Study results on virtual reality (VR) environment properties and their impact on presence have been contradictory. And due to the media specificity of VR, which includes place illusion, rules for environment design ca...
详细信息
Study results on virtual reality (VR) environment properties and their impact on presence have been contradictory. And due to the media specificity of VR, which includes place illusion, rules for environment design cannot directly be transferred from 3D computer games or stereoscopic film to VR. this study develops a model for VR environments based on Mel Slater's observation that place illusion in VR is caused by the use of sensorimotor contingencies (SMC). It defines properties of the environment which provide action possibilities for SMC as sensorimotor affordances (SMA). SMC and SMA form a bidirectional feedback loop of perception. this model helps to clarify former contradictory study results on VR environments, and also provides the basis for a framework of preceptual design rules for VR environments.
this paper proposes the use of artificial neural networks(ANNs) to classify human postures, using an invasive(intrusive) approach, into 6 categories namely standing, sitting, sleeping and bending - forward and backwar...
详细信息
ISBN:
(纸本)9781538666784
this paper proposes the use of artificial neural networks(ANNs) to classify human postures, using an invasive(intrusive) approach, into 6 categories namely standing, sitting, sleeping and bending - forward and backward. Human posture recognition has numerous applications in the field of healthcare analysis like patient monitoring, lifestyle analysis, elderly care etc. Most importantly, our solution is capable of classifying the aforementioned postures in real-time, by wirelessly(Wi-Fi) acquiring and processing the sensor data on a Raspberry-Pi device with minimal lag. A data-set of 44,800 samples was collected - from 3 subjects - which was used to train and test the neural *** experimenting and testing with a plethora of network architectures, an optimal neural network architecture(6-9-6) with suitable hyper-parameters was determined which gave an overall accuracy of 97.589%.
Nowadays, real-timeembeddedsystems (RTES) and particularly adaptive ones are gaining more use in several domains. they must be always consistent and available to preserve their usefulness and feasibility, as a respo...
详细信息
ISBN:
(数字)9781728126166
ISBN:
(纸本)9781728126173
Nowadays, real-timeembeddedsystems (RTES) and particularly adaptive ones are gaining more use in several domains. they must be always consistent and available to preserve their usefulness and feasibility, as a response to environmental conditions, resources limitations and user requirements. For this reason, they are subject to anticipated and unanticipated runtime reconfigurations. the design of such systems requires an abstract representation of the execution context independently from low-level details, with lower complexity. In this context, designers adopt runtime models which need to be checked and validated at early stages of development. Besides, these models must be updated according to unpredictable execution changes. In the present paper, we propose an MDE-based approach that allows managing runtime adaptive RTES. Our proposal starts by specifying the behavior and structure of runtime adaptive systems. then Model-to-Text (M2T) transformations allows us to generate configuration files to simulate adaptive systems behavior and evaluate their real-time constraints. An additional feature offered by our approach consists to monitor the execution context and update runtime models according to unanticipated reconfigurations.
In developing state of the art applications for Internet of things (IoT) and Cyber Physical systems (CPS), most applications software and associated hardware are always developed from ground up. However, this approach...
详细信息
ISBN:
(纸本)9781538695029
In developing state of the art applications for Internet of things (IoT) and Cyber Physical systems (CPS), most applications software and associated hardware are always developed from ground up. However, this approach always involves huge capital outlay, extend time-to-market for products, and contribute to integration delay, especially in the case of Industrial IoT (IIoT). In this paper, it is shown that already existing, widely-available, and low-cost hardware can participate successfully in collaborative computing for new analytics applications, at edges of IIoT and CPS networks. A well-known, low-cost, embedded digital signal processor (DSP) that is fully integrated in many industries is selected and used as a case study. the selected DSP is made more scalable by applying it to new, novel uses at the edge of an IIoT network. the new application includes using it to design useful waveforms needed for collaborative computing at IIoT network edges. embedded-C, a programming language that is suitable for programming resource-constrained network edge devices is used to successfully design needed waveforms for the selected DSP. Collaborative computing is achieved by sending the designed waveforms from the network edge, across diverse communication channels, to the fog layer, and then, use it at the fog layer to remove noise in selected IIoT data. Correlation coefficient is positive and high between output of noise removal achieved by waveforms from the low-cost DSP when compared to noise removal achieved by waveforms from systems with more computing resources at the fog layer. this signifies a successful collaborative computing using such legacy, low-cost DSP. For low-cost hardware to participate successfully in distributed, real-time collaborative network edge-computing, impact of communication network disturbances must be examined. Hence, for the selected DSP, impact of network Bit Error Rate (BER) is examined for both wired and wireless networks. It is discovered t
the number of IoT devices has been growing exponentially as new products are developed and legacy systems become Internet enabled. As a consequence, the large amount of traffic generated by IoT devices require new app...
详细信息
ISBN:
(纸本)9781728103594
the number of IoT devices has been growing exponentially as new products are developed and legacy systems become Internet enabled. As a consequence, the large amount of traffic generated by IoT devices require new approaches to network architecture design. the primary challenge with IoT devices is that the traffic can be highly variable due to the device type and the time of use. In order to maintain Quality of Service standards in a dynamic IoT network, these traffic patterns need to be modeled and understood so that we can adapt the architecture dynamically to maintain a desired level of Quality of Service. To this effect, we propose a Smart Testing Framework that can detect bottlenecks and predict the demand for computing resources in a dynamic IoT network. Results obtained from using our framework indicate that we can predict the demand for computing resources in a dynamic IoT network with a high degree of accuracy.
the proceedings contain 60 papers. the topics discussed include: a systematic review of cost reduction techniques for mutation testing: preliminary results;to detect abnormal program behaviors via mutation deduction;m...
ISBN:
(纸本)9781538663523
the proceedings contain 60 papers. the topics discussed include: a systematic review of cost reduction techniques for mutation testing: preliminary results;to detect abnormal program behaviors via mutation deduction;mutant quality indicators;an industrial application of mutation testing: lessons, challenges, and research directions;a testability analysis framework for non-functional properties;model-based mutation testing of real-timesystems via model checking;identifying useful mutants to test time properties;learning-based self-adaptive assurance of timing properties in a real-timeembedded system;challenges in automated testing through graphical user interface;and evaluating test data generation for untyped data structures using genetic algorithms.
this paper proposes some powerful techniques to design and development data packages used for multiple plants embedded wireless digital controller. the system performs data exchanging using master-slave topology, the ...
this paper proposes some powerful techniques to design and development data packages used for multiple plants embedded wireless digital controller. the system performs data exchanging using master-slave topology, the common one in industrial automation systems. the master and slaves are implemented on low-cost IoT-supported 32-bit microcontroller. the Free-RTOS is used as real-time operating system. All drivers of the master and slave controllers are implemented using C language and mainly preforms bitwise operations to obtain the speed and efficiency of the code execution. the plants used in this research are brushed dc-motors driven by PWM-based bidirectional H-bridge drivers. there are four types of the data packages are proposed. the data packages are designed using bit-representation data formation techniques. the data package design technique requires only one byte for the package header. It can reduce numbers of bytes of data exchanged over network. To archive the real-time control and monitoring capabilities of the system, the WebSockets protocol is selected implemented in all devices, master, slaves and computer. In addition, the proposed system is also evaluated on other protocols, the HTTP and MQTT. the experimental results show that the proposed techniques, system design and data package design, can perform on all communication protocols, no package loss. Using the WebSockets as communication protocol can archive the real-time capability of the system. It means that the proposed system can be implemented in real-world applications, the industrial real-time control monitoring and control systems.
With evolution of the communication technology remote monitoring has rooted into many applications. Swift innovation in Internet of things (IoT) technology led to development of electronics embedded devices capable of...
With evolution of the communication technology remote monitoring has rooted into many applications. Swift innovation in Internet of things (IoT) technology led to development of electronics embedded devices capable of sensing into the remote location and transferring the data through internet across the globe. Such devices transfers the sensitive data, which are susceptible to security attacks by the intruder and network hacker. Paper studies the existing security solutions and limitations for IoT environment and provides a pragmatic lightweight security scheme on Transmission Control Protocol (TCP) network for Remote Monitoring System devices over internet. this security scheme will aid Original Equipment Manufacturer (OEM) developing massive IoT products for remote monitoring. realtime evaluation of this scheme has been analyzed.
Autonomous driving techniques frequently need the clustering and the classification of data coming from several input sensors, like cameras, radar and lidars. these sub-tasks need to be implemented in real-time in emb...
Autonomous driving techniques frequently need the clustering and the classification of data coming from several input sensors, like cameras, radar and lidars. these sub-tasks need to be implemented in real-time in embedded on-board computing units. the trend for data classification and clustering in the signal processing community is moving towards machine learning (ML) algorithms. One of them, which plays a central role, is the k-nearest neighbors (k-NN) algorithm. To meet stringent requirements in terms of real-timecomputing capability and circuit/memory complexity, ML accelerators are needed. Innovation is required in terms of computing arithmetic since classic integer numbers lead to low classification accuracy with respect to the needs of safety critical applications like autonomous driving. Instead, floating numbers require too much circuit and memory. To overcome these issues the paper shows that the use of a new format, called Posit, implemented in a new cppPosit software library, can lead to a k-NN implementation having the same accuracy of floats, but with halved bit-size. this means that a Posit Processing Unit (PPU) reduces by a factor higher than 2 the data transfer and storage complexity of ML accelerators. We also prove that a LUT-based complete tabulated implementation of a PPU for a 8-bit requires just 64 kB storage size, compliant with memory-constrained devices.
embedded devices typically offer weak hardware and software security and yet they are often used to achieve critical tasks. Several attacks (such as buffer overflow) can bypass the default program's behaviour and ...
详细信息
ISBN:
(纸本)9783319615424;9783319615417
embedded devices typically offer weak hardware and software security and yet they are often used to achieve critical tasks. Several attacks (such as buffer overflow) can bypass the default program's behaviour and lead to arbitrary code execution. To tackle this problem, CFI (Control Flow Integrity) can be used at the cost of a significant overhead, which may not fit the embedded world's constraints. In this paper we discuss EE-CFI, an Externalized and embedded CFI solution. EE-CFI is based on the instrumentation of source-code to produce a trace of its execution path. this trace is validated by an external monitor, responsible for verifying that the code path is legitimate with regard to the CFG (Control Flow Graph) extracted at compilation time. this solution uses LLVM and is designed to be compatible withembedded constraints and adaptable to the heterogeneity of embedded devices.
暂无评论