Search results for " computing"
showing 10 items of 2075 documents
Simulating the impact of non-pharmaceutical interventions limiting transmission in COVID-19 epidemics using a membrane computing model
2021
Epidemics caused by microbial organisms are part of the natural phenomena of increasing biological complexity. The heterogeneity and constant variability of hosts, in terms of age, immunological status, family structure, lifestyle, work activities, social and leisure habits, daily division of time and other demographic characteristics make it extremely difficult to predict the evolution of epidemics. Such prediction is, however, critical for implementing intervention measures in due time and with appropriate intensity. General conclusions should be precluded, given that local parameters dominate the flow of local epidemics. Membrane computing models allows us to reproduce the objects (virus…
MDP-Based Resource Allocation Scheme Towards a Vehicular Fog Computing with Energy Constraints
2018
As mobile applications deliver increasingly complex functionalities, the demands for even more intensive computation would quickly transcend energy capability of mobile devices. On one hand and in an attempt to address such issues, fog computing paradigm is introduced to mitigate the limited energy and computation resources available within constrained mobile devices, by moving computation resources closer to their users at the edge of the access network. On another hand, most of electric vehicles (EVs), with increasing computation, storage and energy capabilities, spend more than 90% of time on parking lots. In this paper, we conceive the basic idea of using the underutilized computation r…
Cloud-based eHealth video encoding system for real time thermographic streaming: Performance evaluation
2017
Recent studies about the use of cloud platforms indicate that more than three-fourths of healthcare institutions apply these technologies in their daily lives. However, in most cases the cloud is based on “Infrastructure as a Service”, instead of developing new applications using the benefits that can bring us this type of technology. For these reasons, this paper shows a private cloud-based system to provide a new application based on thermographic video streaming. In this case, the cloud architecture is divided into three zones. The first zone is where the patient is under medical supervision through body temperature analysis using a global thermal camera. The second zone is the cloud its…
Combining gestures and vocalizations to imitate sounds
2015
International audience; Communicating about sounds is a difficult task without a technical language, and naïve speakers often rely on different kinds of non-linguistic vocalizations and body gestures (Lemaitre et al. 2014). Previous work has independently studied how effectively people describe sounds with gestures or vocalizations (Caramiaux, 2014, Lemaitre and Rocchesso, 2014). However, speech communication studies suggest a more intimate link between the two processes (Kendon, 2004). Our study thus focused on the combination of manual gestures and non-speech vocalizations in the communication of sounds. We first collected a large database of vocal and gestural imitations of a variety of …
Comparing identification of vocal imitations and computational sketches of everyday sounds
2016
International audience; Sounds are notably difficult to describe. It is thus not surprising that human speakers often use many imitative vocalizations to communicate about sounds. In practice,vocal imitations of non-speech everyday sounds (e.g. the sound of a car passing by) arevery effective: listeners identify sounds better with vocal imitations than with verbal descriptions, despite the fact that vocal imitations are often inaccurate, constrained by the human vocal apparatus. The present study investigated the semantic representations evoked by vocal imitations by experimentally quantifying how well listeners could match sounds to category labels. Itcompared two different types of sounds…
A context-aware approach for long-term behavioural change detection and abnormality prediction in ambient assisted living
2015
This research aims to describe pattern recognition models for detecting behavioural and health-related changes in a patient who is monitored continuously in an assisted living environment. The early anticipation of anomalies can improve the rate of disease prevention. Here we present different learning techniques for predicting abnormalities and behavioural trends in various user contexts. In this paper we described a Hidden Markov Model based approach for detecting abnormalities in daily activities, a process of identifying irregularity in routine behaviours from statistical histories and an exponential smoothing technique to predict future changes in various vital signs. The outcomes of t…
EDITORIAL
2014
A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks
2018
International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…
Middleware with QoS Support to Control Intelligent Systems
2008
This paper presents the architecture of a middleware for control component-based distributed systems. The fundamental idea underlying this architecture is the use of a hierarchical communications structure called "logical namespace tree" and a structured set of control processes interconnected, called "logical sensors graph". This architecture is named frame sensor adapter control (FSA-Ctrl). The aim of FSA-Ctrl is to provide a simple interface to specify the control actions and ensure a communication with some specified QoS parameters restrictions. In this architecture both systems, communication and control, manages the QoS policies. The communication system is based on the data distribut…
Schedulability analysis of window-constrained execution time tasks for real-time control
2003
Feasibility tests for hard real-time systems provide information about the schedulability of a set of tasks. However, this information is a yes or no answer whether the task set achieves the test or not. From the system design point of view, it would be useful to have more information, for example, how much can one vary some task parameters, such as computation time, without jeopardizing the system feasibility. The aim of the work is to provide a method to determine how much a task can increase its computation time, maintaining the system feasibility under a dynamic priority scheduling. This extra time can be determined not only in all the task activations, but in n of a window of m task in…