scispace - formally typeset
Search or ask a question

Showing papers on "Personal computer published in 2010"


Patent
15 Mar 2010
TL;DR: In this paper, the authors proposed a low cost flash "floppy" with the daughter card containing only flash EEPROM chips and being controlled by a memory controller residing on the mother card.
Abstract: A peripheral card having a Personal Computer (“PC”) card form factor and removably coupled externally to a host system is further partitioned into a mother card portion and a daughter card portion. The daughter card is removably coupled to the mother card. In the preferred embodiment, a low cost flash “floppy” is accomplished with the daughter card containing only flash EEPROM chips and being controlled by a memory controller residing on the mother card. Other aspects of the invention includes a comprehensive controller on the mother card able to control a predefined set of peripherals on daughter cards connectable to the mother card; relocation of some host resident hardware to the mother card to allow for a minimal host system; a mother card that can accommodate multiple daughter cards; daughter cards that also operates directly with hosts having embedded controllers; daughter cards carrying encoded data and information for decoding it; and daughter cards with security features.

504 citations


Journal ArticleDOI
TL;DR: It is found that users’ IT threat avoidance behavior is predicted by avoidance motivation, which, in turn, is determined by perceived threat, safeguard effectiveness, safeguard cost, and self-efficacy.
Abstract: This study aims to understand the IT threat avoidance behaviors of personal computer users. We tested a research model derived from Technology Threat Avoidance Theory (TTAT) using survey data. We find that users’ IT threat avoidance behavior is predicted by avoidance motivation, which, in turn, is determined by perceived threat, safeguard effectiveness, safeguard cost, and self-efficacy. Users develop a threat perception when they believe that the malicious IT is likely to attack them (perceived susceptibility) and the negative consequences will be severe if they are attacked (perceived severity). When threatened, users are more motivated to avoid the threat if they believe that the safeguarding measure is effective (safeguard effectiveness) and inexpensive (safeguard cost) and they have confidence in using it (self-efficacy). In addition, we find that perceived threat and safeguard effectiveness have a negative interaction on avoidance motivation so that a higher level of perceived threat is associated with a weaker relationship between safeguard effectiveness and avoidance motivation or a higher level of safeguard effectiveness is associated with a weaker relationship between perceived threat and avoidance motivation. These findings provide an enriched understanding about personal computer users’ IT threat avoidance behavior.

448 citations


Patent
08 Mar 2010
TL;DR: In this article, the authors propose an approach to optimize the operation of a media player during rendering of media files, which includes authoring software to create a data structure and to populate the created data structure with obtained metadata.
Abstract: Optimizing operation of a media player during rendering of media files. The invention includes authoring software to create a data structure and to populate the created data structure with obtained metadata. The invention also includes rendering software to retrieve the metadata from the data structure and to identify media files to render. In one embodiment, the invention is operable as part of a compressed media format having a set of small files containing metadata, menus, and playlists in a compiled binary format designed for playback on feature-rich personal computer media players as well as low cost media players.

321 citations


Journal ArticleDOI
TL;DR: This paper considers feature selection for data classification in the presence of a huge number of irrelevant features, and proposes a new feature-selection algorithm that addresses several major issues with prior work, including problems with algorithm implementation, computational complexity, and solution accuracy.
Abstract: This paper considers feature selection for data classification in the presence of a huge number of irrelevant features. We propose a new feature-selection algorithm that addresses several major issues with prior work, including problems with algorithm implementation, computational complexity, and solution accuracy. The key idea is to decompose an arbitrarily complex nonlinear problem into a set of locally linear ones through local learning, and then learn feature relevance globally within the large margin framework. The proposed algorithm is based on well-established machine learning and numerical analysis techniques, without making any assumptions about the underlying data distribution. It is capable of processing many thousands of features within minutes on a personal computer while maintaining a very high accuracy that is nearly insensitive to a growing number of irrelevant features. Theoretical analyses of the algorithm's sample complexity suggest that the algorithm has a logarithmical sample complexity with respect to the number of features. Experiments on 11 synthetic and real-world data sets demonstrate the viability of our formulation of the feature-selection problem for supervised learning and the effectiveness of our algorithm.

316 citations


Journal ArticleDOI
TL;DR: An online GPRS-Sensors Array for air pollution monitoring has been designed, implemented, and tested as mentioned in this paper, which consists of a Mobile Data-Acquisition Unit (Mobile-DAQ) and a fixed Internet-enabled Pollution Monitoring Server (Pollution-Server).
Abstract: An online GPRS-Sensors Array for air pollution monitoring has been designed, implemented, and tested. The proposed system consists of a Mobile Data-Acquisition Unit (Mobile-DAQ) and a fixed Internet-Enabled Pollution Monitoring Server (Pollution-Server). The Mobile-DAQ unit integrates a single-chip microcontroller, air pollution sensors array, a General Packet Radio Service Modem (GPRS-Modem), and a Global Positioning System Module (GPS-Module). The Pollution-Server is a high-end personal computer application server with Internet connectivity. The Mobile-DAQ unit gathers air pollutants levels (CO, NO2, and SO2), and packs them in a frame with the GPS physical location, time, and date. The frame is subsequently uploaded to the GPRS-Modem and transmitted to the Pollution-Server via the public mobile network. A database server is attached to the Pollution-Server for storing the pollutants level for further usage by various clients such as environment protection agencies, vehicles registration authorities, and tourist and insurance companies. The Pollution-Server is interfaced to Google Maps to display real-time pollutants levels and locations in large metropolitan areas. The system was successfully tested in the city of Sharjah, UAE. The system reports real-time pollutants level and their location on a 24-h/7-day basis.

309 citations


Journal ArticleDOI
TL;DR: The findings suggest that the new algorithm using the TAU/TAF cut-off value can accurately classify household and locomotive activities.

283 citations


Journal ArticleDOI
TL;DR: In FITS 2008, usual nutrient intakes were adequate for the majority of US infants, toddlers, and preschoolers, except for a small but important number of infants at risk for inadequate iron and zinc intakes.
Abstract: Objectives To assess the usual nutrient intakes of 3,273 US infants, toddlers, and preschoolers, aged 0 to 47 months, surveyed in the Feeding Infants and Toddlers Study (FITS) 2008; and to compare data on the usual nutrient intakes for the two waves of FITS conducted in 2002 and 2008. Design The FITS 2008 is a cross-sectional survey of a national random sample of US children from birth through age 47 months. Usual nutrient intakes derived from foods, beverages, and supplements were ascertained using a telephone-administered, multiple-pass 24-hour dietary recall. Subjects Infants aged birth to 5 months (n=382) and 6 to 11 months (n=505), toddlers aged 12 to 23 months (n=925), and preschoolers aged 24 to 47 months (n=1,461) were surveyed. Methods All primary caregivers completed one 24-hour dietary recall and a random subsample (n=701) completed a second 24-hour dietary recall. The personal computer version of the Software for Intake Distribution Estimation was used to estimate the 10th, 25th, 50th, 75th, and 90th percentiles, as well as the proportions below and above cutoff values defined by the Dietary Reference Intakes or the 2005 Dietary Guidelines for Americans. Results Usual nutrient intakes met or exceeded energy and protein requirements with minimal risk of vitamin and mineral deficiencies. The usual intakes of antioxidants, B vitamins, bone-related nutrients, and other micronutrients were adequate relative to the Adequate Intakes or Estimated Average Requirements, except for iron and zinc in a small subset of older infants, and vitamin E and potassium in toddlers and preschoolers. Intakes of synthetic folate, preformed vitamin A, zinc, and sodium exceeded Tolerable Upper Intake Level in a significant proportion of toddlers and preschoolers. Macronutrient distributions were within acceptable macronutrient distribution ranges, except for dietary fat, in some toddlers and preschoolers. Dietary fiber was low in the vast majority of toddlers and preschoolers, and saturated fat intakes exceeded recommendations for the majority of preschoolers. The prevalence of inadequate intakes, excessive intake, and intakes outside the acceptable macronutrient distribution range was similar in FITS 2002 and FITS 2008. Conclusions In FITS 2008, usual nutrient intakes were adequate for the majority of US infants, toddlers, and preschoolers, except for a small but important number of infants at risk for inadequate iron and zinc intakes. Diet quality should be improved in the transition from infancy to early childhood, particularly with respect to healthier fats and fiber in the diets of toddlers and preschoolers.

278 citations


Journal ArticleDOI
TL;DR: A novel BCI system was developed to monitor the human cognitive state and provide biofeedback to the driver when drowsy state occurs and the feasibility of this system in a practical driving application was demonstrated.
Abstract: A real-time wireless electroencephalogram (EEG)-based brain-computer interface (BCI) system for drowsiness detection has been proposed. Drowsy driving has been implicated as a causal factor in many accidents. Therefore, real-time drowsiness monitoring can prevent traffic accidents effectively. However, current BCI systems are usually large and have to transmit an EEG signal to a back-end personal computer to process the EEG signal. In this study, a novel BCI system was developed to monitor the human cognitive state and provide biofeedback to the driver when drowsy state occurs. The proposed system consists of a wireless physiological signal-acquisition module and an embedded signal-processing module. Here, the physiological signal-acquisition module and embedded signal-processing module were designed for long-term EEG monitoring and real-time drowsiness detection, respectively. The advantages of low owner consumption and small volume of the proposed system are suitable for car applications. Moreover, a real-time drowsiness detection algorithm was also developed and implemented in this system. The experiment results demonstrated the feasibility of our proposed BCI system in a practical driving application.

235 citations


Journal ArticleDOI
TL;DR: This paper provides ways to quickly compute estimates when the dependent variable follows a spatial autoregressive process, which by appropriate specification of the independent variables can subsume the case when the errors follow a spatial Autore progressive process.
Abstract: Spatial estimators usually require the manipulation of n2 relations among n observations and use operations such as determinants, eigenvalues, and inverses whose operation counts grow at a rate proportional to n3. This paper provides ways to quickly compute estimates when the dependent variable follows a spatial autoregressive process, which by appropriate specification of the independent variables can subsume the case when the errors follow a spatial autoregressive process. Since only nearby observations tend to affect a given observation, most observations have no effect and hence the spatial weight matrix becomes sparse. By exploiting sparsity and rearranging computations, one can compute estimates at low cost. As a demonstration of the efficacy of these techniques, the paper provides a Monte Carlo study whereby 3,107 observation regressions require only 0.1 seconds each when using Matlab on a 200 Mhz Pentium Pro personal computer. In addition, the paper illustrates these techniques by examining voting behavior across U.S. counties in the 1980 presidential election.

233 citations


Patent
26 Jan 2010
TL;DR: In this paper, the authors present an energy monitoring device that can identify an electrical device coupled to a power supply, and a state of the electrical device, from a change in successive measurements of the power supply.
Abstract: Devices and methods for identifying an electrical device, and its state, in a network of electrical devices are disclosed. An energy monitoring device is programmed to identify an electrical device coupled to a power supply, and a state of the electrical device, from a change in successive measurements of the power supply. Algorithms for determining a load signature for an electrical device and its state are disclosed. A stored table of load signatures for states is used to identify devices, and states. Energy monitoring information is collected and presented to the user on a display, a remote display, or is transmitted over a network to a remote device such as a personal computer, personal digital assistant, an iPhone, a cell phone, voice mail, email, or text message.

191 citations


Journal ArticleDOI
TL;DR: The study was designed with an aim to develop of "EasyModeller" tool as a frontend graphical interface to MODELLER using Perl/Tk, which can be used as a standalone tool in windows platform with MODEllER and Python preinstalled.
Abstract: MODELLER is a program for automated protein Homology Modeling. It is one of the most widely used tool for homology or comparative modeling of protein three-dimensional structures, but most users find it a bit difficult to start with MODELLER as it is command line based and requires knowledge of basic Python scripting to use it efficiently. The study was designed with an aim to develop of "EasyModeller" tool as a frontend graphical interface to MODELLER using Perl/Tk, which can be used as a standalone tool in windows platform with MODELLER and Python preinstalled. It helps inexperienced users to perform modeling, assessment, visualization, and optimization of protein models in a simple and straightforward way. EasyModeller provides a graphical straight forward interface and functions as a stand-alone tool which can be used in a standard personal computer with Microsoft Windows as the operating system.

Journal ArticleDOI
TL;DR: The authors used U.S. metropolitan area-level panel data to investigate the relationship between PC adoption, educational attainment, and the return to skill in a model of technological revolutions in which the speed and extent of adoption are endogenous.
Abstract: The introduction and diffusion of personal computers are widely viewed as a technological revolution. Using U.S. metropolitan area–level panel data, this paper asks whether links between PC adoption, educational attainment, and the return to skill conform to a model of technological revolutions in which the speed and extent of adoption are endogenous. The model implies that cities will adjust differently to the arrival of a more skill-intensive means of production, with the returns to skill increasing most where skill is abundant and its return is low. We show that the cross-city data fit many of the predictions of the model during the period 1980–2000, the PC diffusion era.

Journal ArticleDOI
TL;DR: Investigating the effect of IT professionals' computer attitudes on two personal outcomes: self-perceived flow experience and learning outcomes confirms that both computer attitude and flow experience generate positive and direct influence on learning outcome.

Journal ArticleDOI
TL;DR: An implementation of the algorithms for performing accurate nonlinear finite element analysis of brain shift in less than a minute on a personal computer using the new NVIDIA Compute Unified Device Architecture (CUDA) which leads to more than 20 times increase in the computation speed.

Journal ArticleDOI
TL;DR: A systematic evaluation of current approaches to seizure detection in the literature was used to suggest a reliable, practical epilepsy detection method and the combination of complexity analysis and spectrum analysis on an EEG can perform robust evaluations on the collected data.
Abstract: Approximately 1% of the world's population has epilepsy, and 25% of epilepsy patients cannot be treated sufficiently by any available therapy. If an automatic seizure-detection system was available, it could reduce the time required by a neurologist to perform an off-line diagnosis by reviewing electroencephalogram (EEG) data. It could produce an on-line warning signal to alert healthcare professionals or to drive a treatment device such as an electrical stimulator to enhance the patient's safety and quality of life. This paper describes a systematic evaluation of current approaches to seizure detection in the literature. This evaluation was then used to suggest a reliable, practical epilepsy detection method. The combination of complexity analysis and spectrum analysis on an EEG can perform robust evaluations on the collected data. Principle component analysis (PCA) and genetic algorithms (GAs) were applied to various linear and nonlinear methods. The best linear models resulted from using all of the features without other processing. For the nonlinear models, applying PCA for feature reduction provided better results than applying GAs. The feasibility of executing the proposed methods on a personal computer for on-line processing was also demonstrated.

Journal ArticleDOI
TL;DR: The objective of the study is to identify the variance of selected acceptance elements that contribute to the overall behavioral intent to use Tablet PCs (TPC) and these outcomes are then used as a means to forecast, explain, and improve integration of the technology in the higher education context.
Abstract: Many educational institutions have implemented ubiquitous or required laptop, notebook, or tablet personal computing programs for their students. Yet, limited evidence exists to validate integration and acceptance of the technology among student populations. This research examines student acceptance of mobile computing devices using a modification of the “Unified Theory of Acceptance and Use of Technology” (UTAUT) recently developed by leading researchers in the technology acceptance field. The objective of the study is to identify the variance of selected acceptance elements that contribute to the overall behavioral intent to use Tablet PCs (TPC). These outcomes are then used as a means to forecast, explain, and improve integration of the technology in the higher education context. The research also contributes to UTAUT’s theoretical validity and empirical applicability and to the management of information technology (IT) based initiatives in education.

Journal ArticleDOI
TL;DR: Under realistic high-end scenarios of occupational exposure to BDE-99, workers in the facilities were exposed above a recently-published Health Based Limit Value for this congener, and estimated exposures to Bde-209 were below the USEPA's reference dose for this Congener.

Patent
09 Jun 2010
TL;DR: In this paper, a mobile device such as a cell phone is used to remotely control an electronic appliance such as television or personal computer, and the associated user interface configuration and communication protocol are implemented to control the electronic appliance.
Abstract: A mobile device such as a cell phone is used to remotely control an electronic appliance such as a television or personal computer. In a setup phase, the mobile device captures an image of the electronic appliance and identifies and stores scale-invariant features of the image. A user interface configuration such as a virtual keypad configuration, and a communication protocol, can be associated with the stored data. Subsequently, in an implementation phase, another image of the electronic appliance is captured and compared to the stored features in a library to identify a match. In response, the associated user interface configuration and communication protocol are implemented to control the electronic appliance. In a polling and reply process, the mobile device captures a picture of a display of the electronic device and compares it to image data which is transmitted by the electronic appliance.

Journal ArticleDOI
TL;DR: In this article, the authors present powerful numerical tools for the optimization of the external control of the motional and internal states of trapped neutral atoms, explicitly applied to the case of trapped laser-cooled ions in a segmented ion-trap.
Abstract: Trapped laser-cooled atoms and ions are quantum systems which can be experimentally controlled with an as yet unmatched degree of precision. Due to the control of the motion and the internal degrees of freedom, these quantum systems can be adequately described by a well-known Hamiltonian. In this colloquium, powerful numerical tools for the optimization of the external control of the motional and internal states of trapped neutral atoms, explicitly applied to the case of trapped laser-cooled ions in a segmented ion-trap are presented. Inverse problems when optimizing trapping potentials for ions, are solved. The presentation is complemented by a quantum-mechanical treatment of the wave-packet dynamics of a trapped ion. Efficient numerical solvers for both time-independent and time-dependent problems are provided. Shaping the motional wave functions and optimizing a quantum gate is realized by the application of quantum optimal control techniques. The numerical methods presented can also be used to gain an intuitive understanding of quantum experiments with trapped ions by performing virtual simulated experiments on a personal computer. Code and executables are supplied as supplementary online material.

Journal ArticleDOI
TL;DR: In this article, the role of economic, demographic, infrastructure, institutional and financial factors in contributing to the global digital divide was explored, finding evidence indicating that income, human capital, the youth dependency ratio, telephone density, legal quality and banking sector development are associated with technology penetration rates.
Abstract: Computer and Internet use, especially in developing countries, has expanded rapidly in recent years. Even in light of this expansion in technology adoption rates, penetration rates differ markedly between developed and developing countries and across developing countries. To identify the determinants of cross-country disparities in personal computer and Internet penetration, both currently and over time, we examine panel data for 161 countries over the 1999-2004 period. We explore the role of a comprehensive set of economic, demographic, infrastructure, institutional and financial factors in contributing to the global digital divide. We find evidence indicating that income, human capital, the youth dependency ratio, telephone density, legal quality and banking sector development are associated with technology penetration rates. Overall, the factors associated with computer and Internet penetration do not differ substantially between developed and developing countries. Estimates from Blinder-Oaxaca decompositions reveal that the main factors responsible for low rates of technology penetration rates in developing countries are disparities in income, telephone density, legal quality and human capital. In terms of dynamics, our results indicate fairly rapid reversion to long run equilibrium for Internet use, and somewhat slower reversion for computer use, particularly in developed economies. Financial development, either measured as bank lending or the value of stocks traded, is also important to the growth rate of Internet use.

Book
25 Aug 2010
TL;DR: Wang et al. as discussed by the authors showed that since the Open Door policy and reforms that began in 1978, China's gross domestic product (GDP) has been growing at an average annual rate of more than 9 percent with its global share increasing from 1 percent in 1980 to almost 6.5 percent in 2008 and its per capita GDP increasing from US$193 to US$3,263.
Abstract: China's meteoric economic rise over the past three decades is an unprecedented "growth miracle" in human history. Since the Open Door policy and reforms that began in 1978, China's gross domestic product (GDP) has been growing at an average annual rate of more than 9 percent, with its global share increasing from 1 percent in 1980 to almost 6.5 percent in 2008 and its per capita GDP increasing from US$193 to US$3,263. Total exports have been growing at an average annual rate of 13 percent (21.5 percent from 1998 to 2007), with China's share of total exports increasing from 1.7 percent in 1980 to 9.5 percent in 2008. In 2007, China's incremental growth in real GDP actually exceeded its entire real GDP in 1979. In 2010, China is set to outpace Japan and become the world's second-largest economy. China has indisputably become an important growth engine of the global economy and a leader in international trade and investment. Rapid growth in the past decades has helped lift more than 400 million people out of poverty. These results are truly impressive. While China's rapid rise has become a hot topic for development debate among policy makers, business people, and scholars all over the world, the numerous special economic zones (SEZs) and industrial clusters that have sprung up since the reforms are undoubtedly two important engines for driving the country's growth.

Journal ArticleDOI
TL;DR: In this paper, the use of a wide bandwidth Partial Discharge (PD) measurement system consisting of a radio frequency current transducer (RFCT) sensor, a digital storage oscilloscope and a high performance personal computer to facilitate automatic PD source identification was investigated.
Abstract: Partial discharge (PD) measurements are an important tool for assessing the health of power equipment. Different sources of PD have different effects on the insulation performance of power apparatus. Therefore, discrimination between PD sources is of great interest to both system utilities and equipment manufacturers. This paper investigates the use of a wide bandwidth PD on-line measurement system consisting of a radio frequency current transducer (RFCT) sensor, a digital storage oscilloscope and a high performance personal computer to facilitate automatic PD source identification. Three artificial PD models were used to simulate typical PD sources which may exist within power system apparatus. Wavelet analysis was applied to pre-process measurement data obtained from the wide bandwidth PD sensor. This data was then processed using correlation analysis to cluster the discharges into different groups. A machine learning technique, namely the support vector machine (SVM) was then used to identify between the different PD sources. The SVM is trained to differentiate between the inherent features of each discharge source signal. Laboratory experiments where the trained SVM was tested using measurement data from the RFCT as opposed to conventional measurement data indicate that this approach has a robust performance and has great potential for use with field measurement data.

Patent
15 Mar 2010
TL;DR: In this paper, a short-range wireless network can be used to store audio, video, graphical, data, points of interest, and other information from a user device such as a personal computer to a central server over the internet.
Abstract: A user uploads content such as files containing audio, video, graphical, data, points of interest, and other information from a user device such as a personal computer to a central server over the internet. Upon determining that a trigger event has occurred, communication and processing circuitry in a vehicle device automatically download the previously uploaded content over the interne and a short-range wireless network and store the content for use by a device such as an audio/visual/navigation unit. Examples of a trigger event include proximity to a short-range wireless communication network coupled to the internet, presence within a geofence, turning off a vehicle's engine, or detecting an SMS wake-up message while the vehicle device's main processor, transceivers not used for SMS, and auxiliary circuitry are in sleep mode. The short-range wireless network can be a vehicle owner's home network, or a commercial wi-fi hot spot, or subscription wireless service.

Patent
29 Mar 2010
TL;DR: In this paper, the age group of a person in a field of view of the camera can be determined based on metrics of a 3-D body model, e.g., a relative size of a head of the body, a ratio of arm length to body height, ratio of body height to head height, and/or ratio of head width to shoulder width.
Abstract: In a motion capture system having a depth camera, access to an electronic media device such as personal computer or a game console with Internet connectivity is controlled. The age group of a person in a field of view of the camera can be determined based on metrics of a 3-D body model. The metrics can relate to, e.g., a relative size of a head of the body, a ratio of arm length to body height, a ratio of body height to head height, and/or a ratio of head width to shoulder width. The metrics are particularly indicative of age group. Based on the age group, a profile of the user is automatically updated with various parental control settings which control access to the electronic media device. Also, currently output content can be replaced by substitute content when a person in a lower age group enters the field of view.

Journal ArticleDOI
TL;DR: The telerehabilitation application described in this study provides evidence for the delivery of online assessment for the dysarthric speech disorder associated with Parkinson's disease and appears to be valid and reliable.
Abstract: Background: Patients with Parkinson’s disease face numerous access barriers to speech pathology services for appropriate assessment and treatment. Telerehabilitation is a possible solution to this problem, whereby rehabilitation services may be delivered to the patient at a distance, via telecommunication and information technologies. A number of studies have demonstrated the capacity of telerehabilitation to provide reliable and valid assessments of speech, voice and language. However, no studies have specifically focused on assessing patients with Parkinson’s disease. Aims: To investigate the validity and reliability of a telerehabilitation application for assessing the speech and voice disorder associated with Parkinson’s disease. Methods & Procedures: Sixty-one participants with Parkinson’s disease and hypokinetic dysarthria were simultaneously assessed in an online and face-to-face environment by two speech – language pathologists. The assessment protocol included perceptual measures of voice and oromotor function, articulatory precision, speech intelligibility, and acoustic measures of vocal sound pressure level, phonation time and pitch range. Online assessments were conducted via a personal computer-based videoconferencing system with store-and-forward capabilities, operating on a 128 kbit/s Internet connection. The level of agreement between the online and face-toface ratings was determined using several different analyses, depending on the parameter. These included per cent close agreement, quadratic weighted Kappa, and the Bland and Altman limits of agreement. Outcomes & Results: Per cent close agreement between the two environments was within a predetermined clinical criterion of 80% agreement for all voice and oromotor parameters, articulatory precision and speech intelligibility in conversation. Levels of agreement between the environments, based on quadratic weighted Kappa, ranged from poor to good for vocal parameters and from fair to very good for oromotor parameters. Bland and Altman limits of agreement analyses revealed comparability between online and face-to-face environments for vocal sound pressure level, phonation time, pitch range, sentence intelligibility and communication efficiency in reading. Intra- and interrater reliability scores for all tasks were comparable between the online and face-to-face environments. Conclusions & Implications: For the majority of parameters, comparable levels of agreement were achieved between the two environments. Online assessment of disordered speech and voice in Parkinson’s disease appears to be valid and reliable. The telerehabilitation application described in this study provides evidence for the delivery of online assessment for the dysarthric speech disorder associated with Parkinson’s disease.

Journal ArticleDOI
TL;DR: To evaluate the effectiveness of the medical navigation technique, namely, Real‐time Virtual Sonography (RVS), for targeted prostate biopsy, the RVS is used for real-time virtual sonography for prostate biopsies.
Abstract: Objectives: To evaluate the effectiveness of the medical navigation technique, namely, Real-time Virtual Sonography (RVS), for targeted prostate biopsy. Methods: Eighty-five patients with suspected prostate cancer lesions using magnetic resonance imaging (MRI) were included in this study. All selected patients had at least one negative result on the previous transrectal biopsies. The acquired MRI volume data were loaded onto a personal computer installed with RVS software, which registers the volumes between MRI and real-time ultrasound data for real-time display. The registered MRI images were displayed adjacent to the ultrasonographic sagittal image on the same computer monitor. The suspected lesions on T2-weighted images were marked with a red circle. At first suspected lesions were biopsied transperineally under real-time navigation with RVS and then followed by the conventional transrectal and transperineal biopsy under spinal anesthesia. Results: The median age of the patients was 69 years (56–84 years), and the prostate-specific antigen level and prostate volume were 9.9 ng/mL (4.0–34.2) and 37.2 mL (18–141), respectively. Prostate cancer was detected in 52 patients (61%). The biopsy specimens obtained using RVS revealed 45/52 patients (87%) positive for prostate cancer. A total of 192 biopsy cores were obtained using RVS. Sixty-two of these (32%) were positive for prostate cancer, whereas conventional random biopsy revealed cancer only in 75/833 (9%) cores (P < 0.01). Conclusions: Targeted prostate biopsy with RVS is very effective to diagnose lesions detected with MRI. This technique only requires additional computer and RVS software and thus is cost-effective. Therefore, RVS-guided prostate biopsy has great potential for better management of prostate cancer patients.

Journal ArticleDOI
TL;DR: An intelligent traffic management expert system with RFID technology that provides both practically important traffic data collection and control information and can trace criminal or illegal vehicles such as stolen cars or vehicles that evade tickets, tolls or vehicle taxes is presented.
Abstract: This paper presents an intelligent traffic management expert system with RFID technology. The system provides both practically important traffic data collection and control information and can trace criminal or illegal vehicles such as stolen cars or vehicles that evade tickets, tolls or vehicle taxes. The system architecture consists of an RFID reader, a passive tag, a personal computer, a pair of infrared sensors, and a high-speed server with a database system. Based on RFID technology, the system collects and calculates average speed and average flow information on each road of a district area in a city. It then transmits the messages from all the congested roads in a district area to the server in the district center via a communication program. Through a flooding algorithm, each server in a district center exchanges and updates information with all neighbor servers in other district centers so all that the servers in various district centers can get all the latest congestion messages in a city. Therefore, a dynamic navigation system can find the shortest path that avoids congested roads. Meanwhile, we compare three types of tags for choosing a better solution for e-plates in the future. We also adopt infrared sensors for detecting cars that do not have a tag.

Journal ArticleDOI
TL;DR: A novel model-based loss-minimization approach is presented, which is combined with a backstepping direct torque control of the IM drive and an improved search-based method for efficiency optimization is also introduced.
Abstract: Efficiency optimization of induction motor (IM) drives is a major subject based on these drives' extensive use in the industry. Among the different proposed methods, a model-based approach (MBA) seems to be the fast one. However, this method needs the motor parameters that must be correctly identified. On the other hand, a search-based approach (SBA) is a parameter-independent method but needs a greater convergence time. In this paper, a novel model-based loss-minimization approach is presented, which is combined with a backstepping direct torque control of the IM drive. An improved search-based method for efficiency optimization is also introduced. The proposed controller is realized in the stationary reference frame and has a fast-tracking capability of rotor flux and electromagnetic torque. Moreover, a sliding-mode rotor-flux observer is introduced, which is employed for simultaneous determination of rotor-flux space vector, rotor speed, and rotor time constant. The proposed control idea is experimentally implemented in real time using a field-programmable gate-array board synchronized with a personal computer. Simulation and experimental results are finally presented to verify the effectiveness of the method proposed.

Patent
Clay Bavor1, Jesse Levinson1
20 Apr 2010
TL;DR: In this article, the authors present a system consisting of a host application executing on a personal computer, and one or more networked devices executing a client application, where the host application automatically establishes communication with the networked device.
Abstract: The present invention provides systems and methods for managing and controlling networked devices. A system comprises a host application executing on, for example, a personal computer, and one or more networked devices executing a client application. A networked device includes a consumer appliance equipped with network capability, a digital device such as MP3 players and DVRs, an electronically-controlled device such as a light circuit or other type of circuit, and the like. The host application automatically establishes communication with the networked device. The networked device configures a user interface for user control of the networked device. The host application provides a graphical layout of the networked device.

BookDOI
TL;DR: In this article, the authors present evidence of the importance of electronics global value chains (GVCs) in the global economy, and discuss the effects of the recent economic crisis on the industry.
Abstract: This paper presents evidence of the importance of electronics global value chains (GVCs) in the global economy, and discusses the effects of the recent economic crisis on the industry. The analysis focuses on how information is exchanged and introduces the concept of "value chain modularity." The authors identify three key firm level actors -- lead firms, contract manufacturers, and platform leaders -- and discuss their development, or "co-evolution" in the context of global integration. Company, cluster, and country case studies are then presented to illustrate how supplier capabilities in various places have developed in the context of electronics global value chains. The findings identify some of the persistent limits to upgrading experienced by even the most successful firms in the developing world. Four models used by developing country firms to overcome these limitations are presented: (1) global expansion though acquisition of declining brands (emerging multinationals); (2) separation of branded product divisions from contract manufacturing (original design manufacturing (ODM) spinoffs); (3) successful mixing of contract manufacturing and branded products (platform brands) for contractors with customers not in the electronic hardware business; and (4) the founding of factory-less product firms that rely on global value chains for a range of inputs, including production (emerging factory-less start-ups).