xlsx

In this study, adaptive hybrid (AH) scheme is proposed to enhance the measurement accuracy of conventional CD method to acquire the 2-dimensional velocity field of blood flows. It can offer the assistance of the velocity field information measured preliminarily using ultrasound speckle image velocimetry (SIV) technique. Consequently, erroneous vectors in the CD results were replaced with the SIV results. The performance of the proposed AH method was validated by varying flow rate and insonation angle. We compared the AH method with the CD and SIV methods in an agarose vessel model.

96 views
  • Medical Imaging
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34

    This dataset contains the results of a systematic literature review of visualization in Building Information Modeling (BIM). BIM employs data-rich 3D CAD models for large-scale facility design, construction, and operation. These complex datasets contain a large amount and variety of information, ranging from design specifications to real-time sensor data. They are used by architects and engineers for various analysis and simulations throughout a facility's life cycle. Many techniques from different visualization fields could be used to analyze these data.

    259 views
  • Other
  • Last Updated On: 
    Wed, 02/13/2019 - 19:03

    Efficient intrusion detection and analysis of the security landscape in big data environments present challenge for today's users. Intrusion behavior can be described by provenance graphs that record the dependency relationships between intrusion processes and the infected files. Existing intrusion detection methods typically analyze and identify the anomaly either in a single provenance path or the whole provenance graph, neither of which can achieve the benefit on both detection accuracy and detection time.

    69 views
  • Security
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34

    For reproducibility purposes, a large test bench of fiber links is simulated to test the Baseband Subcarrier Sweep framework and associated monitoring techniques. The test bench comprises three sets of 1000 fiber links each containing one, two, or three faults.

    95 views
  • Communications
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34

     

    Static analysis is increasingly used by companies and individual code developers to detect bugs and security vulnerabilities. As programs grow more complex, the analyses have to support new code concepts, frameworks and libraries. However, static-analysis code itself is also prone to bugs. While more complex analyses are written and used in production systems every day, the cost of debugging and fixing them also increases tremendously.

    66 views
  • Security
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34

    The two dataset files contains the experimental results for ICDB DMode and ICDB AMode.

    140 views
  • Security
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34

    The file contains raw data collected from 9 pedestrians. Three of them walked in Track 1, another three walked in Track 2 and the last three walked in Track 3. All the pedestrians ended their walks at the starting point. Track 1 and Track 3 cover a distance of 150.3m. While, the Track covers a distance of 111.4m.

    121 views
  • Wearable Sensing
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34

    In this paper, we present the Tree Exploration Discovery Protocol (TEDP), proving that shortest paths can be built at the same time that the topology information is gathered, without extra messages compared to LLDP.

    217 views
  • Communications
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34

    This dataset contains the numerical results and Excel graphing used to create the results images in the main paper.

     

    232 views
  • Power and Energy
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34
    138 views
  • Transportation
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34

    Pages