Target localization and tracking problems in Wireless Sensor Networks (WSNs) have received considerable attention recently, driven by the need to achieve high localization accuracy, with the minimum cost possible. A w...
详细信息
Target localization and tracking problems in Wireless Sensor Networks (WSNs) have received considerable attention recently, driven by the need to achieve high localization accuracy, with the minimum cost possible. A wide range of proposed approaches regarding the localization area have emerged, however most of them suffer from either requiring an extra sensor, high power consumption, inaccessible indoors, or offer high localization error. This paper presents a research and development of a hybrid WSN tracking system using the Received Signal Strength Indicator (RSSI) and the inertial system. The proposed system is an efficient indoors, where it offers reasonable localization accuracy (0.1 - 0.7) meters, and achieves low power consumption. A number of real experiments have been conducted to test the efficiency of the proposed system using XBee modules.
Pirated software used to be distributed through physical exchange. The Internet, however, is increasingly being used to distributed pirate software. P2P networks, one-click hosting site, and bit-torrent indexing site ...
详细信息
ISBN:
(纸本)9781479978915
Pirated software used to be distributed through physical exchange. The Internet, however, is increasingly being used to distributed pirate software. P2P networks, one-click hosting site, and bit-torrent indexing site are typical examples. To block illegal distribution of software through the Internet, we must identify software stored and distributed on such sites. In this paper, we propose a new scheme for identifying software. In this scheme, we concentrate on Microsoft Windows applications because most piracy targets MS Windows applications. The scheme analyzes PE header and PE (Portable Executable) is the executable file format of Windows. The scheme translates information in the header such as start address, the size of the initialized data, etc. into the unique value and uses the value to identify software in question. We show the proposed scheme can identify software effectively and efficiently through an experiment with 439 sample executable files.
This demonstration presents an intelligent information platform MODEST. MODEST will provide enterprises with the services of retrieving news from websites, extracting commercial information, exploring customers' o...
详细信息
Mobile devices are gradually taking over traditional computers' dominance in human lives. With the ever-increasing shipment of mobile apps running on these devices, their quality issues become a severe challenge. ...
详细信息
ISBN:
(纸本)9781479974276
Mobile devices are gradually taking over traditional computers' dominance in human lives. With the ever-increasing shipment of mobile apps running on these devices, their quality issues become a severe challenge. Although automated testing techniques are being widely studied, they mostly fall short of handling mobile apps' complex interactions, e.g., A finger swipe or device shaking gesture, leading to inadequate testing. In this paper, we present a novel User Guided Automation (UGA) technique to address testing challenges incurred by such complex interactions. UGA exploits user insights to complement automated testing techniques by recording user-guided app executions, replaying apps to certain stop points, and systematically exploring state space from these stop points. We implemented our work as a prototype UGA tool on Android platform and evaluated it on seven real-world Android apps. Evaluation results show that UGA achieved 1.59-21.78× improvement in terms of method coverage over state-of-the-art automated techniques in testing mobile apps.
Despite research spanning more than a decade in the area of Web services, the industry has not yet seen a consensus regarding an effective method for the provisioning of Web services. In recent years, a new paradigm f...
详细信息
Despite research spanning more than a decade in the area of Web services, the industry has not yet seen a consensus regarding an effective method for the provisioning of Web services. In recent years, a new paradigm for implementing Web services based on Representational State Transfer, the successful architectural foundation of the Web, has seen greater interest in the industry. We had previously proposed a framework for the implementation of platforms for provisioning community-contributed Web services using the REpresentational State Transfer (REST) paradigm. We had also presented a proof-of-concept prototype implementation of the framework for use as a reference. In this paper, we elaborate more on the prototype by presenting its architecture and then present the results of evaluating the performance of this prototype in order to explore the feasibility of our proposed framework.
In dentistry, computer assisted systems have been used to simulate and navigate the treatment planes i.e. computer-assisted design (CAD), which assists in minimizing the high costs of the product development process a...
详细信息
In dentistry, computer assisted systems have been used to simulate and navigate the treatment planes i.e. computer-assisted design (CAD), which assists in minimizing the high costs of the product development process and allows the developers to simulate the same conditions that would take place under physical standards and conditions. In addition to the cost and time reduction benefits, CAD allows the product to be modified immediately before building prototypes and the final product. Finite element analysis (FEA) is another computer system, which used to determine stress distribution on teeth and jaw bones. Researchers also used FEA to analyze the effects of occlusal loads on crown margins and core materials of variable thickness. Finally the three dimensional (3-D) software packages are integrated with specific hardware systems to design and mill fixed partial dentures (FPDs). The present study are used all of the previous computer systems tools to assist the dentist and researchers to evaluate the effect of two connector designs on the fracture resistance and the stress distribution of the newly introduced monolithic full contoured Zirconia FPDs. The study concludes that radius of curvature at the occlusal embrasure had no significant effect on the fracture resistance and stress concentration of zirconia FPDs.
This paper analyzes the problems of the modern logistics:track and trace of products,and provides an effective solution that combines with RFID and web services to develop a B/S platform of track and trace of *** midd...
详细信息
This paper analyzes the problems of the modern logistics:track and trace of products,and provides an effective solution that combines with RFID and web services to develop a B/S platform of track and trace of *** middleware is adopted in the system implementation *** paper has done a lot of research in some key technologies in the design,the manufacturer,the third part of logistics and the retailers are the three key roles,they can both use this system to track and trace products in the Internet.
Using deprecated APIs often results in security vulnerability or performance degradation. Thus, invocations to deprecated APIs should be immediately replaced by alternative APIs. To resolve deprecated APIs, most devel...
详细信息
Using deprecated APIs often results in security vulnerability or performance degradation. Thus, invocations to deprecated APIs should be immediately replaced by alternative APIs. To resolve deprecated APIs, most developers rely on API documents provided by service API libraries. However, the documents often do not have sufficient information. This makes many deprecated API usages remain unresolved, which leads programs to vulnerable states. This paper reports a result of studying document quality for deprecated APIs. We first collected 260 deprecated APIs of eight Java libraries as well as the corresponding API documents. These documents were manually investigated to figure out whether it provides alternative APIs, rationales, or examples. Then, we examined 2,126 API usages in 249 client applications and figured out whether those were resolved in the subsequent versions. This study revealed that 1) 3.6 APIs was deprecated and 3.6 deprecated APIs are removed from the library a month on average, 2) only 61% of API documents provided alternative APIs while rationale and examples were rarely documented, and 3) 62% of deprecate API usages in client applications were resolved if the corresponding API documents provided alternative APIs while 49% were resolved when the documents provided no alternative APIs. Based on these results, we draw future directions to encourage resolving deprecated APIs.
Twitter data is increasingly used to make predictions about real-world events. However recently, several studies directly or indirectly questioned proposed Twitter prediction procedures. In this paper, we conduct a li...
详细信息
Twitter data is increasingly used to make predictions about real-world events. However recently, several studies directly or indirectly questioned proposed Twitter prediction procedures. In this paper, we conduct a literature review to investigate the research processes adopted by previous Twitter prediction studies in detail. We first identify the actors involved, and then we study how they influence the different phases of the research process. We found that in Twitter prediction research up to four actors perform several sampling, filtering, classification and assessment decisions throughout the development of prediction models. If these decisions and the reasons behind them are not sufficiently documented, the developed prediction methods cannot be reproduced in future research and consequently their validity and reliability are hard to assess.
[Context and motivation] Over the last decade, researchers and engineers have developed a vast body of methodologies and technologies in requirements engineering for self-adaptive systems. Although existing studies ha...
详细信息
暂无评论