This paper presents the communication related design considerations of Wireless Sensor Network (WSN) aided Multi-Robot Simultaneous Localization and Mapping (SLAM). In this approach, multiple robots perform WSN-aided ...
详细信息
This paper presents the communication related design considerations of Wireless Sensor Network (WSN) aided Multi-Robot Simultaneous Localization and Mapping (SLAM). In this approach, multiple robots perform WSN-aided cooperative SLAM using only range values to landmarks in the environment by measuring the Received Signal Strength Indicator (RSSI) of the received radio messages, and odometry information. The SLAM algorithm proposed in this study uses the Rao-Blackwellized Particle Filters. In addition, the inherent communication problems in WSNs, and their effects on cooperative SLAM are explained in detail and shown with the results of The Network Simulator (ns-2) simulations.
The functional programs are the recursive functions. Therefore, the paper primarily discuss all the forms having the recursive function. For the data structures, such as the lists, the following forms are available: t...
详细信息
This paper presents a novel approach of using unmanned vehicles for Automated Meter Reading (AMR) applications in rural areas where there are a few consumers scattered around a wide area. The proposed system does not ...
详细信息
This paper presents a novel approach of using unmanned vehicles for Automated Meter Reading (AMR) applications in rural areas where there are a few consumers scattered around a wide area. The proposed system does not require a fixed network infrastructure to transfer data to a central database, since data collection is carried out by unmanned vehicles. Compared to traditional meter reading systems, the use of unmanned vehicles for AMR brings several advantages, such as low cost operation, flexibility, and online system management. However, the realization of these potential gains directly depends on reliable communication capabilities of the deployed system and successful navigation of unmanned vehicles. Overall, in this paper, the design principles and challenges of using unmanned vehicles for AMR applications in rural areas have been presented. Also, the communication architecture of the proposed system has been explained and comparative simulation studies have been performed in terms of energy efficiency and navigation accuracy.
The functional programs are the recursive functions. Therefore, the paper primarily discuss all the forms having the recursive function. For the data structures, such as the lists, the following forms are available: t...
详细信息
The functional programs are the recursive functions. Therefore, the paper primarily discuss all the forms having the recursive function. For the data structures, such as the lists, the following forms are available: the parallel recursion, inter-recursion, and the recursion of high level. The paper has exposed each form on the LISP language, being the classic functional language as well as the ground for the development of all other languages. The verification for the forms of the recursive functions was adopted with structural and transfinite induction methods. The analysis describe combined induction technique and its algorithm is discussed which is used for verification for such complex functions, arguments of which are again the recursive functions. The discussed verification method of the programs those being offered for the functional languages was applied for the imperative paradigm languages, in particular for Language C and more precisely for C subset (consider that the C program consists of the assigning, optional and cycle operators only).
A new approach for segmenting different anatomical regions in dental Computed Tomography (CT) studies is presented in this paper. It is expected that the proposed approach will help automate different tissues regions ...
详细信息
A new approach for segmenting different anatomical regions in dental Computed Tomography (CT) studies is presented in this paper. It is expected that the proposed approach will help automate different tissues regions by providing initial boundary points for deformable models or seed points for split and merge segmentation algorithms. Preliminary results obtained for dental CT studies of dentate and edentulous human-mandible are presented with finite element models divided by tetrahedral elements, which built based on actual CT data combined with triangulation equations. Identification of different anatomical regions set for mandible cortical and cancellous bones by generated 3D models by marching cubes technique.
In this paper, a new approach for computing different anatomical regions in dental Computed Tomography (CT) is presented. The approach consists of two steps. First, a HU threshold window sets to separate between diffe...
详细信息
In this paper, a new approach for computing different anatomical regions in dental Computed Tomography (CT) is presented. The approach consists of two steps. First, a HU threshold window sets to separate between different regions upon their gray-level values; second, a set of objects are generated and texture descriptors are calculated for selected windows from the image data sample. Finally, identification of different anatomical regions set for mandible bones to determine the cystic lesion volume based on numerical methods. Preliminary results obtained for dental CT of female patient aged 14 years old complaining of bilateral swelling in her mandible are presented.
The standard IEC/EN 61508 defines the requirements for safety systems to be applied to industrial plant safety independently of the application. It is not only intended as a basis for the development of future applica...
详细信息
ISBN:
(纸本)9784883254194
The standard IEC/EN 61508 defines the requirements for safety systems to be applied to industrial plant safety independently of the application. It is not only intended as a basis for the development of future application orientated standards, but also as a basis of all safety related electrical, electronic and programmable electronic systems, in order to apply it to safety critical applications. The purpose of this paper is to describe the SILCas tool which enables the user to determine the Safety Integrity Level (SIL) and the probability of failure on demand (PFD) for entire SIFs (consisting of sensor, signal processing, actuator) and for different system architectures.
The scientific computing manages massive amounts of very large data sets. The development of description of the format, structure and semantic content of data is essential for the automatic manipulation of data. The a...
详细信息
This paper presents a new tuning method based on model parameters identified in closed-loop. For classical controllers such as PI(D) controllers a large number of simple tuning methods for various application areas ex...
详细信息
ISBN:
(纸本)9781849192521
This paper presents a new tuning method based on model parameters identified in closed-loop. For classical controllers such as PI(D) controllers a large number of simple tuning methods for various application areas exist. However, when it comes to designing a generalised predictive controller (GPC) four parameters have to be specified. To choose those parameters is not a trivial task since they are not directly related to control or regulation performance. The presented tuning method exploits model-parameters to select suitable controller parameters. Additionally, a Rhinehart filter is incorporated in the design to decrease the impact of noise, therefore, a fifth parameter has to be optimised. The proposed method has been tested in simulation and on a real system.
暂无评论