Design concepts and algorithms were developed to address the eye tracking analysis issues that arise when (1) participants interrogate dynamic multielement objects that can overlap on the display and (2) visual angle ...
详细信息
Design concepts and algorithms were developed to address the eye tracking analysis issues that arise when (1) participants interrogate dynamic multielement objects that can overlap on the display and (2) visual angle error of the eye trackers is incapable of providing exact eye fixation coordinates. These issues were addressed by (1) developing dynamic areas of interests (AOIs) in the form of either convex or rectangular shapes to represent the moving and shape-changing multielement objects, (2) introducing the concept of AOI gap tolerance (AGT) that controls the size of the AOIs to address the overlapping and visual angle error issues, and (3) finding a near optimal AGT value. The approach was tested in the context of air traffic control (ATC) operations where air traffic controller specialists (ATCSs) interrogated multiple moving aircraft on a radar display to detect and control the aircraft for the purpose of maintaining safe and expeditious air transportation. In addition, we show how eye tracking analysis results can differ based on how we define dynamic AOIs to determine eye fixations on moving objects. The results serve as a framework to more accurately analyze eye tracking data and to better support the analysis of human performance.
With the development of biometric verification, we proposed a new algorithm and personal mobile sensor card system for ECG verification. The proposed new mean-interval approach can identify the user quickly with high ...
详细信息
With the development of biometric verification, we proposed a new algorithm and personal mobile sensor card system for ECG verification. The proposed new mean-interval approach can identify the user quickly with high accuracy and consumes a small amount of flash memory in the microprocessor. The new framework of the mobile card system makes ECG verification become a feasible application to overcome the issues of a centralized database. For a fair and comprehensive evaluation, the experimental results have been tested on public MIT-BIH ECG databases and our circuit system;they confirm that the proposed scheme is able to provide excellent accuracy and low complexity. Moreover, we also proposed a multiple-state solution to handle the heat rate changes of sports problem. It should be the first to address the issue of sports in ECG verification.
We present a wireless-inertial-measurement-unit- (WIMU-) based hand motion analysis technique for handwriting recognition in three-dimensional (3D) space. The proposed handwriting recognition system is not bounded by ...
详细信息
We present a wireless-inertial-measurement-unit- (WIMU-) based hand motion analysis technique for handwriting recognition in three-dimensional (3D) space. The proposed handwriting recognition system is not bounded by any limitations or constraints;users have the freedom and flexibility to write characters in free space. It uses hand motion analysis to segment hand motion data from a WIMU device that incorporates magnetic, angular rate, and gravity sensors (MARG) and a sensor fusion algorithm to automatically distinguish segments that represent handwriting from nonhandwriting data in continuous hand motion data. Dynamic time warping (DTW) recognition algorithm is used to recognize handwriting in real-time. We demonstrate that a user can freely write in air using an intuitive WIMU as an input and hand motion analysis device to recognize the handwriting in 3D space. The experimental results for recognizing handwriting in free space show that the proposed method is effective and efficient for other natural interaction techniques, such as in computer games and real-time hand gesture recognition applications.
In order to fully automate the environmental regulatory compliance checking process, rules should be automatically extracted from applicable environmental regulatory textual documents, such as energy conservation code...
详细信息
In order to fully automate the environmental regulatory compliance checking process, rules should be automatically extracted from applicable environmental regulatory textual documents, such as energy conservation codes. In the authors' automated compliance checking (ACC) approach, prior to rule extraction, the text is first classified into predefined categories to only retrieve relevant clauses and filter out irrelevant ones, thereby improving the efficiency and accuracy of rule extraction. Machine learning (ML) techniques have been commonly used for text classification (TC). Nonontology-based, ML-based TC has, generally, performed well. However, given the need for an exceptionally high performance in TC to support high performance in ACC, further TC performance improvement is needed. To address this need, an ontology-based TC algorithm is proposed to further improve the classification performance by utilizing the semantic features of the text. A domain ontology for conceptualizing the environmental knowledge was used. The proposed ontology-based TC algorithm was tested on 25 environmental regulatory documents, evaluated using four evaluation metrics, and compared with the authors' previously utilized ML-based approach. Based on the testing data, the results show that the ontology-based approach consistently outperformed the ML-based approach, under all evaluation metrics.
An unconditionally stable one-step leapfrog locally one-dimensional finite-difference time-domain (LOD-FDTD) algorithm towards body of revolution (BOR) is presented. The equations of the proposed algorithm are obtaine...
详细信息
An unconditionally stable one-step leapfrog locally one-dimensional finite-difference time-domain (LOD-FDTD) algorithm towards body of revolution (BOR) is presented. The equations of the proposed algorithm are obtained by the algebraic manipulation of those used in the conventional LOD-BOR-FDTD algorithm. The equations for z-direction electric and magnetic fields in the proposed algorithm should be treated specially. The new algorithm obtains a higher computational efficiency while preserving the properties of the conventional LOD-BOR-FDTD algorithm. Moreover, the convolutional perfectly matched layer (CPML) is introduced into the one-step leapfrog LOD-BOR-FDTD algorithm. The equation of the one-step leapfrog CPML is concise. Numerical results show that its reflection error is small. It can be concluded that the similar CPML scheme can also be easily applied to the one-step leapfrog LOD-FDTD algorithm in the Cartesian coordinate system.
Real-time tracking of maneuvering targets is the prerequisite for continuous imaging of moving targets in inverse synthetic aperture radar (ISAR). In this paper, the range and azimuth tracking (RAT) method with wideba...
详细信息
Real-time tracking of maneuvering targets is the prerequisite for continuous imaging of moving targets in inverse synthetic aperture radar (ISAR). In this paper, the range and azimuth tracking (RAT) method with wideband radar echoes is first presented for a mechanical scanning monopulse ISAR, which is regarded as the simplest phased array unit due to the two antenna feeds. To relieve the estimation fluctuation and poor robustness of the RAT method with a single snapshot, a modified range and azimuth tracking approach based on centroid algorithm (RATCA) with forgotten factor and multiple echoes is then proposed. The performances of different forgotten factors are investigated. Both theoretical analysis and experimental results demonstrate that RATCA is superior to RAT method. Particularly, when target echo is missing occasionally, RAT method fails while RATCA still keeps good performance. The potential of continuous imaging with shipborne ISAR is verified by experimental results. With minor modification, the method proposed in this paper can be potentially applied in the phased array radar.
This paper proposes a three-dimensional wireless sensor networks node localization algorithm based on multidimensional scaling anchor nodes, which is used to realize the absolute positioning of unknown nodes by using ...
详细信息
This paper proposes a three-dimensional wireless sensor networks node localization algorithm based on multidimensional scaling anchor nodes, which is used to realize the absolute positioning of unknown nodes by using the distance between the anchor nodes and the nodes. The core of the proposed localization algorithm is a kind of repeated optimization method based on anchor nodes which is derived from STRESS formula. The algorithm employs the Tunneling Method to solve the local minimum problem in repeated optimization, which improves the accuracy of the optimization results. The simulation results validate the effectiveness of the algorithm. Random distribution of three-dimensional wireless sensor network nodes can be accurately positioned. The results satisfy the high precision and stability requirements in three-dimensional space node location.
Recently, the Internet of Things technology has rapidly spread and been applied in various fields including smart factories. Smart factory technologies are used for flexible process automation and custom manufacturing...
详细信息
Recently, the Internet of Things technology has rapidly spread and been applied in various fields including smart factories. Smart factory technologies are used for flexible process automation and custom manufacturing;thus, it requires adaptive network management for frequent network fluctuations due to mobility. Moreover, it is very important to ensure the timeliness of the data collected through the sensor nodes. In order to ensure network mobility in industrial WSNs, distributed scheduling algorithms should be supported. In this paper, we evaluated IEEE 802.15.4e-based industrial WSN MAC performances by using various mobility scenarios for smart factory environments. Also we proposed an IEEE 802.15.4e DSME-based distributed scheduling algorithm for mobility support and measured various performance metrics. The proposed algorithm can adaptively assign communication slots by analyzing the network traffic of each node and improve the network reliability and timeliness. The experimental result shows that the throughput of DSME MAC protocol is better than IEEE 802.15.4e TSCH and legacy slotted CSMA/CA in large network with above 30 nodes. Also the proposed algorithm improves the throughput by 15% higher than other MACs including original DSME. The algorithm was experimentally confirmed to reduce power consumption by improving the availability of communication slots.
This paper proposes a new plant-inspired optimization algorithm for multilevel threshold image segmentation, namely, hybrid artificial root foraging optimizer (HARFO), which essentially mimics the iterative root forag...
详细信息
This paper proposes a new plant-inspired optimization algorithm for multilevel threshold image segmentation, namely, hybrid artificial root foraging optimizer (HARFO), which essentially mimics the iterative root foraging behaviors. In this algorithm the new growth operators of branching, regrowing, and shrinkage are initially designed to optimize continuous space search by combining root-to-root communication and coevolution mechanism. With the auxin-regulated scheme, various root growth operators are guided systematically. With root-to-root communication, individuals exchange information in different efficient topologies, which essentially improve the exploration ability. With coevolution mechanism, the hierarchical spatial population driven by evolutionary pressure of multiple subpopulations is structured, which ensure that the diversity of root population is well maintained. The comparative results on a suit of benchmarks show the superiority of the proposed algorithm. Finally, the proposed HARFO algorithm is applied to handle the complex image segmentation problem based on multilevel threshold. Computational results of this approach on a set of tested images show the outperformance of the proposed algorithm in terms of optimization accuracy computation efficiency.
Intruders detection is one of the very important applications in Wireless Sensor Networks (WSNs). Sometimes detecting intruders is not sufficient;distinguishing whether an intruder is legal or illegal is necessary. Si...
详细信息
Intruders detection is one of the very important applications in Wireless Sensor Networks (WSNs). Sometimes detecting intruders is not sufficient;distinguishing whether an intruder is legal or illegal is necessary. Since k-barrier coverage is widely used in detecting intruders, a barrier construction algorithm is needed, which can not only detect an intruder but also judge an illegal intruder. An intruder is defined as illegal if and only if it crosses straightly through the monitored region from the special side to another side. On the contrary, it is a legal intruder. To detect an intruder and distinguish whether the intruder is legal or illegal, a strong k-barrier coverage algorithm is proposed. The strong k-barrier coverage is a local barrier constructing algorithm and can detect any intruder crossing the k-barrier with a full probability. The strong k-barrier coverage detects all intruders penetrating the annular region for.. times. What is more, the proposed strong k-barrier algorithm can provide a reliable judgement on whether an intruder is legal or illegal, and the constructed k-barrier coverage is different from the traditional one-way barrier coverage using binary barriers that are intersected but not overlapped. Some simulation tests show that the proposed algorithm can construct strong k-barrier coverage very well.
暂无评论