The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This essay organizes and summarizes 21 essays and documents about team performance appraisal methods published on CSSCI core periodical, analysing and investigating from determination of nature, determination of quantity and the combination of both perspective. At the same time, the essay organizes and analyses the content of performance appraisal and the characteristics of subject evaluated, based...
We describe the architecture, problems and lessons learned from building a Health Kiosk from commercial, off-the shelf Personal Health Devices and a computer with a touch-screen interface. The kiosk is used autonomously by patients to measure vital data prior to a consultation, in the scope of a population screening, or for routinely monitoring. The prototype was tested in multiple events with different...
In this study, an interactive upper-limb stroke rehabilitation system integrating motion tracking device (MTD), electroencephalogram (EEG) device, and virtual reality (VR) game is proposed to assist patients for performing upper-limb rehabilitation treatment and save the patients' rehabilitation information, such as hand movement trajectory and angle of wrist pronation and supination. During the treatment,...
Swallowing action is one of the two fundamental elements of food intake mechanism. Classification of different swallowing patterns establishes an important part of the nutrient activity analysis. This paper is a preliminary research that investigates ingestion monitoring. We observe that throat microphone recordings can reveal certain characteristics of different swallowing types during food intake...
Wireless Revolution V.2 in the form of Internet of Things (IoT) necessitates development of RF on rapidly evolving manufacturing processes using a small team of engineers. These processing nodes are tuned for digital performance and typically present with higher process variations. Manufactured RF devices either need to include larger margins to guarantee performance or be tuned post-manufacture to...
Electromagnetic Security refers to the compliance of electronic devices with Information Security requirements with regards to EMC/EMI issues, and has important implications where there are Functional Safety or other risks to be managed. In this study, the resilience and the integrity of electronic devices are the topics of interests. Many studies were devoted to the analysis and the classification...
A new metric is proposed to solely evaluate the performance gap of digital ring oscillators between silicon and model specifications. It separates the impact of device leakage from the traditional static current versus RO frequency. When using together, these two metrics can identify the sources of silicon gap and guide process improvement in the fab.
New data intensive applications, which are continuously emerging in daily routines of mobile devices, significantly increase the demand for data, and pose a challenge for current wireless networks due to scarce resources. Although bandwidth is traditionally considered as the primary scarce resource in wireless networks, the developments in communication theory shifts the focus from bandwidth to other...
Tilt of the shallow trench isolation on the wafer edge with the radial signature is a known issue for all technology nodes. Presence of this tilt was proven by cross-sectional TEM measurements. For advanced nodes, starting from 28 nm, this tilt becomes one of the crucial yield-killer strongly influencing the performance of the edge dies. If this tilt is not corrected for, overlay values of all FEOL...
Circuit monitoring techniques have been adopted widely to compensate for process, voltage, and temperature variations as well as power optimization of integrated circuits. For cost and complexity reasons, these techniques are usually implemented by means of performance monitors allowing fast performance evaluation during production. In this paper, we demonstrate the limitations of performance monitoring...
It is found that voltage-accelerated stressing can change the switching activity of a time-zero oxide defect measured under operating condition. The defect can be rendered either less active or more active by the applied stress, implying a possible modification of its atomic structure. With the impact of oxide trapping on MOSFET channel conduction becoming increasingly important as device dimension...
Cellular service subscribers are increasingly reliant on cellular data services for all kinds of mobile applications. Oftentimes, when subscribers experience frustratingly high network delays and timeouts, they like to know whether their experiences are shared by other users nearby. The question that is often asked is essentially this: “is it just me, or do others around me face the same problem?”...
Most devices deployed in the Internet of Things (IoT) are expected to suffer from resource constraints. Using specialized tools on such devices for monitoring IoT networks would take away precious resources that could otherwise be dedicated towards their primary task. In many IoT applications such as Advanced Metering Infrastructure (AMI) networks, higher order devices are expected to form the backbone...
Software-Defined Networking (SDN) is an emerging networking technology that has attracted intense interest from both the industry and research communities. Thus far, it is primarily applied to datacenters and research network environments. Despite meticulous effort in planning and equipment selection prior to deployment, there remain unknowns that can affect the network's performance after equipment...
Electricity is an integral utility in modern society. Electricity networks carry power to various end users, and disruptions cause high socioeconomic cost. Electricity distribution network operators are ranked predominantly on system performance, economic performance and customer satisfaction. System reliability has an impact on all of the above mentioned indicators. High and medium voltage networks...
Fault protection as a discipline involves a collection of flight software logic and operational processes for detecting unacceptable anomalous behavior, responding prior to reaching criticality, restricting the propagation of a failure beyond a fault containment region, and recovering the vehicle back to full or degraded functionality if possible. The System Fault Protection (SFP) design for the SMAP...
The Cloudifier project deals with the design and development of an ecosystem of toolsfor the assisted migration to a cloud or multi-cloud environment of scientificand business-oriented distributed applications. Recent surveys show that many of theorganizations that are not yet running their applications in the cloud are experimentingwith infrastructure-as-a-service mode. The Cloudifier tools will...
This paper shows the design of a wearable device for measuring vital signs, oriented to monitoring applications and home health care. In order to improve the living conditions of the patient, device allows that the patient can perform their daily activities while their health is monitored. The designed device allows measuring electrocardiogram, blood oxygen saturation, non-invasive blood pressure...
The performance requirements for spectroscopy-based portal monitors are describedin this standard. The requirements stated are based on portal monitors used in support of effortsassociated with the U.S. Department of Homeland Security. (The PDF of this standard is available in the IEEEGET program. "IEEE Get Program" grants public access to view and download individual PDFs of select standards...
With the tremendous growth of usage of internet and development in web applications running on various platforms are becoming the major targets of attack. New threats are create everyday by individuals and organizations that attack network systems. Intrusion is a malicious, externally induced operational fault. Intrusion is used as a key to compromise the integrity, availability and confidentiality...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.