The two-thirds power law, an empirical law stating an inverse non-linear relationship between the tangential hand speed and the curvature of its trajectory during curved motion, is widely acknowledged to be an invaria...
The two-thirds power law, an empirical law stating an inverse non-linear relationship between the tangential hand speed and the curvature of its trajectory during curved motion, is widely acknowledged to be an invariant of upper-limb movement. It has also been shown to exist in eye-motion, locomotion and was even demonstrated in motion perception and prediction. This ubiquity has fostered various attempts to uncover the origins of this empirical relationship. In these it was generally attributed either to smoothness in hand- or joint-space or to the result of mechanisms that damp noise inherent in the motor system to produce the smooth trajectories evident in healthy human *** show here that white Gaussian noise also obeys this power-law. Analysis of signal and noise combinations shows that trajectories that were synthetically created not to comply with the power-law are transformed to power-law compliant ones after combination with low levels of noise. Furthermore, there exist colored noise types that drive non-power-law trajectories to power-law compliance and are not affected by smoothing. These results suggest caution when running experiments aimed at verifying the power-law or assuming its underlying existence without proper analysis of the noise. Our results could also suggest that the power-law might be derived not from smoothness or smoothness-inducing mechanisms operating on the noise inherent in our motor system but rather from the correlated noise which is inherent in this motor system.
Data mining provides the opportunity to extract useful information from large databases. Various techniques have been proposed in this context in order to extract this information in the most efficient way. However, e...
详细信息
ISBN:
(纸本)1581139683
Data mining provides the opportunity to extract useful information from large databases. Various techniques have been proposed in this context in order to extract this information in the most efficient way. However, efficiency is not our only concern in this study. The security and privacy issues over the extracted knowledge must be seriously considered as well. By taking this into consideration, we study the procedure of hiding sensitive association rules in binary data sets by blocking some data values and we present an algorithm for solving this problem. We also provide a fuzzification of the support and the confidence of an association rule in order to accommodate for the existence of blocked/unknown values. In addition, we quantitatively compare the proposed algorithm with other already published algorithms by running experiments on binary data sets, and we also qualitatively compare the efficiency of the proposed algorithm in hiding association rules. We utilize the notion of border rules, by putting weights in each rule, and we use effective data structures for the representation of the rules so as (a) to minimize the side effects created by the hiding process and (b) to speed up the selection of the victim transactions. Finally, we discuss the advantages and the limitations of blocking. Copyright 2004 ACM.
E-Learning has become a serious discipline in IT supported management with the aim of enabling life-long learning. Unfortunately, E-Learning is a bottom-up based technical approach and the vision of life-long learning...
详细信息
This paper addresses issues that are specific to the implementation of automatic speech recognition (ASR) applications and services in client-server scenarios. It is assumed in all of these scenarios that functionalit...
详细信息
This paper addresses issues that are specific to the implementation of automatic speech recognition (ASR) applications and services in client-server scenarios. It is assumed in all of these scenarios that functionality in a human-machine dialog system is distributed between mobile client devices and network based multi-user media and application servers. It is argued that, while there has already been a great deal of research addressing issues relating to the communications channels associated with these scenarios, there are many additional problems that have received relatively little attention. These include issues of how environmental and speaker robustness algorithms are implemented in mobile domains and how multiple ASR channels can be implemented more efficiently in multi-user deployments. Preliminary results are summarized showing the effect of user specific unsupervised adaptation and normalization algorithms on ASR performance in mobile domains. Results are also presented demonstrating the efficiencies that are obtainable from using intelligent algorithms for assigning ASR decoders to computation servers in multi-user deployments.
To obtain high dynamic range or hyperspectral images, multiple frames of the same field of view are acquired while the imaging settings are modulated;images are taken at different exposures or through different wavele...
详细信息
To obtain high dynamic range or hyperspectral images, multiple frames of the same field of view are acquired while the imaging settings are modulated;images are taken at different exposures or through different wavelength bands. A major problem associated with such modulations has been the need for perfect synchronization between image acquisition and modulation control. In the past, this problem has been addressed by using sophisticated servo-control mechanisms. In this work, we show that the process of modulation imaging can be made much simpler by using vision algorithms to automatically relate each acquired frame to its corresponding modulation level. This correspondence is determined solely from the acquired image sequence and does not require measurement or control of the modulation. The image acquisition and the modulation work continuously, in parallel, and independently. We refer to this approach as computational synchronization. It makes the imaging process simple and easy to implement. We have developed a prototype modulation imaging system that uses computational synchronization and used it to acquire high dynamic range and multispectral images.
Java has been recognized as an attractive language and platform to program embedded systems. It's not appropriate to apply class files in Standard Java to Embedded Java with the memory and processor limitation of ...
详细信息
ISBN:
(纸本)0780383397
Java has been recognized as an attractive language and platform to program embedded systems. It's not appropriate to apply class files in Standard Java to Embedded Java with the memory and processor limitation of Embedded Java. In this paper, we propose an efficient method that can reduce execution time by using pre-resolution to convert symbolic references information to real addresses before executing of bytecode in target device. We examined 13 class files to know the sizes of the constant pool elements in the class file. Our pre-resolution, it reduces the overall memory footprint to about 87% of their original size. Additionally, it reduces a reference count of memory.
Through this paper, an automatic P-wave arrival detection and picking algorithm is introduced. This algorithm is based on the power of the different frequencies in the seismic data. The algorithm depends on checking t...
详细信息
In biology, manipulating a micro-scale object such as chromosome, nucleus or embryo has been an important issue. For inst.nce, skillful manipulation of the embryo cell in the biological experiment requires many years ...
详细信息
ISBN:
(纸本)3540220070
In biology, manipulating a micro-scale object such as chromosome, nucleus or embryo has been an important issue. For inst.nce, skillful manipulation of the embryo cell in the biological experiment requires many years experience with a complex setup. Moreover, such process is usually very slow and requires many hours of intense operations such as trying to find the position of the cell within a petri dish and injecting a pipette to the cell from the best orientation. We have designed a new vision system, by which it finds the region of the mouse embryo cell, and then tracks the nucleus and the polar body within the cell, respectively, using the deformable template algorithm. Performance of the system is compared to the manual case.
Optimal puncturing ratios for parallel concatenated codes with two or more constituent codes are found using extrinsic information transfer functions. These ratios minimise the signal-to-noise ratio convergence thresh...
详细信息
Optimal puncturing ratios for parallel concatenated codes with two or more constituent codes are found using extrinsic information transfer functions. These ratios minimise the signal-to-noise ratio convergence threshold and provide additional degrees of freedom for constructing codes with low thresholds over a wide range of code rates.
暂无评论