Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 4
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

The role of illustration in our studies of natural history has changed over the centuries, not just in how it depicts specimens or technologies but also as our interest in its different aspects has shifted.
Go to article

Authors and Affiliations

Max Rykaczewski
1

  1. Plant and Fungi Herbarium, University of Gdańsk
Download PDF Download RIS Download Bibtex

Abstract

Face Sketch Recognition (FSR) presents a severe challenge to conventional recognition paradigms developed basically to match face photos. This challenge is mainly due to the large texture discrepancy between face sketches, characterized by shape exaggeration, and face photos. In this paper, we propose a training-free synthesized face sketch recognition method based on the rank-level fusion of multiple Image Quality Assessment (IQA) metrics. The advantages of IQA metrics as a recognition engine are combined with the rank-level fusion to boost the final recognition accuracy. By integrating multiple IQA metrics into the face sketch recognition framework, the proposed method simultaneously performs face-sketch matching application and evaluates the performance of face sketch synthesis methods. To test the performance of the recognition framework, five synthesized face sketch methods are used to generate sketches from face photos. We use the Borda count approach to fuse four IQA metrics, namely, structured similarity index metric, feature similarity index metric, visual information fidelity and gradient magnitude similarity deviation at the rank-level. Experimental results and comparison with the state-of-the-art methods illustrate the competitiveness of the proposed synthesized face sketch recognition framework.
Go to article

Authors and Affiliations

Sami Mahfoud
1
ORCID: ORCID
Abdelhamid Daamouche
1
ORCID: ORCID
Messaoud Bengherabi
2
ORCID: ORCID
Abdenour Hadid
3
ORCID: ORCID

  1. University M’Hamed Bougara of Boumerdes, Institute of Electrical and Electronic Engineering, Laboratory of Signals and Systems, Boumerdes, 35000, Algeria
  2. Center for Development of Advanced Technologies, P.O. Box 17 Baba-Hassen 16303, Algiers, Algeria
  3. Sorbonne University Abu Dhabi, Sorbonne Center for Artificial Intelligence, Abu Dhabi, UAE
Download PDF Download RIS Download Bibtex

Abstract

The sketch comedy Szopki, a show staged irregularly (1927–1931) by a trio of poets who clustered round the avant-garde magazine Reflektor was a fascinating artistic project combining literary aspiration and popular culture. This article tries to position Szopki in the context of the burgeoning entertainment industry and the specific social, political and economic conditions of Lublin, a provincial centre that joined an ambitious modernization project. However, to continue the Great Lublin Project the town needed to borrow more money it could not possibly pay back. No wonder the official narrative of modernization came under an unending barrage of ridicule and derision while local satire revelled in words like crisis, credit, bankruptcy, seizure and sale.
Go to article

Bibliography

● J. Arnsztajn, K. Bielski, W. Gralewski, Pierwsza Szopka Reflektora, w zbiorach Muzeum Józefa Czechowicza w Lublinie, sygn. MC 143 R.
● J. Arnsztajn, K. Bielski, Druga Szopka Reflektora, w Zbiorach Specjalne Wojewódzkiej Biblioteki Publicznej im. H. Łopacińskiego w Lublinie, sygn. 2156.
● Z. Bauman, Płynna nowoczesność, przeł. T. Kunz, Kraków 2006.
● M. Berman, „Wszystko, co stałe, rozpływa się w powietrzu”. Rzecz o doświadczeniu nowoczesności, przeł. M. Szuter, Kraków 2006.
● K. Bielski, Most nad czasem, Lublin 1963.
● Ł. Biskupski, Miasto atrakcji. Narodziny kultury masowej na przełomie XIX i XX wieku. Kino w systemie rozrywkowym Łodzi, Warszawa 2013.
● T. Bocheński, Szopka lubelska, „Ziemia Lubelska” 15.05.07.
● J. Cymerman, D. Gac, G. Kondrasiuk, Scena Lublin, Lublin 2017.
● J. Cymerman, A. Wójtowicz, Uwagi wydawców, [w:] Józef Czechowicz, Pisma zebrane, t. 9, Varia, oprac. Jarosław Cymerman, Aleksander Wójtowicz, Lublin 2013, s. 653–654.
● J. Czechowicz, Pisma zebrane, t. 1, Wiersze i poematy, opr. J.F. Fert, Lublin 2012.
● A. Czuchryta, Przemysł rolno-spożywczy w województwie lubelskim w latach 1918–1939, Lublin 2008.
● D. Fox, Kabarety i rewie międzywojennej Warszawy. Z prasowego archiwum dwudziesto-lecia, Katowice 2007.
● H. Gawarecki, O dawnym Lublinie, Lublin 1974.
● Historia Lublina w liczbach, A. Jakubowski, U. Bronisz, E. Łoś, Lublin 2017.
● M. Hemar, J. Lechoń, A. Słonimski, J. Tuwim, Szopki Pikadora i Cyrulika Warszawskiego, opr. T. Januszewski, Warszawa 2013.
● E. Jabłońska-Depuła, Wielkomiejski plan rozwoju Lublina z 1924 roku, [w:] Lublin w dziejach i kulturze Polski, pod red. T. Radzika i A. Witusika, Lublin 1997.
● T. Kłak, Czasopisma awangardy, cz. 1, 1919–1931, „Polska Akademia Nauk”, Wrocław 1978.
● E. Krasiński, Warszawskie sceny 1918–1939, Warszawa 1976.
● S. Kruk, Teatr Miejski w Lublinie 1918–1939, Lublin 1997.
● Kuligowska-Korzeniewska, Kabaret w złym mieście podczas Wielkiej Wojny oraz M. Szydłowska, Gwiazdy i meteory lwowskiego „Ula”, [w:] Kabaret – poważna sprawa, pod red. D. Fox i J. Mikołajczyka, Katowice 2015.
● Z. Landau, Pożyczki ulenowskie, „Najnowsze Dzieje Polski: Materiały i Studia z Okresu 1914–1939” 1958, t. 1.
Go to article

Authors and Affiliations

Aleksander Wójtowicz
1
ORCID: ORCID

  1. Instytut Filologii Polskiej, Uniwersytet Marii Curie-Skłodowskiej
Download PDF Download RIS Download Bibtex

Abstract

We analyze the Google-Apple exposure notification mechanism designed by the Apple-Google consortium and deployed on a large number of Corona-warn apps. At the time of designing it, the most important issue was time-to-market and strict compliance with the privacy protection rules of GDPR. This resulted in a plain but elegant scheme with a high level of privacy protection. In this paper we go into details and propose some extensions of the original design addressing practical issues. Firstly, we point to the danger of a malicious cryptographic random number generator (CRNG) and resulting possibility of unrestricted user tracing. We propose an update that enables verification of unlinkability of pseudonymous identifiers directly by the user. Secondly, we show how to solve the problem of verifying the “same household” situation justifying exempts from distancing rules. We present a solution with MIN-sketches based on rolling proximity identifiers from the Apple-Google scheme. Thirdly, we examine the strategies for revealing temporary exposure keys. We have detected some unexpected phenomena regarding the number of keys for unbalanced binary trees of a small size. These observations may be used in case that the size of the lists of diagnosis keys has to be optimized.
Go to article

Bibliography

  1. Ministry of Health and Government Technology Agency (GovTech), Trace Together Programme, [Online]. Available: https://www. tracetogether.gov.sg.
  2. The European Parliament and the Council of the European Union: Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/ec (General Data Protection Regulation). Official Journal of the European Union, L119.1, 4.5.2016.
  3. Corona-Warn-App Consortium, [Online]. Available: https://www.coronawarn.app/en/.
  4. C. Troncoso et. al, “Decentralized Privacy-Preserving Proximity Tracing,” [Online]. Available: https://github.com/DP-3T/documents/ blob/master/DP3T%20White%20Paper.pdf.
  5. Apple & Google, “Exposure Notification Cryptography Specification,” [Online]. Available: https://covid19-static.cdn-apple.com/ applications/covid19/current/static/contact-tracing/pdf/ExposureNotification-CryptographySpecificationv1.2.pdf?1.
  6. D. Shumow and N. Ferguson, “On the Possibility of a Back Door in the NIST SP800-90 Dual Ec Prng,” [Online]. Available: http:// rump2007.cr.yp.to/15-shumow.pdf.
  7. V. Goyal, A. O’Neill, and V. Rao, “Correlated-input secure hash functions,” Theory of Cryptography Conference (TCC), 2011, pp. 182‒200.
  8. A.Z. Broder, “On the resemblance and containment of documents,” Proceedings. Compression and Complexity of SEQUENCES 1997, Italy, 1997, pp. 21‒29.
Go to article

Authors and Affiliations

Adam Bobowski
1
Jacek Cichoń
1
ORCID: ORCID
Mirosław Kutyłowski
1
ORCID: ORCID

  1. Wrocław University of Science and Technology, Wybrzeże Stanisława Wyspiańskiego 27, 50-370 Wrocław, Poland

This page uses 'cookies'. Learn more