Search results for "thing"
showing 10 items of 908 documents
Fuzzy Logic Based Security Trust Evaluation for IoT Environments
2019
In the new technological era called the Internet of Things (IoT), people, machines and objects communicate with each other via the Internet by exchanging information. In this context, trust plays an important role and is considered as a key factor in the success of the IoT services expansion. IoT services and applications use in some cases data concerning the privacy of their users. Consequently, users should trust the entities exchanging their personal information. In this paper, we present a framework that evaluates the security trust level of IoT nodes based on a Fuzzy Logic model using different input parameters such as Device Physical Security, Device Security Level and Device Ownershi…
Improved Statistically Based Retrievals via Spatial-Spectral Data Compression for IASI Data
2019
In this paper, we analyze the effect of spatial and spectral compression on the performance of statistically based retrieval. Although the quality of the information is not com- pletely preserved during the coding process, experiments reveal that a certain amount of compression may yield a positive impact on the accuracy of retrievals. We unveil two strategies, both with interesting benefits: either to apply a very high compression, which still maintains the same retrieval performance as that obtained for uncompressed data; or to apply a moderate to high compression, which improves the performance. As a second contribution of this paper, we focus on the origins of these benefits. On the one…
Activities using no resources
1998
Dynamic 3D Scene Reconstruction and Enhancement
2017
International audience; In this paper, we present a 3D reconstruction and enhancement approach for high quality dynamic city scene reconstructions. We first detect and segment the moving objects using 3D Motion Segmenta-tion approach by exploiting the feature trajectories' behaviours. Getting the segmentations of both the dynamic scene parts and the static scene parts, we propose an efficient point cloud registration approach which takes the advantages of 3-point RANSAC and Iterative Closest Points algorithms to produce precise point cloud alignment. Furthermore, we proposed a point cloud smoothing and texture mapping framework to enhance the results of reconstructions for both the static a…
Low invasive multisensor acquisition system for real-time monitoring of cardiovascular and respiratory parameters
2020
The recent advances in multiparametric monitoring of biosignals and management of big data prompt for the development of devices and techniques for the extraction of indicators with physiological relevance. In this context, we have designed and realized a portable electronic system, equipped with simple biomedical sensors, able to synchronously record multiple electrocardiographic (ECG), photoplethysmographic (PPG) and breathing signals, for carrying out a non-invasive monitoring of several cardiovascular parameters. In this work, we show the results of preliminary measurements performed following a specific physiological protocol (i.e., deep breathing with 10 s per cycle). The system allow…
MAC Protocols for Wake-up Radio: Principles, Modeling and Performance Analysis
2018
[EN] In wake-up radio (WuR) enabled wireless sensor networks (WSNs), a node triggers a data communication at any time instant by sending a wake-up call (WuC) in an on-demand manner. Such wake-up operations eliminate idle listening and overhearing burden for energy consumption in duty-cycled WSNs. Although WuR exhibits its superiority for light traffic, it is inefficient to handle high traffic load in a network. This paper makes an effort towards improving the performance of WuR under diverse load conditions with a twofold contribution. We first propose three protocols that support variable traffic loads by enabling respectively clear channel assessment (CCA), backoff plus CCA, and adaptive …
Ridge-line optimal detector
2000
Image processing techniques have seen many developments in recent years. Starting from the pioneering work of Canny, Deriche developed a second order recursive filter capable of detecting stepped contours. However, there are other contour shapes that those filters struggle to detect. We describe a new optimal filter sensu Canny for detecting ridge-line contours. This is a third order recursive and even filter. It is dependent on three parameters by which detection accuracy is adjusted. The results obtained by applying this filter to (possibly noise- affected) images are compared with those in the work by Ziou. © 2000 Society of Photo-Optical Instrumentation Engineers. (S0091-3286(00)00706-6)
Compression Garments in Sport
2019
Abstract In this chapter we summarize the main scientific information regarding the applications of compression garments in sports. This chapter covers the discussion from the clinical compression’s application in patients to how its use has been extended to sport. In addition, the composition and different kinds of textiles are considered regarding the level of compression and methodologies/standards for its classification. The chapter is organized in sections considering the effects of compression garments on physiological, psychological, strength, power, endurance, and muscle activation parameters, and ends with indications of future research directions and methodological aspects regardi…
Adoption of Constrained Application Protocol
2016
Among billions of Internet enabled devices that are expected to surround us in the near future, many will be resource constrained, i.e., will have limited power supply, processing power and memory. To cope with these limitations, the Constrained Application Protocol (CoAP) has been recently introduced as a lightweight alternative to HTTP for connecting the resource limited devices to the Web. Although the new protocol offers solid technical advantages, it remains uncertain whether a successful uptake will follow, as it depends also on its economic feasibility for the involved stakeholders. Therefore, this paper studies the techno-economic feasibility of CoAP using a systematic methodologica…
Knowledge-based verification of concatenative programming patterns inspired by natural language for resource-constrained embedded devices
2020
We propose a methodology to verify applications developed following programming patterns inspired by natural language that interact with physical environments and run on resource-constrained interconnected devices. Natural language patterns allow for the reduction of intermediate abstraction layers to map physical domain concepts into executable code avoiding the recourse to ontologies, which would need to be shared, kept up to date, and synchronized across a set of devices. Moreover, the computational paradigm we use for effective distributed execution of symbolic code on resource-constrained devices encourages the adoption of such patterns. The methodology is supported by a rule-based sys…