Human activity can be measured with actimetry sensors used by the subjects in several locations such as the wrists or legs. Actigraphy data is used in different contexts such as sports training or tele-medicine monito...
详细信息
Human activity can be measured with actimetry sensors used by the subjects in several locations such as the wrists or legs. Actigraphy data is used in different contexts such as sports training or tele-medicine monitoring. In the diagnosis of sleep disorders, the actimetry sensor, which is basically a 3D axis accelerometer, is used by the patient in the non dominant wrist typically during an entire week. In this paper the actigraphy data is described by a weighted mixture of two distributions where the weight evolves along the day according to the patient circadian cycle. Thus, one of the distributions is mainly associated with the wakefulness state while the other is associated with the sleep state. Actigraphy data, acquired from 20 healthy patients and manually segmented by trained technicians, is used to characterize the acceleration magnitude during sleep and wakefulness states. Several mixture combinations are tested and statistically validated with conformity measures. It is shown that both distributions can co-exist at a certain time with varying importance along the circadian cycle.
In this paper, we derive the impulse response of the fractional distributed order low-pass filters. Based on the derived analytical impulse response, a method on how to perform the discretization of the above distribu...
详细信息
In this paper, we derive the impulse response of the fractional distributed order low-pass filters. Based on the derived analytical impulse response, a method on how to perform the discretization of the above distributed order low-pass filters is presented. Time and frequency domains illustrations are provided.
A dynamic simulation method for non-linear systems based on genetic programming (GP) and bond graphs (BG) was developed to improve the design of nonlinear multi-domain energy conversion systems. The genetic operat...
详细信息
A dynamic simulation method for non-linear systems based on genetic programming (GP) and bond graphs (BG) was developed to improve the design of nonlinear multi-domain energy conversion systems. The genetic operators enable the embryo bond graph to evolve towards the target graph according to the fitness function. Better simulation requires analysis of the optimization of the eigenvalue and the filter circuit evolution. The open topological design and optimized convergence for the operation, but also the design of nonlinear multi-domain systems. space search ability of this method not only gives a more reduces the generation time for the new circuit graph for
Most traditional alarm systems cannot address security threats in a satisfactory manner. To alleviate this problem, we developed a high-confidence cyber-physical alarm system (CPAS), a new kind of alarm systems. This ...
详细信息
ISBN:
(纸本)9781424497799
Most traditional alarm systems cannot address security threats in a satisfactory manner. To alleviate this problem, we developed a high-confidence cyber-physical alarm system (CPAS), a new kind of alarm systems. This system establishes the connection of the Internet (i.e. TCP/IP) through GPRS/CDMA/3G. It achieves mutual communication control among terminal equipments, human machine interfaces and users by using the existing mobile communication network. The CPAS will enable the transformation in alarm mode from traditional one-way alarm to two-way alarm. The system has been successfully applied in practice. The results show that the CPAS could avoid false alarms and satisfy residents' security needs.
Automatical verification of time sensitive protocols is a difficult research topic in formal analyses, with the key problem being how to simply and efficiently check time constraints led by time stamps. TSPVT, which a...
详细信息
Automatical verification of time sensitive protocols is a difficult research topic in formal analyses, with the key problem being how to simply and efficiently check time constraints led by time stamps. TSPVT, which automatically verifies time sensitive protocols, was developed from the SPVT(security protocol verifying tool) in the Objective Caml language. TSPVT takes time sensitive protocols in an extended π-like calculus model with time events as its input model, then translates the π-like calculus model into a Horn logic model P extended by the time constraint system. The Horn logic model P is composed of a set of rules for honest participants as well as another set of rules for attackers. In the verification period, TSPVT computes the fix point of P when the tool needs to process the X-resolution among rules within the time constraint system and then verifies the authentication of the protocol based on the fixed point. A simplified description of the verification process using TSPVT is given in detail using the Denning-Sacco protocol as an example, with the results showing the validity of the verifier.
This work presents a (numerical) technique to the local stability analysis of feedback linearizing control schemes for a class of uncertain nonlinear systems. A nonlinear decomposition of vector functions is applied t...
This work presents a (numerical) technique to the local stability analysis of feedback linearizing control schemes for a class of uncertain nonlinear systems. A nonlinear decomposition of vector functions is applied to transform the Lyapunov stability conditions into a set of state-and parameter-dependent LMI (linear matrix inequality) constraints, which are numerically solved in a finite set of points. The proposed method can deal with a large class of nonlinear systems as well as very complex Lyapunov function candidates. In addition, a maximized level set of the Lyapunov function is proposed as an estimate of the system stability region.
It my great pleasure and honor to welcome you to FoSER 2010: The FSE/SDP Workshop on the Future of Software engineering Research. This workshop was organized in collaboration with and made possible by generous support...
详细信息
ISBN:
(纸本)9781450304276
It my great pleasure and honor to welcome you to FoSER 2010: The FSE/SDP Workshop on the Future of Software engineering Research. This workshop was organized in collaboration with and made possible by generous support from the Software Design and Productivity Coordinating Group (SDP) of the U.S. National Coordination Office (NCO) for Networking and Information Technology Research and Development (NITRD), and the National science Foundation (NSF). This one-time, international working conference has brought together top academic and industrial researchers and government research funding agency personnel from around the world to engage in an extended discussion of consequential new ideas about the future of our field. The ideas produced by this workshop will be disseminated in two forms. First, the position papers accepted by the program committee will be published in a companion to the Proceedings of FSE-18. Second, the workshop findings will be published subsequently in a special report by NITRD/SDP. The call for papers for FoSER 2010 solicited 4-page position papers with new ideas about the future of software and software-reliant systems, and the research that will be needed to meet future needs. Papers were expected to be creative and thought-provoking, and to articulate compelling new perspectives, positions, problem formulations, assumptions and approaches. The workshop did not seek, and did not accept, technical research papers or abstracts. The workshop received a total of 139 position papers. Of these, 90 papers (65%) were accepted. Each paper was reviewed by at least two members of the workshop program committee. The committee was asked to accept all papers presenting significant new ideas about how our field should move forward. Copyright 2010 ACM.
This paper is concerned with understanding the connection between the existing Internet congestion control algorithms and the optimal control theory. The available resource allocation controllers are mainly devised to...
详细信息
ISBN:
(纸本)9781424458363
This paper is concerned with understanding the connection between the existing Internet congestion control algorithms and the optimal control theory. The available resource allocation controllers are mainly devised to derive the state of the system to a desired equilibrium point and, therefore, they are oblivious to the transient behavior of the closed-loop system. To take into account the real-time performance of the system, rather than merely its steady-state performance, the congestion control problem should be solved by maximizing a proper utility functional as opposed to a utility function. For this reason, this work aims to investigate what utility functionals the existing congestion control algorithms maximize. In particular, it is shown that there exist meaningful utility functionals whose maximization leads to the celebrated primal, dual and primal/dual algorithms. An implication of this result is that a real network problem may be solved by regarding it as an optimal control problem on which some practical constraints, such as a real-time link capacity constraint, are imposed.
Extracting or estimating skeletal hand/finger forces using surface electro myographic (sEMG) signals poses many challenges due to cross-talk, noise, and a temporal and spatially modulated signal characteristics. Norma...
详细信息
Extracting or estimating skeletal hand/finger forces using surface electro myographic (sEMG) signals poses many challenges due to cross-talk, noise, and a temporal and spatially modulated signal characteristics. Normal sEMG measurements are based on single sensor data. In this paper, array sensors are used along with a proposed sensor fusion scheme that result in a simple Multi-Input-Single-Output (MISO) transfer function. Experimental data is used along with system identification to find this MISO system. A Genetic Algorithm (GA) approach is employed to optimize the characteristics of the MISO system. The proposed fusion-based approach is tested experimentally and indicates improvement in finger/hand force estimation.
The generating rule method is presented for incompatible and incomplete information of test data based on Bayesian theory. Firstly, the rule's conditional probability is calculated when the certainty (reliability)...
详细信息
The generating rule method is presented for incompatible and incomplete information of test data based on Bayesian theory. Firstly, the rule's conditional probability is calculated when the certainty (reliability) of the test data is the prior probability and the samples (supportability) is posterior probability. Then, Those rules whose conditional probability is bigger than a given threshold value should be preserved. Lastly, the rule is generated by logic conjunction and disjunction of all the preserved rules. The example and application analysis indicate that the algorithm is clear, the calculating process is simple and it can be easily applied to computer programs, moreover, this method can avoid the knowledge distortion and the rule losing to the maximum for generating rule.
暂无评论