71 research outputs found

    Home monitoring for frailty detection through sound and speaker diarization analysis

    Full text link
    As the French, European and worldwide populations are aging, there is a strong interest for new systems that guarantee a reliable and privacy preserving home monitoring for frailty prevention. This work is a part of a global environmental audio analysis system which aims to help identification of Activities of Daily Life (ADL) through human and everyday life sounds recognition, speech presence and number of speakers detection. The focus is made on the number of speakers detection. In this article, we present how recent advances in sound processing and speaker diarization can improve the existing embedded systems. We study the performances of two new methods and discuss the benefits of DNN based approaches which improve performances by about 100%.Comment: JETSAN, Jun 2023, Aubervilliers & Paris, Franc

    A Comparative Study of Ensemble Classifiers for Paddy Blast Disease Prediction Model

    Get PDF
    Paddy blast has become most epidemic disease in many rice growing countries. Various statistical methods have been used for the prediction of paddy blast but previously used methods failed in predicting diseases with good accuracy. However the need to develop new model that considers both weather factors and non weather  data called blast disease data that influences paddy disease to grow. Given this point we developed ensemble classifer based paddy disease prediction model taking weather data from January 2013 to December 2019 from Agricultural and Horticulture Research Station Kathalgere Davangere District. For the predictive model we collected 7 kinds of weather data and 7 kinds of disease related data that includes Minimum Temperature, Maximum Temperature, Temperautre Difference,Relative Humidity, Stages of Paddy Cultivation, Varities of seeds, Season of cropping and so on. It is observed and analyzed that Minimum Temperature, Humidity and Rainfall has huge correlation with occurrence of disease. Since some of the variables are non numeric to convert them to numeric data one hot encoding approach is followed and to improve efficiency of ensemble classifiers  4 different filter based features selection methods are used such as Pearson’s correlation, Mutual information, ANNOVA F Value, Chi Square. Three different ensemble classifiers are used as predictive models and classifiers are compared it is observed that Bagging ensemble technique has achieved  accuracy of 98% compared to Adaboost of 97% and Voting classifier of 88%. Other classification metrics are used evaluate different classifiers like precision, recall, F1 Score, ROC and precision recall score. Our proposed ensemble classifers for paddy blast disease prediction has achieved high precision and high recall but when the solutions of model are closely looked bagging classifier is better compared to other ensemble classifers that are proposed in predicting paddy blast disease

    A Comparative Study of Ensemble Classifiers for Paddy Blast Disease Prediction Model

    Get PDF
    Paddy blast has become most epidemic disease in many rice growing countries. Various statistical methods have been used for the prediction of paddy blast but previously used methods failed in predicting diseases with good accuracy. However the need to develop new model that considers both weather factors and non weather  data called blast disease data that influences paddy disease to grow. Given this point we developed ensemble classifier based paddy disease prediction model taking weather data from January 2013 to December 2019 from Agricultural and Horticulture Research Station Kathalgere Davangere District. For the predictive model we collected 7 kinds of weather data and 7 kinds of disease related data that includes Minimum Temperature, Maximum Temperature, Temperautre Difference,Relative Humidity, Stages of Paddy Cultivation, Varities of seeds, Season of cropping and so on. It is observed and analyzed that Minimum Temperature, Humidity and Rainfall has huge correlation with occurrence of disease. Since some of the variables are non numeric to convert them to numeric data one hot encoding approach is followed and to improve efficiency of ensemble classifiers  4 different filter based features selection methods are used such as Pearson’s correlation, Mutual information, ANNOVA F Value, Chi Square. Three different ensemble classifiers are used as predictive models and classifiers are compared it is observed that Bagging ensemble technique has achieved  accuracy of 98% compared to Adaboost of 97% and Voting classifier of 88%. Other classification metrics are used evaluate different classifiers like precision, recall, F1 Score, ROC and precision recall score. Our proposed ensemble classifers for paddy blast disease prediction has achieved high precision and high recall but when the solutions of model are closely looked bagging classifier is better compared to other ensemble classifers that are proposed in predicting paddy blast disease

    Framework de Tomada de Decisão para Last-Mile Sustentável

    Get PDF
    The e-commerce growth, propelled by factors like globalization, urbanization, or the COVID-19 pandemic, has been raising the demand for logistic activities. This affects the entire supply chain, especially the last-mile, as it is considered the most ineffective part of the supply chain and a source of negative externalities. Although various solutions promise to alleviate these problems, understanding them and selecting the best has proven to be difficult due to conflicting criteria, multiple perspectives, and trade-offs. The vicissitudes of complex and sensitive urban contexts like historic centers also contribute to this difficulty. This work contributes an integrated framework that may assist the involved stakeholders in decision-making. To this end, this work is based on a three-part methodology. The extensive systematic literature review developed provided an integrated overview of this fragmented research area. This review confirmed the multidisciplinary nature of the topic, as there is an increasing number of studies conducted under very different perspectives. Furthermore, it was found that the economic dimension is the most considered; the most polluting countries contributed little to the research; and the solutions involve trade-offs. The literature review supported the definition of the hierarchical model that structures last-mile operations in historic centers. This model was evaluated by interviewing a group of experts. After integrating the experts’ feedback, the model was quantified by the same experts according to an AHP-TOPSIS approach. This quantification had as a case study the historic center of Porto, Portugal. The experts considered the three sustainability dimensions identically important. Air pollution was the most valued sub-criterion whereas Visual pollution was the least. All last-mile solutions considered in the model achieved similar results, therefore suggesting a combined distribution strategy. Nevertheless, the use of parcel lockers is the most favorable solution and seems adequate in Porto’s historic center.O crescimento do e-commerce, impulsionado por fatores como a globalização, a urbanização ou a pandemia de COVID-19, tem aumentado a procura por atividades logísticas. Isto afeta toda a cadeia de abastecimento, principalmente a última-milha, por ser considerada a parte mais ineficaz da cadeia de abastecimento e uma fonte de externalidades negativas. Embora existam várias soluções que prometem aliviar estes problemas, entendêlas e selecionar a melhor tem se provado difícil devido a critérios conflituosos, múltiplas perspetivas e trade-offs. As vicissitudes de contextos urbanos complexos e sensíveis como os centros históricos também contribuem para essa dificuldade. Este trabalho contribui um framework integrado que pode auxiliar os stakeholders envolvidos na tomada de decisão. Para este fim, este trabalho é baseado numa metodologia composta por três partes. A extensa revisão sistemática da literatura desenvolvida forneceu uma visão integrada desta área de investigação fragmentada. Esta revisão confirmou o caráter multidisciplinar do tema, pois há um número crescente de estudos conduzidos sob perspetivas muito diferentes. Além disso, verificou-se que a dimensão económica é a mais considerada; os países mais poluentes contribuíram pouco para a pesquisa; e as soluções envolvem trade-offs. A revisão da literatura suportou a definição do modelo hierárquico que estrutura as operações de última-milha em centros históricos. Este modelo foi avaliado entrevistando um grupo de experts. Após a integração do feedback dos experts, o modelo foi quantificado pelos mesmos de acordo com uma abordagem AHP-TOPSIS. Esta quantificação teve como caso de estudo o centro histórico do Porto, Portugal. Os experts consideraram as três dimensões da sustentabilidade identicamente importantes. O subcritério relativo à poluição atmosférica foi o mais valorizado, enquanto o menos foi o relativo à poluição visual. Todas as soluções de últimamilha consideradas no modelo alcançaram resultados semelhantes, sugerindo uma estratégia de distribuição combinada. No entanto, o uso de parcel lockers é a solução mais favorável e é aparentemente adequada para o centro histórico do Porto

    Pattern-based refactoring in model-driven engineering

    Full text link
    L’ingénierie dirigée par les modèles (IDM) est un paradigme du génie logiciel qui utilise les modèles comme concepts de premier ordre à partir desquels la validation, le code, les tests et la documentation sont dérivés. Ce paradigme met en jeu divers artefacts tels que les modèles, les méta-modèles ou les programmes de transformation des modèles. Dans un contexte industriel, ces artefacts sont de plus en plus complexes. En particulier, leur maintenance demande beaucoup de temps et de ressources. Afin de réduire la complexité des artefacts et le coût de leur maintenance, de nombreux chercheurs se sont intéressés au refactoring de ces artefacts pour améliorer leur qualité. Dans cette thèse, nous proposons d’étudier le refactoring dans l’IDM dans sa globalité, par son application à ces différents artefacts. Dans un premier temps, nous utilisons des patrons de conception spécifiques, comme une connaissance a priori, appliqués aux transformations de modèles comme un véhicule pour le refactoring. Nous procédons d’abord par une phase de détection des patrons de conception avec différentes formes et différents niveaux de complétude. Les occurrences détectées forment ainsi des opportunités de refactoring qui seront exploitées pour aboutir à des formes plus souhaitables et/ou plus complètes de ces patrons de conceptions. Dans le cas d’absence de connaissance a priori, comme les patrons de conception, nous proposons une approche basée sur la programmation génétique, pour apprendre des règles de transformations, capables de détecter des opportunités de refactoring et de les corriger. Comme alternative à la connaissance disponible a priori, l’approche utilise des exemples de paires d’artefacts d’avant et d’après le refactoring, pour ainsi apprendre les règles de refactoring. Nous illustrons cette approche sur le refactoring de modèles.Model-Driven Engineering (MDE) is a software engineering paradigm that uses models as first-class concepts from which validation, code, testing, and documentation are derived. This paradigm involves various artifacts such as models, meta-models, or model transformation programs. In an industrial context, these artifacts are increasingly complex. In particular, their maintenance is time and resources consuming. In order to reduce the complexity of artifacts and the cost of their maintenance, many researchers have been interested in refactoring these artifacts to improve their quality. In this thesis, we propose to study refactoring in MDE holistically, by its application to these different artifacts. First, we use specific design patterns, as an example of prior knowledge, applied to model transformations to enable refactoring. We first proceed with a detecting phase of design patterns, with different forms and levels of completeness. The detected occurrences thus form refactoring opportunities that will be exploited to implement more desirable and/or more complete forms of these design patterns. In the absence of prior knowledge, such as design patterns, we propose an approach based on genetic programming, to learn transformation rules, capable of detecting refactoring opportunities and correcting them. As an alternative to prior knowledge, our approach uses examples of pairs of artifacts before and after refactoring, in order to learn refactoring rules. We illustrate this approach on model refactoring

    Políticas de Copyright de Publicações Científicas em Repositórios Institucionais: O Caso do INESC TEC

    Get PDF
    A progressiva transformação das práticas científicas, impulsionada pelo desenvolvimento das novas Tecnologias de Informação e Comunicação (TIC), têm possibilitado aumentar o acesso à informação, caminhando gradualmente para uma abertura do ciclo de pesquisa. Isto permitirá resolver a longo prazo uma adversidade que se tem colocado aos investigadores, que passa pela existência de barreiras que limitam as condições de acesso, sejam estas geográficas ou financeiras. Apesar da produção científica ser dominada, maioritariamente, por grandes editoras comerciais, estando sujeita às regras por estas impostas, o Movimento do Acesso Aberto cuja primeira declaração pública, a Declaração de Budapeste (BOAI), é de 2002, vem propor alterações significativas que beneficiam os autores e os leitores. Este Movimento vem a ganhar importância em Portugal desde 2003, com a constituição do primeiro repositório institucional a nível nacional. Os repositórios institucionais surgiram como uma ferramenta de divulgação da produção científica de uma instituição, com o intuito de permitir abrir aos resultados da investigação, quer antes da publicação e do próprio processo de arbitragem (preprint), quer depois (postprint), e, consequentemente, aumentar a visibilidade do trabalho desenvolvido por um investigador e a respetiva instituição. O estudo apresentado, que passou por uma análise das políticas de copyright das publicações científicas mais relevantes do INESC TEC, permitiu não só perceber que as editoras adotam cada vez mais políticas que possibilitam o auto-arquivo das publicações em repositórios institucionais, como também que existe todo um trabalho de sensibilização a percorrer, não só para os investigadores, como para a instituição e toda a sociedade. A produção de um conjunto de recomendações, que passam pela implementação de uma política institucional que incentive o auto-arquivo das publicações desenvolvidas no âmbito institucional no repositório, serve como mote para uma maior valorização da produção científica do INESC TEC.The progressive transformation of scientific practices, driven by the development of new Information and Communication Technologies (ICT), which made it possible to increase access to information, gradually moving towards an opening of the research cycle. This opening makes it possible to resolve, in the long term, the adversity that has been placed on researchers, which involves the existence of barriers that limit access conditions, whether geographical or financial. Although large commercial publishers predominantly dominate scientific production and subject it to the rules imposed by them, the Open Access movement whose first public declaration, the Budapest Declaration (BOAI), was in 2002, proposes significant changes that benefit the authors and the readers. This Movement has gained importance in Portugal since 2003, with the constitution of the first institutional repository at the national level. Institutional repositories have emerged as a tool for disseminating the scientific production of an institution to open the results of the research, both before publication and the preprint process and postprint, increase the visibility of work done by an investigator and his or her institution. The present study, which underwent an analysis of the copyright policies of INESC TEC most relevant scientific publications, allowed not only to realize that publishers are increasingly adopting policies that make it possible to self-archive publications in institutional repositories, all the work of raising awareness, not only for researchers but also for the institution and the whole society. The production of a set of recommendations, which go through the implementation of an institutional policy that encourages the self-archiving of the publications developed in the institutional scope in the repository, serves as a motto for a greater appreciation of the scientific production of INESC TEC

    Armed Reprisals from Medieval Times to 1945

    Get PDF
    Wie ist es zu erklären, dass sich die bewaffneten Repressalien den Normierungsbemühungen seit dem 19. Jh. entzogen, während diese nicht-kriegerische Maßnahme ein sensibles Thema im Völkerrecht darstellte? Ausgehend vom mittelalterlichen Repressalienrecht und seiner schwindenden Geltung in der Neuzeit beweist die Untersuchung, dass die Großmächte diese Gewaltanwendung in Friedenszeiten zum Privileg machten und sie in einer völkerrechtlichen Grauzone beließen. Dies ermöglichte es, militärische Repressalienhandlungen gegen kleine Staaten durchzuführen, ohne die Folgen eines formellen Krieges zu tragen. Die Arbeit erläutert die zögerliche Haltung der Rechtslehre und zeigt, warum der Völkerbund in dem Versuch scheiterte, dieses Problem zu lösen

    Towards end-to-end security in internet of things based healthcare

    Get PDF
    Healthcare IoT systems are distinguished in that they are designed to serve human beings, which primarily raises the requirements of security, privacy, and reliability. Such systems have to provide real-time notifications and responses concerning the status of patients. Physicians, patients, and other caregivers demand a reliable system in which the results are accurate and timely, and the service is reliable and secure. To guarantee these requirements, the smart components in the system require a secure and efficient end-to-end communication method between the end-points (e.g., patients, caregivers, and medical sensors) of a healthcare IoT system. The main challenge faced by the existing security solutions is a lack of secure end-to-end communication. This thesis addresses this challenge by presenting a novel end-to-end security solution enabling end-points to securely and efficiently communicate with each other. The proposed solution meets the security requirements of a wide range of healthcare IoT systems while minimizing the overall hardware overhead of end-to-end communication. End-to-end communication is enabled by the holistic integration of the following contributions. The first contribution is the implementation of two architectures for remote monitoring of bio-signals. The first architecture is based on a low power IEEE 802.15.4 protocol known as ZigBee. It consists of a set of sensor nodes to read data from various medical sensors, process the data, and send them wirelessly over ZigBee to a server node. The second architecture implements on an IP-based wireless sensor network, using IEEE 802.11 Wireless Local Area Network (WLAN). The system consists of a IEEE 802.11 based sensor module to access bio-signals from patients and send them over to a remote server. In both architectures, the server node collects the health data from several client nodes and updates a remote database. The remote webserver accesses the database and updates the webpage in real-time, which can be accessed remotely. The second contribution is a novel secure mutual authentication scheme for Radio Frequency Identification (RFID) implant systems. The proposed scheme relies on the elliptic curve cryptography and the D-Quark lightweight hash design. The scheme consists of three main phases: (1) reader authentication and verification, (2) tag identification, and (3) tag verification. We show that among the existing public-key crypto-systems, elliptic curve is the optimal choice due to its small key size as well as its efficiency in computations. The D-Quark lightweight hash design has been tailored for resource-constrained devices. The third contribution is proposing a low-latency and secure cryptographic keys generation approach based on Electrocardiogram (ECG) features. This is performed by taking advantage of the uniqueness and randomness properties of ECG's main features comprising of PR, RR, PP, QT, and ST intervals. This approach achieves low latency due to its reliance on reference-free ECG's main features that can be acquired in a short time. The approach is called Several ECG Features (SEF)-based cryptographic key generation. The fourth contribution is devising a novel secure and efficient end-to-end security scheme for mobility enabled healthcare IoT. The proposed scheme consists of: (1) a secure and efficient end-user authentication and authorization architecture based on the certificate based Datagram Transport Layer Security (DTLS) handshake protocol, (2) a secure end-to-end communication method based on DTLS session resumption, and (3) support for robust mobility based on interconnected smart gateways in the fog layer. Finally, the fifth and the last contribution is the analysis of the performance of the state-of-the-art end-to-end security solutions in healthcare IoT systems including our end-to-end security solution. In this regard, we first identify and present the essential requirements of robust security solutions for healthcare IoT systems. We then analyze the performance of the state-of-the-art end-to-end security solutions (including our scheme) by developing a prototype healthcare IoT system
    corecore