The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Formal program verification is a powerful technique to ensure the correctness of programs. To perform this technique, one oftentimes needs to manually specify assertions, which is a time-consuming and error-prone task. Generating assertions automatically can significantly improve the usability of formal program verification. To decide where an assertion is needed heavily and which value range of the...
The goal of the Internet of Things (IoT) is to transform any thing around us, such as a trash can or a street light, into a smart thing. A smart thing has the ability of sensing, processing, communicating and/or actuating. In order to achieve the goal of a smart IoT application, such as minimizing waste transportation costs or reducing energy consumption, the smart things in the application scenario...
The relationship between the use of Geogebra and Technological Pedagogical Content and Knowledge (TPACK) by teachers has not been fully investigated and understood. Therefore, the aim of this study was to integrate GeoGebra technology to develop the TPACK of secondary school pre-service mathematics teachers. The participants of this study were 60 Indian teachers. Data were collected through the administration...
This paper presents an implementation of a stereo system using image processing techniques in order to determine the distance to an object from a pair of images. Starting from this, the algorithm calculates the disparity image. The distance to an object is determined by using filters, making a histogram of the disparity image and interpolating. The entire algorithm has been implemented on the BeagleBoneBlack...
In the electricity sector, new sides have emerged with the development of technology and the increasing the electric energy need. Today, electricity has become a product that is bought and sold in the market environment. Forecasting which is the first step of plans and planning have become much more important and have been made mandatory for the market participants by energy market regulators. In...
Identifying bug immediately when it is introduced can help improve the validity and effectiveness of bug fixing. Predicting bugs in software code changes makes such identification possible. Buggy changes, changes that introduce bugs into source code, can be viewed as anomalies relative to clean changes for that they are rare and irregular. Thus, anomaly detection techniques can be applied to buggy...
Software watermarking is a general tool usedto combat software piracy by embedding identifying informationinto a program. Most existing schemes of softwarewatermarking have the weak point that the security onlydepends on the stealth of the watermark structure. Besides,the watermarking is independent of program in semantic leveland can be destroyed via fairly straightforward semanticspreservingcode...
The analysis and feature extraction of surface electromyography signal (sEMG) are important in the clinical diagnosis of human function state and patients rehabilitation. The principle of rehabilitation training and implementation process is introduced in the paper. The hardware of the control system and the mode of training and the spectacle of virtual reality are designed. while the feature extraction...
The focus of this paper is on presentation attack detection for the iris biometrics, which measures the pattern within the colored concentric circle of the subjects' eyes, to authenticate an individual to a generic user verification system. Unlike previous deep learning methods that use single convolutional neural network architectures, this paper develops a framework built upon triplet convolutional...
Control methods based on sEMG obtained promising results for hand prosthetics. Control system robustness is still often inadequate and does not allow the amputees to perform a large number of movements useful for everyday life. Only few studies analyzed the repeatability of sEMG classification of hand grasps. The main goals of this paper are to explore repeatability in sEMG data and to release a repeatability...
Several defect prediction models proposed are effective when historical datasets are available. Defect prediction becomes difficult when no historical data exist. Cross-project defect prediction (CPDP), which uses projects from other sources/companies to predict the defects in the target projects proposed in recent studies has shown promising results. However, the performance of most CPDP approaches...
The extended format of HEVC, Scalable HEVC (SHVC), has been developed to serve users with mobile devices under heterogeneous networks. The SHVC can provide different bitrate, resolution, or quality formats of the same video through the one-time encoding process. As the SHVC is developed based on the HEVC, its time complexity is high and has to be reduced for practical applications. In the SHVC, it...
In a training process for DSP software developers' major schools and scientific societies see an actual problem for a kind of transformation from a traditional form of training into different remote forms, using one-to-many online training courses and interactive case study. We have analyzed many different examples of such a new forms of trainings that have been used or trialed by major technical...
More and more modern applications make use of natural language data, e. g. Information Extraction (IE) or Question Answering (QA) systems. Those application require preprocessing through Natural Language Processing (NLP) pipelines, and the output quality of these applications depends on the output quality of NLP pipelines. If NLP pipelines are applied in different domains, the output quality decreases...
Individual surgeons rely on residency programs as their main conduit for developing the necessary soft skills needed to succeed and excel in the operating room. One critical skill requiring subjective (qualitative) learning involves navigating through varying soft and hard tissues by hand, and, most importantly, understanding how medical instruments respond under these conditions. During residency,...
Self-Organizing Maps (SOM) [ ] are a popular clustering and visualization algorithm. Several implementations of the SOM algorithm exist in different mathematical/statistical softwares, the main one being probably the SOM Toolbox [2]. In this presentation, we will introduce an R package, SOMbrero, which implements several variants of the stochastic SOM algorithm. The package includes several diagnosis...
Maintaining an external focus of attention (FA), as with virtual reality exercise gaming, may be effective in encouraging greater dynamic lateral movements and greater weight bearing for individuals post stroke. This study sought to compare center of pressure movements for individuals post-stroke under three conditions (internal FA, external FA, virtual reality) and compare these differences to healthy...
The aim of this paper is to present a comparison between the performance of virtual and conventional rehabilitation of upper limb gross motor function. To this purpose we define two rehabilitation exercises with a high degree of similarity. The virtual exercise is a computer implementation of the well known game “whack a mole” and the conventional exercise is based on a “shape-sorter” didactic toy...
The aim of the current study was to examine the effectiveness of a meta-cognitive intervention program that uses virtual reality training (VAP-S) to improve the implementation of a shopping task among adolescents with Autism Spectrum Disorder (ASD). The study included 56 adolescents aged 11–19 with ASD, of which 37 performed the intervention program while the remaining 25 formed a control group who...
Multi-label text classification plays a significant role in information retrieval area. The effectiveness of the techniques is especially important in the case of medical documents. In the paper, application of feature selection methods for improving multi-label medical text classification is discussed. We examine combining problem transformation methods with different approaches to feature selection...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.