Front-Crawl Propulsive Phase Detection Using Inertial Sensors
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
The present study investigates if inertial sensors could be used for reconstructing 3D full body movements in sports. On the example of alpine ski racing, it was demonstrated that inertial sensors allow computing meaningful parameters related to a skier’s ...
Distance bounding protocols become more and more important because they are the most accurate solution to defeat relay attacks. They consist of two parties: a verifier and a prover. The prover shows that (s)he is close enough to the verifier. In some appli ...
In this study, we present a piezoelectric artificial basilar membrane (ABM) composed of a 10-channel aluminum nitride beam array. Each beam varies in length from 1306 to 3194 mu m for mimicking the frequency selectivity of the cochlea. To characterize the ...
Nowadays inertial sensors are extensively used for gait analysis. They can be used to perform temporal event detection (i.e. step detection) and to estimate the orientation of the feet and other body segments to determine walking speed and distance. Usuall ...
A significant number of pictures are posted to social media sites or exchanged through instant messaging and cloud-based sharing services. Most social media services offer a range of access control mechanisms to protect users privacy. As it is not in the b ...
Related key attacks (RKAs) are powerful cryptanalytic attacks where an adversary can change the secret key and observe the effect of such changes at the output. The state of the art in RKA security protects against an a-priori unbounded number of certain a ...
Factoring-based public-key cryptosystems have an overall complexity which is dominated by the key-production algorithm, which requires the generation of prime numbers. This is most inconvenient in settings where the key-generation is not an one-off process ...
This study introduces a novel approach for automatic temporal phase detection and inter-arm coordination estimation in front-crawl swimming using inertial measurement units (IMUs). We examined the validity of our method by comparison against a video-based ...
Non-malleable codes, defined by Dziembowski, Pietrzak and Wichs (ICS ’10), provide roughly the following guarantee: if a codeword c encoding some message x is tampered to c' = f(c) such that c c, then the tampered message x contained in c reveals no inf ...
Information-theoretic secrecy is combined with cryptographic secrecy to create a secret-key exchange protocol for wireless networks. A network of transmitters, which already have cryptographically secured channels between them, cooperate to exchange a secr ...