139 research outputs found

    Serious Games Are Not Serious Enough for Myoelectric Prosthetics

    Get PDF
    Serious games show a lot of potential for use in movement rehabilitation (eg, after a stroke, injury to the spinal cord, or limb loss). However, the nature of this research leads to diversity both in the background of the researchers and in the approaches of their investigation. Our close examination and categorization of virtual training software for upper limb prosthetic rehabilitation found that researchers typically followed one of two broad approaches: (1) focusing on the game design aspects to increase engagement and muscle training and (2) concentrating on an accurate representation of prosthetic training tasks, to induce task-specific skill transfer. Previous studies indicate muscle training alone does not lead to improved prosthetic control without a transfer-enabling task structure. However, the literature shows a recent surge in the number of game-based prosthetic training tools, which focus on engagement without heeding the importance of skill transfer. This influx appears to have been strongly influenced by the availability of both software and hardware, specifically the launch of a commercially available acquisition device and freely available high-profile game development engines. In this Viewpoint, we share our perspective on the current trends and progress of serious games for prosthetic training

    Experience report on the use of technology to manage capstone course projects

    Get PDF

    Acknowledgement Based Secure Intrusion Detection System Against Worm Hole Attack For Manets

    Get PDF
    The wireless network possible mobility and scalability in many applications. Wireless Mobile Ad hoc Network (MANET) is one of the most important and unique applications. There is an emerging technology and has a large force to be applied in critical situations such as military applications, battlefields and commercial applications. MANET each node is to have free routing and the ability to move in all directions that MANET has no centralized infrastructure. However, medium and large open distribution nodes in MANET towards safety. MANET also includes wireless sensor nodes, these sensor nodes in the environment unattended therefore increases the chances of attacks increases, there are many types of attacks such Wormhole, DDOS, denial of service, etc. black hole . The wormhole is one of them. The network assigns vortex increasing the routing load at the end of end delay, packet loss and many other parameters. It is therefore very important to design and develop effective intrusion detection system to protect against attacks MANET Wormhole. In it, we discuss Wormhole attack on MANET, and to propose and implement a new system of intrusion detection based on the recognition to detect the Wormhole attack type and provide security against it using hybrid encryption for packets recognized

    Evaluation of face shape in Turkish individuals

    Get PDF
    The aim of this study was to determine the types of face shape in the Turkish population. Knowledge on face shape is important in anthropology and for planning medical procedures such as in aesthetic, maxillofacial and orthodontic surgery. The study group consisted of 1003 healthy subjects (470 male, 533 female) aged 18–68 years. Mean height, weight and body mass index (BMI) were 1.74 m, 78.65 Kg, 25.80±3.50 kg/m2 and 1.62 m, 60.55 kg, 22.87±3.49 kg/m2 in males and females, respectively. Face length (FL; the distance from nasion to gnathion) and face width (FW; bizygomatic breadth) were measured, from which a Prosopic Index (PI) was determined using the following formula: (PI= FL/FW x 100). The types of face shape were classified according to Banister’s classification Type I (hypereuryprosopic), Type II (euryprosopic), Type III (mesoprosopic), Type IV (leptoprosopic), Type V (hyperleptoprosopic) in both males and females. PI was 84.31 (FL: 12.07 cm; FW: 14.34 cm) in males and 85.25 (FL: 11.30 cm; FW: 13.28 cm) in females. In males and females Type I face shape was observed in 18.1 % and 15.6 %; Type II in 35.3 % and 34.3 %; Type III in 33.2 % and 34.3 %; Type IV in 8.7 % and 11.8 %; and Type V in 4.7 % and 3.9 %, respectively. The determination of types of face shape as presented in this study may be useful for aesthetic surgical procedures as well as medical and anthropological investigations.</p

    Identifying the Key Attributes in an Unlabeled Event Log for Automated Process Discovery

    Full text link
    Process mining discovers and analyzes a process model from historical event logs. The prior art methods use the key attributes of case-id, activity, and timestamp hidden in an event log as clues to discover a process model. However, a user needs to specify them manually, and this can be an exhaustive task. In this paper, we propose a two-stage key attribute identification method to avoid such a manual investigation, and thus this is a step toward fully automated process discovery. One of the challenging tasks is how to avoid exhaustive computation due to combinatorial explosion. For this, we narrow down candidates for each key attribute by using supervised machine learning in the first stage and identify the best combination of the key attributes by discovering process models and evaluating them in the second stage. Our computational complexity can be reduced from O(N3)\mathcal{O}(N^3) to O(k3)\mathcal{O}(k^3) where NN and kk are the numbers of columns and candidates we keep in the first stage, respectively, and usually kk is much smaller than NN. We evaluated our method with 14 open datasets and showed that our method could identify the key attributes even with k=2k = 2 for about 20 seconds for many datasets.Comment: IEEE Transactions on Services Computing (Early Access version

    Frank Siqueira

    Get PDF

    Universal Mobile Service Execution Framework for Device-To-Device Collaborations

    Get PDF
    There are high demands of effective and high-performance of collaborations between mobile devices in the places where traditional Internet connections are unavailable, unreliable, or significantly overburdened, such as on a battlefield, disaster zones, isolated rural areas, or crowded public venues. To enable collaboration among the devices in opportunistic networks, code offloading and Remote Method Invocation are the two major mechanisms to ensure code portions of applications are successfully transmitted to and executed on the remote platforms. Although these domains are highly enjoyed in research for a decade, the limitations of multi-device connectivity, system error handling or cross platform compatibility prohibit these technologies from being broadly applied in the mobile industry. To address the above problems, we designed and developed UMSEF - an Universal Mobile Service Execution Framework, which is an innovative and radical approach for mobile computing in opportunistic networks. Our solution is built as a component-based mobile middleware architecture that is flexible and adaptive with multiple network topologies, tolerant for network errors and compatible for multiple platforms. We provided an effective algorithm to estimate the resource availability of a device for higher performance and energy consumption and a novel platform for mobile remote method invocation based on declarative annotations over multi-group device networks. The experiments in reality exposes our approach not only achieve the better performance and energy consumption, but can be extended to large-scaled ubiquitous or IoT systems
    corecore