The fault detection and classification are a prediction model that employs the sensor equipment data to detect if each wafer is healthy or faulty which is significant to attain a greater yield. However, the manufactur...
详细信息
In the era of centralized clouds, multi-cloud, and edge computing, adaptable observability is essential to efficiently manage the growing volume of metrics data. Observability Volume Manager (OVM) addresses the comple...
详细信息
Social navigation is a key consideration for integrating robots into human environments. Concurrently, it imposes heightened requisites: tasks must not only be executed succesfully without collisions, but also adhere ...
详细信息
ISBN:
(纸本)9798350377712;9798350377705
Social navigation is a key consideration for integrating robots into human environments. Concurrently, it imposes heightened requisites: tasks must not only be executed succesfully without collisions, but also adhere to principles encompassing comprehensibility, courtesy, social compliance, comprehension, foresight, and scenario compliance. In this paper, we present the incorporation of social norms as a guiding framework for robot navigation within social contexts. We adopt field theory to provide a formal elucidation of the social norms, using Physical-Informed Neural Network (PINN) to predict pedestrian movement under the influence of social norms, respectively, and using Reinforcement Learning (RL) for navigation. We use supervised learning to train the pedestrian velocity field prediction model and reinforcement learning to train the navigation policy. We conduct three parts of experiments: (1) analyzing the spatiotemporal characteristics of the velocity field in the walking pedestrians dataset;(2) evaluating the accuracy of the vector field prediction in the pedestrian dataset;(3) using Gazebo simulation and the PEDSIM library to evaluate the improvement of navigation performance under constraints of social norms. Experiments have confirmed that the pedestrian motion data set indeed satisfies the Gaussian divergence theorem and can be described by the concept of field. The performance of navigation strategies incorporating social rules has been improved to a certain extent.
The proceedings contain 310 papers. The topics discussed include: evaluation of grasp quality measures in real grasps;trust the robot! enabling flexible collaboration with humans via multi-sensor data integration;towa...
ISBN:
(纸本)9798350361230
The proceedings contain 310 papers. The topics discussed include: evaluation of grasp quality measures in real grasps;trust the robot! enabling flexible collaboration with humans via multi-sensor data integration;towards web platform for cloud-based virtual commissioning of IEC 61499 distributed automation systems;mapping, analysis and simulation on the use of time-sensitive networking in digital substations;impact of compilation optimization levels on execution time variability;a hardware-agnostic approach to supervise heterogeneous autonomous mobile robots;integrating systems of record (SOR) into the asset administration shell (AAS) dataspace;and graph-based change impact visualization for agile cyber-physical production systems engineering.
Optimising routing in Wireless sensor Networks (WSNs) is crucial for enhancing their performance, with a focus on energy conservation, reliable data transmission, and network stability. This research presents a unique...
详细信息
Industrial wireless sensor networks (IWSNs) are indispensable for Industry 4.0. However, limited to the resource of sensor nodes, designing an effective and secure authentication protocol for real-time data access in ...
详细信息
ISBN:
(纸本)9781665473156
Industrial wireless sensor networks (IWSNs) are indispensable for Industry 4.0. However, limited to the resource of sensor nodes, designing an effective and secure authentication protocol for real-time data access in IWSNs is full of challenges. In addition, existing protocols fail to balance security and performance for real-time access to IWSNs simultaneously. Thus, we design an efficient authentication key agreement protocol using the physical unclonable function (PUF), elliptic curve cryptography (ECC), and smart contract. We perform formal security analysis under the random oracle model and demonstrate that our protocol meets the basic requirements. Rinkeby, an online Ethereum test network, is used to test the smart contract. Finally, we evaluate computation, communication and storage costs with several similar protocols. The results show that our protocol can provide a higher level of security and the lowest storage cost.
Bitcoin is the leading cryptocurrency with the highest market value among digital currencies. Therefore, predicting the value of Bitcoin can help to understand the entire cryptocurrency market. However, Bitcoin has ha...
详细信息
This Smart homes and self-driving vehicles are using sensor networks increasingly in the IoT era. However, handling these systems' massive data sets and letting them make informed judgments is difficult. Reinforce...
详细信息
This paper provided empirical knowledge of the user experience for using collaborative visualization in a distributed asymmetrical setting through controlled user studies. With the ability to access various computing ...
详细信息
ISBN:
(纸本)9798350348156
This paper provided empirical knowledge of the user experience for using collaborative visualization in a distributed asymmetrical setting through controlled user studies. With the ability to access various computing devices, such as Virtual Reality (VR) head-mounted displays, scenarios emerge when collaborators have to or prefer to use different computing environments in different places. However, we still lack an understanding of using VR in an asymmetric setting for collaborative visualization. To get an initial understanding and better inform the designs for asymmetric systems, we first conducted a formative study with 12 pairs of participants. All participants collaborated in asymmetric (PC-VR) and symmetric settings (PC-PC and VR-VR). We then improved our asymmetric design based on the key findings and observations from the first study. Another ten pairs of participants collaborated with enhanced PC-VR and PC-PC conditions in a follow-up study. We found that a well-designed asymmetric collaboration system could be as effective as a symmetric system. Surprisingly, participants using PC perceived less mental demand and effort in the asymmetric setting (PC-VR) compared to the symmetric setting (PC-PC). We provided fine-grained discussions about the trade-offs between different collaboration settings.
In the field of computing, the importance of efficient load distribution across multiple server environments has become paramount, especially in the context of ensuring high availability and reliability of web service...
详细信息
暂无评论