Search results for " Computer Science"
showing 10 items of 3983 documents
Extrinsic calibration of heterogeneous cameras by line images
2014
International audience; The extrinsic calibration refers to determining the relative pose of cameras. Most of the approaches for cameras with non-overlapping fields of view (FOV) are based on mirror reflection, object tracking or rigidity constraint of stereo systems whereas cameras with overlapping FOV can be calibrated using structure from motion solutions. We propose an extrinsic calibration method within structure from motion framework for cameras with overlapping FOV and its extension to cameras with partially non-overlapping FOV. Recently, omnidirectional vision has become a popular topic in computer vision as an omnidirectional camera can cover large FOV in one image. Combining the g…
A Pragmatic Characterization of Concept Algebra
2017
Taking into account the framework of denotational mathematics as seen by Yingxu Wang, in this paper the author wishes to implement a possible further pragmatic (context-depend) dimension into the algebraic structure of concept algebra. One of the main problems of software science is that regarding context-depend question of a programming language. Indeed, attention has been paid above all to syntactic and semantic dimensions of a programming language, neglecting the pragmatic one concerning context. The author has tried to face this question providing a first denotational mathematics structure taking into account a possible pragmatic dimension.
Fuzzy Logic Based Security Trust Evaluation for IoT Environments
2019
In the new technological era called the Internet of Things (IoT), people, machines and objects communicate with each other via the Internet by exchanging information. In this context, trust plays an important role and is considered as a key factor in the success of the IoT services expansion. IoT services and applications use in some cases data concerning the privacy of their users. Consequently, users should trust the entities exchanging their personal information. In this paper, we present a framework that evaluates the security trust level of IoT nodes based on a Fuzzy Logic model using different input parameters such as Device Physical Security, Device Security Level and Device Ownershi…
Querying and reasoning over large scale building data sets
2016
International audience; The architectural design and construction domains work on a daily basis with massive amounts of data. Properly managing, exchanging and exploiting these data is an ever ongoing challenge in this domain. This has resulted in large semantic RDF graphs that are to be combined with a significant number of other data sets (building product catalogues, regulation data, geometric point cloud data, simulation data, sensor data), thus making an already huge dataset even larger. Making these big data available at high performance rates and speeds and into the correct (intuitive) formats is therefore an incredibly high challenge in this domain. Yet, hardly any benchmark is avai…
A Restricted-Weakly Connected Dominating Set for Role Assignment in a Multichannel MAC for Wireless Mesh Network
2009
International audience; We propose an efficient way of constructing the wireless mesh structure associated with Molecular MAC, a multichannel access method designed for efficient packet forwarding. We base our role assignment on a restricted Weakly Connected Dominating Set structure. After presenting a formal definition of the role assignment problem, we prove its NP-completeness. Then, we propose a centralized 2-approximation algorithm that maximizes the sum of radio link capacities in the molecular structure. Finally, we extend this protocol so that it can operate in a distributed way still providing the same guarantee. This distributed protocol is self-stabilizing thus robust to topology…
An Introduction to the Special Issue on Numerical Techniques Meet with OR - Part II
2021
Abstract The special issue: “Numerical Techniques Meet with OR” of the Foundations of Computing and Decision Sciences consists of two parts which are of the main theme of numerical techniques and their applications in multi-disciplinary areas. The first part of this special issue was already collected in the FCDS Vol. 46, issue 1. In this second part of our special issue editorial, a description of the special issue presents numerical methods which can be used as alternative techniques for Scientific Computing and led Operational Research applications in many fields for further investigation.
POLARIZATION-BASED CAR DETECTION
2018
International audience; Road scene understanding is a vital task for driving assistance systems. Robust vehicle detection is a precondition for diverse applications particularly for obstacle avoidance and secure navigation. Color images provide limited information about the physical properties of the object. This results in unstable vehicle detection caused mainly from road scene complexity (strong reflexions, noises and radiometric distortions). Instead, polarimetric images, characteristic of the light wave, can robustly describe important physical properties of the object (e.g., the surface geometric structure, material and roughness etc). This modality gives rich physical informations wh…
Modelling and Control of a 2-DOF Robot Arm with Elastic Joints for Safe Human-Robot Interaction
2021
Collaborative robots (or cobots) are robots that can safely work together or interact with humans in a common space. They gradually become noticeable nowadays. Compliant actuators are very relevant for the design of cobots. This type of actuation scheme mitigates the damage caused by unexpected collision. Therefore, elastic joints are considered to outperform rigid joints when operating in a dynamic environment. However, most of the available elastic robots are relatively costly or difficult to construct. To give researchers a solution that is inexpensive, easily customisable, and fast to fabricate, a newly-designed low-cost, and open-source design of an elastic joint is presented in this w…
A new Adaptive and Progressive Image Transmission Approach using Function Superpositions
2010
International audience; We present a novel approach to adaptive and progressive image transmission, based on the decomposition of an image into compositions and superpositions of monovariate functions. The monovariate functions are iteratively constructed and transmitted, one after the other, to progressively reconstruct the original image: the progressive transmission is performed directly in the 1D space of the monovariate functions and independently of any statistical properties of the image. Each monovariate function contains only a fraction of the pixels of the image. Each new transmitted monovariate function adds data to the previously transmitted monovariate functions. After each tra…
Comparing Tangible and Fully Virtual Haptic Systems for HMI Studies in Simulated Driving Situations
2019
International audience; The contribution of tangible and intangible feedback is compared for virtual tactile car Human-Machine Interfaces (HMI) design, to measure their performance both in static conditions and while driving. A subjectively calibrated transparent glass provides tangible passive haptics, and visual cues are used to study sensory substitution-based intangible interactions. The results show that the performance of the subjects was significantly improved in driving conditions as they interacted faster, more accurately and with a higher satisfaction. In addition, our findings highlight that the contribution of tangible systems is significantly lower in driving conditions, raisin…