From Buñuel and Dali's Un Chien Andalou to recent works by Danish filmmaker Nicolas Winding Refn, the cinematic destruction of the eye has become iconic due to its striking effect upon film spectators' visceral experiences... more
From Buñuel and Dali's Un Chien Andalou to recent works by Danish filmmaker Nicolas Winding Refn, the cinematic destruction of the eye has become iconic due to its striking effect upon film spectators' visceral experiences as well as its ability to influence their symbolic or fetishistic desires. By exploiting the natural discomfort and disgust produced by these types of images and then situating them within an aesthetic and psychoanalytic framework, Refn and other filmmakers provide a visual showcase for a unique type of cinematic violence, one which demands that viewers reappraise the value of their own eyes as well as the values which reflect social attitudes towards law enforcement, crime, and justice.
Data mining is a technique which is used for extraction of knowledge and information from large amount of data collected by hospitals, government and individuals. The term data mining is also referred as knowledge mining from databases.... more
Data mining is a technique which is used for extraction of knowledge and information from large amount of data collected by hospitals, government and individuals. The term data mining is also referred as knowledge mining from databases. The major challenge in data mining is ensuring security and privacy of data in databases, because data sharing is common at organizational level. The data in databases comes from a number of sources like – medical, financial, library, marketing, shopping record etc so it is foremost task for anyone to keep secure that data. The objective is to achieve fully privacy preserved data without affecting the data utility in databases. i.e. how data is used or transferred between organizations so that data integrity remains in database but sensitive and confidential data is preserved. This paper presents a brief study about different PPDM techniques like- Randomization, perturbation, Slicing, summarization etc. by use of which the data privacy can be preserved. The technique for which the best computational and theoretical outcome is achieved is chosen for privacy preserving in high dimensional data.
Subjects change frequently in moderated debates with several participants, such as in parliamentary sessions, electoral debates, and trials. Partitioning a debate into blocks with the same subject is essential for understanding. Often a... more
Subjects change frequently in moderated debates with several participants, such as in parliamentary sessions, electoral debates, and trials. Partitioning a debate into blocks with the same subject is essential for understanding. Often a moderator is responsible for defining when a new block begins so that the task of automatically partitioning a moderated debate can focus solely on the moderator's behavior. In this paper, we (i) propose a new algorithm, DEBACER, which partitions moderated debates; (ii) carry out a comparative study between conventional and BERTimbau pipelines; and (iii) validate DEBACER applying it to the minutes of the Assembly of the Republic of Portugal. Our results show the effectiveness of DEBACER.
We introduce a novel approach to reconstructing 3D objects from cross sections of point clouds acquired by laser scanning. Cross sections are almost planar clusters of 3D points. We first thin each cluster to obtain an ordered one... more
We introduce a novel approach to reconstructing 3D objects from cross sections of point clouds acquired by laser scanning. Cross sections are almost planar clusters of 3D points. We first thin each cluster to obtain an ordered one dimensional set of points. We then partition the point set to subsets that can be approximated adequately by piecewise quadratic or cubic rational Bezier curves using an optimal fitting method. For each curve we select a number of representative points that lie on the fitting curves which are then used for reconstructing the object surface. Inter-cross section and intra-cross section constraints are imposed to support parameterization and editing of the derived model. Shape and topological differences between adjacent object contours cause severe difficulties in the 3D reconstruction process. By using the contour skeleton information we create intermediate slices representing places where ramifications occur to achieve robust covering (meshing) of adjacent...