Generating a description of an image is called image captioning. Image captioning requires to recognize the important objects, their attributes and their relationships in an image. It also needs to generate syntactically and semantically... more
Generating a description of an image is called image captioning. Image captioning requires to recognize the important objects, their attributes and their relationships in an image. It also needs to generate syntactically and semantically correct sentences. Deep learning-based techniques are capable of handling the complexities and challenges of image captioning. In this survey paper, we aim to present a comprehensive review of existing deep learning-based image captioning techniques. We discuss the foundation of the techniques to analyze their performances, strengths and limitations. We also discuss the datasets and the evaluation metrics popularly used in deep learning based automatic image captioning.
While games may help to support skills practice and attitudinal change, the game creation process itself may also be effective in enhancing empathy and compassion for other people. Nigeria has over 250 ethnic groups and 500 languages amid... more
While games may help to support skills practice and attitudinal change, the game creation process itself may also be effective in enhancing empathy and compassion for other people. Nigeria has over 250 ethnic groups and 500 languages amid its 200 million people. We aim to enhance perspective-taking, empathy, and compassion across different ethnic groups using game jams in public schools in Nigeria. In 2021, we piloted a game jam focused on identity exploration and perspective-taking for students ages 12 to 20. Initial results and next steps are shared.
Due to the exponential increase in network traffic in the data centers, thousands of servers interconnected with high bandwidth switches are required. Field Programmable Gate Arrays (FPGAs) with Cloud ecosystem offer high performance in... more
Due to the exponential increase in network traffic in the data centers, thousands of servers interconnected with high bandwidth switches are required. Field Programmable Gate Arrays (FPGAs) with Cloud ecosystem offer high performance in efficiency and energy, making them active resources, easy to program and reconfigure. This paper looks at FPGAs as reconfigurable accelerators for the cloud computing presents the main hardware accelerators that have been presented in various widely used cloud computing applications such as MapReduce, Spark, Memcached, Databases.
The application of digital technologies, which is continually breaking into new spheres of use, presents a challenging development. Business environments are rapidly evolving; new markers, new market players, new types of products, new... more
The application of digital technologies, which is continually breaking into new spheres of use, presents a challenging development. Business environments are rapidly evolving; new markers, new market players, new types of products, new user groups. All these changes raise different issues from those previously confronted in the computer industry. As the "usability issue" is applied to many product areas beyond traditional HCI we were interested to find our how far state of practice companies are adapting the UCD principles commonly advocated. We were also interested to see how these principles were being applied in business areas nor usually associated with the computer industry.
Difficulty is one of the major motivational pull of videogames, and thus many games use Dynamic Difficulty Adjustment (DDA) systems to improve the game experience. This paper describes our research investigating the influence of DDA... more
Difficulty is one of the major motivational pull of videogames, and thus many games use Dynamic Difficulty Adjustment (DDA) systems to improve the game experience. This paper describes our research investigating the influence of DDA systems on player’s confidence, evaluated using an in-game bet system. Our hypothesis is that DDA systems may lead players to overconfidence, revealed by an overestimation of their success chances when betting. This boost of confidence may be a part of the positive impact of DDA systems on the quality of game experience. We explain our method to evaluate player’s confidence and implement it into three games related to logical, motor and sensory difficulties. We describe two experimental conditions where difficulty is either randomly chosen or adapted using a DDA algorithm. Results show how DDA systems can lead players to high level of overconfidence.
I ntroduction In his now classic book on Flatland, Edwin Abbott [1] describes the social order resulting in a world restricted to two spatial dimensions. The inhabitants of this world are completely unable to visualize a third spatial... more
I ntroduction In his now classic book on Flatland, Edwin Abbott [1] describes the social order resulting in a world restricted to two spatial dimensions. The inhabitants of this world are completely unable to visualize a third spatial dimension and are therefore thoroughly baffled by the ...
Security metrics have received significant attention. However, they have not been systematically explored based on the understanding of attack-defense interactions, which are affected by various factors, including the degree of system... more
Security metrics have received significant attention. However, they have not been systematically explored based on the understanding of attack-defense interactions, which are affected by various factors, including the degree of system vulnerabilities, the power of system defense mechanisms, attack (or threat) severity, and situations a system at risk faces. This survey particularly focuses on how a system security state can evolve as an outcome of cyber attack-defense interactions. This survey concerns how to measure system-level security by proposing a security metrics framework based on the following four sub-metrics: (1) metrics of system vulnerabilities , (2) metrics of defense power , (3) metrics of attack or threat severity , and (4) metrics of situations . To investigate the relationships among these four sub-metrics, we propose a hierarchical ontology with four sub-ontologies corresponding to the four sub-metrics and discuss how they are related to each other. Using the four...
A design pattern is a successful solution to recurring problems. It is a powerful tool to improve design quality and to reduce the time and cost of design. One of the major challenges confronting developers while using of design pattern... more
A design pattern is a successful solution to recurring problems. It is a powerful tool to improve design quality and to reduce the time and cost of design. One of the major challenges confronting developers while using of design pattern is finding a suitable selection for them, thus it is considered as a challenging task for developers with less experience in the area of the design pattern. Therefore, the developers need a pattern recommendation to assist them by suggesting suitable design patterns. This paper presents the architecture Design Pattern Selection based on a Multi-Agent System (DPSA). The DPSA aims to obtain the appropriate recommendation to reduce development efforts, facilitate and assist the developers in selecting suitable patterns for their problems. DPSA's agents operate to support four different types of recommendations: single pattern, implement the pattern, pattern sequences, and recommending practical.
Checksums, long used for random error detection in communications, is now being employed to detect changes for integrity purposes. For example, checksums are being used for the detection of computer viruses [POZ86]. The checksum... more
Checksums, long used for random error detection in communications, is now being employed to detect changes for integrity purposes. For example, checksums are being used for the detection of computer viruses [POZ86]. The checksum algorithms for detecting random errors are not sufficient against an entity that wishes to "fool" the checksum mechanism. This entity wants to be able to insert a forgery in place of the original data such that an unsuspecting user does not realize the forgery has occurred. This paper describes checksum algorithms and features of checksum algorithms to deter this type of forgery.
Wearable sensors are widely adopted for the provision of healthcare services. Unfortunately the noise always degrades the quality of the acquired signals. In this paper, we propose a framework for mobile ECG denoising, based on a novel... more
Wearable sensors are widely adopted for the provision of healthcare services. Unfortunately the noise always degrades the quality of the acquired signals. In this paper, we propose a framework for mobile ECG denoising, based on a novel numerical scheme with low computational requirements. The proposed system is able to store a signal from a wearable sensor and process it in a remote way or directly on the device.
This paper proposes a noise robust high resolution pitch detection algorithm based on AMDF and ACF. The falling trend of AMDF is eliminated by an alignment technique, and AMDF and ACF are combined to take the advantage of their... more
This paper proposes a noise robust high resolution pitch detection algorithm based on AMDF and ACF. The falling trend of AMDF is eliminated by an alignment technique, and AMDF and ACF are combined to take the advantage of their complementary nature. These two functions are combined by multiplication and addition over several band pass filters to enhance important candidates and suppress less important candidates. Then using a sophisticated weight assignment procedure, the candidate with the highest weight is ...
Though a lot of research has already been done in the field of Face Recognition, one amongst the remaining challenges is recognizing multiple faces in weird conditions in a large group size. A robust face recognition system has been... more
Though a lot of research has already been done in the field of Face Recognition, one amongst the remaining challenges is recognizing multiple faces in weird conditions in a large group size. A robust face recognition system has been developed which detects faces in multiple, occluded, posed images obtained under low illumination conditions. The detector is a trained 34 layered Residual Network which obtains an accuracy of 98.4% on Visual Geometry Group Dataset [1]. A hybrid model has been proposed by combining the Residual Network detector with the novel approach of face embedding using triplet loss function [2] for recognition. The numerical and graphical results attached in the report depict the effectiveness of the proposed model for a variety of conditions. A 22 layered Inception Network has been trained for feature extraction and it achieves an accuracy of 99.5% on Labeled Faces in the Wild Dataset [3]. To achieve a similar accuracy on real life scenarios different methods like dimensionality reduction and data augmentation have been implemented. A mobile application has also been developed which utilizes the above described hybrid model for identification of people present in a large group. This application outweighs the fingerprint biometric in terms of speed, cost and group size.
Robots have become an irreplaceable part of various industries which has led to an increasing demand for well-trained robot operators or technicians to operate and maintain these robots. The concepts of robotics are difficult to... more
Robots have become an irreplaceable part of various industries which has led to an increasing demand for well-trained robot operators or technicians to operate and maintain these robots. The concepts of robotics are difficult to understand from pure mathematical standpoint which has led to the development of various robot visualization software for better understanding of the robot motion. RoboAnalyzer is one such software. In this paper, the features of RoboAnalyzer and how they can be used to teach robotics concepts to robot technicians are discussed.
This demonstration will showcase our efforts to develop a radio access network (RAN) slicing mechanism that is controllable via management software in an Open RAN framework. To our knowledge, our work represents the first effort that... more
This demonstration will showcase our efforts to develop a radio access network (RAN) slicing mechanism that is controllable via management software in an Open RAN framework. To our knowledge, our work represents the first effort that combines an open source Open RAN framework with an open source mobility stack, provides a top-to-bottom RAN application via the RAN intelligent control (RIC) provided by that framework and illustrates its functionality in a realistic wireless environment. Our software is publicly available and we provide a profile in the POWDER platform to enable others to replicate and build on our work.
In the past 20 years, several methods have been proposed for re-coding 3D models with a low-spatial-frequency 3D representation plus a high-frequency 2D map for recovering the details. This approach has been explored with different kinds... more
In the past 20 years, several methods have been proposed for re-coding 3D models with a low-spatial-frequency 3D representation plus a high-frequency 2D map for recovering the details. This approach has been explored with different kinds of mapping (bump, normal, relief, parallax, displacement), which have been shown to be effective in dramatically reducing model size while still maintaining a good visual appearance. For this reason, these approaches are widely applied in those situations where the rendering time constraints are critical (e.g., real-time rendering of complex models for gaming). However, the significant difference between the original detailed 3D model and the re-coded version has made it impossible to consider the latter as a metrically satisfying substitute for the former. The purpose of this article is to propose a re-coding method based on displaced subdivision surfaces that makes it possible to adapt the re-coded 3D representation to the metrological limitations...
In early 2017, a combined group of faculty members and students from King Mongkut's Institute of Technology Ladkrabang (KMITL), Thailand, and Ball State University (BSU), U.S.A., organized a three-week fieldwork in many communities... more
In early 2017, a combined group of faculty members and students from King Mongkut's Institute of Technology Ladkrabang (KMITL), Thailand, and Ball State University (BSU), U.S.A., organized a three-week fieldwork in many communities around Si Satchanalai Historical Park. Relying on their ethnographic experiences to actively explore the livelihood in conjunction with cultural heritages and social practices of the local people, such undertakings provided a contextual basis for this research. Conceptually informed by the edifying model of Cooperative and Collaborative (C&C) pedagogy used during the 2017 KMITL-BSU collaborative efforts, the inquiries examined the workshops and field trips in Si Satchanalai district for their roles in: 1) advancing tacit knowledge of the participants on the assigned subject matters; and 2) expanding a horizon of understanding between the Thai and foreign partakers. Altogether, the upcoming discussions demonstrated the methodological applicability of t...