Search results for "Ubiquitous Computing"

showing 10 items of 108 documents

EDITORIAL

2014

Ad Hoc and Ubiquitous Computing
researchProduct

A distributed real-time data prediction and adaptive sensing approach for wireless sensor networks

2018

International audience; Many approaches have been proposed in the literature to reduce energy consumption in Wireless Sensor Networks (WSNs). Influenced by the fact that radio communication and sensing are considered to be the most energy consuming activities in such networks. Most of these approaches focused on either reducing the number of collected data using adaptive sampling techniques or on reducing the number of data transmitted over the network using prediction models. In this article, we propose a novel prediction-based data reduction method. furthermore, we combine it with an adaptive sampling rate technique, allowing us to significantly decrease energy consumption and extend the …

Adaptive samplingComputer Networks and CommunicationsComputer scienceReal-time computing[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technology[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]0202 electrical engineering electronic engineering information engineeringReal-time dataWork (physics)020206 networking & telecommunicationsEnergy consumption[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science Applications[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Hardware and Architecture[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]020201 artificial intelligence & image processing[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Wireless sensor networkSoftwarePredictive modellingEnergy (signal processing)Information SystemsData reductionPervasive and Mobile Computing
researchProduct

The Intelligent e-Therapy system: a new paradigm for telepsychology and cybertherapy

2009

ABSTRACT One of the main drawbacks of computer-assisted psychology tools developed up to now is related to the real time customisation and adaptation of the content to each patient depending on his/her activity. In this paper we propose a new approach for mental e-health treatments named Intelligent e-Therapy (eIT) with capabilities for ambient intelligence and ubiquitous computing. From a technical point of view, an eIT system is based on four fundamental axes: ambient intelligence for capturing physiological, psychological and contextual information of the patient; persuasive computing for changing/reinforcing behaviours; ubiquitous computing for using the system at any place, and at any …

Ambient intelligenceUbiquitous computingPoint (typography)Multimediabusiness.industryContext effectComputer scienceInformation technologycomputer.software_genreIntelligent user interfaceComputer-mediated communicationbusinessAdaptation (computer science)computerApplied PsychologyBritish Journal of Guidance & Counselling
researchProduct

Ancestral Reconstruction and Investigations of Genomic Recombination on some Pentapetalae Chloroplasts

2019

Abstract In this article, we propose a semi-automated method to rebuild genome ancestors of chloroplasts by taking into account gene duplication. Two methods have been used in order to achieve this work: a naked eye investigation using homemade scripts, whose results are considered as a basis of knowledge, and a dynamic programming based approach similar to Needleman-Wunsch. The latter fundamentally uses the Gestalt pattern matching method of sequence matcher to evaluate the occurrences probability of each gene in the last common ancestor of two given genomes. The two approaches have been applied on chloroplastic genomes from Apiales, Asterales, and Fabids orders, the latter belonging to Pe…

Ancestral reconstructionMost recent common ancestor0206 medical engineeringGenomic recombination02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Dynamic programmingGenome[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingEvolution Molecular[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]AsteralesGene duplication0202 electrical engineering electronic engineering information engineeringPattern matchingGenome ChloroplastRosaceaeResearch ArticlesPhylogenySequence (medicine)Recombination GeneticbiologyGeneral Medicinebiology.organism_classification[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationAncestral genome reconstructionApialesEvolutionary biology[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]020201 artificial intelligence & image processing[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Pentapetalae chloroplasts020602 bioinformaticsTP248.13-248.65BiotechnologyJournal of Integrative Bioinformatics
researchProduct

A Hardware and Secure Pseudorandom Generator for Constrained Devices

2018

Hardware security for an Internet of Things or cyber physical system drives the need for ubiquitous cryptography to different sensing infrastructures in these fields. In particular, generating strong cryptographic keys on such resource-constrained device depends on a lightweight and cryptographically secure random number generator. In this research work, we have introduced a new hardware chaos-based pseudorandom number generator, which is mainly based on the deletion of an Hamilton cycle within the $N$ -cube (or on the vectorial negation), plus one single permutation. We have rigorously proven the chaotic behavior and cryptographically secure property of the whole proposal: the mid-term eff…

Applied cryptography; Chaotic circuits; Constrained devices; Discrete dynamical systems; FPGA; Lightweight Cryptography; Random number generators; Statistical tests; Control and Systems Engineering; Information Systems; Computer Science Applications1707 Computer Vision and Pattern Recognition; Electrical and Electronic EngineeringHardware security moduleComputer scienceRandom number generationCryptography[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologyPseudorandom generatorConstrained devicesLightweight CryptographyChaotic circuits[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]PermutationRandom number generatorsStatistical tests0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringField-programmable gate arrayThroughput (business)FPGAPseudorandom number generatorGenerator (category theory)business.industry020208 electrical & electronic engineeringComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsDiscrete dynamical systems[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science ApplicationsApplied cryptography[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Control and Systems EngineeringKey (cryptography)[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessComputer hardwareInformation SystemsIEEE Transactions on Industrial Informatics
researchProduct

Efficient distributed average consensus in wireless sensor networks

2020

International audience; Computing the distributed average consensus in Wireless Sensor Networks (WSNs) is investigated in this article. This problem, which is both natural and important, plays a significant role in various application fields such as mobile agents and fleet vehicle coordination, network synchronization, distributed voting and decision, load balancing of divisible loads in distributed computing network systems, and so on. By and large, the average consensus' objective is to have all nodes in the network converged to the average value of the initial nodes' measurements based only on local nodes' information states. In this paper, we introduce a fully distributed algorithm to a…

AtomicitySpeedupComputer Networks and CommunicationsSynchronization networksComputer sciencebusiness.industry020206 networking & telecommunications[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologyEnergy consumptionLoad balancing (computing)[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Consensus[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Distributed algorithm0202 electrical engineering electronic engineering information engineering[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]020201 artificial intelligence & image processing[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkComputer networkComputer Communications
researchProduct

On the design of pervasive computing applications based on Bluetooth and a P2P concept

2006

As an example of implementing the pervasive computing, we developed an application framework to deploy an easy, spontaneous, and infrastructureless network. We selected the Bluetooth technology with the peer-to-peer (P2P) concept to develop an experimental application which enables peers to exchange their resources. Overall network architecture and the prototype application are presented. We selected a small test-bed and simulation to evaluate the overall performance and system behaviour. We measured and present our findings in term of the duration of inquiry procedure and the throughput, according to various experimental parameters such as physical distance between nodes and their speeds.

BluetoothContext-aware pervasive systemsNetwork architectureUbiquitous computinglawComputer scienceDistributed computingEnd-user computingDuration (project management)Throughput (business)law.inventionTerm (time)2006 1st International Symposium on Wireless Pervasive Computing
researchProduct

Three Step Bluetooth Positioning

2005

This paper discusses a three step procedure to perform high definition positioning by the use of low cost Bluetooth devices. The three steps are: Sampling, Deployment, and Real Time Positioning. A genetic algorithm is discussed for deployment optimization and a neural network for real time positioning. A case study, along with experiments and results, are finally discussed dealing with a castle in Sicily where many trials were carried out to the end of arranging a positioning system for context aware service provision to visitors.

BluetoothUbiquitous computingPositioning systemlawSoftware deploymentComputer scienceHybrid positioning systemReal-time computingContext (language use)Mobile deviceSimulationlaw.invention
researchProduct

Querytogether : Enabling entity-centric exploration in multi-device collaborative search

2018

Collaborative and co-located information access is becoming increasingly common. However, fairly little attention has been devoted to the design of ubiquitous computing approaches for spontaneous exploration of large information spaces enabling co-located collaboration. We investigate whether an entity-based user interface provides a solution to support co-located search on heterogeneous devices. We present the design and implementation of QueryTogether, a multi-device collaborative search tool through which entities such as people, documents, and keywords can be used to compose queries that can be shared to a public screen or specific users with easy touch enabled interaction. We conducted…

Co-located searchUbiquitous computingComputer scienceExploratory searchmedia_common.quotation_subjectInformation access02 engineering and technologyLibrary and Information SciencesManagement Science and Operations ResearchMulti-deviceHuman–computer interaction020204 information systemsMulti device0202 electrical engineering electronic engineering information engineeringMedia TechnologyConversationBaseline (configuration management)media_commonSettore ING-INF/05 - Sistemi Di Elaborazione Delle Informazionita113Settore INF/01 - InformaticaCommon groundFlexibility (personality)020207 software engineering113 Computer and information sciencesComputer Science ApplicationsUser interfaceCollaborative searchInformation Systems
researchProduct

From Metaphors to Simulations to Idioms: Supporting the Conceptualisation Process

2004

The concept of metaphor has been used in UI design in a loose manner. There is a need to conceptually separate it from related concepts to restore the power it used to have in rhetoric. It is also important to understand the life cycle of metaphor, how it changes over time in the conceptualisation process. This is especially topical in ubiquitous computing, in which entirely new concepts and interaction styles are introduced. In this paper, we describe the use of metaphors and related concepts in theory and apply the approach in a mobile application.

Cognitive scienceUbiquitous computingbusiness.industryProcess (engineering)Computer scienceMetaphormedia_common.quotation_subjectRhetoricMobile computingInteraction StylesArtificial intelligencebusinessmedia_common
researchProduct