Multi-antenna millimeter wave communications is on the verge of mainstream commercial deployment. In a not-too-distant 5G-powered future, we expect a dynamic, congested and interference-limited millimeter wave channel...
详细信息
ISBN:
(纸本)9781450359283
Multi-antenna millimeter wave communications is on the verge of mainstream commercial deployment. In a not-too-distant 5G-powered future, we expect a dynamic, congested and interference-limited millimeter wave channel that will require us to exploit the large range of spatial diversity afforded by millimeter wave antenna arrays. In prior cellular generations, the development of communications and networking algorithms was significantly aided by software defined radio based experimentation. Similarly, we believe that the challenges of this new era will require the development of algorithms based on experimentation using software defined millimeter wave multi-antenna systems. In this talk, we will present a portable, user-friendly and yet, extremely capable and highly reconfigurable software-defined phased array transceiver platform for experimentation and algorithms development in the 5G era. The platform features 128 independent phase and gain control elements feeding 64 dual-polarized antennas, and supports dual-polarized transmit and receive at 28 GHz. Phase and gain of each element can be controlled, with support for up to 8 simultaneous beams. Key circuit and antenna technology innovations enable calibration-free operation. Moreover, all communications and phased array beam configuration functions are controlled from a single python-based API thereby allowing full beamforming control alongside other software defined radio communications parameters from a simple softwareinterface. Initial 5G related experiments using the software defined phased array is presented.
With the advent of the low-cost headsets, Virtual Reality (VR) applications have gained enormous attention and popularity. Object selection is the primary task in VR interfaces. Although numerous studies have been don...
详细信息
Experiments, case studies and surveys are part of the standard toolbox researchers use for validating their proposed educational tools and methods. Yet the breadth of such evaluations is often limited to one dimension...
详细信息
ISBN:
(纸本)9781450359658
Experiments, case studies and surveys are part of the standard toolbox researchers use for validating their proposed educational tools and methods. Yet the breadth of such evaluations is often limited to one dimension such as assessing the effect on learning outcomes by means of experiments, or evaluating user acceptance and perceived utility by means of surveys. Besides a positive effect in the classroom, it is equally important that students transfer their knowledge to their working environment, which constitutes yet another evaluation dimension. The lack of a widely accepted validation method encompassing a broad set of dimensions hampers the comparability and synthesis of research on modelling education. This study adapts Kirkpatrick's model of training evaluation to the assessment of technology Enhanced Learning (TEL), i.e. learning settings where the teaching is supported by means of didactic tools. The adaptation proposes concrete metrics and instruments for each of Kirkpatrick's model level. The adaption is demonstrated by means of a case study on a TEL environment for userinterface (UI) modelling that supports the learning UI design principles.
Although mobile ad frauds have been widespread, state-of-the-art approaches in the literature have mainly focused on detecting the so-called static placement frauds, where only a single UI state is involved and can be...
详细信息
ISBN:
(纸本)9781450355735
Although mobile ad frauds have been widespread, state-of-the-art approaches in the literature have mainly focused on detecting the so-called static placement frauds, where only a single UI state is involved and can be identified based on static information such as the size or location of ad views. Other types of fraud exist that involve multiple UI states and are performed dynamically while users interact with the app. Such dynamic interaction frauds, although now widely spread in apps, have not yet been explored nor addressed in the literature. In this work, we investigate a wide range of mobile ad frauds to provide a comprehensive taxonomy to the research community. We then propose, FRAUDDROID, a novel hybrid approach to detect ad frauds in mobile Android apps. FRAUDDROID analyses apps dynamically to build UI state transition graphs and collects their associated runtime network traffics, which are then leveraged to check against a set of heuristic-based rules for identifying ad fraudulent behaviours. We show empirically that FRAUDDROID detects ad frauds with a high precision (similar to 93%) and recall (similar to 92%). Experimental results further show that FRAUDDROID is capable of detecting ad frauds across the spectrum of fraud types. By analysing 12,000 ad-supported Android apps, FRAUDDROID identified 335 cases of fraud associated with 20 ad networks that are further confirmed to be true positive results and are shared with our fellow researchers to promote advanced ad fraud detection.
Arm gestures are not only important in hand-busy applications, but also helpful for arm amputees when they are interacting with computers. With the motivation of interacting with computers without hand or arm, we prop...
详细信息
ISBN:
(纸本)9781450365086
Arm gestures are not only important in hand-busy applications, but also helpful for arm amputees when they are interacting with computers. With the motivation of interacting with computers without hand or arm, we propose MyoTyper, a method enables people to interact with computers by using forearm gesture. We employ acceleration sensors and electromyography sensors to collect signals for arm gesture recognition. A disc-shaped virtual keyboard is designed for fast text input by arm gesture set. Our preliminary study shows that our system prototype achieve classification accuracy with 70% input speed of 2.56 words per minute, and the input speed increases when using proficiency improved.
Natural language requirement descriptions are often unstructured, contradictory and incomplete and are therefore challenging for automatic processing. Although many of these deficits can be compensated by means of nat...
详细信息
Natural language requirement descriptions are often unstructured, contradictory and incomplete and are therefore challenging for automatic processing. Although many of these deficits can be compensated by means of natural language processing, there still remain cases where interaction with end-users is necessary for clarification. In this vision paper, we present CORDULA, a system using chatbot technology to establish end-user communication in order to support the requirement elicitation and partial compensation of deficits in user requirements. Copyright c 2018 by the paper's authors.
A Ground Control Station (GCS) is an essential element to supervise and control autonomous vehicles performing complex missions in real time. In the new era of Internet of Things, where systems are highly connected, t...
详细信息
This paper presents the INSITU research project initiated to provide a systematic approach for effective sharing, integration and use of information from different sources, to establish a common operational picture (C...
详细信息
Traditional role-based access control fails to meet the privacy requirements for patient data in medical systems, as it is infeasible for policy makers to foresee what information doctors may need for diagnosis and tr...
详细信息
ISBN:
(纸本)9781450356664
Traditional role-based access control fails to meet the privacy requirements for patient data in medical systems, as it is infeasible for policy makers to foresee what information doctors may need for diagnosis and treatment in various situations. The universal practice in hospitals is to grant doctors unlimited access, which in turn increases the risk of breaching patient privacy. In this paper, we propose a dynamic risk-adaptive access control model for health IT systems by taking into consideration the relationships between data and access behaviors. By training topic models to portray individual and group-level access behaviors, we quantify the risk for each user over a certain period of time. Malicious users are supposed to get higher risk scores than honest users due to improper requests. Thus their further access would be denied under our access control scheme. The topic model and risk scores are periodically updated to advance the self-adaptability of the system. Experimental results have shown that our solution could effectively distinguish malicious doctors even if they deliberately conceal the misconducts.
Reproducibility is essential for the verification and advancement of scientific research. It is often necessary, not just to recreate the code, but also the software and hardware environment to reproduce results of co...
详细信息
ISBN:
(纸本)9781450357944
Reproducibility is essential for the verification and advancement of scientific research. It is often necessary, not just to recreate the code, but also the software and hardware environment to reproduce results of computational analyses. software containers like Docker (https://***), that distribute the entire computing environment are rapidly gaining popularity in bioinformatics. Docker not only allows for the reproducible deployment of bioinformatics workflows, but also facilitates mix-and-match of components from different workflows that have complex and possibly conflicting software requirements. However, configuration and deployment of Docker, a command-line tool, can be exceedingly challenging for biomedical researchers with limited training in programming and technical skills. We developed a drag and drop GUI called the Biodepot-Workflow-Builder (Bwb) to allow users to assemble, replicate, modify and execute Docker workflows. Bwb represents individual software modules as widgets which are dragged onto a canvas and connected together to form a graphical representation of an analytical pipeline. These widgets allow the userinterface to interact with software containers such that software tools written in other languages are compatible and can be used to build modular bioinformatics workflows. We will present a case study using the Bwb to create and execute a RNA sequencing data workflow.
暂无评论