145 research outputs found

    A Multimodal Perception Framework for Users Emotional State Assessment in Social Robotics

    Get PDF
    In this work, we present an unobtrusive and non-invasive perception framework based on the synergy between two main acquisition systems: the Touch-Me Pad, consisting of two electronic patches for physiological signal extraction and processing; and the Scene Analyzer, a visual-auditory perception system specifically designed for the detection of social and emotional cues. It will be explained how the information extracted by this specific kind of framework is particularly suitable for social robotics applications and how the system has been conceived in order to be used in human-robot interaction scenarios

    On Evaluating Commercial Cloud Services: A Systematic Review

    Full text link
    Background: Cloud Computing is increasingly booming in industry with many competing providers and services. Accordingly, evaluation of commercial Cloud services is necessary. However, the existing evaluation studies are relatively chaotic. There exists tremendous confusion and gap between practices and theory about Cloud services evaluation. Aim: To facilitate relieving the aforementioned chaos, this work aims to synthesize the existing evaluation implementations to outline the state-of-the-practice and also identify research opportunities in Cloud services evaluation. Method: Based on a conceptual evaluation model comprising six steps, the Systematic Literature Review (SLR) method was employed to collect relevant evidence to investigate the Cloud services evaluation step by step. Results: This SLR identified 82 relevant evaluation studies. The overall data collected from these studies essentially represent the current practical landscape of implementing Cloud services evaluation, and in turn can be reused to facilitate future evaluation work. Conclusions: Evaluation of commercial Cloud services has become a world-wide research topic. Some of the findings of this SLR identify several research gaps in the area of Cloud services evaluation (e.g., the Elasticity and Security evaluation of commercial Cloud services could be a long-term challenge), while some other findings suggest the trend of applying commercial Cloud services (e.g., compared with PaaS, IaaS seems more suitable for customers and is particularly important in industry). This SLR study itself also confirms some previous experiences and reveals new Evidence-Based Software Engineering (EBSE) lessons

    Incentive based Routing Protocol for Mobile Peer to Peer Networks

    Get PDF
    Incentive models are becoming increasingly popular in Mobile Peer to Peer Networks (M-P2P) as these models entice node participation in return for a virtual currency to combat free riding and to effectively manage constraint resources in the network. Many routing protocols proposed are based on best effort data traffic policy, such as the shortest route selection (hop minimization). Using virtual currency to find a cost effective optimal route from the source to the destination, while considering Quality of Service (QoS) aspects such as bandwidth and service capacity constraints for data delivery, remains a challenging task due to the presence of multiple paths and service providers. Modeling the network as a directed weighted graph and using the cost acquired from the price function as an incentive to pay the intermediate nodes in M-P2P networks to forward data, we develop a Game theoretic approach based on stochastic games to find an optimal route considering QoS aspect. The performance of our routing protocol is evaluated and compared with some existing routing protocols and the result shows that our protocol proves to be efficient compared to shortest-path DSR and multiple paths SMR in terms of average response time, energy and bandwidth utilization in the network

    Using Ontologies and Intelligent Systems for Traffic Accident Assistance in Vehicular Environments

    Full text link
    A pesar de que las medidas de seguridad en los sistemas de transporte cada vez son mayores, el aumento progresivo del número de vehículos que circulan por las ciudades y carreteras en todo el mundo aumenta, sin duda, la probabilidad de que ocurra un accidente. En este tipo de situaciones, el tiempo de respuesta de los servicios de emergencia es crucial, ya que está demostrado que cuanto menor sea el tiempo transcurrido entre el accidente y la atención hospitalaria de los heridos, mayores son sus probabilidades de supervivencia. Las redes vehiculares permiten la comunicación entre los vehículos, así como la comunicación entre los vehículos y la infraestructura [4], lo que da lugar a una plétora de nuevas aplicaciones y servicios en el entorno vehicular. Centrándonos en las aplicaciones relacionadas con la seguridad vial, mediante este tipo de comunicaciones, los vehículos podrían informar en caso de accidente al resto de vehículos (evitando así colisiones en cadena) y a los servicios de emergencia (dando información precisa y rápida, lo que sin duda facilitaría las tareas de rescate). Uno de los aspectos importantes a determinar sería saber qué información se debe enviar, quién será capaz de recibirla, y cómo actuar una vez recibida. Actualmente los vehículos disponen de una serie de sensores que les permiten obtener información sobre ellos mismos (velocidad, posición, estado de los sistemas de seguridad, número de ocupantes del vehículo, etc.), y sobre su entorno (información meteorológica, estado de la calzada, luminosidad, etc.). En caso de accidente, toda esa información puede ser estructurada y enviada a los servicios de emergencia para que éstos adecúen el rescate a las características específicas y la gravedad del accidente, actuando en consecuencia. Por otro lado, para que la información enviada por los vehículos accidentados pueda llegar correctamente a los servicios de emergencias, es necesario disponer de una infraestructura capaz de dar cobertura a todos los vehículos que circulan por una determinada área. Puesto que la instalación y el mantenimiento de dicha infraestructura conllevan un elevado coste, sería conveniente proponer, implementar y evaluar técnicas consistentes en dar cobertura a todos los vehículos, reduciendo el coste total de la infraestructura. Finalmente, una vez que la información ha sido recibida por las autoridades, es necesario elaborar un plan de actuación eficaz, que permita el rápido rescate de los heridos. Hay que tener en cuenta que, cuando ocurre un accidente de tráfico, el tiempo de personación de los servicios de emergencia en el lugar del accidente puede suponer la diferencia entre que los heridos sobrevivan o fallezcan. Además, es importante conocer si la calle o carretera por la que circulaban los vehículos accidentados ha dejado de ser transitable para el resto de vehículos, y en ese caso, activar los mecanismos necesarios que permitan evitar los atascos asociados. En esta Tesis, se pretende gestionar adecuadamente estas situaciones adversas, distribuyendo el tráfico de manera inteligente para reducir el tiempo de llegada de los servicios de emergencia al lugar del accidente, evitando además posibles atascos.Barrachina Villalba, J. (2014). Using Ontologies and Intelligent Systems for Traffic Accident Assistance in Vehicular Environments [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/39004TESI

    Location in Ad Hoc Networks

    Get PDF

    Mobile Ad hoc Networking: Imperatives and Challenges

    Get PDF
    Mobile ad hoc networks (MANETs) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary, "ad-hoc" network topologies, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, e.g., disaster recovery environments. Ad hoc networking concept is not a new one, having been around in various forms for over 20 years. Traditionally, tactical networks have been the only communication networking application that followed the ad hoc paradigm. Recently, the introduction of new technologies such as the Bluetooth, IEEE 802.11 and Hyperlan are helping enable eventual commercial MANET deployments outside the military domain. These recent evolutions have been generating a renewed and growing interest in the research and development of MANET. This paper attempts to provide a comprehensive overview of this dynamic field. It first explains the important role that mobile ad hoc networks play in the evolution of future wireless technologies. Then, it reviews the latest research activities in these areas, including a summary of MANET\u27s characteristics, capabilities, applications, and design constraints. The paper concludes by presenting a set of challenges and problems requiring further research in the future

    Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    Get PDF
    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.Ministerio de Economía y CompetitividadUniversidad de Alcal

    Infrastructure Wi-Fi for connected autonomous vehicle positioning : a review of the state-of-the-art

    Get PDF
    In order to realize intelligent vehicular transport networks and self driving cars, connected autonomous vehicles (CAVs) are required to be able to estimate their position to the nearest centimeter. Traditional positioning in CAVs is realized by using a global navigation satellite system (GNSS) such as global positioning system (GPS) or by fusing weighted location parameters from a GNSS with an inertial navigation systems (INSs). In urban environments where Wi-Fi coverage is ubiquitous and GNSS signals experience signal blockage, multipath or non line-of-sight (NLOS) propagation, enterprise or carrier-grade Wi-Fi networks can be opportunistically used for localization or “fused” with GNSS to improve the localization accuracy and precision. While GNSS-free localization systems are in the literature, a survey of vehicle localization from the perspective of a Wi-Fi anchor/infrastructure is limited. Consequently, this review seeks to investigate recent technological advances relating to positioning techniques between an ego vehicle and a vehicular network infrastructure. Also discussed in this paper is an analysis of the location accuracy, complexity and applicability of surveyed literature with respect to intelligent transportation system requirements for CAVs. It is envisaged that hybrid vehicular localization systems will enable pervasive localization services for CAVs as they travel through urban canyons, dense foliage or multi-story car parks
    corecore