Patient monitoring is a very critical function carried out in health care facilities on a daily basis. This is normally done manually and or by Wireless Body Sensor Networks (WBSN) which are physically monitored by me...
详细信息
In this paper, the event-based finite-horizon filtering problem is investigated for discrete time-varying systems. For the purpose of reducing communication, a general event generator is employed to determine the even...
详细信息
In this paper, the event-based finite-horizon filtering problem is investigated for discrete time-varying systems. For the purpose of reducing communication, a general event generator is employed to determine the event time instant and then transmit the measurement output to the remote time-varying filter. By utilizing the stochastic analysis techniques, sufficient conditions are derived for a finite-horizon filter to satisfy the prescribed H ∞ performance requirement. These conditions are expressed in terms of the feasibility of a series of recursive linear matrix inequalities. The effectiveness of the proposed filter design scheme is illustrated by a numerical simulation.
Real-time sound rendering applications are memory-intensive and computation-intensive. To speed up computation and extend the simulated area, a real-time sound rendering system based on the hardware-oriented finite di...
详细信息
The concept of code smells is widespread in software Engineering. Despite the empirical studies addressing the topic, the set of context-dependent issues that impacts the human perception of what is a code smell has n...
The concept of code smells is widespread in software Engineering. Despite the empirical studies addressing the topic, the set of context-dependent issues that impacts the human perception of what is a code smell has not been studied in depth. We call this the code smell conceptualization problem. To discuss the problem, empirical studies are necessary. In this work, we focused on conceptualization of god class. God class is a code smell characterized by classes that tend to centralize the intelligence of the system. It is one of the most studied smells in software engineering literature. A controlled experiment that extends and builds upon a previous empirical study about how humans detect god classes, their decision drivers, and agreement rate. Our study delves into research questions of the previous study, adding visualization to the smell detection process, and analyzing strategies of detection. Our findings show that agreement among participants is low, which corroborates previous studies. We show that this is mainly related to agreeing on what a god class is and which thresholds should be adopted, and not related to comprehension of the programs. The use of visualization did not improve the agreement among the participants. However, it did affect the choice of detection drivers. This study contributes to expand empirical evidences on the impact of human perception on detecting code smells. It shows that studies about the human role in smell detection are relevant and they should consider the conceptualization problem of code smells.
This article presents two proposals in order to solve the problem of choosing the best access network available in the environment where the user is located. One based on a combination of fuzzy logic technique with tw...
详细信息
ISBN:
(纸本)9781479932177
This article presents two proposals in order to solve the problem of choosing the best access network available in the environment where the user is located. One based on a combination of fuzzy logic technique with two decision-making methods, AHP (Analytic Hierarchy Process) and GRA (Grey Relation Analysis), and the other based only on fuzzy logic technique. In order to demonstrate the effectiveness of these proposals, they were compared with a third one, of the authors in [71, which uses a combination of AHP method with a cost function. The obtained results show that the two proposals presented in this paper are more efficient in sorting and selecting the best access network when compared to the third.
Node influence is yet another useful concept to quantify how important each node is over a network and can share the same role that other centrality measures have. It can provide new insight into the information diffu...
详细信息
Node influence is yet another useful concept to quantify how important each node is over a network and can share the same role that other centrality measures have. It can provide new insight into the information diffusion phenomena such as existence of epidemic threshold which the other topology-based centralities cannot do. We focus on information diffusion process based on the SIR model, and address the problem of efficiently estimating the influence degree for all the nodes in the network. The proposed approach is a further improvement over the existing work of the bond percolation process [1], [2] which was demonstrated to be very effective, i.e., three orders of magnitude faster than direct Monte Carlo simulation, in approximately solving the influence maximization problem under a greedy search strategy. We introduce two pruning techniques which improve computational efficiency by an order of magnitude. This is a generic approach for the SIR model setting and can be instantiated to any specific diffusion model. It does not require any approximations or assumptions to the model, e.g., small diffusion probability, shortest path, maximum influence path, etc., that were needed in the existing approaches. We demonstrate its effectiveness by extensive experiments on two large real social networks. Main finding includes that different network structures have different epidemic thresholds and the node influence can identify influential nodes that the other centrality measures cannot.
Cloud computing is a novel computing paradigm that utilizes remote cloud resources to achieve a high-performance *** provides infrastructure,platform and software as different on-demand *** has made remarkable progres...
详细信息
Cloud computing is a novel computing paradigm that utilizes remote cloud resources to achieve a high-performance *** provides infrastructure,platform and software as different on-demand *** has made remarkable progress in cloudbased products and operating system *** government,enterprises and research institutions are all active in the development of cloud computing-related *** the progress,many important
The detection of a specific social event requires for high semantic understanding in the interpretation of particular event characteristics such as its type and location. In many cases, photos capturing different even...
详细信息
The search and rescue operation is an increasingly important Internet of Things (IoT) application in which the resource-constrained things play the rescue role. Recently, more and more countries/organizations particip...
详细信息
The search and rescue operation is an increasingly important Internet of Things (IoT) application in which the resource-constrained things play the rescue role. Recently, more and more countries/organizations participate in a rescue task. To make the task more effective, they should share their information with each other but different countries have assorted sharing policies. Our investigation shows that access control systems for current search and rescue operations are either coarse-grained or computationally heavy. It cannot satisfy the rescue operations since those things demand lightweight cryptographic operations and the participating countries require flexible policies to protect their classified data. We propose a fine-grained access control system which is not only secure but also efficient. The practical experiments are conducted and its results demonstrate the lightweight cost in simulation.
Traditional mass production of cell phone manufacturers can not meet customer requirements and market competition needs. Mass customization becomes a main production mode. This paper introduce a mass customization mod...
详细信息
ISBN:
(纸本)9781479960590
Traditional mass production of cell phone manufacturers can not meet customer requirements and market competition needs. Mass customization becomes a main production mode. This paper introduce a mass customization mode for cell phone which has a lot of advantages such as reasonable cost, high quality, customized products, high efficiency, short product life cycle and so on. Under this model, this paper also uses an order schedule method to find an optimal solution of sorting orders, improving the production efficiency. The result has a larger improvement than processing orders one by one.
暂无评论