Search results for "Programming Language"
showing 10 items of 624 documents
Adaptive backstepping based consensus tracking of uncertain nonlinear systems with event-triggered communication
2021
Abstract This paper investigates the consensus tracking problem for a class of uncertain high-order nonlinear systems with parametric uncertainties and event-triggered communication. Under a directed communication condition, a totally distributed adaptive backstepping based control scheme is presented. Specifically, a decentralized triggering condition is adopted in this paper such that continuous monitoring of neighboring states, as required in some existing results, can be avoided. Besides, to handle the non-differentiability problem of virtual controllers, which arises from the utilization of neighboring states collected only at the triggering instants, the virtual controllers in each re…
Reducing Overhearing Energy in Wake-Up Radio-Enabled WPANs: Scheme and Performance
2018
Wake-up Radio (WuR)-enabled wireless personal area networks (WPANs) are more popular over conventional WPANs thanks to WuR's on-demand transmission feature and overwhelming energy consumption superiority. In a WuRenabled WPAN, overhearing occurs when a wake-up receiver decodes and validates the address of a wake-up call which is not intended to it. However, such overhearing consumes a portion of the required reception energy for unintended nodes. To diminish overhearing thus conserve total reception energy in a network, we propose a bit-by-bit address decoding (BBAD) scheme and compare it with another addressing scheme for WuR that uses a micro-controller unit to decode and match the whole …
A real-time webcam based Eye Ball Tracking System using MATLAB
2015
Eye Ball Tracking System is a device which is intended to assist patients that cannot perform any voluntary tasks related to daily life. Patients who only can control their eyes can still communicate with the real-world using the assistive devices like one proposed in this paper. This device provides a human computer interface in order to take decisions based on their eye movement. A real time data stream is captured via webcam that transfers data serially to MATLAB. Then a sequential image processing scheme segments the iris of the eye and calculates the centroid, thereby generating control signal with the help of a reference axis. The control signals are then used to manipulate the positi…
UAV Communication Strategies in the Next Generation of Mobile Networks
2020
| openaire: EC/H2020/857031/EU//5G!Drones The Next Generation of Mobile Networks (NGMN) alliance advocates the use of different means to support vehicular communications. This aims to cope with the massive data generated by these devices which could affect the Quality of Service (QoS) of the associated applications, but also the overall operation carried out by the vehicles. However, efficient communication strategies must be considered in order to select, for each vehicle, the communication mean ensuring the best QoS. In this paper, we tackle this issue and we propose efficient communication strategies for Unmanned Aerial Vehicles (UAVs). In addition to direct UAV-to-Infrastructure communi…
Combining hashing and enciphering algorithms for epidemiological analysis of gathered data.
2008
Summary Objectives: Compiling individual records coming from different sources is necessary for multi-center studies. Legal aspects can be satisfied by implementing anonymization procedures. When using these procedures with a different key for each study it becomes almost impossible to link records from separate data collections. Methods: The originality of the method relies on the way the combination of hashing and enciphering techniques is performed: like in asymmetric encryption, two keys are used but the private key depends on the patient’s identity. Results: The combination of hashing and enciphering techniques provides a great improvement in the overall security of the proposed scheme…
Highly Accurate Conservative Finite Difference Schemes and Adaptive Mesh Refinement Techniques for Hyperbolic Systems of Conservation Laws
2007
We review a conservative finite difference shock capturing scheme that has been used by our research team over the last years for the numerical simulations of complex flows [3, 6]. This scheme is based on Shu and Osher’s technique [9] for the design of highly accurate finite difference schemes obtained by flux reconstruction procedures (ENO, WENO) on Cartesian meshes and Donat-Marquina’s flux splitting [4]. We then motivate the need for mesh adaptivity to tackle realistic hydrodynamic simulations on two and three dimensions and describe some details of our Adaptive Mesh Refinement (AMR) ([2, 7]) implementation of the former finite difference scheme [1]. We finish the work with some numerica…
Receiver-Initiated Data Collection in Wake-Up Radio Enabled mIoT Networks: Achieving Collision-Free Transmissions by Hashing and Partitioning
2021
To achieve ultra-low energy consumption and decade-long battery lifetime for Internet of Things (IoT) networks, wake-up radio (WuR) appears as an eminent solution. While keeping devices in deep sleep for most of the time, a WuR enabled IoT device can be woken up for data transmission at any time by a wake-up call (WuC). However, collisions happen among WuCs for transmitter-initiated data reporting and among data packets for receiver-initiated data collection . In this article, we propose three novel hashing-based schemes in order to achieve collision-free data transmissions for receiver-initiated data collection. We consider first a simple scenario where all devices in a region of interest …
On Obtaining Classification Confidence, Ranked Predictions and AUC with Tsetlin Machines
2020
Tsetlin machines (TMs) are a promising approach to machine learning that uses Tsetlin Automata to produce patterns in propositional logic, leading to binary (hard) classifications. In many applications, however, one needs to know the confidence of classifications, e.g. to facilitate risk management. In this paper, we propose a novel scheme for measuring TM confidence based on the logistic function, calculated from the propositional logic patterns that match the input. We then use this scheme to trade off precision against recall, producing area under receiver operating characteristic curves (AUC) for TMs. Empirically, using four real-world datasets, we show that AUC is a more sensitive meas…
Blockchain Based Delegatable Access Control Scheme for a Collaborative E-Health Environment
2018
Modern electronic healthcare (e-health) settings constitute collaborative environments requiring sophisticated fine-grained access control mechanisms to cater their access demands. Access delegatability is quite crucial to realize fine-grained, flexible access control schemes compatible with such environments. In this paper, we addressed this issue through proposing an attribute based access control scheme integrated with controlled access delegation capabilities suitable for a multi-domain e-health environment. We have utilized the blockchain technology to manage attribute assignments, delegations as well as revocations. The scheme enables delegations in a controlled manner without jeopard…
Efficient and Lightweight Data Integrity Check in In-Networking Storage Wireless Sensor Networks
2009
In In-networking storage Wireless Sensor Networks, sensed data are stored locally for a long term and retrieved on-demand instead of real-time. To maximize data survival, the sensed data are normally distributively stored at multiple nearby nodes. It arises a problem that how to check and grantee data integrity of distributed data storage in the context of resource constraints. In this paper, a technique called Two Granularity Linear Code (TGLC) that consists of Intra-codes and Inter-codes is presented. An efficient and lightweight data integrity check scheme based on TGLC is proposed. Data integrity can be checked by any one who holds short Inter-codes, and the checking credentials is shor…