The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the advance of an aging society, people who are physically handicapped have specific needs concerning mobility assistance in relation to their respective living conditions. Moreover, operating an electric wheelchair indoors in confined spaces requires considerable skill. This paper presents an obstacle avoidance support system for an electric wheelchair, using reinforcement learning. The obstacle...
This paper describes the line heating experiment performed. Operating instructions are presented to a worker interactively through a monocular video see-through head mounted display (HMD). We are advancing research of interactive work support technology that unskilled person can perform a task that needs advanced skill by presenting the operating instructions through a wearable device. In order to...
The spherical area where sound pressure is high on a partial target made by Speaker Array is called Sound Spot. In this paper, the amount of characteristic was calculated by using HLAC for an image in video sequence. This study aims to make a peculiar person hear the sound of an individual content.
This paper presents a service which offers security through Web Services technology and offers its services to meet security requirements of Collaborative Learning environment. The use of Web Services to offer security in Collaborative Learning environments complements the functionalities of such environments, that is, it is not limited to the platforms in which the client system was developed. This...
This paper proposes the Covariance Matrix Adaptation based Evolutionary (CMAbE) methodology to overcome the random walk dilemma, characterized by one step delay regarding the real time series values, adjusting time phase distortions in the financial time series forecasting problem. The proposed CMAbE methodology consists of a hybrid model composed of the MultiLayer Perceptron (MLP) networks and the...
Hierarchical localization provides both topological and quantitative metric solutions, with faster performance for the latter since the searchable space is minimized. The initial topological localization step is crucial in those frameworks and should be highly accurate. In this paper, a hierarchical localization approach that primarily focuses on the efficiency of the topological module is presented...
This paper presents team computing, TeC, a framework for end-user design, deployment, and evolution of applications for ubiquitous computing. Systems in TeC act as teams of elements with no central control: elements play their roles autonomously, and system behavior is emergent. The paper presents five small but illustrative systems in the domains of home automation, energy management, and surveillance...
Recent advances in Wireless Sensor Network (WSN) have facilitated the realization of pervasive health monitoring for both homecare and hospital environments. IEEE 802.15.4/ZigBee sensor network support small power consumption and node expansion compared to other network standards for WSN. Body sensor networks (BSN) require a large number of sensors for sensing the medical information from human body,...
In order to improve the reproducibility of mutiwalled carbon nano-tubes (MWCNTs) process, this study integrates the remote monitoring and fuzzy logic control into microwave plasma chemical vapor deposition (MPCVD) system with the reflected microwave power as the main feedback signal. An automatic fuzzy logic controller is used to drive the E-H tuner and adjust the electromagnetic field distribution...
A numerical technique for evaluating brownfields is proposed. The method is based on the representation of redevelopment strategies using fuzzy real options, which can be evaluated using an extended Least Squares Monte-Carlo (LSM) simulation. By employing a fuzzy boundary to represent the contaminated region of a brownfield, the parameters of various options for redevelopment can be estimated. Beginning...
This paper presents a new framework to describe individual facial expression spaces, particularly addressing the dynamic diversity of facial expressions that appear as an exclamation or emotion, to create a unique space for each person. We name this framework Facial Expression Spatial Charts (FESCs). The FESCs are created using Self-Organizing Maps (SOMs) and Fuzzy Adaptive Resonance Theory (ART)...
The use of wearable micro-sensors provides an easy-to-use and cost-efficient way for human motion capture. It is essential but difficult to estimate the global displacements of human walking in micro-sensor motion capture system. This paper proposes a novel method to estimate the global displacements of walking based on the pedestrian dead reckoning technique. The global displacements are obtained...
Multicomputer Interconnection Networks and the design of routing algorithms for these networks, is a very active research domain that in the last decade has given rise to technologically consolidated systems. Nevertheless, from the methodological point of view, the diverse approaches are very limited, moreover in many cases are not complete in order to cover the different phases of the design cycle...
Since switching schemes for removing impulse noise detect the positions of pixels corrupted by impulse noise and selectively only filter out corrupted pixels, the restored image quality can be significantly improved compared with conventional median filters. However, when some impulses cannot be detected with impulse detectors, they remain behind, and may adversely degrade subjective image quality...
Inspired by forensic experts working on authentication of oriental characters like Chinese and Japanese who usually rely on distinguishing detailed features of individual strokes such as dots and straight lines, our new HMM model consisted of many sub-models each represents an individual stroke of a signature. Furthermore, 3 models were compared in 2 steps using a hierarchical manner. First, original...
In this study, we discuss bilateral decision making under time constraint. The problem on time constraint is to evaluate the value of the cost of time for decision procedures. We propose a formula to compute the cost of time by introduction of opportunity cost to its evaluation. We also propose a formula on a strategic point for decision making under time constraint. The strategic point is located...
This paper presents an online Earthquake Disaster Simulator (EDS) designed and developed based on active database technology. This web-based tool allows users to inject the epicenter data of an earthquake with parameters such as magnitude and quake duration in order to get a list of the areas affected based on the distance from the epicenter, and then estimate damages caused by the quake event, including...
More than 90 independent honeypots have observed malware traffic at the Japanese tier-1 backbone. Typical attacks were made by multiple servers, coordinating to send many kinds of malware. This paper aims to discover some frequent new sequential attack patterns of malware. It is not easy to identify particular patterns logs of one year because the volume of dataset is too large to investigate one...
Finding the longest simple path in a generic undirected graph is a challenging issue that belongs to the NP-Complete class of problems. Four approaches based on genetic algorithms to solve this problem are presented in this article. The first three algorithms proposed use crossover mechanisms between pairs of solutions based on their intersecting regions and the fourth one uses a mutation mechanism...
Safety and security issues are increasingly converging on the same critical systems, leading to new situations in which these closely interdependent notions should now be considered together. Indeed, the related requirements, technical and organizational measures can have various interactions and side-effects ranging from mutual reinforcements to complete antagonisms. A better characterization of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.