作者:
Huijie ChenFan LiYu WangSchool of Computer Science
Beijing Institute of Technology Beijing Engineering Research Center for High Volume Language Information Processing and Cloud Computing Applications Beijing China Department of Computer Science
College of Computing and Informatics University of North Carolina at Charlotte Charlotte NC USA
Hand tracking systems are becoming increasingly popular as a fundamental HCI approach. The trajectory of moving hand can be estimated through smoothing the position coordinates collected from continuous localization. ...
详细信息
ISBN:
(纸本)9781509028245
Hand tracking systems are becoming increasingly popular as a fundamental HCI approach. The trajectory of moving hand can be estimated through smoothing the position coordinates collected from continuous localization. Therefore, hand localization is a key component of any hand tracking systems. This paper presents EchoLoc, which locates the human hand by leveraging the speaker array in Commercial Off-The-Shelf (COTS) devices (i.e., a smart phone plugged with a stereo speaker). EchoLoc measures the distance from the hand to the speaker array via the Time Of Flight (TOF) of the chirp. The speaker array and hand yield a unique triangle, therefore, the hand can be localized with triangular geometry. We prototype EchoLoc on iOS as an application, and find it is capable of localization with the average resolution within five centimeters of 73% and three centimeters of 48%.
virtual garment has a wide range of application in different ***,it is difficult to construct the soft garments with rich styles,complex *** order to generate virtual garment easily,an easy-to-use 3 D garment generati...
详细信息
virtual garment has a wide range of application in different ***,it is difficult to construct the soft garments with rich styles,complex *** order to generate virtual garment easily,an easy-to-use 3 D garment generation method is proposed in this *** main contribution of our method is use the garment component assemble 3 D garment according to the requirement of consumer or designer.
Physical Unclonable Functions (PUFs) have been widely proposed as security primitives to provide device identification and authentication. Recently, PUFs based on Non-volatile Memory (NVM) are widely proposed since th...
详细信息
ISBN:
(纸本)9781467395700
Physical Unclonable Functions (PUFs) have been widely proposed as security primitives to provide device identification and authentication. Recently, PUFs based on Non-volatile Memory (NVM) are widely proposed since the promise of NVMs' wide application. In addition, NVM-based PUFs are considered to be more immune to invasive attack and simulation attack than CMOS-based PUFs. However, the existing NVM-based PUF either shows the unreliability under environmental variations or need extra modifications to the IC manufacturing process. In this work, we propose err-PUF, a novel PUF design based on the cell error rate distribution of STT-RAM. Instead of using the distribution directly, we generate a stable fingerprint based on a novel concept called Error-rate Differential Pair (EDP) without modifications to the read/write circuits. Comprehensive results demonstrate that err-PUF can achieve sufficient reliability under environmental variations, which can significantly impact the cell error rates. Moreover, compared with existing approaches, err-PUF has a higher speed and lower power consumption with negligible overhead.
A healthcare cloud is used by healthcare service providers for storing, maintaining, and backing up personal health information along with structured management of the health data across multiple healthcare providers....
详细信息
After publication of this article, the authors noticed that a N-C dimension error was unwillingly coded in the 3D NMR spectrum "***" processing script used to perform backbone assignments for this enzyme. Th...
After publication of this article, the authors noticed that a N-C dimension error was unwillingly coded in the 3D NMR spectrum "***" processing script used to perform backbone assignments for this enzyme. The authors noticed that some OBS, CAR and LAB values in the "***" had been switched in the y and z dimensions, probably resulting from a wrong NMRPipe selection when reading the Varian NMR experimental parameters. They have carefully re-processed, re-analyzed, re-assigned, in addition to checking all scripts to evaluate the extent of this processing error on the published assignments. Authors determined that the "***" error resulted in a significant number of incorrect backbone resonance assignments, requiring us to issue corrections in Figs. 2, 3 and 4 of this published manuscript, in addition to Table S1. New versions of these figures and table are provided below. The corresponding BMRB entry has also been revised. The authors note that these modifications do not change the global message, conclusions, and molecular dynamics simulations presented in this article. The authors are grateful to David N. Bernard (INRS) for help with finding and correcting these errors.
A major cause of deaths among the elderly relates to accidental falls. Such falls are of particular medical concern to this population because they often result in severe injuries, since senior citizens usually live a...
详细信息
ISBN:
(纸本)9781509021802
A major cause of deaths among the elderly relates to accidental falls. Such falls are of particular medical concern to this population because they often result in severe injuries, since senior citizens usually live alone and cannot ask for help when accidents happen. In this paper, we propose a fall detection system with the help of a Gaussian mixture background model to build the background before motion history image (MHI) is applied to analyze the fall behavior. Finally, two extra features, acceleration and angular acceleration, are proposed to more accurately determine whether a fall event has happened.
A general wireless sensor network (WSN) is a system composed of a large number of sensor nodes. In the WSN system, all sensor nodes are responsible for sensing the interested events and transmitting the related inform...
详细信息
Transient chaos is a ubiquitous phenomenon characterizing the dynamics of phase-space trajectories evolving towards a steady-state attractor in physical systems as diverse as fluids, chemical reactions, and condensed ...
详细信息
Transient chaos is a ubiquitous phenomenon characterizing the dynamics of phase-space trajectories evolving towards a steady-state attractor in physical systems as diverse as fluids, chemical reactions, and condensed matter systems. Here we show that transient chaos also appears in the dynamics of certain efficient algorithms searching for solutions of constraint satisfaction problems that include scheduling, circuit design, routing, database problems, and even Sudoku. In particular, we present a study of the emergence of hardness in Boolean satisfiability (k-SAT), a canonical class of constraint satisfaction problems, by using an analog deterministic algorithm based on a system of ordinary differential equations. Problem hardness is defined through the escape rate κ, an invariant measure of transient chaos of the dynamical system corresponding to the analog algorithm, and it expresses the rate at which the trajectory approaches a solution. We show that for a given density of constraints and fixed number of Boolean variables N, the hardness of formulas in random k-SAT ensembles has a wide variation, approximable by a lognormal distribution. We also show that when increasing the density of constraints α, hardness appears through a second-order phase transition at αχ in the random 3-SAT ensemble where dynamical trajectories become transiently chaotic. A similar behavior is found in 4-SAT as well, however, such a transition does not occur for 2-SAT. This behavior also implies a novel type of transient chaos in which the escape rate has an exponential-algebraic dependence on the critical parameter κ∼NB|α−αχ|1−γ with 0<γ<1. We demonstrate that the transition is generated by the appearance of metastable basins in the solution space as the density of constraints α is increased.
This paper extends the performance assessment of an underwater glider path planning approach recently proposed for constrained sub-mesoscale eddy border sampling conditions, for situations benefiting from extended mis...
详细信息
ISBN:
(纸本)9781509006243
This paper extends the performance assessment of an underwater glider path planning approach recently proposed for constrained sub-mesoscale eddy border sampling conditions, for situations benefiting from extended mission planning time. The aim of addressing such situations is to improve the glider vehicle capabilities through improving its off-board controller, which computes an improved trajectory for the eddy sampling task, compared to the usual rather shorter planning time. The improvement in robustness for the controller for several scenarios in this global trajectory optimization is also analyzed, together with comparison to shorter planning time for this autonomous vehicle and environmental data sampling type. As shown through results, the approach is able to provide several useful and non-intuitive solutions, improving in helpful ways. The trajectories for sub-mesoscale eddy sampling are thereby improved, in a way that might be useful for possible machine controller pondering or auto-piloting at open sea, when piloting user feedback is not available or even amidst the consecutive interruptions of user-intensive planning instructions. Managing complexity under limited resources and designing vessel navigation schedule plan under uncertain conditions within such extended mission planning time, therefore improves the mission quality as well. By optimizing trajectories with differential evolution and then visualizing them, we provide human-machine interaction for rapid knowledge discovery, data mining, and presentation of possibly large space satellite captured data sets (Big Data) analysis and exploitation.
暂无评论