Search results for " computing"
showing 10 items of 2075 documents
Stroke Cognitive Medical Assistant (StrokeCMA)
2018
Stroke is the number two killer after heart disease since it is responsible for almost 10% of all deaths worldwide. The main problem with a stroke is a significant delay in treatment that happened mainly due to inappropriate detection of stroke symptoms or inability of a person to perform further necessary actions, and might cause death, permanent disabilities, as well as more expensive treatment and rehabilitation. Nowadays assessment of a stroke is done by human, following widely adopted FAST approach of stroke assessment. Since a human factor become one of the causes of treatment delay, offered solution will try to minimize this factor. Artificial Intelligence, Cognitive Computing, Machi…
Multi-objective optimization for computation offloading in mobile-edge computing
2017
Mobile-edge cloud computing is a new cloud platform to provide pervasive and agile computation augmenting services for mobile devices (MDs) at anytime and anywhere by endowing ubiquitous radio access networks with computing capabilities. Although offloading computations to the cloud can reduce energy consumption at the MDs, it may also incur a larger execution delay. Usually the MDs have to pay cloud resource they used. In this paper, we utilize queuing theory to bring a thorough study on the energy consumption, execution delay and price cost of offloading process in a mobile-edge cloud system. Specifically, both wireless transmission and computing capabilities are explicitly and jointly co…
Incentive Mechanism for Edge Computing-Based Blockchain: A Sequential Game Approach
2022
The development of the blockchain framework is able to provide feasible solutions for a wide range of Industrial Internet of Things (IIoT) applications. While the IIoT devices are usually resource-limited, how to make sure the acquisition of computational resources and participation of the devices will be the driving force to realize blockchain. In this work, an edge computing-based blockchain framework is considered, where multiple edge service providers (ESPs) can provide computational resources to the IIoT devices. We focus on investigating the trading between the devices and ESPs, where ESPs are the sellers and devices are the buyers. A sequential game is formulated and by exploring the…
Quantum Creativity and Cognition in Humans and Robots
2022
In this research, we present a categorical framework to connect research on creativity and cognition for humans and robots, in light of the quantum paradigm. These fields and their relationships suggest a wider vision: modeling human creativity/cognition through quantum computing, and creating robots that can help us learn more about the humans themselves. We represent the human–robot comparison through functors (function generalization). Fundamental elements to understand human creativity are motivation and feedback as aesthetic pleasure. Is it possible to model it? Can the quantum paradigm help us in such an endeavor? We envisage the concept of emergence and quantum computing as decisive…
System for Executing Encrypted Native Programs
2017
An important aspect of protecting software from attack, theft of algorithms, or illegal software use, is eliminating the possibility of performing reverse engineering. One common method to deal with these issues is code obfuscation. However, in most case it was shown to be ineffective. Code encryption is a much more effective means of defying reverse engineering, but it requires managing a secret key available to none but the permissible users. The authors propose a new and innovative solution. Critical functions in protected software are encrypted using well-known encryption algorithms. Following verification by external attestation, a thin hypervisor is used as the basis of an eco-system …
Preventing Execution of Unauthorized Native-Code Software
2017
The business world is exhibiting a growing dependency on computer systems, their operations and the databases they contain. Unfortunately, it also suffers from an ever growing recurrence of malicious software attacks. Malicious attack vectors are diverse and the computer-security industry is producing an abundance of behavioral-pattern detections to combat the phenomenon. This paper proposes an alternative approach, based on the implementation of an attested, and thus trusted, thin-hypervisor. Secondary level address translation tables, governed and fully controlled by the hypervisor, are configured in order to assure that only pre-whitelisted instructions can be executed in the system. Thi…
Track finding at Belle II
2021
Computer physics communications 259, 107610 (2021). doi:10.1016/j.cpc.2020.107610
Col : A Data Collection Protocol for Vanet
2012
International audience; In this paper, we present a protocol to collect data within a vehicular ad hoc network (VANET). In spite of the intrinsic dynamic of such network, our protocol simultaneously offers three relevant properties: (1) It allows any vehicle to collect data beyond its direct neighborhood (i.e., vehicles within direct communication range) using vehicle-to-vehicle communications only (i.e., the infrastructure is not required); (2) It tolerates possible network partitions; (3) It works on demand and stops when the data collection is achieved. To the best of our knowledge, this is the first collect protocol having these three characteristics. All that is chiefly obtained thanks…
UAV-Assisted Data Collection in Wireless Sensor Networks: A Comprehensive Survey
2021
Wireless sensor networks (WSNs) are usually deployed to different areas of interest to sense phenomena, process sensed data, and take actions accordingly. The networks are integrated with many advanced technologies to be able to fulfill their tasks that is becoming more and more complicated. These networks tend to connect to multimedia networks and to process huge data over long distances. Due to the limited resources of static sensor nodes, WSNs need to cooperate with mobile robots such as unmanned ground vehicles (UGVs), or unmanned aerial vehicles (UAVs) in their developments. The mobile devices show their maneuverability, computational and energy-storage abilities to support WSNs in mul…
Time-Frequency Characteristics of In-Home Radio Channels Influenced by Activities of the Home Occupant
2019
While aging is a serious global concern, in-home healthcare monitoring solutions are limited to context-aware systems and wearable sensors, which may easily be forgotten or ignored for privacy and comfort reasons. An emerging non-wearable fall detection approach is based on processing radio waves reflected off the body, who has no active interaction with the system. This paper reports on an indoor radio channel measurement campaign at 5.9 GHz, which has been conducted to study the impact of fall incidents and some daily life activities on the temporal and spectral properties of the indoor channel under both line-of-sight (LOS) and obstructed-LOS (OLOS) propagation conditions. The time-frequ…