Search results for "SIM"

showing 10 items of 10139 documents

BioImageXD: an open, general-purpose and high-throughput image-processing platform

2012

BioImageXD puts open-source computer science tools for three-dimensional visualization and analysis into the hands of all researchers, through a user-friendly graphical interface tuned to the needs of biologists. BioImageXD has no restrictive licenses or undisclosed algorithms and enables publication of precise, reproducible and modifiable workflows. It allows simple construction of processing pipelines and should enable biologists to perform challenging analyses of complex processes. We demonstrate its performance in a study of integrin clustering in response to selected inhibitors.

ta113SIMPLE (military communications protocol)Computer sciencebusiness.industryta1182Computational BiologyImage processingCell BiologyBioinformaticsBiochemistryVisualizationHigh-Throughput Screening AssaysUser-Computer InterfaceSoftwareWorkflowImaging Three-DimensionalHuman–computer interactionbusinessCluster analysisMolecular BiologyThroughput (business)AlgorithmsSoftwareBiotechnologyGraphical user interfaceNATURE METHODS
researchProduct

An efficient cluster-based outdoor user positioning using LTE and WLAN signal strengths

2015

In this paper we propose a novel cluster-based RF fingerprinting method for outdoor user-equipment (UE) positioning using both LTE and WLAN signals. It uses a simple cost effective agglomerative hierarchical clustering with Davies-Bouldin criterion to select the optimal cluster number. The positioning method does not require training signature formation prior to UE position estimation phase. It is capable of reducing the search space for clustering operation by using LTE cell-ID searching criteria. This enables the method to estimate UE positioning in short time with less computational expense. To validate the cluster-based positioning real-time field measurements were collected using readi…

ta113SIMPLE (military communications protocol)business.industryComputer scienceReal-time computingLTE cell-IDFingerprint recognitionGridminimization of drive testsDetermining the number of clusters in a data setEmbedded systemgrid-based RF fingerprintingRadio frequencybusinessCluster analysishierarchical clustering
researchProduct

Real-time recognition of personal routes using instance-based learning

2011

Predicting routes is a critical enabler for many new location-based applications and services, such as warning drivers about congestion- or accident-risky areas. Hybrid vehicles can also utilize the route prediction for optimizing their charging and discharging phases. In this paper, a new lightweight route recognition approach using instance-based learning is introduced. In this approach, the current route is compared in real-time against the route instances observed in past, and the most similar route is selected. In order to assess the similarity between the routes, a similarity measure based on the longest common subsequence (LCSS) is employed, and an algorithm for incrementally evaluat…

ta113Similarity (geometry)business.industryComputer scienceSimilarity measureMachine learningcomputer.software_genreLongest common subsequence problemGlobal Positioning SystemRoute recognitionInstance-based learningArtificial intelligencebusinesscomputer2011 IEEE Intelligent Vehicles Symposium (IV)
researchProduct

Justification of point electrode models in electrical impedance tomography

2011

The most accurate model for real-life electrical impedance tomography is the complete electrode model, which takes into account electrode shapes and (usually unknown) contact impedances at electrode-object interfaces. When the electrodes are small, however, it is tempting to formally replace them by point sources. This simplifies the model considerably and completely eliminates the effect of contact impedance. In this work we rigorously justify such a point electrode model for the important case of having difference measurements ("relative data") as data for the reconstruction problem. We do this by deriving the asymptotic limit of the complete model for vanishing electrode size. This is s…

ta113Work (thermodynamics)Mathematical optimizationta112Applied MathematicsMathematical analysista111Zero (linguistics)Interpretation (model theory)Physics::Plasma PhysicsModeling and SimulationElectrodePoint (geometry)Limit (mathematics)Electrical impedanceElectrical impedance tomographyta512MathematicsMATHEMATICAL MODELS AND METHODS IN APPLIED SCIENCES
researchProduct

SaaS architecture and pricing models

2014

In the new era of computing, SaaS software with different architectural characteristics might be priced in different ways. Even though both pricing and architectural characteristics are responsible for the success of the offering; the relationship between architectural and pricing characteristics has not been studied before. The present study fills this gap by employing a multi-case research. The findings accentuate that flexible and well-designed architecture enables different pricing models; however, poorly designed architecture limits also the pricing. Scalability and high level of modularity are the major enablers of a great variety of pricing models. Using public cloud services may lea…

ta113business.industryComputer scienceSoftware as a servicemedia_common.quotation_subjectArchitectural designCloud computingSaaS architecturehinnoitteluModularityVariety (cybernetics)SaaSNegotiationRisk analysis (engineering)ScalabilitycloudArchitecturebusinessSimulationmedia_common
researchProduct

Cognitive self-healing system for future mobile networks

2015

This paper introduces a framework and implementation of a cognitive self-healing system for fault detection and compensation in future mobile networks. Performance monitoring for failure identification is based on anomaly analysis, which is a combination of the nearest neighbor anomaly scoring and statistical profiling. Case-based reasoning algorithm is used for cognitive self-healing of the detected faulty cells. Validation environment is Long Term Evolution (LTE) mobile system simulated with Network Simulator 3 (ns-3) [1, 2]. Results demonstrate that cognitive approach is efficient for compensation of cell outages and is capable to improve network coverage. Anomaly analysis can be used fo…

ta113cognitionta213Performance managementComputer sciencebusiness.industryDistributed computingCognitiondata miningcomputer.software_genreAutomationanomaly detectionFault detection and isolation5G networksNetwork simulationcompensationcell outageRobustness (computer science)self-healingAnomaly detectionData miningbusinesscomputer5G2015 International Wireless Communications and Mobile Computing Conference (IWCMC)
researchProduct

Fall Detection Using Location Sensors and Accelerometers

2015

The rapid aging of the world's population is driving the development of pervasive solutions for elder care. These solutions, which often involve fall detection with accelerometers, are accurate in laboratory conditions but can fail in some real-life situations. To overcome this, the authors present the Confidence system, which detects falls mainly with location sensors. A user wears one to four tags. By detecting tag locations with sensors, the system can recognize the user's activity, such as falling and then lying down afterward, as well as the context in terms of the location in the home. The authors used a scenario consisting of events difficult to recognize as falls or nonfalls to comp…

ta113education.field_of_studyContext modelUbiquitous computingaccelerometersaccuracyComputer sciencePopulationReal-time computingagingWearable computerContext (language use)ta3141accelerationAccelerometersensorsComputer Science ApplicationscontextComputational Theory and MathematicsFalling (sensation)educationLyingSoftwareSimulationsenior citizensIEEE Pervasive Computing
researchProduct

Simplicity and the art of something more: A cognitive-semiotic approach to simplicity and complexity in human-technology interaction and design exper…

2018

In human–technology interaction, the balance between simplicity and complexity has been much discussed. Emphasis is placed on the value of simplicity when designing for usability. Often simplicity is interpreted as reductionism, which compromises both the affective nature of the design and usability itself. This paper takes a cognitive–semiotic approach toward understanding the dynamics between the utilitarian benefits of simplicity in design and the art of something more: considerate complexity. The cognitive–semiotic approach to human–technology design experience is a vehicle for explaining the relationship between simplicity and complexity, and this relationship’s multisensory character …

ta113kognitioCognitive sciencekognitiivinen semiotiikkamoniaistisuusSocial PsychologyComputer scienceyksinkertaisuusCommunicationmedia_common.quotation_subjectdesignCognitionsimplicitysemiotiikkakompleksisuuskognitiotiedeHuman-Computer Interactionihminen-konejärjestelmätmultisensory experienceSemioticsSimplicitycomplexitycognitive semioticmedia_commonHuman Technology
researchProduct

Critical Analysis on the NHTSA Acceptance Criteria for In-Vehicle Electronic Devices

2014

We tested a commercial in-car navigation system prototype against the NHTSA criteria for acceptance testing of in-vehicle electronic devices, in order to see what types of in-car tasks fail the acceptance test and why. In addition, we studied the visual demands of the driving scenario recommended by NHTSA for task acceptance testing. In the light of the results, NHTSA guidelines and acceptance criteria need to be further developed. In particular visual demands of the driving scenario and for different simulators need to be standardized in order to enable fair testing and comparable test results. We suggest the visual occlusion method for finding a driving scenario that corresponds better wi…

ta113kosketusnäyttödriver distractionComputer scienceNavigation systemvisual demandReliability engineeringTest (assessment)Task (project management)Variety (cybernetics)Acceptance testingnavigation systemElectronicsDuration (project management)test performanceVisual occlusionSimulationacceptance criteriavisual occlusion
researchProduct

Visual Distraction Effects of In-Car Text Entry Methods

2017

Three text entry methods were compared in a driving simulator study with 17 participants. Ninety-seven drivers’ occlusion distance (OD) data mapped on the test routes was used as a baseline to evaluate the methods’ visual distraction potential. Only the voice recognition-based text entry tasks passed the set verification criteria. Handwriting tasks were experienced as the most demanding and the voice recognition tasks as the least demanding. An individual in-car glance length preference was found, but against expectations, drivers’ ODs did not correlate with incar glance lengths or visual short-term memory capacity. The handwriting method was further studied with 24 participants with instru…

ta113visual short-term memorydriver distraction050210 logistics & transportationocclusion distanceVisual Patterns TestComputer scienceSpeech recognition05 social sciencesDriving simulatorvisual demandAffect (psychology)Test (assessment)HandwritingDistraction0502 economics and businesstext entry methods0501 psychology and cognitive sciencesVisual short-term memorySet (psychology)050107 human factorsReliability (statistics)visual occlusionProceedings of the 9th International Conference on Automotive User Interfaces and Interactive Vehicular Applications
researchProduct