Object Identification Based on the Automated Extraction of Spatial Semantics from Web3D Scenes
Journal Title: Annals of Emerging Technologies in Computing - Year 2018, Vol 2, Issue 4
Abstract
We present a web-based methodology for the extraction of semantic information and object identification in poorly annotated Web3D scenes. Our approach is based on a set of rules that mimic human spatial cognition, backed by an indexing mechanism for the automated spatial correlation between objects in terms of linguistic predicates. The proposed methodology is comprised of real-time techniques with broad application areas, ranging from CAD and 3D room planning tools based on architectural designs, to medical and e-learning environments where their objects’ relative position is closely associated with identification attributes.
Authors and Affiliations
Konstantinos Kontakis, Athanasios G. Malamos, Steiakaki Malvina, Spyros Panagiotakis
Numerical Discrimination of the Generalisation Model from Learnt Weights in Neural Networks
This research demonstrates a method of discriminating the numerical relationships of neural network layer inputs to the layer outputs established from the learnt weights and biases of a neural network's generalisation mo...
Ideal Node Enquiry Search Algorithm (INESH) in MANETS
The different routing protocols in Mobile Ad hoc Networks take after various methodologies to send the data starting from one node then onto the next. The nodes in the system are non-static and they move arbitrarily and...
Applications of Blockchain Technology beyond Cryptocurrency
Blockchain (BC), the technology behind the Bitcoin crypto-currency system, is considered to be both alluring and critical for ensuring enhanced security and (in some implementations, non-traceable) privacy for diverse ap...
Sensor Networks Attacks Classifications and Mitigation
Wireless Sensor Networks (WSNs) are exposed to many security attacks, and it can be easily compromised. One of the main reasons for these vulnerabilities is the deployment nature, where sensor nodes are deployed without...
A Novel Approach for Network Attack Classification Based on Sequential Questions
With the development of incipient technologies, user devices becoming more exposed and ill-used by foes. In upcoming decades, traditional security measures will not be sufficient enough to handle this huge threat towards...