Home service robot works in unstructured environments with various tasks, where a low-cost, dexterous, and intrinsically safe manipulator is important. Traditionally, a redundant manipulator with high degrees of freed...
详细信息
This chapter is bridging the gap of Human computer Interaction (HCI) and Requirement Engineering (RE) where the intended users or appropriators of the technology or service are children and young people. The research ...
详细信息
With the rapid development of network technology and the increasingly complexity of system function, the embedded system is facing more and more serious threats. Previous researches on kernel monitoring and protection...
详细信息
ISBN:
(纸本)9781509042975
With the rapid development of network technology and the increasingly complexity of system function, the embedded system is facing more and more serious threats. Previous researches on kernel monitoring and protection widely relies on higher privileged system components, such as hardware virtualization extensions, to isolate security tools from potential kernel attacks. These approaches increase both the maintenance effort and the code base size of privileged system components, which consequently increases the risk of having security vulnerabilities. In this paper, we have proposed a kernel protection mechanism called TZ_KPM on TrustZone enabled platform. Our prototype can secure system execution environment and provide kernel code integrity protection and malicious process detection based on hardware-assisted isolated environment. At the same time, we secure the communication by shared memory and provide user identification to ensure that the system switches to the secure world safely. Additionally, we can ensure we call the services in the secure world safely by showing the tag on the interface of the called service based on the trusted GUI (TGUI). Thus, we can distinguish the fake interface made by the malicious attackers in the normal world. We have evaluated our prototype on a simulation environment by using ARM FastModel and presented our implementation on a real development by using ARM CoreTile Express A9x4. Our experiment result and security analysis show that TZ_KPM can be retrofitted to existing monolithic kernels, and provide important security benefits.
In this paper, an EEG-based brain-computer interface (BCI) system used for emotion recognition is proposed to detect two basic emotional states (happiness and sadness). Selection of frequency bands plays a vital role ...
详细信息
ISBN:
(纸本)9781509006199
In this paper, an EEG-based brain-computer interface (BCI) system used for emotion recognition is proposed to detect two basic emotional states (happiness and sadness). Selection of frequency bands plays a vital role in distinguishing brain patterns associated with emotions. This paper explores a new method to select suitable subject-specific frequency bands instead of using fixed frequency bands for the emotion recognition. Common spatial pattern and support vector machine were employed to classify two emotional states. Two experiments involving six subjects were conducted to validate our method and BCI system. An average online accuracy of 74.17% for two classes was achieved. The data analysis results demonstrated that the proposed method based on subject-specific frequency bands outperformed the method based on the fixed frequency bands in terms of accuracy.
Currently, dynamic causal modeling (DCM) is one of the most widely used models for an effective brain connectivity network, but it also has some disadvantages (e.g., researchers' selection of cerebral regions of i...
详细信息
ISBN:
(纸本)9781509016105
Currently, dynamic causal modeling (DCM) is one of the most widely used models for an effective brain connectivity network, but it also has some disadvantages (e.g., researchers' selection of cerebral regions of interest [ROTs] is subjective, a substantial time is required for computation, etc.). Statistical Parametric Mapping (SPM) is the most popular statistical data analysis software for brain function, but its settings cumbersome, especially the data preprocessing section. In response to these disadvantages of DCM and SPM, we designed and created a computer-aided system for an effective brain connectivity network, modularized the data preprocessing section of SPM, and we explored the cerebral ROIs and possible co-activation network based on our proposed approach. The co-activation network has as a prior interconnection relationship, and it is used to assist in the selection of ROIs in similar cognitive experiments;thus, the testing of meaningless noise connection modes by the DCM is prevented, the number of models DMC is decreased, and the accuracy of the conclusions and computational efficiency of the DCM are improved.
This paper describes the disadvantages that the high communication bandwidth and that a global unified target track images failed to form in each node in the network. Paper also analyzes the distributed multi-node fra...
详细信息
This paper has constructed a new multi-scroll chaotic system. Two-scroll chaotic attractor can be generated from a basic linear system by switching control in one direction. Then grid multi-scroll chaotic attractors c...
详细信息
An operational wave forecasting system is presented, based on numerical models for wind and wave forecasting. This system is based on wave models WAM (Wave prediction Model) and SWAN (Simulating WAves Nearshore), driv...
详细信息
ISBN:
(纸本)9781498795937;9781138032224
An operational wave forecasting system is presented, based on numerical models for wind and wave forecasting. This system is based on wave models WAM (Wave prediction Model) and SWAN (Simulating WAves Nearshore), driven by the wind fields provided by the atmospheric models GFS (Global Forecast system) from NCEP (National Centers for Environmental Prediction) and WRF (Weather Research and Forecasting Model). The system is an improved version of the one implemented in 2008 and runs automatically in Linux environment. The forecasting system outputs for four days ahead. The validations of the results is carried out by performing comparisons with both wind and wave measurements.
With rapid development of information technology and upgrading of intelligent terminals,twodimensional barcode has been widely used as a carrier to store,transfer and retrieve *** to the limited capacity,current two-d...
详细信息
ISBN:
(纸本)9781509012473
With rapid development of information technology and upgrading of intelligent terminals,twodimensional barcode has been widely used as a carrier to store,transfer and retrieve *** to the limited capacity,current two-dimensional barcodes are designed to embed text-only *** this paper,a generation method for acoustic two-dimensional barcode is *** is based on speech compression,in which low encoding rate is obtained while maintaining high voice quality by introducing MELP compression *** compressed data stream is then embedded to generate the two-dimensional *** practical applications,the acoustic two-dimensional barcode can be easily scanned by the intelligent terminals installed with decoding software,and then the embedded speech can be decoded and *** compression rate is equal to 600 bps,the embedded speech length can up to39 ***,the application of two-dimensional barcode can be effectively promoted.
Very high adoption of mobile phones in developing countries can be used to empower people engaged in various sectors such as agriculture, fisheries and healthcare by providing timely information in right context, thus...
详细信息
暂无评论