Search results for " Communication"
showing 10 items of 4937 documents
Comparison of KVP and RSI for Controlling KUKA Robots Over ROS
2020
In this work, an open-source ROS interface based on KUKAVARPROXY for control of KUKA robots is compared to the commercial closed-source Robot Sensor Interface available from KUKA. This comparison looks at the difference in how these two approaches communicate with the KUKA robot controller, the response time and tracking delay one can expect with the different interfaces, and the difference in use cases for the two interfaces. The investigations showed that the KR16 with KRC2 has a 50 ms response time, and RSI has a 120 ms tracking delay, with negligible delay caused by the ROS communication stack. The results highlight that the commercial inferface is more reliable for feedback control tas…
Professional stakeholders' views of the use of digital technologies in Spanish long-term care
2018
Demographic change in Europe has resulted in an aging population, which presents new challenges for implementing and managing long-term care (LTC) systems. One solution aims to increase the efficiency of LTC by using digital technologies. This article focuses on professionals’ opinions of the use of digital technologies in the administration of Spain’s long-term care law (Law 39/2006, December 14, LAPAD). This qualitative research is part of SoCaTel, an H2020 project on the co-creation of LTC services in Europe. Ten focus groups were held with health professionals, care-taking relatives, and care workers, and six semistructured in-depth interviews were conducted with care recipients in Cata…
Design and Calibration of a Specialized Polydioptric Camera Rig
2017
International audience; It has been observed in the nature that all creatures have evolved highly exclusive sensory organs depending on their habitat and the form of resources availability for their survival. In this project, a novel omnidirectional camera rig, inspired from natural vision sensors, is proposed. It is exclusively designed to operate for highly specified tasks in the field of mobile robotics. Navigation problems on uneven terrains and detection of the moving objects while the robot is itself in motion are the core problems that omnidirectional systems tackle. The proposed omnidirectional system is a compact and a rigid vision system with dioptric cameras that provide a 360° f…
Input Selection Methods for Soft Sensor Design: A Survey
2020
Soft Sensors (SSs) are inferential models used in many industrial fields. They allow for real-time estimation of hard-to-measure variables as a function of available data obtained from online sensors. SSs are generally built using industries historical databases through data-driven approaches. A critical issue in SS design concerns the selection of input variables, among those available in a candidate dataset. In the case of industrial processes, candidate inputs can reach great numbers, making the design computationally demanding and leading to poorly performing models. An input selection procedure is then necessary. Most used input selection approaches for SS design are addressed in this …
Aesthetic considerations for the min-max K-Windy Rural Postman Problem
2017
[EN] The aesthetic quality of routes is a feature of route planning that is of practical importance, but receives relatively little attention in the literature. Several practitioners have pointed out that the visual appeal of a proposed set of routes can have a strong influence on the willingness of a client to accept or reject a specific routing plan. While some work has analyzed algorithmic performance relative to traditional min-sum or min-max objective functions and aesthetic objective functions, we are not aware of any work that has considered a multi-objective approach. This work considers a multi-objective variant of the Min-Max K-Vehicles Windy Rural Postman Problem, discusses sever…
A Novel Border Identification Algorithm Based on an “Anti-Bayesian” Paradigm
2013
Published version of a chapter in the book: Computer Analysis of Images and Patterns. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-40261-6_23 Border Identification (BI) algorithms, a subset of Prototype Reduction Schemes (PRS) aim to reduce the number of training vectors so that the reduced set (the border set) contains only those patterns which lie near the border of the classes, and have sufficient information to perform a meaningful classification. However, one can see that the true border patterns (“near” border) are not able to perform the task independently as they are not able to always distinguish the testing samples. Thus, researchers have worked on thi…
The changing functions of the mass media: A historical perspective
1989
Secure and efficient verification for data aggregation in wireless sensor networks
2017
Summary The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the majo…
Making sense of crises: the implications of information asymmetries for resilience and social justice in disaster-ridden communities
2017
New information and communication technologies (ICT) have enabled communities to collect and share information and tap into a network of peers in unprecedented ways. For more than a decade, informa...
Terrorism in the Website
2020
Without any doubt, terrorism causes higher levels of anxiety and very well enhances our fears as never before. The post 9/11 context witnesses the multiplication of xenophobic expressions, such as Islamophobia or tourist-phobia, only to name a few. These expressions result from a culture of intolerance, which not only was enrooted in the ideological core of western capitalism but was accelerated just after 9/11. Some voices emphasize the needs of employing technology to make this world a safer place. This chapter goes in a contradictory direction. The authors focus on the ethical limitations of technologies when they are subordinated to the ideals of zero-risk society. Echoing Sunstein and …