The Robotic Mobile Fulfillment System (RMFS) is an automated technology to fulfill various types of orders (e.g., vehicle assembly) in modern warehouses or factories. In particular, battery-equipped mobile robots move...
详细信息
ISBN:
(数字)9798350387957
ISBN:
(纸本)9798350387964
The Robotic Mobile Fulfillment System (RMFS) is an automated technology to fulfill various types of orders (e.g., vehicle assembly) in modern warehouses or factories. In particular, battery-equipped mobile robots move racks that contain various components (Stock Keeping Unit) by visiting replenishment or picking stations to complete orders. We formulate the preliminary system model to optimize the order throughput and energy consumption of mobile robots, which consists of (i) rack allocation, (ii) task allocation, and (iii) route routing.
With its capacity to automate processes and controls, smart technology finds application in areas ranging from any industry to health care, helping to improve efficiency and optimise performance. These devices are mad...
详细信息
In an era where image manipulation is easily accessible, detecting digital image forgery has become more challenging. The manuscript delves into the essential issue of picture forgery and discusses the use of the stan...
详细信息
ISBN:
(纸本)9798350319552;9798350319545
In an era where image manipulation is easily accessible, detecting digital image forgery has become more challenging. The manuscript delves into the essential issue of picture forgery and discusses the use of the standard Adaptive Neuro-Fuzzy Inference System (ANFIS) and some of its variants for identifying and analyzing altered digital image content. Although ANFIS is a well-known technique, its use for such problems has not been explored so far, to the best of our knowledge. The proposed methodology uses feature extraction to get the numerical input to ANFIS. Unlike deep learning techniques, most ANFIS schemes have the advantage of being interpretable, without requiring a long training time and ensuring a good performance. Compared to state-of-the-art techniques in the deep learning realm, the proposed method turned out to work well with several forgery datasets. It offers a viable solution for real-time detection, paving the way for future applications in digital content authentication.
The proceedings contain 28 papers. The topics discussed include: real-time route planning to reduce pedestrian pollution exposure in urban settings;improving the validation of automotive self-learning systems through ...
ISBN:
(纸本)9798400704734
The proceedings contain 28 papers. The topics discussed include: real-time route planning to reduce pedestrian pollution exposure in urban settings;improving the validation of automotive self-learning systems through the synergy of scenario-based testing and metamorphic relations;EPSAPG: a pipeline combining MMseqs2 and PSI-BLAST to quickly generate extensive protein sequence alignment profiles;sleep well: pragmatic analysis of the idle states of intel processors;workload-aware cache management of bitmap indices;a framework for profiling spatial variability in the performance of classification models;privacy-preserving intrusion detection system for internet of vehicles using split learning;an approach for dynamic behavioral prediction and fault injection in cyber-physical systems;and cardiotocography signal abnormality detection based on deep semi-unsupervised learning.
Recent advances in the field of deep learning technologies have made it possible to develop practical video analysis systems with embedded platform that are more accurate and faster than prior embeddedsystems based o...
详细信息
Multiprocessor resource synchronization and locking protocols are of great importance to utilize the computation power of multiprocessor real-timesystems. Hence, in the past decades a large number of protocols have b...
详细信息
ISBN:
(纸本)9781665441889
Multiprocessor resource synchronization and locking protocols are of great importance to utilize the computation power of multiprocessor real-timesystems. Hence, in the past decades a large number of protocols have been developed and analyzed. The recently proposed dependency graph approach has significantly improved the schedulability for frame-based and periodic real-time task systems. However, the dependency graph approach only supports non-nested resource access, i.e., each critical section can only access one shared resource. In this paper, we develop a dependency graph based protocol that allows nested resource access, where a critical section can access multiple shared resources at the same time. First, constraint programming is applied to construct a dependency graph that determines the execution order of critical sections. Afterwards, a schedule is generated based on this order. To show the feasibility of our proposed protocol, we provide extensive numerical evaluations under different configurations. The evaluation results show that our approach has very good performance with respect to schedulability for frame-based and periodic realtime task systems, whereas the existing results applicable for sporadic task systems have worse performance under such a limited setting.
On-board computing capacity remains a key bottleneck in modern machine inference pipelines that run on embedded hardware, such as aboard autonomous drones or cars. To mitigate this bottleneck, recent work proposed an ...
详细信息
ISBN:
(纸本)9781665441889
On-board computing capacity remains a key bottleneck in modern machine inference pipelines that run on embedded hardware, such as aboard autonomous drones or cars. To mitigate this bottleneck, recent work proposed an architecture for segmenting input frames of complex modalities, such as video, and prioritizing downstream machine perception tasks based on criticality of the respective segments of the perceived scene. Criticality-based prioritization allows limited machine resources (of lower-end embedded GPUs) to be spent more judiciously on tracking more important objects first. This paper explores a novel dimension in criticality-based prioritization of machine perception;namely, the role of criticalitydependent image resizing as a way to improve the trade-off between perception quality and timeliness. Given an assessment of criticality (e.g., an object's distance from the autonomous car), the scheduler is allowed to choose from several image resizing options (and related inference models) before passing the resized images to the perception module. Experiments on an AI-powered embedded platform with a real-world driving dataset demonstrate significant improvements in the trade-off between perception accuracy and response time when the proposed resizing algorithm is used. The improvement is attributed to two advantages of the proposed scheme: (i) improved preferential treatment of more critical objects by reducing time spent on less critical ones, and (ii) improved image batching within the GPU, thanks to re-sizing, leading to better resource utilization.
Designing mixed-critical systems that provide both safety-critical and best-effort functions is a major challenge. In embeddedsystems, hypervisors are increasingly used to separate sensitive real-time tasks from best...
详细信息
ISBN:
(纸本)9798350393613
Designing mixed-critical systems that provide both safety-critical and best-effort functions is a major challenge. In embeddedsystems, hypervisors are increasingly used to separate sensitive real-time tasks from best-effort applications. To take advantage of hypervisors at the application level as well, there is an emerging trend to split large applications into multiple guest domains to make the software easier to analyze and maintain. However, having more partitions leads to increased communication overhead between guest domains, increasing the impact of latencies on performance. In this article, we propose a framework for Inter-Domain Communication (IDC) to tackle these issues by reducing IDC latencies. It is built upon established open-source implementations of the VIRTIO and RPMsg specifications, allowing to reuse existing drivers for guest OS or bare-metal software. We can show latency improvements of up to 3x compared to UDP communication between two guests, even faster than UDP communication using the loopback interface within one Linux guest. Splitting applications into separate guest domains is discussed, as a trace-off between communication latency and computational complexity exists. Further a service-oriented example application is analyzed, where our approach can lead to improvements through inherent concurrency. In addition, we demonstrate how to extend the original peer-to-peer scheme with a router component to allow multiple guests to exchange data.
Safety-critical real-timesystems must be carefully designed to guarantee both functional and temporal correctness. State-of-the-art approaches to achieve this are often based on formal notations capturing both the de...
详细信息
ISBN:
(数字)9781665497992
ISBN:
(纸本)9781665497992
Safety-critical real-timesystems must be carefully designed to guarantee both functional and temporal correctness. State-of-the-art approaches to achieve this are often based on formal notations capturing both the desired functionality and relevant timing properties. This work is concerned with the design of embedded software systems for emerging fields such as the Urban Air Mobility (UAM) sector. In this context, it deals with scenarios that benefit from a less formal programming model, but for which guarantees on functional and timing behavior must still be provided. We propose a concept to specify and simulate the behavior of embeddedreal-time software in a deterministic manner. It combines the Logical Execution time (LET) paradigm with a flexible, code-based approach for behavior specification and performs discrete-event (DE) simulations to determine how exactly the designed system responds to given stimuli. We describe this concept, present a reference implementation using Ptolemy II as simulation backend, and discuss its application to a pilot assistance system from the UAM sector.
Owing to the popularity and miniaturization for the embeddedsystems, many types of sensors are integrated with the embeddedsystems as the smart sensors by the electronic manufacturers, and thus the uses can apply th...
详细信息
暂无评论