Mobile data analytics is still in the early stages of development but brings opportunities for innovative new features in smartphones and transforming businesses. Future mobile devices will be built on analytics platforms to deliver intelligent, personalized, and context-aware features. Virtual assistants, text, image, video, gesture, and multi-model analytics were discussed along with trends and enabling technologies in each area.
COSC 426 Lecture 1: Introduction to Augmented RealityMark Billinghurst
This is the first lecture of the COSC 426 graduate course on Augmented Reality taught at the University of Canterbury. It was taught by Mark Billinghurst on July 17th 2014. It covers a basic introduction to Augmented Reality.
Hiren Bhinde (Qualcomm): On-device Motion Tracking for Immersive VRAugmentedWorldExpo
A talk from the Tools & Products Track at AWE USA 2017 - the largest conference for AR+VR in Santa Clara, California May 31- June 2, 2017.
Hiren Bhinde (Qualcomm): On-device Motion Tracking for Immersive VR
As the industry strives toward immersive augmented and virtual reality experiences, we are guided by the extreme requirements associated with intuitive interactions, visual, and sound quality, in order to achieve the ultimate untethered user experience. Precise, low-latency motion tracking of head movements is crucial for intuitive interactions with the virtual world, and visual-inertial odometry (VIO) is the ideal complementary subsystem to achieve this goal. VIO allows for six-degrees of freedom in VR/AR experiences, reduces latency and cuts the cord. In this session, developers will learn about the evolution of motion tracking and dive into six-degrees of freedom and its impact on VR/AR content development and user experiences.
http://AugmentedWorldExpo.com
Lecture 1 from a course on Mobile Based Augmented Reality Development taught by Mark Billinghurst and Zi Siang See on November 29th and 30th 2015 at Johor Bahru in Malaysia. This lecture is the Introduction to the course. Look for the other 9 lectures in the course.
COSC 426 Lecture 1: Introduction to Augmented RealityMark Billinghurst
This is the first lecture of the COSC 426 graduate course on Augmented Reality taught at the University of Canterbury. It was taught by Mark Billinghurst on July 17th 2014. It covers a basic introduction to Augmented Reality.
Hiren Bhinde (Qualcomm): On-device Motion Tracking for Immersive VRAugmentedWorldExpo
A talk from the Tools & Products Track at AWE USA 2017 - the largest conference for AR+VR in Santa Clara, California May 31- June 2, 2017.
Hiren Bhinde (Qualcomm): On-device Motion Tracking for Immersive VR
As the industry strives toward immersive augmented and virtual reality experiences, we are guided by the extreme requirements associated with intuitive interactions, visual, and sound quality, in order to achieve the ultimate untethered user experience. Precise, low-latency motion tracking of head movements is crucial for intuitive interactions with the virtual world, and visual-inertial odometry (VIO) is the ideal complementary subsystem to achieve this goal. VIO allows for six-degrees of freedom in VR/AR experiences, reduces latency and cuts the cord. In this session, developers will learn about the evolution of motion tracking and dive into six-degrees of freedom and its impact on VR/AR content development and user experiences.
http://AugmentedWorldExpo.com
Lecture 1 from a course on Mobile Based Augmented Reality Development taught by Mark Billinghurst and Zi Siang See on November 29th and 30th 2015 at Johor Bahru in Malaysia. This lecture is the Introduction to the course. Look for the other 9 lectures in the course.
This is the COSC 426 Lecture 4 on Designing AR Interfaces. Taught by Mark Billinghurst from the HIT Lab NZ at the University of Canterbury. This is part of his graduate course on Augmented Reality. Taught on August 2nd 2013
The second lecture in the 426 graduate class on Augmented Reality taught thy Mark Billinghurst at the HIT Lab NZ, University of Canterbury. The class was taught on July 19th 2013
2013 Lecture 6: AR User Interface Design GuidelinesMark Billinghurst
COSC 426 Lecture 6: on AR User Interface Design Guidelines. Lecture taught by Mark Billinghurst from the HIT Lab NZ at the University of Canterbury on August 16th 2013
Talk given by Mark Billinghurst at the DIGI_X conference in Auckland, New Zealand on June 21st 2018. The talk was about how Mixed Reality can be applied in the work place.
COMP 4010 Course on Virtual and Augmented Reality. Lectures for 2017. Lecture 2: VR Technology. Taught by Bruce Thomas on August 3rd 2017 at the University of South Australia. Slides by Mark Billinghurst
The final lecture in the COSC 426 graduate course in Augmented Reality. Taught by Mark Billinghurst from the HIT Lab NZ at the University of Canterbury on Sept. 19th 2012
Presentation given by Mark Billinghurst on research into Empathic Glasses. Combining Augmented Reality, Wearable Computers, Emotion Sensing and Remote Collaboration. Given on February 18th 2016.
Lecture 5 from the COSC 426 Graduate course on Augmented Reality. This lecture talks about AR development tools and interaction styles. Taught by Mark Billinghurst from the HIT Lab NZ at the University of Canterbury. August 9th 2013
Lecture 9 of the COMP 4010 course in AR/VR from the University of South Australia. This was taught by Mark Billinghurst on October 5th, 2021. This lecture describes VR input devices, VR systems and rapid prototyping tools.
The fifth lecture from the Augmented Reality Summer School taught by Mark Billinghurst at the University of South Australia, February 15th - 19th, 2016. This provides an overview of AR research directions.
Lecture on AR Interaction Techniques given by Mark Billinghurst on November 1st 2016 at the University of South Australia as part of the COMP 4010 course on VR.
Lecture 2 from a course on Mobile Based Augmented Reality Development taught by Mark Billinghurst and Zi Siang See on November 29th and 30th 2015 at Johor Bahru in Malaysia. This lecture provides an introduction to Mobile AR Technology. Look for the other 9 lectures in the course.
Intelligent Video Surveillance - Synesis integrated hardware and software sol...Nikolai Ptitsyn
Our end-to-end solution for security surveillance features HD (1080p, 720p) support, H.264 compression, ONVIF middleware, Linux SoC and reach video analytics. Bundled or third-party (xDIAS-compliant) analytical modules can be embedded in the edge device providing a better performance and scalability than server analytics. The available reference designs include ip-cameras, video encoders and DVRs.
This is the COSC 426 Lecture 4 on Designing AR Interfaces. Taught by Mark Billinghurst from the HIT Lab NZ at the University of Canterbury. This is part of his graduate course on Augmented Reality. Taught on August 2nd 2013
The second lecture in the 426 graduate class on Augmented Reality taught thy Mark Billinghurst at the HIT Lab NZ, University of Canterbury. The class was taught on July 19th 2013
2013 Lecture 6: AR User Interface Design GuidelinesMark Billinghurst
COSC 426 Lecture 6: on AR User Interface Design Guidelines. Lecture taught by Mark Billinghurst from the HIT Lab NZ at the University of Canterbury on August 16th 2013
Talk given by Mark Billinghurst at the DIGI_X conference in Auckland, New Zealand on June 21st 2018. The talk was about how Mixed Reality can be applied in the work place.
COMP 4010 Course on Virtual and Augmented Reality. Lectures for 2017. Lecture 2: VR Technology. Taught by Bruce Thomas on August 3rd 2017 at the University of South Australia. Slides by Mark Billinghurst
The final lecture in the COSC 426 graduate course in Augmented Reality. Taught by Mark Billinghurst from the HIT Lab NZ at the University of Canterbury on Sept. 19th 2012
Presentation given by Mark Billinghurst on research into Empathic Glasses. Combining Augmented Reality, Wearable Computers, Emotion Sensing and Remote Collaboration. Given on February 18th 2016.
Lecture 5 from the COSC 426 Graduate course on Augmented Reality. This lecture talks about AR development tools and interaction styles. Taught by Mark Billinghurst from the HIT Lab NZ at the University of Canterbury. August 9th 2013
Lecture 9 of the COMP 4010 course in AR/VR from the University of South Australia. This was taught by Mark Billinghurst on October 5th, 2021. This lecture describes VR input devices, VR systems and rapid prototyping tools.
The fifth lecture from the Augmented Reality Summer School taught by Mark Billinghurst at the University of South Australia, February 15th - 19th, 2016. This provides an overview of AR research directions.
Lecture on AR Interaction Techniques given by Mark Billinghurst on November 1st 2016 at the University of South Australia as part of the COMP 4010 course on VR.
Lecture 2 from a course on Mobile Based Augmented Reality Development taught by Mark Billinghurst and Zi Siang See on November 29th and 30th 2015 at Johor Bahru in Malaysia. This lecture provides an introduction to Mobile AR Technology. Look for the other 9 lectures in the course.
Intelligent Video Surveillance - Synesis integrated hardware and software sol...Nikolai Ptitsyn
Our end-to-end solution for security surveillance features HD (1080p, 720p) support, H.264 compression, ONVIF middleware, Linux SoC and reach video analytics. Bundled or third-party (xDIAS-compliant) analytical modules can be embedded in the edge device providing a better performance and scalability than server analytics. The available reference designs include ip-cameras, video encoders and DVRs.
28 Años de experiencia en : Docente, Facilitador, Conferencista, Asesor, Sistemas, Capacitacion, Reparacion, Venta de Computadores, Redes, Antivirus, Aplicaciones, Programación, Ups, Alquiler de equipos, Conferencias, Motivación. Paginas WEB. Informática y Sistemas en General
Are you wondering if it is possible to have more than one separate websites, with different designs and addressed on their own unique domains but hosted on the same hosting account? The answer is yes.
CEVAGRAF, SCCL hoy está transformada. Fruto de un viaje que empezó hace casi ya 2 años hemos querido realizar este catálogo de productos y servicios para que lo compruebes. Si ya nos conoces y eres cliente, notarás que hemos aprendido ciertas lecciones de cara a ti, nuestro cliente. Entre ellas a darte un mejor servicio a través de nuestra nueva tienda online y por qué no, el mejor precio online en muchos de los artículos que te ofrecemos. Si no lo eres, sólo es cuestión de que nos pruebes, porque sólo a través de los hechos se demuestran las convicciones. ¡Te invitamos a que lo hagas!
Con nuestros mejores deseos y tiempos de esperanza, te hacemos llegar este pequeño presente donde podrás ver el resumen de un cambio: El del amor a la impresión online basada en la automatización y la simplificación de sus procesos, tanto en la gestión como en la producción.
We are the people of KLT provide safe, comfort and bright environment to our customer by latest technologies of LED lighting products. We will be the best of your choice not just for the product but also professional energy saving advise.
You trust is our motivation for future steps.
Kratin is uniquely positioned in “Mobile Product Innovation and Technical Design” space with passionate team of hands-on mobile architects having vast experience in designing mobile solutions.
With their technical design, Kratin enables companies go beyond good looking mobile applications to deliver seamless end to end rich user experience that can delight end user.
Our team has worked with some of the world\'s top telecom operators and mobile companies like AT&T, SanDisk, Qualcomm, Verizon wireless, Sprint. These solutions have spanned across Android, iPhone, BREW, Blackberry, J2ME platforms. Along with SDK based applications, we also have good experience in designing frameworks and sdk for mobile platforms.
We have been working in Android since its m5 version and along with Android sdk , we also have good expertise in Android NDK and Android OS source code (cupcake, donut, eclair, froyo, gingerbread…). For one of our clients, we had worked on re-engineering the complete experience of Handset using Android source including customization at framework and library level.
Kratin’s architect plays multiple roles in the organization like
1.Technical Analyst: Taking ownership of ever changing technology landscape for marketing team
2.Product Architect: Taking ownership of Non-Functional requirements, product technical roadmap for Product Management team
3.Technologist: Taking ownership of technical feasibility of the user experience for User Experience Design team
4.Platform Architect: Taking ownership of end to end architecture and technical design for Development team
5.Technical Leader : Nurturing Mobile competency in teams and creating business value from Mobile
Kratin is a specialized service company and for an end to end offering it uses its strong alliance and partnership with engineering (software services), UX design and product companies. This ensures that our customer always gets the best of experts for the particular work.
We are open for alliances and partnership with marketing, product, service and UX design companies.
Kratin mobile experts work as technical design partner taking complete ownership of product technical roadmap, architecture and its compliance during development. We find our role as an architect more near to a civil architect in construction, who designs the building blueprint and makes sure that engineering team is adhering to it.
As a technology partner, Kratin’s mission will be to grow your business with ownership of an employee and accountability of a service company.
Please contact us at Satin at Kratin dot co dot in for further information.
From Juha Laurila who has been leading Nokia Research Center (NRC) in Lausanne since its establishment in spring 2008. Juha joined Nokia Research Center in 2000 and previously played various roles related to wireless systems research. He received PhD from Vienna University of Technology in 2000 and MSc from Helsinki University of Technology in 1995.
http://research.nokia.com/centers/lausanne/index.html
TCC Worldwide Online Conference presentation on Web Privacy and Information Accountability by students from Colorado Technical University on April 18, 2012.
Activity-Based Serendipitous Recommendations with the Magitti Mobile Leisure ...bo begole
This paper presents a context-aware mobile recommender system, codenamed Magitti. Magitti is unique in that it infers user activity from context and patterns of user behavior and, without its user having to issue a query, automatically generates recommendations for content matching. Extensive field studies of leisure time practices in an urban setting (Tokyo) motivated the idea, shaped the details of its design and provided data describing typical behavior patterns. The paper describes the fieldwork, user interface, system components and functionality, and an evaluation of the Magitti prototype.
Presentation made for the 2nd edition of Paris2.0, on March 2010.
Marketers currently address very little touchpoints along the consumer experience lifecycle. Mobile internet with location-based or augmented reality services relying on smartphone sensors open many opportunities.
IT Consulting Services Company | Inovar ConsultingInovar Tech
Inovar offers a wide range of software consulting services & provide support to a variety of organization sizes to meet all specific client requirements. Our IT consulting services helped Fortune 500 companies and established, world-class brands.
Please visit: https://www.inovarconsulting.co.in/
Enterprise Mobility @ Neev
Mobile devices provide customers timely access to rich information and enable decision making.
With a plethora of mobile phones, smartphones & tablets available in the market today, it is now easy for the workforce to access business data on-the-go.
Platforms we work on:
Android
iOS
Windows 8
HTML5
Middleware frameworks
Threat Hunting with Deceptive Defense and Splunk Enterprise SecuritySatnam Singh
Threat hunting has been primarily a playground for security experts in surfacing unknown threats. It is a proactive security approach where the hunt starts with a hypothesis about a hidden threat that may be already in the enterprise network. According to 2017 survey on threat hunting by the SANS Institute, nearly 45% of organizations hunt on an ad hoc basis. The ad hoc approach is ineffective and does not yield sufficient results to cover the cost of threat hunting. Considering the scarcity of security analysts, the ad hoc threat hunting becomes a costly and expensive process. Also, threat hunting is typically performed by doing outlier detection of the data. For example, analysts usually do outlier detection to find suspicious processes out of Windows process logs. The outlier detection can be done using simple box plots, control charts, or using more sophisticated unsupervised machine learning techniques. However, the output of all the outlier detection techniques is outliers/anomalies that still need to be audited/investigated by the security analysts. This adds more workload to the already overwhelmed security analyst.
The fusion of data science and deceive security provides an opportunity to validate many alerts automatically and therefore provides an automated approach from threat hunting. Deceptive defense system offers a way to confirm an adversary presence with nearly 0% false alarms when the adversary bumps onto one of the deceptions. The modern set of deceptions is the reincarnation of honeypots, honeytokens, honeynets, and honey files that blends well within the network and can dynamically change their configurations. When an adversary access a deception, it raises a positive affirmation of a threat. In this approach, one needs to use alerts and contextual security events along with deceptive security to rank the existing alerts. It takes away a lot of manual verification of various security alerts.
A Game between Adversary and AI ScientistSatnam Singh
Designing a game between an adversary and defender has been a challenge because the adversary's tactics and strategies are unobservable. However, if the defender is powered by AI-based tools to get observations about adversary actions and tactics, then a real game can be played. This talk shares a research on game theory and AI for information security.
Deep Learning Fundamentals Workshop
This hands-on workshop will provide an introduction to deep learning to the participants who are already aware of data science and machine learning techniques but have not worked on deep learning. The course will cover the different types of network architectures that make the foundations of deep learning.
Following topics will be covered:
1. What is deep learning and what are the use cases of it?
2. Introduction to Feed Forward Neural Networks including the hands-on session
3. Building an Image Classifier using Convolutional Natural Networks
4. Applying Recurrent Neural Network and LSTM Network for text classification
5. How to build your own deep learning projects?
Deception-Triggered Security Data Science to Detect Adversary MovementsSatnam Singh
Deception-triggered security data science is a novel paradigm where we marry deception and security data science together to enhance security incident analysis. We deploy deception sensors (consisting of multiple low and high honeypots) that can emulate at various stages, e.g., network, endpoint, application, data, and servers. Whenever an adversary tripped over these sensors, we initiate an alert and correlate with data from other hosts and users to construct an adversary trajectory graph. The graph enhances the capabilities of security analysts to get better insights about adversary movements and hosts that may also be compromised. This talk is a must for security data researchers, security analysts, and security practitioners. We will share some case studies from our deployments along with a live demo of our Splunk App.
This talk focuses on how AI can be leveraged to solve some of the subproblems in cybersecurity. The talk will start with a discussion on why there is a surge in data breaches, and cybersecurity attacks? Then I will discuss some of the use cases, data pipeline, and architectural details of AI solutions for the cybersecurity. Here is a detailed plan for the talk:
(1) The current state of Information security and tools (5 mins).
(2) A brief history and current status of using AI for the InfoSec (5 mins).
Currently, security data science tools primarily process raw data from multiple data sources such as network flows, authentication logs, firewall logs, endpoints, and detect anomalous events. These tools generate a large number of false positives, and they need to be further investigated by security analysts. Specifically, I will address the following questions:
- What is the foundation of current security data science tools?
- What are the pros and cons of existing tools?
(3) AI use cases, data pipeline, architecture, and data experiments (15 mins): Following questions will be addressed:
- What are the different use cases that can be enabled by AI?
- How would it transform the incident response?
What's a typical data pipeline and architecture of cybersecurity AI solution?
Demo 1: PowerShell Obfuscation Detection using Deep Learning Neural Networks
Demo 2: Malicious URL Detection using Recurrent Neural Networks
(4) Challenges and limitations of using AI alone for cybersecurity (5 mins)
- AI generates too many false positives
- Enterprises can investigate only 2-5% of alerts due to the limited number of security analysts
Need for an automated response, not just detection
(5) Our approach: fuse deception with AI (10 mins):
A key objective of the deception is to deceive the inside-network attacks and threats to detect, engage, trap, and remediate them. Deception provides high fidelity alerts, and AI delivers an ability to construct context about the alert. By fusing deception and data science, security analysts can do proactive defense. We shall demonstrate our approach with specific case studies:
- Demo 3- Detecting and Inferring threats in a high interaction decoy using AI engine
(6) Q&A (5 mins)
The Fifth Elephant - 2013 Talk - "Smart Analytics in Smartphones"
Big Data Analytics Insights Conference- Satnam
1. Trends in Mobile Data Analytics
Satnam Singh, PhD
Senior Chief Engineer,
Samsung India Software Operations, Bangalore
[Thanks – Ravindra Guntur, Jithendra Vepa, Balvinder Singh
and other researchers mentioned in References]
2. Motivation: Context-Aware Intelligent Devices
Image/
Music Video Speech Location
Gesture
Text
Acceleration
Transform mobile devices into
intelligent context-aware systems
Learn from user’s context,
history of interactions, and state
of the physical environment
2
3. Speech Analytics: Trends
• Current Virtual
Assistants (VAs):
S-Voice [Samsung] Siri [Apple] – Local Search and maps
– Weather
– Voice dialing, SMS and
email, etc.
• Future VAs - knowledge-
centric
Google Voice &
Vlingo [Nuance] Google Now • Understand user’s intent
[Google]
[Beyond Siri]
3
5. Text Analytics: Trends
[SGI]- Twitter's 'heartbeat • B2B Applications: Brand
building and Social
Marketing
• Social network-driven
Recommendation Engines
[Socialbakers]
5
6. Text Analytics: Technology
Unstructured Lexiconsor
Lexicon or
Text Corpus Dictionaries or
taxonomy or
Ontology
Ontologies
Text Term
Representation Clustering
and
Classification
• Beyond “searching”
• Enables What-If Analysis, Information Retrieval and
Detection
6
9. Video Analytics: Trends and Technology
Video Motion Detection
• B2B Applications in Surveillance and
Remote Monitoring
• Video Enhancements
Intrusion Detection
• Technology: Image and Object
Recognition, Machine Learning
Video Panorama
[IntelliVision]
9
10. Gesture Analytics: Trends
• Navigate a smart TV with
hand gestures [Tarsier]
• Hand gesture-based start
and stop music [Flutter] Fluttter
• Goodbye to your Mouse
and Keyboard [Leap
Motion]
• Various Users: Surgeons,
Gamers, Artists, Engineers
10
11. Gesture Analytics: Technology
• Computer Vision - Template Matching use
Semaphores – sign language, Tracking and
morphing
Feature Extraction
and hand detection
Pattern
Matching with
Existing
Templates Gesture-
(Hidden Markov Driven
Models) Control/Action
11
12. Multi-Model Analytics: Trends
• Indoor Maps – airports,
hospitals, etc.
• 3D Maps- Cool 3D Maps
[eeGeo]
• Activity Recognition: Detect
walking, driving, biking, climbing
stairs, standing, etc. [Alohar
mobile, ActiServ]
12
13. Multi-Model Analytics: Technology
• Indoor Map Technology- Wi-Fi fingerprinting: Cisco Systems,
Qualcomm and indoor map developer Meridian
• Indoor Map Startups – [Aisle411,Wifarer, Micello, Meridian, Point
Inside and MapEverywhere]
• Activity Recognition Technology : A combination of
Accelerometer/GPS, timing and wifi data
[ActiServ]
13
14. Summary
• Mobile data analytics is still in infancy stage
• Mobile Data Analytics:
– Would bring innovative features in next generation
smartphones (B2C Opportunities)
– Transform the businesses through their deep
integration in B2B solutions
• Future mobile devices would be build on
analytics platform and deliver intelligent,
personalized, context-aware features and
services
14
15. References
• Beyond Siri, http://www.visionmobile.com/blog/2012/06/infographic-beyond-siri-the-next-
frontier-in-user-interfaces/
• Nuance Communications,
• https://www.recognize.im/site/showcaseApps
• B. Girod, “Mobile Visual Search,” IEEE Signal Processing Magazine, July 2011.
• http://www.usatoday.com/story/tech/2012/11/26/indoor-map-technology-poses-challenges-
and-opportunities/1698739/
• Tarsier Inc. http://www.moveeye.info/
• LeapMotion, https://leapmotion.com/
• SGI -Global Twitter Heartbeat, http://www.sgi.com/go/twitter/
• Flutter, https://flutterapp.com/
• A. Stefan, V. Athitsos, J. Alon, and S. Sclaroff, “Translation and scale-invariant gesture
recognition in complex scenes,” ACM PETRA '08
• 3D Maps, http://www.mapply.com/ , http://recce.at/
• IntelliVision, http://www.intelli-vision.com/products/intelligent-video-analytics/intelligent-video-
motion-detector
• ActiServ: Activity Recognition Service for Mobile Phones,
www.teco.kit.edu/~gordon/publications/ISWC10_berch.pdf
15