Total Knee Replacement (TKR) is an increasingly common surgery worldwide. A significant contributor to TKR success is post-surgical rehabilitation. In this work, we present fun-Knee™, a novel sensor-equipped knee supp...
详细信息
ISBN:
(纸本)9781509054831
Total Knee Replacement (TKR) is an increasingly common surgery worldwide. A significant contributor to TKR success is post-surgical rehabilitation. In this work, we present fun-Knee™, a novel sensor-equipped knee support complemented by mobile device-supported games, specifically designed for “gamified” TKR rehabilitation. Two inclinometers are used to measure the knee angle, which is used as the main input to the developed game. Human-Centered Design theory is applied throughout the game design to ensure a customized, dynamic gaming experience to maximize the pain distraction effect and to increase the exercise compliance and improve the rehabilitation outcome. Preliminary survey results collected from practicing physiotherapists show promising outcomes of the developed prototype, in terms of hardware and software characteristics, usability, clinical utility and overall effectiveness.
the proceedings contain 26 papers. the topics discussed include: applying an instance selection method to an evolutionary neural classifier design;computer simulation of the surface heating process by the movable lase...
the proceedings contain 26 papers. the topics discussed include: applying an instance selection method to an evolutionary neural classifier design;computer simulation of the surface heating process by the movable laser;a study of fuzzy logic ensemble system performance on face recognition problem;attractor-based models for individual and groups' forecasting;generalization of the mechanisms of cross-correlation analysis in the case of a multivariate time series;the application of the multi-alternative approach in active neural network models;modeling of dialogue regimes of distance robot control;the optimization of diffraction structures based on the principle selection of the main criterion;multiobjective clonal selection algorithm for solving forecasting problems;structural model constructing for optical handwritten character recognition;investigation into the efficiency of different bionic algorithm combinations for a COBRA meta-heuristic;multistable states in the biosphere-climate system: towards conceptual models;feature selection for natural language call routing based on self-adaptive genetic algorithm;LTI system order reduction approach based on asymptotical equivalence and the co-operation of biology-related algorithms;and restart operator meta-heuristics for a problem-oriented evolutionary strategies algorithm in inverse mathematical MISO modelling problem solving.
the proceedings contain 39 papers. the special focus in this conference is on Financial Cryptography and Data Security. the topics include: Preface: Bitcoin 2017: 4th workshop on bitcoin and blockchain research;Prefac...
ISBN:
(纸本)9783319702773
the proceedings contain 39 papers. the special focus in this conference is on Financial Cryptography and Data Security. the topics include: Preface: Bitcoin 2017: 4th workshop on bitcoin and blockchain research;Preface: VOTING 2017: Second workshop on advances in secure electronic voting schemes;Preface: WTSC 2017: First workshop on trusted smart contracts;Preface: TA 2017: First workshop on targeted attacks;Simple encrypted arithmetic library - SEAL v2.1;switch commitments: A safety switch for confidential transactions;pieceWork: Generalized outsourcing control for proofs of work;enhancing bitcoin transactions with covenants;decentralized prediction market without arbiters;An analysis of bitcoin OP_RETURN metadata;constant-deposit multiparty lotteries on bitcoin;exchange pattern mining in the bitcoin transaction directed hypergraph;incentivizing blockchain forks via whale transactions;mixing coins of different quality: A game-theoretic approach;smart contracts make bitcoin mining pools vulnerable;towards privacy-preserving multi-party bartering;batchVote: Voting rules designed for auditability;existential assertions for voting protocols;marked mix-nets;pseudo-code algorithms for verifiable re-encryption mix-nets;Using selene to verify your vote in JCJ;a roadmap to fully homomorphic elections: Stronger security, better verifiability;enabling vote delegation for boardroom voting;practical governmental voting with unconditional integrity and privacy;findel: Secure derivative contracts for ethereum;decentralized execution of smart contracts: Agent model perspective and its implications;multi-level access in searchable symmetric encryption;a concurrent perspective on smart contracts;an Empirical analysis of smart contracts: Platforms, applications, and design patterns;trust in smart contracts is a process, as well;defining the ethereum virtual machine for interactive theorem provers.
Unified highly-available archetypes have led to many essential advances,including gigabit switches and *** fact,few leading analysts would disagree withthe deployment of voice-over-IP that paved the way for the devel...
详细信息
Unified highly-available archetypes have led to many essential advances,including gigabit switches and *** fact,few leading analysts would disagree withthe deployment of voice-over-IP that paved the way for the development of suffix *** our research we motivate a system for simulated annealing(CUT),disconfirming that RPCs and thin clients are continuously incompatible.
this paper will explore how fun can be and might be designed into serious games for children. three projects are described and then the tensions around designing for fun and education are unpicked with consideration o...
详细信息
ISBN:
(纸本)9783319290607;9783319290591
this paper will explore how fun can be and might be designed into serious games for children. three projects are described and then the tensions around designing for fun and education are unpicked with consideration of the roles of children in the design of these serious games.
Attention deficit hyperactivity disorder creates conditions for the child as s/he cannot sit calm and still, control his/her behavior and focus his/her attention on a particular issue. Five out of every hundred childr...
详细信息
ISBN:
(纸本)9781538617724
Attention deficit hyperactivity disorder creates conditions for the child as s/he cannot sit calm and still, control his/her behavior and focus his/her attention on a particular issue. Five out of every hundred children are affected by the disease. Boys are three times more than girls at risk for this complication. the disorder often begins before age seven, and parents may not realize their children problem until they get older. Children with hyperactivity and attention deficit are at high risk of conduct disorder, antisocial personality, and drug abuse. Most children suffering from the disease will develop a feeling of depression, anxiety and lack of self-confidence. Given the importance of diagnosis the disease, Deep Belief Networks (DBNs) were used as a deep learning model to predict the disease. In this system, in addition to FMRI images features, sophisticated features such as age and IQ as well as functional characteristics, etc. were used. the proposed method was evaluated by two standard data sets of ADHD-200 Global Competitions, including NeuroImage and NYU data sets, and compared with state-of-the-art algorithms. the results showed the superiority of the proposed method rather than other systems. the prediction accuracy has improved respectively as +12.04 and +27.81 over NeuroImage and NYU datasets compared to the best proposed method in the ADHD200 Global competition.
the volume Software Engineering Perspectives and Application in Intelligent Systems presents new approaches and methods to real-world problems, and in particular, exploratory research that describes novel approaches i...
ISBN:
(数字)9783319336220
ISBN:
(纸本)9783319336206
the volume Software Engineering Perspectives and Application in Intelligent Systems presents new approaches and methods to real-world problems, and in particular, exploratory research that describes novel approaches in the field of Software Engineering. Particular emphasis is laid on modern trends in selected fields of interest. New algorithms or methods in a variety of fields are also *** 5th Computer Science On-line conference (CSOC 2016) is intended to provide an international forum for discussions on the latest research results in all areas related to Computer *** addressed topics are the theoretical aspects and applications of Computer Science, Artificial Intelligences, Cybernetics, Automation Control theory and Software Engineering.
Summary form only given. the complete presentation was not made available for publication as part of the conference proceedings. CESI 2017 workshop summary. CESI2017 is about "conducting empirical studies in indu...
详细信息
ISBN:
(纸本)9781538615478
Summary form only given. the complete presentation was not made available for publication as part of the conference proceedings. CESI 2017 workshop summary. CESI2017 is about "conducting empirical studies in industrial settings". We aim at identifying, debating about, and mitigating the barriers challenging the design and execution of empirical studies in industrial settings. In the past workshops, we also aimed at improved understanding of the emergence of industrial-strength empirical results and the critical characteristics of the research methods needed to yield those results as well as aggregating individual studies’ results towards practical, evidence-based guidelines. this year, we would like to give a special emphasis on building and managing big data systems and the use and benefit of empirical studies in this context. Big data systems bring new types of software engineering challenges such as test optimization, planning for new requirements and/ or enhancements, optimization of code/ algorithms, decentralization of development tasks, the role of software analytics, etc. As of today, most of the research findings of empirical studies are isolated in papers published by specific research groups. However, it is widely accepted that replication studies are important to build a body of knowledge in empirical software engineering. they enable transfer of novel approaches and findings into different settings and contexts. We also believe that: (i) improved understanding of challenges in conducting empirical studies in industry, (ii) considering these challenges in the design of experiments, and (iii) replicating empirical studies in different settings, would lead to actionable outcomes. thus, in the proposed workshop, we are also interested in determining the kind of follow-on actions (recommendations) that are taken upon the results of empirical studies. Such recommendations have become even more important in the era of managing big data/data-intensive systems t
In this paper a short overview and a case study in a statistical comparison of stochastic optimization algorithms are presented. the algorithms are part of the Black-Box Optimization Benchmarking 2015 competition that...
详细信息
A one-year master of engineering program in telecommunications and information security was recently introduced at the University of Victoria, Canada. In addition to nine technical courses, students are required to ta...
详细信息
ISBN:
(纸本)9781509055982
A one-year master of engineering program in telecommunications and information security was recently introduced at the University of Victoria, Canada. In addition to nine technical courses, students are required to take two nontechnical courses to improve their soft skills and to develop their professional career. this paper describes the motivation and design of these courses, and experiences gained and lessons learnt in delivering the courses. Improvements to be made based on student feedbacks and instructor observations are discussed.
暂无评论