Gaining accurate channel state information (CSI) through a low-cost scheme has always been difficult in wireless communication systems. One of the current research directions is to obtain the CSI from the channel know...
详细信息
This Letter proposes an improved Camshift algorithm based on the efficient channel attention (ECA)-ResNet model for laser spot tracking in underwater optical wireless communication (UOWC) systems. Experimental results...
详细信息
Dialogue policy trains an agent to select dialogue actions frequently implemented via deep reinforcement learning (DRL). The model-based reinforcement methods built a world model to generate simulated data to alleviat...
详细信息
As the application of Industrial Robots(IRs)scales and related participants increase,the demands for intelligent Operation and Maintenance(O&M)and multi-tenant collaboration *** methods could no longer cover the r...
详细信息
As the application of Industrial Robots(IRs)scales and related participants increase,the demands for intelligent Operation and Maintenance(O&M)and multi-tenant collaboration *** methods could no longer cover the requirements,while the Industrial Internet of Things(IIoT)has been considered a promising ***,there’s a lack of IIoT platforms dedicated to IR O&M,including IR maintenance,process optimization,and knowledge *** this context,this paper puts forward the multi-tenant-oriented ACbot platform,which attempts to provide the first holistic IIoT-based solution for O&M of *** on an information model designed for the IR field,ACbot has implemented an application architecture with resource and microservice management across the cloud and multiple *** this basis,we develop four vital applications including real-time monitoring,health management,process optimization,and knowledge *** have deployed the ACbot platform in real-world scenarios that contain various participants,types of IRs,and *** date,ACbot has been accessed by 10 organizations and managed 60 industrial robots,demonstrating that the platform fulfills our ***,the application results also showcase its robustness,versatility,and adaptability for developing and hosting intelligent robot applications.
Many multi-view stereo networks employing a cascade structure can efficiently estimate depth while conserving memory. However, the accuracy of the depth map in the fine stage heavily relies on the depth map estimated ...
详细信息
To learn and analyze graph-structured data, Graph Neural Networks (GNNs) have emerged as a powerful framework over traditional neural networks, which work well on grid-like or sequential structure data. GNNs are parti...
详细信息
Feature noise and label noise are ubiquitous in practical scenarios, which pose great challenges for training a robust machine learning model. Most previous approaches usually deal with only a single problem of either...
详细信息
The acquisition of high-resolution image sequence for dynamic scenes of fast motion remains challenging due to motion blur caused by fast object movement. As a novel neuromorphic sensor, spike camera records the chang...
详细信息
Machine Learning (ML) models, particularly Deep Learning (DL), have made rapid progress and achieved significant milestones across various applications, including numerous safety-critical contexts. However, these mode...
详细信息
Cyber-Physical System (CPS) devices are increasing exponentially. Lacking confidentiality creates a vulnerable network. Thus, demanding the overall system with the latest and robust solutions for the defence mechanism...
详细信息
Cyber-Physical System (CPS) devices are increasing exponentially. Lacking confidentiality creates a vulnerable network. Thus, demanding the overall system with the latest and robust solutions for the defence mechanisms with low computation cost, increased integrity, and surveillance. The proposal of a mechanism that utilizes the features of authenticity measures using the Destination Sequence Distance Vector (DSDV) routing protocol which applies to the multi-WSN (Wireless Sensor Network) of IoT devices in CPS which is developed for the Device-to-Device (D2D) authentication developed from the local-chain and public chain respectively combined with the Software Defined Networking (SDN) control and monitoring system using switches and controllers that will route the packets through the network, identify any false nodes, take preventive measures against them and preventing them for any future problems. Next, the system is powered by Blockchain cryptographic features by utilizing the TrustChain features to create a private, secure, and temper-free ledger of the transactions performed inside the network. Results are achieved in the legitimate devices connecting to the network, transferring their packets to their destination under supervision, reporting whenever a false node is causing hurdles, and recording the transactions for temper-proof records. Evaluation results based on 1000+ transactions illustrate that the proposed mechanism not only outshines most aspects of Cyber-Physical systems but also consumes less computation power with a low latency of 0.1 seconds only.
暂无评论