The Minimum Latency Problem (MLP) is a class of combinational optimization problems that has many practical applications. In the general case, the MLP is proved to be NPhard. One of the approaches to solve the problem...
详细信息
Serious games gained popularity in recent years together with the use of modern input devices. Mainly marker-less motion tracking cameras play a special role in the automation of physical rehabilitation. These inexpen...
详细信息
Introduction: Intensive care unit patients are heavily monitored, and a number of clinically relevant parameters are routinely extracted from high resolution signals. In particular, heart rate is derived from interval...
详细信息
Introduction: Intensive care unit patients are heavily monitored, and a number of clinically relevant parameters are routinely extracted from high resolution signals. In particular, heart rate is derived from intervals between pulses in pseudo-periodic signals such as the electrocardiogram (ECG) or arterial blood pressure (ABP) waveforms. However, poor signal quality and high noise levels can unfortunately lead to false localisation of these pulses (or peaks), resulting in incorrect estimates of heart rate. The goal of the 2014 Physionet/CinC Challenge was to encourage the creation of an intelligent system that fused information from different biosignals to create a robust set of peak detections. Methods: First, a set of peak detectors were evaluated on different cardiovascular signals. The detections were then fused using two different approaches: the first one was based on a calculated measures of signal quality for the ECG and ABP signals and the the second fusion technique was based on the regularity of the derived intervals between subsequent detections made on ECG, ABP, Stroke Volume and Photoplethysmogram signals. These techniques were developed using the MGH/MF database and submitted for scoring on the Challenge test-set. Conclusion: The best entries for the two approaches obtained an overall score of 87.88% and 87.66%, respectively, in phase III of the challenge, which provided the highest official score.
A device based study is carried out using an embedded Fiber Bragg Grating (FBG) strain sensor to simultaneously measure vital signal such as respiration, heartbeat and body motion in the form of a smart costume. The e...
详细信息
A device based study is carried out using an embedded Fiber Bragg Grating (FBG) strain sensor to simultaneously measure vital signal such as respiration, heartbeat and body motion in the form of a smart costume. The experimental results are modeled and simulated using a specially designed algorithm. The designed system consisted of FBG strain sensor, interrogator, signal interface/ processing unit and optical fiber. When the FBG sensor is used as an embedded sensor, a correction of strain sensitivity due to the influence of the embedding material was applied. The displacement of the reflected wavelength is measured, depending on the intended strain value as a function of heartbeat, body motion and respiration. The achieved results show that the presented FBG vital sign monitor is ideal for embedded and portable mobile technology measurement systems, because of its small size and light weight.
The Internet has seen a strong move to support overlay applications and services, which demand a coherent and integrated control in underlying heterogeneous networks in a scalable, resilient, and energy-efficient mann...
详细信息
The Internet has seen a strong move to support overlay applications and services, which demand a coherent and integrated control in underlying heterogeneous networks in a scalable, resilient, and energy-efficient manner. To do so, a tighter integration of network management and overlay service functionality can lead to cross-layer optimization of operations and management, which is a promising approach and may offer a large business potential in operational perspectives for all players involved. Therefore, the objective of this paper is to present and discuss the impact of new paradigms such as cloud computing and software-defined networking which will play central role in the Future Internet, discuss major traffic trends and identify key challenges due to the adoption and operation of the new applications. Translating the key challenges to requirements for Future Internet traffic management mechanisms, the paper provides an overview of existing mechanisms in literature, assesses them w.r.t. the aforementioned requirements, and qualitatively estimates the expected optimization potential and gain, as well as provides hint for their potential extension and exploitation within the challenging environment of the Future Internet.
Given their wide applicability, several sparse high-resolution spectral estimation techniques and their implementation have been examined in the recent literature. In this work, we further the topic by examining a com...
详细信息
ISBN:
(纸本)9781479946037
Given their wide applicability, several sparse high-resolution spectral estimation techniques and their implementation have been examined in the recent literature. In this work, we further the topic by examining a computationally efficient implementation of the recent SMLA algorithms in the missing data case. The work is an extension of our implementation for the uniformly sampled case, and offers a notable computational gain as compared to the alternative implementations in the missing data case.
Cheating on a (2, n)-threshold visual secret sharing (VSS) schemes is discussed under a realistic scenario. Horng et al. pointed out an ordinary VSS scheme is vulnerable against a certain kind of cheating, and they pr...
详细信息
Cheating on a (2, n)-threshold visual secret sharing (VSS) schemes is discussed under a realistic scenario. Horng et al. pointed out an ordinary VSS scheme is vulnerable against a certain kind of cheating, and they proposed a countermeasure against it. In their work, so-called Kerckhoffs's principle and availability of computing power are implicitly assumed in cheating detection. Namely, this work follows a scenario where a victim knows basis matrices and can use computational ability in cheating detection. Under this scenario, Horng et al. showed that their countermeasure attains negligible success probability of generating the victim's share. However, recalling the fact that the decryption of VSS schemes does not depend on computations but depends on human visual system, we can naturally assume a realistic scenario where the victim does not know the basis matrices and has no computing power. Under this scenario, we show that the cheaters can make the victim recover an arbitrary forged secret image in Horng et al.'s countermeasure with probability 1.
Citation relationship between scientific publications has been successfully used for scholarly bibliometrics, information retrieval and data mining tasks, and citation-based recommendation algorithms are well document...
详细信息
ISBN:
(纸本)9781479955695
Citation relationship between scientific publications has been successfully used for scholarly bibliometrics, information retrieval and data mining tasks, and citation-based recommendation algorithms are well documented. While previous studies investigated citation relations from various viewpoints, most of them share the same assumption that, if paper 1 cites paper 2 (or author 1 cites author 2 ), they are connected, regardless of citation importance, sentiment, reason, topic, or motivation. However, this assumption is oversimplified. In this study, we employ an innovative “context-rich heterogeneous network” approach, which paves a new way for citation recommendation task. In the network, we characterize (1) the importance of citation relationships between citing and cited papers, and (2) the topical citation motivation. Unlike earlier studies, the citation information, in this paper, is characterized by citation textual contexts extracted from the full-text citing paper. We also propose algorithm to cope with the situation when large portion of full-text missing information exists in the bibliographic repository. Evaluation results show that, context-rich heterogeneous network can significantly enhance the citation recommendation performance.
This paper presents the study of pattern of interaction in research work (co-authorship in publications and co-partnership in research projects) using the techniques of social network analysis (SNA) and visualization....
详细信息
The rising popularity of social networking platforms, has transformed them into a valuable source of information. Sentiments or opinions expressed through the posts of users can be extracted and applied for various pu...
详细信息
ISBN:
(纸本)9789898565754
The rising popularity of social networking platforms, has transformed them into a valuable source of information. Sentiments or opinions expressed through the posts of users can be extracted and applied for various purposes. Information such as determining the political preference (e.g., Republican or Democrat) of a user can be useful, for example, in conducting opinion polls, especially around election time. In this work, we apply two different methodologies for sentiment analysis on Twitter posts and demonstrate the superiority of character based approaches over word based ones in determining political sentiment.
暂无评论