The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper discusses the analysis of the respiratory events of sleep apnea patients. The analysis was carried out on the basis of the patient's airflow. As a result of the conducted analysis we proposed an algorithm which establishes an individual respiratory pattern for each subject. The algorithm could be implemented in the measurement-control system which manages the prosthetic device applying positive...
This paper presents a method for automatic identification skin lesion from of a digital image. Some techniques allow the acquisition of a melanocytic skin lesion using the well-known ABCD rule.
Remote patient monitoring can improve the quality of life of elderly and impaired people, while reducing the costs. Among the most interesting technologies being investigated, computer vision has proved to be very effective in several important scenarios in which conventional sensors fail or are impractical. We propose a computer vision-based wireless sensor system for people remote tracking and monitoring...
Recent research in orthopedic surgeries indicates that computer-assisted robotic systems have shown that robots can improve the precision and accuracy of the surgery which in turn leads to better long-term outcomes. An orthopedic robotic system called OrthoRoby and an intelligent control architecture that will be used in bone cutting operations are developed. A medical user interface (MUI) is developed...
In this article the e-learning platforms applied in higher education are being looked at. The comparative analysis of certain platforms in respect of their use in a teaching process was made. The analysis was created based on criteria, chosen for the easiest management of the groups of students, easier communication between lecturers and student, as well as for the easy forming of archives and transforming...
Over the last years Wireless Sensor Networks (WSN) have been becoming increasingly applicable for real world scenarios and now production ready solutions are available. In the same period the upcoming combination of Service-oriented Architectures and Web Service technology demonstrated a way to realize open standardized, flexible, service component based, loosely coupled and interoperable cross domain...
Outdoor sport practitioners can improve greatly their results if they train at the right intensity. Nevertheless, in common training systems the athlete's performance is used for evaluation at the end of the exercises, and the sensed data is incomplete because only human biometrics are analyzed. These systems do not consider environmental conditions, which may have direct influence on athlete's performance...
Gesture recognition has been extensively investigated and has traditionally been accomplished by methods based on computer vision. In this paper we present an hand gesture recognition system which is of general use and can be used for different applications. The system is based on a MEMS accelerometer and it is able to recognise several gestures which have been previously recorded into a suitable...
Uniform Resource Locator (URL) ordering algorithms are used by Web crawlers to determine the order in which to download pages from the Web. The current approaches for URL ordering based on link structure are expensive and/or miss many good pages, particularly in social network environments. In this paper, we present a novel URL ordering algorithm that exploits the access count information present...
The self-similarity becomes one of the method of anomaly detection. The multi-layer `on-off' model of traffic source is developed. The generator implemented according this model allows generate traffic flow characterized by self-similarity. The ability of generation of traffic similar to malicious one is verified by experiments. The results confirm that proposed model is useful to produce traffic...
People can only enjoy the full benefits of Cloud computing if we can address the very real privacy and security concerns that come along with storing sensitive personal information in databases and software scattered around the Internet. There are many service provider in the internet, we can call each service as a cloud, each cloud service will exchange data with other cloud, so when the data is...
The possibility of using MOODLE e-learning platform as an environment for education of database issues, concerning basic database objects and users creating, analysis and transaction management was analyzed in the paper. All of needed extensions were made using php scripts and were tested in the chosen database servers: MySQL, SQL Server and Oracle DBMS. Results of these tests were satisfactory, confirming...
Creative destruction-the creation of new industries and the destruction of old industries-is a very abstract concept. Those teaching entrepreneurship, where creative destruction is a central feature, often struggle to communicate the dynamism of industry evolution where industry disruption can yield innovation, entrepreneurial opportunities and new wealth. This paper examines the application of human...
This paper classified the body motion which is not distinguished when an electric wheelchair is operated by Human Body Motion Interface (HBMI). HBMI uses the body motion which is caused by the voluntary motion. This research focuses on the operation of an electric wheelchair as a practical application of HBMI. It has been confirmed that HBMI, which uses the center of weight on the pressure sensor...
This paper describes an algorithm for a visual human-machine interface that infers a person's intention from the motion of the hand. Work in progress shows a proof of concept tested on static images. The context for which this solution is intended is that of wheelchair bound individuals whose intentions are the direction and speed variation of the wheelchair. Results show that the symmetry property...
A talking and singing robot which adaptively learns the vocalization skill by an auditory feedback learning is being developed. The fundamental frequency and the spectrum envelope determine the principal characteristics of a sound. The former is the characteristic of a source sound generated by a vibrating object, and the latter is operated by the work of the resonance effects. In vocalization, the...
Many GPSs have been introduced into our daily life. It is very convenient to visit some places, but there is some uncertainty to recognize the exact place to be visited. Here, to solve this uncertainty, an attempt to recognize the roads and the building in the real view using the information on a map has been introduced. The system shows the ways to the destination and points the target building in...
This paper introduces a novel vision for further enhanced Internet of Things services. Based on a variety of data - such as location data, ontology-backed search queries, in- and outdoor conditions - the Prometheus framework is intended to support users with helpful recommendations and information preceding a search for context-aware data. Adapted from artificial intelligence concepts, Prometheus...
Our research concerns psychometric data coming from the Minnesota Multiphasic Personality Inventory (MMPI) test. MMPI is used to count the personality-psychometric dimensions which help in diagnosis of mental diseases. In this paper, we test different algorithms for rule generation from data coming from the MMPI-WISKAD test. Especially, for each algorithm, we take into consideration a number of generated...
The subject of the paper is the presentation of the methodology for automated verification of safety conditions of a fieldbus communication in a distributed control system. The methodology is based on a compositional verification method. The composition of partial specifications constitutes a system specification and proves that it satisfies a safety conditions. The safety conditions are formulated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.