The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In response to the rapidly developing of wireless communication technology, the deployed of eNB is denser and more complex. The research of how to handover accurately and fast in LTE-A are discussed much in recent years .In 3GPP Release 8, the UE History Information recorded by eNB was first proposed, it's proposed to provide eNB to judge the target eNB when handover. The history information includes...
The 50-year history of the International Symposium on Antennas and Propagation is summarized. A list of locations, general chairs, and technical programs chairs from 1963 to the present is presented.
Programming often involves reverting source code to an earlier state, which we call backtracking. We performed a longitudinal study of programmers' backtracking, analyzing 1,460 hours of fine-grained code editing logs collected from 21 people. Our analysis method keeps track of the change history of each abstract syntax tree node and looks for backtracking instances within each node. Using this method,...
Programmers often need to backtrack, but backtracking support in modern programming environments is lim-ited. Previously, we have conducted a series of studies, which discovered that backtracking in programming is in fact prevalent and programmers need better backtracking tools. In this demon-stration, we will present our backtracking tool called AZURITE, which provides selective undo and history...
We present a visual notation to support the understanding and reasoning about program edits. The graph-based representation directly supports a number of editing operations beyond those offered by a typical, linear program-edit model and makes obvious otherwise hidden states the code can reach through selectively undoing or redoing changes.
Based on our previous work, this paper discusses IT utilization by long-established Japanese companies and its effects. According to our interviews to some managers of such companies, IT systems have been actively introduced and have shown positive effects. For example, multiple numbers of longestablished Japanese-style confectionary companies in Kyoto such as Wakanaya and Fujikoma, a soba noodle...
A novel approach to utilizing negative information to improve multiple hypothesis tracking (MHT) of extended objects is presented. Specifically, a missed detection of a tracked object is treated as an observation of object occlusion, the likelihood of which is described by an occlusion-based sensor detection model. This negative observation is used to update hypothesis weights in a method that is...
Effective execution of atomic blocks of instructions (also called transactions) can enhance the performance and programmability of multiprocessors. Atomic blocks can be demarcated in software as in Transactional Memory (TM) or dynamically generated by the hardware as in aggressive implementations of strict memory consistency. In most current designs, when two atomic blocks conflict, one is squashed...
The last seven years, Cinvestav-GDL and CICESE, two of the most important research centers in Mexico, have been working together in several microwave research topics. This paper describes the relationship of these two academic institutions regarding to the research activities in this field. A brief history and the research interests of these institutions are presented, highlighting some of the benefits...
This paper reveals a previously ignored problem for fractional order iterative learning control (FOILC) that the fractional order system may have different behaviors when it is initialized differently. To implement a novel scheme of FOILC for this so-called initialized fractional order system, a Dα-type control law is applied, and the convergence condition is derived by using the short memory principle...
Red tourism resources containing historical and cultural connotations are different from the general tourism resources, and it owns certain social and economic benefits. In this paper, in connection with characteristics of red tourism resources, we established the evaluation index system of red tourism resources. We estimated the weights of each indicator by the analytic hierarchy process and evaluated...
To a large extend, collaboration and communication consists of the understanding of extrinsic activity. This task is especially hard to achieve in remote settings or also locally when people cannot take part in meetings. In this paper we are addressing the question, if understanding of the essential decisions, facts, and processes can be achieved by just consuming collaboration data afterwards. Therefore,...
The threat that insiders pose to businesses, institutions and governmental organisations continues to be of serious concern. Recent industry surveys and academic literature provide unequivocal evidence to support the significance of this threat and its prevalence. Despite this, however, there is still no unifying framework to fully characterise insider attacks and to facilitate an understanding of...
In this paper, we design and develop an educational virtual system which can experience Goguryeo tomb murals in the virtual world. Goguryeo tomb murals are well known in the world, and they are registered as a UNESCO World Heritage site by the value Acknowledged worldwide. We design an user-friendly interface for Goguryeo tome murals by Flash, and make a modelling and rendering with 3D Max. In addition,...
It has recently been demonstrated that checklists can enable significant improvements to patient safety. However, their clinical acceptance is significantly lower than expected. This is due to the lack of good support systems. Specifically, support systems are too static: this holds for paper-based support as well as for electronic systems that digitize paper-based support naively. Both approaches...
Electronic access to patient's medication history (PMH) in the emergency department (ED) in Portugal is not widely granted, nor has the importance of such access been clearly assessed. Given the known association between poor PMH and medication errors, the goal of this study was to gather requirements for such a system, assessing physicians' opinions regarding the importance of having access to PMH...
In the age of big data, MapReduce plays an important role in the extreme-scale data processing system. Among all the hot issues, the data skew weights heavily for the MapReduce system performance. In traditional approaches, researchers attempt to leave the users to address the issue which requires the user to possess the application-dependent domain knowledge. Other approaches address the issue automatically...
The palynological analysis of two marine core, MD06-3075 (6.4762°N, 125.8322°E; 1878 m water depth, 30.76 m in length) in the southern Philippines and MD98-2178 (3.6200°N, 118.7000°E; 1984 m water depth, 35.6 m in length) in the northwest Celebes Sea, the detailed oxygen isotope records, and other marine pollen records in the west Pacific, provide the regional vegetation and climate history during...
The palynological analysis of two marine core, MD06-3075 (6.4762°N, 125.8322°E; 1878 m water depth, 30.76 m in length) in the southern Philippines and MD98-2178 (3.6200°N, 118.7000°E; 1984 m water depth, 35.6 m in length) in the northwest Celebes Sea, the detailed oxygen isotope records, and other marine pollen records in the west Pacific, provide the regional vegetation and climate history during...
This paper proposes granularity-based temporal data mining method which constructs clinical process conducted by nurses. The methods consist of three process. First, data on counting sum of executed orders are extracted from hospital information system with a given temporal granularity. Then, similarity-based methods, such as clustering and multidimensional scaling (MDS) are applied to the data and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.