual content of the video frames. Using the highly efficient video indexing engine we developed, inVideo is able to analyze videos using machine learning and pattern recognition without the need for initial viewing by a human. The time-stamped commenting and tagging features refine the accuracy of search results. The cloud-based implementation makes it possible to conduct elastic search, augmented search, and data analytics. Our research shows that inVideo presents an efficient tool in processing and analyzing videos and increasing interactions in video-based online learning environment. Data from a cybersecurity program with more than 500 students show that applying inVideo to current video material, interactions between student-student and student-faculty increased significantly across 24 sections program-wide.

  2. 49 CFR 512.5 - How many copies should I submit?

    Science.gov (United States)

    2010-10-01

    ... must send the following in hard copy or electronic format to the Chief Counsel when making a claim for... format, a copy of any special software required to review materials for which confidential treatment is...

  3. Automating occupational protection records systems

    International Nuclear Information System (INIS)

    Lyon, M.; Martin, J.B.

    1991-10-01

    Occupational protection records have traditionally been generated by field and laboratory personnel, assembled into files in the safety office, and eventually stored in a warehouse or other facility. Until recently, these records have been primarily paper copies, often handwritten. Sometimes, the paper is microfilmed for storage. However, electronic records are beginning to replace these traditional methods. The purpose of this paper is to provide guidance for making the transition to automated record keeping and retrieval using modern computer equipment. This paper describes the types of records most readily converted to electronic record keeping and a methodology for implementing an automated record system. The process of conversion is based on a requirements analysis to assess program needs and a high level of user involvement during the development. The importance of indexing the hard copy records for easy retrieval is also discussed. The concept of linkage between related records and its importance relative to reporting, research, and litigation will be addressed. 2 figs

  4. Whistleblower Protection

    Science.gov (United States)

    The Whistleblower Protection Enhancement Act of 2012 (WPA) and the Whistleblower Protection Act of 1989 Enhanced by the Act of 2012 provides protection rights for Federal employees against retaliation for whistleblowing activities.

  5. Ubiquitous UAVs: a cloud based framework for storing, accessing and processing huge amount of video footage in an efficient way

    Science.gov (United States)

    Efstathiou, Nectarios; Skitsas, Michael; Psaroudakis, Chrysostomos; Koutras, Nikolaos

    2017-09-01

    Nowadays, video surveillance cameras are used for the protection and monitoring of a huge number of facilities worldwide. An important element in such surveillance systems is the use of aerial video streams originating from onboard sensors located on Unmanned Aerial Vehicles (UAVs). Video surveillance using UAVs represent a vast amount of video to be transmitted, stored, analyzed and visualized in a real-time way. As a result, the introduction and development of systems able to handle huge amount of data become a necessity. In this paper, a new approach for the collection, transmission and storage of aerial videos and metadata is introduced. The objective of this work is twofold. First, the integration of the appropriate equipment in order to capture and transmit real-time video including metadata (i.e. position coordinates, target) from the UAV to the ground and, second, the utilization of the ADITESS Versatile Media Content Management System (VMCMS-GE) for storing of the video stream and the appropriate metadata. Beyond the storage, VMCMS-GE provides other efficient management capabilities such as searching and processing of videos, along with video transcoding. For the evaluation and demonstration of the proposed framework we execute a use case where the surveillance of critical infrastructure and the detection of suspicious activities is performed. Collected video Transcodingis subject of this evaluation as well.

  6. Does Visual Attention Span Relate to Eye Movements during Reading and Copying?

    Science.gov (United States)

    Bosse, Marie-Line; Kandel, Sonia; Prado, Chloé; Valdois, Sylviane

    2014-01-01

    This research investigated whether text reading and copying involve visual attention-processing skills. Children in grades 3 and 5 read and copied the same text. We measured eye movements while reading and the number of gaze lifts (GL) during copying. The children were also administered letter report tasks that constitute an estimation of the…

  7. 39 CFR 955.23 - Copies of papers, withdrawal of exhibits.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Copies of papers, withdrawal of exhibits. 955.23... SERVICE BOARD OF CONTRACT APPEALS § 955.23 Copies of papers, withdrawal of exhibits. (a) When books, records, papers, or documents have been received in evidence, a true copy thereof or of such part thereof...

  8. 1 CFR 15.4 - Reproduction and certification of copies of acts and documents.

    Science.gov (United States)

    2010-01-01

    ... 1 General Provisions 1 2010-01-01 2010-01-01 false Reproduction and certification of copies of... Reproduction and certification of copies of acts and documents. The Director of the Federal Register shall furnish to requesting agencies, at cost, reproductions or certified copies of original acts and documents...

  9. Determination of beta-defensin genomic copy number in different populations

    DEFF Research Database (Denmark)

    Fode, Peder; Jespersgaard, Cathrine; Hardwick, Robert J

    2011-01-01

    There have been conflicting reports in the literature on association of gene copy number with disease, including CCL3L1 and HIV susceptibility, and ß-defensins and Crohn's disease. Quantification of precise gene copy numbers is important in order to define any association of gene copy number with...

  10. 20 CFR 703.105 - Copies of forms of policies to be submitted with application.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Copies of forms of policies to be submitted... REGULATIONS Authorization of Insurance Carriers § 703.105 Copies of forms of policies to be submitted with... of the Office copies of the forms of policies which the applicant proposes to issue in writing...

  11. Radiation protection

    International Nuclear Information System (INIS)

    Koelzer, W.

    1975-01-01

    Physical and radiological terms, quantities, and units. Basic principles of radiation protection (ICRP, IAEA, EURATOM, FRG). Biological effects of ionizing radiation. Objectives of practical radiation protection. (HP) [de

  12. Kai Kaljo video-workshopil Ljubljanas

    Index Scriptorium Estoniae

    2000-01-01

    Video-workshop "Crossing Over 4" 9.-23. XII 1999 Ljubljana meedialaboris. Korraldajad videokunsti professor Nina Czegledy Torontost ja bulgaaria kuraator Iliyana Nedkova. Eestit esindanud Kai Kaljo esitas videos "Pathetique" oma versiooni Beethoveni "Pateetilisest sonaadist"

  13. Intelligent Model for Video Survillance Security System

    Directory of Open Access Journals (Sweden)

    J. Vidhya

    2013-12-01

    Full Text Available Video surveillance system senses and trails out all the threatening issues in the real time environment. It prevents from security threats with the help of visual devices which gather the information related to videos like CCTV’S and IP (Internet Protocol cameras. Video surveillance system has become a key for addressing problems in the public security. They are mostly deployed on the IP based network. So, all the possible security threats exist in the IP based application might also be the threats available for the reliable application which is available for video surveillance. In result, it may increase cybercrime, illegal video access, mishandling videos and so on. Hence, in this paper an intelligent model is used to propose security for video surveillance system which ensures safety and it provides secured access on video.

  14. Music Videos: The Look of the Sound

    Science.gov (United States)

    Aufderheide, Pat

    1986-01-01

    Asserts that music videos, rooted in mass marketing culture, are reshaping the language of advertising, affecting the flow of information. Raises question about the society that creates and receives music videos. (MS)

  15. Multimodal Feature Learning for Video Captioning

    Directory of Open Access Journals (Sweden)

    Sujin Lee

    2018-01-01

    Full Text Available Video captioning refers to the task of generating a natural language sentence that explains the content of the input video clips. This study proposes a deep neural network model for effective video captioning. Apart from visual features, the proposed model learns additionally semantic features that describe the video content effectively. In our model, visual features of the input video are extracted using convolutional neural networks such as C3D and ResNet, while semantic features are obtained using recurrent neural networks such as LSTM. In addition, our model includes an attention-based caption generation network to generate the correct natural language captions based on the multimodal video feature sequences. Various experiments, conducted with the two large benchmark datasets, Microsoft Video Description (MSVD and Microsoft Research Video-to-Text (MSR-VTT, demonstrate the performance of the proposed model.

  16. Probabilistic recognition of human faces from video

    DEFF Research Database (Denmark)

    Zhou, Saohua; Krüger, Volker; Chellappa, Rama

    2003-01-01

    Recognition of human faces using a gallery of still or video images and a probe set of videos is systematically investigated using a probabilistic framework. In still-to-video recognition, where the gallery consists of still images, a time series state space model is proposed to fuse temporal...... of the identity variable produces the recognition result. The model formulation is very general and it allows a variety of image representations and transformations. Experimental results using videos collected by NIST/USF and CMU illustrate the effectiveness of this approach for both still-to-video and video-to-video...... information in a probe video, which simultaneously characterizes the kinematics and identity using a motion vector and an identity variable, respectively. The joint posterior distribution of the motion vector and the identity variable is estimated at each time instant and then propagated to the next time...

  17. Innovative Video Diagnostic Equipment for Material Science

    Science.gov (United States)

    Capuano, G.; Titomanlio, D.; Soellner, W.; Seidel, A.

    2012-01-01

    Materials science experiments under microgravity increasingly rely on advanced optical systems to determine the physical properties of the samples under investigation. This includes video systems with high spatial and temporal resolution. The acquisition, handling, storage and transmission to ground of the resulting video data are very challenging. Since the available downlink data rate is limited, the capability to compress the video data significantly without compromising the data quality is essential. We report on the development of a Digital Video System (DVS) for EML (Electro Magnetic Levitator) which provides real-time video acquisition, high compression using advanced Wavelet algorithms, storage and transmission of a continuous flow of video with different characteristics in terms of image dimensions and frame rates. The DVS is able to operate with the latest generation of high-performance cameras acquiring high resolution video images up to 4Mpixels@60 fps or high frame rate video images up to about 1000 fps@512x512pixels.

  18. Celiac Family Health Education Video Series

    Medline Plus

    Full Text Available ... Videos Experiencing Celiac Disease What is Celiac Disease Diet Information At ... Us Celiac Disease Program | Videos Boston Children's Hospital will teach you and your family about a ...

  19. Storytelling machines for video search

    NARCIS (Netherlands)

    Habibian, A.

    2016-01-01

    We study a fundamental question for developing storytelling machines: what vocabulary is suited for machines to tell the story of a video? We start by manually specifying the vocabulary concepts and their annotations. In order to effectively handcraft the vocabulary, we empirically study what are

  20. Sex, Lies and Video Games

    Science.gov (United States)

    Kearney, Paul; Pivec, Maja

    2007-01-01

    Sex and violence in video games is a social issue that confronts us all, especially as many commercial games are now being introduced for game-based learning in schools, and as such this paper polls teenage players about the rules their parents and teachers may or may not have, and surveys the gaming community, ie, game developers to parents, to…

  1. Geoblocking and global video culture.

    NARCIS (Netherlands)

    Lobato, Ramon; Meese, James; Rasch, Mirjam

    How do global audiences use streaming platforms like YouTube, Netflix and iPlayer? How does the experience of digital video change according to location? What strategies do people use to access out-of-region content? What are the commercial and governmental motivations behind geoblocking?

  2. Return of the Vision Video

    DEFF Research Database (Denmark)

    Vistisen, Peter; Poulsen, Søren Bolvig

    2017-01-01

    This paper examines the role of corporate vision videos as a possible setting for participation when exploring the future potentials (and pitfalls) of new technological concepts. We propose that through the recent decade’s rise web 2.0 platforms, and the viral effects of user sharing, the corpora...

  3. Video context-dependent recall.

    Science.gov (United States)

    Smith, Steven M; Manzano, Isabel

    2010-02-01

    In two experiments, we used an effective new method for experimentally manipulating local and global contexts to examine context-dependent recall. The method included video-recorded scenes of real environments, with target words superimposed over the scenes. In Experiment 1, we used a within-subjects manipulation of video contexts and compared the effects of reinstatement of a global context (15 words per context) with effects of less overloaded context cues (1 and 3 words per context) on recall. The size of the reinstatement effects in Experiment 1 show how potently video contexts can cue recall. A strong effect of cue overload was also found; reinstatement effects were smaller, but still quite robust, in the 15 words per context condition. The powerful reinstatement effect was replicated for local contexts in Experiment 2, which included a no-contexts-reinstated group, a control condition used to determine whether reinstatement of half of the cues caused biased output interference for uncued targets. The video context method is a potent way to investigate context-dependent memory.

  4. Rheumatoid Arthritis Educational Video Series

    Medline Plus

    Full Text Available ... treatments are available, what is happening in the immune system and what other conditions are associated with RA. Learning more about your condition will allow you to take a more active role in your care. The information in these videos ...

  5. Video Histories, Memories, and Coincidences

    DEFF Research Database (Denmark)

    Kacunko, Slavko

    2012-01-01

    Looping images allows us to notice things that we have never noticed before. Looping a small but exquisite selection of the video tapes of Marcel Odenbach, Dieter Kiessling and Matthias Neuenhofer may allow the discovering of Histories, Coincidences, and Infinitesimal Aesthetics inscribed...

  6. Geoblocking and global video culture

    NARCIS (Netherlands)

    Lobato, Ramon; Meese, James; Rasch, Mirjam

    How do global audiences use streaming platforms like YouTube, Netflix and iPlayer? How does the experience of digital video change according to location? What strategies do people use to access out-of-region content? What are the commercial and governmental motivations behind geoblocking?

  7. NEI You Tube Videos: Amblyopia

    Medline Plus

    Full Text Available ... Program Vision and Aging Program African American Program Training and Jobs Fellowships NEI Summer Intern Program Diversity In Vision Research & Ophthalmology (DIVRO) Student Training Programs To search for current job openings visit HHS USAJobs Home >> NEI YouTube Videos >> ...

  8. Teaching science through video games

    Science.gov (United States)

    Smaldone, Ronald A.; Thompson, Christina M.; Evans, Monica; Voit, Walter

    2017-02-01

    Imagine a class without lessons, tests and homework, but with missions, quests and teamwork. Video games offer an attractive educational platform because they are designed to be fun and engaging, as opposed to traditional approaches to teaching through lectures and assignments.

  9. Radiation effects on video imagers

    International Nuclear Information System (INIS)

    Yates, G.J.; Bujnosek, J.J.; Jaramillo, S.A.; Walton, R.B.; Martinez, T.M.; Black, J.P.

    1985-01-01

    Radiation sensitivity of several photoconductive, photoemissive, and solid state silicon-based video imagers was measured by analyzing stored photocharge induced by irradiation with continuous and pulsed sources of high energy photons and neutrons. Transient effects as functions of absorbed dose, dose rate, fluences, and ionizing particle energy are presented

  10. Deep-Sky Video Astronomy

    CERN Document Server

    Massey, Steve

    2009-01-01

    A guide to using modern integrating video cameras for deep-sky viewing and imaging with the kinds of modest telescopes available commercially to amateur astronomers. It includes an introduction and a brief history of the technology and camera types. It examines the pros and cons of this unrefrigerated yet highly efficient technology

  11. NEI You Tube Videos: Amblyopia

    Medline Plus

    Full Text Available ... and Aging Program African American Program Training and Jobs Fellowships NEI Summer Intern Program Diversity In Vision ... DIVRO) Student Training Programs To search for current job openings visit HHS USAJobs Home » NEI YouTube Videos » ...

  12. NEI You Tube Videos: Amblyopia

    Medline Plus

    Full Text Available ... Macular Degeneration Amblyopia Animations Blindness Cataract Convergence Insufficiency Diabetic Eye Disease Dilated Eye Exam Dry Eye For Kids Glaucoma Healthy Vision Tips Leber Congenital Amaurosis Low Vision Refractive Errors Retinopathy of Prematurity Science Spanish Videos Webinars NEI YouTube ...

  13. Digital Video: Get with It!

    Science.gov (United States)

    Van Horn, Royal

    2001-01-01

    Several years after the first audiovisual Macintosh computer appeared, most educators are still oblivious of this technology. Almost every other economic sector (including the porn industry) makes abundant use of digital and streaming video. Desktop movie production is so easy that primary grade students can do it. Tips are provided. (MLH)

  14. Video Recordings in Public Libraries.

    Science.gov (United States)

    Doyle, Stephen

    1984-01-01

    Reports on development and operation of public library collection of video recordings, describes results of user survey conducted over 6-month period, and offers brief guidelines. Potential users, censorship and copyright, organization of collection, fees, damage and loss, funding, purchasing and promotion, formats, processing and cataloging,…

  15. Video nueva herramienta del campo

    Directory of Open Access Journals (Sweden)

    Manuel Calvelo Ríos

    2015-01-01

    Full Text Available El Video resulta ser una herramienta sumamente útil para el desarrollo rural. Entendemos por desarrollo rural el intento de regular las relaciones campo-ciudad en términos más equitativos para el hombre del campo. Es por tanto una decisión política.

  16. Destination: Marshall Islands. Video Guide.

    Science.gov (United States)

    Legowski, Margaret

    This video guide was developed by the Peace Corps' Office of World Wise Schools. Activities that the guide describes are for use in a 3- to 5-day unit on one of the nations of Oceania, the Republic of the Marshall Islands. The activities are designed to provide students with opportunities to: (1) compare and contrast Marshallese and U.S. culture;…

  17. NEI You Tube Videos: Amblyopia

    Medline Plus

    Full Text Available ... Program Vision and Aging Program African American Program Training and Jobs Fellowships NEI Summer Intern Program Diversity In Vision Research & Ophthalmology (DIVRO) Student Training Programs To search for current job openings visit HHS USAJobs Home » NEI YouTube Videos » ...

  18. Virtual Pinball / Video Arcade games

    NARCIS (Netherlands)

    1997-01-01

    For use in multimedia or other environments, a virtual pinball/video arcade game displays one or more computer-generated runner elements, runner inject elements, and runner interactivity elements. It has a programmed computer for simulating movement of the runner elements. This is interfered with by

  19. [Serious video games in pediatrics].

    Science.gov (United States)

    Drummond, D; Tesnière, A; Hadchouel, A

    2018-01-01

    Playing video games has been associated with several negative effects in children. However, serious games, which are video games designed for a primary purpose other than pure entertainment, should not be neglected by pediatricians. In the field of public health, some serious games are a means to decrease drug consumption and improve sexual health behavior in adolescents. In schools, serious games can be used to change students' perception of the disease of one of their classmates, or to train students on basic life support. Serious games are also used with patients: they can distract them from a painful procedure, increase their compliance to treatments, or participate in their rehabilitation. Finally, serious games allow healthcare professionals to train on the management of various medical situations without risk. For every field of application, this review presents the rationale of the use of video games, followed by concrete examples of video games and the results of their scientific evaluation. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  20. Can Video Games Be Educational?

    Science.gov (United States)

    Criswell, Chad

    2009-01-01

    One of the biggest debates among music educators today is about whether or not video games are a valid educational tool. As far back as the early 1990s, teachers were using games such as Sid Meier's Civilization to reinforce history and social studies concepts, but until recently games that dealt with areas of music education have been few and far…

  1. Video Games as Psychological Tests.

    Science.gov (United States)

    Jones, Marshall B.

    1984-01-01

    Briefly describes the characteristics of video games and discusses some advantages and disadvantages of their use to measure individual abilities. Relevant research is cited in the areas of stabilization with practice, predictive testing, performance testing, testing under extreme conditions, testing brain-injured persons, and differential…

  2. A Secure and Robust Object-Based Video Authentication System

    Directory of Open Access Journals (Sweden)

    He Dajun

    2004-01-01

    Full Text Available An object-based video authentication system, which combines watermarking, error correction coding (ECC, and digital signature techniques, is presented for protecting the authenticity between video objects and their associated backgrounds. In this system, a set of angular radial transformation (ART coefficients is selected as the feature to represent the video object and the background, respectively. ECC and cryptographic hashing are applied to those selected coefficients to generate the robust authentication watermark. This content-based, semifragile watermark is then embedded into the objects frame by frame before MPEG4 coding. In watermark embedding and extraction, groups of discrete Fourier transform (DFT coefficients are randomly selected, and their energy relationships are employed to hide and extract the watermark. The experimental results demonstrate that our system is robust to MPEG4 compression, object segmentation errors, and some common object-based video processing such as object translation, rotation, and scaling while securely preventing malicious object modifications. The proposed solution can be further incorporated into public key infrastructure (PKI.

  3. Video game training and the reward system

    OpenAIRE

    Lorenz, R.; Gleich, T.; Gallinat, J.; Kühn, S.

    2015-01-01

    Video games contain elaborate reinforcement and reward schedules that have the potential to maximize motivation. Neuroimaging studies suggest that video games might have an influence on the reward system. However, it is not clear whether reward-related properties represent a precondition, which biases an individual toward playing video games, or if these changes are the result of playing video games. Therefore, we conducted a longitudinal study to explore reward-related functional predictors ...

  4. Video Games and Children. ERIC Digest.

    Science.gov (United States)

    Cesarone, Bernard

    This digest examines data on video game use by children, explains ratings of video game violence, and reviews research on the effects of video games on children and adolescents. A recent study of seventh and eighth graders found that 65% of males and 57% of females played 1 to 6 hours of video games at home per week, and 38% of males and 16% of…

  5. Automatic Performance Evaluation for Video Summarization

    Science.gov (United States)

    2004-07-01

    Multimedia 2002, pp.189–198. [14] S. Uchihashi, J. Foote, A. Girgensohn and J. Boreczky, “Video Manga : Generating Seman- tically Meaningful Video...DeMenthon, V. Kobla and D. Doermann, “Video Summarization by Curve Simplification”, ACM Multimedia 98, Bristol, England, pp. 211-218, September 1998. 26 [2...J. Au, “Video Keyframe Production by Efficient Clustering of Compressed Chromaticity Signatures”, ACM Multimedia 2000, Juan-Les-Pins, France, pp. 365

  6. No Reference Video-Quality-Assessment Model for Monitoring Video Quality of IPTV Services

    Science.gov (United States)

    Yamagishi, Kazuhisa; Okamoto, Jun; Hayashi, Takanori; Takahashi, Akira

    Service providers should monitor the quality of experience of a communication service in real time to confirm its status. To do this, we previously proposed a packet-layer model that can be used for monitoring the average video quality of typical Internet protocol television content using parameters derived from transmitted packet headers. However, it is difficult to monitor the video quality per user using the average video quality because video quality depends on the video content. To accurately monitor the video quality per user, a model that can be used for estimating the video quality per video content rather than the average video quality should be developed. Therefore, to take into account the impact of video content on video quality, we propose a model that calculates the difference in video quality between the video quality of the estimation-target video and the average video quality estimated using a packet-layer model. We first conducted extensive subjective quality assessments for different codecs and video sequences. We then model their characteristics based on parameters related to compression and packet loss. Finally, we verify the performance of the proposed model by applying it to unknown data sets different from the training data sets used for developing the model.

  7. Veterans Crisis Line: Videos About Reaching out for Help

    Medline Plus

    Full Text Available ... videos from Veterans Health Administration Veterans Crisis Line -- After the Call see more videos from Veterans Health ... videos from Veterans Health Administration Talking About It Matters see more videos from Veterans Health Administration Stand ...

  8. Automated intelligent video surveillance system for ships

    Science.gov (United States)

    Wei, Hai; Nguyen, Hieu; Ramu, Prakash; Raju, Chaitanya; Liu, Xiaoqing; Yadegar, Jacob

    2009-05-01

    To protect naval and commercial ships from attack by terrorists and pirates, it is important to have automatic surveillance systems able to detect, identify, track and alert the crew on small watercrafts that might pursue malicious intentions, while ruling out non-threat entities. Radar systems have limitations on the minimum detectable range and lack high-level classification power. In this paper, we present an innovative Automated Intelligent Video Surveillance System for Ships (AIVS3) as a vision-based solution for ship security. Capitalizing on advanced computer vision algorithms and practical machine learning methodologies, the developed AIVS3 is not only capable of efficiently and robustly detecting, classifying, and tracking various maritime targets, but also able to fuse heterogeneous target information to interpret scene activities, associate targets with levels of threat, and issue the corresponding alerts/recommendations to the man-in- the-loop (MITL). AIVS3 has been tested in various maritime scenarios and shown accurate and effective threat detection performance. By reducing the reliance on human eyes to monitor cluttered scenes, AIVS3 will save the manpower while increasing the accuracy in detection and identification of asymmetric attacks for ship protection.

  9. Videotrees: Improving video surrogate presentation using hierarchy

    NARCIS (Netherlands)

    Jansen, Michel; Heeren, W.F.L.; van Dijk, Elisabeth M.A.G.

    As the amount of available video content increases, so does the need for better ways of browsing all this material. Because the nature of video makes it hard to process, the need arises for adequate surrogates for video that can readily be skimmed and browsed. In this paper, the effects of the use

  10. A Taxonomy of Asynchronous Instructional Video Styles

    Science.gov (United States)

    Chorianopoulos, Konstantinos

    2018-01-01

    Many educational organizations are employing instructional videos in their pedagogy, but there is a limited understanding of the possible video formats. In practice, the presentation format of instructional videos ranges from direct recording of classroom teaching with a stationary camera, or screencasts with voiceover, to highly elaborate video…

  11. Using Informal Education through Music Video Creation

    Science.gov (United States)

    Cayari, Christopher

    2014-01-01

    Music video creation provides students a new way to express themselves and become better performers and consumers of media. This article provides a new perspective on Lucy Green's informal music pedagogy by enabling students to create music videos in music classrooms; thus, students are able to create music videos that informally develop…

  12. Video Gameplay, Personality and Academic Performance

    Science.gov (United States)

    Ventura, Matthew; Shute, Valerie; Kim, Yoon Jeon

    2012-01-01

    The relationship between video gameplay, video game genre preference, personality, and GPA was investigated in an online correlational study with university students. In addition to administering self-report measures of GPA and personality, we asked three different questions regarding styles of video gameplay. The first asked the average time…

  13. College Student Video Gaming and Parental Influence

    Science.gov (United States)

    Chue, Maechi

    2011-01-01

    Video gaming is prevalent among college students, and researchers have documented negative consequences from some students' excessive video gaming, but the study of past and current parental influence on college student video gaming is limited. This study collected data from college students from several Midwestern U.S. universities using an…

  14. Efficient genre-specific semantic video indexing

    NARCIS (Netherlands)

    Wu, J.; Worring, M.

    2012-01-01

    Large video collections such as YouTube contain many different video genres, while in many applications the user might be interested in one or two specific video genres only. Thus, when users are querying the system with a specific semantic concept like AnchorPerson, and MovieStars, they are likely

  15. Maximizing Resource Utilization in Video Streaming Systems

    Science.gov (United States)

    Alsmirat, Mohammad Abdullah

    2013-01-01

    Video streaming has recently grown dramatically in popularity over the Internet, Cable TV, and wire-less networks. Because of the resource demanding nature of video streaming applications, maximizing resource utilization in any video streaming system is a key factor to increase the scalability and decrease the cost of the system. Resources to…

  16. Video Surveillance: Privacy Issues and Legal Compliance

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.

    2015-01-01

    Pervasive usage of video surveillance is rapidly increasing in developed countries. Continuous security threats to public safety demand use of such systems. Contemporary video surveillance systems offer advanced functionalities which threaten the privacy of those recorded in the video. There is a...

  17. Digital Video Revisited: Storytelling, Conferencing, Remixing

    Science.gov (United States)

    Godwin-Jones, Robert

    2012-01-01

    Five years ago in the February, 2007, issue of LLT, I wrote about developments in digital video of potential interest to language teachers. Since then, there have been major changes in options for video capture, editing, and delivery. One of the most significant has been the rise in popularity of video-based storytelling, enabled largely by…

  18. Feature Quantization and Pooling for Videos

    Science.gov (United States)

    2014-05-01

    less vertical motion. The exceptions are videos from the classes of biking (mainly due to the camera tracking fast bikers), jumping on a trampoline ...tracking the bikers; the jumping videos, featuring people on trampolines , the swing videos, which are usually recorded in profile view, and the walking

  19. Do Video Games Promote Positive Youth Development?

    Science.gov (United States)

    Adachi, Paul J. C.; Willoughby, Teena

    2013-01-01

    We argue that video game play may meet Larson's (2000) criteria for fostering initiative in youth, and thus, may be related to positive outcomes such as flow, cooperation, problem solving, and reduced in-group bias. However, developmental and social psychologists examining adolescent video game use have focused heavily on how video games are…

  20. Video Games - Did They Begin at Brookhaven

    Science.gov (United States)

    dropdown arrow Site Map A-Z Index Menu Synopsis Video Games – Did They Begin at Brookhaven? Additional Web program led to the pioneering development of video games. William Higinbotham William Higinbotham First Pong, now Space Invaders, next Star Castle – video games have mesmerized children of at all ages

  1. Serious Games: Video Games for Good?

    Science.gov (United States)

    Sanford, Kathy; Starr, Lisa J.; Merkel, Liz; Bonsor Kurki, Sarah

    2015-01-01

    As video games become a ubiquitous part of today's culture internationally, as educators and parents we need to turn our attention to how video games are being understood and used in informal and formal settings. Serious games have developed as a genre of video games marketed for educating youth about a range of world issues. At face value this…

  2. Computational Thinking in Constructionist Video Games

    Science.gov (United States)

    Weintrop, David; Holbert, Nathan; Horn, Michael S.; Wilensky, Uri

    2016-01-01

    Video games offer an exciting opportunity for learners to engage in computational thinking in informal contexts. This paper describes a genre of learning environments called constructionist video games that are especially well suited for developing learners' computational thinking skills. These games blend features of conventional video games with…

  3. Copy number variation plays an important role in clinical epilepsy

    Science.gov (United States)

    Olson, Heather; Shen, Yiping; Avallone, Jennifer; Sheidley, Beth R.; Pinsky, Rebecca; Bergin, Ann M.; Berry, Gerard T.; Duffy, Frank H.; Eksioglu, Yaman; Harris, David J.; Hisama, Fuki M.; Ho, Eugenia; Irons, Mira; Jacobsen, Christina M.; James, Philip; Kothare, Sanjeev; Khwaja, Omar; Lipton, Jonathan; Loddenkemper, Tobias; Markowitz, Jennifer; Maski, Kiran; Megerian, J. Thomas; Neilan, Edward; Raffalli, Peter C.; Robbins, Michael; Roberts, Amy; Roe, Eugene; Rollins, Caitlin; Sahin, Mustafa; Sarco, Dean; Schonwald, Alison; Smith, Sharon E.; Soul, Janet; Stoler, Joan M.; Takeoka, Masanori; Tan, Wen-Han; Torres, Alcy R.; Tsai, Peter; Urion, David K.; Weissman, Laura; Wolff, Robert; Wu, Bai-Lin; Miller, David T.; Poduri, Annapurna

    2015-01-01

    Objective To evaluate the role of copy number abnormalities detectable by chromosomal microarray (CMA) testing in patients with epilepsy at a tertiary care center. Methods We identified patients with ICD-9 codes for epilepsy or seizures and clinical CMA testing performed between October 2006 and February 2011 at Boston Children’s Hospital. We reviewed medical records and included patients meeting criteria for epilepsy. We phenotypically characterized patients with epilepsy-associated abnormalities on CMA. Results Of 973 patients who had CMA and ICD-9 codes for epilepsy or seizures, 805 patients satisfied criteria for epilepsy. We observed 437 copy number variants (CNVs) in 323 patients (1–4 per patient), including 185 (42%) deletions and 252 (58%) duplications. Forty (9%) were confirmed de novo, 186 (43%) were inherited, and parental data were unavailable for 211 (48%). Excluding full chromosome trisomies, CNV size ranged from 18 kb to 142 Mb, and 34% were over 500 kb. In at least 40 cases (5%), the epilepsy phenotype was explained by a CNV, including 29 patients with epilepsy-associated syndromes and 11 with likely disease-associated CNVs involving epilepsy genes or “hotspots.” We observed numerous recurrent CNVs including 10 involving loss or gain of Xp22.31, a region described in patients with and without epilepsy. Interpretation Copy number abnormalities play an important role in patients with epilepsy. Given that the diagnostic yield of CMA for epilepsy patients is similar to the yield in autism spectrum disorders and in prenatal diagnosis, for which published guidelines recommend testing with CMA, we recommend the implementation of CMA in the evaluation of unexplained epilepsy. PMID:24811917

  4. Breast tumor copy number aberration phenotypes and genomic instability

    International Nuclear Information System (INIS)

    Fridlyand, Jane; Jain, Ajay N; McLennan, Jane; Ziegler, John; Chin, Koei; Devries, Sandy; Feiler, Heidi; Gray, Joe W; Waldman, Frederic; Pinkel, Daniel; Albertson, Donna G; Snijders, Antoine M; Ylstra, Bauke; Li, Hua; Olshen, Adam; Segraves, Richard; Dairkee, Shanaz; Tokuyasu, Taku; Ljung, Britt Marie

    2006-01-01

    Genomic DNA copy number aberrations are frequent in solid tumors, although the underlying causes of chromosomal instability in tumors remain obscure. Genes likely to have genomic instability phenotypes when mutated (e.g. those involved in mitosis, replication, repair, and telomeres) are rarely mutated in chromosomally unstable sporadic tumors, even though such mutations are associated with some heritable cancer prone syndromes. We applied array comparative genomic hybridization (CGH) to the analysis of breast tumors. The variation in the levels of genomic instability amongst tumors prompted us to investigate whether alterations in processes/genes involved in maintenance and/or manipulation of the genome were associated with particular types of genomic instability. We discriminated three breast tumor subtypes based on genomic DNA copy number alterations. The subtypes varied with respect to level of genomic instability. We find that shorter telomeres and altered telomere related gene expression are associated with amplification, implicating telomere attrition as a promoter of this type of aberration in breast cancer. On the other hand, the numbers of chromosomal alterations, particularly low level changes, are associated with altered expression of genes in other functional classes (mitosis, cell cycle, DNA replication and repair). Further, although loss of function instability phenotypes have been demonstrated for many of the genes in model systems, we observed enhanced expression of most genes in tumors, indicating that over expression, rather than deficiency underlies instability. Many of the genes associated with higher frequency of copy number aberrations are direct targets of E2F, supporting the hypothesis that deregulation of the Rb pathway is a major contributor to chromosomal instability in breast tumors. These observations are consistent with failure to find mutations in sporadic tumors in genes that have roles in maintenance or manipulation of the genome

  5. Mapping copy number variation by population-scale genome sequencing

    DEFF Research Database (Denmark)

    Mills, Ryan E.; Walter, Klaudia; Stewart, Chip

    2011-01-01

    Genomic structural variants (SVs) are abundant in humans, differing from other forms of variation in extent, origin and functional impact. Despite progress in SV characterization, the nucleotide resolution architecture of most SVs remains unknown. We constructed a map of unbalanced SVs (that is......, copy number variants) based on whole genome DNA sequencing data from 185 human genomes, integrating evidence from complementary SV discovery approaches with extensive experimental validations. Our map encompassed 22,025 deletions and 6,000 additional SVs, including insertions and tandem duplications...

  6. Relacije umetnosti i video igara / Relations of Art and Video Games

    OpenAIRE

    Manojlo Maravić

    2012-01-01

    When discussing the art of video games, three different contexts need to be considered: the 'high' art (video games and the art); commercial video games (video games as the art) and the fan art. Video games are a legitimate artistic medium subject to modifications and recontextualisations in the process of creating a specific experience of the player/user/audience and political action by referring to particular social problems. They represent a high technological medium that increases, with p...

  7. SIRSALE: integrated video database management tools

    Science.gov (United States)

    Brunie, Lionel; Favory, Loic; Gelas, J. P.; Lefevre, Laurent; Mostefaoui, Ahmed; Nait-Abdesselam, F.

    2002-07-01

    Video databases became an active field of research during the last decade. The main objective in such systems is to provide users with capabilities to friendly search, access and playback distributed stored video data in the same way as they do for traditional distributed databases. Hence, such systems need to deal with hard issues : (a) video documents generate huge volumes of data and are time sensitive (streams must be delivered at a specific bitrate), (b) contents of video data are very hard to be automatically extracted and need to be humanly annotated. To cope with these issues, many approaches have been proposed in the literature including data models, query languages, video indexing etc. In this paper, we present SIRSALE : a set of video databases management tools that allow users to manipulate video documents and streams stored in large distributed repositories. All the proposed tools are based on generic models that can be customized for specific applications using ad-hoc adaptation modules. More precisely, SIRSALE allows users to : (a) browse video documents by structures (sequences, scenes, shots) and (b) query the video database content by using a graphical tool, adapted to the nature of the target video documents. This paper also presents an annotating interface which allows archivists to describe the content of video documents. All these tools are coupled to a video player integrating remote VCR functionalities and are based on active network technology. So, we present how dedicated active services allow an optimized video transport for video streams (with Tamanoir active nodes). We then describe experiments of using SIRSALE on an archive of news video and soccer matches. The system has been demonstrated to professionals with a positive feedback. Finally, we discuss open issues and present some perspectives.

  8. Effect of video decoder errors on video interpretability

    Science.gov (United States)

    Young, Darrell L.

    2014-06-01

    The advancement in video compression technology can result in more sensitivity to bit errors. Bit errors can propagate causing sustained loss of interpretability. In the worst case, the decoder "freezes" until it can re-synchronize with the stream. Detection of artifacts enables downstream processes to avoid corrupted frames. A simple template approach to detect block stripes and a more advanced cascade approach to detect compression artifacts was shown to correlate to the presence of artifacts and decoder messages.

  9. Video-Based Big Data Analytics in Cyberlearning

    Science.gov (United States)

    Wang, Shuangbao; Kelly, William

    2017-01-01

    In this paper, we present a novel system, inVideo, for video data analytics, and its use in transforming linear videos into interactive learning objects. InVideo is able to analyze video content automatically without the need for initial viewing by a human. Using a highly efficient video indexing engine we developed, the system is able to analyze…

  10. Physical protection

    International Nuclear Information System (INIS)

    Myers, D.A.

    1989-01-01

    Physical protection is defined and its function in relation to other functions of a State System of Accounting for and Control of Nuclear Materials is described. The need for a uniform minimum international standard for physical protection as well as the need for international cooperation in physical protection is emphasized. The IAEA's INFCIRC/225/Rev. 1 (Annex 1) is reviewed. The Convention on the Physical Protection of Nuclear Material (Annex 2) is discussed. Photographs show examples of typical physical protection technology (Annex 3)

  11. Diplomatic Protection

    OpenAIRE

    Režná, Jana

    2006-01-01

    Final thesis Topic: Diplomatic protection Thesis supervisor: JUDr. Vladimír Balaš, CSc. Student: Marek Čermák Thesis on the topic of diplomatic protection deals with the granting of exercise of diplomatic protection by the states and is divided into seven chapters which follow each other. The first chapter describes the diplomatic protection and its historical foundations. The second chapter focuses on the possibility of exercise of diplomatic protection in respect of natural persons and the ...

  12. Elimination of Parallel Copies using Code Motion on Data Dependence Graphs

    DEFF Research Database (Denmark)

    Brandner, Florian; Colombet, Quentin

    2013-01-01

    , while at the same time a valid register assignment is preserved. Our results show that even after traditional register allocation with coalescing our technique is able to eliminate an additional 3% (up to 9%) of the remaining copies and reduce the weighted costs of register copies by up to 25......Register allocation regained much interest in recent years due to the development of decoupled strategies that split the problem into separate phases: spilling, register assignment, and copy elimination. Traditional approaches to copy elimination during register allocation are based on interference......% for the SPECINT 2000 benchmarks. In comparison to Parallel Copy Motion, our technique removes 11% (up to 20%) more copies and up to 39% more of the copy costs....

  13. Video camera use at nuclear power plants

    International Nuclear Information System (INIS)

    Estabrook, M.L.; Langan, M.O.; Owen, D.E.

    1990-08-01

    A survey of US nuclear power plants was conducted to evaluate video camera use in plant operations, and determine equipment used and the benefits realized. Basic closed circuit television camera (CCTV) systems are described and video camera operation principles are reviewed. Plant approaches for implementing video camera use are discussed, as are equipment selection issues such as setting task objectives, radiation effects on cameras, and the use of disposal cameras. Specific plant applications are presented and the video equipment used is described. The benefits of video camera use --- mainly reduced radiation exposure and increased productivity --- are discussed and quantified. 15 refs., 6 figs

  14. Handbook of video databases design and applications

    CERN Document Server

    Furht, Borko

    2003-01-01

    INTRODUCTIONIntroduction to Video DatabasesOge Marques and Borko FurhtVIDEO MODELING AND REPRESENTATIONModeling Video Using Input/Output Markov Models with Application to Multi-Modal Event DetectionAshutosh Garg, Milind R. Naphade, and Thomas S. HuangStatistical Models of Video Structure and SemanticsNuno VasconcelosFlavor: A Language for Media RepresentationAlexandros Eleftheriadis and Danny HongIntegrating Domain Knowledge and Visual Evidence to Support Highlight Detection in Sports VideosJuergen Assfalg, Marco Bertini, Carlo Colombo, and Alberto Del BimboA Generic Event Model and Sports Vid

  15. Using Video in the English Language Clasroom

    Directory of Open Access Journals (Sweden)

    Amado Vicente

    2002-08-01

    Full Text Available Video is a popular and a motivating potential medium in schools. Using video in the language classroom helps the language teachers in many different ways. Video, for instance, brings the outside world into the language classroom, providing the class with many different topics and reasons to talk about. It can provide comprehensible input to the learners through contextualised models of language use. It also offers good opportunities to introduce native English speech into the language classroom. Through this article I will try to show what the benefits of using video are and, at the end, I present an instrument to select and classify video materials.

  16. [Is video game addiction a reality ?

    Science.gov (United States)

    Thorens, Gabriel; Achab, Sophia; Rothen, Stephane; Khazaal, Yasser; Zullino, Daniele

    2016-09-21

    Video games are widely practiced. Questions about their potential health risks arise, including the risk of addiction. If there is at present no official diagnosis of video games addiction, the DSM-5 proposes temporary criteria based on pathological gambling. Video game addiction affects a minority of at risk individuals. The proposed treatments are essentially psychotherapeutic. Video games practices can be non problematic and they may also have potential beneficial effects on individuals. It is therefore recommended, when assessing video games practices, to take into account the positive and negative impacts of their use.

  17. Face Recognition and Tracking in Videos

    Directory of Open Access Journals (Sweden)

    Swapnil Vitthal Tathe

    2017-07-01

    Full Text Available Advancement in computer vision technology and availability of video capturing devices such as surveillance cameras has evoked new video processing applications. The research in video face recognition is mostly biased towards law enforcement applications. Applications involves human recognition based on face and iris, human computer interaction, behavior analysis, video surveillance etc. This paper presents face tracking framework that is capable of face detection using Haar features, recognition using Gabor feature extraction, matching using correlation score and tracking using Kalman filter. The method has good recognition rate for real-life videos and robust performance to changes due to illumination, environmental factors, scale, pose and orientations.

  18. Performance Analysis of Video Transmission Using Sequential Distortion Minimization Method for Digital Video Broadcasting Terrestrial

    Directory of Open Access Journals (Sweden)

    Novita Astin

    2016-12-01

    Full Text Available This paper presents about the transmission of Digital Video Broadcasting system with streaming video resolution 640x480 on different IQ rate and modulation. In the video transmission, distortion often occurs, so the received video has bad quality. Key frames selection algorithm is flexibel on a change of video, but on these methods, the temporal information of a video sequence is omitted. To minimize distortion between the original video and received video, we aimed at adding methodology using sequential distortion minimization algorithm. Its aim was to create a new video, better than original video without significant loss of content between the original video and received video, fixed sequentially. The reliability of video transmission was observed based on a constellation diagram, with the best result on IQ rate 2 Mhz and modulation 8 QAM. The best video transmission was also investigated using SEDIM (Sequential Distortion Minimization Method and without SEDIM. The experimental result showed that the PSNR (Peak Signal to Noise Ratio average of video transmission using SEDIM was an increase from 19,855 dB to 48,386 dB and SSIM (Structural Similarity average increase 10,49%. The experimental results and comparison of proposed method obtained a good performance. USRP board was used as RF front-end on 2,2 GHz.

  19. One Method for Inhibiting the Copying of Online Homework

    Science.gov (United States)

    Busch, Hauke

    2017-10-01

    Over the last several years online homework solutions have become ever more accessible to students. This is due in part to programs like Yahoo Answers, Chegg, publisher solution manuals, and other web resources that are readily available online. The student can easily search any physics homework problem posted on the web in a matter of seconds and have the solution. The results of this are an apparent increase in students copying the answers without solving the problem, which may lead to an increase in homework scores but a reduction in exam scores and an overall lower grade in the class. A secondary effect that may be observed is that tutoring centers, recitations, and supplemental instructor sessions have reduced student attendance. Some might say that the readily available solutions for homework systems such as MasteringPhysics (MP), WebAssign, etc. have greatly diminished them as a teaching tool, and for grading and assessing students' performance in a course. It is the purpose of this paper to offer a possible solution for preventing students from potentially copying online homework solutions.

  20. Impact of constitutional copy number variants on biological pathway evolution.

    Science.gov (United States)

    Poptsova, Maria; Banerjee, Samprit; Gokcumen, Omer; Rubin, Mark A; Demichelis, Francesca

    2013-01-23

    Inherited Copy Number Variants (CNVs) can modulate the expression levels of individual genes. However, little is known about how CNVs alter biological pathways and how this varies across different populations. To trace potential evolutionary changes of well-described biological pathways, we jointly queried the genomes and the transcriptomes of a collection of individuals with Caucasian, Asian or Yoruban descent combining high-resolution array and sequencing data. We implemented an enrichment analysis of pathways accounting for CNVs and genes sizes and detected significant enrichment not only in signal transduction and extracellular biological processes, but also in metabolism pathways. Upon the estimation of CNV population differentiation (CNVs with different polymorphism frequencies across populations), we evaluated that 22% of the pathways contain at least one gene that is proximal to a CNV (CNV-gene pair) that shows significant population differentiation. The majority of these CNV-gene pairs belong to signal transduction pathways and 6% of the CNV-gene pairs show statistical association between the copy number states and the transcript levels. The analysis suggested possible examples of positive selection within individual populations including NF-kB, MAPK signaling pathways, and Alu/L1 retrotransposition factors. Altogether, our results suggest that constitutional CNVs may modulate subtle pathway changes through specific pathway enzymes, which may become fixed in some populations.

  1. Why copy others? Insights from the social learning strategies tournament.

    Science.gov (United States)

    Rendell, L; Boyd, R; Cownden, D; Enquist, M; Eriksson, K; Feldman, M W; Fogarty, L; Ghirlanda, S; Lillicrap, T; Laland, K N

    2010-04-09

    Social learning (learning through observation or interaction with other individuals) is widespread in nature and is central to the remarkable success of humanity, yet it remains unclear why copying is profitable and how to copy most effectively. To address these questions, we organized a computer tournament in which entrants submitted strategies specifying how to use social learning and its asocial alternative (for example, trial-and-error learning) to acquire adaptive behavior in a complex environment. Most current theory predicts the emergence of mixed strategies that rely on some combination of the two types of learning. In the tournament, however, strategies that relied heavily on social learning were found to be remarkably successful, even when asocial information was no more costly than social information. Social learning proved advantageous because individuals frequently demonstrated the highest-payoff behavior in their repertoire, inadvertently filtering information for copiers. The winning strategy (discountmachine) relied nearly exclusively on social learning and weighted information according to the time since acquisition.

  2. Exploratory analysis of the copy number alterations in glioblastoma multiforme.

    Science.gov (United States)

    Freire, Pablo; Vilela, Marco; Deus, Helena; Kim, Yong-Wan; Koul, Dimpy; Colman, Howard; Aldape, Kenneth D; Bogler, Oliver; Yung, W K Alfred; Coombes, Kevin; Mills, Gordon B; Vasconcelos, Ana T; Almeida, Jonas S

    2008-01-01

    The Cancer Genome Atlas project (TCGA) has initiated the analysis of multiple samples of a variety of tumor types, starting with glioblastoma multiforme. The analytical methods encompass genomic and transcriptomic information, as well as demographic and clinical data about the sample donors. The data create the opportunity for a systematic screening of the components of the molecular machinery for features that may be associated with tumor formation. The wealth of existing mechanistic information about cancer cell biology provides a natural reference for the exploratory exercise. Glioblastoma multiforme DNA copy number data was generated by The Cancer Genome Atlas project for 167 patients using 227 aCGH experiments, and was analyzed to build a catalog of aberrant regions. Genome screening was performed using an information theory approach in order to quantify aberration as a deviation from a centrality without the bias of untested assumptions about its parametric nature. A novel Cancer Genome Browser software application was developed and is made public to provide a user-friendly graphical interface in which the reported results can be reproduced. The application source code and stand alone executable are available at (http://code.google.com/p/cancergenome) and (http://bioinformaticstation.org), respectively. The most important known copy number alterations for glioblastoma were correctly recovered using entropy as a measure of aberration. Additional alterations were identified in different pathways, such as cell proliferation, cell junctions and neural development. Moreover, novel candidates for oncogenes and tumor suppressors were also detected. A detailed map of aberrant regions is provided.

  3. The Diagnostic Agreement of Original and Faxed Copies of Electrocardiograms

    Directory of Open Access Journals (Sweden)

    Sadrihe Hajesmaeel-Gohari

    2013-02-01

    Full Text Available Background: General practitioners working in remote and rural areas sometimes need consultation with cardiologists. One practical and cost-effective way is transmission of patients’ electrocardiographic images via ordinary fax machine to the cardiologists, but there is an important question that how much agreement exists between the diagnoses made by reading an original electrocardiogram and its copy transmitted via fax.Materials and Methods: In this cross-sectional study, 60 original electrocardiographic images were given to cardiologists for diagnosis. In the next step those electrocardiographic images were faxed to the hospital through a simple cheap fax machine, one month later the same cardiologist was asked to put his diagnosis on the copied versions of electrocardiographs, and the results were compared. Results: In 59 studied cases, the two method of diagnoses were exactly the same and only in one case the diagnoses were different. Therefore, Kappa agreement coefficient was calculated as 96%.Conclusion: According to the results of this study, general practitioners working in deprived areas can be certainly recommended to send patients’ electrocardiographic images to the cardiologists via fax in the case of needing consultation.

  4. Copy Number Alterations and Methylation in Ewing's Sarcoma

    Science.gov (United States)

    Jahromi, Mona S.; Jones, Kevin B.; Schiffman, Joshua D.

    2011-01-01

    Ewing's sarcoma is the second most common bone malignancy affecting children and young adults. The prognosis is especially poor in metastatic or relapsed disease. The cell of origin remains elusive, but the EWS-FLI1 fusion oncoprotein is present in the majority of cases. The understanding of the molecular basis of Ewing's sarcoma continues to progress slowly. EWS-FLI1 affects gene expression, but other factors must also be at work such as mutations, gene copy number alterations, and promoter methylation. This paper explores in depth two molecular aspects of Ewing's sarcoma: copy number alterations (CNAs) and methylation. While CNAs consistently have been reported in Ewing's sarcoma, their clinical significance has been variable, most likely due to small sample size and tumor heterogeneity. Methylation is thought to be important in oncogenesis and balanced karyotype cancers such as Ewing's, yet it has received only minimal attention in prior studies. Future CNA and methylation studies will help to understand the molecular basis of this disease. PMID:21437220

  5. Copy Number Alterations and Methylation in Ewing's Sarcoma

    Directory of Open Access Journals (Sweden)

    Mona S. Jahromi

    2011-01-01

    Full Text Available Ewing's sarcoma is the second most common bone malignancy affecting children and young adults. The prognosis is especially poor in metastatic or relapsed disease. The cell of origin remains elusive, but the EWS-FLI1 fusion oncoprotein is present in the majority of cases. The understanding of the molecular basis of Ewing's sarcoma continues to progress slowly. EWS-FLI1 affects gene expression, but other factors must also be at work such as mutations, gene copy number alterations, and promoter methylation. This paper explores in depth two molecular aspects of Ewing's sarcoma: copy number alterations (CNAs and methylation. While CNAs consistently have been reported in Ewing's sarcoma, their clinical significance has been variable, most likely due to small sample size and tumor heterogeneity. Methylation is thought to be important in oncogenesis and balanced karyotype cancers such as Ewing's, yet it has received only minimal attention in prior studies. Future CNA and methylation studies will help to understand the molecular basis of this disease.

  6. Industrial Relevance of Chromosomal Copy Number Variation in Saccharomyces Yeasts.

    Science.gov (United States)

    Gorter de Vries, Arthur R; Pronk, Jack T; Daran, Jean-Marc G

    2017-06-01

    Chromosomal copy number variation (CCNV) plays a key role in evolution and health of eukaryotes. The unicellular yeast Saccharomyces cerevisiae is an important model for studying the generation, physiological impact, and evolutionary significance of CCNV. Fundamental studies of this yeast have contributed to an extensive set of methods for analyzing and introducing CCNV. Moreover, these studies provided insight into the balance between negative and positive impacts of CCNV in evolutionary contexts. A growing body of evidence indicates that CCNV not only frequently occurs in industrial strains of Saccharomyces yeasts but also is a key contributor to the diversity of industrially relevant traits. This notion is further supported by the frequent involvement of CCNV in industrially relevant traits acquired during evolutionary engineering. This review describes recent developments in genome sequencing and genome editing techniques and discusses how these offer opportunities to unravel contributions of CCNV in industrial Saccharomyce s strains as well as to rationally engineer yeast chromosomal copy numbers and karyotypes. Copyright © 2017 Gorter de Vries et al.

  7. Efference copy failure during smooth pursuit eye movements in schizophrenia.

    Science.gov (United States)

    Spering, Miriam; Dias, Elisa C; Sanchez, Jamie L; Schütz, Alexander C; Javitt, Daniel C

    2013-07-17

    Abnormal smooth pursuit eye movements in patients with schizophrenia are often considered a consequence of impaired motion perception. Here we used a novel motion prediction task to assess the effects of abnormal pursuit on perception in human patients. Schizophrenia patients (n = 15) and healthy controls (n = 16) judged whether a briefly presented moving target ("ball") would hit/miss a stationary vertical line segment ("goal"). To relate prediction performance and pursuit directly, we manipulated eye movements: in half of the trials, observers smoothly tracked the ball; in the other half, they fixated on the goal. Strict quality criteria ensured that pursuit was initiated and that fixation was maintained. Controls were significantly better in trajectory prediction during pursuit than during fixation, their performance increased with presentation duration, and their pursuit gain and perceptual judgments were correlated. Such perceptual benefits during pursuit may be due to the use of extraretinal motion information estimated from an efference copy signal. With an overall lower performance in pursuit and perception, patients showed no such pursuit advantage and no correlation between pursuit gain and perception. Although patients' pursuit showed normal improvement with longer duration, their prediction performance failed to benefit from duration increases. This dissociation indicates relatively intact early visual motion processing, but a failure to use efference copy information. Impaired efference function in the sensory system may represent a general deficit in schizophrenia and thus contribute to symptoms and functional outcome impairments associated with the disorder.

  8. Blind prediction of natural video quality.

    Science.gov (United States)

    Saad, Michele A; Bovik, Alan C; Charrier, Christophe

    2014-03-01

    We propose a blind (no reference or NR) video quality evaluation model that is nondistortion specific. The approach relies on a spatio-temporal model of video scenes in the discrete cosine transform domain, and on a model that characterizes the type of motion occurring in the scenes, to predict video quality. We use the models to define video statistics and perceptual features that are the basis of a video quality assessment (VQA) algorithm that does not require the presence of a pristine video to compare against in order to predict a perceptual quality score. The contributions of this paper are threefold. 1) We propose a spatio-temporal natural scene statistics (NSS) model for videos. 2) We propose a motion model that quantifies motion coherency in video scenes. 3) We show that the proposed NSS and motion coherency models are appropriate for quality assessment of videos, and we utilize them to design a blind VQA algorithm that correlates highly with human judgments of quality. The proposed algorithm, called video BLIINDS, is tested on the LIVE VQA database and on the EPFL-PoliMi video database and shown to perform close to the level of top performing reduced and full reference VQA algorithms.

  9. Video genre classification using multimodal features

    Science.gov (United States)

    Jin, Sung Ho; Bae, Tae Meon; Choo, Jin Ho; Ro, Yong Man

    2003-12-01

    We propose a video genre classification method using multimodal features. The proposed method is applied for the preprocessing of automatic video summarization or the retrieval and classification of broadcasting video contents. Through a statistical analysis of low-level and middle-level audio-visual features in video, the proposed method can achieve good performance in classifying several broadcasting genres such as cartoon, drama, music video, news, and sports. In this paper, we adopt MPEG-7 audio-visual descriptors as multimodal features of video contents and evaluate the performance of the classification by feeding the features into a decision tree-based classifier which is trained by CART. The experimental results show that the proposed method can recognize several broadcasting video genres with a high accuracy and the classification performance with multimodal features is superior to the one with unimodal features in the genre classification.

  10. Video Game Accessibility: A Legal Approach

    Directory of Open Access Journals (Sweden)

    George Powers

    2015-02-01

    Full Text Available Video game accessibility may not seem of significance to some, and it may sound trivial to anyone who does not play video games. This assumption is false. With the digitalization of our culture, video games are an ever increasing part of our life. They contribute to peer to peer interactions, education, music and the arts. A video game can be created by hundreds of musicians and artists, and they can have production budgets that exceed modern blockbuster films. Inaccessible video games are analogous to movie theaters without closed captioning or accessible facilities. The movement to have accessible video games is small, unorganized and misdirected. Just like the other battles to make society accessible were accomplished through legislation and law, the battle for video game accessibility must be focused toward the law and not the market.

  11. Telemetry and Communication IP Video Player

    Science.gov (United States)

    OFarrell, Zachary L.

    2011-01-01

    Aegis Video Player is the name of the video over IP system for the Telemetry and Communications group of the Launch Services Program. Aegis' purpose is to display video streamed over a network connection to be viewed during launches. To accomplish this task, a VLC ActiveX plug-in was used in C# to provide the basic capabilities of video streaming. The program was then customized to be used during launches. The VLC plug-in can be configured programmatically to display a single stream, but for this project multiple streams needed to be accessed. To accomplish this, an easy to use, informative menu system was added to the program to enable users to quickly switch between videos. Other features were added to make the player more useful, such as watching multiple videos and watching a video in full screen.

  12. Brownian motion using video capture

    International Nuclear Information System (INIS)

    Salmon, Reese; Robbins, Candace; Forinash, Kyle

    2002-01-01

    Although other researchers had previously observed the random motion of pollen grains suspended in water through a microscope, Robert Brown's name is associated with this behaviour based on observations he made in 1828. It was not until Einstein's work in the early 1900s however, that the origin of this irregular motion was established to be the result of collisions with molecules which were so small as to be invisible in a light microscope (Einstein A 1965 Investigations on the Theory of the Brownian Movement ed R Furth (New York: Dover) (transl. Cowper A D) (5 papers)). Jean Perrin in 1908 (Perrin J 1923 Atoms (New York: Van Nostrand-Reinhold) (transl. Hammick D)) was able, through a series of painstaking experiments, to establish the validity of Einstein's equation. We describe here the details of a junior level undergraduate physics laboratory experiment where students used a microscope, a video camera and video capture software to verify Einstein's famous calculation of 1905. (author)

  13. Scaffolding With and Through Videos

    DEFF Research Database (Denmark)

    Otrel-Cass, Kathrin; Khoo, Elaine; Cowie, Bronwen

    2012-01-01

    In New Zealand and internationally claims are being made about the potential for information and communication technologies (ICTs) to transform teaching and learning. However, the theoretical underpinnings explaining the complex interplay between the content, pedagogy and technology a teacher needs...... to scaffold learning. It showcases the intricate interplay between teachers’ knowledge about content, digital video technology, and students’ learning needs based on a qualitative study of two science teachers and their students in a New Zealand primary school....... to consider must be expanded. This article explicates theoretical and practical ideas related to teachers’ application of their ICT technology, pedagogy, and content knowledge (TPACK) in science. The article unpacks the social and technological dimensions of teachers’ use of TPACK when they use digital videos...

  14. Ethnographic Video as Design Specs

    DEFF Research Database (Denmark)

    Buur, Jacob; Fraser, Euan; Oinonen, Soila

    2010-01-01

    Ethnographic video is used extensively in some industrial corporations to document field studies and to convey an understanding of what is 'out there' to HCI designers and developers of new technologies. The basic assumption is that ethnography through questioning the prevailing conceptions...... of 'users' and their practices can encourage development engineers to solve the right problems with socially sustainable solutions. However, engineering is solution-driven, with the currency of negotiation being requirement specifications and solution principles. While providing ethnographic insight...

  15. Video assisted gastrostomy in children

    OpenAIRE

    Backman, Torbjörn

    2014-01-01

    Children with severe diseases can be provided nutritional support through a gastrostomy if needed. At the Department of Paediatric Surgery in Lund we have used the Video Assisted Gastrostomy (VAG) procedure since 1994 when establishing gastrostomies. In this thesis, children with different diseases, who all had undergone the VAG procedure, were studied in five different clinical studies. Postoperative complications were collected and validated. We have not seen any major complications associa...

  16. Multimedia image and video processing

    CERN Document Server

    Guan, Ling

    2012-01-01

    As multimedia applications have become part of contemporary daily life, numerous paradigm-shifting technologies in multimedia processing have emerged over the last decade. Substantially updated with 21 new chapters, Multimedia Image and Video Processing, Second Edition explores the most recent advances in multimedia research and applications. This edition presents a comprehensive treatment of multimedia information mining, security, systems, coding, search, hardware, and communications as well as multimodal information fusion and interaction. Clearly divided into seven parts, the book begins w

  17. Situational simulations in interactive video

    Energy Technology Data Exchange (ETDEWEB)

    Smith, L.J.

    1991-07-01

    The Westinghouse Hanford Company Advanced Training Technologies section is using situational simulations in several Interactive Video training courses. Two applications of situational simulations will be discussed. In the first, used in the Hanford General Employee Training course, the student evaluates employee's actions in simulations of possible workplace situations. In the second, used in the Criticality Safety course, students must follow well-defined procedures to complete tasks. Design and incorporation of situational simulations will be discussed. 3 refs.

  18. Video Encryption-A Survey

    OpenAIRE

    Jolly Shah; Vikas Saxena

    2011-01-01

    Multimedia data security is becoming important with the continuous increase of digital communications on internet. The encryption algorithms developed to secure text data are not suitable for multimedia application because of the large data size and real time constraint. In this paper, classification and description of various video encryption algorithms are presented. Analysis and Comparison of these algorithms with respect to various parameters like visual degradation, encryption ratio, spe...

  19. Tv & video engineer's reference book

    CERN Document Server

    Jackson, K G

    1991-01-01

    TV & Video Engineer's Reference Book presents an extensive examination of the basic television standards and broadcasting spectrum. It discusses the fundamental concepts in analogue and digital circuit theory. It addresses studies in the engineering mathematics, formulas, and calculations. Some of the topics covered in the book are the conductors and insulators, passive components, alternating current circuits; broadcast transmission; radio frequency propagation; electron optics in cathode ray tube; color encoding and decoding systems; television transmitters; and remote supervision of unatten

  20. Situational simulations in interactive video

    International Nuclear Information System (INIS)

    Smith, L.J.

    1991-07-01

    The Westinghouse Hanford Company Advanced Training Technologies section is using situational simulations in several Interactive Video training courses. Two applications of situational simulations will be discussed. In the first, used in the Hanford General Employee Training course, the student evaluates employee's actions in simulations of possible workplace situations. In the second, used in the Criticality Safety course, students must follow well-defined procedures to complete tasks. Design and incorporation of situational simulations will be discussed. 3 refs