This paper presents the kinetics analysis for different sit to stand (STS) strategies of different Body Mass Index (BMI) subjects. Five camera motion analysis system and Bertec force plate in conjunction with QTM (Qua...
This paper presents the kinetics analysis for different sit to stand (STS) strategies of different Body Mass Index (BMI) subjects. Five camera motion analysis system and Bertec force plate in conjunction with QTM (Qualisys Track Manager) software were used. As a result, the minimum force at lower limb is discovered using the upper seat using arm while STS. Thus, it helped people in developing the rehabilitation that suitable for Malaysian to perform the sit to stand exercise.
In this paper, we propose a new packet routing strategy that incorporates memory information for reducing congestion in communication networks. First, we study the conventional routing strategy which selects the paths...
详细信息
In this paper, we propose a new packet routing strategy that incorporates memory information for reducing congestion in communication networks. First, we study the conventional routing strategy which selects the paths for transmitting packets to destinations using the distance information and the dynamical information such as the number of accumulating packets at adjacent nodes. Then, we evaluate the effectiveness of this routing strategy for the scale-free networks. From results of numerical simulations, we conclude that this routing strategy is not effective when the density of the packets increases due to the impermeability of the communication network. To avoid this undesirable problem, we incorporate memory information to the routing strategy. By using memory information effectively, packets are spread into the communication networks, achieving a higher performance than conventional routing strategies for various network topologies, such as scale-free networks, small-world networks, and scale-free networks with community structures.
This paper shows a performance evaluation for ultra wideband (UWB)-based wireless body area networks (WBANs) through experiments by using a prototype. Specifications on the physical (PHY) and media access control (MAC...
详细信息
This paper shows a performance evaluation for ultra wideband (UWB)-based wireless body area networks (WBANs) through experiments by using a prototype. Specifications on the physical (PHY) and media access control (MAC) of the prototype are based on the draft standard for IEEE802.15.6. On the PHY, the prototpe uses UWB that its center frequency is 4.096 GHz with bandwidth of around 700 MHz. The MAC layer is based on a superframe structure comprising time slots assigned to a beacon slot, slots for contention access period (CAP), or slots for contention-free period (CFP). Experiments have been conducted with mounting the devices on human body in an anechoic chamber. Over-the-air experiments have been conducted when multiple nodes connecting to a single hub device send packets simultaneously. Through experiment results, it is shown that the number of slots allocated to CAP is crucial in order to maintain packet transmission successfully.
We estimate the amount of free electrons generated by concealed radioactive materials using MCNP code. This simulation results show that the existence of radioactive sources enhances the number of photons and backgrou...
详细信息
We estimate the amount of free electrons generated by concealed radioactive materials using MCNP code. This simulation results show that the existence of radioactive sources enhances the number of photons and background free electrons. Those quantities are influenced by density and thickness of container material.
This paper evaluates existing taxonomies aimed at characterizing the interaction between robots and their users and modifies them for health care applications. The modifications are based on existing robot technologie...
详细信息
ISBN:
(纸本)9781424441198
This paper evaluates existing taxonomies aimed at characterizing the interaction between robots and their users and modifies them for health care applications. The modifications are based on existing robot technologies and user acceptance of robotics. Characterization of the user, or in this case the patient, is a primary focus of the paper, as they present a unique new role as robot users. While therapeutic and monitoring-related applications for robots are still relatively uncommon, we believe they will begin to grow and thus it isimportant that the spurring relationship between robot and patient is well understood.
Benefit estimation is one of the most important parts of feasibility study of investment projects. In order to make a solid business justification in investment, the management team always quantified the benefit from ...
详细信息
Benefit estimation is one of the most important parts of feasibility study of investment projects. In order to make a solid business justification in investment, the management team always quantified the benefit from the projects. Current industrial approach to estimate benefit of advanced process control (APC) is based on the conventional estimation techniques, namely, statistical analysis and payback period. Due to the chaos information and uncertainties of business environment, these conventional techniques cannot effectively provide the alternative consideration of the investment. In this paper, we develop the Real Options technique for the benefit estimation with application to APC. The Real Options technique will be employed to the Innovative Recommender System for control system project assessment tools as part of the Integrated Economic Assessment (IEA) Framework. We demonstrate the effectiveness of the proposed method to a case study of control automation project subject to business environment uncertainty.
Background: Association rules are more comprehensive and understandable than fault-prone module predictors (such as logistic regression model, random forest and support vector machine). One of the challenges is that t...
详细信息
Background: Association rules are more comprehensive and understandable than fault-prone module predictors (such as logistic regression model, random forest and support vector machine). One of the challenges is that there are usually too many similar rules to be extracted by the rule mining. Aim: This paper proposes a rule reduction technique that can eliminate complex (long) and/or similar rules without sacrificing the prediction performance as much as possible. Method: The notion of the method is to removing long and similar rules unless their confidence level as a heuristic is high enough than shorter rules. For example, it starts with selecting rules with shortest length (length=1), and then it continues through the 2nd shortest rules selection (length=2) based on the current confidence level, this process is repeated on the selection for longer rules until no rules are worth included. Result: An empirical experiment has been conducted with the Mylyn and Eclipse PDE datasets. The result of the Mylyn dataset showed the proposed method was able to reduce the number of rules from 1347 down to 13, while the delta of the prediction performance was only. 015 (from. 757 down to. 742) in terms of the F1 prediction criteria. In the experiment with Eclipsed PDE dataset, the proposed method reduced the number of rules from 398 to 12, while the prediction performance even improved (from. 426 to. 441.) Conclusion: The novel technique introduced resolves the rule explosion problem in association rule mining for software proneness prediction, which is significant and provides better understanding of the causes of faulty modules.
This paper proposes the use of admission and traffic control schemes for real-time applications. The admission control scheme determines the admission of high-priority real-time applications such as voice and video st...
详细信息
This paper proposes the use of admission and traffic control schemes for real-time applications. The admission control scheme determines the admission of high-priority real-time applications such as voice and video streams in terms of their bandwidth utilization time (medium time), whereas the traffic control scheme maintains the communication quality of applications permitted admission by restricting other traffic. Owing to the use of contention-based access, a conventional scheme without admission control will degrade the communication quality when the number of terminals using high-priority applications increases. Moreover, only the capabilities (i.e., frame and sequence procedures) of admission control are defined in the IEEE 802.11e standard;the detailed usage in terms of the application characteristics is not specified, and it may be difficult to achieve a sufficient level of quality of service (QoS). The proposed schemes achieve the optimum QoS for actual services. The software used in the proposed schemes was implemented into hardware at the access point, and was evaluated experimentally. Based on the evaluation results, excellent performances with high QoS applications were obtained.
The fault detection and isolation problem is studied for a class of nonlinear systems. Under structural conditions, a bank of High-Order Sliding-Mode observers is proposed. The value of the equivalent output injection...
详细信息
The fault detection and isolation problem is studied for a class of nonlinear systems. Under structural conditions, a bank of High-Order Sliding-Mode observers is proposed. The value of the equivalent output injection is used for detecting and isolating particular faults in the system. The proposed method provides finite-time isolation of actuator and plant faults. Simulation results support the proposed approach.
暂无评论