No abstract available.
Proceeding Downloads
Online and offline determination of QT and PR interval and QRS duration in electrocardiography
Duration and dynamic changes of QT and PR intervals as well as QRS complexes of ECG measurements are well established parameters in monitoring and diagnosis of cardiac diseases. Since automated annotations show numerous advantages over manual methods, ...
Predicting reader's emotion on chinese web news articles
Currently, more and more information are spreading on the web. These large amounts of information might influence web users' emotion quite a lot, for example, make people angry. Thus, it is important to analyze web textual content from the aspect of ...
Clustering algorithm based on triple-stranded and 3-armed DNA model
The quality of traditional grid-clustering and pure hierarchical clustering methods suffers from some limitations, especially the inability of hierarchical clustering to perform adjustment on once merge or split decision. However, DNA computations can ...
Synthesis of real-time applications for internet of things
This paper presents the methodology for synthesis of real-time applications working in the Internet of things environment. We propose the client-server architecture, where smart embedded systems act as clients, while the Internet application is a server ...
iScope: viewing biosignals on mobile devices
- Christian Breitwieser,
- Oliver Terbu,
- Andreas Holzinger,
- Clemens Brunner,
- Stefanie Lindstaedt,
- Gernot R. Müller-Putz
We developed an iOS based application called iScope to monitor biosignals online. iScope is able to receive different signal types via a wireless network connection and is able to present them in the time or the frequency domain. Thus it is possible to ...
CloudSVM: training an SVM classifier in cloud computing systems
In conventional distributed machine learning methods, distributed support vector machines (SVM) algorithms are trained over pre-configured intranet/internet environments to find out an optimal classifier. These methods are very complicated and costly ...
A document-based data warehousing approach for large scale data mining
Data mining techniques are widely applied and data warehousing is relatively important in this process. Both scalability and efficiency have always been the key issues in data warehousing. Due to the explosive growth of data, data warehousing today is ...
Smart navigation for firefighters in hazardous environments: a ban-based approach
Recent advances in integrated electronic devices motivated the use of Body Area Networks in many applications including monitoring, localization, tracking and navigation. In this paper we introduce an indoor navigation approach based on Body Area ...
Personalized recommendation based on implicit social network of researchers
In this paper we discuss the importance of social network of researchers for personalized recommendation of researchers and papers. We begin by briefly describing collaborative filtering method for personalized recommendation and its cold start problem ...
Effect on generalization of using relational information in list-wise algorithms
Learning to rank became a hot research topic in recent years and utilizing relational information in list-wise algorithms was discovered to be valuable and was widely adopted in various algorithms. These algorithms' empirical performances were usually ...
The optimization of two-stage planetary gear train based on mathmatica
Planetary gear reducer has a lot of advantages, such as high transmission and efficiency, compact structure, and has a variety of applications in construction machinery and equipment, hoisting and conveying machinery and so on. The optimization design ...
Mobi-CoSWAC: an access control approach for collaborative scientific workflow in mobile environment
With the development of mobile technology and popularity of pervasive applications, more and more scientific collaborative research works are carried out in the wild or on the move. How to make an optimal tradeoff between deep collaboration and strict ...
A survey of learning to rank for real-time twitter search
Recently learning to rank has been widely used in real-time Twitter Search by integrating various of evidence of relevance and recency features into together. In real-time Twitter search, whereby the information need of a user is represented by a query ...
An ontology-based information extraction approach for résumés
A Curriculum Vitae (CV) or a résumé, in general, consists of personal information, education information, work experience, qualifications and preferences parts. Scanning or making structural transformation of the millions of free-formatted résumés from ...
Measure method and metrics for network characteristics in service systems
As the development of Service-oriented architecture and service engineering, they have been generally adopted as the architecture and engineering method of software. More and more service applications and systems are constituted by distributed resources ...
AIM: a new privacy preservation algorithm for incomplete microdata based on anatomy
Although many algorithms have been developed to achieve privacy preserving data publishing, few of them can handle incomplete microdata. In this paper, we first show that traditional algorithms based on suppression and generalization cause huge ...
An overview of transfer learning and computational cyberpsychology
Computational CyberPsychology deals with web users' behaviors, and identifying their psychology characteristics using machine learning. Transfer learning intends to solve learning problems in target domain with different but related data distributions ...
A formal approach to model the interaction between user and ami environment
According to the decentralization of modeling tasks caused by user who is essentially nondeterministic and highly individual in Ambient Intelligence (AmI) environment, the mental model, plan model and behavior model are introduced to describe both ...
Multi-Robot traveling problem constrained by connectivity
Multi-robot system provides more advantages over a single robot. In certain situations, robots need to maintain global connectivity while proceeding tasks such as traveling some interested spots in an area. This paper formulates the Multi-Robot ...
An application study on vehicle routing problem based on improved genetic algorithm
The Vehicle Routing Problem of Logistics and Distribution is a hot and difficult issue in current field of combinatorial optimization, therefore this paper presents an improved genetic algorithm. The algorithm which applied the idea of Saving Algorithm ...
Cost-Effective and distributed mobility management scheme in sensor-based PMIPv6 networks with SPIG support
Due to limited resources, the slow progressive development of wireless sensor networks (Wireless Sensor Network) through the development of hardware and power management technology is currently in progress for the development of the latest IP-based IP-...
The research on virtual assembly technology and its application based on OSG
This system is a virtual assembly one of a type of cylinder cover which based on OSG. The system uses OSG the 3Dgraphics engine to realized model rendering, human-computer interaction, stereoscopic displaying, parts dragging, animation path and other ...
An enhanced security mechanism for web service based systems
Web service technologies have been widely used in diverse applications. However, there are still many security challenges in reliability, confidentiality and data nonrepudiation, which are prominent especially in some Web service systems that have ...
Data-Apart hybrid centralized scheduling in coordinated multi-point system with non-ideal backhaul link
Coordinated Multi-Point (CoMP) transmission is a promising technique to improve the coverage of high data rates, the cell-edge throughput in cellular networks, in which centralized CoMP can obtain global optimal cooperation when CU can gather CoMP ...
Geo-Ontology-Based object-oriented spatiotemporal data modeling
Spatiotempoal data model is fundamental to geospatial data representation, organization, analysis and applications. Due to the absence of geospatial semantic modeling and its logical structure, the spatiotemporal data may be interpreted mistakenly by ...
A new object-oriented approach towards GIS seamless spatio-temporal data model construction
Spatio-temporal data model has been recognized as the foundation of the description of spatiotemporal characteristic for geographic entity. In this paper we present a new way to construct seamless spatio-temporal data model and explore the ...
Mechanical research of the planet carrier in wind turbine gear increaser based on co-simulation of ADAMS-ANSYS
As one of the most important parts in the wind turbine gear increaser, the planet carrier plays a role that is irreplaceable in the whole machine equipment. Co-simulation technology is one kind of new method which owes the characteristic of higher ...
PAPR reduction for 802.16e by clipping and tone reservation based on amplitude scale factor
IEEE 802.16e is a widely used standard for mobile broadband wireless access system and Orthogonal Frequency Division Multiplexing (OFDM) is employed in this system. So, it can perform well in anti-multipath fading and spectrum utilization. But there are ...
A DCaaS model of DNA computing for solving a class of nonlinear problems
A class of new cloud computing model DCaaS is proposed. This model combines traditional DNA computing with SaaS model. The main advantage of DCaaS model is to separate biological experiments with DNA computing, and obtain biological operations as a ...
How to dynamically protect data in mobile cloud computing?
Mobile cloud computing (MCC) is introduced as a supporting architecture for mitigating the resources and energy limitations of mobile devices. And security is considered as a key factor which significantly affects MCC's widely deployment. Thus data ...