The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In three-dimensional space, the traditional algorithm of virtual force applies to continuous target tracking process is prone to problems of distraction and short time in keeping tracking of the target in the process of. This paper proposed a three-dimensional space deployment algorithm applies to continuous target tracking to solve these problems. The combine virtual force in this algorithm is generated...
Power-assisted wheelchairs (PAW) provide an efficient means of transport for disabled persons. In this human-machine interaction, the human-applied torque is a crucial variable to implement the assistive system. The present paper describes a novel scheme to design PAWs without torque sensors. Instead of using a torque sensor, a discrete-time unknown input observer in descriptor form is applied to...
A belt region is said to be k-barrier covered by a set of sensors if all paths crossing the width of the belt region intersect the sensing regions of at least k sensors. Barrier coverage can be achieved from a random initial deployment of mobile sensors by suitably relocating the sensors to form a barrier. Reducing the movement of the sensors is important in such scenarios due to the energy constraints...
3D LiDAR (Light Imaging Detection and Ranging) data has recently been used in a wide range of applications such as vehicle automation and crime scene reconstruction. Decision making in such applications is highly dependent on LiDAR data. Thus, it becomes crucial to authenticate the data before using it. Though authentication of 2D digital images and video has been widely studied, the area of 3D data...
Sample preparation in digital microfluidics refers to the generation of droplets with target concentrations for onchip biochemical applications. In recent years, digital microfluidic biochips (DMFBs) have been adopted as a platform for sample preparation. However, there remain one major problem associated with sample preparation on a conventional DMFB. For conventional DMFBs, only a (1:1) mixing/splitting...
The lifetime of Wireless Sensor Networks (WSNs) is significantly shortened by the energy hole problem that is caused by the many-to-one communication pattern adopted by most WSNs. Various approaches have been designed to solve the energy hole problem, and this paper considers improving the energy efficiency by deploying additional relays, which is called the Lifetime Constrained Relay Node Placement...
This paper is based on the previous research that selects the proper surrogate nodes for fast recovery mechanism in industrial IoT (Internet of Things) Environment which uses a variety of sensors to collect the data and exchange the collected data in real-time for creating added value. We are going to suggest the way that how to decide the number of surrogate node automatically in different deployed...
Quadcopters make up the bulk of research in unmanned aerial vehicles (UAVs). The lack of a fully open source quadcopter restricts the reproducibility and collaboration of practical research within the UAV community. This work focuses on creating a prototype quadcopter built upon hardware and software readily available and open sourced which can be extended and modified to place on any other quadcopter...
Much research attention has focussed on improving strategies for traffic light control to address the problem of increasing congestion in road networks. Here we present a modular decentralized traffic light controller, and propose several algorithms which harness the potential of V2I communication in order to increase the flow of vehicles in the network and reduce travel time. We compare the performance...
Visual (V) surveillance systems are extensively deployed and becoming the largest source of big data. On the other hand, electronic (E) data also plays an important role in surveillance and its amount increases explosively with the ubiquity of mobile devices. One of the major problems in surveillance is to determine human objects' identities among different surveillance scenes. Traditional way of...
Cyber Physical Systems (CPS) use emerging computing, communication, and control methods to monitor and control geographically dispersed critical system components to allow a high level of confidence about their operation. Simulation methods are frequently used in testing such critical system components, however, it might not be adequate to show the absence of errors given the complexity of the system...
Military operators require relevant information from Intelligence, Surveillance and Reconnaissance (ISR) assets to make timely decisions and to issue effective responses to mission events. Today's sensing and Command and Control (C2) systems blindly collect and pass all available ISR data, which results in data overload that increases demand for communications bandwidth and processing power, with...
Current state-of-the-art vision-based sense and avoid systems based on morphological and hidden Markov model filtering require the manual selection of static (timeinvariant) detection thresholds. Manually selecting suitable static detection thresholds is challenging (and currently requires highly trained operators) because it involves balancing tradeoffs between detection and false alarm performance...
Because of the powerful mobile technology, many crowdsourcing applications emerge to implement location-dependent tasks. One common powerful function of crowdsourcing is to decompose huge or complex tasks into small sub-ones, which require users with different skills to implement. These tasks are composite and implemented completely only after all of their sub-tasks are finished. Meanwhile, users...
For the upcoming IoT (Internet of things) era, plethora of data from a variety of sensors needs to be processed on a real time basis for improving system responsiveness. Due to the increasing modality of sensors, data streaming analytics to deal with high dimensional data becomes a critical ability. In addition, concept drift also needs to be addressed since an IoT-enabled environment is dynamic in...
In all the researches in wireless sensor networks, cameras are increasingly utilized for their surveillance capabilities. In this paper, we elaborately discuss about the problem of Full-View Barrier Coverage with Rotatable Camera Sensors (FBR), including weakly and strongly connected versions. FBR is proven to be NP-hard in this paper by reducing Group Steiner Tree problem to it. Our goal is to reduce...
Recent advances in drone visual sensors and integration of complex vision algorithms, facilitate further potential, entirely disrupting in a positive way their applications and capabilities. In particular, real-time object detection, usually the initial necessary step in multiple computer vision and image processing applications, has been gaining momentum in drone- based applications. Whilst heavily...
The rapid penetration of mobile devices has provided ample opportunities for mobile devices to exchange sensing data on a peer basis without any centralized backend. In this paper, we design a peer based data exchanging model, where relay nodes move to certain locations to connect data providers and consumers to facilitate data delivery. Both relays and data providers can gain rewards from consumers...
This paper presents a performance analysis of two recently proposed distributed localization algorithms for cooperative 3-D wireless sensor networks (WSNs) in a more realistic scenario. The tested algorithms rely on distance and angle measurements obtained from received signal strength (RSS) and angle-of arrival (AoA) information, respectively. The measurements are then used to derive a convex estimator,...
Owing to charger noise, inaccurate touch points and fake touch points may happen so that a device has a wrong behavior. The intensity of charger noise could be much larger than that of original touch signals. Besides, the frequency of charger noise varies for each different charger. Therefore, industry identifies charger noise as the most difficult problem in capacitive touch applications. The solution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.