Search results for "architecture"

showing 10 items of 3706 documents

A Musical Pattern Discovery System Founded on a Modeling of Listening Strategies

2004

Music is a domain of expression that conveys a paramount degree of complexity. The musical surface, composed of a multitude of notes, results from the elaboration of numerous structures of different types and sizes. The composer constructs this structural complexity in a more or less explicit way. The listener, faced by such a complex phenomenon, is able to reconstruct only a limited part of it, mostly in a non-explicit way. One particular aim of music analysis is to objectify such complexity, thus offering to the listener a tool for enriching the appreciation of music (Lartillot and SaintJames, 2004). The trouble is, traditional musical analysis, although offering a valuable understanding …

Computer scienceSpeech recognitionMusical050105 experimental psychology060404 music[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI][INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing[STAT.ML]Statistics [stat]/Machine Learning [stat.ML][INFO.INFO-FL]Computer Science [cs]/Formal Languages and Automata Theory [cs.FL]Media Technology0501 psychology and cognitive sciencesSet (psychology)Musical formCognitive scienceStructure (mathematical logic)[INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL][SHS.MUSIQ]Humanities and Social Sciences/Musicology and performing arts05 social sciences06 humanities and the artsData structureComputer Science ApplicationsExpression (architecture)Music theory[INFO.INFO-SD]Computer Science [cs]/Sound [cs.SD]NA0604 artsMusicMusical analysis
researchProduct

Grammars++ for modelling information in text

1999

Abstract Grammars provide a convenient means to describe the set of valid instances in a text database. Flexibility in choosing a grammar can be exploited to provide information modelling capability by designing productions in the grammar to represent entities and relationships of interest to database applications. Additional constraints can be specified by attaching predicates to selected nonterminals in the grammar. When used for database definition, grammars can provide the functionality that users have come to expect of database schemas. Extended grammars can also be used to specify database manipulation, including query, update, view definition, and index specification.

Computer scienceViewmedia_common.quotation_subjectComputerApplications_COMPUTERSINOTHERSYSTEMScomputer.software_genreQuery languageDatabase designAdaptive grammarRule-based machine translationmedia_commonGrammarProgramming languagebusiness.industryDatabase schemaPredicate (grammar)TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESExtended Affix GrammarHardware and ArchitectureAffix grammarStochastic context-free grammarSynchronous context-free grammarArtificial intelligenceL-attributed grammarbusinesscomputerSoftwareNatural language processingInformation SystemsInformation Systems
researchProduct

The role of the Access Point in Wi-Fi networks with selfish nodes

2009

In Wi-Fi networks, mobile nodes compete for accessing the shared channel by means of a random access protocol called Distributed Coordination Function (DCF), which is long term fair. But recent drivers allow users to configure protocol parameters differently from their standard values in order to break the protocol fairness and obtain a larger share of the available bandwidth at the expense of other users. This motivates a game theoretical analysis of DCF. Previous studies have already modeled access to a shared wireless channel in terms of non-cooperative games among the nodes, but they have mainly considered ad hoc mode operation. In this paper we consider the role of the Access Point (AP…

Computer scienceWireless ad hoc networkBidirectional trafficDistributed computingmedia_common.quotation_subjectMechanism designThroughputDistributed coordination functionNash equilibriumWi-fi networks[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]IEEE 802.11Settore ING-INF/04 - Automaticaselfish nodesSelfishnessmedia_commonIEEE 802.11business.industrySettore ING-INF/03 - TelecomunicazioniNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWLAN; selfish nodesWLANbusinessRandom accessComputer network
researchProduct

A Cluster based Sensor-Selection Scheme for Energy-Efficient Agriculture Sensor Networks

2021

Improving the energy-efficiency of remotely deployed sensor nodes in agriculture wireless networks is very challenging due to a lack of access to energy grid. Network clustering and limiting the amount of sensor data are among the various methods to improve the lifetime of these sensor nodes. In this work, an optimal sensor-selection scheme is proposed to improve the Quality of Service in clustered agriculture networks. the proposed method selects a limited number of sensor nodes to be active in each cluster. It considers the estimator performance while selecting limited sensor nodes for environmental monitoring. the optimal sensor-selection process considers the information of remaining en…

Computer scienceWireless networkQuality of serviceDistributed computing020208 electrical & electronic engineeringProcess (computing)Estimator020206 networking & telecommunications02 engineering and technologyComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringGrid energy storageWireless sensor networkEnergy (signal processing)Efficient energy use2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC)
researchProduct

An adaptive cooperative MAC mechanism in multi-hop wireless networks

2010

In this paper, we propose a novel adaptive cooperative MAC mechanism that is specifically designed for two-hop cooperative communications where source and destination cannot hear each other directly. The proposed scheme employs an efficient adaptive relay selection algorithm such that the number of relay nodes is optimized for each cooperative transmission to maximize cooperation benefits and effectively avoid potential collisions with other transmissions. In order to determine the optimal number of relays we apply a training sequence in Hello message exchange, which provides us with a channel status indicator combining both bit-level and flow-level information. Numerical results show that …

Computer scienceWireless networkbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSThroughputCooperative diversitylaw.inventionHop (networking)RelaylawComputer Science::Networking and Internet ArchitecturebusinessComputer Science::Information TheoryCommunication channelComputer networkThe IEEE symposium on Computers and Communications
researchProduct

A contention-based multiple access protocol in cooperative wireless networks

2010

Cooperative communication has emerged as a promising technique to enhance system performance in wireless networks. This paper proposes a contention-based cooperative multiple medium access control protocol by means of multiple retransmissions of the same packet from different relay nodes. The proposed scheme exploits cooperative communication capability not only from time diversity derived from multiple temporal transmissions but also spatial diversity derived from distributed multiple relays. A Markov chain is introduced to analyze the throughput performance of the proposed cooperative scheme. The performance evaluation of the protocol is validated and compared with non-cooperative ARQ pro…

Computer scienceWireless networkbusiness.industryNetwork packetDistributed computingAutomatic repeat requestComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSThroughputAntenna diversityTime diversitylaw.inventionCooperative diversityRelaylawComputer Science::Networking and Internet ArchitectureChannel access methodbusinessComputer Science::Information TheoryCommunication channelComputer networkProceedings of the 6th International Wireless Communications and Mobile Computing Conference
researchProduct

An improvement of NFC-SEC with signed exchanges for an e-prescription-based application

2013

International audience; In the context of an aging population, drug intake can be a potential source of errors leading to death in some cases. Almost all of these errors are unintentional and come from incorrect prescriptions, unsuitable dosages for the patient or incompatibility with other treatments. To limit these risks which are especially important in the elderly or pre-dependency, we propose a secure system for drug treatment through the NFC (Near Field Communication) contact-less communication technology. The proposed system provides security mechanisms such as integrity, authentication, encryption and non-repudiation. To ensure this security, an extension of the international standa…

Computer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]NFC0211 other engineering and technologiesSystème d'exploitationE-signatureRéseaux et télécommunicationsContext (language use)02 engineering and technologyEncryptionComputer securitycomputer.software_genreNear field communication[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Architectures Matérielles0202 electrical engineering electronic engineering information engineeringMedical prescription021110 strategic defence & security studiesAuthentication[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryInternational standard020207 software engineeringPublic key infrastructureSystèmes embarquésElectronic signatureSSTA3. Good healthERISISHealthcare applicationSecurityE-prescriptionISO/IEC 13157businesscomputer
researchProduct

PV-Alert: A fog-based architecture for safeguarding vulnerable road users

2017

International audience; High volumes of pedestrians, cyclists and other vulnerable road users (VRUs) have much higher casualty rates per mile; not surprising given their lack of protection from an accident. In order to alleviate the problem, sensing capabilities of smartphones can be used to detect, warn and safeguard these road users. In this research we propose an infrastructure-less fog-based architecture named PV-Alert (Pedestrian-Vehicle Alert) where fog nodes process delay sensitive data obtained from smartphones for alerting pedestrians and drivers before sending the data to the cloud for further analysis. Fog computing is considered in developing the architecture since it is an emer…

Computer science[SPI] Engineering Sciences [physics]Reliability (computer networking)mobile computingLatency (audio)traffic engineering computingCloud computing02 engineering and technologyFog ComputingComputer securitycomputer.software_genreroad vehicles[SPI]Engineering Sciences [physics]Low Latency0502 economics and businessPedestrian Safety0202 electrical engineering electronic engineering information engineeringWirelessComputer architectureArchitecturewireless LANEdge computing050210 logistics & transportationbusiness.industry05 social sciencesLocation awarenessroad traffic020206 networking & telecommunicationsVehiclesEdge computingsmart phonesVulnerable Road UsersRoadsroad accidentsCrowd sensingAccidentsScalabilitymobile radioSafetybusinessroad safetycomputer
researchProduct

Intent Detection System Based on Word Embeddings

2018

Intent detection is one of the main tasks of a dialogue system. In this paper we present our intent detection system that is based on FastText word embeddings and neural network classifier. We find a significant improvement in the FastText sentence vectorization. The results show that our intent detection system provides state-of-the-art results on three English datasets outperforming many popular services.

Computer sciencebusiness.industry0102 computer and information sciences02 engineering and technologycomputer.software_genre01 natural sciencesNeural network classifier010201 computation theory & mathematics0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingImage tracingArtificial intelligenceDialog systembusinesscomputerWord (computer architecture)Natural language processingSentence
researchProduct

Stress Detection from Speech Using Spectral Slope Measurements

2018

Automatic detection of emotional stress is an active research domain, which has recently drawn increasing attention, mainly in the fields of computer science, linguistics, and medicine. In this study, stress is automatically detected by employing speech-derived features. Related studies utilize features such as overall intensity, MFCCs, Teager Energy Operator, and pitch. The present study proposes a novel set of features based on the spectral tilt of the glottal source and of the speech signal itself. The proposed features rely on the Probability Density Function of the estimated spectral slopes, and consist of the three most probable slopes from the glottal source, as well as the correspon…

Computer sciencebusiness.industry020206 networking & telecommunicationsProbability density functionPattern recognition02 engineering and technologyFundamental frequencySignalRandom forestEnergy operatorSpectral slopeClassifier (linguistics)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArtificial intelligencebusinessWord (computer architecture)
researchProduct