This paper outlines a methodology for ascertaining the cost and performance of business function placement across a distributed computing environment. Distributed computing and business function placement provides new...
详细信息
Recently, increased attention has been paid to how to establish and strengthen the relationships between requirements and architectural design. In particular, how the process must encompass changes to requirements ove...
详细信息
ISBN:
(纸本)0769519806
Recently, increased attention has been paid to how to establish and strengthen the relationships between requirements and architectural design. In particular, how the process must encompass changes to requirements over time and their effects upon a system's architecture. This paper sketches our work-in-progress in this field, which we concern about a methodology to guide the architecture development from the inception.
We propose a human-machine interface based on tongue motion for tetraplegics. The proposed system measures electromyography (EMG) signals in an oral cavity and estimate tongue motions. We measure four channels of intr...
详细信息
ISBN:
(纸本)9781479986965
We propose a human-machine interface based on tongue motion for tetraplegics. The proposed system measures electromyography (EMG) signals in an oral cavity and estimate tongue motions. We measure four channels of intraoral EMG on the gum when a healthy subject moves the tongue in four directions (forward, backward, left, and right). For each EMG signal, we obtain the signal power for five frequency bands. We employ least-squares probabilistic classification (LSPC) to classify the tongue motions into these four motions and rest, and we obtained an 87.7 percent classification rate. Moreover, to attach a "click" function into the system, we measure the intraoral EMG signals caused by the clicking sound and those of other motions. Therefore, by embedding an EMG measurement system into an artificial tooth, we can realize a tongue-computer interface that is not uncomfortable for users.
作者:
Tick, AndreaUniv Appl Sci
Budapest Business Sch Coll Int Management & Business Dept Methodol Budapest Hungary
In the digital world IT security is every ones responsibility, ranging from ensuring that your devices are installed with the latest anti-virus and firewall software, through safe personal accounts, to being smart abo...
详细信息
ISBN:
(纸本)9781538611227
In the digital world IT security is every ones responsibility, ranging from ensuring that your devices are installed with the latest anti-virus and firewall software, through safe personal accounts, to being smart about how to handle yourself online. The digital natives are online from the very early stage of their life and when they are mature enough, their education to be IT security aware becomes crucial. This paper presents the relationship of IT security awareness with social factors, the features of digital learning and the use of smart phones within the framework of Technology Acceptance Model (TAM) using the Structural Equation modeling (SEM) with the AMOS programme in the Hungarian context. These external factors as input variables are in correlation and this paper also strives to explore the nature of computer and internet literacy as well as IT security awareness of the member of the early Z generation.
In this paper we demonstrate a method for fine-grained modeling of a synthetic agent's physical capabilities - running, jumping, sneaking, and other modes of movement. Using motion capture data acquired from human...
详细信息
ISBN:
(纸本)1581138644
In this paper we demonstrate a method for fine-grained modeling of a synthetic agent's physical capabilities - running, jumping, sneaking, and other modes of movement. Using motion capture data acquired from human subjects, we extract a motion graph and construct a cost map for the space of agent actions. We show how a planner can incorporate this cost model into the planning process to select between equivalent goal-achieving plans. We explore the utility of our model in three different capacities: 1) modeling other agents in the environment;2) representing heterogeneous agents with different physical capabilities;3) modeling agent physical states (e.g., wounded or tired agents). This technique can be incorporated into applications where human-like, high-fidelity physical models are important to the agents' reasoning process, such as virtual training environments.
This book includes a selection of articles from the 2018 internationalconference on Information Technology & systems (ICITS 18), held on January 10 12, 2018, at the Universidad Estatal Pennsula de Santa Elena, Li...
ISBN:
(数字)9783319734507
ISBN:
(纸本)9783319734491
This book includes a selection of articles from the 2018 internationalconference on Information Technology & systems (ICITS 18), held on January 10 12, 2018, at the Universidad Estatal Pennsula de Santa Elena, Libertad City, Ecuador. ICIST is a global forum for researchers and practitioners to present and discuss recent findings and innovations, current trends, lessons learned and the challenges of modern information technology and systems research, together with their technological development and applications. The main topics covered include information and knowledge management; organizational models and information systems; software and systemsmodeling; software systems, architectures, applications and tools; multimedia systems and applications; computer networks, mobility and pervasive systems; intelligent and decision support systems; big data analytics and applications; humancomputer interaction; ethics, computers & security; health informatics; and information technologies in education.
The development of energy-efficient applications and protocols is one of the most important issues in Wireless Sensor Networks (WSN). However, most publications up to now avoid time consuming realistic energy evaluati...
详细信息
ISBN:
(纸本)9781450308984
The development of energy-efficient applications and protocols is one of the most important issues in Wireless Sensor Networks (WSN). However, most publications up to now avoid time consuming realistic energy evaluations and oversimplify their evaluation with regard to energy-efficiency. This work aims at lowering the barrier for realistic energy evaluations. We focus on a generic application that simply transmits one packet using TinyOS Low Power Listening (LPL), which we evaluate using the WSN testbed SANDbed. Our results disprove some intuitive expectations. For example, we show that transmitting packets with a large payload can be cheaper in terms of energy consumption than a small payload. As packet transmission is part of almost any WSN application, the results shown are important to many WSN protocol evaluations. As an addition, we contribute our lessons learned by discussing the most important challenges and pitfalls we faced during our evaluation.
A basic task in network passive measurement is collecting flow statistics information for network state characterization. With the continuous increase of Internet link speed and the number of flows, flow statistics ha...
详细信息
ISBN:
(纸本)9780769540597
A basic task in network passive measurement is collecting flow statistics information for network state characterization. With the continuous increase of Internet link speed and the number of flows, flow statistics has become a great challenge due to the demanding requirements on both memory size and memory bandwidth in measurement devices. In this paper, we propose a DIScount COunting (DISCO) method, which is designed for both flow size and flow volume counting. For each incoming packet of length l, DISCO increases the corresponding counter assigned to the flow with an increment that is less than l. With an elaborate design on the counter update rule and the inverse estimation, DISCO saves memory consumption while providing an accurate unbiased estimator. The method is evaluated thoroughly under theoretical analysis and simulations with synthetic and real traces. The results demonstrate that DISCO is more accurate than related work given the same counter size. DISCO is also implemented on network processor Intel IXP2850 for performance test. Using only one MicroEngine (ME) in IXP2850, the throughput can reach up to 11.1Gbps under a traditional traffic pattern, and it increases almost linearly with the number of MEs employed.
The development of accurate models for cyber physical systems (CPSs) is hampered by the complexity of these systems, fundamental differences in the operation of cyber and physical components, and significant interdepe...
详细信息
The paper deals with the computation of performance measures when executing batch workloads on a multiprogrammed computer system. The computer system is modelled using a queueing network model and the jobs are charact...
详细信息
暂无评论