Internet-of-things (IoT) is an enabling technology in the fourth generation industrial revolution. An unified performance metric named age of information (AoI) is introduced to quantify the freshness of data and its a...
详细信息
This paper presents new designs of graph convolutional neural networks (GCNs) on 3D meshes for 3D object segmentation and classification. We use the faces of the mesh as basic processing units and represent a 3D mesh ...
详细信息
The use of unmanned aerial vehicle (UAV) as a dynamic node in point to point communication of 5G and beyond 5G cellular networks is an emerging technology. It provides a reliable and efficient mode of wireless communi...
详细信息
There are large amount of valuable video archives in Video Home System (VHS) format. However, due to the analog nature, their quality is often poor. Compared to High-definition television (HDTV), VHS video not only ha...
详细信息
The COVID-19 (Coronavirus disease 2019) pandemic has become a major global threat to human health and well-being Thus, the development of computer-aided detection (CAD) systems that are capable to accurately distingui...
详细信息
The smart manufacturing system can become a linked network with the help of the Internet of Things (IoT). Devices connected to the IoT are susceptible to various attacks and assaults. An effective protection plan is n...
The smart manufacturing system can become a linked network with the help of the Internet of Things (IoT). Devices connected to the IoT are susceptible to various attacks and assaults. An effective protection plan is needed to ensure that the billions of IoT nodes are protected from these hazards. The security mechanisms on IoT devices are ineffective due to resource limitations. As a result, the academic community has recently paid attention to the cloud-, fog-, and edge-based IoT systems. A robust cloud provider is in the cloud or fog to perform computationally demanding activities, including safety, data analysis, decision-making process, and monitoring. Hash identities and upgraded Rivest–Shamir–Adleman (RSA) have been used to secure the IoT device’s data. A four-prime integer of 512 bits makes up the proposed security algorithm. A hash signature is used to provide device authentication. An effective clustering method for sensing devices based on the node level, separation from the clusters, remaining energy, and fitness has been presented for long network life. The suggested swarm-based method determines the sensor nodes’ fitness. A deep neural network- (DNN-) based resource scheduling algorithm (DNN-RSM) is meant to reduce the delay and communications overhead for IoT components in the hybrid cloud system. For optimum resource allocation, all queries originating from the cluster head are categorised using DNN based on their storage, processing, and bandwidth needs. The suggested structure delivers better outcomes, particularly regarding energy use, delay, and safety level. The results of the simulation provide credence to the concept that the proposed strategy is superior to the current system. The suggested scheme includes stringent security, decreased energy usage, decreased latency, and efficient resource utilization.
Anomaly detection has wide applications in machine intelligence but is still a difficult unsolved problem. Major challenges include the rarity of labeled anomalies and it is a class highly imbalanced problem. Traditio...
详细信息
Internet-of-things (IoT) is an enabling technology in the fourth generation industrial revolution. An unified performance metric named age of information (AoI) is introduced to quantify the freshness of data and its a...
详细信息
This work describes a virtual reality (VR) based robot teleoperation framework which relies on scene visualization from depth cameras and implements human-robot and human-scene interaction gestures. We suggest that mo...
ISBN:
(数字)9781728160757
ISBN:
(纸本)9781728160764
This work describes a virtual reality (VR) based robot teleoperation framework which relies on scene visualization from depth cameras and implements human-robot and human-scene interaction gestures. We suggest that mounting a camera on a slave robot's end-effector (an in-hand camera) allows the operator to achieve better visualization of the remote scene and improve task performance. We compared experimentally the operator's ability to understand the remote environment in different visualization modes: single external static camera, in-hand camera, in-hand and external static camera, in-hand camera with OctoMap occupancy mapping. The latter option provided the operator with a better understanding of the remote environment whilst requiring relatively small communication bandwidth. Consequently, we propose suitable grasping methods compatible with the VR based teleoperation with the in-hand camera. Video demonstration: https://***/3vZaEykMS_E.
Micro Aerial Vehicles (MAVs) navigation in subterranean environments is gaining attention in the field of aerial robotics, however there are still multiple challenges for collision free navigation in such harsh enviro...
详细信息
Micro Aerial Vehicles (MAVs) navigation in subterranean environments is gaining attention in the field of aerial robotics, however there are still multiple challenges for collision free navigation in such harsh environments. This article proposes a novel baseline solution for collision free navigation with Nonlinear Model Predictive Control (NMPC). In the proposed method, the MAV is considered as a floating object, where the velocities on the x, y axes and the position on altitude are the references for the NMPC to navigate along the tunnel, while the NMPC avoids the collision by considering kinematics of the obstacles based on measurements from a 2D lidar. Moreover, a novel approach for correcting the heading of the MAV towards the center of the mine tunnel is proposed, while the efficacy of the suggested framework has been evaluated in multiple field trials in an underground mine in Sweden.
暂无评论