Search results for " Computer Science"

showing 10 items of 3983 documents

Effect of Motion Artifact on Digital Camera Based Heart Rate Measurement

2017

International audience; Depression is one of the most prevalent mental disorders, burdening many people world-wide. A system with the potential of serving as a decision support system is proposed, based on novel features extracted from facial expression geometry and speech, by interpreting non-verbal manifestations of depression. The proposed system has been tested both in gender independent and gender based modes, and with different fusion methods. The algorithms were evaluated for several combinations of parameters and classification schemes, on the dataset provided by the Audio/Visual Emotion Challenge of 2013 and 2014. The proposed framework achieved a precision of 94.8% for detecting p…

Engineeringbusiness.product_category[SDV.IB.IMA]Life Sciences [q-bio]/Bioengineering/ImagingRemote patient monitoringMotion artifact effect02 engineering and technology01 natural sciencesMotion (physics)Field (computer science)Photoplethysmography signalComputer vision[ SDV.IB ] Life Sciences [q-bio]/Bioengineering[ SDV.IB.IMA ] Life Sciences [q-bio]/Bioengineering/ImagingDigital cameraSkinPatient monitoringDigital cameraremote health monitoringCamerasBiomedical technologyHeart rate measurement[SDV.IB]Life Sciences [q-bio]/BioengineeringArtifactsAlgorithms[ INFO ] Computer Science [cs]0206 medical engineeringHeart rateCardiology[INFO] Computer Science [cs]010309 opticsMotionDatabases0103 physical sciences[INFO]Computer Science [cs]Heart rate measurement methodPhotoplethysmographyBiomedical measurementLighting[SDV.IB] Life Sciences [q-bio]/BioengineeringArtifact (error)Digital camerasMAHNOB-HCI databasebusiness.industry020601 biomedical engineeringMotion artifacts[SDV.IB.IMA] Life Sciences [q-bio]/Bioengineering/ImagingFace (geometry)FaceState (computer science)Artificial intelligencebusiness
researchProduct

Cyber Security for Wireless Semantic (SCADA/DCS) Systems

2016

International audience; Supervisory Control and Data Acquisition and Distributed Control Systems named (SCADA/DCS) have played a key role in the design of modern power smart applications, particularly in the automatic management of real time energetic platforms. In this work, we present a semantic cyber security vulnerabilities add to classic one, with the use of semantic embedded application in smart devices in semantic wireless (SCADA/DCS) systems, focusing on the semantic attacks. In this work, we present a new security semantic wireless protocol as a secure communication support for these modern semantic wireless systems named (ZIGBEE/SOAP/SECURITY), obtained by the combination between …

Engineeringcomputer.internet_protocolSOAP0211 other engineering and technologies[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]02 engineering and technologyComputer securitycomputer.software_genre[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Supervisory controlSecure communicationSCADAWireless Application ProtocolSemantic Wireless (SCADA/DCS)Wireless Security ProtocolProtocol (object-oriented programming)Semantic Cyber Security[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]021110 strategic defence & security studiesbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS021001 nanoscience & nanotechnology(ZIGBEE/SOAP/SECURITY) ProtocolControl and Systems EngineeringKey (cryptography)0210 nano-technologyDistributed control systembusinessSmart Energetic PlatformcomputerComputer network
researchProduct

Visual Behaviour Based Bio-Inspired Polarization Techniques in Computer Vision and Robotics

2012

For long time, it was thought that the sensing of polarization by animals is invariably related to their behavior, such as navigation and orientation. Recently, it was found that polarization can be part of a high-level visual perception, permitting a wide area of vision applications. Polarization vision can be used for most tasks of color vision including object recognition, contrast enhancement, camouflage breaking, and signal detection and discrimination. The polarization based visual behavior found in the animal kingdom is briefly covered. Then, the authors go in depth with the bio-inspired applications based on polarization in computer vision and robotics. The aim is to have a comprehe…

EngineeringpolarizationVisual perceptionColor visionbusiness.industryVisionCognitive neuroscience of visual object recognitionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]Robotics02 engineering and technologyPolarization (waves)[ INFO.INFO-CV ] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]01 natural sciences010309 opticsCamouflageBio-inspired0103 physical sciences0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer visionVisual behaviourDetection theoryArtificial intelligencebusiness
researchProduct

Fifth Generation Networking Principles for a Service Driven Future Internet Architecture

2010

Published version of an article published in Wireless Personal Communications, vol. 57:393-411. Also available from the publisher at: http://dx.doi.org/10.1007/s11277-010-0076-7 The vision of all-IP networks where IP forms the simple common layer understandable across the whole network has undeniable advantages. However, such simplicity comes as a major hurdle to flexibility and functionality to the architecture. This is evident from the increasingly numerous and complex engineering solutions and optimizations required to accommodate essential qualities like mobility, security, realtime communication support etc or to mitigate the shortcomings inherent in the 'traditional Internet' architec…

Enterprise architecture frameworkComputer sciencecomputer.internet_protocolDistributed computingSolution architectureInteroperabilityCore networkcomputer.software_genreDatabase-centric architectureVDP::Mathematics and natural science: 400::Information and communication science: 420::Theoretical computer science programming languages and programming theory: 421Next-generation networkReference architectureElectrical and Electronic EngineeringNetwork architecturebusiness.industryQuality of serviceService-oriented architectureComputer Science ApplicationsFuture Internet network architecture service oriented architecture ROSAApplications architectureOpen network architectureThe InternetWeb serviceSpace-based architecturebusinesscomputerWireless Personal Communications
researchProduct

Multiparametric MRI-based Dosimetric Parameters Best Predict Short-term Time Course of PSA After Iodine 125 Permanent Prostate Implantation for Local…

2012

International audience; D90% and V150% of the entire prostate are recognized as the best dosimetric predictors of outcome after 125 I permanent prostate implantation (PPI). The purpose of this study was 2-fold: 1) to determine the relationship between dose-volume parameters of the Dominant Intraprostatic Lesion (DIL) when compared to the prostate and early biochemical outcome after PPI; 2) to define if dose-volume parameters of the central gland (CG), the peripheral zone (PZ) and the DIL could best predict PSA bounce occurrence. The time course of PSA and mechanisms of bounces still remain unclear after PPI. Patients who had a higher dose in the DIL had a worse PSA level at 1 year which is …

Entire prostateCancer Researchmedicine.medical_specialtyProstate implantationUrology[INFO.INFO-IM] Computer Science [cs]/Medical Imaging030218 nuclear medicine & medical imaging03 medical and health sciencesProstate cancer0302 clinical medicineProstatemedicine[INFO.INFO-IM]Computer Science [cs]/Medical ImagingRadiology Nuclear Medicine and imagingRadiation[ INFO.INFO-IM ] Computer Science [cs]/Medical Imagingbusiness.industryMultiparametric MRIPSA bouncemedicine.diseasePeripheral zonemedicine.anatomical_structureOncology030220 oncology & carcinogenesisTime coursebusiness
researchProduct

Food Tray Sealing Fault Detection in Multi-Spectral Images Using Data Fusion and Deep Learning Techniques

2021

A correct food tray sealing is required to preserve food properties and safety for consumers. Traditional food packaging inspections are made by human operators to detect seal defects. Recent advances in the field of food inspection have been related to the use of hyperspectral imaging technology and automated vision-based inspection systems. A deep learning-based approach for food tray sealing fault detection using hyperspectral images is described. Several pixel-based image fusion methods are proposed to obtain 2D images from the 3D hyperspectral image datacube, which feeds the deep learning (DL) algorithms. Instead of considering all spectral bands in region of interest around a contamin…

Envasos de plàsticComputer sciencehyperspectral imagingComputer applications to medicine. Medical informaticsR858-859.7Convolutional neural networkArticleDeep belief networkPhotographyRadiology Nuclear Medicine and imagingElectrical and Electronic EngineeringTR1-1050Extreme learning machineImage fusiondata fusionbusiness.industryDeep learningHyperspectral imagingdeep learningPattern recognitionAliments ConservacióQA75.5-76.95Sensor fusionComputer Graphics and Computer-Aided DesignAutoencoderfault detectionElectronic computers. Computer scienceComputer Vision and Pattern RecognitionArtificial intelligenceTecnologia dels alimentsbusinessfood packagingJournal of Imaging
researchProduct

Biotechnology Applications of Plant Callus Cultures

2019

In ethnopharmacology, and especially in traditional Chinese medicine, medicinal plants have been used for thousands of years. Similarly, agricultural plants have been used throughout the history of mankind. The recent development of the genetic engineering of plants to produce plants with desirable features adds a new and growing dimension to humanity’s usage of plants. The biotechnology of plants has come of age and a plethora of bioengineering applications in this context have been delineated during the past few decades. Callus cultures and suspension cell cultures offer a wide range of usages in pharmacology and pharmacy (including Chinese medicine), as well as in agriculture and horticu…

Environmental EngineeringGeneral Computer ScienceMaterials Science (miscellaneous)General Chemical EngineeringEnergy Engineering and Power TechnologyContext (language use)02 engineering and technologyBiology010402 general chemistry01 natural sciencesMedicinal plantsbusiness.industryfungiGeneral Engineeringfood and beverages021001 nanoscience & nanotechnology0104 chemical sciencesBiotechnologyGenetically modified organismAntibody productionlcsh:TA1-2040AgricultureCallusGene technologylcsh:Engineering (General). Civil engineering (General)0210 nano-technologybusinessEngineering
researchProduct

About Supergraphs. Part III

2019

Summary The previous articles [5] and [6] introduced formalizations of the step-by-step operations we use to construct finite graphs by hand. That implicitly showed that any finite graph can be constructed from the trivial edgeless graph K 1 by applying a finite sequence of these basic operations. In this article that claim is proven explicitly with Mizar[4].

EpigraphTheoretical computer scienceApplied Mathematics68t99Part iiiComputational Mathematics03b35construction of finite graphsQA1-93905c76Graph operationssupergraphgraph operationsMathematicsMathematicsFormalized Mathematics
researchProduct

Handling the epistemic uncertainty in the selective maintenance problem

2020

Abstract Nowadays, both continuous and discontinuous operating systems require higher and higher reliability levels in order to avoid the occurrence of dangerous or even disastrous consequences. Accordingly, the definition of appropriate maintenance policies and the identification of components to be maintained during the planned system’s downtimes are fundamental to ensure the reliability maximization. Therefore, the present paper proposes a mathematical programming formulation of the selective maintenance problem with the aim to maximize the system’s reliability under an uncertain environment. Specifically, the aleatory model related to the components’ failure process is well known, where…

Epistemic uncertainty021103 operations researchGeneral Computer ScienceProcess (engineering)Computer scienceInterval-valued reliability data0211 other engineering and technologiesGeneral EngineeringDempster-Shafer Theory02 engineering and technologyInterval (mathematics)MaximizationExact resolution algorithmIdentification (information)Risk analysis (engineering)Order (exchange)Dempster–Shafer theory0202 electrical engineering electronic engineering information engineeringSelective maintenance020201 artificial intelligence & image processingUncertainty quantificationReliability (statistics)Computers & Industrial Engineering
researchProduct

Agent's actions as a classification criteria for the state space in a learning from rewards system

2008

We focus in this paper on the problem of learning an autonomous agent's policy when the state space is very large and the set of actions available is comparatively short. To this end, we use a non-parametric decision rule (concretely, a nearest-neighbour strategy) in order to cluster the state space by means of the action that leads to a successful situation. Using an exploration strategy to avoid greedy behaviour, the agent builds clusters of positively-classified states through trial and error learning. In this paper, we implement a 3D synthetic agent which plays an 'avoid the asteroid' game that suits our assumptions. Using as the state space a feature vector space extracted from a visua…

Error-driven learningComputer sciencebusiness.industryFeature vectorAutonomous agentDecision ruleTrial and errorcomputer.software_genreMachine learningTheoretical Computer ScienceIntelligent agentArtificial IntelligenceVisual navigation systemArtificial intelligencebusinessClassifier (UML)computerSoftwareJournal of Experimental & Theoretical Artificial Intelligence
researchProduct