Logiciel Industrie futur, software

Software: A key to the industry of the future

On January 30 and 31, 2018 in Nantes, the aLIFE symposium focused on the software industry’s contribution to the industry of the future. It was being organized by IMT Atlantique, and aimed to bring together manufacturers and researchers in order to target shared problems, and respond to national and European calls for projects in the future: cloud manufacturing, data protection, smart factories, etc. Hélène Coullon, Guillaume Massonnet and Hugo Bruneliere, researchers at IMT Atlantique and co-organizers of the symposium, answered our questions about this event and the issues surrounding the industry of the future.

 

What were the objectives of the aLIFE symposium?

Hélène Coullon The objective of this symposium were to hold a meeting bringing together researchers from IMT Atlantique, other academic players such as the Technical University of Munich or Polytechnique Montreal, and manufacturers like Dassault Systems and Airbus, to focus on the theme of the industry of the future, and more specifically on the contribution of the software industry to the industry of the future.

Guillaume Massonnet We were also seeking to adopt a coherent and constructive approach to connecting the research we are conducting with the needs of industry, and to determine which challenges we should respond to today. Finally, we wanted to form a consortium of stakeholders from the industrial and academic worlds to respond to European and national calls for projects.

What themes have been addressed?

HC The main themes included smart factories, cloud manufacturing, which is related to cloud computing, the modeling of processes, resources and data (physical and software), and the related optimization issues.

Hugo Bruneliere On the one hand, we are inspired by software approaches that can be applied to the context of industrial systems, which include a significant physical aspect, and on the other hand, there is the question of how to position and use the software within these new industrial processes. These two aspects are complementary, but they can be addressed independently. This is a relatively new area. A great deal of research has been carried out on the topic, and initiatives are beginning to emerge, but there is still much work to do.

What is cloud manufacturing?

HC – Cloud computing allows IT resources to be rented “on demand”, for example: processors, data storage, software resources, etc. Cloud manufacturing is the application of cloud computing concepts aimed at transferring IT resources to industrial resources. In other words, cloud manufacturing makes it possible to move towards “on-demand” production.

For example, we can imagine a user making a production request using an online platform. Via the cloud, this platform would distribute the tasks to be performed using different means of production, located in different geographical places.

What can cloud manufacturing offer manufacturers?

HB – It allows them to render their production units more profitable. Large companies have machines they have invested in, and they want to operate them as much as possible to make them profitable. If they do not use them continuously, they can make the unused production capabilities available to startups that do not have the means to invest in these machines. This allows large companies to have a better return on investment and prevents smaller companies from having to invest in expensive equipment.

We can also imagine a new way of producing for individuals, no longer by mass, but on demand, with the possibility of greater product customization.

How can this software contribute to data security?

HC -Industrial data is sensitive by definition. Of course, in the context of the industry of the future, with distributed production, the data will travel through external networks and be stored on remote servers. They will therefore potentially be exposed to attacks. We must secure the entire path taken by the data by using cryptography, for example, among many other techniques.

What are smart factories?

GM – A smart factory is an industry in which the various means of production are automated, intelligent, and able to communicate with each other. This raises issues related to the size of the data flow: issues of big data. We must therefore take this information into account to integrate it into the production decisions and their optimization.

The new modes of production break with traditional practices, in which production chains were dedicated to specific, mass-produced products. Today, new machines have become reconfigurable, and the same production lines are used for several types of products. Therefore, there is a move towards an industry that increasingly seeks to customize its production.

And these changes will take place through the development of specific software architectures?

HB – Through the aLIFE symposium, we wish to show that the contribution of software is necessary in responding to the problems facing the industry of the future. We have significant experience in software in our laboratory, and we intend to build on this expertise to show that we can provide the industry with solutions.

physical rehabilitation

A robot and supervised learning algorithms for physical rehabilitation

What if robotics and machine learning could help ease your back pain? The KERAAL project, led by IMT Atlantique, is working to design a humanoid robot that could help patients with lower back pain do their rehabilitation exercises at home. Thanks to supervised learning algorithms, the robot can show the patient the right movements and correct their errors in real time.

 

Lower back pain, a pathology primarily caused by aging and a lack of physical activity, affects a large majority of the population. To treat this pain, patients need rehabilitation from a physical therapist, and they must perform the prescribed exercises on their own on a daily basis. For most patients, this second step is not carried out very diligently, leading to real consequences for their health. How can they receive personalized assistance and stay motivated to perform the rehabilitation exercises long-term?

The KERAAL project, funded by the European Union under the Echord++ project, led by IMT Atlantique in partnership with Génération Robot and CHRU de Brest, has developed a humanoid robot capable of showing physical therapy exercises to a patient and correcting the patient’s errors in real time. The researchers have used a co-design approach, working with physical therapists and psychologists to define the most relevant exercises to be implemented, and be as specific as possible in defining the robot’s gestures and verbal instructions, and study how the robot is received by patients and therapists.

With a coach at home, patients have a physical presence and moral and emotional support that encourages them to correctly pursue their rehabilitation,” explains Mai Nguyen, project coordinator and researcher at the Computer Science Department at IMT Atlantique.  “The robot offers a way to monitor the patient’s performance of daily repetitive exercises, a task that is tiresome for therapists. At the same time, it prevents patients from having to make daily trips to the rehabilitation center.

 

A supervised learning algorithm that corrects the patient’s movements in real time

In 2014, the researchers began tests with the Nao robot, developed by SoftBank Robotics. “We found that Nao did not have enough joints to allow him to reproduce the rehabilitation exercises,” Mai Nguyen explains. “This is why we finally chose to work with the Poppy robot, which has a backbone. Therefore, he can move his back, which is better adapted to the treatment of lower back pain.

The small humanoid robot is equipped with a 3D camera and algorithms capable of extracting the “skeleton” of the person being filmed and detect their movements. The IMT Atlantique team worked on a supervised learning algorithm capable of analyzing the movement of the patient’s “skeleton” by comparing it to the demonstrations of the exercises previously shown to the robot by the health professional.  “The algorithm we are working on will determine the common features between the physical therapist’s different demonstrations, and will identify which variations he must reject,” Mai Nguyen explains. “There are some differences in execution that are acceptable. For example, if the exercise focuses on the arm muscles, the position of the feet is not important, whereas in the movement of the shoulders, every detail counts. The same level of precision is not required for every body part at all times.

The robot has a list of common errors in the physical therapy movements that have been previously identified and are associated with specific instructions for the patient. If the robot detects an error in the execution of the exercise, it will be able to verbally communicate with the patient while performing the correct movement. “Our goal was to create an interactive system that could respond to the patient in real time, without requesting the physical therapist’s assistance,” Mai Nguyen explains. “The data from the robot could then be used by the caregivers for more thorough follow-up.

 

A friendly and motivating presence

For the time being, what we have observed is that the system is functional. The initial tests show that the robot is able to perform the ongoing monitoring of patients, but we are awaiting the end of the clinical tests to come to a conclusion on the robot’s effectiveness in terms of motivation and rehabilitation as well as on the patients’ and physical therapists’ experiences,” Mai Nguyen explains.

As part of the co-design approach, Poppy was subject to a pre-experiment phase during the initial development of the project with five senior citizens who seldom use technology. Following the robot-mediated physical exercise sessions, the psychologists interviewed the participants. The goal was to understand how they perceived the machine, and if they had correctly understood its movements. “Before the session, the subjects were very apprehensive about the idea of working with a robot, but Poppy was perceived very positively, and provided a friendly dimension that was very appreciated,” Mai Nguyen explains. “The subjects were very motivated to do their exercises right!” Tests have been carried out with six patients suffering from lower back pain at the CHRU in Brest and at the rehabilitation center in Perharidy.

For the time being, all experiments have been carried out in a hospital setting. But the researchers’ long-term goal is to propose a robot that the patient can take home, with a program of personalized exercises implemented by the physical therapist. “We are trying to develop a system that is as lightweight as possible, with only one camera as a sensor,” Mai Nguyen explains. The researchers have also launched a study of the business model with the perspective of the potential industrial production of this physical therapist robot.

The project had very theoretical roots, but its completion is becoming more and more concrete!” Mai Nguyen explains. “We believe that, in a few years, this solution may be available on the market, bringing real advances in patient care.

 

The work presented here was partially funded by the European project EU FP-7 ECHORD++ KERAAL, by the CPER VITAAL project funded by FEDER, and by the RoKINter project by UBO.

Algorithms, glasses, Recommandation essayage algorithmes lunettes VESPA

Facial morphology analysis algorithms for choosing glasses

Everyone who wears glasses knows: finding the best pair for your face can be a daunting task… The VESPA project, led by researchers at IMT Lille Douai and hosted by the Teralab platform, is working with Cape Trylive to develop machine learning algorithms that can determine users’ facial characteristics during virtual online fittings and recommend products based on their morphology.

 

Do you have a round face? Then the best glasses for you would be angular and narrow designs. Do you have a square face? Then try butterfly-shaped glasses! Based on your face shape, certain types of frames will look better on you than others. For a few years now, plug-ins on opticians’ websites have allowed users to try on glasses virtually. However, they do not offer features to help users find the best frames for their face.

The VESPA project, led by Jacques Boonaert and Stéphane Lecoeuche at the IMT Lille Douai Computer and Control Sciences Research Unit, in collaboration with Pascal Mobuchon of Acep Trylive, a virtual fitting plug-in supplier, aims to develop a machine learning algorithm capable of identifying users’ face shapes and recommending glasses based on their morphological characteristics. “Acep Trylive has developed technology for establishing the key points on users’ faces while they are filmed via webcam during virtual fittings,” Stéphane Lecoeuche explains. “The goal of the VESPA project is to develop algorithms capable of analyzing the position of key elements on faces to determine the user’s morphology.” All the data used in the context of this project are anonymized and hosted on the secure, neutral and sovereign Teralab platform. TeraLab also provides researchers with tools for processing these data sets.

Read more on I’MTech: TeraLab, a big data platform with a European vision

 

Algorithms that can identify facial morphology

The algorithms developed by the researchers follow a supervised learning logic. “This means that we submit a set of images labeled by human experts to the algorithms, which determine if the person’s face is round, square, oval…” Jacques Boonaert explains.

In addition, the key points that Acep Trylive’s software automatically establishes on the user’s face provide the algorithm with a set of descriptors. For example, a descriptor could be a measurement of the key points on the face: this could be the height of the forehead, the shape of the chin, the width of the face or the jaw, etc. Based on the data labelled by human experts, the algorithm will determine which descriptors are most relevant in recognizing the user’s morphology. “We have tested sub-sets of descriptors. In all, there are over 20,” says Stéphane Lecoeuche. “The algorithms then ascertain the influence of the descriptors on their own to define the best morphological characterization.

There are three of these morphological classification algorithms. One focuses on the shape of the jaw, the second on the face shape, and the third on the width of the forehead. Digital descriptors of the user’s hair, eye and skin color are also used to propose the most suitable colors for the frames. All of this data is then merged to create recommendations for glasses adapted to the user based on these characteristics.

Acep Trylive algorithmes lunettes algorithms glasses

The Acep Trylive software highlights the key points on users’ faces (in blue)

 

Recommending products based on users’ morphology

Based on the monitoring of behavior and consumers’ history, the researchers were able to determine which glasses each internet user preferred: “Someone tries on a first pair of glasses, then a second, comes back to the first, tries a third pair, then again comes back to the first… In observing this sequence, we can determine which product the person prefers!” Jacques Boonaert explains.

The learning algorithm takes this fitting history into account and statistically consolidates the glasses the user preferred by morphology type. “Thanks to the data from thousands or even hundreds of thousands of fitting sessions, the algorithm makes the connection between the face shape and the products that were tried on,” says Stéphane Lecoeuche.  Therefore, for each new user who tries the application, the morphological analysis algorithms will determine their face shape and, depending on the choices of users with a similar morphology, and the recommendation engine will propose a set of products most likely to please them.

Seeking a partner company for further development

We also had to work on the product’s geometric classification. The problem is that we have not been able to access the data from opticians’ catalogs, which classify glasses by shape, style, color…” Stéphane Lecoeuche explains. The researchers had planned to work on the association between the customer’s morphological characteristics and the products’ geometrical characteristics. While the algorithmic analysis of the facial morphology provided good results, the lack of data on the frames has limited their objectives.

The other difficulty is that we do not have access to users’ final purchase decisions,” Jacques Boonaert adds. “We are aware that this is sensitive data for businesses. This is why we would like to create a strong partnership with an optician in order to further develop this project.” The researchers wish to implement a second phase of experimentation with a partner company, in which the algorithm could integrate the users’ buying decision and the products’ geometric classification. In the meantime, while waiting to find a company that would like to integrate the project consortium, the research team is continuing its work in machine learning geared towards industry and trade.

Vizity

Vizity: explore the city with digital maps

The startup Vizity, incubating at ParisTech Entrepreneurs, seeks to reinvent how content is shared online. It has developed a mapping solution that combines online resources related to a place, making them more easily accessible for users.

 

Timothée Lairet, Co-fondateur de Vizity

Timothée Lairet, Co-founder of Vizity

“To talk about places, nothing beats a map,” Timothée Lairet assures us. By reminding us of this often-forgotten truth, the young entrepreneur sums up the purpose behind Vizity, the startup he cofounded. Because what better way to combine resources about cities from blogs, online travel guides, city hall and tourist offices than with a map? This is exactly what the startup proposes to do, “We gather these different types of content and combine them on a map to make them more accessible,” Timothée Lairet explains.

For now, the startup incubated at ParisTech Entrepreneurs works with each stakeholder independently. When working with the tourist office for a city or region, for example, it first creates a map of the geographical area, which will be added to the organization’s website. Then, Vizity can dynamically link an article from the tourist office’s website to an area on the map. A blogpost about an exhibition at a museum, or the history of a castle will be displayed when a site visitor explores these areas on the map.

The solution addresses a problem faced by tourists who do are not familiar with an area. “They know the information is out there, but don’t know how to look for it,” the co-founder explains. It is hard to find information about a village market, for example, if you don’t even know the market exists. But with the map, the site user sees the event on the map as a point of interest. By clicking on the linked content, the tourist can find opening hours for the market and what vendors will be there, and then decide whether or not to go.

Besides tourists, residents of big cities can also benefit from this solution. In a city inhabited by hundreds of thousands or even millions of people, it’s easy to miss out on an event we’re interested in that took place just a few minutes from home. Blogs that offer ideas for outings would benefit from having their latest updates included on a map that would be open to users. This would ensure we never miss the information added to our neighborhood map.

Thanks to Vizity maps, the different producers of content about a place, whether it be bloggers, companies or administration services, can offer their own view of the city’s places of interest and share it with others. By combining informational content for each site, they offer unique content curation and can recommend original tour ideas to their customers and users.

Towards a new form of map media?

The startup’s long-term goal is to offer a comprehensive map that would be open to users and bring together different types of content for the same location. Information on an exhibition at a prestigious museum, historical information about the museum’s building, and a review for the associated gourmet restaurant would all be available on the same map, even though the content would be from different websites.

Tanguy Abel, Co-fondateur de Vizity

Tanguy Abel, Co-founder of Vizity

And while the idea of combining a map and reviews could make you think of Google Maps, the comparison stops there. For Timothée Lairet, the goal is not to produce another review aggregator, but to focus on content with a high added value for users, written by professionals or a circle of close friends. The map must allow users to access a wealth of valid and valuable information.

By pairing this solution with the geolocation of users, Vizity also hopes to offer new services. For a start, tourist offices could better understand their visitors’ behaviors and better meet their needs, making their stay more enjoyable. More importantly, based on past visits, users could determine options for their next visit, and save their preferences. When travelling abroad, we would just need to tell the Vizity app what we’re looking for, and it would propose a visit that matches the experience we want. In short, a new way to explore locations off the beaten track.

 

Cyberattacks, 25 termes, cybersécurité, Hervé Debar

24 words for understanding cybersecurity

Starting with Algorithm and ending with Virus, this list features terms like Phishing and Firewall… As the symposium entitled “Are we entering a new era of cybersecurity?” is getting underway at IMT, here are 24 words to help you understand the concepts, technologies and systems used to protect people, materials and organizations from cyberattacks. This glossary was compiled with the help of Hervé Debar, a researcher at Télécom SudParis, an expert in cybersecurity and co-organizer of the symposium.

 

Algorithm  A sequence of instructions intended to produce a result (output data) by means of a calculation applied to input data.

Critical infrastructures  Infrastructures for which a cyberattack could have very serious consequences for the services provided, even to the point of putting lives at risk.

Cryptography  The science of secrets. Cryptography proposes algorithms that can make data unreadable for those who do not have the secret. It also makes it possible to sign digital documents.

Cyberattack  A sequence of actions that lead to the violation of the security policy. This violation often takes the form of a computer system or network malfunction (inability to connect, a service that is no longer available, or data being encrypted using ransomware). A cyberattack can also be invisible, but lead to serious consequences, such as the theft of confidential information.

Cyber defense  A country’s means of attacking and defending its computer systems and networks.

Cyber range  A training platform for cyberattacks and defense.

Denial of Service Attack (see Distributed Denial of Service Attack)

Distributed Denial of Service Attack (DDoS Attack An attack aimed at overloading a service provider’s resources (often related to the network), making it inaccessible.

Electromagnetic injection An electromagnetic signal sent to disrupt the operation of an electronic component (processor, memory, chip card…).

Firewall A network component that filters incoming and outgoing traffic on a website.

Flaw A (software) flaw is a programming error made by the programmer that allows a hacker to run a program for a different use than what was intended. The most prevalent example is SQL injection, in which hackers use a web site’s interface to control databases they could not normally access.

Google Project Zero  A Google project aimed at finding new vulnerabilities in software.

Hacking Computer data theft.

Intrusion Unauthorized connection to a system.

Krack (Key Reinstallation Attacks) Attacks against the WPA2 protocol that allow an attacker to force the reuse of an encryption key. This allows the attacker to collect a large number of packets, and therefore decrypt the network traffic more easily, without knowing the key.

Malicious software (see Malware)

Malware  A program used for a purpose that is inconsistent with the user’s expectations and violates the security policy. Malware often uses vulnerabilities to enter a system.

National Vulnerability Database A project of the National Institute of Standards and Technology (NIST) that identifies and analyzes software flaws.

Phishing A social engineering technique, in which an attacker convinces a victim to act without understanding the consequences. The technique often relies on emails with fraudulent content (e.g. CEO fraud scams).

Ransomware Malicious software (malware) aimed at extorting money from a victim, often by encrypting the data on their computer’s hard disk and demanding payment in exchange for the decryption key (often these keys are useless, and purchasing them is therefore useless).

Resilience (by design) or cyber-resilience A system’s ability to function in the event of an attack, that is, provide a service to its users in any condition, albeit at a reduced level.

Security Information and Event Management  A platform for uploading and processing alerts that allows operators to monitor their systems’ security and react in the event of an attack.

Trojan Horse  A backdoor installed on a system without the users’ and administrators’ knowledge, which allows a hacker to regularly and easily connect to the system without being seen.

Virus  Malicious software capable of entering a system and spreading to infect other systems.

Image satellite Sentinel Bretagne

What are the applications for spatial data?

Several terabytes: this is the phenomenal amount of data produced by the Sentinel satellites each day! How can these data flows be used to develop concrete applications to be used by those who manage territories? This is what spatial application experts focused on at the AppSpace Forum, an event organized by the CNES, GIS BreTel, Booster Morespace and Institut InSpace from October 17 to 19, 2017.

 

Copernicus, a program run by the European Space Agency and the European Union, has launched the Sentinel satellites – 1A, 1B, 2A, 2B and 3A, each equipped with different sensors for taking a variety of measurements. The goal is to provide European users, and more specifically researchers, with comprehensive, free observational data of the entire Earth: oceans, land, vegetation, coastal areas, radiometry, temperature, altimetry, etc. But can spatial data be used to develop concrete applications?

The question of an application for data from the Copernicus program was at the forefront of the AppSpace event, co-organized by GIS Bretel. For the first time, this initiative brought together all actors in the region of Brittany, but also spatial application professionals from throughout France and Europe, to participate in round table discussions, themed workshops, and an exhibition space for companies and laboratories. The organizers of Appspace intend it to become a reference event taken up by other regions of France and Europe. The goal is to obtain a clear, overall vision of the regional, national, and even European ecosystem of spatial apps.

 

Encourage end users to take possession of data

“The takeaway from this event is that, generally speaking, the world of research is quite good at taking possession of spatial data”, explains Nicolas Bellec, operational director of GIS BreTel. “However, some field specialists, such as biologists or ecologists, sometimes have difficulty using these data in their research, and call on other labs specialized in the field of space.

Beyond the world of research, data from the Copernicus program were especially designed to help territorial authorities and regional and State services, to meet their own needs. But these actors, considered as the end users, do not use these data. “But the resolutions of the new satellite sensors are increasingly well-adapted to their needs!” states Nicolas Bellec. “The scope of applications is also very broad: maritime safety and security, land use and regional planning, monitoring of vegetation and biodiversity, adaptation to climate change, etc. At the Appspace forum, we tried to understand why.

By bringing together the worlds of research, companies and end users, the Appspace event highlighted the barriers to using spatial data and finding appropriate solutions. “What we found was that territorial managers lack training and information on these subjects. Researchers, companies and users want to create applications together, to better meet the needs of territorial managers” Nicolas Bellec explains.

The other difficulty is that spatial data can rarely be the sole solution to a concrete problem. They often must be used with other data, and in particular, field data, to find their place in applications. There are several ongoing projects which manage to incorporate spatial data into existing processes of information acquisition in the territories.

The Sésame project, created by Lab-STICC*, the teams Obelix and Myriads from IRISA and funded by the DGA and the ANR, crosses spatial data with AIS data from ships to develop applications for monitoring and surveillance of maritime traffic.

 

Develop technologies capable of handling data flows

The goal of the Sésame project is to develop technologies capable of detecting and giving real time documentation of unusual behavior of ships: illegal entries into defined areas, suspicious deviations from trajectories, illegal fishing, etc. To achieve such a result, high resolution photographs of the water’s surface produced by Sentinel satellites need to be crossed with AIS (Automatic Identification System) data emitted by ships. Each ship emits an AIS signal, which includes information on the ship itself, its route and position, at resolutions per minute. The challenge of the project is to process these extremely high flows of data. On top of the terabytes of data from the Sentinel satellite, tens of millions of AIS messages are produced each day.

CLS, our industrial partner, is a solutions operator for monitoring maritime traffic using satellite data. The current data processing chains will need to be reviewed in order to cope with the scale of the flows which are currently being produced” explains Ronan Fablet, professor and researcher in the Lab-STICC laboratory at IMT Atlantique and coordinator of the Sesame project. “The company is embarking on research and development processes to use Big Data and Machine Learning technology in monitoring maritime activity. The Sésame project is an integral part of this process.” With a consortium of teams specialized in Big Data, Machine Learning and remote detection, the goal of Sésame is to manage data flows with the development of suitable material and software infrastructure, and to develop machine learning techniques for detecting ships and unusual behavior in satellite images.

These technological developments are intended to be used first of all by CLS, then made available to operators such as the ESMA, the institution in charge of surveillance of European maritime areas. “Overall, the end users targeted by the project are the institutions in charge of maritime surveillance for regions, states, or groups of states” specifies Ronan Fablet.

Finally, as well as offering solutions to concrete issues of maritime traffic surveillance, the technologies developed by the Sésame project will pave the way for the use of already existing databases, by associating them with other types of satellite imagery. With the development of adapted infrastructure and Big Data technology, the gigantic data flows produced by Sentinel satellites will also be channeled, processed and interpreted, to serve the development of many other applications designed for end users.

* Members of Lab-STICC: IMT Atlantique, UBO, UBS, CNRS, ENIB and ENSTA Bretagne

Also read on I’MTech:

[one_half]

[/one_half][one_half_last]

[/one_half_last]

 

Eikosim

Eikosim improves the dialogue between prototyping and simulation

Simulate. Prototype. Measure. Repeat. Developing an industrial part inevitably involves these steps. First comes the digital model. Then, its characteristics are assessed through simulation, after which, the first version of the part is built. The part must then be subject to mechanical stress to assess its resistance and be closely observed from every angle. The test results will be used to improve the modelling, which will produce a new prototype… and so the cycle continues until a satisfactory version is produced. But Renaud Gras and Florent Mathieu want to reduce the repetitions involved in this cycle, which is why they created Eikosim, a startup that has been incubating at Paristech Entrepreneurs for one year. They develop software specialized in helping engineers with these design stages.

So, what is the key to saving as much time as possible? Facilitating the comparison between the digital tests and the measurements. Eikosim meets this need by integrating the measurement results recorded during testing directly into the part’s digital model. Any deformation, cracking or change in the mechanical properties is therefore recorded in the digital version of the object. The engineers can then easily compare the changes measured during the tests with those predicted during simulation, and therefore automatically correct the simulation so that it better reflects reality. What this startup offers is a breakthrough solution, since the traditional alternative involves storing the real measurements in a data table, and creating algorithms for manually readjusting the part through simulation. A tedious and time-consuming process.

Another strength the startup has to offer: its software can optimize the measurements of prototypes, for example by facilitating the positioning of observation cameras. One of the challenges is to ensure their actual position is well calibrated to correctly record the movements. To achieve this, the cameras are usually positioned using an alignment jig and arranged using a complex procedure which, again, is time-consuming. But the Eikosim software makes it possible to directly record the cameras’ positions on a digital model of the part. Since an alignment jig is no longer needed, the calibration is much faster. The technology is therefore compatible with large-scale parts, such as the chassis of trains. These dimensions are too large for technology offered by competitors, which struggles to arrange many cameras around such enormous parts.

The startup’s solutions have won over manufacturers, especially in aeronautics. The sector innovates materials, but must constantly address safety constraints. The accuracy of the simulations is therefore essential. In this industry, 20% of engineers’ time is spent making comparisons between simulation and real tests. The powerful software developed by Eikosim is therefore represents an enormous advantage in reducing development times.

The founders

[divider style=”normal” top=”20″ bottom=”20″]

Florent Mathieu - Eikosim

Florent Mathieu

Renaud Gras - Eikosim

Renaud Gras and Florent Mathieu founded Eikosim after completing a thesis at the ENS Paris-Saclay Laboratory of Mechanics and Technology. Equipped with their expertise in understanding the mechanical behavior of materials by instrumenting tests using imaging techniques, they now want to use their startup to pass these skills on to the manufacturing industry.

[divider style=”normal” top=”20″ bottom=”20″]

passwords

Passwords: security, vulnerability and constraints

Hervé Debar, Télécom SudParis – Institut Mines-Télécom, Université Paris-Saclay

[divider style=”normal” top=”20″ bottom=”20″]

What is a password?

A password is a secret linked to an identity. It associates two elements, what we own (a bank card, badge, telephone, fingerprint) and what we know (password or code).

Passwords are very widely used, for computers, telephones, banking. The simplest form is the numerical code (PIN), with 4 to 6 numbers. Our smartphones therefore use two PIN codes, one to unlock the device, and another associated with the SIM card, to access the network. Passwords are most commonly associated with internet services (email, social networks, e-commerce, etc.).

Today, in practical terms, identity is linked to an email address. A website uses it to identify a person. The password is a secret, known by both the server and the user, making it possible to “prove” to the server that the identity provided is authentic. Since an email address is often public, knowing this address is not enough for recognizing a user. The password is used as a lock on this identity. Therefore, passwords are stored on the websites we log in to.

What is the risk associated with this password?

The main risk is password theft, in which the associated identity is stolen. A password must be kept hidden, so that it remains secret, preventing identity theft when incidents arise, such as the theft of Yahoo usernames.

Therefore, a website doesn’t (or shouldn’t) save passwords directly. It uses a hash function to calculate the footprint, such as the bcrypt function Facebook uses. With the password, it is very easy to calculate the footprint and verify that it is correct. On the other hand, it is very difficult mathematically to find the code if only the footprint is known.

Searching for a password by following the footprint

Unfortunately, technological progress has made brute force password search tools, like “John the Ripper” extremely effective. As a result, an attacker can find passwords fairly easily using footprints.

The attacker can therefore capture passwords, for example by tricking the user. Social engineering (phishing) causes users to connect to a website that imitates the one they intended to connect to, thus allowing the attacker to steal their login information (email and password).

Many services (social networks, shops, banks) require user identification and authentication. It is important be sure we are connecting to the right website, and that the connection is encrypted (lock, green color in the browser address bar), to prevent these passwords from being compromised.

Can we protect ourselves, and how?

For a long time, the main risk involved sharing computers. Writing your password on a post-it note on the desk was therefore prohibited. Today, in a lot of environments, this is a pragmatic and effective way of keeping the secret.

The main risk today involves to the fact that an email address is associated with the passwords. This universal username is therefore extremely sensitive, and naturally it is a target for hackers. It is therefore important to identify all the possible means an email service provider offers to protect this address and connection. These mechanisms can include a code being sent by SMS to a mobile phone, a recovery email address, pre-printed one-time use codes, etc. These methods control access to your email address by alerting you of attempts to compromise your account, and help you regain access if you lose your password.

For personal use

Another danger involves passwords being reused for several websites. Attacks on websites are very common, and levels of protection vary greatly. Reusing one password on several websites therefore very significantly increases the risk of it being compromised. Currently, the best practice is to therefore to use a password manager, or digital safe (like KeePass or Password Safe, free and open software), to save a different password for each website.

The automatic password generation function offered by these managers provides passwords that are more difficult to guess. This greatly simplifies what users need to remember and significantly improves security.

It is also good to keep the database on a flash drive, and to save it frequently. There are also cloud password management solutions. Personally, I do not use them, because I want to be able to maintain control of the technology. That could prevent me, for example, from using a smart phone in certain environments.

For professionals

Changing passwords frequently is often mandatory in the professional world. It is often seen as a constraint, which is amplified by the required length, variety of characters, the impossibility of using old passwords, etc. Experience has shown that too many constraints lead users to choose passwords that are less secure.

It is recommended to use an authentication token (chip card, USB token, OTP, etc.). At a limited cost, this offers a significant level of security and additional services such as remote access, email and document signature, and protection for the intranet service.

Important reminders to avoid password theft or limit its impact

Passwords, associated with email addresses, are a critical element in the use of internet services. Currently, the two key precautions recommended for safe use is to have one password per service (if possible generated randomly and kept in a digital safe) and to be careful to secure sensitive services, such as email addresses and login information (by using the protective measures provided by these services, including double authentication via SMS or recovery codes, and remaining vigilant if anything abnormality is detected). You can find more recommendations on the ANSSI website.

Hervé Debar, Head of the Telecommunications Networks and Services department at Télécom SudParis, Télécom SudParis – Institut Mines-Télécom, Université Paris-Saclay

The original version of this article was published in French on The Conversation France.

Also read on I’MTech

[one_half]

[/one_half][one_half_last]

[/one_half_last]

facial expressions

Our expressions under the algorithmic microscope

Mohamed Daoudi, a researcher at IMT Lille Douai, is interested in the recognition of facial expressions in videos. His work is based on geometrical analysis of the face and machine learning algorithms. They may pave the way for applications in the field of medicine.

 

Anger, sadness, happiness, surprise, fear, disgust. Six emotions which are represented in humans by universal facial expressions, regardless of our culture. This was proven in Paul Ekman’s work, published in the 60s and 70s. Fifty years on, scientists are using these results to automate the recognition of facial expressions in videos, using algorithms for analyzing shapes. This is what Mohamed Daoudi, a researcher at IMT Lille Douai, is doing, using computer vision.

We are developing digital tools which allow us to place characteristic points on the image of a face: in the corners of the lips, around the eyes, the nose, etc.” Mohamed Daoudi explains. This operation is carried out automatically, for each image of a video. Once this step is finished, the researcher has a dynamic model of the face in the form of points which change over time. The movements of these points, as well as their relative positions, give indications on the facial expressions. As each expression is characteristic, the way in which these points move over time corresponds to an expression.

The models created using points on the face are then processed by machine learning tools. “We train our algorithms on databases which allow them to learn the dynamics of the characteristic points of happiness or fear” Mohamed Daoudi explains. By comparing new measurements of faces with this database, the algorithm can classify a new video analysis of an expression into one of six categories.

This type of work is of interest to several industrial sectors. For instance, for observing customer satisfaction when purchasing a product. The FUI Magnum project has taken an interest in the project. By observing a customer’s face, we could detect whether or not his experience was an enjoyable one. In this case, it is not necessarily about recognizing a precise expression, but more about describing his state as either positive or negative, and to what extent. “Sometimes this is largely sufficient, we do not need to determine whether the person is sad or happy in this type of situation” highlights Mohamed Daoudi.

The IMT Lille Douai researcher highlights the advantages of such a technology in the medical field, for example: “in psychiatry, practitioners look at expressions to get an indication of the psychological state of a patient, particularly for depression.” By using a camera and a computer or smartphone to help analyze these facial expressions, the psychiatrist can make an objective evaluation of the medication administered to the patient. A rigorous study of the changes in their face may help to detect pain in some patients who have difficulty expressing it. This is the goal of work by PhD student Taleb Alashkar, whose thesis is funded by IMT’s Futur & Ruptures (future and disruptive innovation) program and supervised by Mohamed Daoudi and Boulbaba Ben Amor. “We have created an algorithm that can detect pain using 3D facial sequences” explains Mohamed Daoudi.

The researcher is careful not to present his research as emotional analysis. “We are working with recognition of facial expressions. Emotions are a step above this” he states. Although an expression relating to joy can be detected, we cannot conclude that the person is happy. For this to be possible, the algorithms would need to be able to say with certainty that the expression is not faked. Mohamed Daoudi explains that this remains a work in progress. The goal is indeed to introduce emotion into our machines, which will become increasingly intelligent.

[box type=”info” align=”” class=”” width=””]

From 3D to 2D

To improve facial recognition in 2D videos, researchers incorporate algorithms used in 3D for detecting shape and movement. Therefore, to study faces in 2D videos more easily, Mohamed Daoudi is capitalizing on the results of the ANR project Face Analyser, conducted with Centrale Lyon and university figures in China. Sometimes the changes are so small they are difficult to classify. This therefore requires creating digital tools making it possible to amplify them. With colleagues at the University of Beihang, Mohamed Daoudi’s team has managed to amplify the subtle geometrical deformations of the face to be able to classify them better.[/box]

 

startup Footbar

IoT: How to find your market? Footbar’s story

In the connected objects sector, the path to industrialization is rarely direct. Finding a market sometimes requires adapting the product, strategic repositioning, a little luck, or a combination of all three. Footbar is a striking example of how a startup can revise its original strategy to find customers while maintaining its initial vision. Sylvain Ract, one of the founders of the startup incubated at Télécom ParisTech, takes a look back at the story of his company.

 

Can you summarize the idea you had at the start of the Footbar project?

Sylvain Ract: My business partner and I wanted to make technology accessible to the entire soccer world. Professionals players have their statistics, but amateurs do not have much. The idea was to boost players’ enjoyment of the game by providing them with more information on their performance. My training in embedded systems at Télécom ParisTech was decisive in our choice to develop a connected object ourselves. This approach gave us more freedom than if we had started with an existing object, such as an activity tracker, and improved it with our own algorithms.

Where did you search for your first customers?

SR: When we started in 2015, we had a difficult time trying to sell our sensors to amateur clubs. The problem is, these organizations do not have much money. Outside of the professional level, clubs barely have the resources to purchase players’ jerseys and pay travel expenses. Another approach was to see the players as providing some of their own equipment; we could therefore directly target them as individuals. But mass-producing millions of sensors was too costly for a startup like ours.

How did you find your market?

SR: A little by chance. When we were just getting started we conducted a crowdfunding campaign. It was not successful because amateur players’ interest did not convert into financial contributions. This made us realize that the retail market was still immature. On the other hand, this campaign helped spread the word about our project. Later, the Foot à 5 Soccer Park network contacted us expressing interest in our sensors. The players who attend their centers are already used to an improved game experience since the matches are filmed. They were interested in going even further.

How did this meeting change things for you?

SR: The fact that Soccer Park films the players’ matches is a huge plus for us. This allowed us to create an enormous annotated database. We can also visually follow players who wear our device in their shin guards and clearly connect the facts observed during the game with the data from our devices’ accelerometers. We were therefore able to greatly improve our artificial intelligence algorithms. From a business perspective, we were able to expand our network to include other Foot à 5 centers in France and abroad, which gave us new perspectives.

What are your thoughts on this change of direction?

SR: Strangely enough, today we feel we are very much in line with our initial idea. Over the years we have changed our approach several times, whether from doubts or difficulties, but in the end, our current positioning is consistent with the idea of providing amateurs with this technology. We have a product that exists, customers who appreciate it and use it for enjoyment. What we are interested in is being involved in using digital technology to redefine how sports are experienced, in this case soccer. In the long-term, artificial intelligence will likely become increasingly prevalent in the competitive aspect, but the professional environment is not as big a market as one might think. Helping amateurs change the way they play is a challenge better suited to our startup.