منابع مشابه
A Framework for Segmentation of Talk & Game Shows
In this paper, we present a method to remove commercials from talk and game show videos and to segment these videos into host and guest shots. In our approach, we mainly rely on information contained in shot transitions, rather than analyzing the scene content of individual frames. We utilize the inherent differences in scene structure of commercials and talk shows to differentiate between them...
متن کاملVisual Content Based Segmentation of Talk & Game Shows
In this paper, we present a method to remove commercials from talk and game show videos and to segment these videos into host and guest shots. In our approach, we mainly rely on information contained in shot transitions, rather than analyzing the scene content of individual frames. We utilize the inherent difference in scene structure of commercials and talk shows to differentiate between them....
متن کاملNarration, Visualization and Mind
The paper is analyzing how people in late modern society characterized by detraditionalization, use moving images as a cultural resource for the construction of meaningful subjective world views. As a theoretical concept with several dimensions, “sacralization of the self” (Woodhead & Heelas 2000: 344), is related to media theory. With a critical focus on ‘the self’, as a core aspect in contemp...
متن کاملArchitecture Narration: A Comparative Study on Narration in Architecture and Story
The way architects think about different issues from developing plans, perspectives, and views to cross-sections and structure of a building is a common and general one. Regardless of its merits and efficiency, this way of thinking indicates a degradation in architectural thinking. Indeed, architectures today are caught in a specific architecture language where the boundaries of language create...
متن کاملAutomatic Validation of Protocol Narration
We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques suffice for identifying a number of authentication flaws in symmetric ke...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Studies in Linguistics and Literature
سال: 2019
ISSN: 2573-6426,2573-6434
DOI: 10.22158/sll.v3n3p213