Learn More
This paper describes a fuzzy processing method for a respiratory rate monitoring system by an optical fiber sensor. This optical fiber sensor has a part of sensor sheet and a polarization detector. It noninvasively detects vital signal of human on the sheet by obtaining polarization variations. By using this sensor, we propose a fuzzy processing method of a(More)
As emerging technologies are being developed, a ubiquitous computing environment will be established in the near future. Researches on service provisions for users over the ubiquitous computing environment have been started. The implementation method of an actual service, based on our proposed service-provision framework, is described in this paper. The(More)
For the current on-site evaluation of the environmental contamination and contributory external exposure after the accident at the Chernobyl Nuclear Power Plant (CNPP) and the nuclear tests at the Semipalatinsk Nuclear Testing Site (SNTS), the concentrations of artificial radionuclides in soil samples from each area were analyzed by gamma spectrometry. Four(More)
To evaluate the environmental contamination and radiation exposure dose rates due to artificial radionuclides in Kawauchi Village, Fukushima Prefecture, the restricted area within a 30-km radius from the Fukushima Dai-ichi Nuclear Power Plant (FNPP), the concentrations of artificial radionuclides in soil samples, tree needles, and mushrooms were analyzed by(More)
OBJECTIVE To ensure good outcomes in the management of subarachnoid haemorrhage (SAH), accurate prediction is crucial for initial assessment of patients presenting with acute headache. We conducted this study to develop a new clinical decision rule using only objectively measurable predictors to exclude SAH, offering higher specificity than the previous(More)
In a ubiquitous computing environment, people can obtain and transmit information anytime, anywhere. In this situation, a user's context plays a key role. Unfortunately, the ubiquitous environment introduces some problems. The first is ease of access to what users truly want. The second important problem is handling private information. In utilizing a(More)
  • 1