Restoration of optical images degraded by atmospheric turbulence and various types of noise is still an open problem. In this paper, we propose an optical image restoration method based on a Reaction- Diffusion Equati...
详细信息
Sport analytics in general and soccer analytics in particular constitute quickly growing markets when it comes to professional analyses and visualizations. From a data analysis research perspective, soccer is a rich s...
详细信息
ISBN:
(纸本)9781509057283
Sport analytics in general and soccer analytics in particular constitute quickly growing markets when it comes to professional analyses and visualizations. From a data analysis research perspective, soccer is a rich source of geospatial and temporal movement data, with high details and a controlled environment. However, soccer movement is complex as its compounds are actions and reactions of two opposing teams with inverse goals. Common analyses performed today are typically oriented towards statistical analysis and considering aggregate measurements. In this work, we propose a set of effective visual-interactive methods for investigating set plays as a first step towards semi-automated analysis of tactic behavior. In our analytic design, we follow the so-called Information-seeking Mantra by Ben Shneiderman by providing overview visualizations, interactive refinements, and detailed analysis views. We take an applied approach in showing case studies that give evidence for the applicability and merits of our proposed techniques.
There has been a growing interest in Health Informatics applications, research, and education within the Middle East and North African Region over the past twenty years. People of this region share similar cultural an...
详细信息
There has been a growing interest in Health Informatics applications, research, and education within the Middle East and North African Region over the past twenty years. People of this region share similar cultural and religious values, primarily speak the Arabic language, and have similar health care related issues, which are in dire need of being addressed. Health Informatics efforts, organizations, and initiatives within the region have been largely under-represented within, but not ignored by, the International Medical Informatics Association (IMIA). Attempts to create bonds and collaboration between the different organizations of the region have remained scattered, and often, resulted in failure despite the fact that the need for a united health informatics collaborative within the region has never been more crucial than today. During the 2017 MEDINFO, held in Hangzhou, China, a new organization, the Middle East and North African Health Informatics Association (MENAHIA) was conceived as a regional non-governmental organization to promote and facilitate health informatics uptake within the region endorsing health informatics research and educational initiatives of the 22 countries represented within the region. This paper provides an overview of the collaboration and efforts to date in forming MENAHIA and displays the variety of initiatives that are already occurring within the MENAHIA region, which MENAHIA will help, endorse, support, share, and improve within the international forum of health informatics.
作者:
Graham GreenleafVC VivekanandanPhilip ChungRanbir SinghAndrew MowbrayA Graham Greenleaf
Professor of Law D Information Systems University of New South Wales. B Dr.V.C.Vivekanandan
Ministry of HRD IP Chair Professor NALSAR University of Law Hyderabad. C Philip Chung
Lecturer in Law University of Technology Sydney and Conjoint Lecturer in Law UNSW. D Prof. (Dr.) Ranbir Singh
Vice-Chancellor National Law University Delhi. E Andrew Mowbray
Professor of Law D Computer Science at the University of Technology Sydney. This article first appeared in 8(3) SCRIPTed 292 (2011). The assistance of Rajan Sharma system developer for LII of India at AustLII Jill Matthews Indexer prior AustLII staff and SCRIPTed editors and referees is gratefully acknowledged. An earlier version of this article was presented at the Law via the Internet Conference University of Hong Kong 2011. The article was completed while Graham Greenleaf was a Visiting Fellow at the SCRIPT/AHRC Law and Technology Centre University of Edinburgh. The LII of India has been assisted by an AusAID PSLP (Public Sector Linkages Program) grant concerning access to South Asian legal information and from an ARC (Australian Research Council) LIEF grant concerning CommonLII
Cameras are a crucial exteroceptive sensor for self-driving cars as they are low-cost and small, provide appearance information about the environment, and work in various weather conditions. They can be used for multi...
详细信息
作者:
S. SarikaA. PravinA. VijayakumarK. SelvamaniAssistant Professor
Department of Computer Science and Engineering Sathyabama UniversityChennai India Assistant Professor
Department of Computer Science and Engineering Sathaybama UniversityChennai India Professor
Department of Information Technology Jerusalem College of Engineering Anna University Chennai India Assistant Professor
Department of Computer Science and Engineering Anna University Chennai India
In wired networks, there are lots of protections while communication occurs. In these networks, the intruders are pass through the firewalls and secured gateways for safe and secured communications. Moreover, the wire...
详细信息
In wired networks, there are lots of protections while communication occurs. In these networks, the intruders are pass through the firewalls and secured gateways for safe and secured communications. Moreover, the wired networks ensure the secured communications. But, in the case of wireless mobile ad hoc networks, the nodes are dynamic and the topology based and also needs more power consumptions. Because of mobility in wireless mobile adhoc networks, also there are lots of vulnerabilities when the attackers wish to collapse the partial or entire networks. Hence, there are lots of requirement for an understanding of the various problems associated with the wireless mobile networks. In this paper, the various vulnerabilities, attacks and security mechanisms are discussed for mobile ad hoc networks (MANETs) in detail.
Digital pathology is not only one of the most promising fields of diagnostic medicine, but at the same time a hot topic for fundamental research. Digital pathology is not just the transfer of histopathological slides ...
详细信息
A wireless sensor network consists of many wireless nodes forming a network which are used to monitor certain physical or environmental conditions, such as humidity, temperature, sound etc. Some of the popular applica...
A wireless sensor network consists of many wireless nodes forming a network which are used to monitor certain physical or environmental conditions, such as humidity, temperature, sound etc. Some of the popular applications of sensor network are area monitoring, environment monitoring (such as pollution monitoring), and industrial and machine health monitoring, waste water monitoring and military surveillance. Topology control in WSNs is a technique of defining the connections between nodes in order to reduce the interference between them, save energy and extend network lifetime. The Objective of my paper is to Maximize the network lifetime. The algorithm proposed is a modification to the CLTC framework first we form clusters of nodes using K-Means, in second phase we do intra-cluster topology control using Relative Neighbourhood Graph, and in third phase we do inter-cluster topology control ensuring connectivity. The simulations were carried out using Omnet++ as a simulator and Node Power Depletion and Node Lifetime as parameters.
A multi-hop wire-less network is composed of large number of nodes and consecutive links between them so that when a packet is transmitted from one node to another it goes through several path. Wireless sensor network...
详细信息
A multi-hop wire-less network is composed of large number of nodes and consecutive links between them so that when a packet is transmitted from one node to another it goes through several path. Wireless sensor network normally consists of large number of distributed nodes that organizes them into a multi-hop wireless network. In wireless sensor network one of the main problems is related to energy issue because every node is operated by battery. To have large network life time all nodes need to minimize their energy consumption. Node is composed of small battery so that the energy associated with this node is very less. So replacing and refilling of battery is not possible which is very costly. Hence some techniques are applied through which the energy associated with each node can be conserved. Energy conservation can be done by controlling the transmission power of each node. In this thesis we have tried to implement a protocol in the literature and the performance of the protocol in sensor network.
Wireless Sensor Networks (WSNs) consist of thousands of tiny nodes having the capability of sensing, computation, and wireless communications. Many routing, power management, and data dissemination protocols have been...
详细信息
Wireless Sensor Networks (WSNs) consist of thousands of tiny nodes having the capability of sensing, computation, and wireless communications. Many routing, power management, and data dissemination protocols have been specifically designed for WSNs where energy consumption is an essential design issues. Since wireless sensor network protocols are application specific, so the focus has been given to the routing protocols that might differ depending on the application and network architecture. The study of various routing protocols for sensor networks presents a classification for the various approaches pursued. The three main categories explored are data-centric, hierarchical and location-based. Each of the routing schemes and algorithms has the common objective of trying to get better throughput and to extend the lifetime of the sensor network. A comparison has been made between two routing protocols, Flooding and Directed Diffusion, on the basis of throughput and lifetime of the network. Simulation of AODV (WPAN) is also carried over two topologies with same source and destination node.
暂无评论