The continuing pervasion of our society with safety-critical cyber-physical systems not only demands for adequate (risk) analysis, testing and verification techniques, it also generates growing experience on their use...
详细信息
The continuing pervasion of our society with safety-critical cyber-physical systems not only demands for adequate (risk) analysis, testing and verification techniques, it also generates growing experience on their use, which can be considered as important as the tools themselves for their efficient use. This paper introduces workflow patterns to describe such best practices in a systematic way that efficiently represents this knowledge, and also provides a way to relate different patterns, making them easier to identify and use, and cover as wide a range of experiences as possible. The value of the approach is demonstrated using some pattern examples from a collection developed in the Artemis-project MBAT. Finally, the paper presents a wiki-based approach for developing and maintaining the pattern collection.
Mobile phones allow us to reach people anywhere, at anytime. In addition to the benefits for end users, researchers and developers can also benefit from the powerful devices that participants carry on a daily basis. C...
详细信息
This study addresses the removal of electrocardiogram pulses (ECG) from surface electromyography signals (sEMG) in wireless sEMG electrodes. We describe a wavelet-compression inspired filtering technique in order to m...
详细信息
This study addresses the removal of electrocardiogram pulses (ECG) from surface electromyography signals (sEMG) in wireless sEMG electrodes. We describe a wavelet-compression inspired filtering technique in order to minimize the computational complexity required in wireless sEMG electrodes while providing higher filtering performance than when with standard means. Using semi-artificially prepared signals, we show that the discrete wavelet transform (DWT) enables a partial separation between the sEMG and ECG signals in time domain. Then, only the highly overlapped parts are fed into an adaptive noise cancellation (ANC) structure for lower computational complexity filtering. The simulation results confirm the improved noise rejection and the gain in computational complexity obtained with the proposed method.
With the enormous growth of digital content in internet, various types of online reviews such as product and movie reviews present a wealth of subjective information that can be very helpful for potential users. Senti...
详细信息
In this paper, we propose a kernel estimation algorithm using fast best kernel retrieval (FBKR) from spectral irregularities to achieve the deblurring. In daily life, when people take a photograph by any kinds of came...
详细信息
In this paper, we propose a kernel estimation algorithm using fast best kernel retrieval (FBKR) from spectral irregularities to achieve the deblurring. In daily life, when people take a photograph by any kinds of camera equipment, image motion blur caused by camera motion often happens. Camera motion during exposure will produce a blurred image, this kind of blur is often non-liner mode. Motion blur always causes the decline of image quality, as long as the users using the hand-held photography equipment often have a similar experience. Based on this reason, reconstructing a clear image from blurred image is the main objective in this paper. Reconstruction is an ill-pose problem. In current motion blur estimation algorithms, these algorithms usually use the recursive method to estimate motion blur kernel. However, recursive process is quite time-consuming. In order to enhance time-consuming, in this paper, based on iterative phase retrieval algorithm and normalized sparsity measure, we propose a fast and effective blur kernel retrieval algorithm, which can find the best kernel in a short time. Experiments verify that our method can effectively reduce the execution time and obtain the best motion blur kernel to deblur a deblurred image and keep the quality of image deblurring.
Automatic image annotation is an important and challenging task when managing large image collections. In this paper, we present an incremental approach for shape labeling, which is useful to image annotation when new...
详细信息
Necrotising Enterocolitis (NEC) is a devastating intestinal disease associated with high rate of mortality and long-term morbidity. It can be successfully treated if diagnosed early, but there is no reliable way to de...
详细信息
We developed a highly functional untethered micro-robot that can manipulate cells with high gripping force in a micro-fluidic chip. The robot has gripping mechanism which is actuated by magnetic power. A permanent mag...
详细信息
ISBN:
(纸本)9781632666246
We developed a highly functional untethered micro-robot that can manipulate cells with high gripping force in a micro-fluidic chip. The robot has gripping mechanism which is actuated by magnetic power. A permanent magnet is attached at the center of the gripping mechanism, and an electrical magnet controls the position of the magnet from the bottom of the micro-fluidic chip. The open-close accuracy of the gripper is about 3.0 μm. We succeeded in cutting of zona pelucida of oocyte and enucleation by using this micro-robot.
We consider the problem of secure communications in a Gaussian two-way relay network where two nodes exchange confidential messages only via an untrusted relay. The relay is assumed to be honest but curious, i.e., an ...
详细信息
We consider the problem of secure communications in a Gaussian two-way relay network where two nodes exchange confidential messages only via an untrusted relay. The relay is assumed to be honest but curious, i.e., an eavesdropper that conforms to the system rules and applies the intended relaying scheme. We analyze the achievable secrecy rates by applying network coding on the physical layer or the network layer and compare the results in terms of complexity, overhead, and efficiency. Further, we discuss the advantages and disadvantages of the respective approaches.
Large open and closed source organizations like Google, Facebook and Mozilla are migrating their products towards rapid releases. While this allows faster time-to-market and user feedback, it also implies less time fo...
详细信息
ISBN:
(纸本)9781467352185
Large open and closed source organizations like Google, Facebook and Mozilla are migrating their products towards rapid releases. While this allows faster time-to-market and user feedback, it also implies less time for testing and bug fixing. Since initial research results indeed show that rapid releases fix proportionally less reported bugs than traditional releases, this paper investigates the changes in software testing effort after moving to rapid releases. We analyze the results of 312,502 execution runs of the 1,547 mostly manual system level test cases of Mozilla Fire fox from 2006 to 2012 (5 major traditional and 9 major rapid releases), and triangulated our findings with a Mozilla QA engineer. In rapid releases, testing has a narrower scope that enables deeper investigation of the features and regressions with the highest risk, while traditional releases run the whole test suite. Furthermore, rapid releases make it more difficult to build a large testing community, forcing Mozilla to increase contractor resources in order to sustain testing for rapid releases.
暂无评论