Search results for " computing"

showing 10 items of 2075 documents

Towards Efficient Control of Mobile Network-Enabled UAVs

2019

| openaire: EC/H2020/815191/EU//PriMO-5G The efficient control of mobile network-enabled unmanned aerial vehicles (UAVs) is targeted in this paper. In particular, a downlink scenario is considered, in which control messages are sent to UAVs via cellular base stations (BSs). Unlike terrestrial user equipment (UEs), UAVs perceive a large number of BSs, which can lead to increased interference causing poor or even unacceptable throughput. This paper proposes a framework for efficient control of UAVs. First, a communication model is introduced for flying UAVs taking into account interference, path loss and fast fading. The characteristics of UAVs make such model different compared to traditiona…

Computer science05 social sciencesReal-time computingComputerApplications_COMPUTERSINOTHERSYSTEMS050801 communication & media studies020206 networking & telecommunicationsThroughput02 engineering and technologyInterference (wave propagation)Base station0508 media and communicationsUser equipmentTelecommunications link0202 electrical engineering electronic engineering information engineeringCellular networkPath lossFading2019 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct

Combining Supervised and Unsupervised Learning to Discover Emotional Classes

2017

Most previous work in emotion recognition has fixed the available classes in advance, and attempted to classify samples into one of these classes using a supervised learning approach. In this paper, we present preliminary work on combining supervised and unsupervised learning to discover potential latent classes which were not initially considered. To illustrate the potential of this hybrid approach, we have used a Self-Organizing Map (SOM) to organize a large number of Electroencephalogram (EEG) signals from subjects watching videos, according to their internal structure. Results suggest that a more useful labelling scheme could be produced by analysing the resulting topology in relation t…

Computer science050109 social psychologyuser modelling02 engineering and technologyMachine learningcomputer.software_genrePersonalization0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencesEmotion recognitionEEGValence (psychology)Affective computingaffective computingclass discoverybusiness.industry05 social sciencesSupervised learningPattern recognitionHybrid approachComputingMethodologies_PATTERNRECOGNITIONUnsupervised learning020201 artificial intelligence & image processingArtificial intelligencebusinesscomputercluster analysis
researchProduct

A Non-Stationary Channel Model for the Development of Non-Wearable Radio Fall Detection Systems

2018

The emerging non-wearable fall detection systems rely on processing radio waves reflected off the body of the home user who has no active interaction with the system, increasing the user privacy and acceptability. This paper proposes a nonstationary channel model that is important for the development of such systems. A three-dimensional stochastic trajectory model is designed to capture targeted mobility patterns of the home user. The model is featured with a forward fall mechanism, which is actuated at a random point along the path. A transmitter emits radio waves throughout an indoor propagation environment, while a receiver collects fingerprints of the scattering objects on the emitted w…

Computer scienceApplied MathematicsReal-time computingTransmitterSpectral density020206 networking & telecommunications02 engineering and technologyComputer Science Applicationssymbols.namesake0202 electrical engineering electronic engineering information engineeringsymbols020201 artificial intelligence & image processingElectrical and Electronic EngineeringDoppler effectCommunication channelRadio wave
researchProduct

Touch or touchless?:Evaluating usability of interactive displays for persons with autistic spectrum disorders

2019

Interactive public displays have been exploited and studied for engaging interaction in several previous studies. In this context, applications have been focused on supporting learning or entertainment activities, specifically designed for people with special needs. This includes, for example, those with Autism Spectrum Disorders (ASD). In this paper, we present a comparison study aimed at understanding the difference in terms of usability, effectiveness, and enjoyment perceived by users with ASD between two interaction modalities usually supported by interactive displays: touch-based and touchless gestural interaction. We present the outcomes of a within-subject setup involving 8 ASD users…

Computer scienceAutismInteractive displaysSpecial needsContext (language use)02 engineering and technologyInteractive displaystouchless interfaces mid-air gestures touch autism usability evaluation interactive displaysHuman–computer interaction0202 electrical engineering electronic engineering information engineeringmedicine0501 psychology and cognitive sciencesUsability evaluation050107 human factorsSettore ING-INF/05 - Sistemi Di Elaborazione Delle Informazioni020203 distributed computingModalitiesModality (human–computer interaction)Settore INF/01 - Informaticabusiness.industry05 social sciencesUsabilitymedicine.diseaseMid-air gesturesTouchTouchless interfacesAutismUser interfacebusiness
researchProduct

Efficient FPGA Implementation of an Adaptive Noise Canceller

2006

A hardware implementation of an adaptive noise canceller (ANC) is presented. It has been synthesized within an FPGA, using a modified version of the least mean square (LMS) error algorithm. The results obtained so far show a significant decrease of the required gate count when compared with a standard LMS implementation, while increasing the ANC bandwidth and signal to noise (S/N) ratio. This novel adaptive noise canceller is then useful for enhancing the S/N ratio of data collected from sensors (or sensor arrays) working in noisy environment, or dealing with potentially weak signals.

Computer scienceBandwidth (signal processing)Real-time computingSignal synthesisElectroencephalographyBioelectric potentialsLeast mean squares filterSignal-to-noise ratioGate countError analysisElectronic engineeringHardware_ARITHMETICANDLOGICSTRUCTURESField-programmable gate arrayEvoked PotentialsActive noise control
researchProduct

Parallelizing Epistasis Detection in GWAS on FPGA and GPU-Accelerated Computing Systems

2015

This is a post-peer-review, pre-copyedit version of an article published in IEEE - ACM Transactions on Computational Biology and Bioinformatics. The final authenticated version is available online at: http://dx.doi.org/10.1109/TCBB.2015.2389958 [Abstract] High-throughput genotyping technologies (such as SNP-arrays) allow the rapid collection of up to a few million genetic markers of an individual. Detecting epistasis (based on 2-SNP interactions) in Genome-Wide Association Studies is an important but time consuming operation since statistical computations have to be performed for each pair of measured markers. Computational methods to detect epistasis therefore suffer from prohibitively lon…

Computer scienceBioinformaticsDNA Mutational AnalysisGenome-wide association studyParallel computingPolymorphism Single NucleotideSensitivity and SpecificityComputational biologyComputer GraphicsGeneticsComputer architectureField-programmable gate arrayRandom access memoryApplied MathematicsChromosome MappingHigh-Throughput Nucleotide SequencingReproducibility of ResultsField programmable gate arraysEpistasis GeneticSignal Processing Computer-AssistedEquipment DesignRandom access memoryComputing systemsReconfigurable computingEquipment Failure AnalysisTask (computing)EpistasisHost (network)Graphics processing unitsGenome-Wide Association StudyBiotechnology
researchProduct

High Precision Conservative Surface Mesh Generation for Swept Volumes

2015

We present a novel, efficient, and flexible scheme to generate a high-quality mesh that approximates the outer boundary of a swept volume. Our approach comes with two guarantees. First, the approximation is conservative, i.e., the swept volume is enclosed by the generated mesh. Second, the one-sided Hausdorff distance of the generated mesh to the swept volume is upper bounded by a user defined tolerance. Exploiting this tolerance the algorithm generates a mesh that is adapted to the local complexity of the swept volume boundary, keeping the overall output complexity remarkably low. The algorithm is two-phased: the actual sweep and the mesh generation. In the sweeping phase, we introduce a g…

Computer scienceBoundary (topology)Parallel computingUpper and lower boundsComputational scienceCUDAHausdorff distanceEngine displacementControl and Systems EngineeringMesh generationBounded functionElectrical and Electronic EngineeringRuppert's algorithmComputingMethodologies_COMPUTERGRAPHICSIEEE Transactions on Automation Science and Engineering
researchProduct

A self-adaptable distributed CBR version of the EquiVox system

2016

Three dimensional (3D) voxel phantoms are numerical representations of human bodies, used by physicians in very different contexts. In the controlled context of hospitals, where from 2 to 10 subjects may arrive per day, phantoms are used to verify computations before therapeutic exposure to radiation of cancerous tumors. In addition, 3D phantoms are used to diagnose the gravity of accidental exposure to radiation. In such cases, there may be from 10 to more than 1000 subjects to be diagnosed simultaneously. In all of these cases, computation accuracy depends on a single such representation. In this paper, we present EquiVox which is a tool composed of several distributed functions and enab…

Computer scienceComputation0206 medical engineeringBiomedical EngineeringBiophysicsTherapeutic exposureBioengineeringContext (language use)02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]computer.software_genreMachine learning[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Voxel0202 electrical engineering electronic engineering information engineeringComputer visionRepresentation (mathematics)Adaptation (computer science)business.industryMulti-agent system020601 biomedical engineering[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Key (cryptography)020201 artificial intelligence & image processing[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Artificial intelligence[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businesscomputer
researchProduct

Unmanned Aerial Vehicle-Based Non Destructive Diagnostics

2018

The paper proposes a cloud platform for analyzing the radiometric infrared videos uploaded by drones which patrol large photovoltaic plants. Thanks to artificial vision algorithms, it does not require any human support to select and associate the framed PV modules to the corresponding ones in the topology of the photovoltaic plant. The algorithm implements an innovative diagnostic protocol, which evaluates the thermal state of the photovoltaic module, whichever the environmental conditions are. The data automatically computed and collected in a multimedia database provide the O&M technicians with significant information to monitor the ageing of each module of the photovoltaic plant. The pro…

Computer scienceComputer Networks and CommunicationsMultimedia databaseReal-time computingEnergy Engineering and Power TechnologyCloud computingPV modulesdigital image processingIndustrial and Manufacturing EngineeringUploadSoftwareComputer aided diagnostics; digital image processing; drone based monitoring; PV cells; PV modules; thermography; Artificial Intelligence; Computer Networks and Communications; Computer Science Applications1707 Computer Vision and Pattern Recognition; Energy Engineering and Power Technology; Renewable Energy Sustainability and the Environment; Industrial and Manufacturing Engineering; InstrumentationPV moduleArtificial IntelligenceComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSInstrumentation (computer programming)Renewable EnergyProtocol (object-oriented programming)InstrumentationSustainability and the Environmentbusiness.industryPV cellsRenewable Energy Sustainability and the EnvironmentPV cellPhotovoltaic systemComputer Science Applications1707 Computer Vision and Pattern RecognitionDronedrone based monitoringthermographySettore ING-IND/31 - ElettrotecnicaComputer Networks and CommunicationComputer aided diagnosticsbusinesscomputer aided diagnostic
researchProduct

A Kalman Filter Approach for Distinguishing Channel and Collision Errors in IEEE 802.11 Networks

2008

In the last years, several strategies for maximizing the throughput performance of IEEE 802.11 networks have been proposed in literature. Specifically, it has been shown that optimizations are possible both at the medium access control (MAC) layer, and at the physical (PHY) layer. In fact, at the MAC layer, it is possible to minimize the channel waste due to collisions and backoff expiration times, by tuning the minimum contention window as a function of the network congestion level. At the PHY layer, it is possible to improve the transmission robustness, by selecting a suitable modulation/coding scheme as a function of the channel quality perceived by the stations. However, the feasibility…

Computer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingPhysical layerchannel estimationThroughputKalman filterNetwork allocation vectorNetwork congestionExtended Kalman filterWLANIEEE 802.11ModulationRobustness (computer science)PHYWireless lanComputer Science::Networking and Internet ArchitectureCommunication channel
researchProduct