In this paper, the specific application of key words Spotting used in the network monitoring is studied, and the keywords spotting is emphasized. The whole monitoring system is divided into two mod-ules: network moni...In this paper, the specific application of key words Spotting used in the network monitoring is studied, and the keywords spotting is emphasized. The whole monitoring system is divided into two mod-ules: network monitoring and keywords spotting. In the part of network monitoring, this paper adopts a method which is based on ARP spoofing technology to monitor the users' data, and to obtain the original audio streams. In the part of keywords spotting, the extraction methods of PLP (one of the main characteristic arameters) is studied, and improved feature parameters- PMCC are put forward. Meanwhile, in order to accurately detect syllable, the paper the double-threshold method with variance of frequency band method, and use the latter to carry out endpoint detection. Finally, keywords recognition module is built by HMM, and identification results are contrasted under Matlab environment. From the experiment results, a better solution for the application of key words recognition technology in network monitoring is found.展开更多
Wearable smart devices, such as smart watch, wristband are becoming increasingly popular recently. They generally integrate the MEMS-designed inertial sensors, including accelerometer, gyroscope and compass, which pro...Wearable smart devices, such as smart watch, wristband are becoming increasingly popular recently. They generally integrate the MEMS-designed inertial sensors, including accelerometer, gyroscope and compass, which provide a convenient and inexpensive way to collect motion data of users. Such rich, continuous motion data provide great potential for remote healthcare and decease diagnosis. Information processing algorithms play the critical role in these approaches, which is to extract the motion signatures and to access different kinds of judgements. This paper reviews key algorithms in these areas. In particular, we focus on three kinds of applications: 1) gait analysis; 2) fall detection and 3) sleep monitoring. They are the most popular healthcare applications based on the inertial data. By categorizing and introducing the key algorithms, this paper tries to build a clear map of how the inertial data are processed; how the inertial signatures are defined, extracted, and utilized in different kinds of applications. This will provide a valuable guidance for users to understand the methodologies and to select proper algorithm for specifi c application purpose.展开更多
The aim of the research was to evaluate overall quality of introduction of hazard analysis and critical control points (HACCP) prerequisites and HACCP procedures in catering sector in Latvia to reveal common problem...The aim of the research was to evaluate overall quality of introduction of hazard analysis and critical control points (HACCP) prerequisites and HACCP procedures in catering sector in Latvia to reveal common problems that can provoke food-borne infection outbreaks. Certain quantitative indicators were defined and analyzed to conclude about characteristic trends related to implementation of food safety legislation. The state's monitoring data on surveillance of catering establishments were used. Fulfillment of legislative requirements in about 6,000 catering establishments was evaluated during time period of 2004-2009. The results of investigation were obtained with help of statistical analyses using MS Excel computer program. The results of the research suggest that most of catering establishments (e.g., 83.6% during 2009) meet the hygiene requirements only partly. Non-conformities regarding HACCP-based self-control procedures were fixed during 49.2% of inspections. The research reveals characteristic shortcomings that are established from year to year, e.g., improper hygiene of premises (established during 30%-40% of inspections, depending on the year), poor hygiene of technological equipment (established during 27%-37% of inspections), poor personnel hygiene (established during 11%-22% of inspections), inadequate competence of food service personnel (established during 10%-35% of inspections), as well as non-observance of cleaning-disinfection procedures and technological parameters for food processing (established during 11%-25% of inspections, depending on the year). Actual shortcomings can lead to both the direct and the indirect cross-contamination of food. On the base of the research, it was concluded that further detailed assessment of potential food safety risks is relevant to establish risk-based monitoring activities in catering sector.展开更多
基金supported by the Natural Science Foundation of Guangxi Province(No.60961002)
文摘In this paper, the specific application of key words Spotting used in the network monitoring is studied, and the keywords spotting is emphasized. The whole monitoring system is divided into two mod-ules: network monitoring and keywords spotting. In the part of network monitoring, this paper adopts a method which is based on ARP spoofing technology to monitor the users' data, and to obtain the original audio streams. In the part of keywords spotting, the extraction methods of PLP (one of the main characteristic arameters) is studied, and improved feature parameters- PMCC are put forward. Meanwhile, in order to accurately detect syllable, the paper the double-threshold method with variance of frequency band method, and use the latter to carry out endpoint detection. Finally, keywords recognition module is built by HMM, and identification results are contrasted under Matlab environment. From the experiment results, a better solution for the application of key words recognition technology in network monitoring is found.
基金supported in part by National Natural Science Foundation of China Grant 61202360, 61033001, 61361136003the National Basic Research Program of China Grant 2011CBA00300, 2011CBA00302
文摘Wearable smart devices, such as smart watch, wristband are becoming increasingly popular recently. They generally integrate the MEMS-designed inertial sensors, including accelerometer, gyroscope and compass, which provide a convenient and inexpensive way to collect motion data of users. Such rich, continuous motion data provide great potential for remote healthcare and decease diagnosis. Information processing algorithms play the critical role in these approaches, which is to extract the motion signatures and to access different kinds of judgements. This paper reviews key algorithms in these areas. In particular, we focus on three kinds of applications: 1) gait analysis; 2) fall detection and 3) sleep monitoring. They are the most popular healthcare applications based on the inertial data. By categorizing and introducing the key algorithms, this paper tries to build a clear map of how the inertial data are processed; how the inertial signatures are defined, extracted, and utilized in different kinds of applications. This will provide a valuable guidance for users to understand the methodologies and to select proper algorithm for specifi c application purpose.
文摘The aim of the research was to evaluate overall quality of introduction of hazard analysis and critical control points (HACCP) prerequisites and HACCP procedures in catering sector in Latvia to reveal common problems that can provoke food-borne infection outbreaks. Certain quantitative indicators were defined and analyzed to conclude about characteristic trends related to implementation of food safety legislation. The state's monitoring data on surveillance of catering establishments were used. Fulfillment of legislative requirements in about 6,000 catering establishments was evaluated during time period of 2004-2009. The results of investigation were obtained with help of statistical analyses using MS Excel computer program. The results of the research suggest that most of catering establishments (e.g., 83.6% during 2009) meet the hygiene requirements only partly. Non-conformities regarding HACCP-based self-control procedures were fixed during 49.2% of inspections. The research reveals characteristic shortcomings that are established from year to year, e.g., improper hygiene of premises (established during 30%-40% of inspections, depending on the year), poor hygiene of technological equipment (established during 27%-37% of inspections), poor personnel hygiene (established during 11%-22% of inspections), inadequate competence of food service personnel (established during 10%-35% of inspections), as well as non-observance of cleaning-disinfection procedures and technological parameters for food processing (established during 11%-25% of inspections, depending on the year). Actual shortcomings can lead to both the direct and the indirect cross-contamination of food. On the base of the research, it was concluded that further detailed assessment of potential food safety risks is relevant to establish risk-based monitoring activities in catering sector.