GAIT ANALYSIS BY DIFFERENT TECHNIQUES
Journal Title: Elysium Journal of Engineering Research and Management - Year 2014, Vol 1, Issue 1
Abstract
Gait analysis is used in clinical evaluation of musculoskeletal system, design and assessment of prosthesis (especially for lower limbs), in the process of rehabilitation after injury and in biometrics. This paper reviews the general methodologies involved in kinematic gait analysis right from acquisition of data to processing and interpretation of meaningful results. The major components of kinematic gait analysis are:0T acquisition of data by cameras or instruments like accelerometer, electrogoniometer followed by processing and examination, measurement of general gait parameters, and electromyography (EMG).
Authors and Affiliations
Aiswariyadevi D, Rajaganapathy C D
COMPARATIVE ANALYSIS OF HANDOFF TECHNIQUES USING RESPONSE SURFACE ALGORITHM
Handoff is one of the most challenging topic for the next-generation wireless network. In this paper, the handoff techniques are compared by using the five parameters such as Bandwidth, Network latency,...
ANALYSIS OF BLOOD VESSEL CLASSIFICATION ALGORITHM ON RETINAL IMAGE USING C++
The proposed work is an automated system for the detection of Glaucoma which is done by using the algorithms CDR and ISNT ratio of a retinal fundus image. In general for the Glaucoma patient the s...
STATIC ANALYSIS FOR EXTRACTING PERMISSION CHECKS IN ANDROID USING EVENT GRAPH TECHNIQUE
Applications for Android are written in Java which is then compiled into Dalvik byte code. Memory and processing power are limited, when the byte code is improve to run on devices. An Android applicat...
SENSOR-FAULT TOLERANT BASED GAIN SCHEDULING CONTROLLER FOR NETWORKED DC MOTOR SYSTEM
This work is concerned with the controller design of NDCMS. A fuzzy gain scheduling controller has been designed to overcome the sensor faults and also to manage the network delay and packet dropouts. Fu...
AN EFFECTIVE ATTACK ELIMINATION METHOD FOR TOP-K QUERY PROCESSING IN MANETS
The query processing in mobile ad hoc network (MANETs) is optimized using top K-query concepts but this process in affected by the presence of malicious nodes in the environment where it ma...