Recreational cycling is a popular leisure activity in which the cyclist mostly is involved for a whole day at a time. This makes safety and comfort some of the most important factors to be attended to, especially when...
详细信息
Recreational cycling is a popular leisure activity in which the cyclist mostly is involved for a whole day at a time. This makes safety and comfort some of the most important factors to be attended to, especially when cycling in group. Group recreational cycling (GRC) is a new kind of tourism involving a courier and a number of tourists. Beside safety and comfort, tracking the cyclists, monitoring their health, and guiding and warning along the way are important in GRC. Information exchanging among cyclists is essential to achieve above goals. In this paper, an event-based wireless navigation and healthcare system for group recreational cycling (EWS) using an ad hoc network with multi-hop protocol to transmit data among devices is proposed. EWS can plan a route, warn about bad road conditions, play multimedia attractions for guiding, track cyclists and monitor their heart rate. Two scenarios were designed to observe and verify the feasibility of EWS.
We describe a unique competition based on the novel concept of robotics and mechatronics products that included evaluation of the products' engineering function and interface design. Seventy-seven students of elev...
详细信息
Sensor nodes can be compromised by attackers and inject large amounts of bogus data to exhaust network resources. A practical traceback mechanism is proposed, in which each forwarding node marks packets with a certain...
详细信息
Sensor nodes can be compromised by attackers and inject large amounts of bogus data to exhaust network resources. A practical traceback mechanism is proposed, in which each forwarding node marks packets with a certain probability. By collecting enough packets, sink node will construct a path back to the source node. It is proved that the mechanism is secure against all forms of attacks and other two marking methods are proposed to improve the performance of the mechanism. Simulation results show that the mechanism is efficient and practical.
In this article, we present an approach for the automated extraction of quantitative information about trichome patterning on leaves of Arabidopsis thaliana. Time series of growing rosette leaves (4D confocal datasets...
详细信息
ISBN:
(纸本)9781424439317
In this article, we present an approach for the automated extraction of quantitative information about trichome patterning on leaves of Arabidopsis thaliana. Time series of growing rosette leaves (4D confocal datasets, 3D + time) are used for this work. At first, significant anatomical structures, i.e. leaf surface and midplane are extracted robustly. Using the extracted anatomical structures, a biological reference coordinate system is registered to the leaves. The performed registration allows to determine intra- as well as inter-series spatiotemporal correspondences. Trichomes are localized by first detecting candidates using Hough transform. Then, local 3D invariants are extracted and the candidates are validated using a Support Vector Machine (SVM).
With the wide application of EDA technique, the period for the development of electronic products has been shortened. That implements the software of the hardware design and reduces the costs. Based on the analysis of...
详细信息
With the wide application of EDA technique, the period for the development of electronic products has been shortened. That implements the software of the hardware design and reduces the costs. Based on the analysis of the principle of digital logic analyzer circuit, this paper discusses the working principles of its flip-flop circuit module and the implementation method of FPGA, and presents the program design and emulation result of part circuits.
Fetch gating mechanisms have been proposed to gate the processor pipeline to reduce the wasted energy consumption due to wrong-path (i.e. mis-speculated) instructions. These schemes assume that all wrong-path instruct...
详细信息
SOA services afford a uniform and transparent use of different devices with similar functionalities. In the last years a number of mostly incompatible, SOA technologies have been established. Therefore, this advantage...
详细信息
SOA services afford a uniform and transparent use of different devices with similar functionalities. In the last years a number of mostly incompatible, SOA technologies have been established. Therefore, this advantage is no longer true. Indeed it is not required to support the specific device, but the concrete SOA technology. Furthermore, a transparent service discovery is prevented by device interconnections because many SOA technologies use IP multicasts for a service discovery. The discovery range is limited on the consumer's subnet as the most routers don't route multi-casts. This article describes a service discovery approach, that is independent from concrete SOA technologies and device interconnections. That results in an increase of available services and the service discovery range.
Currently the demand of security is getting higher due to easy reproduction of digitally created multimedia data. Digital watermarking aims to embed secret information into content for copyright protection and authent...
详细信息
ISBN:
(纸本)9781617388767
Currently the demand of security is getting higher due to easy reproduction of digitally created multimedia data. Digital watermarking aims to embed secret information into content for copyright protection and authentication. This paper proposes a combined digital watermarking and digital signature based on video content to authenticate and to verify the integrity of the compressed H.264/AVC video. Features are extracted as the authentication data from transform domain to generate a unique digital signature using an MD5hash function. The authentication information treated as fragile watermark is embedded in a set of motion vectors belonging to higher motion activities with the best partition mode in a tree-structured motion compensation approach. Watermark detection is blind and does not require an original video. Experimental results show that the proposed watermarking technique can not only achieve the goal of fragility but also verify the authenticity and the integrity of the video.
In this paper, we describe the formatting guidelines for ACM SIG Proceedings. Traditionally silence in VoIP applications is detected by a VAD algorithm after G.729 compression, both have high computational and energy ...
详细信息
With increasing defect density, microprocessors, especially the embedded caches, will encounter more faults. Adding spare resources to replace defective components is a widely accepted method for yield enhancement. In...
With increasing defect density, microprocessors, especially the embedded caches, will encounter more faults. Adding spare resources to replace defective components is a widely accepted method for yield enhancement. In this work, a repair method using content addressable memory combined with spare bits, as well as a novel fault injection method is proposed. With the proposed fault injection technique, various numbers and types of faults can be flexibly injected into the silicon. A wireless sensor network system using our self-repairable microprocessor (SRP) is developed to prove the effectiveness of the proposed technique.
暂无评论