Search results for " Communication"

showing 10 items of 4937 documents

Comparison of KVP and RSI for Controlling KUKA Robots Over ROS

2020

In this work, an open-source ROS interface based on KUKAVARPROXY for control of KUKA robots is compared to the commercial closed-source Robot Sensor Interface available from KUKA. This comparison looks at the difference in how these two approaches communicate with the KUKA robot controller, the response time and tracking delay one can expect with the different interfaces, and the difference in use cases for the two interfaces. The investigations showed that the KR16 with KRC2 has a 50 ms response time, and RSI has a 120 ms tracking delay, with negligible delay caused by the ROS communication stack. The results highlight that the commercial inferface is more reliable for feedback control tas…

0209 industrial biotechnologySIMPLE (military communications protocol)Computer scienceFeedback controlInterface (computing)020208 electrical & electronic engineeringMotion control systemsRobot controllerResponse time02 engineering and technology020901 industrial engineering & automationRobot manipulatorsControl and Systems EngineeringControl theory0202 electrical engineering electronic engineering information engineeringRobotRobotics technologiesSimulationIFAC-PapersOnLine
researchProduct

Professional stakeholders' views of the use of digital technologies in Spanish long-term care

2018

Demographic change in Europe has resulted in an aging population, which presents new challenges for implementing and managing long-term care (LTC) systems. One solution aims to increase the efficiency of LTC by using digital technologies. This article focuses on professionals’ opinions of the use of digital technologies in the administration of Spain’s long-term care law (Law 39/2006, December 14, LAPAD). This qualitative research is part of SoCaTel, an H2020 project on the co-creation of LTC services in Europe. Ten focus groups were held with health professionals, care-taking relatives, and care workers, and six semistructured in-depth interviews were conducted with care recipients in Cata…

0209 industrial biotechnologySocial PsychologySocial Welfare02 engineering and technologydigitalizationLAPADsocial services020901 industrial engineering & automation0502 economics and businessdigital technologieslcsh:T58.5-58.64lcsh:Information technologybusiness.industryCommunication05 social sciencesPublic relationsHuman-Computer InteractionLong-term careSpainInformation and Communications TechnologyICTLTClong-term careBusiness050203 business & managementHuman Technology
researchProduct

Design and Calibration of a Specialized Polydioptric Camera Rig

2017

International audience; It has been observed in the nature that all creatures have evolved highly exclusive sensory organs depending on their habitat and the form of resources availability for their survival. In this project, a novel omnidirectional camera rig, inspired from natural vision sensors, is proposed. It is exclusively designed to operate for highly specified tasks in the field of mobile robotics. Navigation problems on uneven terrains and detection of the moving objects while the robot is itself in motion are the core problems that omnidirectional systems tackle. The proposed omnidirectional system is a compact and a rigid vision system with dioptric cameras that provide a 360° f…

0209 industrial biotechnologydepthComputer Networks and CommunicationsMachine visionComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONstereo-vision02 engineering and technologylcsh:QA75.5-76.95020901 industrial engineering & automationOmnidirectional cameraArtificial Intelligence[ INFO.INFO-TI ] Computer Science [cs]/Image Processing0202 electrical engineering electronic engineering information engineeringStructure from motionComputer visionSmart cameraComputingMethodologies_COMPUTERGRAPHICSpolydioptricstructure from motionbusiness.industryRGB-DRoboticscalibrationomnidirectionalStereopsisHardware and ArchitectureICT[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV][SPI.OPTI]Engineering Sciences [physics]/Optics / PhotonicRobot020201 artificial intelligence & image processinglcsh:Electronic computers. Computer scienceArtificial intelligence[ SPI.OPTI ] Engineering Sciences [physics]/Optics / PhotonicbusinessSoftwareStereo cameraInformation Systems
researchProduct

Input Selection Methods for Soft Sensor Design: A Survey

2020

Soft Sensors (SSs) are inferential models used in many industrial fields. They allow for real-time estimation of hard-to-measure variables as a function of available data obtained from online sensors. SSs are generally built using industries historical databases through data-driven approaches. A critical issue in SS design concerns the selection of input variables, among those available in a candidate dataset. In the case of industrial processes, candidate inputs can reach great numbers, making the design computationally demanding and leading to poorly performing models. An input selection procedure is then necessary. Most used input selection approaches for SS design are addressed in this …

0209 industrial biotechnologylcsh:T58.5-58.64lcsh:Information technologyComputer Networks and CommunicationsComputer scienceFeature selectionprediction02 engineering and technologyFunction (mathematics)input selectionSoft sensorcomputer.software_genresoft sensor; inferential model; input selection; feature selection; regression; predictionfeature selection020901 industrial engineering & automationinferential model0202 electrical engineering electronic engineering information engineeringsoft sensorregression020201 artificial intelligence & image processingData miningInput selectioncomputerSelection (genetic algorithm)Future Internet
researchProduct

Aesthetic considerations for the min-max K-Windy Rural Postman Problem

2017

[EN] The aesthetic quality of routes is a feature of route planning that is of practical importance, but receives relatively little attention in the literature. Several practitioners have pointed out that the visual appeal of a proposed set of routes can have a strong influence on the willingness of a client to accept or reject a specific routing plan. While some work has analyzed algorithmic performance relative to traditional min-sum or min-max objective functions and aesthetic objective functions, we are not aware of any work that has considered a multi-objective approach. This work considers a multi-objective variant of the Min-Max K-Vehicles Windy Rural Postman Problem, discusses sever…

021103 operations researchComputer Networks and Communications0211 other engineering and technologiesMin-Max objective02 engineering and technologyMulti-Objective problemsCombinatoricsArc routing problemsAesthetic objectiveHardware and Architecture0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingMATEMATICA APLICADAHumanitiesSoftwareInformation SystemsMathematicsNetworks
researchProduct

A Novel Border Identification Algorithm Based on an “Anti-Bayesian” Paradigm

2013

Published version of a chapter in the book: Computer Analysis of Images and Patterns. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-40261-6_23 Border Identification (BI) algorithms, a subset of Prototype Reduction Schemes (PRS) aim to reduce the number of training vectors so that the reduced set (the border set) contains only those patterns which lie near the border of the classes, and have sufficient information to perform a meaningful classification. However, one can see that the true border patterns (“near” border) are not able to perform the task independently as they are not able to always distinguish the testing samples. Thus, researchers have worked on thi…

021103 operations researchComputer scienceVDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 4220211 other engineering and technologiesClass (philosophy)02 engineering and technologyField (computer science)Term (time)Support vector machineSet (abstract data type)Identification (information)Bayes' theoremCardinality0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingVDP::Mathematics and natural science: 400::Mathematics: 410::Algebra/algebraic analysis: 414InformationSystems_MISCELLANEOUSAlgorithm
researchProduct

The changing functions of the mass media: A historical perspective

1989

021110 strategic defence & security studies0508 media and communicationsbusiness.industryPolitical science05 social sciencesPerspective (graphical)0211 other engineering and technologies050801 communication & media studies02 engineering and technologybusinessEpistemologyMass mediaGazette (Leiden, Netherlands)
researchProduct

Secure and efficient verification for data aggregation in wireless sensor networks

2017

Summary The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the majo…

021110 strategic defence & security studiesComputer Networks and Communicationsbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS0211 other engineering and technologiesEarly detection020206 networking & telecommunications02 engineering and technologyImpersonation attackComputer Science ApplicationsData aggregatorRobustness (computer science)Information and Communications TechnologySoftware deploymentScalability0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkComputer networkInternational Journal of Network Management
researchProduct

Making sense of crises: the implications of information asymmetries for resilience and social justice in disaster-ridden communities

2017

New information and communication technologies (ICT) have enabled communities to collect and share information and tap into a network of peers in unprecedented ways. For more than a decade, informa...

021110 strategic defence & security studiesEmergency managementbusiness.industrymedia_common.quotation_subject05 social sciencesGeography Planning and Development0211 other engineering and technologies02 engineering and technologyBuilding and ConstructionPublic relationsSocial justiceInformation asymmetryInformation and Communications TechnologySociology0509 other social sciences050904 information & library sciencesSafety Risk Reliability and QualityResilience (network)businessEmpowermentCivil and Structural Engineeringmedia_commonSustainable and Resilient Infrastructure
researchProduct

Terrorism in the Website

2020

Without any doubt, terrorism causes higher levels of anxiety and very well enhances our fears as never before. The post 9/11 context witnesses the multiplication of xenophobic expressions, such as Islamophobia or tourist-phobia, only to name a few. These expressions result from a culture of intolerance, which not only was enrooted in the ideological core of western capitalism but was accelerated just after 9/11. Some voices emphasize the needs of employing technology to make this world a safer place. This chapter goes in a contradictory direction. The authors focus on the ethical limitations of technologies when they are subordinated to the ideals of zero-risk society. Echoing Sunstein and …

021110 strategic defence & security studiesInformation Systems and ManagementScrutinyComputer Networks and Communications05 social sciences0211 other engineering and technologiesContext (language use)02 engineering and technologyCriminology0506 political scienceHardware and ArchitecturePolitical scienceFundamentalismTerrorism050602 political science & public administrationmedicineAnxietyMultiplicationmedicine.symptomSafety Risk Reliability and QualitySafety ResearchSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct