The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Digital door lock system is a widely used physical security system. It restricts unauthorized accesses and protects assets or private spaces. However, once its password has been exposed to unauthorized people, it becomes useless. In this paper, we propose a novel side channel attack model, which enables a cracking of a digital door lock password. We noted that when people press the key-lock button,...
We consider the problem of inferring the operational status of a reactor facility using measurements from a radiation sensor network deployed around the facility's ventilation off-gas stack. The intensity of stack emissions decays with distance, and the sensor counts or measurements are inherently random with parameters determined by the intensity at the sensor's location. We utilize the measurements...
Due both to the speed and quality of their sensors and restrictive on-board computational capabilities, current state-of-the-art (SOA) size, weight, and power (SWaP) constrained autonomous robotic systems are limited in their abilities to sample, fuse, and analyze sensory data for state estimation. Aimed at improving SWaP-constrained robotic state estimation, we present Multi-Hypothesis DeepEfference...
Improving trust in the state of Cyber-Physical Systems becomes increasingly important as more Cyber-Physical Systems tasks become autonomous. Research into the sound of Cyber-Physical Systems has shown that audio side-channel information from a single microphone can be used to accurately model traditional primary state sensor measurements such as speed and gear position. Furthermore, data integration...
Image-to-patient registration process is required to use actively pre-operative images such as CT and MRI during operation for surgical navigation system. One method to utilize scanning data of patients and 3D data from MRI or CT images is dealt with in this paper. After 3D surface measurement device measures the surface of patient's surgical site, this 3D data is registered to CT or MRI data using...
RGB-D view registration has been widely studied by the robotics and computer vision community. The well known Iterative Closest Points (ICP) method and its variants prevail for estimating the relative pose between sensors. However, the optimization is performed locally and by consequence it can get trapped in local minima. Global registration methods have been introduced as an approach to solve the...
Weight gain and stretched and weakens abdominal muscles by an enlarging gravid uterus are remarkable features during pregnancy. These changes elicit postural and movement instability and place strain on various body segments. In general, agonist and antagonist muscles of body segments act simultaneously to increase joint stabilization during human movements. The co-contraction might be well observed...
A large number of WSN applications with bursty traffic have emerged in the recent past such as rare event detection and forest fire monitoring. Bursty traffic in Wireless Sensor Networks (WSNs) offers various challenges in terms of reliability and latency. Unlike periodic monitoring, energy consumption is far more challenging to deal with in WSN applications with bursty traffic due to long periods...
In the field of architecture, 3D printing technology has the advantage of shortening the construction period by continuous addition and installing the desired shape and structure directly on site. However, the conventional 3D printer structure has limitations in practical use because of its versatility, mobility, and limited accessibility. In this study, a 3-axis gantry robot type 3D printing simulator...
This paper proposes the method to adjust brightness information by applying CIE L∗a∗b∗ color space and adaptive neuro-fuzzy inference system. The image which is already captured by vision sensor should be adjusted brightness to recognize objects in an image. In case of proper intensity of lights, the clarity of an image is good to recognize objects. However, in case of improper intensity of lights,...
In this paper we propose oil skimmer monitoring system by user-controlled smart phone IoT(Internet of Things)-specific controller and built in BLE 4.0. The device Hardware of the IoT is the trend of OSHW(Open Source Hardware). This opens up free design content for physical artifacts together spirit with FOSS (Free and Open Source Software). As a result of the derivation of Open-source culture making...
In this paper, we consider state estimation in Networked Control Systems where both control inputs and measurements are transmitted via networks which are lossy and introduce random transmission delays. In contrast to the common notion of TCP-like communication, where successful transmissions are acknowledged instantaneously and without losses, we focus on the case where the acknowledgment packets...
While current implementations of LIDAR-based autonomous driving systems are capable of road following and obstacle avoidance, they are still unable to detect road lane markings, which is required for lane keeping during autonomous driving sequences. In this paper, we present an implementation of semantic image segmentation to enhance a LIDAR-based autonomous ground vehicle for road and lane marking...
We consider an infrastructure of networked systems with discrete components that can be reinforced at certain costs to guard against attacks. The communications network plays a critical, asymmetric role of providing the vital connectivity between the systems. We characterize the correlations within this infrastructure at two levels using (a) aggregate failure correlation function that specifies the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.