This paper presents a remotely operated robotic system that includes two mobile manipulators to extend the functional capabilities of a human *** with previous tele-operation or robotic body extension systems,using tw...
详细信息
This paper presents a remotely operated robotic system that includes two mobile manipulators to extend the functional capabilities of a human *** with previous tele-operation or robotic body extension systems,using two mobile manipulators helps with enlarging the workspace and allowing manipulation of large or long *** system comprises a joystick for controlling the mobile base and robotic gripper,and a motion capture system for controlling the arm *** together enable tele-operated dual-arm and large-space *** the experiments,a human tele-operator controls the two mobile robots to perform tasks such as handover,long object manipulation,and cooperative *** results demonstrated the effectiveness of the proposed system,resulting in extending the human body to a large space while keeping the benefits of having two limbs.
Cross-domain recommendation (CDR) aims to alleviate the data sparsity problem by leveraging the benefits of modeling two domains. However, existing research often focuses on the recommendation performance while ignore...
详细信息
Tomato leaf diseases significantly impact crop production,necessitating early detection for sustainable *** Learning(DL)has recently shown excellent results in identifying and classifying tomato leaf ***,current DL me...
详细信息
Tomato leaf diseases significantly impact crop production,necessitating early detection for sustainable *** Learning(DL)has recently shown excellent results in identifying and classifying tomato leaf ***,current DL methods often require substantial computational resources,hindering their application on resource-constrained *** propose the Deep Tomato Detection Network(DTomatoDNet),a lightweight DL-based framework comprising 19 learnable layers for efficient tomato leaf disease classification to overcome *** Convn kernels used in the proposed(DTomatoDNet)framework is 1×1,which reduces the number of parameters and helps in more detailed and descriptive feature extraction for *** proposed DTomatoDNet model is trained from scratch to determine the classification success rate.10,000 tomato leaf images(1000 images per class)from the publicly accessible dataset,covering one healthy category and nine disease categories,are utilized in training the proposed DTomatoDNet *** specifically,we classified tomato leaf images into Target Spot(TS),Early Blight(EB),Late Blight(LB),Bacterial Spot(BS),Leaf Mold(LM),Tomato Yellow Leaf Curl Virus(YLCV),Septoria Leaf Spot(SLS),Spider Mites(SM),Tomato Mosaic Virus(MV),and Tomato Healthy(H).The proposed DTomatoDNet approach obtains a classification accuracy of 99.34%,demonstrating excellent accuracy in differentiating between tomato *** model could be used on mobile platforms because it is lightweight and designed with fewer *** farmers can utilize the proposed DTomatoDNet methodology to detect disease more quickly and easily once it has been integrated into mobile platforms by developing a mobile application.
Road damage detection (RDD) through computer vision and deep learning techniques can ensure the safety of vehicles and humans on the roads. Integrating unmanned aerial vehicles (UAVs) in RDD and infrastructure evaluat...
详细信息
This paper examines the conceptualization and implementation of an instant messaging application, which is decentralized. The proposed work utilizes a blockchain with end-to-end encryption and digital signatures. The ...
详细信息
Recently, with increased use of mobile phones, it has transformed into a multibillion-dollar Short Message Service or SMS. However, the drop in the cost of messaging services has led to an increased number of unsolici...
详细信息
An effective task scheduling method can accommodate user needs, boost resource usage, and boost cloud computing's overall efficiency. However, the unchanging task needs are generally the focus of grid computing...
详细信息
An effective task scheduling method can accommodate user needs, boost resource usage, and boost cloud computing's overall efficiency. However, the unchanging task needs are generally the focus of grid computing's job scheduling, leading to low resource usage. Distributing the dynamic user tasks fairly among all cloud nodes is the goal of load balancing, a relatively new field of study. The primary difficulty with cloud computing is load balancing. By making better use of available resources, load balancing methods improve cloud performance. Load balancing primary goal is to lessen the burden on the environment by cutting down on energy use and carbon emissions. The most crucial characteristics that can both satisfy user needs and maximize resource utilization are used to determine the order of priorities. Existing systems often ignore user priority suggestions in favor of optimal scheduling to improve load balancing. Scheduling that takes into account user-guided priorities uses a data-driven strategy, which helps improve load balancing. Scheduling algorithms that take user priorities into account can optimize load distribution more effectively. The primary objective of this research is to provide a priority based randomized load balancing technique that assigns tasks to virtual machines in a random fashion based on criteria such as the number of users, the amount of time the task takes to run, the type of software being used, the cost of the software, and the amount of available resources. This method maximizes system performance by decreasing response time and resource consumption while increasing metrics like fault tolerance and scalability. This system for scheduling tasks not only accommodates user needs but also achieves excellent resource usage. This research proposes a User Task Priority based Resource Allocation with Multi Class Task Scheduling Strategy and Load Balancing (UPRA-MCTSS-LB) Model for enhancing the cloud service quality. The proposed method res
Live Memory Forensics deals with acquiring and analyzing the volatile memory artefacts to uncover the trace of inmemory malware or fileless malware. Traditional forensics methods operate in a centralized manner leadin...
详细信息
Machine learning combined with geometric reasoning is a promising approach for generating new perspectives of a scene using limited image captures, known as neural rendering techniques. Neural radiance fields (NeRF) r...
详细信息
Cooperative coevolution (CC) algorithms, based on the divide-and-conquer strategy, have emerged as the predominant approach to solving large-scale global optimization (LSGO) problems. The efficiency and accuracy of th...
详细信息
暂无评论