- Parallel Computing and Optimization Techniques
- Distributed and Parallel Computing Systems
- Distributed systems and fault tolerance
- Cloud Computing and Resource Management
- Embedded Systems Design Techniques
- Scoliosis diagnosis and treatment
- Surgical Simulation and Training
- Welding Techniques and Residual Stresses
- Semantic Web and Ontologies
- Musculoskeletal pain and rehabilitation
- Context-Aware Activity Recognition Systems
- Peer-to-Peer Network Technologies
- Non-Destructive Testing Techniques
- Real-Time Systems Scheduling
- Logic, programming, and type systems
- Service-Oriented Architecture and Web Services
- Face and Expression Recognition
- Pelvic and Acetabular Injuries
- IoT Networks and Protocols
- Logic, Reasoning, and Knowledge
- Oil and Gas Production Techniques
- Graph Theory and Algorithms
- Network Packet Processing and Optimization
- VLSI and FPGA Design Techniques
- Security and Verification in Computing
Loughborough University
2019-2023
Massachusetts Institute of Technology
1978-2013
J P Kenny
1991
The suitability of face recognition was investigated as a biometric-based identifier for sheep using holistic analysis images by the independent components technique. Algorithm training performed independently on several normalized from 50 (sets two, three, and four per sheep). performance this technique assessed separate set (three sheep) cosine distance classifier. When 180 to 200 were extracted, rate high 95.3% 96%. As expected, fewer reduced rate, while higher number improved it....
Project Bayanihan seeks to develop the idea of volunteer computing, which allows people very easily pool together their computers′ processing power and co-operate in solving parallel problems. While computing offers many exciting new prospects global supercomputing collaboration, its realization involves challenging research issues that need be addressed. In this paper, we present a flexible object-oriented framework using Java HORB programmers experiment with different approaches these by...
Magnetic flux leakage method (MFL) and eddy current (ECT) are typical electromagnetic non-destructive testing (NDT) methods used for evaluation. The two complementary in terms of defect detection material characterisation capabilities. There is a great demand online metal evaluation such as pipeline rail track. At high speed measurement MFL, addition to magnetic flux, currents exist specimen. These alter the profile field increase difficulty signal interpretation characterisation. In this...
Recent developments by Hewitt and others have stimulated interest in message-passing constructs as an alternative to the more conventional applicative semantics on which most current languages are based. The present work illuminates distinction between means of μ -calculus, a syntactic model systems similar mechanism λ-calculus. Algorithms for translation expressions from λ- -calculus presented, differences two approaches discussed. Message-passing seem particularly applicable study...
A little explored area of human activity recognition (HAR) is in people operating relation to extreme environments, e.g., mountaineers. In these contexts, the ability accurately identify activities, alongside other data streams, has potential prevent death and serious negative health events operators. This study aimed address this user group investigate factors associated with placement, number, combination accelerometer sensors. Eight participants (age = 25.0 ± 7 years) wore 17...
The MuNet is a multiprocessor architecture which can be program-transparently scaled over very wide cost-performance spectrum. Each processor in communicates directly only with limited number ofneighbors..There no shared memory, central broadcast medium, or other hardware resource equally by all processors In the system. This strictly local communication and interconnection strategy means that constant amount of additional need added for each new incorporated into
Communication between independently-clocked digital subsystems typically involves a finite probability of synchronization failure whose minimization introduces delays and consequent performance costs. This paper explores technique that eliminates both the inherent unreliability such communication overhead it implies. Our approach maintains known phase relationship, clocks frequencies are related by rational factor, exploits predictability their relative phases to algorithmically time...
Laparoscopy is used in many surgical specialties. Subjective reports have suggested that performing laparoscopic surgery patients with a high body mass index (BMI) leading to increased prevalence of musculoskeletal symptoms surgeons. The aim this study was objectively quantify the impact on surgeon upper kinematics and dynamic workload when simulated laparoscopy at different BMI levels.Upper novice, intermediate expert surgeons were calculated based measurements from inertial measurement...
Perfectly synchronizing an asynchronous digital signal in bounded time is known to be impossible, since all bistable devices exhibit a region of metastability.In practice, "reliable synchronization" means the achievement synchronization failure rate comparable hardware rates.Since metastable state decay times are exponentially distributed, arbitrarily low can achieved by performing with shift register
The rapid increase in the number and variety of consumer-level electronic devices without corresponding development device management technology has lead to a configuration nightmare. We propose use goal-oriented programming over substrate network-portable objects help reduce amount users must do order have their applications efficiently. detail an architecture describe prototype system using existing pervasive computing that plays music on most appropriate requiring user interaction
article Free AccessReal time plotting of approximate contour maps Author: Stephen A. Ward Massachusetts Institute Technology, Cambridge CambridgeView Profile Authors Info & Claims Communications the ACMVolume 21Issue 9Sept. 1978 pp 788–790https://doi.org/10.1145/359588.359614Published:01 September 1978Publication History 6citation342DownloadsMetricsTotal Citations6Total Downloads342Last 12 Months26Last 6 weeks2 Get Citation AlertsNew Alert added!This alert has been successfully added and...
Abstract Laparoscopy is a cornerstone of modern surgical care. Despite clear advantages for the patients, it has been associated with inducing upper body musculoskeletal disorders amongst surgeons due to propensity non-neutral postures. Furthermore, there perception that patients obesity exacerbate these factors. Therefore, novice, intermediate and expert surgeon posture was objectively quantified using inertial measurement units LUBA ergonomic framework used assess subsequent postural data...
Project Bayanihan seeks to develop the idea of volunteer computing, which allows people very easily pool together their computers′ processing power and co-operate in solving parallel problems. While computing offers many exciting new prospects global supercomputing collaboration, its realization involves challenging research issues that need be addressed. In this paper, we present a flexible object-oriented framework using Java HORB programmers experiment with different approaches these by...
Static-column dynamic RAMs (random-access memories) offer fast access to successive locations within a single row, fact which has been used in their implementation cacheless memory systems. Such caches are necessarily nonassociative (direct-mapped), limiting performance relative set-associative of similar total capacity. The authors describe an architecture for RAM chips circumvents this limitation by providing several alternative static row buffers on each chip. Cacheless systems utilizing...