Smart phone application development is a very active field for both research and the market domain. This paper investigates the application of ICONIX, a use case driven, object-oriented (OO) analysis and design method...
详细信息
Smart phone application development is a very active field for both research and the market domain. This paper investigates the application of ICONIX, a use case driven, object-oriented (OO) analysis and design methodology, for the development of a smart phone personal assistant. It also studies the integration of hand-held haptic devices in daily work activities by evaluating the usability of the application using as basis test scenarios deriving from the identified use cases. The Tennis Coaching Assistant (TCA) is an iPhone application that provides management and scheduling capabilities for tennis coaches and allows a comprehensive overview of the execution of on-court drills and coaching programs. The use of ICONIX made analysis and design keep a sharp focus on user requirements, assured design and coding documentation, fostered an excellent communication among all participants and stake holders and provided the crucial advantage of high reusability in case of implementing the same application for additional smart phone platforms. The paper also describes the usability evaluation methodology applied and documents the results focusing on interaction difficulties and practical obstacles reported by the users as well as suggestions for future versions of the application, which generally received quite positive feedback.
We introduce an (equi-)affine invariant geometric structure by which surfaces that go through squeeze and shear transformations can still be properly analyzed. The definition of an affine invariant metric enables us t...
详细信息
The specific relationships between the classical pole-placement state feedback, the RICCATI equation based LQ paradigm and the KALMAN frequency domain approach are discussed. It is shown that arbitrary pole placement ...
详细信息
ISBN:
(纸本)9780889869226
The specific relationships between the classical pole-placement state feedback, the RICCATI equation based LQ paradigm and the KALMAN frequency domain approach are discussed. It is shown that arbitrary pole placement is not possible by standard LQ optimality. A possible solution of this anomaly is to use more general LQ criterion with specific weights on the state, input and crossterm.
The control error in a generic two-degree of freedom (TDOF) control system can be decomposed into three major parts: design-, realizability- and modeling-loss. This new decomposition opens useful ways for practical op...
详细信息
ISBN:
(纸本)9780889869226
The control error in a generic two-degree of freedom (TDOF) control system can be decomposed into three major parts: design-, realizability- and modeling-loss. This new decomposition opens useful ways for practical optimization of TDOF systems and helps the construction of new algorithms for robust identification and control. The paper investigates the optimality of the third term.
In ubiquitous computing, data should be able to be accessed from any location, and the correctness of data becomes vital during the communication. Suppose that many users sign different messages respectively, before f...
详细信息
In ubiquitous computing, data should be able to be accessed from any location, and the correctness of data becomes vital during the communication. Suppose that many users sign different messages respectively, before forwarding or sending these messages, then the verifier must spend a lot of computing time to verify their signatures. Consequently, the aggregate signature scheme is an effective method of improving efficiency in this kind of systems, which provides the convenience for the verifier. In this paper, we propose a new certificateless aggregate signature scheme which is efficient in generating a signature and verification. This scheme is provably secure under the extended computational Diffie-Hellman assumption.
The aim of the ERAMIS project is to create a Master degree computer as a Second Competence in 9 beneficiary universities of Kazakhstan, Kyrgyzstan and Russia. This contribution presents how faculty development is orga...
详细信息
The IT industry has been focusing for several years on providing to users and designers the possibility of creating software applications disregarding hardware resources. Multi-processor architectures seem to be more ...
详细信息
The IT industry has been focusing for several years on providing to users and designers the possibility of creating software applications disregarding hardware resources. Multi-processor architectures seem to be more of interest in recent developments because of their capacity to exploit programmable parallelism at acceptable costs without posing severe software designing problems. But in any thinkable scenario, software will always be dependent on the hardware it is executing on. In another matter of speaking, hardware performances will always affect software's ability in providing results. There is also the question if the gathered results are correct or not, if the system that provides them is fast, safe and if it is a reliable and a maintainable one. This paper proposes a scalable architecture surrounding a single core microprocessor with the purpose of increasing computational speed and reliability. For achieving this, a flexible hardware platform would be appropriate, e.g. field programmable gate arrays (FPGAs). The single core system will revolve around a Picoblaze soft-core microprocessor. By generating a series of modules with the same functionality as the executing software, an N-module redundancy system will increase systems security and reliability.
Reversible data embedding is becoming a very important issue in securing images transmitted over the Internet, especially in dealing with sensitive images such as those created for military data and medical data. Base...
详细信息
Reversible data embedding is becoming a very important issue in securing images transmitted over the Internet, especially in dealing with sensitive images such as those created for military data and medical data. Based on the relationships between pixels and their neighbors, we propose a reversible data embedding scheme to embed hidden messages into an original image. In our proposed scheme, a two-layer data embedding approach is used for our proposed data embedding phase. Layer-1 embedding is used to hide secret data. Layer-2 embedding, which is an embedding variant of the proposed layer-1 embedding, is used to hide side information, such as the parameters required to restore the marked image. In our layer-1 embedding, the value of an embedded pixel is determined according to a predetermined threshold and the relationship between the pixel and its neighbors. In our layer-2 embedding, the similar data embedding concept is expanded to the block-based. Experimental results provide supportive data to show that the proposed scheme can provide greater hiding capacity while preserving the image quality of a marked image in comparison with previous work.
The aim of the ERAMIS project is to set up a network of Master's degree informatics as a Second Competence among 9 beneficiary universities of Kazakhstan, Kyrgyzstan and Russia, and 5 European universities. This c...
详细信息
This article is focused on the utilisation of force, specifically the impulse of force in self-defence. It also points out the fact that this field suffers from a great shortage of specialised measurements and experim...
详细信息
暂无评论