94 research outputs found

    Transforming Basic Robotic Platforms into Easily Deployable and Web Remotely Controllable Robots

    No full text
    International audienceThis paper describes a way to transform basic robotic platforms into Web remotely controllable robots. Our goal is to achieve robot deployment anywhere, at anytime, at low-cost. As soon as full or even restricted Internet access is available (WiFi or 3G), the robot can be deployed and Webcontrolled. The distant user can send commands to the robot and monitor the state of the robot. For example, the distant user can make the robot move and get snapshots taken by the robot

    Modular Approach for Expert System toward Anomaly: N-Layers

    No full text
    International audience—Smart cities and smart homes are booming fields of development of pervasive systems. With the high stakes these systems have to manage, and their sheer complexity, anomalies have to be considered. In these complex systems are many connected components with computing capacities. They can manage anomalies, even if partially, and can act as some kind of expert systems. These expert systems can be relied upon to provide anomaly management. The complexity to manage generic expert systems brings us to suggest another approach. In this paper, the N-layers is discussed. It layers the various existing expert systems to organize them as a more generic expert system. It also aims to correct some difficulties to develop and integrate generic expert systems into various scales complex systems, such as smart cities or smart homes

    Internet-based teleoperation: A case study - toward delay approximation and speed limit module

    No full text
    International audienceThis paper presents the internet-based remote control of mobile robot. To face unpredictable Internet delays and possible connection rupture, a direct teleoperation architecture with “Speed Limit Module” (SLM) and “Delay Approximator” (DA) is proposed. This direct control architecture guarantees the path error of the robot motion is restricted within the path error tolerance of the application. Experiment results show the effectiveness and applicability of this direct internet control architecture in the real internet environment

    A Framework for Anomaly Diagnosis in Smart Homes Based on Ontology

    Get PDF
    International audienceSmart homes are pervasive environments to enhance the comfort, the security, the safety and the energy consumption of the residence. An ambient intelligence system uses information of devices to represent the context of the home and its residents. Based on a context database, this system infer the daily life activities of the resident. Hence, abnormal behavior or chronic disease can be detected by the system. Due to the complexity of these systems, a large variety of anomalies may occur and disrupt the functioning of critical and essential applications. To detect anomalies and take appropriate measures, an anomaly management system has to be integrated in the overall architecture. In this paper, we propose an anomaly management framework for smart homes. This framework eases the work of designers in the conception of anomaly detection modules and processes to respond to an anomaly appropriately. Our framework can be used in all heterogeneous environments such as smart home because it uses Semantic Web ontologies to represent anomaly information. Our framework can be useful to detect hardware, software, network, operator and context faults. To test the efficiency of our anomaly management framework, we integrate it in the universAAL middleware. Based on a reasoner, our framework can easily infer some context anomalies and take appropriate measures to restore the system in a full functioning state

    Virtual Reality to Improve Remote Control in Presence of Delays

    No full text
    International audienceThis paper presents the use of virtual reality in the context of remote control. Virtual reality may be used in a classical manner in order to simulate the behavior of a system, but also in parallel with the real system in order to improve the quality of the control, making it possible to deal with time delays induced by the network. Our proposal may be applied to various fields such as robotics, measurements systems, industrial applications or domotics

    Toward a Generic Framework for Ubiquitous System

    No full text
    International audienceIn this paper we present a beginning work about industrial applications using WEB technologies. Systems to study are, for example, robot arms in factories, Heating Ventilation and Air-Conditioning (HVAC) systems for commercial center or buildings, water distribution networks or power management consumption systems of corporate. WEB technologies give us new opportunities to collect the data, to analyze correlations of signals and external events, and finally to change in "soft real-time" the parameters of the managed system. But these applications can be strongly influenced by the behaviour of the communication network and its reliability. We describe the key points that we will explore in our further work

    Helping and monitoring robots at low cost

    No full text
    nombre de pages : 6National audienceThrough European countries the dependency ratio of elders and people with disability will rise in the next years. To avoid a degradation of the life quality of dependant persons, they may be maintained in their home. To ensure people safety and avoid isolation problems, some mechanisms are needed. We propose a new method, the X-development method, to guide generic product design from end-to-end. In this paper, the design is focused on robots for dependant people. To respect the environmental constraints and to reduce the amount of waste, the robots have to be designed properly. The aim of the X-development method is to ease the manufacturing process thanks to the tight association between the modelling and design phases of smart systems. Our robots are remotely controlled in order to achieve monitoring and social tasks. Caregivers or relatives can control each robot to interact with the dependant person. The robots increase the social interaction of dependant people. During the design phase, we keep in mind to maintain the price of the robot as cheap as possible, because it is the key point in the generalization of this one

    Modeling and analysing ubiquitous systems

    No full text
    International audienceThe growth of industrial activities during the last decades and the diversity of industrial products require standards and common methodologies for building and integrating different parts. It is also required that working groups use the same terminologies and concepts needed for each domain. The Model Driven Engineering (MDE) approach aims to give an answer while using a high level method based on models and transformations. In this paper, we use the MDE approach to model ubiquitous systems. Those systems are composed of devices interconnected through various kinds of network and offer to get and send information. We present a model for this class of system and its use in the field of energy while studying real cases from our industrial partner Terra Nova Energy (TNE)

    Modeling and Analysing Ubiquitous Systems Using MDE Approach

    No full text
    International audienceThe growth of industrial activities during the last decades and the diversity of industrial products require standards and common methodologies for building and integrating different parts. It is also required that working groups use the same terminologies and concepts needed for each domain. The Model Driven Engineering approach aims to give an answer while using a high level method based on models and transformations. In this paper, we use this approach to model ubiquitous systems. Those systems are composed of devices interconnected through various kinds of network and offer to get and send information. We present a model for this class of system and its use in the field of energy while studying real cases from our industrial partner Terra Nova Energy. This company aims to give solutions to monitor energy use and to reduce consumption. First results, where the use of a Model Driven Engineering approach makes it possible for our partner to improve and to get other points of view of his systems, are presented

    Software Defined Networking Reactive Stateful Firewall

    No full text
    Part 3: Cyber InfrastructureInternational audienceNetwork security is a crucial issue of Software Defined Networking (SDN). It is probably, one of the key features for the success and the future pervasion of the SDN technology. In this perspective, we propose a SDN reactive stateful firewall. Our solution is integrated into the SDN architecture. The application filters TCP communications according to the network security policies. It records and processes the different states of connections and interprets their possible transitions into OpenFlow (OF) rules. The proposition uses a reactive behavior in order to reduce the number of OpenFlow rules in the data plane devices and to mitigate some Denial of Service (DoS) attacks like SYN Flooding. The firewall processes the Finite State Machine of network protocols so as to withdraw useless traffic not corresponding to their transitions' conditions. In terms of cost efficiency, our proposal empowers the behavior of Openflow compatible devices to make them behaving like stateful firewalls. Therefore, organizations do not need to spend money and resources on buying and maintaining conventional firewalls. Furthermore, we propose an orchestrator in order to spread and to reinforce security policies in the whole network with a fine grained strategy. It is thereupon able to secure the network by filtering the traffic related to an application , a node, a subnetwork connected to a data plane device, a sub SDN network connected to a controller, traffic between different links, etc. The deployment of rules of the firewall becomes flexible according to a holistic network view provided by the management plane. In addition, the solution enlarges the security perimeter inside the network by securing accesses between its internal nodes
    • …
    corecore