screen capture

Top PDF screen capture:

Research on a Watermarking Algorithm for Remote Sensing Images Resist Screen Capture Attacks in Urban Planning Information Management

Research on a Watermarking Algorithm for Remote Sensing Images Resist Screen Capture Attacks in Urban Planning Information Management

Remote sensing technology provides effective basic information for urban planning, and digital watermark technology provides security for urban plan- ning. In order to resist the screen capture attacks, the watermark information is encoded and converted, and combined with a circular angle template wa- termark, a digital watermarking algorithm based on QR Code and circular an- gle template is proposed. The algorithm replaces the binary sequence wa- termark information with the circular angle periodic pattern watermark, and the watermark information is embedded with the JND value of the remote sensing image. Before the watermark information detection, Harris corner detection and perspective transformation are used to preprocess the detected data. In the process of watermark information detection, the angle in-formation is detected by steps such as winner filtering, calculating auto- correlation function, sharpening peak point, expansion and erosion, and Hough transform, and then the watermark information is obtained. The ex- perimental results show that the proposed algorithm can effectively resist the attacks caused by screen capture and provide technical support for data se- curity. At the same time, the algorithm has strong imperceptibility and prac- ticability.

11 Read more

Automatic Reconstruction of Screen Capture Videos by Removing Unwanted Objects

Automatic Reconstruction of Screen Capture Videos by Removing Unwanted Objects

Video inpainting has been a major research area. However, the specific problem of removing popups from screen capture videos is tackled by Camtasia freeze [4] . It simply freezes the first frame for the duration of the popup, set by the user. Content aware fill in Adobe photoshop [3] was tried on various inputs. However, significant artefacts were observed indicating that directly image inpainting techniques proves unsuccessful.

6 Read more

The affordances of screen capture technology for retrospective analysis of the writing process

The affordances of screen capture technology for retrospective analysis of the writing process

There is little doubt that screen captures technology is potentially beneficial to both ESL writing research and pedagogy. We should note, however, that we regard this technology as being complementary to other traditional data sources and methodologies and together they can make significant contributions to the body of knowledge concerning ESL writing. Unraveling the intricacies involved in the writing process is complicated, and as indicated by (Torrance, van Waes, & Galbraith, 2007), some scholars oversimplify the matter by assuming that writing is a homogenous whole. Screen capture technology can be used to detail the learning process and verify the importance of tools (e.g. spell checkers, dictionaries, thesauri, etc.) that could enhance writing. Furthermore, replay of the writing process provides the opportunity for writer to step back and review the process of their writing rather than solely focusing the product. This type of self-assessment was not possible before screen recording technology. Evaluating the writing process will likely put learner on the right path to make informed decisions to enhance their writing ability.

16 Read more

Winking at Facebook: capturing digitally-mediated classroom learning

Winking at Facebook: capturing digitally-mediated classroom learning

detail of an individual’s learning trajectory, as well as differences between learners. These qualities made such data suitable for this study, where a high level of detail regarding individuals’ learning was required. Screen capture has further distinct advantages: requiring no camera means it is less intrusive than video; it can be used in naturalistic settings and for authentic learning tasks; and it may be combined with data from other sources, including think-aloud protocols, to help build a strongly emic account of cognitive and affective dimensions of learning (Asselin & Moayeri, 2010). Given that the students were working in the relatively ‘naturalistic’ setting of their regular classroom, on a largely self-determined and hence ‘authentic’ learning task, and that the study needed to combine multiple data sources, screen capture seemed like a promising data source.

36 Read more

Android Internals and Telephony

Android Internals and Telephony

This is a tool which comes along with the Android Software Development Kit (SDK) Dalvik Debug Monitor Server (DDMS) is also integrated in eclipse. It provides screen capture service, thread information of device, logcat process, radio information, call and short message service spoofing and so many other functions. DDMS works with both emulator and a connected device. If both are connected and running simultaneously, DDMS defaults to emulator. In Android, each application runs its own process on its own virtual machine (VM).

9 Read more

Pembinaan Modul Pembelajaran Kendiri (MPK) bagi tajuk Penghasilan Montaj menggunakan aplikasi perisian Adobe Premiere Pro CS3

Pembinaan Modul Pembelajaran Kendiri (MPK) bagi tajuk Penghasilan Montaj menggunakan aplikasi perisian Adobe Premiere Pro CS3

visual yang menggunakan screen capture disertai dengan penerangan teks ringkas serta anak panah dalam modul ini yang berfungsi untuk membentuk model mental pelajar dan mengurangkan beban ingatan pelajar. Terdapat tiga sub topik iaitu Menggunakan Adobe Title Designer, Memasukkan Kesan Khas, dan juga Mengubahsuai Teks Menggunakan Title Properties. Selain itu juga, nota ringkas disertakan bagi memberi infomarsi tambahan kepada pelajar. Ianya ditunjukkan seperti rajah 2 di bawah :

9 Read more

Combined endothelial and epithelial barrier disruption of the colon may be a contributing factor to the Ebola sepsis-like syndrome

Combined endothelial and epithelial barrier disruption of the colon may be a contributing factor to the Ebola sepsis-like syndrome

Figure 1 Screen capture of motion image of Zaire Ebola virus infection. This is a screen capture of a time-lapsed video which was reanimated from data published in reference 1. The left lower panel shows a time map of perturbations of laboratory and vitals datasets divided into systems (the inflammatory system is on the top). The left upper panel is a weather map visualization of the time matrix distortion showing the image at the point of the blue line on the time map. The right panel shows the time series of Ebola viral load and antibody response. An apparent Ebola sepsis like syndrome (ESLS) emerges on day 14 with a precipitous onset (see rapid distortion of the inflammation system on the time map on day 14). While the pattern looks similar to ESLS, as noted by the authors it is likely that this distortion was primarily caused by enteric bacterial sepsis.

6 Read more

A real time spatio temporal data exploration tool for marine research

A real time spatio temporal data exploration tool for marine research

Figure 4.19: Scenario two: Determining depth using MARVIN…………………... Figure 4.20: Scenario three: Determining time using MARVIN…………………... Figure 4.21: Scenario three: Determining time using MARVIN (small scale)….…. Figure 4.22: Scenario four: Determining spatial correlation using MARVIN….…. Figure 5.1: Screen capture of MARVIN showing complete Google Earth GUI…... Figure 5.2: uDig screen capture showing access to MARVIN database………...…

8 Read more

4) Start the Function Generator. Set channel 1 to a 50 Hz square wave, with a 0 DC offset and peak to peak

4) Start the Function Generator. Set channel 1 to a 50 Hz square wave, with a 0 DC offset and peak to peak

3) Go through the above steps to use the cursors to estimate the time constant, then include a screen capture in your memo, export the data and use Matlab to plot the result again. This should produce two more time constant estimates, though this is a new time constant. Be sure to show your work estimating these time constants in your memo.

8 Read more

An Evaluation of the Effectiveness in Use and Efficiency in use of a Mobile News Aggregator Magazine Application

An Evaluation of the Effectiveness in Use and Efficiency in use of a Mobile News Aggregator Magazine Application

According to Balagtas-Fernandez et al, one of the crucial steps in developing software so as to enhancethe quality of a system is usability analysis (see Hussan et al., 2016a; 2016b; 2017a; 2017b; 2018). It is usually a challenge particularly when it is the case of reviewing or evaluating an application that works on mobile devices due to the limitations posed by the device and the inability to get supporting tools and software required to gather the needed usability information. A usability study on smartphones applications can be a daunting work to do. A typical user study scenario gather data through the process of joining an external camera to capture a view of the mobile screen (Duh et al., 2006; Ahmad et al., 2014) or through logging (Kallio&Kaikkonen, 2005).The use of an external camera to observe the screen of a mobile phone is quite hard due to the fact that the phone's screen is small and most of the time the screen is hindered from view by the user (Paterno et al., 2007). Another method to use instead of this is to make use of screen recording application or tool similar to the ones accessible for PC. One correct source of utilizing information is through logging of events. The issue facing using event logging comes from the ways the system is prepared for gathering of data and how the large amount of logged data is extracted and interpreted. The analysis stage includes getting the data that has been processed from the extraction stage and making a break down on which parts of the system the users were having problem interacting with and what can be done to enhance this. Various tools (Kallio&Kaikkonen, 2005; Balagtas-Fernandez et al., 2009; Ivory & Hearst, 2001) are made accessible to help in the simplifying of analysis of the system, but only a few tools for usability analysis of mobile device applications can be found.

5 Read more

The use of new technology in module delivery to large cohorts

The use of new technology in module delivery to large cohorts

Ideally, when all responses are in, I would like to have gone over the question, showing the method by which the right answer is obtained. This is a case of requiring a split screen facility, so that the questions and students’ responses could be projected alongside the correct solution and the method required to obtain the correct solution. Unfortunately the lecture room technology did not permit split screen projection. I experimented with writing on the podium screen with the PC touch pen with limited success. The pen required

9 Read more

Serologic Testing for Zika Virus: Comparison of Three Zika Virus IgM Screening Enzyme Linked Immunosorbent Assays and Initial Laboratory Experiences

Serologic Testing for Zika Virus: Comparison of Three Zika Virus IgM Screening Enzyme Linked Immunosorbent Assays and Initial Laboratory Experiences

ABSTRACT Serologic evaluation for Zika virus (ZIKV) infection currently includes an initial screen using an anti-ZIKV IgM antibody capture enzyme-linked immunosor- bent assay (MAC-ELISA) followed by supplemental testing of specimens with non- negative results by a plaque reduction neutralization test (PRNT). We compared the performance characteristics of three ELISAs for the detection of IgM class antibodies to ZIKV, including the Centers for Disease Control and Prevention (CDC) Zika MAC- ELISA, the InBios ZIKV Detect MAC-ELISA, and the Euroimmun anti-Zika Virus IgM ELISA. Additionally, we present our initial experiences with ZIKV serologic testing from a national reference laboratory perspective. Using both retrospectively and pro- spectively collected specimens from patients with possible ZIKV infection, we show that the CDC and InBios MAC-ELISAs perform comparably to each other, with posi- tive agreement, negative agreement, and interrater kappa values ranging from 87.5% to 93.1%, 95.7% to 98.5%, and 0.52 to 0.83, respectively. In contrast, compari- son of the Euroimmun ZIKV ELISA to either the CDC or InBios MAC-ELISAs resulted in positive agreement, negative agreement, and interrater kappa values ranging from 17.9% to 42.9%, 91.7% to 98.6%, and 0.10 to 0.39, respectively. Among the 19 prospective samples submitted for PRNT, nine were negative, eight specimens had neutralizing antibodies to a flavivirus (unable to be identified), and one sample each was confirmed for ZIKV or dengue virus infection. This study highlights the ongoing challenges associated with serologic diagnosis of ZIKV infection. Although the avail- ability of a commercial serologic test for ZIKV has greatly expanded the national ca- pacity for such testing, the need to further characterize and improve these assays, particularly with regard to specificity, remains.

10 Read more

Tailored enrichment strategy detects low abundant small noncoding RNAs in HIV 1 infected cells

Tailored enrichment strategy detects low abundant small noncoding RNAs in HIV 1 infected cells

capture step into an improved cloning protocol for iden- tifying sncRNAs. The hybridization capture was per- formed with HIV-1 ssDNA hybridization probes, covering the whole HIV-1 genome, that were attached to streptavidin beads. Applying two rounds of hybridiza- tion capture enabled us to enrich the frequencies of selected low abundant HIV-1 sncRNAs more than 100- fold over what has been reported [8,11,13]. Importantly, more than 70% of all obtained sncRNAs were of viral origin. This is a particular advantage of our strategy. While high-throughput sequencing techniques certainly have the capacity to overcome the limitations in identi- fying low abundant sncRNAs, it must still be considered that more than 99% of sequenced sncRNAs retrieved by random sequencing will not be of interest and very low abundant sncRNAs might still be missed. Our approach allows for sequence specific selection with high sensitiv- ity. This is particularly highlighted by the fact that we succeeded in detecting antisense HIV-1 sncRNAs despite the fact that HIV-1 antisense transcripts are described to be generated only at extremely low rates [27-30].

13 Read more

Cytomegalovirus in pregnancy: to screen or not to screen

Cytomegalovirus in pregnancy: to screen or not to screen

Congenital CMV is the commonest infective cause of neurological handicap and is a significant contributor to long term disability. Congenital CMV is common and important enough to justify its place among other rou- tine antenatal screening tests. The case for CMV screen- ing in pregnancy is supported by the proven reduction in maternal primary infection following institution of simple hygiene measures (primary prevention). On the other hand, further data is awaited from randomized tri- als currently underway to better estimate the reduction in fetal infection achieved with CMV HIG among re- cently seroconverted women (secondary prevention). In utero treatment with CMV HIG appears to reduce clin- ical sequelae among fetuses confirmed to be infected (tertiary prevention), and CMV HIG is currently being offered to women with a known infected fetus identified through current screening strategies. An ongoing trial will soon clarify the role of antivirals such as valacyclovir to reduce sequelae in symptomatic fetuses.

8 Read more

Trust Management for Mobile Media Distribution

Trust Management for Mobile Media Distribution

The architecture of our peer-to-peer multimedia delivery framework encompasses components that aim to deliver multi-media content from a source to a large number of clients. We assume that the content comes into existence at a source. A simple example of creating such multime- dia might be a video clip taken with a camera and a mi- crophone, or more likely video captured via a smartphone camera, and then uploaded to the source. We assume that clients consume the content, e.g., by displaying it on a computing device monitor, which again might be a smartphone screen watching an Internet video. We further assume that there is just one original source, but that there are many clients that want to receive the data. The clients value their viewing experience, and our goal is to reward the source for making the video available.

9 Read more

Combining light, focus and movement to create a framework enhanced by a video based concept of time

Combining light, focus and movement to create a framework enhanced by a video based concept of time

audience. A part of public dialogue about my projections has centered on accounts of unexpected feelings of calmness and expectation, built through watching and waiting – behavior exhibited by many who saw my time-lapse work recently exhibited. (Sawtooth, ARI, 2011) However, in casual dialogue with audience members, I found there to be a hint of suspicion about the states of calmness felt - there was an awareness of the frenetic, time-lapse engine driving the experience. What has happened is that the work begins to interact socially, building experiences within active audiences. This screen activity in the gallery has a universal appeal that links to human experience, and these things come to the fore in gallery discussions. Barbara Bolt explains this process: ʻ“Real material effects” appear to be the outcome of radical performativity, in which “the outside world” enters the work and the work casts its effects back into the worldʼ (Bolt 2004: P10). In this sense, what is already familiar becomes familiar again as the perceptual aspect of video time-lapse becomes the active purveyor and interpreter of time, instigating the production of material effects to once again perform.

44 Read more

Analysing technological affordances of online interactions using conversation analysis

Analysing technological affordances of online interactions using conversation analysis

18 sending a message, which will function as both the first turn of the interaction, but will also lead to the recipient receiving a notification. In Figure 3, the fact that Josh has summoned Isla is indicated by the appearance on her screen of the highlighted box with his name in it. The small bubble which appears above the box informs Isla how many messages have been sent as part of this summons (in this case Josh has sent two messages in quick succession). The summons, therefore, not only checks the availability of a recipient, but also always does another action. It is important to note, though, that this first action is issued before the sender has checked whether the recipient is definitely available. To understand the actions which this affordance makes possible, we can examine the design of the opening summonses.

32 Read more

Rawshaping Technology : exploring the Hybrid Machine

Rawshaping Technology : exploring the Hybrid Machine

More tool needed to be able to make more standard figures like triangle cubes circles etc. Also some tool to make more complicated figures. On the LFDS getting the right perspective was easier because you could watch your hands in front of the screen. With the NXT you had to move your hands more blinded and this made creating a perspective a bit more challenging.

17 Read more

Capture and playback of computer screen contents and accompanying audio

Capture and playback of computer screen contents and accompanying audio

compression is a known and accepted method whereby portions of an image are found to be self- similar. A portion of a given image can be restored simply by providing an offset and scaling factor. [0078] Hence, embodiments of the present invention address or at least ameliorate one or more of the aforementioned problems of the prior art. Benefits of the present invention include the fact that any type of screen content may be captured. The present invention is not limited to specific programs or applications nor is it limited to any particular screen resolution and the audio is kept in synchronism with the screen image changes. Even at the end of an hour-long recording, according to some embodiments, the screen changes will be no more than 0.5 seconds delayed behind the audio. Data compression is used to significantly reduce the output file size, which is achieved without any user intervention. Nonetheless, good image and audio quality are maintained without s overburdening the processor such that the performance of other running applications is not impaired. Embodiments of the present invention perform a video buffer comparison and if a change in the images is detected an in-memory flag is set to indicate that an update is warranted. The flag can be set multiple times and can be checked at a lower rate than the rate at which the audio information is processed.

11 Read more

E LEARNING CONTENT DEVELOPMENT A ROLE IN VIRTUAL CLASS ROOM

E LEARNING CONTENT DEVELOPMENT A ROLE IN VIRTUAL CLASS ROOM

By adding audio to the e-learning resources can add an extra dimension of information and engagement for the students. It is much easier to listen to a piece of information, particularly if it is complex, than to read it on the screen. It also adds a personal and human element to the learning resource. It is mandatory to consider the size of the recording file when making an audio record. Long high quality audio files can be quite large. Making a number of recordings of several minutes is a better strategy than creating one long recording. The file type can also affect the file size. MP3 files are quite small and are played by most browser plug-ins. To reduce files size, choose a recording quality of 11,000 Hz. This is equivalent to a good phone conversation. CD quality is 44,000 Hz and will create very large file sizes. Make sure the recordings are made as mono rather than stereo recordings. This will also reduce the file size and will not be able to hear the recording in stereo when played from a web page. Make sure have a good quality microphone. It does not have to be a broadcast quality microphone but using the inbuilt microphone in a laptop computer will probably give a good quality recording. . Once the audio have been recorded they can be added to the web learning resources using the provisions available in LMS.

8 Read more

Show all 6646 documents...

Related subjects