Hasil untuk "Electronic computers. Computer science"

Menampilkan 19 dari ~18046822 hasil · dari CrossRef, DOAJ, Semantic Scholar

JSON API
DOAJ Open Access 2026
Application of Embodied Intelligence in Intelligent Warehousing and Logistics Scenarios

Jun Zhang, Chuan Zhang, Mingtao Zhang

ABSTRACT This study integrates embodied intelligence (EI) with a two‐stage two‐sided Hotelling duopoly model to reveal how physical intelligence reshapes digital platform equilibrium in intelligent logistics. By embedding EI‐driven efficiency parameters into market cost functions, the model demonstrates that improved perception and coordination reduce the effective transportation cost and transform pricing dynamics between competing platforms. Experiments in a digital twin warehouse show that when EI strength η increases from 0 to 0.6, throughput rises by 37.5%, Dock‐to‐Stock time decreases by 30.9%, and unit energy consumption drops by 7%–8%, verifying that EI directly enhances operational and economic efficiency. Further analysis confirms that asymmetric advantages in action or data lead to discriminatory pricing as the optimal strategy. Complementary encryption experiments indicate that lightweight security algorithms such as SHA‐1/SHA‐256 add less than 3% latency overhead, maintaining real‐time performance.

Engineering (General). Civil engineering (General), Electronic computers. Computer science
DOAJ Open Access 2026
Changing Movements in a Changing World: Modelling Early Pleistocene and Early Middle Pleistocene Climatic and Ecological Environments and Influences on Hominin Dispersal in Eurasia

Kamilla L. Lomborg, Carolina Cucart-Mora, Jan-Olaf Reschke et al.

In a world of drastic climatic and ecological changes, our knowledge of how the environment influenced hominin behaviour is of the utmost importance. Archaeology plays a key role in this domain, as it is the only discipline that studies empirical evidence of past societies’ responses to environmental change. Computational models generating predictions about past climatic and ecological conditions are vital for understanding the archaeological record and how these factors shaped the dispersal of hominins out of Africa and into Eurasia during the Early and early Middle Pleistocene. In this paper, various models for past reconstructions of climatic and ecological conditions and simulation techniques are presented to provide an overview of the diverse approaches, possibilities, advantages and constraints of using computational reconstructions in archaeological research. Focusing on studies of hominin dispersals out of Africa and into Eurasia during the Early and early Middle Pleistocene, this paper discusses the links between environmental factors and hominin dispersal behaviour. The use of simulation techniques to represent hominin populations, such as cellular automata or agent-based modelling, can contribute to connecting small-scale environment-induced influences on hominins to large-scale patterns, supported by ecological theories of species survival and spatial behaviour. Collectively, these approaches provide an elaborate foundation for understanding environmental influences on past hominin dispersals.

Archaeology, Electronic computers. Computer science
DOAJ Open Access 2025
Electromagnetic Field Distribution Mapping: A Taxonomy and Comprehensive Review of Computational and Machine Learning Methods

Yiannis Kiouvrekis, Theodor Panagiotakopoulos

Electromagnetic field (EMF) exposure mapping is increasingly important for ensuring compliance with safety regulations, supporting the deployment of next-generation wireless networks, and addressing public health concerns. While numerous surveys have addressed specific aspects of radio propagation or radio environment maps, a comprehensive and unified overview of EMF mapping methodologies has been lacking. This review bridges that gap by systematically analyzing computational, geospatial, and machine learning approaches used for EMF exposure mapping across both wireless communication engineering and public health domains. A novel taxonomy is introduced to clarify overlapping terminology—encompassing radio maps, radio environment maps, and EMF exposure maps—and to classify construction methods, including analytical models, model-based interpolation, and data-driven learning techniques. In addition, the review highlights domain-specific challenges such as indoor versus outdoor mapping, data sparsity, and model generalization, while identifying emerging opportunities in hybrid modeling, big data integration, and explainable AI. By combining perspectives from communication engineering and public health, this work provides a broader and more interdisciplinary synthesis than previous surveys, offering a structured reference and roadmap for advancing robust, scalable, and socially relevant EMF mapping frameworks.

Electronic computers. Computer science
DOAJ Open Access 2025
Effect of Heated Wall Corrugation on Thermal Performance in an L-Shaped Vented Cavity Crossed by Metal Foam Saturated with Copper–Water Nanofluid

Luma F. Ali, Hussein Togun, Abdellatif M. Sadeq

Practical applications such as solar power energy systems, electronic cooling, and the convective drying of vented enclosures require continuous developments to enhance fluid and heat flow. Numerous studies have investigated the enhancement of heat transfer in L-formed vented cavities by inserting heat-generating components, filling the cavity with nanofluids, providing an inner rotating cylinder and a phase-change packed system, etc. Contemporary work has examined the thermal performance of L-shaped porous vented enclosures, which can be augmented by using metal foam, using nanofluids as a saturated fluid, and increasing the wall surface area by corrugating the cavity’s heating wall. These features are not discussed in published articles, and their exploration can be considered a novelty point in this work. In this study, a vented cavity was occupied by a copper metal foam with <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>P</mi><mi>P</mi><mi>I</mi><mo>=</mo><mn>10</mn></mrow></semantics></math></inline-formula> and saturated with a copper–water nanofluid. The cavity walls were well insulated except for the left wall, which was kept at a hot isothermal temperature and was either non-corrugated or corrugated with rectangular waves. The Darcy–Brinkman–Forchheimer model and local thermal non-equilibrium models were adopted in momentum and energy-governing equations and solved numerically by utilizing commercial software. The influences of various effective parameters, including the Reynolds number (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>20</mn><mo>≤</mo><mi>R</mi><mi>e</mi><mo>≤</mo><mn>1000</mn></mrow></semantics></math></inline-formula>), the nanoparticle volume fraction (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>0</mn><mo>%</mo><mo>≤</mo><mi>φ</mi><mo>≤</mo><mn>20</mn><mo>%</mo></mrow></semantics></math></inline-formula>), the inflow and outflow vent aspect ratios (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>0.1</mn><mo>≤</mo><mrow><mrow><mi>D</mi></mrow><mo>/</mo><mrow><mi>H</mi></mrow></mrow><mo>≤</mo><mn>0.4</mn></mrow></semantics></math></inline-formula>), the rectangular wave corrugation number (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>N</mi><mo>=</mo><mn>5</mn></mrow></semantics></math></inline-formula> and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>N</mi><mo>=</mo><mn>10</mn></mrow></semantics></math></inline-formula>), and the corrugation dimension ratio (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>C</mi><mi>R</mi><mo>=</mo><mn>1</mn></mrow></semantics></math></inline-formula> and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>C</mi><mi>R</mi><mo>=</mo><mn>0.5</mn></mrow></semantics></math></inline-formula>) were determined. The results indicate that the flow field and heat transfer were affected mainly by variations in <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>R</mi><mi>e</mi></mrow></semantics></math></inline-formula>, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mrow><mrow><mi>D</mi></mrow><mo>/</mo><mrow><mi>H</mi></mrow></mrow></mrow></semantics></math></inline-formula>, and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>φ</mi></mrow></semantics></math></inline-formula> for a non-corrugated left wall; they were additionally influenced by <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>N</mi></mrow></semantics></math></inline-formula> and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>C</mi><mi>R</mi></mrow></semantics></math></inline-formula> when the wall was corrugated. The fluid- and solid-phase temperatures of the metal foam increased with an increase in <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>R</mi><mi>e</mi></mrow></semantics></math></inline-formula> and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mrow><mrow><mi>D</mi></mrow><mo>/</mo><mrow><mi>H</mi></mrow></mrow></mrow></semantics></math></inline-formula>. The fluid-phase Nusselt number near the hot left sidewall increased with an increase in <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>φ</mi></mrow></semantics></math></inline-formula> by <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mfenced separators="|"><mrow><mn>25</mn><mo>–</mo><mn>60</mn></mrow></mfenced><mo>%</mo></mrow></semantics></math></inline-formula>, while the solid-phase Nusselt number decreased by <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mfenced separators="|"><mrow><mn>10</mn><mo>–</mo><mn>30</mn></mrow></mfenced><mo>%</mo></mrow></semantics></math></inline-formula>, and these numbers rose by around <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>3.5</mn></mrow></semantics></math></inline-formula> times when the Reynolds number increased from <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>20</mn></mrow></semantics></math></inline-formula> to <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>1000</mn></mrow></semantics></math></inline-formula>. For the corrugated hot wall, the Nusselt numbers of the two metal foam phases increased with an increase in <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>R</mi><mi>e</mi></mrow></semantics></math></inline-formula> and decreased with an increase in <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mrow><mrow><mi>D</mi></mrow><mo>/</mo><mrow><mi>H</mi></mrow></mrow></mrow></semantics></math></inline-formula>, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>C</mi><mi>R</mi></mrow></semantics></math></inline-formula>, or <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>N</mi></mrow></semantics></math></inline-formula> by <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>10</mn><mo>%</mo></mrow></semantics></math></inline-formula>, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>19</mn><mo>%</mo></mrow></semantics></math></inline-formula>, and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>37</mn><mo>%</mo></mrow></semantics></math></inline-formula>. The original aspect of this study is its use of a thermal, non-equilibrium, nanofluid-saturated metal foam in a corrugated L-shaped vented cavity. We aimed to investigate the thermal performance of this system in order to reinforce the viability of applying this material in thermal engineering systems.

Electronic computers. Computer science
DOAJ Open Access 2024
Review of Public Opinion Dynamics Models

LIU Shuxian, XU Huan, WANG Wei, DENG Le

Social network provides a medium for information dissemination,leading to the rapid development of public opinion.Controlling the development direction of public opinion is one of the core issues of public opinion dynamics.However,the public opinion dynamics model mainly studies the way of updating the opinions of the subject so as to deduce the law of public opinion evolution.This paper classifies the current public opinion dynamics models,analyzes their advantages and disadvantages,and their applications in different fields,and summarizes the future research direction of public opinion dynamics.It is helpful to understand the law of the evolution of public opinion,so as to provide better guidance for the government and other institutions to control the direction of public opinion.

Computer software, Technology (General)
DOAJ Open Access 2024
System 2 Thinking in OpenAI’s o1-Preview Model: Near-Perfect Performance on a Mathematics Exam

Joost C. F. de Winter, Dimitra Dodou, Yke Bauke Eisma

The processes underlying human cognition are often divided into System 1, which involves fast, intuitive thinking, and System 2, which involves slow, deliberate reasoning. Previously, large language models were criticized for lacking the deeper, more analytical capabilities of System 2. In September 2024, OpenAI introduced the <i>o1</i> model series, designed to handle System 2-like reasoning. While OpenAI’s benchmarks are promising, independent validation is still needed. In this study, we tested the <i>o1-preview</i> model twice on the Dutch ‘Mathematics B’ final exam. It scored a near-perfect 76 and 74 out of 76 points. For context, only 24 out of 16,414 students in the Netherlands achieved a perfect score. By comparison, the <i>GPT-4o</i> model scored 66 and 62 out of 76, well above the Dutch students’ average of 40.63 points. Neither model had access to the exam figures. Since there was a risk of model contamination (i.e., the knowledge cutoff for <i>o1-preview</i> and <i>GPT-4o</i> was after the exam was published online), we repeated the procedure with a new Mathematics B exam that was published after the cutoff date. The results again indicated that <i>o1-preview</i> performed strongly (97.8th percentile), which suggests that contamination was not a factor. We also show that there is some variability in the output of <i>o1-preview</i>, which means that sometimes there is ‘luck’ (the answer is correct) or ‘bad luck’ (the output has diverged into something that is incorrect). We demonstrate that the self-consistency approach, where repeated prompts are given and the most common answer is selected, is a useful strategy for identifying the correct answer. It is concluded that while OpenAI’s new model series holds great potential, certain risks must be considered.

Electronic computers. Computer science
DOAJ Open Access 2024
Multi-objective Particle Swarm Optimization Algorithm Guided by Extreme Learning Decision Network

ZHANG Yifan, SONG Wei

When solving multi-objective optimization problems, particle swarm optimization algorithms usually employ preset example selection methods and search strategies, which cannot be adjusted according to specific optimization states. In the face of different optimization problems, inappropriate search strategies cannot effectively guide the population, resulting in low search performance of the population. To solve the above problems, a multi-objective particle swarm optimization algorithm guided by extreme learning decision network (ELDN-PSO) is proposed. First of all, the multi-objective optimization problem is decomposed into several scalar subproblems, and an extreme learning decision network is constructed. The network takes the particle position as input, and selects appropriate search actions for each particle according to the optimization state. The fitness change of a particle on the subproblem is obtained as the training sample for the reinforcement learning, and the training speed is improved by extreme learning machine. In the process of optimization, the network is automatically adjusted according to the optimization states, and it selects the appropriate search strategy for the particles at different search stages. Secondly, the non-dominated solutions in the multi-objective optimization problem are difficult to compare. Thus, the leadership of each solution is quantified into a comparable value, so that the examples are more clearly selected for the particles. In addition, an external archive is used to store better particles to maintain the quality of the solutions and guide the population. Comparative experiments are carried out on the ZDT and DTLZ test functions. The results show that ELDN-PSO can effectively cope with different Pareto front shapes, improving the optimization speed as well as the convergence and diversity of the solutions.

Electronic computers. Computer science
DOAJ Open Access 2024
Tachyon: Enhancing stacked models using Bayesian optimization for intrusion detection using different sampling approaches

T. Anitha Kumari, Sanket Mishra

The integration of sensors in the monitoring of essential bodily measurements, air quality, and energy consumption in buildings demonstrates the importance of the Internet of Things (IoT) in everyday life. These security breaches are caused by rudimentary and immature security protocols that are implemented on IoT devices. An intrusion detection system is used to detect security threats and system-level applications to detect malicious activities. This paper introduces Tachyon, a combination of various statistical and tree-based Artificial Intelligence (AI) techniques, such as Extreme Gradient Boosting (XGBoost), Random Forest (RF), Bidirectional Auto-Regressive Transformers (BART), Logistic Regression (LR), Multivariate Adaptive Regression Splines (MARS), Decision Tree (DT), and a top k stack ensemble to distinguish between normal and malicious attacks in a binary classification setting. The IoTID2020 dataset used in this study consists of 6,25,783 samples with 83 features. An initial examination of the data reveals its unbalanced nature. To create a balanced dataset, a range of sampling techniques were used, including Oversampling, Undersampling, Synthetic Minority Oversampling Technique (SMOTE), Random Oversampling Examples (ROSE), Borderline Synthetic Minority Oversampling Technique (b-SMOTE), and Adaptive Synthetic (ADASYN). In addition, principal component analysis (PCA) and partial least squares (PLS) were used to determine the most significant features. The experimental results demonstrate that the stacked ensemble achieved a performance of 99.8%, which is better than the baseline approaches. An ablation study of ensemble models was also conducted to assess the performance of the proposed model in various scenarios.

Electronic computers. Computer science
DOAJ Open Access 2022
Carrier-independent deep optical watermarking algorithm

Hao CHEN, Feng WANG, Weiming ZHANG et al.

With the development of multimedia techniques, the demand for copyright protection of digital products has also gradually risen.Digital watermarking is an effective means to protect the copyright of digital products.It is generally made by adding important identification information (i.e., digital watermark) to a digital carrier (e.g., text, image, etc.), so that the carrier carries the identification information but does not affect the normal use of the carrier.The common digital watermark embedding scheme is to embed the watermark information by modifying the carrier via specific algorithms.In the actual application scenarios, there are many images or objects to be protected (such as art paintings, etc.) that are not allowed to be modified.Based on this background, a new carrier-independent deep optical watermarking algorithm was proposed, which can realize watermark information embedding without modifying the original carrier and achieve the purpose of copyright protection.Specifically, a new watermark template expression scheme at the embedding end was proposed, which expressed the watermark information by visible light modulation.By analyzing the visual system of human eyes, a watermark template pattern based on alternating projection was proposed to embed the watermark information, which made the embedding process neither require modification of the original carrier nor affect the visual senses of human eyes.At the extraction end, a watermark extraction network based on residual connection was designed, and the captured watermarked images were fed into this network after perspective transformation to extract the watermark information.The experiments were conducted under various conditions and comparisons with three baseline algorithms were made.The experimental results show that the proposed algorithm generates watermarked images with less visual distortion and is robust to the &quot;projecting-shooting&quot; process.The watermark extraction network has high accuracy in extracting watermark information at different distances, angles and illumination conditions, and has certain advantages over other general networks.

Electronic computers. Computer science
DOAJ Open Access 2021
Cooperation-Based Modeling of Sustainable Development: An Approach from Filippov’s Systems

Jorge A. Amador, Johan Manuel Redondo, Gerard Olivar‐Tost et al.

The concept of Sustainable Development has given rise to multiple interpretations. In this article, it is proposed that Sustainable Development should be interpreted as the capacity of territory, community, or landscape to conserve the notion of well-being that its population has agreed upon. To see the implications of this interpretation, a Brander and Taylor model, to evaluate the implications that extractivist policies have over an isolated community and cooperating communities, is proposed. For an isolated community and through a bifurcation analysis in which the Hopf bifurcation and the heteroclinic cycle bifurcation are detected, 4 prospective scenarios are found, but only one is sustainable under different extraction policies. In the case of cooperation, the exchange between communities is considered by coupling two models such as the one defined for the isolated community, with the condition that their transfers of renewable resources involve conservation policies. Since human decisions do not occur in a continuum, but rather through jumps, the mathematical model of cooperation used is a Filippov System, in which the dynamics could involve two switching manifolds of codimension one and one switching manifold of codimension two. The exchange in the cooperation model, for specific parameter arrangements, exhibits n-periodic orbits and chaos. It is notable that, in the cases in which the system shows sliding, it could be interpreted as a recovery delay related to the time needed by the deficit community to recover, until its dependence on the other community stops. It is concluded (1) that a sustainability analysis depends on the way well-being is defined because every definition of well-being is not necessarily sustainable, (2) that sustainability can be visualized as invariant sets in the nonzero region of the space of states (equilibrium points, n-periodic orbits, and strange attractors), and (3) that exchange is key to the prevalence of the human being in time. The results question us on whether Sustainable Development is only to keep us alive or if it also implies doing it with dignity.

Electronic computers. Computer science
DOAJ Open Access 2021
Optimasi proses penjadwalan mata kuliah menggunakan algoritme genetika dan pencarian tabu

Arif Amrulloh, Enny Itje Sela

Penjadwalan mata kuliah merupakan permasalahan yang sering terjadi pada perguruan tinggi, di antaranya adalah bentrok waktu mengajar dosen, ruangan dan kelas mahasiswa. Kajian ini mengusulkan optimasi penjadwalan mata kuliah menggunakan algoritme genetika dan pencarian tabu. Algoritme genetika berfungsi untuk menghasilkan generasi terbaik kromosom yang tersusun atas gen dosen, hari, dan jam. Pencarian tabu digunakan untuk pembagian ruang perkuliahan. Penjadwalan dilakukan di fakultas Informatika yang mempunyai empat program studi dengan 65 dosen, 93 mata kuliah, 265 penugasan dosen, dan 65 kelas. Proses pembangkitan 265 jadwal membutuhkan waktu selama 561 detik dan tidak ada bentrok yang terjadi. Kombinasi algoritme genetika dan pencarian tabu dapat memproses jadwal mata kuliah yang cukup banyak dengan lebih cepat daripada cara manual.

Electronic computers. Computer science
DOAJ Open Access 2021
Scalable and High-Fidelity Quantum Random Access Memory in Spin-Photon Networks

K. C. Chen, W. Dai, C. Errando-Herranz et al.

A quantum random access memory (qRAM) is considered an essential computing unit to enable polynomial speedups in quantum information processing. Proposed implementations include the use of neutral atoms and superconducting circuits to construct a binary tree but these systems still require demonstrations of the elementary components. Here, we propose a photonic-integrated-circuit (PIC) architecture integrated with solid-state memories as a viable platform for constructing a qRAM. We also present an alternative scheme based on quantum teleportation and extend it to the context of quantum networks. Both implementations realize the two key qRAM operations, (1) quantum state transfer and (2) quantum routing, with already demonstrated components: electro-optic modulators, a Mach-Zehnder interferometer (MZI) network, and nanocavities coupled to artificial atoms for spin-based memory writing and retrieval. Our approaches furthermore benefit from built-in error detection based on photon heralding. Detailed theoretical analysis of the qRAM efficiency and query fidelity shows that our proposal presents viable near-term designs for a general qRAM.

Physics, Computer software
DOAJ Open Access 2020
Exact Solutions of Damped Improved Boussinesq Equations by Extended (G′/G)-Expansion Method

Kai Fan, Cunlong Zhou

With the help of the auxiliary function method, we solved the improved Boussinesq (IBq) equation with fluid dynamic damping and the modified IBq (IMBq) equation with Stokes damping, and we obtained their three types of travelling wave exact solutions, which is an extension service of the numerical simulation and the existence of a solution. From the waveform diagram of IBq equation with hydrodynamic damping, it can be seen that when the propagation velocity of kink wave changes, the amplitude also changes significantly, and it is also found that the kink isolated waveform is significantly asymmetric due to the increase of damping coefficient v, which may be of some value in explaining some physical phenomena. In addition, the symbolic computing software maple makes our computing work easier.

Electronic computers. Computer science
DOAJ Open Access 2020
AMPLITUDE-TIME ANALYSIS OF BIOMECHANICAL PATTERNS OF HUMAN MOTIONS

DAVYDOVA, Nadezhda, LUKASHEVICH, Dmitry, BYKOV, Dmitry et al.

Biomechanical analysis of motions solves the tasks of efficiency estimation of movement realization, search of technique optimal variants and tactics of motion performance, definition of a degree and reasons of not matching real movement action to optimal one. Today, inertial measurement devices based on microelectromechanical sensors (MEMS) are becoming more and more popular for biomechanical analysis of human motions. The paper describes an algorithm for estimation of the biomechanical pattern of human motions based on amplitude-time analysis of inertial gyroscope signals. The presented algorithm allows to quantitatively estimate spatial, temporal and spatiotemporal parameters of motion, symmetry of left and right limbs motions and reproduction stability of the motion biomechanical pattern. The specific feature of the algorithm is its universality for the study of symmetrical and asymmetrical motions.

Engineering (General). Civil engineering (General), Electronic computers. Computer science
DOAJ Open Access 2018
A Novel Depression Rehabilitation Game Framework Using VR Based on Neurofeedback

CAI Hanshu,WANG Ziyang,ZHANG Yanhao,CHEN Yunfei,HU Bi

At present,depression is treated with antidepressant drugs and assisted with psychotherapy and physical therapy,and these expensive and time-consuming treatment methods often end prematurely and result in a prolonged course without effective symptom relief.Therefore,based on the neurofeedback therapy,a novel depression rehabilitation method using a Virtual-Reality(VR) game framework is proposed.In this VR game framework,an innovative three-electrode Electroencephalography (EEG) collector is used to record patients’ EEG data.The data are processed and converted into feedback features,and the feedback will be displayed to patients in real time through a VR headset.Patients can adjust their psychological activity based on the feedback,and relieve their physiological dysfunction effectively.The framework also provides a data storage module,which may offer therapists ways to assess patients’ rehabilitation results in a long term,as well as provide possibility to continue towards better algorithm of feedback features with data-mining.The prototype system is tested in the framework,and the experimental results prove the effectiveness of the framework in depression rehabilitation.

Computer engineering. Computer hardware, Computer software
DOAJ Open Access 2018
All Near Neighbor GraphWithout Searching

Edgar Chávez, Verónica Ludueña, Nora Reyes et al.

Given a collection of n objects equipped with a distance function d(·, ·), the Nearest Neighbor Graph (NNG) consists in finding the nearest neighbor of each object in the collection. Without an index the total cost of NNG is quadratic. Using an index the cost would be sub-quadratic if the search for individual items is sublinear. Unfortunately, due to the so called curse of dimensionality the indexed and the brute force methods are almost equally inefficient. In this paper we present an efficient algorithm to build the Near Neighbor Graph (nNG), that is an approximation of NNG, using only the index construction, without actually searching for objects.

Computer engineering. Computer hardware, Electronic computers. Computer science
DOAJ Open Access 2018
Decision-Making Methodologies for Reuse of Industrial Assets

J. Claver, A. García-Domínguez, M. A. Sebastián

When there is a social consensus that industrial assets are in fact heritage elements of cultural interest, their conservation and reuse must be considered with approaches that offer greater guarantees and that prevent their exposure to aggressive actions. In order for this to materialise, many aspects must be included in the decision-making process, from the characteristics of an asset and its surroundings, to the valuable aspects that distinguish it and that must be protected. This study aims to develop tools that guide the decision-making process regarding the most appropriate activity for each specific case study. Multicriteria Decision Support Techniques are evaluated as adequate support to create a proposal that fulfils these objectives. Furthermore, the Analytic Hierarchy Process is adapted to develop methodologies for assessing both the heritage value and the most compatible uses according to the characteristics of the asset. Subsequently, they are connected and such considerations regarding the heritage value of the asset are incorporated into the final decision. The tools developed are then applied to a case study to test their performance, assess their usefulness, and identify possible applications and future developments.

Electronic computers. Computer science

Halaman 3 dari 902342