When an emergency occurs within a building, it may be initially safer to send autonomous mobile nodes, instead of human responders, to explore the area and identify hazards and victims. Exploring all the area in the m...
详细信息
ISBN:
(纸本)9781424420575
When an emergency occurs within a building, it may be initially safer to send autonomous mobile nodes, instead of human responders, to explore the area and identify hazards and victims. Exploring all the area in the minimum amount of time and reporting back interesting findings to the human personnel outside the building is an essential part of rescue operations. Our assumptions are that the area map is unknown, there is no existing network infrastructure, long-range wireless communication is unreliable and nodes are not location-aware. We take into account these limitations, and propose a novel algorithm, HybridExploration, that makes use of both mobile nodes (robots, called agents) and stationary nodes (inexpensive smart devices, called tags). As agents enter the emergency area, they sprinkle tags within the space to label the environment with states. By reading and updating the state of the local tags, agents are able to coordinate indirectly with each other, without relying on direct agent-to-agent communication. In addition, tags wirelessly exchange local information with nearby tags to further assist agents in their exploration task. Our simulation results show that the proposed algorithm, which exploits both tag-to-tag and agent-to-tag communication, outperforms previous algorithms that rely only on agent-to-tag communication.
In reduced-reference (RR) image quality assessment (IQA), the visual quality of distorted images is evaluated with only partial information extracted from original images. In this paper, by considering the information...
详细信息
Current approaches to detecting bad smells in code are mainly based on software metrics. We suggest that these methods lack precision in detecting bad smells, and we propose a code pattern-based approach to detecting ...
详细信息
Current approaches to detecting bad smells in code are mainly based on software metrics. We suggest that these methods lack precision in detecting bad smells, and we propose a code pattern-based approach to detecting bad smells. However before such a pattern-based approach can be implemented, Fowler's original definitions of bad smells need to be made more precise. Currently Fowler's definitions are too informal to implement in a pattern-searching tool. In this paper we use an expert panel to evaluate our enhanced definitions for five of Fowler's bad smells. We use a questionnaire to survey four experts' opinions of our bad smell definitions. Our results show that the experts basically agree with our enhanced definitions of the message chains, middle man and speculative generality bad smells. However, there are strong disagreements on our definitions of the data clumps and switch statements bad smells. We present enhanced definitions on the basis of these expert opinions.
In this paper, we present a robust approach to digital watermarking embedding and retrieval for digital images. The affine-invariant point detector is used to extract feature regions of the given host image. Image nor...
详细信息
The introduction of multiple remote testers to apply a test or checking sequence introduces the possibility of controllability and observability problems. These problems can require the use of external coordination me...
详细信息
Vector data are normally used for probabilistic graphical models with Bayesian inference. However, tensor data, i.e., multidimensional arrays, are actually natural representations of a large amount of real data, in da...
详细信息
Vector data are normally used for probabilistic graphical models with Bayesian inference. However, tensor data, i.e., multidimensional arrays, are actually natural representations of a large amount of real data, in data mining, computer vision, and many other applications. Aiming at breaking the huge gap between vectors and tensors in conventional statistical tasks, e.g., automatic model selection, this paper proposes a decoupled probabilistic algorithm, named Bayesian tensor analysis (BTA). BTA automatically selects a suitable model for tensor data, as demonstrated by empirical studies.
Recently, there has been an increased awareness in the general public, in government and in business that people with disabilities and older people have distinct needs and preferences that must be met in order for the...
详细信息
Software engineering has proven to be very important for standard software development. But, can Web applications be engineered as well? Currently, J2EE, Apache/Perl/PDP/MySQL and .NET have been universally accepted a...
详细信息
ISBN:
(纸本)9780769533124
Software engineering has proven to be very important for standard software development. But, can Web applications be engineered as well? Currently, J2EE, Apache/Perl/PDP/MySQL and .NET have been universally accepted as Web application development technology, but there is no universal accepted methodology for Web application development process. Web application needs to be engineered by moving focus from technology to process. In this paper, a novel lifecycle model for Web application development in SMEs has been proposed. It includes two iterative process phases with a pre-iterative sequential process phase. This model has been applied to a real-world project and the result has proved its potential to shape the way on how web applications can be engineered in SMEs.
This research investigates knowledge workers' individual time management practices. At an academic institution in the united States, a set of in-depth semi-structured interviews was conducted to explore how indivi...
详细信息
ISBN:
(纸本)9781605609539
This research investigates knowledge workers' individual time management practices. At an academic institution in the united States, a set of in-depth semi-structured interviews was conducted to explore how individual knowledge workers manage their time demands and respond to the temporal norms and boundaries designed by their organizations. This research extends and applies taxonomies used for knowledge management to time management. Based on the qualitative analysis, a variety of approaches to managing time were identified. Personal time management practices mainly involve individual and organizational constraints that guide the perception of time and the allocation of resources around deadlines, distinguishing between work and family contexts. Moreover, the research shows that knowledge workers focus on conditional knowledge of time (i.e., understanding when the deadlines are), and pragmatic knowledge (i.e., finding out appropriate strategies for achieving time management goals). Study limitations and future research opportunities are also discussed.
Particle swarm has proven to be competitive to other evolutionary algorithms in the field of optimization, and in many cases enables a faster convergence to the ideal solution. However, like any optimization algorithm...
详细信息
Particle swarm has proven to be competitive to other evolutionary algorithms in the field of optimization, and in many cases enables a faster convergence to the ideal solution. However, like any optimization algorithm it seems to have difficulties handling optimization problems of high dimension. Here we first show that dimensionality is really a problem for the classical particle swarm algorithms. We then show that increasing the swarm size can be necessary to handle problem of high dimensions but is not enough. We also show that the issue of scalability occurs more quickly on some functions.
暂无评论