In this paper an improved design of an RFID powered swallowable barometric endoradiosonde (ERS) is presented. The ERS consists of a micro fabricated capacitive sensor printed in gold on Polycaprolactone (PCL) on which...
详细信息
ISBN:
(纸本)9781479953424
In this paper an improved design of an RFID powered swallowable barometric endoradiosonde (ERS) is presented. The ERS consists of a micro fabricated capacitive sensor printed in gold on Polycaprolactone (PCL) on which a transponder chip design in 0.35μm AMS technology is in-plane bounded to the PCL substrate. The implantable or inside the body, transponder (tag) is powered by the external reader at 900MHz through inductively coupled antennas. The tag performs the capacitance to frequency conversion and transmits data back to the reader using load-shift keying (LSK) modulation. The ERS can measure the sensor output frequency with an INL error of 0.4%, sensitivity (Δf/ΔP) of -6.12MHz/kPa, occupies a volume of 1mm3 (transponder only), consumes, 400μW and 360μW for, respectively, dynamic and static power. The sensor has an accuracy of ± 0.1kPa, works in the pressure range of 0-1.99kPa (0-15mmHg). The readout circuit has a ±1.84kHz resolution.
Due to increasing number of internet users, popularity of Broadband Internet also increasing. Hence the connection cost should be decrease due to Wi Fi connectivity and built-in sensors in devices as well the maximum ...
详细信息
ISBN:
(纸本)9781509058815
Due to increasing number of internet users, popularity of Broadband Internet also increasing. Hence the connection cost should be decrease due to Wi Fi connectivity and built-in sensors in devices as well the maximum number of devices should be connected through a common medium. To meet all these requirements, the technology so called Internet of Things is evolved. Internet of Things (IoT) can be considered as a connection of computing devices like smart phones, coffee maker, washing machines, wearable device with an internet. IoT create network and connect "things" and people together by creating relationship between either people-people, people-things or things-things. As the number of device connection is increased, it increases the Security risk. Security is the biggest issue for IoT at any companies across the globe. Furthermore, privacy and data sharing can again be considered as a security concern for IoT. Companies, those who use IoT technique, need to find a way to store, track, analyze and make sense of the large amounts of data that will be generated. Few security techniques of IoT are necessary to implement to protect your confidential and important data as well for device protection through some internet security threats.
We propose a novel approach that integrates wireless, non-invasive devices with fast, real-time algorithms for large data analysis and biofeedback reaction, to discern the voluntariness of human movement through direc...
详细信息
ISBN:
(纸本)9781479953424
We propose a novel approach that integrates wireless, non-invasive devices with fast, real-time algorithms for large data analysis and biofeedback reaction, to discern the voluntariness of human movement through direct sensing of brain potentials combined with muscular action signal monitoring. The system has been tested in real situations.
作者:
Choukri DjellaliMehdi AddaMathematics
Computer Science and Engineering Dep. University of Quebec At Rimouski 300 Allée des Ursulines Rimouski QC G5L 3A1 Canada
Categorization is one of the most active research and application areas of Data Mining. In this paper, we address the problem of pattern categorization in mobile robotic computing. It is the task of automatically sort...
详细信息
Categorization is one of the most active research and application areas of Data Mining. In this paper, we address the problem of pattern categorization in mobile robotic computing. It is the task of automatically sorting a set of patterns into categories from a predefined set. Most categorization algorithms are sensitive to noise, architecture configuration, Bellman's curse of dimensionality, instability, and complex shapes. Hence, in the present study, a novel numerical scheme (RC) for pattern categorization which provides a good generalization ability with a small empirical error, is described. The experimental study with E-nose of six different MOX gas sensors is presented. Our evaluation method demonstrates the effectiveness and multidisciplinary applications of our approach.
Web applications take an important role in remote access over the Internet. These applications have many capabilities such as database access, file read/write, calculations as well as desktop applications but run in w...
详细信息
Grading of breast carcinoma plays an important role for identification of severity of the disease and prognostic treatment in histopathology. It also is one of important indicators of carcinoma patterns. In general, i...
详细信息
ISBN:
(纸本)9781509024629
Grading of breast carcinoma plays an important role for identification of severity of the disease and prognostic treatment in histopathology. It also is one of important indicators of carcinoma patterns. In general, it dep.nds on three indices: tubule formation, nuclear plemorphism, and mitotic counts by scoring based on the degrees of cell differentiation or proliferation. However, scoring on these indices often subjects to intra-and inter-observer variability due to its complexities and manual classifications by pathologists. This study aims to accurately determine the scoring of tubule formation for histological grading using a series of image processing and a classifier consisting of support vector machine with Gaussian kernel function. To demonstrate the performance of the proposed method, a number of H&E stained images acquired from biopsy tissues of patients were tested with the proposed system for the scoring. Experimental result reveals that the proposed algorithms can obtain satisfactory scoring compared to other reported works. Therefore, it can provide reliable scores in the tubule formation and grade of breast carcinoma especially for ductal carcinoma.
The use of game-based apps in e-learning has become a relevant trend with the diffusion of smart mobile devices. This is particularly true in language learning, where new captivating word games become a mean to enlarg...
详细信息
ISBN:
(纸本)9781467385800
The use of game-based apps in e-learning has become a relevant trend with the diffusion of smart mobile devices. This is particularly true in language learning, where new captivating word games become a mean to enlarge vocabulary and improve the lexical accuracy of the user. This work presents MagicWord, a game based on widely known game mechanisms, but specifically designed and developed in order to support beginners learning Italian through an A1 level e-learning course. The paper presents the design and implementation of a demo version of MagicWord, through the main challenges encountered during its creation.
One of the innovative application of the tomography process is detecting the size and the location of the grounded metal in the Lost Foam Casting (LFC). Traditional methods based on fixed sensitivity matrix for solvin...
详细信息
One of the innovative application of the tomography process is detecting the size and the location of the grounded metal in the Lost Foam Casting (LFC). Traditional methods based on fixed sensitivity matrix for solving the inverse problem are failed while the other dynamic methods for updating the sensitivity matrix are consuming time. A design of a narrow band level set method to reconstruct the interfaces between the grounded objects and the foam patterns is discussed. The level set method is a well suited method compared with the traditional pixel based image reconstruction methods for the case of the grounded metal. This method can provide more accurate solution for recovering the shape and the place of the grounded metal. Two difficult problems are associated with the ECT system for the grounded material, sensitivity matrix calculation and the shielding problem. The effect of the grounded metal on the sensitivity matrix is studied and the shielding problem is demonstrated. The final results, based on simulations, demonstrate the advantage of using the shape reconstruction method to track the shape and the location of the grounded metal in the imaging area.
Complete comprehension of loop codes is desirable for a variety of program optimizations. Compilers perform static code analyses and transformations, such as loop tiling or memory partitioning, by constructing and man...
详细信息
Complete comprehension of loop codes is desirable for a variety of program optimizations. Compilers perform static code analyses and transformations, such as loop tiling or memory partitioning, by constructing and manipulating formal representations of the source code. Runtime systems observe and characterize application behavior to drive resource management and allocation, including dep.ndence detection and parallelization, or scheduling. However, the source codes of target applications are not always available to the compiler or runtime system in an analyzable form. It becomes necessary to find alternate ways to model application behavior. This paper presents a novel mathematical framework to rebuild loops from their memory access traces. An exploration engine traverses a tree-like solution space, driven by the access strides in the trace. It is guaranteed that the engine will find the minimal affine nest capable of reproducing the observed sequence of accesses by exploring this space in a brute force fashion, but most real traces will not be tractable in this way. Methods for an efficient solution space traversal based on mathematical properties of the equation systems which model the solution space are proposed. The experimental evaluation shows that these strategies achieve efficient loop reconstruction, processing hundreds of gigabytes of trace data in minutes. The proposed approach is capable of correctly and minimally reconstructing 100% of the static control parts in PolyBench/C applications. As a side effect, the trace reconstruction process can be used to efficiently compress trace files. The proposed tool can also be used for dynamic access characterization, predicting over 99% of future memory accesses.
This paper deals with symbol-pair error channels. First, we generalize the channels to symbol-tuple error channels whose read length is D. Then, we derive a message passing algorithm for decoding LDPC codes over the g...
详细信息
This paper deals with symbol-pair error channels. First, we generalize the channels to symbol-tuple error channels whose read length is D. Then, we derive a message passing algorithm for decoding LDPC codes over the generalized channels. Furthermore, we investigate the Hamming distance distributions of LDPC codes in terms of D symbol-tuple metric.
暂无评论