Search results for "Computer Networks"

showing 10 items of 860 documents

Cost-Effective eHealth System Based on a Multi-Sensor System-on-Chip Platform and Data Fusion in Cloud for Sport Activity Monitoring

2018

eHealth systems provide medical support to users and contribute to the development of mobile and quality health care. They also provide results on the prevention and follow-up of diseases by monitoring health-status indicators and methodical data gathering in patients. Telematic management of health services by means of the Internet of Things provides immediate support and it is cheaper than conventional physical presence methods. Currently, wireless communications and sensor networks allow a person or group to be monitored remotely. The aim of this paper is to develop and assess a system for monitoring physiological parameters to be applied in different scenarios, such as health or sports.…

020205 medical informaticsStandardizationComputer Networks and CommunicationsComputer sciencelcsh:TK7800-8360Cloud computing02 engineering and technologycomputer.software_genre01 natural sciencesNetwork simulationHealth servicesElectrònica mèdicasensor networksHealth care0202 electrical engineering electronic engineering information engineeringeHealthSalutTelematicsElectrical and Electronic Engineeringdata fusionData collectionMultimediabusiness.industry010401 analytical chemistrylcsh:ElectronicsSensor fusion0104 chemical sciencesHardware and ArchitectureControl and Systems EngineeringSignal ProcessingbiomonitoringeHealthbusinesssportcomputerWireless sensor networkCloudElectronics
researchProduct

Cross-Layer MAC Protocol for Unbiased Average Consensus Under Random Interference

2019

Wireless Sensor Networks have been revealed as a powerful technology to solve many different problems through sensor nodes cooperation. One important cooperative process is the so-called average gossip algorithm, which constitutes a building block to perform many inference tasks in an efficient and distributed manner. From the theoretical designs proposed in most previous work, this algorithm requires instantaneous symmetric links in order to reach average consensus. However, in a realistic scenario wireless communications are subject to interferences and other environmental factors, which results in random instantaneous topologies that are, in general, asymmetric. Consequently, the estimat…

0209 industrial biotechnologyComputer Networks and CommunicationsComputer sciencebusiness.industryEstimator020206 networking & telecommunications02 engineering and technologyExpected valueNetwork topology020901 industrial engineering & automationMinimum-variance unbiased estimatorBias of an estimatorSignal Processing0202 electrical engineering electronic engineering information engineeringWirelessbusinessAlgorithmWireless sensor networkRandom variableInformation SystemsIEEE Transactions on Signal and Information Processing over Networks
researchProduct

Data-based modeling and estimation of vehicle crash processes in frontal fixed-barrier crashes

2017

Abstract As a complex process, vehicle crash is challenging to be described and estimated mathematically. Although different mathematical models are developed, it is still difficult to balance the complexity of models and the performance of estimation. The aim of this work is to propose a novel scheme to model and estimate the processes of vehicle-barrier frontal crashes. In this work, a piecewise model structure is predefined to represent the accelerations of vehicle in frontal crashes. Each segment in the model is corresponding to the energy absorbing component in the crashworthiness structure. With the help of Ensemble Empirical Mode Decomposition (EEMD), a robust scheme is proposed for …

0209 industrial biotechnologyEngineeringSignal processingMathematical modelComputer Networks and Communicationsbusiness.industryApplied MathematicsCrash02 engineering and technologyControl and Systems Engineering; Signal Processing; Computer Networks and Communications; Applied MathematicsFinite element methodHilbert–Huang transform020303 mechanical engineering & transports020901 industrial engineering & automation0203 mechanical engineeringControl and Systems EngineeringComponent (UML)Signal ProcessingPiecewiseCrashworthinessbusinessAlgorithmSimulationJournal of the Franklin Institute
researchProduct

An Ontology to Support Semantic Management of FMEA Knowledge

2016

<p>Risk mitigation has always been a special concern for organization’s strategic management. Various tools and techniques have been developed to manage risk in an effective way. Failure Mode and Effects Analysis (FMEA) is one of the tools used for effective assessment of risk. It analyzes all potential failure modes, their causes, and effects on a product or process. Moreover it recommends actions to mitigate failures in order to enhance product reliability. Organizations spend their resources and domain experts make their efforts to complete this analysis. It further helps organizations identify the expected risks and plan strategies in advance to tackle them. But unfortunately the …

0209 industrial biotechnologyKnowledge managementComputer Networks and Communicationsbusiness.industryProcess (engineering)Computer science0102 computer and information sciences02 engineering and technologyReuseOntology (information science)01 natural sciencesComputer Science Applications020901 industrial engineering & automationComputational Theory and MathematicsData retrievalRisk analysis (engineering)010201 computation theory & mathematicsStrategic managementbusinessFailure mode and effects analysisRisk managementNatural languageInternational Journal of Computers Communications & Control
researchProduct

Design and Calibration of a Specialized Polydioptric Camera Rig

2017

International audience; It has been observed in the nature that all creatures have evolved highly exclusive sensory organs depending on their habitat and the form of resources availability for their survival. In this project, a novel omnidirectional camera rig, inspired from natural vision sensors, is proposed. It is exclusively designed to operate for highly specified tasks in the field of mobile robotics. Navigation problems on uneven terrains and detection of the moving objects while the robot is itself in motion are the core problems that omnidirectional systems tackle. The proposed omnidirectional system is a compact and a rigid vision system with dioptric cameras that provide a 360° f…

0209 industrial biotechnologydepthComputer Networks and CommunicationsMachine visionComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONstereo-vision02 engineering and technologylcsh:QA75.5-76.95020901 industrial engineering & automationOmnidirectional cameraArtificial Intelligence[ INFO.INFO-TI ] Computer Science [cs]/Image Processing0202 electrical engineering electronic engineering information engineeringStructure from motionComputer visionSmart cameraComputingMethodologies_COMPUTERGRAPHICSpolydioptricstructure from motionbusiness.industryRGB-DRoboticscalibrationomnidirectionalStereopsisHardware and ArchitectureICT[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV][SPI.OPTI]Engineering Sciences [physics]/Optics / PhotonicRobot020201 artificial intelligence & image processinglcsh:Electronic computers. Computer scienceArtificial intelligence[ SPI.OPTI ] Engineering Sciences [physics]/Optics / PhotonicbusinessSoftwareStereo cameraInformation Systems
researchProduct

Input Selection Methods for Soft Sensor Design: A Survey

2020

Soft Sensors (SSs) are inferential models used in many industrial fields. They allow for real-time estimation of hard-to-measure variables as a function of available data obtained from online sensors. SSs are generally built using industries historical databases through data-driven approaches. A critical issue in SS design concerns the selection of input variables, among those available in a candidate dataset. In the case of industrial processes, candidate inputs can reach great numbers, making the design computationally demanding and leading to poorly performing models. An input selection procedure is then necessary. Most used input selection approaches for SS design are addressed in this …

0209 industrial biotechnologylcsh:T58.5-58.64lcsh:Information technologyComputer Networks and CommunicationsComputer scienceFeature selectionprediction02 engineering and technologyFunction (mathematics)input selectionSoft sensorcomputer.software_genresoft sensor; inferential model; input selection; feature selection; regression; predictionfeature selection020901 industrial engineering & automationinferential model0202 electrical engineering electronic engineering information engineeringsoft sensorregression020201 artificial intelligence & image processingData miningInput selectioncomputerSelection (genetic algorithm)Future Internet
researchProduct

Aesthetic considerations for the min-max K-Windy Rural Postman Problem

2017

[EN] The aesthetic quality of routes is a feature of route planning that is of practical importance, but receives relatively little attention in the literature. Several practitioners have pointed out that the visual appeal of a proposed set of routes can have a strong influence on the willingness of a client to accept or reject a specific routing plan. While some work has analyzed algorithmic performance relative to traditional min-sum or min-max objective functions and aesthetic objective functions, we are not aware of any work that has considered a multi-objective approach. This work considers a multi-objective variant of the Min-Max K-Vehicles Windy Rural Postman Problem, discusses sever…

021103 operations researchComputer Networks and Communications0211 other engineering and technologiesMin-Max objective02 engineering and technologyMulti-Objective problemsCombinatoricsArc routing problemsAesthetic objectiveHardware and Architecture0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingMATEMATICA APLICADAHumanitiesSoftwareInformation SystemsMathematicsNetworks
researchProduct

Secure and efficient verification for data aggregation in wireless sensor networks

2017

Summary The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the majo…

021110 strategic defence & security studiesComputer Networks and Communicationsbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS0211 other engineering and technologiesEarly detection020206 networking & telecommunications02 engineering and technologyImpersonation attackComputer Science ApplicationsData aggregatorRobustness (computer science)Information and Communications TechnologySoftware deploymentScalability0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkComputer networkInternational Journal of Network Management
researchProduct

Terrorism in the Website

2020

Without any doubt, terrorism causes higher levels of anxiety and very well enhances our fears as never before. The post 9/11 context witnesses the multiplication of xenophobic expressions, such as Islamophobia or tourist-phobia, only to name a few. These expressions result from a culture of intolerance, which not only was enrooted in the ideological core of western capitalism but was accelerated just after 9/11. Some voices emphasize the needs of employing technology to make this world a safer place. This chapter goes in a contradictory direction. The authors focus on the ethical limitations of technologies when they are subordinated to the ideals of zero-risk society. Echoing Sunstein and …

021110 strategic defence & security studiesInformation Systems and ManagementScrutinyComputer Networks and Communications05 social sciences0211 other engineering and technologiesContext (language use)02 engineering and technologyCriminology0506 political scienceHardware and ArchitecturePolitical scienceFundamentalismTerrorism050602 political science & public administrationmedicineAnxietyMultiplicationmedicine.symptomSafety Risk Reliability and QualitySafety ResearchSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct

Enabling openness of valuable information resources: Curbing data subtractability and exclusion

2019

In this paper we investigate how data openness can be made possible in communal settings. We adopt a utility perspective that foregrounds the use value of data, conceptualizing them as “goods.” On the basis of this conceptualization we explore 2 key goods' attributes: subtractability and exclusion. Our theoretical basis is built upon concepts from the theory of the commons, power theorizing, and notions related to data and information. Empirically, we investigate openness in the genetics domain through a longitudinal study of the evolving communal infrastructure for data related to 2 genes influencing women's susceptibility to breast and ovarian cancer (BRCA1 and BRCA2). We follow the conti…

0301 basic medicineComputer Networks and Communicationsbusiness.industryInternet privacycommonsopen data030105 genetics & heredityCritical researchPeer reviewPower (social and political)power03 medical and health sciencesOpen data030104 developmental biologyOpenness to experiencecritical researchbusinessCommonsSoftwareInformation Systems
researchProduct