The recent years have witnessed the rise of an enormous number of software algorithms that implement pe-dometers (or step counters), which led to the development of several context-aware IoT-based smartphone apps for ...
The recent years have witnessed the rise of an enormous number of software algorithms that implement pe-dometers (or step counters), which led to the development of several context-aware IoT-based smartphone apps for sports and healthcare, among others. While the number of scientific works in this context is high, there is no comparison study that analyzes the different proposal at implementation level. In this paper we first perform a literature review of software implementations of pedometers for smartphones and then classify them into a taxonomy. With this, we highlight the similarities of their scheme, which is based on a number of defined steps to be applied in a pipeline. We then develop a smartphone application that implements all the configurations of these steps found in literature and evaluates them in various scenarios. Finally, we present comparative results obtained by running extensive and real tests that show the importance of a carefully designed filtering step.
Today's data communication needs have shifted from client-server data communication to peer-to-peer. The user's focus is currently on the immediately requested data or the so-called Named Data Network (NDN). C...
详细信息
Today's data communication needs have shifted from client-server data communication to peer-to-peer. The user's focus is currently on the immediately requested data or the so-called Named Data Network (NDN). Changes to the nature of the app, user needs, and usage patterns have changed significantly, and apps on networks like YouTube, Facebook, and other social networks have revolutionized the idea of user- generated content. One of the problems in the network is network congestion or network failure. Network congestion occurs due to the need for network resources exceeding the capacity of network resources. When network congestion occurs, the NDN forwarding mechanism facilitated by FIB on the IP router cannot detect the congestion condition and will still use the same path. At the same time, the NDN router can detect congestion conditions and react by using alternative paths. The simulation results show that on the NDN router, the forwarding mechanism can maximize the use of link bandwidth faster than the forwarding mechanism on the router-based IP network. In the topology designed, NDN can achieve maximum bandwidth in the 3rd second compared to IP in the 5th second.
This paper explores VANET topics: architecture, characteristics, security, routing protocols, applications, simulators, and 5G integration. We update, edit, and summarize some of the published data as we analyze each ...
详细信息
ISBN:
(纸本)9781665472210
This paper explores VANET topics: architecture, characteristics, security, routing protocols, applications, simulators, and 5G integration. We update, edit, and summarize some of the published data as we analyze each notion. For ease of comprehension and clarity, we give part of the data as tables and figures. This survey also raises issues for potential future research topics, such as how to integrate VANET with a 5G cellular network and how to use trust mechanisms to enhance security, scalability, effectiveness, and other VANET features and services. In short, this review may aid academics and developers in choosing the key VANET characteristics for their objectives in a single document.
Probability of necessity and sufficiency (PNS) measures the likelihood of a feature set being both necessary and sufficient for predicting an outcome. It has proven effective in guiding representation learning for uni...
详细信息
As the COVID-19 pandemic continues, a growing number of recovered patients report persistent symptoms such as fatigue, muscle weakness, sleep issues, anxiety, and depression, lasting months or even over a year. Severe...
详细信息
ISBN:
(数字)9798350376968
ISBN:
(纸本)9798350376975
As the COVID-19 pandemic continues, a growing number of recovered patients report persistent symptoms such as fatigue, muscle weakness, sleep issues, anxiety, and depression, lasting months or even over a year. Severe cases often show significant lung damage and sometimes reduced kidney function. This study examines a dataset from recovered COVID-19 patients, using machine learning to assess the likelihood of developing Post-COVID-19 conditions. We applied several models, including XGBoost, Decision Trees, and Random Forest, to predict outcomes based on data from a specific hospital. Our approach included detailed data preprocessing-filling in missing values, feature engineering, and standardizing data to improve model accuracy and applicability. Results showed the Random Forest model as the most accurate, demonstrating the power of machine learning in making precise predictions from complex health data. Feature importance analysis revealed critical factors predicting Post-COVID-19 conditions, offering vital guidance for healthcare professionals in managing recovered patients.
The article is a continuation of the study of the use of neural networks and image identification for work in industries using conveyor means for transporting and sorting goods. Optimization of production, namely the ...
详细信息
Abstract: Acoustic cavitation is the expansion and contraction of existing microbubbles in liquids brought on by an ultrasonic field. The dynamics of oscillations at higher pressures and temperatures when the cavitati...
详细信息
The research is aimed at the development of virtual environments of various configurations created by means of 3D computer modeling in such areas as photogrammetry, computer vision systems, robotics at the design stag...
详细信息
Maintenance of assets owned by an organization or company is an activity that will never stop. From the time of implementation, maintenance will be more optimal if it is carried out before the asset is in a damaged co...
详细信息
As an effective method to protect the daily access to sensitive data against malicious attacks, the audit mechanism has been widely deployed in various practical fields. In order to examine security vulnerabilities an...
详细信息
暂无评论