This paper presents a comparison among different strategies to coordinate the use of heterogeneous wireless sensors aimed for area surveillance. The heterogeneity among the sensor nodes is related to their sensing and...
详细信息
Crystal growth of Rb2CdI4 was performed by Czochralski method. Transparent colourless crystals with monoclinic structure were obtained. Temperature dependence of the dielectric constant along the b-axis was measured w...
详细信息
The nonlinear effects of partial erasure and transition shift, however, often limit the performance attained by the partial response maximum likelihood (PRML) detector because of model mismatch. Conventionally, the no...
The nonlinear effects of partial erasure and transition shift, however, often limit the performance attained by the partial response maximum likelihood (PRML) detector because of model mismatch. Conventionally, the nonlinear effects are either ignored or approximated by linearization technique. In the article, a PRML detector for the PR4 model including the nonlinear effects has been developed to improve the detector performance. The new representation is more accurate and the corresponding PRML detector has better performance without increasing the realization complexity. computer simulation results show that the new representation outperforms the conventional ones due to the enhanced modeling capability. The method is also expected to be applied in the high order partial response channel.
The clinical data stored in the health information system can be categorized as two types including structuralized data and non-structuralized ones. In the paper, a data extraction system is developed to assist data r...
详细信息
The clinical data stored in the health information system can be categorized as two types including structuralized data and non-structuralized ones. In the paper, a data extraction system is developed to assist data retrieval from the non-structuralized textual clinical documents such as radiology reports, pathology reports, etc. The system provides keyword-based and semantic-driven data matching methodology to extract the specific information from the textual clinical documents. The matching methodology provides the capabilities to recognize the selected keywords and the related semantics in the documents. Through the extraction verification interface, clinicians can extract and verify the matched information semi-automatically. The extracted data can be filled into predefined case-oriented templates. The structuralized data can be stored back into the clinical data warehouse for further analyzing. Moreover, the case-oriented templates can support collecting corresponding extracted data for various researches.
The paper addresses Medical Hand Drawing Management System architecture and implementation. In the system, we developed four modules: hand drawing management module; patient medical records query module; hand drawing ...
详细信息
The paper addresses Medical Hand Drawing Management System architecture and implementation. In the system, we developed four modules: hand drawing management module; patient medical records query module; hand drawing editing and upload module; hand drawing query module. The system adapts windows-based applications and encompasses web pages by *** hosting mechanism under web services platforms. The hand drawings implemented as files are stored in a FTP server. The file names with associated data, e.g. patient identification, drawing physician, access rights, etc. are reposited in a database. The modules can be conveniently embedded, integrated into any system. Therefore, the system possesses the hand drawing features to support daily medical operations, effectively improve healthcare qualities as well. Moreover, the system includes the printing capability to achieve a complete, computerized medical document process. In summary, the system allows web-based applications to facilitate the graphic processes for healthcare operations.
Studies indicate that making learners feel good is important only minor to clear knowledge transformation. Many studies have tried to use virtual humans as a part of interface in learning systems to increase the effec...
详细信息
ISBN:
(纸本)9781605587578
Studies indicate that making learners feel good is important only minor to clear knowledge transformation. Many studies have tried to use virtual humans as a part of interface in learning systems to increase the effect of instructions. Based on social interaction and pedagogical theories, many e-learning systems use animated films or virtual reality to boost human-computer engagement and ease their negative emotions. However, affective learning systems still need much research to improve their functionalities and usability. This study proposed a convenient approach to develop an emotionally interactive learning system;learners can express their emotions by mouse-clicking while learning. A virtual human was created to empathically react to learners in proactive and reactive ways to encourage and persuade them into persistent learning and help achieve their goals. Experimental results show that, averagely, subjects can tell virtual human's emotions and agree to its empathic reactions. Persuasion conducted by virtual human could not increase subjects' learning time, but could significantly increase their completion rate of exercises. Copyright 2009 ACM.
In Internet, IP multicast has been used successfully to provide an efficient, best-effort delivery service for group communication applications. However, applications such as multiparty private conference, distributio...
详细信息
ISBN:
(纸本)9780889868021
In Internet, IP multicast has been used successfully to provide an efficient, best-effort delivery service for group communication applications. However, applications such as multiparty private conference, distribution of stock market information, pay per view and other subscriber services require secure multicast to protect integrity and confidentiality of the group traffic, and validate group member's authenticity. Providing secure multicast for group communication is problematic without a robust group key management. In this paper, we propose an anonymous group key management with ID-based Signature and secret sharing technologies to distribute a new group key securely to each participant of a group with only one rekey message whenever the group membership changes. The key management guarantees that a legal user, without revealing his/her real identity, can join a group after finishing the mutual authentication with the group initiator, and enforces the forward secrecy and backward secrecy.
Auditory perception is one of the most important functions for robotics applications. Microphone arrays are widely used for auditory perception in which the spatial structure of microphones is usually known. In practi...
详细信息
It is proposed in this session that the interactivity necessary in ubiquitous learning can be enhanced by the virtual tutor who mediates between the learner and the e-Learning contents. Arousing students' intellec...
详细信息
暂无评论