Spelling suggestions: "subject:"sio2"" "subject:"sift""
211 |
Development and Evaluation of MOOSES games in Flash/MacromediaEkse, Magnus Førland January 2010 (has links)
Video games are very popular today and the electronic entertainment industry is in many areas equal to the more mature entertainment industries like film and music in terms of usage and revenues. The MOOSES (Multiplayer On One Screen Entertainment System) allows players to play on one big screen together with the use of their mobile phone as a game controller. The framework was designed for easy development of multiplayer games in Java and C++.Flash is a very popular technology on the Internet, with a great many people using and developing all kinds of games, video players and other software applications. Flash applications are easy to develop due to a modern programming language and a vast amount resources available online.In this thesis the possibility of creating Flash games for MOOSES will be explored. A set of components will be developed which will allow Flash games to use the MOOSES framework. These components will be designed to aid the game creation as much as possible and still be generic enough to allow as many game types as possible. Three different games will be developed using the components and each game will focus on a different multiplayer mode. In the end, the components, the three games, and the Flash platform will be evaluated.
|
212 |
Fuzzy Oscillations : a Novel Model for Solving Pattern SegmentationSolbakken, Lester Johan January 2009 (has links)
In this thesis we develop a novel network model that extends the traditional artificial neural network (ANN) model to include oscillatory behaviour. This model is able to correctly classify combinations of previously learned input patterns by grouping features that belong to the same category. This grouping process is termed segmentation and we show how synchrony of oscillations is the necessary missing component of ANNs to be able to perform this segmentation. Using this model we go on to show that top-down modulatory feedback is necessary to enable separation of multiple objects in a scene and segmentation of their individual features. This type of feedback is distinctly different than recurrency and is what enables the rich dynamics between the nodes of our network. Additionally, we show how our model's dynamics avoid the combinatorial explosion in required training repetitions of traditional feed-forward classification networks. In these networks, relations between objects must explicitly be learned. In contrast, the dynamics of modulatory feedback allow us to defer calculation of these relations until run-time, thus creating a more robust system. We call our model Fuzzy Oscillations, and it achieves good results when compared to existing models. However, oscillatory neural network models successful in achieving segmentation are a relatively recent development. We thus feel that our model is a contribution to the field of oscillatory neural networks.
|
213 |
FPGA realization of a public key block cipherFjellskaalnes, Stig January 2009 (has links)
This report will cover the physical realization of a public key algorithm based on multivariate quadratic quasigroups. The intension is that this implementation will use real keys and data. Efforts are also taken in order to reduce area cost as much as possible. The solution will be described and analyzed. This will show wether the measures were successfull or not.
|
214 |
Framework for real-time forest fire animation : Simulating fire spread using the GPUKjærnet, Øystein January 2010 (has links)
In 2009 Odd Erik Gundersen and Jo Skjermo described a conceptual framework for animating physically based forest fires. This project expands on their ideas with a focus on how modern graphics hardware can be utilized to achieve real-time performance. A prototype demonstrating some of the concepts suggested for the framework have been implemented and tested, successfully achieving real-time frame rates on a simple animation of a burning tree.
|
215 |
Parametric Generation of Polygonal Tree Models for Rendering on Tessellation-Enabled HardwareNystad, Jørgen January 2010 (has links)
The main contribution of this thesis is a parametric method for generation of single-mesh polygonal tree models that follow natural rules as indicated by da Vinci in his notebooks. Following these rules allow for a relatively simple scheme of connecting branches to parent branches. Proper branch connection is a requirement for gaining the benefits of subdivision. Techniques for proper texture coordinate generation and subdivision are also explored.The result is a tree model generation scheme resulting in single polygonal meshes susceptible to various subdivision methods, with a Catmull-Clark approximation method as the evaluated example.As realistic visualization of tree models is the overall objective, foliage appearance and the impression of a dense branching structure is considered. A shader-based method for accurately faking high branch density at a distance is explored.
|
216 |
Simulation of Small-Scale Autonomous Helicopters : Testing autopilot performance by realistic models and constraints in a virtual worldLarsen, Andreas January 2010 (has links)
Helicopter flight simulator software designed to develop stable methods of autopilot control logic and benchmark the performance with different sensor configurations and navigation scenarios.
|
217 |
Interoperability for electronic IDZygadlo, Zuzanna January 2009 (has links)
<p>Electronic Business, including eBanking, eCommerce and eGovernmental services, is today based on a large variety of security solutions, comprising electronic IDs provided by a broad community of Public Key Infrastructure (PKI) vendors. Significant differences in implementations of those solutions introduce a problem of lack of interoperability in electronic business, which have not yet been resolved by standardization and interoperability initiatives based on existing PKI trust models. It is not only the technical interoperability of electronic IDs which today makes many electronic transactions impossible. The main obstacle to global interoperability of electronic IDs is the lack of trust in digital certificates issued by various Certification Authorities (CAs). Relying Parties (RPs) need to trust digital certificates in order to be able to validate them. We observe that the multi-vendor PKI community lacks an independent source of electronic IDs quality information, which could make digital certificate validation possible on a global scale. Therefore, this thesis presents the concept of a new PKI trust model which introduces a Validation Authority (VA) as a single trust point in the global PKI trust network. The main goal of this thesis is to develop a model of Global Validation Service (GVS), which uses Global Validation Authority (GVA), based on the VA concept, to provide digital certiÞcate validation and signature veriÞcation to Relying Parties. The presented research focuses on investigating technical, legal and business issues which would enable RPs to delegate the certificate validation to an independent Validation Authority.</p>
|
218 |
Forensic analysis of an unknown embedded deviceEide, Jarle, Olsen, Jan Ove Skogheim January 2006 (has links)
<p>Every year thousands of new digital consumer device models come on the market. These devices include video cameras, photo cameras, computers, mobile phones and a multitude of different combinations. Most of these devices have the ability to store information in one form or another. This is a problem for law enforcement agencies as they need access to all these new kinds of devices and the information on them in investigations. Forensic analysis of electronic and digital equipment has become much more complex lately because of the sheer number of new devices and their increasing internal technological sophistication. This thesis tries to help the situation by reverse engineering a Qtek S110 device. More specifically we analyze how the storage system of this device, called the object store, is implemented on the devices operating system, Windows Mobile. We hope to figure out how the device stores user data and what happens to this data when it is "deleted". We further try to define a generalized methodology for such forensic analysis of unknown digital devices. The methodology takes into account that such analysis will have to be performed by teams of reverse-engineers more than single individuals. Based on prior external research we constructed and tested the methodology successfully. We were able to figure our more or less entirely the object stores internal workings and constructed a software tool called BlobExtractor that can extract data, including "deleted", from the device without using the operating system API. The main reverse engineering strategies utilized was black box testing and disassembly. We believe our results can be the basis for future advanced recovery tools for Windows Mobile devices and that our generalized reverse engineering methodology can be utilized on many kinds of unknown digital devices.</p>
|
219 |
Bluetooth broadcastingHo, Johan January 2006 (has links)
<p>Background: The wireless technology Bluetooth has rapidly become more commonly supported by electronic devices like mobile phones and PDAs. Several companies are currently developing Bluetooth broadcasting systems to use for marketing. This report is a result of researching the use of Bluetooth broadcasting for delivering information for more general purposes, how well Bluetooth actually works for broadcasting, and also on the topic of user privacy. Results: Broadcasting with Bluetooth did work with a few devices at the same time, since Bluetooth allows up to seven connections to one Bluetooth radio at the same time. By making a passive system where the user is the one which requests information, it also will not affect users' privacy. However, my research also found a few issues with the Bluetooth which might affect a broadcast, the most noticeable of them being the somewhat low transfer rate, an issue with device discovery not always working when a lot of users are doing device discovery at the same time. The fact that it only supports seven connections is also a limitation. Basically, while it is possible to use Bluetooth for broadcasting, it might be problematic to use it for targeting a large audience. Conclusions: Even with the problems mentioned, Bluetooth broadcasting provides quite a unique way of broadcasting, and with the newer versions of Bluetooth the issues mentioned might be less of a problem. Bluetooth broadcasting definitely has some potential.</p>
|
220 |
Efficient Algorithms for Video SegmentationKosmo, Vegard Andre January 2006 (has links)
<p>Describing video content without watching the entire video is a challenging matter. Textual descriptions are usually inaccurate and ambiguous, and if the amount of video is large this manual task is almost endless. If the textual description is replaced with pictures from the video, this is a much more adequate method. The main challenge will then involve which pictures to pick to make sure the entire video content is covered by the description. TV stations with an appurtenant video archive would prefer to have an effective and automated method to perform this task, with focus on holding the time consumption to an absolute minimum and simultaneously get the output results as precise as possible compared with the actual video content. In this thesis, three different methods for automatic shot detection in video files have been designed and tested. The goal was to build a picture storyline from input video files, where this storyline contained one picture from each shot in the video. This task should be done in a minimum of time. Since video files actually are one long series of consecutive pictures, various image properties have been used to detect the video shots. The final evaluation has been done based both on output quality and overall time consumption. The test results show that the best method detected video shots with an average accuracy of approximately 90%, and with an overall time consumption of 8.8% of the actual video length. Combined with some additional functionality, these results may be further improved. With the solutions designed and implemented in this thesis, it is possible to detect shots in any video file, and create a picture storyline to describe the video content. Possible areas of application are TV stations and private individuals that have a need to describe a collection of video files in an effective and automated way.</p>
|
Page generated in 0.0249 seconds