In floriculture, automatic flower harvesting through robotic machines is in recent trends. Here in this research work we have proposed a calculation mechanism for automatic flower harvesting technique using deep convo...
详细信息
The emerging technology that is the internet of things(IOT) has attracted both the industrial sector and the academic sector. In the industrial sector like transportation, healthcare, smart cities and energy systems...
详细信息
The emerging technology that is the internet of things(IOT) has attracted both the industrial sector and the academic sector. In the industrial sector like transportation, healthcare, smart cities and energy systems, this IOT technology will be important. However,there are many problems to be solved. One of the problems is that security must be guaranteed. For safe security, we are considering two privacy issues which are mostly encountered in the field of IOT that is device authentication and decentralized identifiers. To provide device authentication and decentralized identifiers, the Blockchain technology can be applied to. This paper survey the related work for device authentication and decentralized identifiers in the IOT.
L-System and Extended L-System for pathfinding is an approach to exploring unexplored land. However, this covers only a few cases. In this study, we propose general solutions for 2 and 3-dimensional exploration. We us...
详细信息
L-System and Extended L-System for pathfinding is an approach to exploring unexplored land. However, this covers only a few cases. In this study, we propose general solutions for 2 and 3-dimensional exploration. We use the Genetic Algorithm(GA) as an L-Systems' grammar modifier that combines with a spherical coordinate system to calculate the next growth position. By using GA, we can quickly develop 3D exploration for flying agents by adding new genes. In this paper, the experiments were done separately between walking agents and flying agents' exploration. The experimental results are validated and performed in the simulation system. The performance is verified by calculating the percentage of the coverage area, the execution time and the shortest path distance. In this research, by using GA the distance of the explored path is reducing — however, it takes longer execution time.
Security has emerged to be a concerning issue in cloud computing as numerous sensitive data are processed and transferred over the cloud servers. In this paper, a variable length key based security mechanism has been ...
详细信息
ISBN:
(数字)9781728160528
ISBN:
(纸本)9781728160535
Security has emerged to be a concerning issue in cloud computing as numerous sensitive data are processed and transferred over the cloud servers. In this paper, a variable length key based security mechanism has been designed, developed, and implemented by using the Advanced Encryption Standard (AES) protocol for the secured delivery of cloud data which also works as SaaS (Software as a Services). The length of the used key is given as input by the user followed by the selection of a secret key which is fed into the AES cryptographic system with the desired cloud data message thus producing the Cipher text that is to be transmitted to the destination. In the receiver end, the reverse process is performed with the same key on the received Cipher text and the plaintext is retrieved. Using Python to implement and validate the security process, several messages from cloud users are used and the result for each input is analyzed. The result of our study is then compared with the two existing approaches which clearly shows the advancement of the proposed approach. This process can be applied in any secured electronic message transactions for cloud data.
Today's autonomous vehicles will deploy multiple sensors to achieve safe and reliable navigation and precise perception of the environment. Although multiple sensors can be advantageous in terms of providing a rob...
详细信息
ISBN:
(数字)9781728160597
ISBN:
(纸本)9781728160603
Today's autonomous vehicles will deploy multiple sensors to achieve safe and reliable navigation and precise perception of the environment. Although multiple sensors can be advantageous in terms of providing a robust and complete description of the surrounding area, the synchronization of multi-sensors in real-time processing is extremely important. When data is synchronized, primary functional systems such as localization, perception, planning, and control, will all benefit. In this paper, we proposed a synchronized data illustration and collection method to assist the data processing applications for autonomous driving. Our proposed solution among different sensors can be directly deployed on autonomous vehicles for data integration and environment analysis to support the driving model construction. The experimental results validate that our proposed method can present a 360° synchronized view while providing the capability of real-time scanning with up to 80% reduced latency.
Recently, drones have been widely used in education and industry. In this paper, we propose a navigation and control algorithm to develop unmanned drones quickly. To limit the proposed framework, we analysed the exist...
详细信息
Recently, drones have been widely used in education and industry. In this paper, we propose a navigation and control algorithm to develop unmanned drones quickly. To limit the proposed framework, we analysed the existing drone solution and simulation framework. We also used Hardware-in-the-Loop(HIL) simulation for rapid development. HIL will simulate physical systems that interface with embedded control equipment on real-time hardware. The code generated in this process can be experimented on a hardware device so that the control performance of the drones can be verified without draining the drones in the outdoor environment. Using the proposed method, you save time and money on drone development while providing stability.
With the worldwide rapid development of 5 G networks, haptic communications, a key use case of the 5 G, has attracted increasing attentions nowadays. Its human-in-the-loop nature makes quality of experience(QoE) the l...
详细信息
With the worldwide rapid development of 5 G networks, haptic communications, a key use case of the 5 G, has attracted increasing attentions nowadays. Its human-in-the-loop nature makes quality of experience(QoE) the leading performance indicator of the system design. A vast number of high quality works were published on user-level, application-level and network-level QoE-oriented designs in haptic communications. In this paper, we present an overview of the recent research activities in this progressive research area. We start from the QoE modeling of human haptic perceptions, followed by the application-level QoE management mechanisms based on these QoE models. High fidelity haptic communications require an orchestra of QoE designs in the application level and the quality of service(QoS) support in the network level. Hence, we also review the state-of-the-art QoS-related QoE management strategies in haptic communications, especially the QoS-related QoE modeling which guides the resource allocation design of the communication network. In addition to a thorough survey of the literature, we also present the open challenges in this research area. We believe that our review and findings in this paper not only provide a timely summary of prevailing research in this area, but also help to inspire new QoE-related research opportunities in haptic communications.
The authors are trying to construct a real-time vital sensing system during exercise based on image-assisted routing. In order to estimate locations of target exercisers based on image processing required for multi-ho...
详细信息
The authors are trying to construct a real-time vital sensing system during exercise based on image-assisted routing. In order to estimate locations of target exercisers based on image processing required for multi-hop networking, robust personal identification is indispensable because visual target tracking executed after detection sometimes fails in practical scenes. To solve this problem, dynamic relocation of UAVs to obtain visual cues to identify who is a target is adopted to our system. In this paper, a CG-based simulator that has functions necessary for evaluation of dynamic relocation algorithm of UAVs. Experimental results using a basic scenario show that the implemented simulator works well.
Absolute moment block truncation coding(AMBTC) is an effective compression algorithm that has been widely used for signal compression due to its simple calculation and reasonable compression *** is an improved version...
详细信息
Absolute moment block truncation coding(AMBTC) is an effective compression algorithm that has been widely used for signal compression due to its simple calculation and reasonable compression *** is an improved version of Block Truncation Coding(BTC),obtained by preserving absolute moments rather than a standard *** recent years,due to the rapid development of the Internet and the focus of information security,people began to study how to hide data in the compressed *** AMBTC-based data hiding schemes have been proposed to address the problem of message *** this paper,various AMBTC-based data hiding methods are studied and analyzed,and the characteristics,image quality and embedding capacity of each method are compared and discussed.
Multi-layer decision fusion (MLDF) is an important method in smart surveillance system for a robust decision-making about objects behavior. Grey System Theory has recently attracted substantial interest in wide resear...
详细信息
ISBN:
(数字)9781728101378
ISBN:
(纸本)9781728101385
Multi-layer decision fusion (MLDF) is an important method in smart surveillance system for a robust decision-making about objects behavior. Grey System Theory has recently attracted substantial interest in wide research areas. Grey Mixed Center Point Triangular Whitening Functions} (GMCPTWF) approach for decision fusion is presented in this paper to perform multi-layer decision fusion. After features are extracted from trajectory of the object of interest, three reference behavior vectors are constructed Three behavior categories under consideration in this paper are: abnormal, unknown, and normal. These vectors are utilized to train the system, and are used as an input for the decision-making subsystem. Finally, multi-layer decision fusion is performed GMCPTWF of three classes are tested by eighteen trajectories. The experiment on eighteen trajectories which are classified into three categories proves that this method can effectively improve the decision making performance.
暂无评论