محصولات
HCI International 2022 – Late Breaking Posters - Original PDF
HCI International 2022 – Late Breaking Posters - Original PDF
نویسندگان: Constantine Stephanidis, Margherita Antona, Stavroula Ntoa, Gavriel Salvendy خلاصه: 4 P. Asghari et al. 1 Introduction Eye tracking (ET) is frequently used, for example, in behavioral research and human-computer interaction. Eye movement patterns can reveal detailed infor- mation about the user’s cognitive processes, their attention level, or decision- making processes [3,12]. Applications and research based on ET require reliable and robust data [9]. Traditionally, this requires dedicated hardware with high- resolution cameras and infrared illumination to detect corneal reflections [7]. However, dedicated hardware is expensive and thus limits the pervasive use in real-world applications. This situation may change since, propelled by recent advances in deep learning, appearance-based gaze estimation methods that deliver promising results based on low-cost consumer-grade camera inputs start to emerge [2,10,11,21]. These approaches learn to estimate gazes from a video stream based on large-scale data sets and provide 3D gaze vectors or correspond- ing 2D gaze locations on a screen. Furthermore, they do not require any specific external devices and can be used with standalone computers, laptop built-in webcams, or mobile device consumer-grade cameras. This opens up the possi- bility of developing affordable automated intelligent ET solutions for research, commerce, and the general public. On the way to realize this ambition, webcam ET (wcET) has to address several challenges including gaze estimation accu- racy, gaze estimator prediction time, and that gaze estimation quality can be affected by user movements [11]. This paper aims to contribute to the first step toward utilizing wcET as a low-cost pervasive technology by validating the data quality of a state-of-the-art wcET approach in comparison to the performance of an established, commercially available dedicated eye tracking (dhET) system. Accordingly, we address the following research question in our work: How does the gaze estimates of wcET differ from dhET in practical settings regarding accu- racy, precision, and sampling rate? We will further discuss how the limitations of the data quality may affect the performance of wcET applications
International Conference on Cyber Security, Privacy and Networking (ICSPN 2022) - Original PDF
International Conference on Cyber Security, Privacy and Networking (ICSPN 2022) - Original PDF
نویسندگان: Nadia Nedjah, Gregorio Martínez Pérez, B. B. Gupta خلاصه: Presents research works in the field of cyber security, privacy, and networking Provides results of ICSPN 2021, organized during September 09–11, 2022, in Thailand in online mode Serves as a reference for researchers and practitioners in academia and industry
Blockchain Technology and Emerging Technologies - Original PDF
Blockchain Technology and Emerging Technologies - Original PDF
نویسندگان: Weizhi Meng, Wenjuan Li خلاصه: ID-Based Self-encryption via Hyperledger Fabric Based Smart Contract Ilya Grishkov1, Roland Kromes1(B), Thanassis Giannetsos2, and Kaitai Liang1 1 Cyber Security Group, Delft University of Technology, Delft, The Netherlands I.Grishkov-1@student.tudelft.nl, {R.G.Kromes,Kaitai.Liang}@tudelft.nl 2 Ubitech Ltd., Digital Security and Trusted Computing Group, Athens, Greece agiannetsos@ubitech.eu Abstract. This paper offers a prototype of a Hyperledger Fabric-IPFS based network architecture including a smart contract based encryp- tion scheme that meant to improve the security of user’s data that is being uploaded to the distributed ledger. A new extension to the self- encryption scheme was deployed by integrating data owner’s identity into the encryption process. Such integration allows to permanently pre- serve ownership of the original file and link it to the person/entity who originally uploaded it. Moreover, self-encryption provides strong security guarantees that decryption of a file is computationally not feasible under the condition that the encrypted file and the key are safely stored. Keywords: Blockchain · IPFS · Self-Encryption · Security · Hyperledger Fabric 1 Introduction The modern world is increasingly adopting blockchain technology. The first major market adoption of blockchain happened in 2009 when Bitcoin was introduced [12]. Interest in blockchain solutions grew over the years and lead to the invention of Ethereum - Bitcoin peer but with support for smart contracts which are digital codes enabling the description of complete business logic [1]. The introduction of smart contracts leads to further development in the field of blockchain and cre- ated demand for more industry-friendly solutions that allow to identify users of the system (Know-Your-Customer, Anti-Money-Laundering). Hyperledger Fab- ric was then introduced as a highly modular permissioned blockchain that allows great customization to suit particular industrial needs [3]. Given its customizabil- ity and modularity, Hyperledger Fabric (HLF) is a perfect platform for extending it with various trust and privacy preservation solutions
Roger Lee Editor Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing - Original PDF
Roger Lee Editor Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing - Original PDF
نویسندگان: Roger Lee خلاصه: Presents recent research on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing Provides edited outcome of the 23rd SNPD 2022 conference Written by experts in the field
Regulation of Cryptocurrencies and Blockchain Technologies National and International Perspectives Second Edition - Original PDF
Regulation of Cryptocurrencies and Blockchain Technologies National and International Perspectives Second Edition - Original PDF
نویسندگان: Rosario Girasa خلاصه: Uncovers the key actors in digital technology while showcasing the benefits and risks of digital currencies Takes a critical look at the most up-to-date federal, state, and international regulation of virtual currency Explores the creation of stablecoins and governments issuance of their own versions of digital currencies
50 Literacy Strategies Step by Step Fourth Edition - Original PDF
50 Literacy Strategies Step by Step Fourth Edition - Original PDF
نویسندگان: Gail E. Tompkins خلاصه: Young children write “All About . . .” books on familiar topics (Tompkins, 2012). They put together a booklet with four or five pages, write a sentence or two on each page, and add illustrations to elaborate the information presented in the text. Stu- dents read the book to the teacher, who helps them elaborate ideas and correct mechani- cal errors before they share from the author’s chair (see p. 10). As they gain experience writing books with one or two sentences per page, students can expand and elaborate the information they share on each page, gradually increasing the length to a paragraph
AN INTRODUCTION TO PERFORMANCE ANALYSIS OF SPORT - Original PDF
AN INTRODUCTION TO PERFORMANCE ANALYSIS OF SPORT - Original PDF
نویسندگان: PETER O’DONOGHUE خلاصه: This introductory chapter introduces sports performance analysis by asking the following questions: What? Why? Who? Where? When? and How? What is sports performance analysis? What are sports performance data and information? Why do we analyse sports performance? Who analyses sports performance? Where is sports performance analysis done? When is sports performance analysis done? How is sports perform- ance analysis done? The answers to these questions are not independent. The reason why sports performance analysis is done and who requires the information can dictate what information is required. The informa- tion required can in turn influence when it is needed and thus when sports performances should be analysed. The time at which information is needed and economic constraints dictate the methods and locations of sports performance analysis tasks. These questions will be answered in turn but readers can expect some necessary overlap between the answers.
Assistive Technologies and Environmental Interventions in Healthcare - Original PDF
Assistive Technologies and Environmental Interventions in Healthcare - Original PDF
نویسندگان: Lynn Gitlow, Kathleen Flecky خلاصه: The changes we have all seen in technology and corre spondingly with assistive technology in the past 10 years are mind‐boggling. Futurist and inventor Ray Kurzweil (2000) stated early in the twenty‐first century that com puters are 100 million times more powerful than they were 50 years ago. The exponential growth of computer capacity that Kurzweil and others predicted in the late 1990s continues to advance and has the potential for improving all aspects of life (Diamandis and Kotler 2014). These exponential changes in technology make it hard to keep up with the latest innovations. For example, one of the chapter authors worked in an assistive technology laboratory in which serial port add‐ons to computers evolved into Universal Serial Bus (USB) ports rendering the former connections and their attachments obsolete within in less than five years. Currently, com puters no longer come with disk drives and all of the software one needs to load on the computer comes from the cloud. Vicente (2006) stated, “... more and more technology is being foisted upon us at a faster and faster pace” (p. 13). In addition, technology is clearly a necessary part of our lives. For many of us, it is difficult to remember a time when cell phones, laptops, or navigation devices were not available to those who could afford it. Furthermore, the convergence of multiple technologies into a single, small, handheld device such as a smart phone is common as part of our work and personal experiences
VOLUME PRICE ANALYSIS - Epub + Converted PDF
VOLUME PRICE ANALYSIS - Epub + Converted PDF
نویسندگان: George Milton خلاصه: Differentiation by market or asset class (index trading, stock trading, currency trading, futures trading). Differentiation according to investment horizon (from the ultra-short-term sequence of trading decisions every minute, as in high-speed trading, to medium- to long- term investing position trading). Differentiation according to signal providers and methods (triggers for buying or selling a position; examples are trading according to chart techniques, trading according to indicator signals, news trading, medium-term trading according to fundamental data and so on).
Bodily Subjects Essays on Gender and Health, 1800–2000 - PDF
Bodily Subjects Essays on Gender and Health, 1800–2000 - PDF
نویسندگان: racy Penny Light, Barbara Brookes, and Wendy Mitchinson خلاصه: Constant good health is a chimera: the thing we all want, don’t notice when we have it, and mourn when we lose it. Being “healthy” is also something that women and men “do” in different ways. 1 The authors in Bodily Subjects all explore the historical entanglement between gender and health to expose how women and men “did” health in a variety of locations, from the nineteenth-century English Poor Law Union of Stourbridge, an early twentieth-century Aboriginal reserve in Queensland, Australia, to A I D S activists on the streets of Toronto in the 1990s. Our volume takes as its subject how gender is integral to the understanding of health and the way its meaning is embedded in cul- tural contexts connected to place and time. Our title reflects the way in which the body is both a subject of inquiry and a phenomenological experience. There is no “I” without a body and that body, Foucault has argued, is subject to regimes of power. 2 The title, Bodily Subjects, then, should be read in two ways. First, it re- fers to the embodied meanings of health for men and women and how these have expanded over time, from an able body signifying health in the nineteenth century to concepts of “well-being,” a psychological interpretation, which came to dominate health discourse in Western countries by the late twentieth century. Second, it refers to the way in which ill health turns individuals into subjects of the medical gaze. Medical expertise is brought to bear in diagnosing and treating indi- viduals in ways that are seen through the lens of gender

آیا کتاب مورد نظر هنوز بر روی سایت قرار نگرفته است؟ جای نگرانی نیست! کافی است بر روی گزینه سفارش کتاب کلیک کرده و درخواست خود را ثبت کنید. در کمتر از چند ساعت کتاب شما را آماده خواهیم کرد.