Search results for "Ubiquitous Computing"
showing 10 items of 108 documents
EDITORIAL
2014
A distributed real-time data prediction and adaptive sensing approach for wireless sensor networks
2018
International audience; Many approaches have been proposed in the literature to reduce energy consumption in Wireless Sensor Networks (WSNs). Influenced by the fact that radio communication and sensing are considered to be the most energy consuming activities in such networks. Most of these approaches focused on either reducing the number of collected data using adaptive sampling techniques or on reducing the number of data transmitted over the network using prediction models. In this article, we propose a novel prediction-based data reduction method. furthermore, we combine it with an adaptive sampling rate technique, allowing us to significantly decrease energy consumption and extend the …
The Intelligent e-Therapy system: a new paradigm for telepsychology and cybertherapy
2009
ABSTRACT One of the main drawbacks of computer-assisted psychology tools developed up to now is related to the real time customisation and adaptation of the content to each patient depending on his/her activity. In this paper we propose a new approach for mental e-health treatments named Intelligent e-Therapy (eIT) with capabilities for ambient intelligence and ubiquitous computing. From a technical point of view, an eIT system is based on four fundamental axes: ambient intelligence for capturing physiological, psychological and contextual information of the patient; persuasive computing for changing/reinforcing behaviours; ubiquitous computing for using the system at any place, and at any …
Ancestral Reconstruction and Investigations of Genomic Recombination on some Pentapetalae Chloroplasts
2019
Abstract In this article, we propose a semi-automated method to rebuild genome ancestors of chloroplasts by taking into account gene duplication. Two methods have been used in order to achieve this work: a naked eye investigation using homemade scripts, whose results are considered as a basis of knowledge, and a dynamic programming based approach similar to Needleman-Wunsch. The latter fundamentally uses the Gestalt pattern matching method of sequence matcher to evaluate the occurrences probability of each gene in the last common ancestor of two given genomes. The two approaches have been applied on chloroplastic genomes from Apiales, Asterales, and Fabids orders, the latter belonging to Pe…
A Hardware and Secure Pseudorandom Generator for Constrained Devices
2018
Hardware security for an Internet of Things or cyber physical system drives the need for ubiquitous cryptography to different sensing infrastructures in these fields. In particular, generating strong cryptographic keys on such resource-constrained device depends on a lightweight and cryptographically secure random number generator. In this research work, we have introduced a new hardware chaos-based pseudorandom number generator, which is mainly based on the deletion of an Hamilton cycle within the $N$ -cube (or on the vectorial negation), plus one single permutation. We have rigorously proven the chaotic behavior and cryptographically secure property of the whole proposal: the mid-term eff…
Efficient distributed average consensus in wireless sensor networks
2020
International audience; Computing the distributed average consensus in Wireless Sensor Networks (WSNs) is investigated in this article. This problem, which is both natural and important, plays a significant role in various application fields such as mobile agents and fleet vehicle coordination, network synchronization, distributed voting and decision, load balancing of divisible loads in distributed computing network systems, and so on. By and large, the average consensus' objective is to have all nodes in the network converged to the average value of the initial nodes' measurements based only on local nodes' information states. In this paper, we introduce a fully distributed algorithm to a…
On the design of pervasive computing applications based on Bluetooth and a P2P concept
2006
As an example of implementing the pervasive computing, we developed an application framework to deploy an easy, spontaneous, and infrastructureless network. We selected the Bluetooth technology with the peer-to-peer (P2P) concept to develop an experimental application which enables peers to exchange their resources. Overall network architecture and the prototype application are presented. We selected a small test-bed and simulation to evaluate the overall performance and system behaviour. We measured and present our findings in term of the duration of inquiry procedure and the throughput, according to various experimental parameters such as physical distance between nodes and their speeds.
Three Step Bluetooth Positioning
2005
This paper discusses a three step procedure to perform high definition positioning by the use of low cost Bluetooth devices. The three steps are: Sampling, Deployment, and Real Time Positioning. A genetic algorithm is discussed for deployment optimization and a neural network for real time positioning. A case study, along with experiments and results, are finally discussed dealing with a castle in Sicily where many trials were carried out to the end of arranging a positioning system for context aware service provision to visitors.
Querytogether : Enabling entity-centric exploration in multi-device collaborative search
2018
Collaborative and co-located information access is becoming increasingly common. However, fairly little attention has been devoted to the design of ubiquitous computing approaches for spontaneous exploration of large information spaces enabling co-located collaboration. We investigate whether an entity-based user interface provides a solution to support co-located search on heterogeneous devices. We present the design and implementation of QueryTogether, a multi-device collaborative search tool through which entities such as people, documents, and keywords can be used to compose queries that can be shared to a public screen or specific users with easy touch enabled interaction. We conducted…
From Metaphors to Simulations to Idioms: Supporting the Conceptualisation Process
2004
The concept of metaphor has been used in UI design in a loose manner. There is a need to conceptually separate it from related concepts to restore the power it used to have in rhetoric. It is also important to understand the life cycle of metaphor, how it changes over time in the conceptualisation process. This is especially topical in ubiquitous computing, in which entirely new concepts and interaction styles are introduced. In this paper, we describe the use of metaphors and related concepts in theory and apply the approach in a mobile application.