Search results for " computing"

showing 10 items of 2075 documents

Simulating the impact of non-pharmaceutical interventions limiting transmission in COVID-19 epidemics using a membrane computing model

2021

Epidemics caused by microbial organisms are part of the natural phenomena of increasing biological complexity. The heterogeneity and constant variability of hosts, in terms of age, immunological status, family structure, lifestyle, work activities, social and leisure habits, daily division of time and other demographic characteristics make it extremely difficult to predict the evolution of epidemics. Such prediction is, however, critical for implementing intervention measures in due time and with appropriate intensity. General conclusions should be precluded, given that local parameters dominate the flow of local epidemics. Membrane computing models allows us to reproduce the objects (virus…

AcademicSubjects/SCI01150Coronavirus disease 2019 (COVID-19)Mortality ratePsychological interventionModelingCOVID-19modelingGeneral MedicineLimitinglaw.inventionTransmission (mechanics)GeographyIntervention measureslawmembrane computingIntervention (counseling)Membrane computing03.- Garantizar una vida saludable y promover el bienestar para todos y todas en todas las edadesMembrane computingLENGUAJES Y SISTEMAS INFORMATICOSinterventionsInterventionsDemographyResearch ArticleMicrolife
researchProduct

MDP-Based Resource Allocation Scheme Towards a Vehicular Fog Computing with Energy Constraints

2018

As mobile applications deliver increasingly complex functionalities, the demands for even more intensive computation would quickly transcend energy capability of mobile devices. On one hand and in an attempt to address such issues, fog computing paradigm is introduced to mitigate the limited energy and computation resources available within constrained mobile devices, by moving computation resources closer to their users at the edge of the access network. On another hand, most of electric vehicles (EVs), with increasing computation, storage and energy capabilities, spend more than 90% of time on parking lots. In this paper, we conceive the basic idea of using the underutilized computation r…

Access network0203 mechanical engineeringComputer scienceDistributed computing020208 electrical & electronic engineering0202 electrical engineering electronic engineering information engineeringResource allocation020302 automobile design & engineering02 engineering and technologyEnhanced Data Rates for GSM EvolutionMarkov decision processMobile device2018 IEEE Global Communications Conference (GLOBECOM)
researchProduct

Cloud-based eHealth video encoding system for real time thermographic streaming: Performance evaluation

2017

Recent studies about the use of cloud platforms indicate that more than three-fourths of healthcare institutions apply these technologies in their daily lives. However, in most cases the cloud is based on “Infrastructure as a Service”, instead of developing new applications using the benefits that can bring us this type of technology. For these reasons, this paper shows a private cloud-based system to provide a new application based on thermographic video streaming. In this case, the cloud architecture is divided into three zones. The first zone is where the patient is under medical supervision through body temperature analysis using a global thermal camera. The second zone is the cloud its…

Access networkMultimediaComputer sciencebusiness.industryReal-time computing020206 networking & telecommunications020207 software engineeringCloud computing02 engineering and technologycomputer.software_genreOrder (business)Video tracking0202 electrical engineering electronic engineering information engineeringeHealthCodecbusinesscomputer2017 IEEE International Conference on Communications (ICC)
researchProduct

Combining gestures and vocalizations to imitate sounds

2015

International audience; Communicating about sounds is a difficult task without a technical language, and naïve speakers often rely on different kinds of non-linguistic vocalizations and body gestures (Lemaitre et al. 2014). Previous work has independently studied how effectively people describe sounds with gestures or vocalizations (Caramiaux, 2014, Lemaitre and Rocchesso, 2014). However, speech communication studies suggest a more intimate link between the two processes (Kendon, 2004). Our study thus focused on the combination of manual gestures and non-speech vocalizations in the communication of sounds. We first collected a large database of vocal and gestural imitations of a variety of …

Acoustics and UltrasonicsComputer scienceInformationSystems_INFORMATIONINTERFACESANDPRESENTATION(e.g.HCI)Speech recognition02 engineering and technologyRepresentation (arts)[ SPI.SIGNAL ] Engineering Sciences [physics]/Signal and Image processing[INFO.INFO-NE]Computer Science [cs]/Neural and Evolutionary Computing [cs.NE][INFO.INFO-CL]Computer Science [cs]/Computation and Language [cs.CL]Loudness[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI][SCCO]Cognitive science0202 electrical engineering electronic engineering information engineering[ INFO.INFO-NE ] Computer Science [cs]/Neural and Evolutionary Computing [cs.NE]050107 human factorsComputingMilieux_MISCELLANEOUSSound (medical instrument)05 social sciences[ SHS.ANTHRO-SE ] Humanities and Social Sciences/Social Anthropology and ethnology[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][ SCCO.COMP ] Cognitive science/Computer science[SCCO.PSYC] Cognitive science/Psychology[INFO.INFO-SD]Computer Science [cs]/Sound [cs.SD][ SCCO.NEUR ] Cognitive science/Neuroscience[SCCO.PSYC]Cognitive science/Psychology[ INFO.EIAH ] Computer Science [cs]/Technology for Human Learning[ INFO.INFO-MA ] Computer Science [cs]/Multiagent Systems [cs.MA][INFO.EIAH]Computer Science [cs]/Technology for Human Learning[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingGesture[ SHS.MUSIQ ] Humanities and Social Sciences/Musicology and performing artsAcoustics[SCCO.COMP]Cognitive science/Computer scienceArts and Humanities (miscellaneous)[ INFO.INFO-HC ] Computer Science [cs]/Human-Computer Interaction [cs.HC]0501 psychology and cognitive sciences[ INFO.INFO-CL ] Computer Science [cs]/Computation and Language [cs.CL][INFO.INFO-HC]Computer Science [cs]/Human-Computer Interaction [cs.HC]Set (psychology)[ INFO.INFO-AI ] Computer Science [cs]/Artificial Intelligence [cs.AI][SPI.ACOU]Engineering Sciences [physics]/Acoustics [physics.class-ph][SPI.ACOU] Engineering Sciences [physics]/Acoustics [physics.class-ph][SHS.MUSIQ]Humanities and Social Sciences/Musicology and performing arts[ INFO.INFO-ET ] Computer Science [cs]/Emerging Technologies [cs.ET][SCCO.NEUR]Cognitive science/Neuroscience020207 software engineering[SHS.ANTHRO-SE]Humanities and Social Sciences/Social Anthropology and ethnologyVariety (linguistics)loudness[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Noise (video)[ INFO.INFO-SD ] Computer Science [cs]/Sound [cs.SD]
researchProduct

Comparing identification of vocal imitations and computational sketches of everyday sounds

2016

International audience; Sounds are notably difficult to describe. It is thus not surprising that human speakers often use many imitative vocalizations to communicate about sounds. In practice,vocal imitations of non-speech everyday sounds (e.g. the sound of a car passing by) arevery effective: listeners identify sounds better with vocal imitations than with verbal descriptions, despite the fact that vocal imitations are often inaccurate, constrained by the human vocal apparatus. The present study investigated the semantic representations evoked by vocal imitations by experimentally quantifying how well listeners could match sounds to category labels. Itcompared two different types of sounds…

Acoustics and UltrasonicsComputer science[ SHS.MUSIQ ] Humanities and Social Sciences/Musicology and performing artsSpeech recognitionAcoustics[SCCO.COMP]Cognitive science/Computer science[ SPI.SIGNAL ] Engineering Sciences [physics]/Signal and Image processing[INFO.INFO-NE]Computer Science [cs]/Neural and Evolutionary Computing [cs.NE][INFO.INFO-CL]Computer Science [cs]/Computation and Language [cs.CL][INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI][SPI]Engineering Sciences [physics][SCCO]Cognitive scienceArts and Humanities (miscellaneous)[ INFO.INFO-HC ] Computer Science [cs]/Human-Computer Interaction [cs.HC][ INFO.INFO-CL ] Computer Science [cs]/Computation and Language [cs.CL][INFO.INFO-HC]Computer Science [cs]/Human-Computer Interaction [cs.HC][ INFO.INFO-NE ] Computer Science [cs]/Neural and Evolutionary Computing [cs.NE][ INFO.INFO-AI ] Computer Science [cs]/Artificial Intelligence [cs.AI]ComputingMilieux_MISCELLANEOUSSound (medical instrument)[ INFO.INFO-ET ] Computer Science [cs]/Emerging Technologies [cs.ET][SHS.MUSIQ]Humanities and Social Sciences/Musicology and performing arts[SCCO.NEUR]Cognitive science/Neuroscience[SHS.ANTHRO-SE]Humanities and Social Sciences/Social Anthropology and ethnologyIdentification (information)[ SHS.ANTHRO-SE ] Humanities and Social Sciences/Social Anthropology and ethnology[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][ SCCO.COMP ] Cognitive science/Computer science[ SCCO.NEUR ] Cognitive science/Neuroscience[INFO.INFO-SD]Computer Science [cs]/Sound [cs.SD][ INFO.EIAH ] Computer Science [cs]/Technology for Human Learning[ INFO.INFO-MA ] Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.EIAH]Computer Science [cs]/Technology for Human Learning[ INFO.INFO-SD ] Computer Science [cs]/Sound [cs.SD][SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing
researchProduct

A context-aware approach for long-term behavioural change detection and abnormality prediction in ambient assisted living

2015

This research aims to describe pattern recognition models for detecting behavioural and health-related changes in a patient who is monitored continuously in an assisted living environment. The early anticipation of anomalies can improve the rate of disease prevention. Here we present different learning techniques for predicting abnormalities and behavioural trends in various user contexts. In this paper we described a Hidden Markov Model based approach for detecting abnormalities in daily activities, a process of identifying irregularity in routine behaviours from statistical histories and an exponential smoothing technique to predict future changes in various vital signs. The outcomes of t…

Activities of daily livingComputer scienceContext (language use)computer.software_genreMachine learningHidden Markov ModelArtificial IntelligencePattern recognitionHealth careCloud computingTrend detectionHidden Markov modelFuzzy ruleContext-awarebusiness.industryHealthcare[INFO.INFO-IA]Computer Science [cs]/Computer Aided EngineeringStatistical process control3. Good healthAmbient assisted livingRemote monitoringEldercareAnticipation (artificial intelligence)Signal ProcessingPattern recognition (psychology)Change detectionComputer Vision and Pattern RecognitionArtificial intelligenceData miningbusinesscomputerSoftwareChange detectionPattern Recognition
researchProduct

EDITORIAL

2014

Ad Hoc and Ubiquitous Computing
researchProduct

A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks

2018

International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…

Ad hoc networksMonitoringAnomaly-based intrusion detection systemWireless ad hoc networkComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]UAVMobile computing[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]JammingComputerApplications_COMPUTERSINOTHERSYSTEMS02 engineering and technologyIntrusion detection systemAnomaly detection and rules-based intrusion detection techniquesIDSBlack hole (networking)Computer securitycomputer.software_genreMobile communicationUnmanned aerial vehicles[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringFalse positive paradoxOverhead (computing)Intrusion detectionElectrical and Electronic Engineering020206 networking & telecommunicationsComputer Science ApplicationsHuman-Computer InteractionControl and Systems Engineeringintrusion detection system020201 artificial intelligence & image processingcyber-attacksIntrusion prevention systemcomputerSoftware
researchProduct

Middleware with QoS Support to Control Intelligent Systems

2008

This paper presents the architecture of a middleware for control component-based distributed systems. The fundamental idea underlying this architecture is the use of a hierarchical communications structure called "logical namespace tree" and a structured set of control processes interconnected, called "logical sensors graph". This architecture is named frame sensor adapter control (FSA-Ctrl). The aim of FSA-Ctrl is to provide a simple interface to specify the control actions and ensure a communication with some specified QoS parameters restrictions. In this architecture both systems, communication and control, manages the QoS policies. The communication system is based on the data distribut…

Adapter (computing)Computer sciencebusiness.industryQuality of serviceControl systemDistributed computingIntelligent decision support systemData Distribution ServiceNamespaceSoftware architecturebusinessCommunications systemComputer network2008 The Second International Conference on Advanced Engineering Computing and Applications in Sciences
researchProduct

Schedulability analysis of window-constrained execution time tasks for real-time control

2003

Feasibility tests for hard real-time systems provide information about the schedulability of a set of tasks. However, this information is a yes or no answer whether the task set achieves the test or not. From the system design point of view, it would be useful to have more information, for example, how much can one vary some task parameters, such as computation time, without jeopardizing the system feasibility. The aim of the work is to provide a method to determine how much a task can increase its computation time, maintaining the system feasibility under a dynamic priority scheduling. This extra time can be determined not only in all the task activations, but in n of a window of m task in…

Adaptive controlJob shop schedulingReal-time Control SystemComputer scienceControl systemReal-time computingSystems designFault toleranceDynamic priority schedulingScheduling (computing)Proceedings 14th Euromicro Conference on Real-Time Systems. Euromicro RTS 2002
researchProduct