The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Tracking single or multiple maneuvering targets is an urgent need for defense. In order to meet the military requirement, we propose a modified clustering-based Rao-Blackwellized particle filter (CBRBPF) to track single or multiple maneuvering targets with observations received by single or multiple sensors. The modified RBPF is basing on the clustering-based data association method. We partition...
Contrast to the two-dimensional directional sensor networks, the three-dimensional directional sensor networks increases complexity and diversity. External environment and sensor limitations impact the target monitoring and coverage. Adjustment strategies provide better auxiliary guide in the process of self-deployment, while strengthen the monitoring area coverage rate and monitoring capability of...
Today there exist many different types of smart assistants and devices, such as virtual assistants, smartphones and wearables, which have a purpose to coordinate and optimize the daily activities of the people worldwide. The smart assistants' focus is mainly on basic human needs, e.g. browsing, scheduling, navigating and other similar activities. However, not many smart assistants are concerned with...
In three-dimensional space, the traditional algorithm of virtual force applies to continuous target tracking process is prone to problems of distraction and short time in keeping tracking of the target in the process of. This paper proposed a three-dimensional space deployment algorithm applies to continuous target tracking to solve these problems. The combine virtual force in this algorithm is generated...
Power-assisted wheelchairs (PAW) provide an efficient means of transport for disabled persons. In this human-machine interaction, the human-applied torque is a crucial variable to implement the assistive system. The present paper describes a novel scheme to design PAWs without torque sensors. Instead of using a torque sensor, a discrete-time unknown input observer in descriptor form is applied to...
A belt region is said to be k-barrier covered by a set of sensors if all paths crossing the width of the belt region intersect the sensing regions of at least k sensors. Barrier coverage can be achieved from a random initial deployment of mobile sensors by suitably relocating the sensors to form a barrier. Reducing the movement of the sensors is important in such scenarios due to the energy constraints...
3D LiDAR (Light Imaging Detection and Ranging) data has recently been used in a wide range of applications such as vehicle automation and crime scene reconstruction. Decision making in such applications is highly dependent on LiDAR data. Thus, it becomes crucial to authenticate the data before using it. Though authentication of 2D digital images and video has been widely studied, the area of 3D data...
Sample preparation in digital microfluidics refers to the generation of droplets with target concentrations for onchip biochemical applications. In recent years, digital microfluidic biochips (DMFBs) have been adopted as a platform for sample preparation. However, there remain one major problem associated with sample preparation on a conventional DMFB. For conventional DMFBs, only a (1:1) mixing/splitting...
We propose a distributed Learning Automata (LA) for spectrum management problem in Cognitive Radio (CR) networks. The objective is to design intelligent Secondary Users (SUs) which can interact with the RF environment and learn from its different responses through the sensing. It is assumed there is no prior information about the Primary Users (PUs) and other SUs activities while there is no information...
The lifetime of Wireless Sensor Networks (WSNs) is significantly shortened by the energy hole problem that is caused by the many-to-one communication pattern adopted by most WSNs. Various approaches have been designed to solve the energy hole problem, and this paper considers improving the energy efficiency by deploying additional relays, which is called the Lifetime Constrained Relay Node Placement...
This paper is based on the previous research that selects the proper surrogate nodes for fast recovery mechanism in industrial IoT (Internet of Things) Environment which uses a variety of sensors to collect the data and exchange the collected data in real-time for creating added value. We are going to suggest the way that how to decide the number of surrogate node automatically in different deployed...
Quadcopters make up the bulk of research in unmanned aerial vehicles (UAVs). The lack of a fully open source quadcopter restricts the reproducibility and collaboration of practical research within the UAV community. This work focuses on creating a prototype quadcopter built upon hardware and software readily available and open sourced which can be extended and modified to place on any other quadcopter...
Much research attention has focussed on improving strategies for traffic light control to address the problem of increasing congestion in road networks. Here we present a modular decentralized traffic light controller, and propose several algorithms which harness the potential of V2I communication in order to increase the flow of vehicles in the network and reduce travel time. We compare the performance...
Visual (V) surveillance systems are extensively deployed and becoming the largest source of big data. On the other hand, electronic (E) data also plays an important role in surveillance and its amount increases explosively with the ubiquity of mobile devices. One of the major problems in surveillance is to determine human objects' identities among different surveillance scenes. Traditional way of...
Cyber Physical Systems (CPS) use emerging computing, communication, and control methods to monitor and control geographically dispersed critical system components to allow a high level of confidence about their operation. Simulation methods are frequently used in testing such critical system components, however, it might not be adequate to show the absence of errors given the complexity of the system...
Military operators require relevant information from Intelligence, Surveillance and Reconnaissance (ISR) assets to make timely decisions and to issue effective responses to mission events. Today's sensing and Command and Control (C2) systems blindly collect and pass all available ISR data, which results in data overload that increases demand for communications bandwidth and processing power, with...
Current state-of-the-art vision-based sense and avoid systems based on morphological and hidden Markov model filtering require the manual selection of static (timeinvariant) detection thresholds. Manually selecting suitable static detection thresholds is challenging (and currently requires highly trained operators) because it involves balancing tradeoffs between detection and false alarm performance...
Because of the powerful mobile technology, many crowdsourcing applications emerge to implement location-dependent tasks. One common powerful function of crowdsourcing is to decompose huge or complex tasks into small sub-ones, which require users with different skills to implement. These tasks are composite and implemented completely only after all of their sub-tasks are finished. Meanwhile, users...
For the upcoming IoT (Internet of things) era, plethora of data from a variety of sensors needs to be processed on a real time basis for improving system responsiveness. Due to the increasing modality of sensors, data streaming analytics to deal with high dimensional data becomes a critical ability. In addition, concept drift also needs to be addressed since an IoT-enabled environment is dynamic in...
In all the researches in wireless sensor networks, cameras are increasingly utilized for their surveillance capabilities. In this paper, we elaborately discuss about the problem of Full-View Barrier Coverage with Rotatable Camera Sensors (FBR), including weakly and strongly connected versions. FBR is proven to be NP-hard in this paper by reducing Group Steiner Tree problem to it. Our goal is to reduce...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.