Search results for " Soft"
showing 10 items of 1710 documents
An Empirical Set of Metrics for Embedded Systems Testing
2018
Editor’s note: Selecting the right platform for an embedded system is a challenging task, because there are no systematic methodologies for comprehensive evaluation and comparison of competing alternatives. This article partially addresses this problem by formulating a set of relevant metrics and an evaluation methodology. By applying their concepts to the evaluation of two alternative platforms, the Raspberry Pi3 and the Intel Edison boards, the authors demonstrate the utility of their approach and show under which objectives one is preferable over the other. —Axel Jantsch, TU Wien
A feasibility analysis on the use of ultrasonic multihop communications for E-health applications
2017
Rise in population aging as well as diffusion of chronic diseases and health consciousness require constant monitoring of health conditions but also lead to increasing costs for the governments. Body Area Networks represent the next frontier in health care and are envisaged as the natural choice to provide detailed and updated information on health status to prevent health risks and diseases. However if, on the one hand, a large research effort has been devoted so far to the investigation of BAN communications on and around the body, on the other hand intra-BAN communications are still a scarcely explored area because of the difficulties and risks in successfully propagating signals inside …
Blind Robust 3-D Mesh Watermarking Based on Mesh Saliency and QIM Quantization for Copyright Protection
2019
International audience; Due to the recent demand of 3-D models in several applications like medical imaging, video games, among others, the necessity of implementing 3-D mesh watermarking schemes aiming to protect copyright has increased considerably. The majority of robust 3-D watermark-ing techniques have essentially focused on the robustness against attacks while the imperceptibility of these techniques is still a real issue. In this context, a blind robust 3-D mesh watermarking method based on mesh saliency and Quantization Index Modulation (QIM) for Copyright protection is proposed. The watermark is embedded by quantifying the vertex norms of the 3-D mesh using QIM scheme since it offe…
Tasks and Digital Tools
2016
International audience; This chapter considers scholastic tasks with digital tools. The first two sections consider tasks in ‘ordinary’ classrooms (tasks for learning) and issues relating to tasks using mathematical software. The first section presents examples of tasks with digital tools to highlight potential problems and opportunities for learning. The second section considers issues arising from the literature on tasks design with and without digital tools. The final section looks at task-tool issues in larger-than-the-individual classroom research and in assessment; it also comments of avenues for further development
Plenoptic image watermarking to preserve copyright
2017
Common camera loses a huge amount of information obtainable from scene as it does not record the value of individual rays passing a point and it merely keeps the summation of intensities of all the rays passing a point. Plenoptic images can be exploited to provide a 3D representation of the scene and watermarking such images can be helpful to protect the ownership of these images. In this paper we propose a method for watermarking the plenoptic images to achieve this aim. The performance of the proposed method is validated by experimental results and a compromise is held between imperceptibility and robustness.
An empirical study of performance using Clone & Own and Software Product Lines in an industrial context
2021
Abstract Context: Clone and Own (CaO) is a widespread approach to generate new software products from existing software products by adding small changes. The Software Product Line (SPL) approach addresses the development of families of products with similar features, moving away from the production of isolated products. Despite the popularity of both approaches, no experiment has yet compared them directly. Objective: The goal of this paper is to know the different performances of software engineers in the software products development process using two different approaches (SPL and CaO). Method: We conducted an experiment in the induction hobs software environment with software engineers. …
Cyber Security Strategy Implementation Architecture in a Value System
2018
In this chapter, we introduce an approach toward enhancing the quality of strategy implementation. As a framework, we use cybersecurity strategy implementation planning and execution. Justification for this work is the observed need to be able to perform strategy readjustment processes quickly and in an agile way, when needed. This requires processes and practices that are simple enough and executable with small resources in a relatively short timeframe. The problem statement can be formulated as follows: “We need to determine an utterly simplified, noncomplicated model to help us to tackle the complex problem of implementing a cybersecurity strategy of adequate efficiency in a changing ope…
Benefits of Software Renting in Cloud Business
2012
In the new era of computing, software can be sold and delivered as a cloud service, and software renting has become a strategic tool to compete in the market. In this multi-case study, software renting was found to help the case firms to (i) differentiate themselves from competitors; (ii) increase their competitive advantage by making the software available for a larger customer group, and (iii) decrease the price of software by using centralized software delivery and maintenance. peerReviewed
Progressive Web Apps for the Unified Development of Mobile Applications
2018
Progressive Web Apps (PWAs) allow for web applications to be developed in an offline-first approach. While Web apps traditionally did not properly function without an Internet connection, PWAs enable them to be downloaded, installed and used offline on various systems, including mobile devices and personal computers. We present an introduction to the state-of-art in research and practice. Based on this, we discuss various underlying concepts and technologies. Then, we scrutinize and compare PWAs against cross-platform app development approaches on both technical and overarching aspects. A list of suggestions for future research is also presented. We urge academia to keep up with the latest …
Prognostic Impact of let-7e MicroRNA and Its Target Genes in Localized High-Risk Intestinal GIST: A Spanish Group for Research on Sarcoma (GEIS) Study
2020
MicroRNAs (miRNAs) are small non-coding RNAs that negatively regulate gene expression at the post-transcriptional level, and they have been described as being associated with tumor prognosis. Here, miRNA profiling was planned to explore new molecular prognostic biomarkers in localized intestinal high-risk GIST. Paraffin tumor blocks of 14 and 86 patients were used in the discovery and expansion sets, respectively. GeneChip miRNA v3.0 was employed to identify the miRNAs differentially expressed between relapsed and non-relapsed patient samples, which were validated in the expansion set, by qRT-PCR. RT2 Profiler PCR Array was used for the screening of let-7e targets. Expression levels were co…