Search results for "Intelligence"
showing 10 items of 6959 documents
Communication and security in communicating things networks
2020
International audience
Perceptual adaptive insensitivity for support vector machine image coding.
2005
Support vector machine (SVM) learning has been recently proposed for image compression in the frequency domain using a constant epsilon-insensitivity zone by Robinson and Kecman. However, according to the statistical properties of natural images and the properties of human perception, a constant insensitivity makes sense in the spatial domain but it is certainly not a good option in a frequency domain. In fact, in their approach, they made a fixed low-pass assumption as the number of discrete cosine transform (DCT) coefficients to be used in the training was limited. This paper extends the work of Robinson and Kecman by proposing the use of adaptive insensitivity SVMs [2] for image coding u…
A study of LoRaWAN protocol performance for IoT applications in smart agriculture
2020
Abstract The use of Internet of Things (IoT) is becoming increasingly common in agribusiness to increase food production capacity for the expanding global population. Recently, low-power wide-area networks (LPWANs) have been used in the development of IoT applications that require low power consumption and low data transmission rates. LoRaWAN is considered the most suitable communication network for LPWANs for IoT applications in smart agriculture. In this paper, we present an in-depth study of the performance of the LoRaWAN communication network in the context of an IoT application for a pilot farm. We consider several scenarios and analyze simulation results by using Network Simulator 3. …
An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility
2017
Security in mobile wireless sensor networks is a big challenge because it adds more complexity to the network in addition to the problems of mobility and the limited sensor node resources. Even with authentication and encryption mechanisms, an attacker can compromise nodes and get all the keying materials. Therefore, an intrusion detection system is necessary to detect and defend against the insider attackers. Currently, there is no intrusion detection system applied to IPv6-based mobile wireless sensor networks. This paper is mainly interested in detecting the selective forwarding and clone attacks because they are considered among the most dangerous attackers. In this work, the authors de…
An optimized mass storage FFT for vector computers
1995
Abstract The performance of a segmented FFT algorithm which allows the out-of-core computation of the Fourier transform of a very large mass storage data array is presented. The code is particularly optimized for vector computers. Tests performed mainly on a CONVEX C210 vector computer showed that, for very long transforms, tuning of the main parameters involved leads to computation speed and global efficiency better than for FFTs performed in-core. The use of tunable parameters allows optimization of the algorithm on machines with different configurations.
Cloud-based elastic architecture for distributed video encoding: Evaluating H.265, VP9, and AV1
2020
Abstract Areas with social and business impact such as entertainment, healthcare, surveillance, and e-learning would benefit from improvements in video coding and transcoding services. New codecs, such as AV1, are being developed to deal with new demands for high video resolutions with bandwidth constraints and quality requirements. However, these new codecs have high computational requirements and new strategies are needed to accelerate their processing. Cloud computing offers interesting features such as on-demand resource allocation, multitenancy, elasticity, and resiliency among others. Deploying video coding and transcoding services on these infrastructures is suitable because it allow…
Comparison of WSN and IoT approaches for a real-time monitoring system of meal distribution trolleys: A case study
2018
Abstract International regulations determine that food in hospitals and elderly homes must be served at given temperature ranges. However, the real-time surveillance of the meal distribution trolleys along all the institutions facilities, guaranteeing conformity to rules from the instant when all the meals are put in the distribution trolley until they are delivered to the patients, is still a challenge. In this paper, we present a comparison of two approaches based on Wireless Sensor Networks (WSN) and Internet of Things (IoT) technologies for implementing a Real-Time Monitoring System of Meal Distribution Trolleys in a hospital. The performance evaluation results show that the IoT impleme…
SAUCE: A web application for interactive teaching and learning of parallel programming
2017
Abstract Prevalent hardware trends towards parallel architectures and algorithms create a growing demand for graduate students familiar with the programming of concurrent software. However, learning parallel programming is challenging due to complex communication and memory access patterns as well as the avoidance of common pitfalls such as dead-locks and race conditions. Hence, the learning process has to be supported by adequate software solutions in order to enable future computer scientists and engineers to write robust and efficient code. This paper discusses a selection of well-known parallel algorithms based on C++11 threads, OpenMP, MPI, and CUDA that can be interactively embedded i…
A holistic modeling for QoE estimation in live video streaming applications over LTE Advanced technologies with Full and Non Reference approaches
2018
Abstract Current mobile networks are providing high speed access to Internet at a rate of Gigabits per second. In this scenario, traditional services over wired networks are an alternative, in particular those based on live video streaming. But in the transition, different issues should be considered due to the rapid changing network conditions and the limited resources of the mobile devices. These issues should be taken into account to keep a good Quality of Experience (QoE) of the video in terms of a high Mean Opinion Score (MOS), a subjective video quality. Our goal is to estimate and predict this subjective metric in a holistic manner. Thus, we have analyzed and measured different varia…
A low power and high resolution data logger for submarine seismic monitoring
2010
The design, implementation and characterization of a digital waveform recorder for ocean bottom seismic monitoring is here reported. The system is capable of synchronously acquiring, and logging on a flash memory bank, four high resolution signals. Thanks to a very careful design of the system architecture and by using robust digital signal processing techniques, two main conflicting issues have been addressed: a high dynamic range, better than 120 dB, usually obtained with high energy demanding converters, and a power consumption as low as 250 mW, hence allowing to easily increase the time of a continuous submarine monitoring session up to 3 months.