scholarly journals Patella Distal Pole Fracture Treated Using Ipsilateral Hamstring Autograft Augmentation and No Additional Hardware

Author(s):  
Yassine Bulaïd ◽  
Maxime Fabre ◽  
Sébastien Parratte ◽  
Jean-Noël Argenson ◽  
Matthieu Ollivier
2019 ◽  
Author(s):  
Abhishek Verma ◽  
Virender Ranga

Relay node placement in wireless sensor networks for constrained environment is a critical task due to various unavoidable constraints. One of the most important constraints is unpredictable obstacles. Handling obstacles during relay node placement is complicated because of complexity involved to estimate the shape and size of obstacles. This paper presents an Obstacle-resistant relay node placement strategy (ORRNP). The proposed solution not only handles the obstacles but also estimates best locations for relay node placement in the network. It also does not involve any additional hardware (mobile robots) to estimate node locations thus can significantly reduce the deployment costs. Simulation results show the effectiveness of our proposed approach.


2018 ◽  
pp. 47-53
Author(s):  
B. Z. Shmeylin ◽  
E. A. Alekseeva

In this paper the tasks of managing the directory in coherence maintenance systems in multiprocessor systems with a large number of processors are solved. In microprocessor systems with a large number of processors (MSLP) the problem of maintaining the coherence of processor caches is significantly complicated. This is due to increased traffic on the memory buses and increased complexity of interprocessor communications. This problem is solved in various ways. In this paper, we propose the use of Bloom filters used to accelerate the determination of an element’s belonging to a certain array. In this article, such filters are used to establish the fact that the processor belongs to some subset of the processors and determine if the processor has a cache line in the set. In the paper, the processes of writing and reading information in the data shared between processors are discussed in detail, as well as the process of data replacement from private caches. The article also shows how the addresses of cache lines and processor numbers are removed from the Bloom filters. The system proposed in this paper allows significantly speeding up the implementation of operations to maintain cache coherence in the MSLP as compared to conventional systems. In terms of performance and additional hardware and software costs, the proposed system is not inferior to the most efficient of similar systems, but on some applications and significantly exceeds them.


2020 ◽  
Vol 96 (3s) ◽  
pp. 114-118
Author(s):  
П.С. Поперечный ◽  
И.Ю. Поперечная

Предложен способ вычисления БПФ с унифицированной схемой коммутации от стадии к стадии. Представлено итеративное выражение для аппаратной или программной реализации схемы вычисления. Для предложенных схем описана возможность реконфигурирования для вычисления БПФ различного числа отсчетов, при этом поворотные множители остаются прежними и нет необходимости делать их переменными. The article offers a method for FFT calculation by means of unified communication scheme stage-by-stage. There is an iterating equation for hardware and software implementation. Also, it provides the reconfiguration of schemes by different samples number. The rotating multipliers are the same like in non-reconfigurable (fixed) communication scheme. So, the offered approach does not require additional hardware or software resources.


2020 ◽  
Vol 10 (4) ◽  
pp. e20.00403-e20.00403
Author(s):  
Yohan Legallois ◽  
Alexandre Baujard ◽  
Simon Lukas ◽  
Jean-Thomas Leclerc ◽  
Pierre Martinot ◽  
...  

Electronics ◽  
2021 ◽  
Vol 10 (6) ◽  
pp. 715
Author(s):  
Alexander Schäfer ◽  
Gerd Reis ◽  
Didier Stricker

Virtual Reality (VR) technology offers users the possibility to immerse and freely navigate through virtual worlds. An important component for achieving a high degree of immersion in VR is locomotion. Often discussed in the literature, a natural and effective way of controlling locomotion is still a general problem which needs to be solved. Recently, VR headset manufacturers have been integrating more sensors, allowing hand or eye tracking without any additional required equipment. This enables a wide range of application scenarios with natural freehand interaction techniques where no additional hardware is required. This paper focuses on techniques to control teleportation-based locomotion with hand gestures, where users are able to move around in VR using their hands only. With the help of a comprehensive study involving 21 participants, four different techniques are evaluated. The effectiveness and efficiency as well as user preferences of the presented techniques are determined. Two two-handed and two one-handed techniques are evaluated, revealing that it is possible to move comfortable and effectively through virtual worlds with a single hand only.


2016 ◽  
Vol 2016 ◽  
pp. 1-14 ◽  
Author(s):  
Jie Zhang ◽  
Xiaolong Zheng ◽  
Zhanyong Tang ◽  
Tianzhang Xing ◽  
Xiaojiang Chen ◽  
...  

Mobile sensing has become a new style of applications and most of the smart devices are equipped with varieties of sensors or functionalities to enhance sensing capabilities. Current sensing systems concentrate on how to enhance sensing capabilities; however, the sensors or functionalities may lead to the leakage of users’ privacy. In this paper, we present WiPass, a way to leverage the wireless hotspot functionality on the smart devices to snoop the unlock passwords/patterns without the support of additional hardware. The attacker can “see” your unlock passwords/patterns even one meter away. WiPass leverages the impacts of finger motions on the wireless signals during the unlocking period to analyze the passwords/patterns. To practically implement WiPass, we are facing the difficult feature extraction and complex unlock passwords matching, making the analysis of the finger motions challenging. To conquer the challenges, we use DCASW to extract feature and hierarchical DTW to do unlock passwords matching. Besides, the combination of amplitude and phase information is used to accurately recognize the passwords/patterns. We implement a prototype of WiPass and evaluate its performance under various environments. The experimental results show that WiPass achieves the detection accuracy of 85.6% and 74.7% for passwords/patterns detection in LOS and in NLOS scenarios, respectively.


Sign in / Sign up

Export Citation Format

Share Document