Search results for "SIM"
showing 10 items of 10139 documents
BioImageXD: an open, general-purpose and high-throughput image-processing platform
2012
BioImageXD puts open-source computer science tools for three-dimensional visualization and analysis into the hands of all researchers, through a user-friendly graphical interface tuned to the needs of biologists. BioImageXD has no restrictive licenses or undisclosed algorithms and enables publication of precise, reproducible and modifiable workflows. It allows simple construction of processing pipelines and should enable biologists to perform challenging analyses of complex processes. We demonstrate its performance in a study of integrin clustering in response to selected inhibitors.
An efficient cluster-based outdoor user positioning using LTE and WLAN signal strengths
2015
In this paper we propose a novel cluster-based RF fingerprinting method for outdoor user-equipment (UE) positioning using both LTE and WLAN signals. It uses a simple cost effective agglomerative hierarchical clustering with Davies-Bouldin criterion to select the optimal cluster number. The positioning method does not require training signature formation prior to UE position estimation phase. It is capable of reducing the search space for clustering operation by using LTE cell-ID searching criteria. This enables the method to estimate UE positioning in short time with less computational expense. To validate the cluster-based positioning real-time field measurements were collected using readi…
Real-time recognition of personal routes using instance-based learning
2011
Predicting routes is a critical enabler for many new location-based applications and services, such as warning drivers about congestion- or accident-risky areas. Hybrid vehicles can also utilize the route prediction for optimizing their charging and discharging phases. In this paper, a new lightweight route recognition approach using instance-based learning is introduced. In this approach, the current route is compared in real-time against the route instances observed in past, and the most similar route is selected. In order to assess the similarity between the routes, a similarity measure based on the longest common subsequence (LCSS) is employed, and an algorithm for incrementally evaluat…
Justification of point electrode models in electrical impedance tomography
2011
The most accurate model for real-life electrical impedance tomography is the complete electrode model, which takes into account electrode shapes and (usually unknown) contact impedances at electrode-object interfaces. When the electrodes are small, however, it is tempting to formally replace them by point sources. This simplifies the model considerably and completely eliminates the effect of contact impedance. In this work we rigorously justify such a point electrode model for the important case of having difference measurements ("relative data") as data for the reconstruction problem. We do this by deriving the asymptotic limit of the complete model for vanishing electrode size. This is s…
SaaS architecture and pricing models
2014
In the new era of computing, SaaS software with different architectural characteristics might be priced in different ways. Even though both pricing and architectural characteristics are responsible for the success of the offering; the relationship between architectural and pricing characteristics has not been studied before. The present study fills this gap by employing a multi-case research. The findings accentuate that flexible and well-designed architecture enables different pricing models; however, poorly designed architecture limits also the pricing. Scalability and high level of modularity are the major enablers of a great variety of pricing models. Using public cloud services may lea…
Cognitive self-healing system for future mobile networks
2015
This paper introduces a framework and implementation of a cognitive self-healing system for fault detection and compensation in future mobile networks. Performance monitoring for failure identification is based on anomaly analysis, which is a combination of the nearest neighbor anomaly scoring and statistical profiling. Case-based reasoning algorithm is used for cognitive self-healing of the detected faulty cells. Validation environment is Long Term Evolution (LTE) mobile system simulated with Network Simulator 3 (ns-3) [1, 2]. Results demonstrate that cognitive approach is efficient for compensation of cell outages and is capable to improve network coverage. Anomaly analysis can be used fo…
Fall Detection Using Location Sensors and Accelerometers
2015
The rapid aging of the world's population is driving the development of pervasive solutions for elder care. These solutions, which often involve fall detection with accelerometers, are accurate in laboratory conditions but can fail in some real-life situations. To overcome this, the authors present the Confidence system, which detects falls mainly with location sensors. A user wears one to four tags. By detecting tag locations with sensors, the system can recognize the user's activity, such as falling and then lying down afterward, as well as the context in terms of the location in the home. The authors used a scenario consisting of events difficult to recognize as falls or nonfalls to comp…
Simplicity and the art of something more: A cognitive-semiotic approach to simplicity and complexity in human-technology interaction and design exper…
2018
In human–technology interaction, the balance between simplicity and complexity has been much discussed. Emphasis is placed on the value of simplicity when designing for usability. Often simplicity is interpreted as reductionism, which compromises both the affective nature of the design and usability itself. This paper takes a cognitive–semiotic approach toward understanding the dynamics between the utilitarian benefits of simplicity in design and the art of something more: considerate complexity. The cognitive–semiotic approach to human–technology design experience is a vehicle for explaining the relationship between simplicity and complexity, and this relationship’s multisensory character …
Critical Analysis on the NHTSA Acceptance Criteria for In-Vehicle Electronic Devices
2014
We tested a commercial in-car navigation system prototype against the NHTSA criteria for acceptance testing of in-vehicle electronic devices, in order to see what types of in-car tasks fail the acceptance test and why. In addition, we studied the visual demands of the driving scenario recommended by NHTSA for task acceptance testing. In the light of the results, NHTSA guidelines and acceptance criteria need to be further developed. In particular visual demands of the driving scenario and for different simulators need to be standardized in order to enable fair testing and comparable test results. We suggest the visual occlusion method for finding a driving scenario that corresponds better wi…
Visual Distraction Effects of In-Car Text Entry Methods
2017
Three text entry methods were compared in a driving simulator study with 17 participants. Ninety-seven drivers’ occlusion distance (OD) data mapped on the test routes was used as a baseline to evaluate the methods’ visual distraction potential. Only the voice recognition-based text entry tasks passed the set verification criteria. Handwriting tasks were experienced as the most demanding and the voice recognition tasks as the least demanding. An individual in-car glance length preference was found, but against expectations, drivers’ ODs did not correlate with incar glance lengths or visual short-term memory capacity. The handwriting method was further studied with 24 participants with instru…