The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper discusses about emerging technologies and recent development on Pervasive Biomedical Engineering also the exciting possibilities of future development. We start by explaining why pervasive or ubiquitous computing is possible. From rapid development of wireless device to miniaturization and cost reduction in semiconductors, from wearable to implanted sensor, and rigorous improvement on computational...
The research proposes a design of 12-channel rotary sensor for electrical capacitance volume tomography (ECVT) toward improvement in image reconstruction result. Sensor was assembled by attaching motors at upper section to rotate in radial; also at side to move up and down. Effects of rotating and translating the sensor has been analyzed in comparison to conventional sensory system. Correlation coefficient...
Bearing is a mechanical element of machine to reduce friction between two rotating objects. Bearings have an optimal lifetime but in real application, not all of them are able to reach their lifetime and most of them are damaged in a relatively short time. Any flaw on bearing that is not addressed earlier can lead to operation failure on mechanical equipment or machines. Usually type of bearing damage...
Contours are one of the most commonly used shape descriptors in object recognition problem. In this paper, we proposed object recognition system based on shape. The shape is obtained by extracting the contour of the object in the image using common techniques in image processing domain. Further, the shape is represented by using chain coding technique and the chain coded representation is modified...
Shortest path algorithm is one of classic IT problems and already used in many aspects. One of well-known shortest path algorithm is A-Star algorithm. Usually A-Star will be implemented to a Non-Playable Character (NPC) in some games. This paper wants to tell how to optimize A-Star algorithm in a hexagon-based environment using Parallel Bidirectional Search (PBS). The result of this paper is PBS A-Star...
The paper describes the method image superresolution from two frames on the basis of aggregate divergence matrix elements of the theory and genetic algorithms. Shows different ways for building oversampling images algorithms based on the proposed method. Experimentally established the effectiveness of the procedures oversampling images at high zoom resolution by the developed method. Comparative performance...
The aim of the study is to create scientific-based methods of management of information influence which could be used in the management information support in the preparation and conduct of military actions. The main idea of this research is to substantiate and formally submit such scientific and methodological tools of management influence that will provide significant improvement of ways of preparation...
This paper reports the development of an ontology for Juz' Amma in the Quran manuscript that is designed based on the contextual information support sourced from expert knowledge. The ontology development adopts an existing methology called the Methontology that covers steps from identifying motivation scenarios, formulating the competency questions, development, and evaluation. The ontology was evaluated...
Refactoring has been widely used to improve software design. Refactoring is applied when a bad smell is detected. Several bad smells might be present in the code. In this paper, we conduct an empirical study to find if the order of applying refactoring has any impact on the quality of the final code. We run six experiments by applying three refactoring methods in different orders and evaluate the...
A mock examination is an exam that does not count for credit. It is taken before an official examination and gives students the opportunity to practice for the later, important exam. The mock examination provides students with information on their actual learning progress and gives them in this way the opportunity to fill knowledge gaps. An electronic mock examination is the online variant usually...
Since, both the business and technological environments changed at an increasing rate, flexibility has become a main and important reason for project management in software developing regions. Methodology plays a significant role in flexible development of software. However, the question is, How should we do it? The web technology, communicating network technologies and system hardware is in rapid...
One of the sub areas of the data mining includes sequential pattern mining. This mining algorithm is to find the repeating patterns after mining the sequence databases. These are used to find the relation between the various items in the data for different purposes. As these data keep changing according to the change in time, mining should be done on incremented or updated database to obtain the frequent...
Image stitching is done by combining multiple input images such that the ideal result is a single image that contains contexts from all the inputs as well as seamless transitions between contexts. It is most commonly used in the field of panoramic photography. Large dissimilarities in the input image set are very problematic in image stitching applications. These cause several objections in the resulting...
We developed a life support system for connecting PC with the real world. This system has seamless interface between the personal computer (PC) world and the real world, we have been studying a method for teaching a caregiver robot and a caregiver person. The interface proposed here allows a user to intuitively direct a robot's motion via a graphical user interface of the sort typical in the PC world...
One of the main difficulty faced by students after their secondary education, is in taking critical decisions regarding their academic itinerary. As a preliminary approach a web based guidance system has been proposed to help the 10th standard students to select an appropriate stream of study.
A group of algorithm enhancing such collective behavior is inspired by the animals working together as a group such as ants, bees, and etc. In connection, swarm is defined as a set of two or more independent homogenous or heterogeneous agents acting upon a common environment in a coherent fashion which generates emergent behavior. The development of artificial swarms or robotic swarms has attracted...
This paper presents a characterization of the depth map from an RGB-D sensor, Kinect 360, to be used as an input to an obstacle detection system. Since the accuracy, reliability and timeliness of the data are crucial in the system, there is a need to characterize it. Sensor repeatability tests are done to characterize the depth map. The mean and standard deviation of measured depths and mean error...
Having clear vision is important for humans. For years devices were invented to give clear vision. One of this devices are contact lenses. A classification of contact lenses is a either hard or soft type. Hard contact lenses are extremely durable and does not dehydrate but can easily be dislodged from the eye and uncomfortable to wear. Soft contact lenses on the other hand are more comfortable to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.