Alongside multitude of innovations and consequential changes in lifestyle, the ability to access home appliances or security cameras over the Internet has been in demand for some years now. In this paper, we propose a...
详细信息
In this study, we design and present the novel wearable system with the interactive posture caption and recognition functions based on the non-vision over the ZigBee wireless sensor network (ZigBee-WSN). There are two...
详细信息
In this study, we design and present the novel wearable system with the interactive posture caption and recognition functions based on the non-vision over the ZigBee wireless sensor network (ZigBee-WSN). There are two type sensors, 3-axis accelerometer and clip type, to be employed in our wearable system. These sensors are arranged on user's four limbs such that the posture information can be gathered by them. Then, the posture information is transmitted to the data-controlling center over ZigBee-WSN. Finally, this center can analyze and distinguish various postures by our proposed algorithm through the friend user's interface to express. Our presented wearable system can distinguish out 28 kinds of hand postures and 13 kinds of leg postures altogether. Moreover, under our presented ZigBee-WSN system with small size, low-power consumption, and high-reliability characteristics, the data-controlling center can simultaneously tele-monitor the real-time body interactive postures of 8 persons, when the transmitting distance is less than 18 M and the package correct transmitted rate is more than 97.5%.
Handling full permutations of the candidate list along with re-encryption mixes is rather difficult in Prêt à Voter but handling cyclic shifts is straightforward. One of the versions of Prêt à Vote...
详细信息
We review lexical Association Measures (AMs) that have been employed by past work in extracting multiword expressions. Our work contributes to the understanding of these AMs by categorizing them into two groups and su...
详细信息
Uncertain and incomplete requirements throughout the whole software life cycle contribute to volatility of the requirements. In a situation where the volatile requirement is changed to satisfy stakeholder needs, all t...
详细信息
ISBN:
(纸本)9780769539096
Uncertain and incomplete requirements throughout the whole software life cycle contribute to volatility of the requirements. In a situation where the volatile requirement is changed to satisfy stakeholder needs, all the affected requirements and other impacted software artefacts (such as designs, codes, and tests) must be identified and changed accordingly. This paper introduces an approach to facilitate both engineers and users in propagating changes from requirements to the software high-level designs during software development and evolution. The two main pillars of this approach, namely product metamodel and process model are described in details. Firstly, the metamodel highlights on explicit conceptual model for volatile requirement and its characteristics. Next, the focus will be placed on the systematic process model specified using the SPEM that offers guidelines to perform the requirement change process. The applicability of the product metamodel and its elements are evaluated using the IFAMMS case study application.
This paper describes an automated technique for protecting portable executable files used in Windows NT Platform. The proposed technique mainly works on Portable Executable format for 32-bit applications. The paper de...
详细信息
ISBN:
(纸本)9781424458424
This paper describes an automated technique for protecting portable executable files used in Windows NT Platform. The proposed technique mainly works on Portable Executable format for 32-bit applications. The paper describes the PE format illustrating its main structures followed by an overview on existing protection techniques, and then it illustrates the proposed technique used in packing the PE file in order to protect it against disassembling and reverse engineering. The protection technique involves a static operation on the file reversed by a dynamic one during the run-time. The static and the dynamic operations provide a combined solution for software protection against static (Automatic) and dynamic reverse engineering. The paper studies the effect of protection on the performance and provides a solution to enhance the results. The paper finally proposes a model to integrate the proposed technique with a license management system (LMS) and to manage the digital rights (DRM).
Plagiarism is the practice of claiming, or implying, original authorship or incorporating material from someone else's written or creative work, in whole or in part, into one's own without adequate acknowledge...
详细信息
In this paper, the authors present a complex calculation algorithm for dimensioning the earthing installation of a substation. There are also presented the own conception calculation program developed in the Visual Ba...
In this paper, the authors present a complex calculation algorithm for dimensioning the earthing installation of a substation. There are also presented the own conception calculation program developed in the Visual Basic programming environment, and a comparative analysis of the results got within a case study, after running the program for two variants of fitting out a substation.
Generalization of web sessions is an effective approach used to overcome two major challenges in web usage mining, namely quality and scalability. Given a concept hierarchy, such as a website, generalization replaces ...
详细信息
ISBN:
(纸本)9781605588087
Generalization of web sessions is an effective approach used to overcome two major challenges in web usage mining, namely quality and scalability. Given a concept hierarchy, such as a website, generalization replaces actual page-clicks with their general concepts, i.e., nodes at higher levels. Presently known methods do this by choosing a level in the hierarchy, below which all the nodes are generalized to nodes at this level. The problem with this is that significant items may be coalesced, and insignificant ones may be retained. We present a usage driven generalization algorithm, which coalesces less significant pages into more general ones, independent of their level in the hierarchy. Based on actual usage set of sessions, item significance is estimated approximately but fast, using a small stratified sample of the large dataset. While providing scalability, the proposed generalization technique results in improved efficiency and quality of the discovered usage model, demonstrated through numerous experiments in our work. Copyright 2009 ACM.
暂无评论