Search results for " Computer Science"

showing 10 items of 3983 documents

Real-time 3D movements analysis for a medical device intended for maintaining functional independence in aged adults at home

2016

We propose in this manuscript a realtime3D movement analysis system for inhomefunctionalabilities assessment in aged adults. As a first step, the purpose is to maintain the functionalindependence of this population and to allow an earlier detection of a motor decompensation inorder to facilitate a rehabilitation process. To quantify the equilibrium quality of a subject, webuilt a system using the Kinect sensor in order to analyze a simple clinical test validated in geriatricrehabilitation: the Timed Up and Go (TUG). Three experiments conducted in heterogeneousenvironments (laboratory, day hospital and home) showed good measurement reliability of theidentified parameters. In particular, they…

Analyse des mouvements 3D en temps réelElderly persons[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV][ INFO.INFO-CV ] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]Evaluation automatique des capacités fonctionnellesNote de contrôle moteur[INFO.INFO-CV] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]Segmentation des personnesExtraction des paramètres spatiotemporelsTimed Up and GoPersonnes âgéesFragilité motriceDétection de la région de peauDétection de la position assise
researchProduct

A Paradigm Interpreting the City and the Analytic Network Process for the Management of Urban Transformations

2018

When urban and environmental transformations occur in areas where the equilibrium between nature and culture is complex and fragile, public ad-ministrations could decide to induce private investments using several tools, such as financial contributions to those projects of refurbishment that better re-spect the purpose of improving the environmental quality and of preserving the local architecture. Multicriteria models may support public decision process re-garding this issue, but it is essential to adopt a scientific paradigm that provides a major theoretical reference. This study proposes the development of a net-work model based on the scientific paradigm by Rizzo and the Analytic Net-wo…

Analytic network process; Decision aid; Multicriteria analysis; Urban transformation; Decision Sciences (all); Computer Science (all)AutopoiesisManagement scienceProcess (engineering)Computer scienceAnalytic network processComputer Science (all)0211 other engineering and technologies02 engineering and technologyDecision problemUrban transformationAnalytic Network Process Multicriteria Analysis Urban transformation decision aidDecision aidRankingAnalytic network processDecision Sciences (all)Order (exchange)021105 building & construction0202 electrical engineering electronic engineering information engineeringSettore ICAR/22 - Estimo020201 artificial intelligence & image processingMulticriteria analysisArchitectureNetwork model
researchProduct

Mitigating DDoS using weight‐based geographical clustering

2020

Distributed denial of service (DDoS) attacks have for the last two decades been among the greatest threats facing the internet infrastructure. Mitigating DDoS attacks is a particularly challenging task as an attacker tries to conceal a huge amount of traffic inside a legitimate traffic flow. This article proposes to use data mining approaches to find unique hidden data structures which are able to characterize the normal traffic flow. This will serve as a mean for filtering illegitimate traffic under DDoS attacks. In this endeavor, we devise three algorithms built on previously uncharted areas within mitigation techniques where clustering techniques are used to create geographical clusters …

Anomaly intrusion detectionsComputer Networks and CommunicationsComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSDenial-of-service attackFault tolerancecomputer.software_genreClustering techniquesData segmentComputer Science ApplicationsTheoretical Computer ScienceComputational Theory and MathematicsMitigating DDoS attacksCloud burstingData miningCluster analysisWeight based dosingcomputerSoftwareAddress clusteringMitigation techniquesConcurrency and Computation: Practice and Experience
researchProduct

The cryogenic anticoincidence detector for ATHENA-XMS: preliminary results from the new prototype

2012

ATHENA has been the re-scoped IXO mission, and one of the foreseen focal plane instrument was the X-ray Microcalorimeter Spectrometer (XMS) working in the energy range 0.3-10 keV, which was a kilo-pixel array based on TES (Transition Edge Sensor) detectors. The need of an anticoincidence (AC) detector is legitimated by the results performed with GEANT4 simulations about the impact of the non x-ray background onto XMS at L2 orbit (REQ. < 0.02 cts/cm2/s/keV). Our consortium has both developed and tested several samples, with increasing area, in order to match the large area of the XMS (64 mm2). Here we show the preliminary results from the last prototype. The results achieved in this work off…

Anticoincidence detectorLow temperature DetectorAnticoincidence detectorsAstrophysicsOrbital mechanicslaw.inventionOpticslawElectronicOptical and Magnetic MaterialsElectrical and Electronic EngineeringAnticoincidence detectors; High Energy Astrophysics; Low temperature Detectors; TES; Electronic Optical and Magnetic Materials; Condensed Matter Physics; Computer Science Applications1707 Computer Vision and Pattern Recognition; Applied Mathematics; Electrical and Electronic EngineeringPhysicsLow temperature DetectorsSpectrometerbusiness.industryApplied MathematicsElectronic Optical and Magnetic MaterialBolometerDetectorComputer Science Applications1707 Computer Vision and Pattern RecognitionCondensed Matter PhysicsApplied MathematicCardinal pointMillimeterSatelliteTransition edge sensorHigh Energy AstrophysicbusinessTESHigh Energy AstrophysicsSPIE Proceedings
researchProduct

Comparison and multiresolution analysis of irregular meshes with appearance attributes

2004

We present in this dissertation a method to compare and to analyse irregular meshes with appearance attributes. First, we propose a mesh comparison method using a new attribute deviation metric. Considered meshes contain geometric and appearance attributes (e.g. color, texture,temperature). The proposed deviation assessment allows the computation of local attribute differences between two meshes. We present an application of this method to mesh simplification algorithm quality assessment.Then we propose two multiresolution analysis schemes for irregular meshes with appearance attributes. First, a mesh is decomposed in a discret number of levels of detail. We introduce a surface geometry rel…

Appearance attributesIrregular meshes[INFO.INFO-GR] Computer Science [cs]/Graphics [cs.GR][INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]analyse multirésolutionattributs d’apparenceMesh comparisondébruitage adaptatif[INFO.INFO-CG]Computer Science [cs]/Computational Geometry [cs.CG][INFO.INFO-GR]Computer Science [cs]/Graphics [cs.GR][INFO.INFO-CV] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV][INFO.INFO-CG] Computer Science [cs]/Computational Geometry [cs.CG]visualisation dépendante des détailscomparaison de maillagesMultiresolution analysismaillages irréguliers
researchProduct

Linear and cyclic radio k-labelings of trees

2007

International audience; Motivated by problems in radio channel assignments, we consider radio k-labelings of graphs. For a connected graph G and an integer k ≥ 1, a linear radio k-labeling of G is an assignment f of nonnegative integers to the vertices of G such that |f(x)−f(y)| ≥ k+1−dG(x,y), for any two distinct vertices x and y, where dG(x,y) is the distance between x and y in G. A cyclic k-labeling of G is defined analogously by using the cyclic metric on the labels. In both cases, we are interested in minimizing the span of the labeling. The linear (cyclic, respectively) radio k-labeling number of G is the minimum span of a linear (cyclic, respectively) radio k-labeling of G. In this p…

Applied Mathematics010102 general mathematicsGraph theory[ INFO.INFO-DM ] Computer Science [cs]/Discrete Mathematics [cs.DM]Astrophysics::Cosmology and Extragalactic Astrophysics0102 computer and information sciences[INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM]Span (engineering)01 natural sciencesUpper and lower boundsCombinatoricsGraph theory[INFO.INFO-DM] Computer Science [cs]/Discrete Mathematics [cs.DM]IntegerRadio channel assignment010201 computation theory & mathematicsCyclic and linear radio k-labelingMetric (mathematics)Path (graph theory)Discrete Mathematics and CombinatoricsOrder (group theory)0101 mathematicsMSC 05C15 05C78ConnectivityMathematics
researchProduct

Sampling methods for low-frequency electromagnetic imaging

2007

For the detection of hidden objects by low-frequency electromagnetic imaging the linear sampling method works remarkably well despite the fact that the rigorous mathematical justification is still incomplete. In this work, we give an explanation for this good performance by showing that in the low-frequency limit the measurement operator fulfils the assumptions for the fully justified variant of the linear sampling method, the so-called factorization method. We also show how the method has to be modified in the physically relevant case of electromagnetic imaging with divergence-free currents. We present numerical results to illustrate our findings, and to show that similar performance can b…

Applied MathematicsMathematical analysis510 MathematikLow frequencyComputer Science ApplicationsTheoretical Computer ScienceOperator (computer programming)510 MathematicsSignal ProcessingFactorization methodLimit (mathematics)AlgorithmMathematical PhysicsMathematics
researchProduct

Recent progress in electrical impedance tomography

2003

We consider the inverse problem of finding cavities within some body from electrostatic measurements on the boundary. By a cavity we understand any object with a different electrical conductivity from the background material of the body. We survey two algorithms for solving this inverse problem, namely the factorization method and a MUSIC-type algorithm. In particular, we present a number of numerical results to highlight the potential and the limitations of these two methods.

Applied MathematicsMathematical analysisBoundary (topology)Inverse problemObject (computer science)Computer Science ApplicationsTheoretical Computer ScienceElectrical resistivity and conductivitySignal ProcessingCalculusFactorization methodElectrical impedance tomographyMathematical PhysicsMathematicsInverse Problems
researchProduct

A regularized Newton method for locating thin tubular conductivity inhomogeneities

2011

We consider the inverse problem of determining the position and shape of a thin tubular object, such as for instance a wire, a thin channel or a curve-like crack, embedded in some three-dimensional homogeneous body from a single measurement of electrostatic currents and potentials on the boundary of the body. Using an asymptotic model describing perturbations of electrostatic potentials caused by such thin objects, we reformulate the inverse problem as a nonlinear operator equation. We establish Frechet differentiability of the corresponding operator, compute its Frechet derivative and set up a regularized Newton scheme to solve the inverse problem numerically. We discuss our implementation…

Applied MathematicsOperator (physics)Mathematical analysisFréchet derivativeBoundary (topology)Inverse problemComputer Science ApplicationsTheoretical Computer Sciencesymbols.namesakeNewton fractalPosition (vector)Signal ProcessingsymbolsDifferentiable functionNewton's methodMathematical PhysicsMathematicsInverse Problems
researchProduct

Jacobian of solutions to the conductivity equation in limited view

2022

Abstract The aim of hybrid inverse problems such as Acousto-Electric Tomography or Current Density Imaging is the reconstruction of the electrical conductivity in a domain that can only be accessed from its exterior. In the inversion procedure, the solutions to the conductivity equation play a central role. In particular, it is important that the Jacobian of the solutions is non-vanishing. In the present paper we address a two-dimensional limited view setting, where only a part of the boundary of the domain can be controlled by a non-zero Dirichlet condition, while on the remaining boundary there is a zero Dirichlet condition. For this setting, we propose sufficient conditions on the bounda…

Applied Mathematicscurrent density imagingconductivity equationacousto-electric tomographyinversio-ongelmatComputer Science ApplicationsTheoretical Computer ScienceFunctional Analysis (math.FA)Mathematics - Functional Analysisnon-vanishing Jacobianhybrid inverse problemsSignal Processingcoupled physics imagingFOS: MathematicsMathematical Physics
researchProduct