37 research outputs found

    Fall detection using history triple features

    Full text link
    Accurate identification and timely handling of involuntary events, such as falls, plays a crucial part in effective as-sistive environment systems. Fall detection, in particular, is quite critical, especially in households of lonely elderly people. However, the task of visually identifying a fall is challenging as there is a variety of daily activities that can be mistakenly characterized as falls. To tackle this issue, various feature extraction methods that aim to effectively distinguish unintentional falls from other everyday activi-ties have been proposed. In this study, we examine the capability of the History Triple Features technique based on Trace transform, to provide noise robust and invariant to different variations features for the spatiotemporal represen-tation of fall occurrences. The aim is to effectively detect falls among other household-related activities that usually take place indoors. For the evaluation of the algorithm the video sequences from two realistic fall detection datasets of different nature have been used. One is constructed using a ceiling mounted depth camera and the other is constructed using an RGB camera placed on arbitrary positions in dif-ferent rooms. After forming the feature vectors, we train a support vector machine using a radial basis function kernel. Results show a very good response of the algorithm achiev-ing 100 % on both datasets indicating the suitability of the technique to the specific task. 1

    Towards Proactive Policies supporting Event-based Task Delegation

    Get PDF
    International audienceDelegation mechanisms are receiving increasing interest from the research community. Task delegation is a mechanism that supports organisational flexibility in the human-centric workflow systems, and ensures delegation of authority in access control systems. In this paper, we consider task delegation as an advanced security mechanism supporting policy decision. We define an approach to support dynamic delegation of authority within an access control framework. The novelty consists of reasoning on authorisation dependently on task delegation events, and specifies them in terms of delegation policies. When one of these events changes, our access policy decision may change proactively implying dynamic delegation of authority. Existing work on access control systems remain stateless and do not consider this perspective. We highlight such limitations, and propose a task delegation framework to support proactive enforcement of delegation policies

    A Survey on WSN and MCN Convergence Networks, Journal of Telecommunications and Information Technology, 2020, nr 1

    Get PDF
    In this paper, we present a survey concerned with research focusing on the convergence of wireless sensor networks (WSN) and mobile cellular networks (MCN). The convergence of WSNs and MCNs may be a trigger stimulating new research dealing with such issues as architecture, protocols and air interfaces. The highlights and constraints of the phenomenon are discussed in this paper as well. The survey deals with convergence networks and with their smarty city applications. A few open research issues are also brought to the attention of researchers specializing in this fiel

    EFFICIENT AND SCALABLE NETWORK SECURITY PROTOCOLS BASED ON LFSR SEQUENCES

    Get PDF
    The gap between abstract, mathematics-oriented research in cryptography and the engineering approach of designing practical, network security protocols is widening. Network researchers experiment with well-known cryptographic protocols suitable for different network models. On the other hand, researchers inclined toward theory often design cryptographic schemes without considering the practical network constraints. The goal of this dissertation is to address problems in these two challenging areas: building bridges between practical network security protocols and theoretical cryptography. This dissertation presents techniques for building performance sensitive security protocols, using primitives from linear feedback register sequences (LFSR) sequences, for a variety of challenging networking applications. The significant contributions of this thesis are: 1. A common problem faced by large-scale multicast applications, like real-time news feeds, is collecting authenticated feedback from the intended recipients. We design an efficient, scalable, and fault-tolerant technique for combining multiple signed acknowledgments into a single compact one and observe that most signatures (based on the discrete logarithm problem) used in previous protocols do not result in a scalable solution to the problem. 2. We propose a technique to authenticate on-demand source routing protocols in resource-constrained wireless mobile ad-hoc networks. We develop a single-round multisignature that requires no prior cooperation among nodes to construct the multisignature and supports authentication of cached routes. 3. We propose an efficient and scalable aggregate signature, tailored for applications like building efficient certificate chains, authenticating distributed and adaptive content management systems and securing path-vector routing protocols. 4. We observe that blind signatures could form critical building blocks of privacypreserving accountability systems, where an authority needs to vouch for the legitimacy of a message but the ownership of the message should be kept secret from the authority. We propose an efficient blind signature that can serve as a protocol building block for performance sensitive, accountability systems. All special forms digital signatures—aggregate, multi-, and blind signatures—proposed in this dissertation are the first to be constructed using LFSR sequences. Our detailed cost analysis shows that for a desired level of security, the proposed signatures outperformed existing protocols in computation cost, number of communication rounds and storage overhead
    corecore