Fall detection is one of the feasible solutions for solving the problem of aging of population. This paper presents an algorithm to detect falling for the elderly with one wrist-worn device. The algorithm has lower co...
详细信息
ISBN:
(纸本)9781479987467
Fall detection is one of the feasible solutions for solving the problem of aging of population. This paper presents an algorithm to detect falling for the elderly with one wrist-worn device. The algorithm has lower computation complexity to determine the fall event according to the inclination gradient. Experimental results show that it performs better than another similar devices with the average sensitivity and specificity of 94.44% and 100%, respectively.
As a large amount of users are now using the short message service(SMS) for communication,the demand for security is growing much stronger than ever *** notification encrypted with traditional encrypt mechanism can be...
详细信息
ISBN:
(纸本)9781510805750
As a large amount of users are now using the short message service(SMS) for communication,the demand for security is growing much stronger than ever *** notification encrypted with traditional encrypt mechanism can be transported via SMS only if the encrypted message is encoded into text *** are still many defects on existing data encoding mechanism in terms of *** paper provides a lightweight encoding mechanism for encrypted short message based on UCS-2 Chinese character set which has a lower data extension rate than commonly used encoding *** for functionality and efficiency proves the new mechanism improves the performance for user notification transmission via SMS on mobile device in power grid system.
The power communication networks is a relatively complex system with high security, which is performed in a number of ways, such as safety of power generation equipment, security of transmission and distribution lines...
详细信息
ISBN:
(纸本)9781467397025
The power communication networks is a relatively complex system with high security, which is performed in a number of ways, such as safety of power generation equipment, security of transmission and distribution lines, as well as data transmission security. The core of power communication networks security is context-aware data processing. With continuously extending in scale of the power communication networks, power communication data process become more complicated. In order to realize automatization of data processing of the power communication networks, this paper proposed a Context-aware Data Processing Model in power communication networks (CDPM). In this three-layer architecture, a Distributed Database Based on Data Categorization (DDB-DC) is designed in storage layer, which is able to choose the most efficient approach to store the context-aware data from the gathering layer according to different context-aware data types. Then, a Real-time Feature Extraction algorithm (RFE) for context-aware systems is presented in the computing layer to process the context-aware data stream. The model is a new data processing method in power communication networks.
A resource allocation algorithm for D2D users which establishes an optimization problem aimed at maximizing D2D users throughput and guaranteeing cellular users QoS is proposed in this paper. To solve the problem ther...
详细信息
In this paper, we propose a parallel HEVC encoder scheme based on multi-core platform, which provides maximized parallel scalability by exploiting two-level parallelism, namely, the frame level parallelism and the CTB...
详细信息
ISBN:
(纸本)9781510819085
In this paper, we propose a parallel HEVC encoder scheme based on multi-core platform, which provides maximized parallel scalability by exploiting two-level parallelism, namely, the frame level parallelism and the CTB level parallelism. Inspired by the intra-CTB row level parallelism of WPP in HEVC, we investigate the inter-frame CTB prediction dependency to its reference CTBs, and find the inter-CTB correlation. Using this inter-correlation, we divide a frame into CTB units and create CTB-row level coding threads when their corresponding reference CTBs are available. Each thread is bonded to a processing core, therefore, both intra- and inter-CTB rows can be encoded in parallel. Moreover, we introduce a priority scheduling mechanism to control the coding threads. Experiments on Tilera-Gx36 multi-core platform show that, compared with serial execution, the proposed method achieves 3.6 and 4.3 times speedup for 1080 P and 720 P video sequences, respectively.
To solve the fairness problem in user access of mobile communication systems, we proposed an access control scheme based on price and customer satisfaction (PSAC) in this paper. In the scheme, we borrow Cobb-Douglas o...
详细信息
wireless Body Area networks (WBANs) have become a leading solution in Mobile Health (mHealth). Typically, a WBAN consists of in-body or around-body sensor nodes for collecting data of physiological feature. For a WBAN...
详细信息
wireless Body Area networks (WBANs) have become a leading solution in Mobile Health (mHealth). Typically, a WBAN consists of in-body or around-body sensor nodes for collecting data of physiological feature. For a WBAN to provide high throughput and low delay in an energy-efficient way, designing an efficient Medium Access Control (MAC) protocol is of paramount importance because the MAC layer coordinates nodes' access to the shared wireless medium. To show the difference of MAC protocols between Energy-Harvesting wireless body area networks (EH-WBANs) and battery powered WBANs (BT-WBANs), this article surveys the latest progresses in energy harvesting techniques and WBAN MAC protocol designs.
Considering the problem how to protect the cloud services from being destroyed by cloud users, the riskprediction model based on improved AdaBoost method is proposed. The risk prediction is regarded as two-class class...
详细信息
Currently,the cloud computing systems use simple key-value data processing,which cannot support similarity search efectively due to lack of efcient index structures,and with the increase of dimensionality,the existing...
详细信息
Currently,the cloud computing systems use simple key-value data processing,which cannot support similarity search efectively due to lack of efcient index structures,and with the increase of dimensionality,the existing tree-like index structures could lead to the problem of"the curse of dimensionality".In this paper,a novel VF-CAN indexing scheme is ***-CAN integrates content addressable network(CAN)based routing protocol and the improved vector approximation fle(VA-fle) *** are two index levels in this scheme:global index and local *** local index VAK-fle is built for the data in each storage ***-fle is thek-means clustering result of VA-fle approximation vectors according to their degree of *** cluster forms a separate local index fle and each fle stores the approximate vectors that are contained in the *** vector of each cluster center is stored in the cluster center information fle of corresponding storage *** the global index,storage nodes are organized into an overlay network CAN,and in order to reduce the cost of calculation,only clustering information of local index is issued to the entire overlay network through the CAN *** experimental results show that VF-CAN reduces the index storage space and improves query performance efectively.
Cloud computing is experiencing a rapid development since a large amount of data need to be addressed. How to carry on the reasonable task scheduling plays a vital role in the operating efficiency of cloud computing. ...
详细信息
暂无评论