925 resultados para Mobile roundtable
Resumo:
This special issue provides the latest research and development on wireless mobile wearable communications. According to a report by Juniper Research, the market value of connected wearable devices is expected to reach $1.5 billion by 2014, and the shipment of wearable devices may reach 70 million by 2017. Good examples of wearable devices are the prominent Google Glass and Microsoft HoloLens. As wearable technology is rapidly penetrating our daily life, mobile wearable communication is becoming a new communication paradigm. Mobile wearable device communications create new challenges compared to ordinary sensor networks and short-range communication. In mobile wearable communications, devices communicate with each other in a peer-to-peer fashion or client-server fashion and also communicate with aggregation points (e.g., smartphones, tablets, and gateway nodes). Wearable devices are expected to integrate multiple radio technologies for various applications' needs with small power consumption and low transmission delays. These devices can hence collect, interpret, transmit, and exchange data among supporting components, other wearable devices, and the Internet. Such data are not limited to people's personal biomedical information but also include human-centric social and contextual data. The success of mobile wearable technology depends on communication and networking architectures that support efficient and secure end-to-end information flows. A key design consideration of future wearable devices is the ability to ubiquitously connect to smartphones or the Internet with very low energy consumption. Radio propagation and, accordingly, channel models are also different from those in other existing wireless technologies. A huge number of connected wearable devices require novel big data processing algorithms, efficient storage solutions, cloud-assisted infrastructures, and spectrum-efficient communications technologies.
Resumo:
A resazurin (Rz) based photocatalyst activity indicator ink (paii) is used to test the activity of commercial self-cleaning materials. The semiconductor photocatalyst driven colour change of the ink is monitored indoors and outside using a simple mobile phone application that measures the RGB colour components of the digital image of the paii-covered, irradiated sample in real time. The results correlate directly with those generated using a traditional, lab-bound method of analysis (UV–vis spectrophotometry).
Resumo:
The majority of children in our society are loved andcherished. The occasional cases of intentional injury to a childresulting in death or significant harm evoke powerful anduncomfortable feelings (Devaney et al, 2013), and the publicoutcry may result in health and social workers facing criticism.Identifying whether an infant is at risk of abuse is a challengefor practitioners, and can be a source of stress and anxiety(Brandon et al, 2011). Bruising is a strong indicator of childabuse involving intentional injury (Kemp et al, 2014). Theincidence of bruising correlates to developmental stage, withnon-mobile infants least likely to incur bruising. Therefore, itspresence in pre-mobile infants requires immediate assessment.A search of the literature around bruising in pre-mobile infantsrevealed themes of missed opportunities for early intervention,the role of the father in the family and the significance of childdevelopment. Sharing of knowledge and expertise within themultidisciplinary team is key to safeguarding infants.
Footprints in the sand: a persistent spatial impression of fishing in a mobile groundfish assemblage
Resumo:
Fishing is well known to curtail the size distribution of fish populations. This paper reports the discovery of small-scale spatial patterns in length appearing in several exploited species of Celtic Sea demersal 'groundfish'. These patterns match well with spatial distributions of fishing activity, estimated from vessel monitoring records taken over a period of 6 years, suggesting that this 'mobile' fish community retains a persistent impression of local-scale fishing pressure. An individual random-walk model of fish movement best matched these exploitation 'footprints' with individual movement rates set to <35 km per year. We propose that Celtic Sea groundfish may have surprisingly low movement rates for much of the year, such that fishing impact is spatially heterogeneous and related to local fishing intensity.
Resumo:
Those living with an acquired brain injury often have issues with fatigue due to factors resulting from the injury. Cognitive impairments such as lack of memory, concentration and planning have a great impact on an individual’s ability to carry out general everyday tasks, which subsequently has the effect of inducing cognitive fatigue. Moreover, there is difficulty in assessing cognitive fatigue, as there are no real biological markers that can be measured. Rather, it is a very subjective effect that can only be diagnosed by the individual. Consequently, the traditional way of assessing cognitive fatigue is to use a self-assessment questionnaire that is able to determine contributing factors. State of the art methods to evaluate cognitive! fa tigue employ cognitive tests in order to analyse performance on predefined tasks. However, one primary issue with such tests is that they are typically carried out in a clinical environment, therefore do not have the ability to be utilized in situ within everyday life. This paper presents a smartphone application for the evaluation of fatigue, which can be used daily to track cognitive performance in order to assess the influence of fatigue.
Resumo:
This research presents a fast algorithm for projected support vector machines (PSVM) by selecting a basis vector set (BVS) for the kernel-induced feature space, the training points are projected onto the subspace spanned by the selected BVS. A standard linear support vector machine (SVM) is then produced in the subspace with the projected training points. As the dimension of the subspace is determined by the size of the selected basis vector set, the size of the produced SVM expansion can be specified. A two-stage algorithm is derived which selects and refines the basis vector set achieving a locally optimal model. The model expansion coefficients and bias are updated recursively for increase and decrease in the basis set and support vector set. The condition for a point to be classed as outside the current basis vector and selected as a new basis vector is derived and embedded in the recursive procedure. This guarantees the linear independence of the produced basis set. The proposed algorithm is tested and compared with an existing sparse primal SVM (SpSVM) and a standard SVM (LibSVM) on seven public benchmark classification problems. Our new algorithm is designed for use in the application area of human activity recognition using smart devices and embedded sensors where their sometimes limited memory and processing resources must be exploited to the full and the more robust and accurate the classification the more satisfied the user. Experimental results demonstrate the effectiveness and efficiency of the proposed algorithm. This work builds upon a previously published algorithm specifically created for activity recognition within mobile applications for the EU Haptimap project [1]. The algorithms detailed in this paper are more memory and resource efficient making them suitable for use with bigger data sets and more easily trained SVMs.
Resumo:
In order to protect user privacy on mobile devices, an event-driven implicit authentication scheme is proposed in this paper. Several methods of utilizing the scheme for recognizing legitimate user behavior are investigated. The investigated methods compute an aggregate score and a threshold in real-time to determine the trust level of the current user using real data derived from user interaction with the device. The proposed scheme is designed to: operate completely in the background, require minimal training period, enable high user recognition rate for implicit authentication, and prompt detection of abnormal activity that can be used to trigger explicitly authenticated access control. In this paper, we investigate threshold computation through standard deviation and EWMA (exponentially weighted moving average) based algorithms. The result of extensive experiments on user data collected over a period of several weeks from an Android phone indicates that our proposed approach is feasible and effective for lightweight real-time implicit authentication on mobile smartphones.