The introduction of robotics technology within endovascular surgical procedures has realised accurate catheter navigation and reduced surgeon irradiation. Insufficient force information from the catheter remains a lim...
详细信息
ISBN:
(纸本)9781479900886;9781479900879
The introduction of robotics technology within endovascular surgical procedures has realised accurate catheter navigation and reduced surgeon irradiation. Insufficient force information from the catheter remains a limitation for significant improvement in the performance of these procedures. While recent developments of catheter tip-force measurement sensors have witnessed a notable outcome, packaging complexities and sensor size constraints limit their application. This work presents an approach to catheter tip-force measurement during endovascular surgery simulation. Image processing and photoelasticity are utilized to measure arterial stress and morphological deformation in a carotid artery segment model. Deformation is measured in real-time and conveyed to the user as haptic feedback during tele-operation of a robotic catheter insertion system. A preliminary single user study was completed to realise the potential of force feedback as it is correlated to the level of deformation and stress in the artery model. The results of this haptic feedback are compared with experimental results of the same operator manually inserting the catheter, and also using a computer graphical-user-interface to control the catheter insertion system.
sensors localization has become an essential issue in wireless sensornetworks. This paper presents a decentralized localization algorithm that makes use of radio-location fingerprinting and kernel methods. The propos...
详细信息
ISBN:
(纸本)9781479936878
sensors localization has become an essential issue in wireless sensornetworks. This paper presents a decentralized localization algorithm that makes use of radio-location fingerprinting and kernel methods. The proposed algorithm consists of dividing the network into several zones, each of which having a calculator capable of emitting, receiving and processing data. By using radio-information of its zone, each calculator constructs, by means of kernel methods, a model estimating the nodes positions. Calculators estimates are then combined together, leading to final position estimates. Compared to centralized methods, this technique is more robust, less energy consuming, with a lower processing complexity.
The area of body sensornetworks has recently attracted many researchers due to its potential to revolutionize medicine. These sensors are usually implanted inside the human body and communicate among themselves. In t...
详细信息
Analyses on traffic flow require accurate time-varying local traffic density information in order to effectively determine inflows to and outflows from freeway segments in several aspects of network traffic control. I...
详细信息
The existing communication schemes are often unusable in natural disasters and public emergencies. But requirements of information collection and data transmission in emergency scenario are very imperative. Thus, sens...
详细信息
The existing communication schemes are often unusable in natural disasters and public emergencies. But requirements of information collection and data transmission in emergency scenario are very imperative. Thus, sensornetworks ad hoc networks are required in the emergency communication systems. For example, rescue vehicles equipped with wireless communication devices, sensors, and cameras are regularly used to collect and transmit the real-time information for the rescue action. The paper focuses on security solutions for the vehicular ad hoc networks (VANETs) in the emergency communication cases, in which the communication infrastructures are not always available. An expedite privacy-preserving emergency communication (EPEC) scheme is presented for the vehicles to securely connect with the others in the neighbor area even when the trusted infrastructures are destroyed by the disaster. EPEC satisfies conditional privacy preservation requirements, in which both lightweight signature and batch verification are employed to provide efficiency. We also show the proof of the security, feasibility, and efficiency of our EPEC by the theoretical and experimental analyses.
It is important to detect an odor in the human living space and artificial electronic noses have been developed. This paper considers an array sensing system of odors and adopts a layered neural network for classifica...
详细信息
It is important to detect an odor in the human living space and artificial electronic noses have been developed. This paper considers an array sensing system of odors and adopts a layered neural network for classification. We use all measurement data obtained from fourteen metal oxide semiconductor gas (MOG) sensors. Some sensors are not sensitive while others are sensitive. In order to classify odors, we use data from all fourteen sensors even if some of them are not sensitive so much. We will propose three methods to use the data by insensitive sensors to find the features of odors. Then, applying those features to a layered neural network, we will compare the classification results.
Environment monitoring and control is the next evolutionary development step in building, utilities, industrial, home, shipboard and transportation systems automation. Wireless sensor network technologies are becoming...
详细信息
ISBN:
(纸本)9781479916061
Environment monitoring and control is the next evolutionary development step in building, utilities, industrial, home, shipboard and transportation systems automation. Wireless sensor network technologies are becoming increasingly essential in the arena of smart homes to provide the residents with various intelligent services. However, due to their limited energy and hardware capabilities (storage, communication and processing), WSNs are not so popular. In this paper, an IEEE 802.15.4 based intelligent network prototype has been designed, implemented and tested for automatic temperature monitoring and control in smart homes. The system is designed considering the limited power, storage, processing power and bandwidth of sensor nodes.
This paper presents a power-management infrastructure, referred to as Smart Drivers, devised for efficiently managing the data sensing phase in a wireless sensor network (WSN). The key idea is that the data sensing ph...
详细信息
This paper presents a power-management infrastructure, referred to as Smart Drivers, devised for efficiently managing the data sensing phase in a wireless sensor network (WSN). The key idea is that the data sensing phase can be logically decoupled from data processing, which can be in turn decoupled from data transmission, the last being already done in classical approaches of data aggregation. By decoupling data sensing from data processing, applications can delegate the Smart Driver infrastructure to collect a certain number of samples from the sensors in a power-efficient mode and to wake up the system in full-active mode once a given number of measures have been collected, so that the process that required the bunch of measures can analyze them and eventually transmit the result of the analysis. Results show that, since data sensing periods in WSN applications are typically much longer than processing period, the smart driver paradigm strongly reduce the overall energy consumption of the system.
We address the problem of in-network informationprocessing, storage, and retrieval in three-dimensional (3D) sensornetworks in this research. We propose a geographic location free double-ruling-based scheme for larg...
详细信息
ISBN:
(纸本)9781467359467
We address the problem of in-network informationprocessing, storage, and retrieval in three-dimensional (3D) sensornetworks in this research. We propose a geographic location free double-ruling-based scheme for large-scale 3D sensornetworks. The proposed approach does not require a 3D sensor network with a regular cube shape or uniform node distribution. Without the knowledge of the geographic location and the distance bound, a data query simply travels along a simple curve with the guaranteed success to retrieve aggregated data through time and space with one or different types across the network. Simulations and comparisons show the proposed approach with low cost and a balanced traffic load.
The Internet-based security Soft-i-Robot is modeled using Soft computing paradigms for problem solving and decision-making in complex and ill-structured situations. Soft-i-Robot monitors the workspace with multimedia ...
详细信息
ISBN:
(纸本)9781479925834
The Internet-based security Soft-i-Robot is modeled using Soft computing paradigms for problem solving and decision-making in complex and ill-structured situations. Soft-i-Robot monitors the workspace with multimedia devices and sensor using an Internet application program. The model has sensory subsystems such as Intruder detection which, detects intruder, captures image and sends to server, and an Obstacle Avoidance Unit to detect the objects in the path of the mobile robot. These multiple features with hybrid Soft computing techniques depart the developed Soft-i-Robot from the existing developments, proving that the streaming technology-based approach greatly improves the sensibility of robot tele-operation. The relatively powerful online robots available today provoke the simple question, in terms of two competing goals: recognition accuracy and computing time. Improved recognition accuracy and reduced computing time for face recognition of the intruder is obtained using Morphological Shared Weight Neural Network. To obtain a collision-free optimized path, Soft-i-Robot uses derivative free Genetic Algorithm. With rapid expansion of Robotics and Soft computing paradigms, robotic technology touches upon self-understanding of humans, socio-economic, legal and ethical issues leading to improved performance rate and informationprocessing capabilities.
暂无评论