Search results for "LESS"
showing 10 items of 2452 documents
Strategie di codifica linguistica degli eventi di movimento nel greco omerico
2019
Il saggio indaga le strategie linguistiche con cui lo stadio omerico della lingua greca tende ad esprimere un evento di moto, cioè un evento che coinvolge il movimento (o la collocazione) di un’entità nello spazio. Il fondamentale dominio cognitivo dello spazio viene infatti codificato in modi differenti dalle diverse lingue del mondo, e le strategie di codifica degli eventi di moto costituiscono un parametro su cui la Tipologia ha negli ultimi decenni concentrato il suo interesse, pervenendo all’individuazione di tipi linguistici sulla base della strategia con cui ciascuna lingua tende a codificare tale tipo di eventi. Sulla scorta del concetto di ‘uniformitarianismo linguistico’, la natur…
A study of mobility and reachability in ad hoc networks using stochastic activity networks
2006
The integration of ad-hoc networks into real environments is now becoming more and more common and supervision and control systems are no exception. The efficiency of the communication in these networks as well as various other factors, are governed by the working area, the number of nodes, mobility, transmission power, etc. In this paper, the mobility and reachability of mobile nodes appearing spontaneously in a large installation such as can be found in a water purification system are studied. These nodes form an ad-hoc network and communicate between each other in order to finally reach a fixed node which can offer them information from the rest of the system in real time or act as a gat…
Two Levels SPF-Based System to Interconnect Partially Decentralized P2P File Sharing Networks
2005
Partially decentralized P2P (PDP2P) networks are a subset of P2P networks. Roles of nodes are different according to their functionality in the network. Nowadays, there are many PDP2P networks, with different characteristics. It is necessary to find a way to join those autonomous networks. We have not found any interconnection system, so in this article we present a new hierarchical system for interconnecting peers from different PDP2P networks. It will allow sharing data, content and resources between networks. It can be employed between sensor networks, P2P networks, and generally, overlay networks. Oldest superpeers or brokers with higher bandwidth in the PDP2P network will belong to hig…
Activité physique et prévention des chutes chez les personnes âgées
2015
Les chutes chez les personnes âgées sont fréquentes : près d’une personne de plus de 65 ans sur trois et une personne de plus de 80 ans sur deux chutent chaque année. L’état de santé, les capacités fonctionnelles, les facteurs comportementaux ou les caractéristiques de l’environnement constituent autant de facteurs de risque. Au-delà des traumatismes physiques et psychologiques tels que la peur de tomber qui en résultent, les chutes peuvent entraîner des limitations fonctionnelles, une diminution de la qualité de vie, une perte d’autonomie voire une entrée en institution.Dans un contexte de vieillissement de la population, la prévention des chutes et la préservation de l’autonomie dans les …
Enabling Backoff for SCM Wake-Up Radio: Protocol and Modeling
2017
In sub-carrier modulation (SCM) wake-up radio (WuR) enabled wireless sensor networks, a node can initiate data transmission at any instant of time. In this letter, we propose to activate a backoff procedure before sending wake-up calls (WuCs) in order to avoid potential collisions among WuCs. Consequently, no backoff is needed for the main radio after a WuC is received. A discrete-time Markov chain model is developed to evaluate the performance. Numerical results on network throughput, energy efficiency, average delay, and collision probability reveal the benefits of enabling backoff for SCM-WuRs, especially under heavy traffic loads or saturated traffic conditions.
FIRST
2018
Thanks to the collective action of participating smartphone users, mobile crowdsensing allows data collection at a scale and pace that was once impossible. The biggest challenge to overcome in mobile crowdsensing is that participants may exhibit malicious or unreliable behavior, thus compromising the accuracy of the data collection process. Therefore, it becomes imperative to design algorithms to accurately classify between reliable and unreliable sensing reports. To address this crucial issue, we propose a novel Framework for optimizing Information Reliability in Smartphone-based participaTory sensing (FIRST) that leverages mobile trusted participants (MTPs) to securely assess the reliabil…
A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks
2017
International audience; The initial phase of the deployment of vehicular ad-hoc networks (VANETs) has begun and many research challenges still need to be addressed. Location privacy continues to be in the top of these challenges. Indeed, both academia and industry agreed to apply the pseudonym changing approach as a solution to protect the location privacy of VANETs' users. However, due to the pseudonyms linking attack, a simple changing of pseudonym shown to be inefficient to provide the required protection. For this reason, many pseudonym changing strategies have been suggested to provide an effective pseudonym changing. Unfortunately, the development of an effective pseudonym changing st…
Investigating Low Level Protocols for Wireless Body Sensor Networks
2016
The rapid development of medical sensors has increased the interest in Wireless Body Area Network (WBAN) applications where physiological data from the human body and its environment is gathered, monitored, and analyzed to take the proper measures. In WBANs, it is essential to design MAC protocols that ensure adequate Quality of Service (QoS) such as low delay and high scalability. This paper investigates Medium Access Control (MAC) protocols used in WBAN, and compares their performance in a high traffic environment. Such scenario can be induced in case of emergency for example, where physiological data collected from all sensors on human body should be sent simultaneously to take appropria…
Efficient and accurate monitoring of the depth information in a Wireless Multimedia Sensor Network based surveillance
2017
International audience; Abstract—Wireless Multimedia Sensor Network (WMSN) is a promising technology capturing rich multimedia data like audio and video, which can be useful to monitor an environment under surveillance. However, many scenarios in real time monitoring requires 3D depth information. In this research work, we propose to use the disparity map that is computed from two or multiple images, in order to monitor the depth information in an object or event under surveillance using WMSN. Our system is based on distributed wireless sensors allowing us to notably reduce the computational time needed for 3D depth reconstruction, thus permitting the success of real time solutions. Each pa…
Capture Aware Sequential Waterfilling for LoraWAN Adaptive Data Rate
2020
LoRaWAN (Long Range Wide Area Network) is emerging as an attractive network infrastructure for ultra low power Internet of Things devices. Even if the technology itself is quite mature and specified, the currently deployed wireless resource allocation strategies are still coarse and based on rough heuristics. This paper proposes an innovative "sequential waterfilling" strategy for assigning Spreading Factors (SF) to End-Devices (ED). Our design relies on three complementary approaches: i) equalize the Time-on-Air of the packets transmitted by the system's EDs in each spreading factor's group; ii) balance the spreading factors across multiple access gateways, and iii) keep into account the c…