Congduc Pham

Congduc Pham
Université de Pau et des Pays de l'Adour | UPPA · Department of Computer Science

About

119
Publications
19,758
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,063
Citations

Publications

Publications (119)
Conference Paper
Full-text available
The increasing volume of data in various environments such as IoT and the need to maintain data privacy and security have led to the development of usage control models. Usage control policies are models that enable fine-grained access control over data by enforcing restrictions on how users can use the data. Semantic mechanisms, on the other hand,...
Conference Paper
Full-text available
The main purpose of IoT is to deliver reliable, high quality services and innovative solutions by transforming the captured data into meaningful information, and thus improving user’s daily life. In this regard, it is in the interest of the community to encourage entities within IoT environments to share their data, and therefore serve public inter...
Chapter
Full-text available
About 35% of the world’s food are produced in small-scale farms while only occupying about 12% of all agricultural land. However, smallholder farmers usually face a number of constraints and the water resource is one of the major constraints. The usage of smart technologies and especially sensor systems in so-called Smart Farming Technologies can b...
Conference Paper
La nature distribuée des réseaux IoT et la diversité de ses acteurs conduisent à reconnaître la sécurité et l’encadrement du partage des données comme l’un des principaux défis du domaine IoT. Ainsi, en raison de l’absence de gouvernance des informations partagées, le fournisseur des données ne conserve que peu de contrôle sur ses données une fois...
Conference Paper
Full-text available
Internet of Things (IoT) is one of the key technologies in the industry 4.0 era and promotes the interconnection of numerous data sources in several sectors such as ecology, agriculture, or healthcare. Meanwhile, each entity within these connected environments carries its unique requirements and individual goals. For connected environments to gain...
Conference Paper
IoT main goal is to provide trusted high-quality services and innovative solutions to its users by transforming the captured data into meaningful information. In this context, it is in the best interest of the community to encourage entities within the IoT environment to share their data, and therefore help contribute to the overall public interest...
Article
Full-text available
With worldwide deployment of LoRa/LoRaWAN LPWAN networks in a large variety of applications, it is crucial to improve the robustness of LoRa channel access which is largely ALOHA-like to support environments with higher node density. This article presents extensive experiments on LoRa Channel Activity Detection and Capture Effect property in order...
Article
Full-text available
Self‐organising is an important characteristics of wireless mesh networks, which provides high flexibility and adaptive connectivity for end users. In this study, we specifically study multicast features in wireless mesh networks to improve network capacity by taking advantage of shared links to reach simultaneously multiple users. Self‐organising...
Article
Full-text available
Wireless mesh networks are designed as an economical solution to provide high quality service for lastmile broadband Internet access. The paramount priority of these networks is the throughput maximization which is in conflict with a scarce bandwidth. Multicast is a technology that provides a good trade-off between maximizing the throughput and min...
Chapter
LoRa is designed for long-range communication where devices are directly connected to the gateway, which removes typically the need of constructing and maintaining a complex multi-hop network. Nonetheless, even with the advantage of penetration of walls, the range may not sometimes be sufficient. This article describes a 2-hop LoRa approach to redu...
Conference Paper
Long-range radio are promising technologies to deploy low-cost Low Power WAN for a large variety of IoT applications. There are however many issues that must be considered before deploying IoT solutions for low-income developing countries. This article will present these issues and show how they can be addressed in the context of African rural appl...
Article
Full-text available
The digital revolution led by the Internet of Things (IoT) is already reshaping several traditional business sectors. Moreover, because of its very nature, the promise of the IoT is also to reduce energy consumption and pollutant emissions in several environmental scenarios. At the same time, it is desirable to keep the development of IoT as sustai...
Conference Paper
While benefits of IoT are clearly stated the deployment of such devices in a large scale is still held back by technical challenges such as short communication distances. Recent long-range radio technologies such as Semtech’s LoRa are promising to deploy Low Power WAN at a very low-cost for a large variety of applications. The paper describes our p...
Conference Paper
Gartner forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30% from 2015, and will reach 20.8 billion by 2020. In 2016, 5.5 million new things will get connected every day. Furthermore, the current research and marker trends shows the convergence between IoT and Big Data. On the other hand, developing countries are sti...
Conference Paper
Full-text available
Cattle Rustling is a recurrent phenomenon observed in many in African countries today. This scourge cause significant losses to farmers and governments. Confronted with this problem farmers have generally no solutions. Internet of Things can be a real solution to defeat this nuisance by first allowing theft detection and further prevent it with an...
Preprint
Full-text available
There is a growing interest in the use of video sensor networks in surveillance applications in order to detect intruders with low cost. The essential concern of such networks is whether or not a specified target can pass or intrude the monitored region without being detected. This concern forms a serious challenge to wireless video sensor networks...
Book
This book constitutes the refereed proceedings of the 14th International Conference on Economics of Grids, Clouds, Systems, and Services, GECON 2017, held in Biarritz, France, in September 2017. The 10 full papers and 10 short papers presented together with 3 invited talks were carefully reviewed and selected from 38 submissions. This volume of the...
Conference Paper
It is widely accepted that the Era of IoT can potentially connect billions of sensors, devices, equipment, systems, etc. In turn, the challenge is about driving business outcomes, consumer benefits, and the creation of new value. While benefits of IoT are clearly stated for increased process efficiency through automation & optimization, the deploym...
Conference Paper
We present a low-cost, low-power, long-range image sensor built from off-the-shelves components and enabling fully autonomous and out-of-the-box remote visual surveillance applications. The image sensor implements a packet loss-tolerant image compression technique that can run on very limited memory platforms. Long-range support is provided with Se...
Article
Full-text available
Energy preservation constitutes a very critical challenge in wireless sensor network surveillance applications. On one hand, transmitting data by using additional transmission power is among the biggest sources of energy consumption. On the other hand, using a small transmission power degrades the connectivity between nodes. In this paper, a Distri...
Conference Paper
Wireless Image Sensor Networks (WISN) where sensor nodes are equipped with miniaturized visual CMOS cameras to provide visual information is a promising technology for situation awareness, search&rescue or intrusion detection applications. In this paper, we present an off-the-shelf image sensor based on Arduino boards with a CMOS uCamII camera. The...
Article
The number of applications that need to process data continuously over long periods of time has increased significantly over recent years. The emerging Internet of Things and Smart Cities scenarios also confirm the requirement for real time, large scale data processing. When data from multiple sources are processed over a shared distributed computi...
Article
In this paper, we are investigating the communication performances of low-resources sensor motes that are commonly found in recent smart cities test-beds or used by the research community. We focus here on 802.15.4 radio and we will present a performance study of sending and receiving capabilities of Libelium WaspMote, Arduino-based motes, Telosb-b...
Conference Paper
Full-text available
The european EAR-IT project addresses ”real-life” experimentations of intelligent acoustic for supporting high societal value applications in a large-scale smart environment. For instance a city emergency center can request on-demand acoustic data samples for surveillance purposes and management of emergencies. In this paper, we will present experi...
Conference Paper
Full-text available
Abstract — In this paper, the multi-agent technology is applied in wireless sensor networks domain in order to adapt software architecture, and to optimize its performance in monitoring. We explore in particular the issues of topology control, especially some related work using multi-agent systems. In the third part, we will propose an agent-based...
Conference Paper
Mission-critical surveillance applications such as intrusion detection or disaster response have strong requirements in communication delays. We consider a Wireless Image Sensor Network (WISN) with a scheduling of image sensor node’s activity based on the application criticality level. Sentry nodes capable of detecting intrusions with a higher prob...
Conference Paper
The EAR-IT project relies on 2 test-beds to demonstrate the use of acoustic data in smart environments: the smart city SmartSantander test-bed and the smart building HobNet test-beds. In this paper, we take a benchmarking approach to qualify the various EAR-IT test-bed based on WSN and IoT nodes with IEEE 802.15.4 radio technology. We will highligh...
Conference Paper
Full-text available
With an increase in the number of monitoring sensors deployed on physical infrastructures, there is a corresponding increase in data volumes that need to be processed. Data measured or collected by sensors is typically processed at destination or "in-transit" (i.e. from data capture to delivery to a user). When such data are processed in-transit ov...
Article
This is the proceedings of the third workshop on Robots and Sensors integration in future rescue INformation system (ROSIN 2013)
Article
Router-assisted concepts have been proposed in many research areas including reliable multicast protocols. These concepts can limit the implosion and repair locality problems in an effective way by attributing the role of repair locality to the specific router close to the point of packet loss. Several router-assisted reliable multicast protocols h...
Article
Full-text available
We consider Robot-assisted Search $\&$ Rescue operations enhanced with some fixed image sensor nodes capable of capturing and sending visual information to a robot sink. In order to increase the performance of image transfer from image sensor nodes to the robot sinks we propose a 2-hop neighborhood information-based cover set selection to determine...
Conference Paper
Mission-critical surveillance applications such as intrusion detection or disaster response have vital requirement in QoS. We consider a Wireless Image Sensor Network (WISN) with a scheduling of image sensor node's activity based on the application criticality level. Sentry nodes capable of detecting intrusions with a higher probability than others...
Conference Paper
Full-text available
Surveillance applications with Wireless Sensor Networks can be strengthened by introducing imaging capability: intrusion detection, situation awareness, search&rescue... As images are usually bigger than scalar data, and a single image needs to be split in many small packets, image transmission is a real challenge for these applications, especially...
Article
Full-text available
The past ten years have witnessed great developments of wireless sensor networks in both theory and application. The long been expected and advocated ubiquitous sensing is becoming increasingly popular and widely admitted with the great success of many applications of wireless sensor networks in environmental monitoring, precision agriculture, huma...
Conference Paper
With the increasing availability of streaming applications from mobile devices to dedicated sensors, understanding how such streaming content can be processed within some time threshold remains an important requirement. We investigate how a computational infrastructure responds to such streaming content based on the revenue per stream – taking acco...
Conference Paper
Smart Cities have emerged as an efficient infrastructure to contribute to so-called global sensing or situation-awareness applications. One example of large scale deployment of sensors in the city is the SmartSantander test-bed. Most of the deployment so far propose traditional scalar physical measures such as temperature or luminosity for a number...
Conference Paper
Full-text available
With an increasing interest in Electric Vehicles (EVs), it is essential to understand how EV charging could impact demand on the Electricity Grid. Existing approaches used to achieve this make use of a centralised data collection mechanism - which often is agnostic of demand variation in a given geographical area. We present an in-transit data proc...
Article
Full-text available
Providing an efficient and reliable multicast for data dissemination applications on a large scale is a challenge, especially when the applications require a very short delivery delay and high throughput. The combination of a local recovery approach based on active services with those using FEC/ARQ gives rise to a new class of reliable multicast pr...
Conference Paper
Full-text available
When data from multiple sources (sensors) are processed over a shared distributed computing infrastructure, it is necessary to often provide some Quality of Service (QoS) guarantees to each data stream. Service Level Agreements (SLAs) identify the cost that a user must pay to achieve the required QoS, and a penalty that must be paid to the user in...
Conference Paper
Mission-critical surveillance applications such as intrusion detection or disaster response have vital requirement in QoS. We consider a Wireless Image Sensor Network (WISN) with a scheduling of image sensor node's activity based on the application criticality level. This approach allows sentry nodes capable of detecting intrusions with a higher pr...
Article
The ability to support Quality of Service (QoS) constraints is an important requirement in some scientific applications. With the increasing use of Cloud computing infrastructures, where access to resources is shared, dynamic and provisioned on-demand, identifying how QoS constraints can be supported becomes an important challenge. However, access...
Conference Paper
When multiple users execute their streaming applications over a shared Cloud infrastructure, the provider typically captures the Quality of Service (QoS) for each application at a Service Level Agreement (SLA). Such an SLA identifies the cost that a user must pay to achieve the required QoS, and a penalty that must be paid to the user in case the Q...
Article
Full-text available
There is a growing interest in the use of video sensor networks in surveillance applications in order to detect intruders with low cost. The essential concern of such networks is whether or not a specified target can pass or intrude the monitored region without being detected. This concern forms a serious challenge to wireless video sensor networks...
Article
The increasing deployment of sensor network infrastructures has led to large volumes of data becoming available, leading to new challenges in storing, processing and transmitting such data. This is especially true when data from multiple sensors is pre-processed prior to delivery to users. Where such data is processed in-transit (i.e. from data cap...
Article
Wireless Video Sensor Networks consist in nodes with miniaturised cameras. Unlike omni-directional sensors, the sensing region of a video node is limited to the field of view of its camera. This paper addresses the issues of building an intrusion detection system based on these video sensors and presents two contributions. The first contribution pr...
Article
Full-text available
There is a growing interest in the use of video sensor networks in surveillance applications in order to detect intruders with low cost. The essential concern of such networks is whether or not a specified target can pass or intrude the monitored region without being detected. This concern forms a serious challenge to wireless video sensor networks...
Article
Current generation networks have been designed only for network connectivity; they have been stretched to the limit with many afterthought add-on features including quality of service, mobility, programmability, and security so that they can be deployed for business applications and processes. As such, service deployment on current networks are dif...
Article
Specific-purpose hardware or software modules are often designed to provide timely response to conditions or events that required attention. However, these application-specific mechanisms are not flexible and often can not be reused or adapted to different situations and applications. This paper proposes an approach whereby an active database with...
Conference Paper
Full-text available
In video surveillance with resource-constrained devices such as wireless video sensor nodes, power conservation, intrusion detection, and security are important features to guarantee. In this paper, we intend to preserve the network lifetime while fulfilling the surveillance application needs. We take into account security by considering that a mal...
Article
In randomly deployed visual wireless sensor networks for surveillance applications, the scheduling of sensor nodes can be seen from the risk perspective: different parts of the area of interest may have different risk levels according to the pattern of observed events such as the number of detected intrusions. In this paper, we propose a multiple-l...
Article
Full-text available
Intrusion detection surveillance applications with wireless video sensor networks are those applications which require low energy consumption to increase network lifetime while at the time require a high level of quality of service. This paper show by simulation how a dynamic risk management scheme based on Bezier curves that takes into account the...
Conference Paper
Full-text available
Wireless Video Sensor Network (WVSN) can be used for efficient event detection such as intrusion detection or disaster relief systems. These applications have a high level of criticality and can not be deployed with the current state of technology. In this paper, we show how a dynamic criticality management scheme can provide fast event detection f...
Article
Full-text available
This paper quantifies the reliability gain of combining classes for reliable multicasting in lossy networks in which the active network approach is the most promising. We define the delay latency of recovery as performance metric for reliability. We then study the impact of multicast group size and loss probability on the performance of compared ap...
Conference Paper
Full-text available
A Wireless Video Sensor Network (WVSN) consists of a set of sensor nodes equipped with miniaturized video cameras. Unlike omni-directional sensors, the sensing region of a video node is limited to the field of view of its camera. In this paper, we study the problem of coverage by video sensors in randomly deployed WVSN. We focus on the performance...
Article
Full-text available
Energy is an important issue in designing wireless sensor networks. Coverage and connectivity are not of less important since they are necessary for the network to be operational. In this work, we consider the case of wireless video sensor networks where some sensors have visual capabilities. We study the benefit of having some mobile nodes able to...
Article
Full-text available
Intrusion detection surveillance applications with wireless video sensor networks are those applications which require low energy consumption to increase network lifetime while at the time require a high level of quality of service. This paper show by simulation how a dynamic risk management scheme based on Bezier curves that takes into account the...
Conference Paper
Full-text available
A Wireless Video Sensor Network (WVSN) consists of a set of sensor nodes equipped with miniaturized video cameras. Unlike omni-directional sensors, the sensing region of a video node is limited to the field of view of its camera. Power conservation and coverage is an important issue in such wireless video networks, especially in the context of surv...
Chapter
Introduction Congestion control The congestion control in group communications Single-rate approaches Multi-rate approaches Approaches with router assistance Conclusion Bibliography Appendix 1: Summary table of the approaches quoted in this chapter Appendix 2: Acronyms of the protocols presented
Article
Full-text available
In randomly deployed wireless video sensor networks for surveillance applications, the scheduling of sensor nodes can be seen from the risk perspective: different parts of the area of interest may have different risk levels according to the pattern of observed events such as the number of detected intrusions. In this paper, we propose a multiple-le...
Conference Paper
Full-text available
In WSN-based surveillance systems power conservation is an important issue but one must also ensure that the application's objectives are met. In this paper, we jointly address the problem of coverage, disambigation and adaptive scheduling of sensor node's activity to extend the network lifetime while fulfilling a critical surveillance application...
Article
Full-text available
Traditional vision systems for surveillance applications are built es-sentially from distributed high resolution video cameras and pow-erful processing units which communicate in general with central servers via a high bandwidth network. Using autonomous and small wireless video sensor nodes can add a much higher level of flexibility, therefore ext...
Article
Full-text available
Faire de la vidéo surveillance avec des capteurs vidéo sans-fil possédant des ressources très limitées nécessite d' économiser l' énergie de manière efficace mais il est aussi très important de s'assurer que les objectifs de l'application soient atteints. Dans cet article, nous proposons un ordonnancement adaptatif de l'activité des nœuds vidéo pour...