Search results for "Ubiquitous Computing"
showing 10 items of 108 documents
A hybrid network for maritime on-board communications
2012
Current maritime on-board communications have to be enhanced for safety and security, where ubiquitous technologies can help, together with providing comfort and convenience to the crew and passengers. Employing wireless sensor networks on board is one recent practice of implementing ubiquitous technology for ships, where further study is needed because of the connectivity challenges. Meanwhile, it is important for an on-board communication system to be reliable and flexible for handling emergency situations. In this paper, we propose a solution of employing ubiquitous technology on ships in a way that both connectivity and emergency handling are examined. Two key aspects of this proposal a…
Towards a Formal Analysis of MQtt Protocol in the Context of Communicating Vehicles
2017
International audience; The paper presents a formal approach to model, analyze, and verify a variant of Message Queue Telemetry Transport protocol (MQtt), dedicated to communicating vehicles (MQtt-CV) that send collected data to automotive infrastructures(subscribers). Our formal approach is based on Promela language and its system verification tool, the model checker SPIN. We propose a slight modification of MQtt protocol to reduce the big volume of data collected and sent by vehicles to infrastructures. Indeed, in the original version of MQtt protocol, when a broker receives data from publishers, it sends them directly to its subscribers without any filtration. As consequence, subscribers…
Parallel filter estimation algorithm for segmentation on a LAN of workstations
1994
International audience
An Embedded Biometric Sensor for Ubiquitous Authentication
2013
Communication networks and distributed technologies move people towards the era of ubiquitous computing. An ubiquitous environment needs many authentication sensors for users recognition, in order to provide a secure infrastructure for both user access to resources and services and information management. Today the security requirements must ensure secure and trusted user information to protect sensitive data resource access and they could be used for user traceability inside the platform. Conventional authentication systems, based on username and password, are in crisis since they are not able to guarantee a suitable security level for several applications. Biometric authentication systems…
Child–display interaction:Lessons learned on touchless avatar-based large display interfaces
2020
AbstractDuring the last decade, touchless gestural interfaces have been widely studied as one of the most promising interaction paradigms in the context of pervasive displays. In particular, avatars and silhouettes have proved to be effective in making the touchless capacity of displays self-evident. In this paper, we focus on a child–display interaction approach to avatar-based touchless gestural interfaces. We believe that large displays offer an opportunity to stimulate children’s experiences and engagement; for instance, learning about art is very engaging for children but can bring a number of challenges. Our study aims to contribute to the literature on both pervasive displays and chi…
On the collision property of chaotic iterations based post-treatments over cryptographic pseudorandom number generators
2018
International audience; There is not a proper mathematical definition of chaos, we have instead a quite big amount of definitions, each of one describes chaos in a more or less general context. Taking in account this, it is clear why it is hard to design an algorithm that produce random numbers, a kind of algorithm that could have plenty of concrete appliceautifat (anul)d bions. However we must use a finite state machine (e.g. a laptop) to produce such a sequence of random numbers, thus it is convenient, for obvious reasons, to redefine those aimed sequences as pseudorandom; also problems arise with floating point arithmetic if one wants to recover some real chaotic property (i.e. propertie…
Energy-Efficiency and Coverage Quality Management for Reliable Diagnostics in Wireless Sensor Networks
2020
International audience; The processing of data and signals provided by sensors aims at extracting rnrelevant features which can be used to assess and diagnose the health state rnof the monitored targets. Nevertheless, Wireless Sensor Networks (WSNs) present rna number of shortcomings that have an impact on the quality of the gathered rndata at the sink level, leading to imprecise diagnostics rnof the observed targets. To improve data accuracy, two main critical and related issues, namely the energy consumption and coverage quality, need to be considered. The goal is to maximize the network lifetime while guaranteeing the complete coverage of all the targets. Unfortunately, these performance…
Human body sensing: A pervasive approach by implanted RFID tags
2011
Starting from the physical evidence that passive RFID systems may be used as self-sensing devices, the feasibility of human monitoring by means of implanted tags is here investigated. The key parameters to master with the purpose to enhance the sensitivity of the implanted radiosensor have been theoretically analyzed and numerically applied to a specific medical problem, i.e. the continuous monitoring of liver cancer evolution. Preliminary experimental results with simplified phantoms corroborate the analysis.
Evaluating Bluetooth Performance as the Support for Context-Aware Applications
2005
We present an experiment relative to the use of the Bluetooth wireless technology to provide network support for context-aware applications. We describe an approach to provide network interconnection using a combination of wireless and wired network technologies. We also describe the steps taken to create a Bluetooth based context-aware application. We, finally, evaluate, using a small test-bed and simulation the overall performance of this technology when adopted in the area of context-aware and ubiquitous computing.
Checkpointing Workflows for Fail-Stop Errors
2017
International audience; We consider the problem of orchestrating the exe- cution of workflow applications structured as Directed Acyclic Graphs (DAGs) on parallel computing platforms that are subject to fail-stop failures. The objective is to minimize expected overall execution time, or makespan. A solution to this problem consists of a schedule of the workflow tasks on the available processors and of a decision of which application data to checkpoint to stable storage, so as to mitigate the impact of processor failures. For general DAGs this problem is hopelessly intractable. In fact, given a solution, computing its expected makespan is still a difficult problem. To address this challenge,…