The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the summer of 2015, a five-day professional development workshop was held at West Virginia University Institute of Technology, located in Montgomery, West Virginia, with the objective of providing systematic training of project-based learning to high school math teachers. Twenty-two teachers participated in the workshop. Instructors of the workshop were faculty members from West Virginia University...
5G systems can use time division duplex (TDD) small cells employing interference cancellation (IC) receivers. IC-aware scheduling can be used to exploit strong interference cancellation with coordination. The novelty of the approach is that a scheduler purposely schedules strong interference situations in TDD instead of avoiding the interference. In this paper, we propose centralized multiple input...
The objective of this paper is to investigate the options for using local demand to accelerate the connection of renewable Distributed Generation (DG) capacity. It presents a range of architectures for operating Distributed Energy Systems (DESs) that contain local demand and distributed generation. The concept of a DES is that demand is supplied by local DG either using privately owned distribution...
This paper presents a new resource allocation protocol for D2D communications within LTE-based networks. The proposed scheme is a cluster based approach: the base station is implied only during the connection phase to assign initial resource allocation values to D2D users. Thereby, the base station is less solicited, and D2D communications can be scheduled by nodes themselves, following channel access...
In this paper, we propose a phase noise cancellation algorithm in MIMO-OFDM systems where each transmit (TX) and receive (RX) antenna is equipped with independent oscillator. Most of previous works have considered phase noise model only in SISO-OFDM or simplified phase noise model in MIMO systems assuming that each TX and RX end shares one local oscillator. Recently, however, the local oscillator...
Bluetooth low energy beacons have gained traction among ambient intelligence researchers. Their low cost and robustness make them a fit choice for ambient assisted living or other healthcare applications. Nevertheless, similar to many other radio-frequency based technologies, beacons pose serious challenges when it comes to developing applications that require predictability. Moreover, the multipath...
The focus of this paper is on safety-critical inter-vehicular communications in strings circulating on highways and main roads. The time-bounded channel access delay (BCAD) and the time-bounded message acknowledgment (TBMA) problems are specified. We present a collision-free deterministic directional MAC protocol that solves both problems. At the same time, that protocol minimizes string-wide message...
As one of the most critical tasks in structural damage monitoring, real-time impact localization plays the vital role in improving the durability of a structure, especially in the field of aerospace. Fiber Bragg Grating (FBG) sensors have been widely applied in composite materials structural health monitoring (SHM) system. This paper proposes a progressive combination recognition algorithm named back...
It is widely accepted that successful engineers need to write accurately and effectively about complex topics. As engineers gain professional status and increased job responsibilities, they write more often and with higher stakes. Those who cannot express themselves well using standard English face a major hurdle to their long-term professional success. Alarmingly, many of today's students come to...
In this paper, we propose a simple security framework for MQTT (for short, AugMQTT) by incorporating the AugPAKE protocol [16]. As a distinguishing feature, AugMQTT does not require any certificate validation checks and certificate revocation checks on both publishers/subscribers and broker sides. Also, we discuss several aspects of AugMQTT followed by performance overhead of the AugPAKE protocol...
Agarwood is well known as one of the expensive woods in the world. It has a unique scent which brings it to have wide usages especially in perfumery ingredient, as incense, in traditional medical preparation, and as symbol of wealth. Due to that, this paper presents the analysis on chemical profiles of agarwood chipwood, as a part of agarwood grading system. The work involved of Solid Phase Microextraction...
Recent advances in signal processing for the detection of Steady-State Visual Evoked Potentials (SSVEPs) have moved away from traditionally calibrationless methods, such as canonical correlation analysis, and towards algorithms that require substantial training data. In general, this has improved detection rates, but SSVEP-based brain-computer interfaces (BCIs) now suffer from the requirement of costly...
While we recognize additional studies are needed to confirm repeatability and reliability in detecting normative and pathologic values, our methodology is an important step in demonstrating quantifiable measurements of the visual system as an indirect measurement of brain function.
Although Mental Imagery based Brain-Computer Interfaces (MI-BCIs) seem to be very promising for many applications, they are still rarely used outside laboratories. This is partly due to suboptimal training protocols, which provide little help to users learning how to control the system. Indeed, they do not take into account recommendations from instructional design. However, it has been shown that...
Our emotion estimation refers to estimation of a reader's sentiments and feelings after they read a narrative (i.e., post-reading emotion types). The emotion types manifest in a reader's feelings combine to form diverse and various patterns. To elicit this phenomenon, we here attempt to estimate readers' emotional patterns based on their cognitive appraisals of the work. This paper describes our cognitive...
We study a house allocation problem where there are both existing tenants and new applicants. The NH4 mechanism is a real-world allocation mechanism which satisfies individual rationality, fairness and strategy-proofness. But it fails Pareto efficiency. We propose an efficiency-adjusted NH4 mechanism that allows each student to consent a certain priority violation that has no effect on her own assignment...
This paper presents a new approach to C-space exploration and optimal path planning for robotic manipulators and planar scenarios using the structure named bur of free C-space. This structure builds upon the so-called bubble, which is a local volume of free C-space, easily computed using the distance information in the workspace. It is previously shown how burs can be used to form a rapidly exploring...
In this work an unconditionally hiding auditing procedure for distributed (cloud) storage solutions is introduced. There is only one multi-party computation (MPC) scheme providing auditability which computationally protects the inputs of the computations. Building on this, we propose a computationally hiding solution that uses bilinear maps and therefore produces no additional overhead in the online...
In software development application lifecycle management (ALM) systems are used to support the development process. As these products are tailored for best fitting the applied programs and their actual usage is diverse. Often, this means that products of different vendors are applied, which reduce the reachability between different artefacts and the overall consistency of the system. In this paper...
Festinating gait is one of the most commonly seen motor symptoms of Parkinson's Disease patients. In this research, an accelerometer-based sensing system implemented on a vest is used to detect the behavior of festinating gait. The detection algorithm is based on the analysis of gait symmetry from the data measured by accelerometers. Specific indices were proposed to evaluate the severity of festinating...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.