AIM: Population aging is a worldwide phenomenon leading to increased life expectancy without necessarily meaning more years of autonomous life. Frailty is characterized by diminished strength, resistance and physiological function that increase vulnerability leading to dependency and mortality. While frailty diagnoses requires a clinical assessment of the patients overall health including at least five different criteria, the relationship among them it is little explored.

Categories:
75 Views

In this study, adaptive hybrid (AH) scheme is proposed to enhance the measurement accuracy of conventional CD method to acquire the 2-dimensional velocity field of blood flows. It can offer the assistance of the velocity field information measured preliminarily using ultrasound speckle image velocimetry (SIV) technique. Consequently, erroneous vectors in the CD results were replaced with the SIV results. The performance of the proposed AH method was validated by varying flow rate and insonation angle. We compared the AH method with the CD and SIV methods in an agarose vessel model.

Categories:
118 Views

This dataset contains the results of a systematic literature review of visualization in Building Information Modeling (BIM). BIM employs data-rich 3D CAD models for large-scale facility design, construction, and operation. These complex datasets contain a large amount and variety of information, ranging from design specifications to real-time sensor data. They are used by architects and engineers for various analysis and simulations throughout a facility's life cycle. Many techniques from different visualization fields could be used to analyze these data.

Categories:
311 Views

Efficient intrusion detection and analysis of the security landscape in big data environments present challenge for today's users. Intrusion behavior can be described by provenance graphs that record the dependency relationships between intrusion processes and the infected files. Existing intrusion detection methods typically analyze and identify the anomaly either in a single provenance path or the whole provenance graph, neither of which can achieve the benefit on both detection accuracy and detection time.

Categories:
83 Views

For reproducibility purposes, a large test bench of fiber links is simulated to test the Baseband Subcarrier Sweep framework and associated monitoring techniques. The test bench comprises three sets of 1000 fiber links each containing one, two, or three faults.

Categories:
95 Views

 

Static analysis is increasingly used by companies and individual code developers to detect bugs and security vulnerabilities. As programs grow more complex, the analyses have to support new code concepts, frameworks and libraries. However, static-analysis code itself is also prone to bugs. While more complex analyses are written and used in production systems every day, the cost of debugging and fixing them also increases tremendously.

Categories:
78 Views

The two dataset files contains the experimental results for ICDB DMode and ICDB AMode.

Categories:
148 Views

The file contains raw data collected from 9 pedestrians. Three of them walked in Track 1, another three walked in Track 2 and the last three walked in Track 3. All the pedestrians ended their walks at the starting point. Track 1 and Track 3 cover a distance of 150.3m. While, the Track covers a distance of 111.4m.

Categories:
129 Views

In this paper, we present the Tree Exploration Discovery Protocol (TEDP), proving that shortest paths can be built at the same time that the topology information is gathered, without extra messages compared to LLDP.

Categories:
229 Views

This dataset contains the numerical results and Excel graphing used to create the results images in the main paper.

 

Categories:
248 Views

Pages