Through the analysis and study of the emotional characteristics in Chinese micro-blog, this paper proposed a multidimensional sentiment classification method based micro-blog emotion classification, emoticon in micro-...
详细信息
Trapezoidal stimulation profile has been used for many years in clinical applications to activate the weak tibialis anterior muscle during gait for correcting foot drop. However, this stimulation profile could not wel...
详细信息
ISBN:
(纸本)9781785610448
Trapezoidal stimulation profile has been used for many years in clinical applications to activate the weak tibialis anterior muscle during gait for correcting foot drop. However, this stimulation profile could not well adapt to the different types of terrain, such as level ground, upstairs and downstairs. Thus an environment aware and adaptive stimulation mode would be needed to help drop foot patients walk normally in various environments. As a part of this new stimulation system, tibialis anterior (TA) muscle activation pattern during different locomotion modes were investigated in this study. Foot pressure signals from four force sensitive resistor (FSR) and TA muscle electromyogram (EMG) signal were recorded during gait from five normal subjects. Then the averaged TA muscle activation patterns for level ground, upstairs and downstairs were calculated from the EMG signals in the study, respectively. The results of the study could provide some helpful suggestions on how to design a suitable stimulation envelope for walking over different terrains.
Fuzzy reasoning aims to describe things with fuzzy and uncertain concepts and convert them into information that computers can process. Wang thought that the inference algorithm based on Compositional Rule of Inferenc...
详细信息
In this paper, an on-line dynamic gait generation model is proposed, which makes it possible to plan real-time gait trajectories in continuous motion process online. The model enables wearers to perform complex moveme...
详细信息
Nowadays,Internet of Things(IoT)is widely deployed and brings great opportunities to change people's daily *** realize more effective human-computer interaction in the IoT applications,the Question Answering(QA)sy...
详细信息
Nowadays,Internet of Things(IoT)is widely deployed and brings great opportunities to change people's daily *** realize more effective human-computer interaction in the IoT applications,the Question Answering(QA)systems implanted in the IoT services are supposed to improve the ability to understand natural ***,the distributed representation of words,which contains more semantic or syntactic information,has been playing a more and more important role in the QA ***,learning high-quality distributed word vectors requires lots of storage and computing resources,hence it cannot be deployed on the resource-constrained IoT *** is a good choice to outsource the data and computation to the cloud ***,it could cause privacy risks to directly upload private data to the untrusted ***,realizing the word vector learning process over untrusted cloud servers without privacy leakage is an urgent and challenging *** this paper,we present a novel efficient word vector learning scheme over encrypted *** first design a series of arithmetic computation *** we use two non-colluding cloud servers to implement high-quality word vectors learning over encrypted *** proposed scheme allows us to perform training word vectors on the remote cloud servers while protecting *** analysis and experiments over real data sets demonstrate that our scheme is more secure and efficient than existing privacy-preserving word vector learning schemes.
The mapping and masking methods based on deep learning are both essential methods for speech dereverberation at present, which typically enhance the amplitude of the reverberant speech while letting the reverberant ph...
详细信息
This paper introduces a new approach to solve the Chinese Pinyin-to-character (PTC) conversion problem. The conversion from Chinese Pinyin to Chinese character can be regarded as a transformation between two different...
详细信息
Hierarchies are very popular in organizing documents and web pages, hence automated hierarchical classification techniques are desired. However, the current dominant hierarchical approach of top-down method suffers ac...
详细信息
Person re-identification (re-id) has achieved significant progresses in recent years. However, the existing methods generally assume that the clothes of pedestrians remain unchanged throughout the surveillance periods...
详细信息
Weakly-supervised disease detection has the great potential to alleviate the time-consuming and labor-intensive burden of manual annotations in instance level. While existing methods extract normality prototypes encod...
详细信息
暂无评论