In recent years, the wood product industry has been facing a skilled labor shortage. The result is more frequent sudden failures, resulting in additional costs for these companies already operating in a very competiti...
详细信息
As the demand for global connectivity increases, non-terrestrial networks (NTNs), particularly satellite-based systems, have gained significant attention in communication network standardization. The 3rd Generation Pa...
详细信息
ISBN:
(数字)9798331506940
ISBN:
(纸本)9798331506957
As the demand for global connectivity increases, non-terrestrial networks (NTNs), particularly satellite-based systems, have gained significant attention in communication network standardization. The 3rd Generation Partnership Project (3GPP) has been at the forefront of developing standards that incorporate satellite communications into the broader terrestrial network framework. This paper reviews the progression of NTN standardization, focusing on three key stages: (1) the use of satellites as relays or the next generation NodeBs (gNBs), (2) the integration of user plane functions (UPF) within satellites, and (3) the inclusion of control plane network functions (NFs) within satellites. These developments in standardizations reflect a shift from basic relay functions to fully integrated satellite networks.
In this article we uncover flaws and pitfalls of a quantum-based remote memory attestation procedure for Internet-of-Things devices. We also show limitations of quantum memory that suggests the attestation problem for...
详细信息
Dual-arm manipulation is a key enabler for significantly enhancing the interaction between humans and robots, and their capabilities to purposefully shape the surrounding environment. However, the spatiotemporal coord...
详细信息
ISBN:
(数字)9798331509231
ISBN:
(纸本)9798331509248
Dual-arm manipulation is a key enabler for significantly enhancing the interaction between humans and robots, and their capabilities to purposefully shape the surrounding environment. However, the spatiotemporal coordination between the motion of the hands required for this type of actions makes their planning not trivial. A proper definition of these coordination patterns moving from the human example could simplify their translation on the robot side, fostering the generation of effective bimanual tasks. In this work, we propose Multivariate functional Principal Component Analysis (MfPCA) as a mathematical tool to encode inter-hands temporal kinematic covariations in terms of principal spatiotemporal coordination patterns in the Cartesian domain. We compared these patterns extracted from a dataset of human bimanual tasks with those resulting from the usage of classical fPCA, applied indep.ndently to each hand (univariate fPCA). We found that MfPCA allows for a better classification of the tasks, with respect to a state of the art taxonomy. For what concerns motion planning, MfPCA and fPCA yield similar accuracy in the reconstruction of the motion, but with a smaller number of principal components needed in the MfPCA case. These results, although preliminary, can open interesting perspectives for the usage of MfPCA for human-like bimanual motion planning and control of robotic manipulators, as well as for action recognition, to enable a more effective human-robot interaction.
In this paper, experimental results of the in-cavity phase modulation induced by dithering PZT is reported. The dithering PZT can produce strong phase modulation, reshaping the laser output spectrum, but does not affe...
详细信息
In this paper, experimental results of the in-cavity phase modulation induced by dithering PZT is reported. The dithering PZT can produce strong phase modulation, reshaping the laser output spectrum, but does not affect the laser linewidth, which is measured by homodyne method.
作者:
Munkenyi MukhandiJorge GranjalJoão P. VilelaCISUC
Dep. of Informatics Engineering University of Coimbra Portugal CISUC
Dep. of Informatics Engineering & CRACS / INESCTEC & Dep. of Computer Science Faculty of Sciences University of Porto Portugal
We introduce a novel blockchain-based inter-ledger authorization scheme, a unique solution designed to support delegated authorization management in cross-domain cloud environments. This innovative approach enables cl...
详细信息
We introduce a novel blockchain-based inter-ledger authorization scheme, a unique solution designed to support delegated authorization management in cross-domain cloud environments. This innovative approach enables client applications, acting on behalf of a user, to request access to specific resources owned by a different organization. It benefits cross-domain multi-cloud applications, such as large-scale collaboration projects involving multiple cloud service providers. Multi-cloud presents authorization challenges because of complex access control operations in multiple distinct domains. OAuth2 is the state-of-the-art choice for delegated authorization. However, it falls short in handling such complex interactions with multiple authorization servers and resource servers, and this is our motivation. Compared to OAuth2, our approach overcomes the limitations of a centralized model and achieves coordinated distinct delegations among multiple entities without a third-party trusted component. Authorization servers are blockchain participants and designated access token issuers, ensuring minimum client data collection and promoting client privacy. Multiple smart contracts are dep.oyed in our multi-ledger blockchain environment to guarantee the provenance of the authorization operations and facilitate scalable cross-domain authorization. Our ‘hybrid inter-ledger model’, combines security techniques such as blockchain-based device authentication, hashed-time locks (HTCLs), and service discovery. The blockchain-based device authentication ensures secure and trusted interactions, HTCLs enable time-bound transactions, and service discovery simplifies finding and connecting to the required cloud services. Our experimental evaluation provides insights into the scalability of our approach, which achieves decentralized authorization in a multi-cloud environment with acceptable latencies compared to related works and shows stable throughput against concurrent authorization reque
The boundary contraction method is generalized in such a way that it is applicable to the Neumann and mixed boundary value problems over regions of irregular shape. Various variants of mixed boundary value problems ca...
详细信息
The boundary contraction method is generalized in such a way that it is applicable to the Neumann and mixed boundary value problems over regions of irregular shape. Various variants of mixed boundary value problems can be solved numerically in a unified way with mesh points fewer than those required of ADI and SOR. The method is not iterative and therefore does not require the positive definiteness of eigenvalues which is the necessary condition of the stability of ADI and SOR. The method is also applicable to exterior problems. Thus the applicability of the contraction method to problems of practical importance is substantially improved.
We propose a new statistical model of nature images named 2D joint differential image histogram (JDIH). To simulate this model, we define a kind of 2D generalized Gaussian distribution (GGD) symmetrically in every dir...
详细信息
ISBN:
(纸本)9780769535012
We propose a new statistical model of nature images named 2D joint differential image histogram (JDIH). To simulate this model, we define a kind of 2D generalized Gaussian distribution (GGD) symmetrically in every direction by extending the ID GGD function. The 2D JDIH and its estimated parameters can efficiently measure the images inner and inter correlations of local areas in a special direction or between different directions. Because the correlations in nature images behave like image textures, JDIH and DIH can measure the texture complexity of nature images and are useful in many fields of image analysis.
Human Activity Recognition (HAR) is a research area that involves wearable devices integrating inertial and/or physiological sensors to classify human actions and status across various application domains, such as hea...
详细信息
In this paper, we address the issues related to the design of fuzzy robust principal component analysis algorithms. We formulate a fuzzy objective function for principal component analysis and derive algorithms that c...
详细信息
ISBN:
(纸本)0889865361
In this paper, we address the issues related to the design of fuzzy robust principal component analysis algorithms. We formulate a fuzzy objective function for principal component analysis and derive algorithms that can extract the appropriate principal components from the spoiled data set. Artificially generated data sets are used to evaluate the performance of the proposed principal component extraction algorithm.
暂无评论