Search results for "Bile"

showing 10 items of 2148 documents

A Neural Solution for a Mobile Robot Navigation into Unknown Indoor Environments Using Visual Landmarks

1998

In this paper we present a neural solution for a mobile robot navigation into unknown indoor environments by using landmarks. Robot navigation task is implemented by two groups of processes based on MLP neural networks classifiers: a Low Level Vision System performs obstacle avoidance and corridor following, while an High Level Vision System extracts landmarks contents and performs goal directed navigation. A path-planner manages the two navigation systems and interacts with the robot hardware. The proposed solution is very strong and flexible and can be used to drive a mobile robot in real indoor environments. In the paper experimental results are also reported.

Artificial neural networkMachine visionComputer sciencebusiness.industryObstacle avoidanceRobotComputer visionMobile robotArtificial intelligenceVisual landmarksbusinessMobile robot navigationTask (project management)
researchProduct

A spiking network for body size learning inspired by the fruit fly

2013

The concept of peripersonal space is an interesting research topics for psychologists, neurobiologists and for robotic applications. A living being can learn the representation of its own body to take the correct behavioral decision when interacting with the world. To transfer these important learning mechanisms on bio-robots, simple and efficient solutions can be found in the insect world. In this paper a neural-based model for body-size learning is proposed taking into account the results obtained in experiments with fruit flies. Simulations and experimental results on a roving platform are reported and compared with the biological counterpart.

Artificial neural networkbusiness.industryComputer scienceComputational modelMobile robotBiologically inspired modelsSpace (commercial competition)Body sizeMachine learningcomputer.software_genreDrosophila melanogasterSimple (abstract algebra)Biologically inspired models; Drosophila melanogaster; Computational modelArtificial intelligenceBiomimeticsbusinessRepresentation (mathematics)computer
researchProduct

A Feed-Forward Neural Network for Robust Segmentation of Color Images

1999

A novel approach for segmentation of color images is proposed. The approach is based on a feed-forward neural network that learns to recognize the hue range of meaningful objects. Experimental results showed that the proposed method is effective and robust even in presence of changing environmental conditions. The described technique has been tested in the framework of the Robot Soccer World Cup Initiative (RoboCup). The approach is fully general and it may be successfully employed in any intermediate level image-processing task, where the color is a meaningful descriptor.

Artificial neural networkbusiness.industryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONMobile robotTask (project management)Range (mathematics)GeographyFeedforward neural networkRobotComputer visionSegmentationArtificial intelligencebusinessHue
researchProduct

Examining the effect of adverse weather on road transportation using weather and traffic sensors.

2018

Adverse weather related to reduced visibility caused by fog and rain can seriously affect the mobility and safety of drivers. It is meaningful to develop effective intelligent transportation system (ITS) strategies to mitigate the negative effects of these different types of adverse weather related to reduced visibility by investigating the effect of rain and fog on traffic parameters. A number of previous researches focused on analyzing the effect of adverse weather related to reduced visibility by using simulated traffic and weather data. There are few researchers that addressed the impact of adverse weather instances using real-time data. Moreover, this paper conducts comprehensive inves…

Atmospheric ScienceRainIntelligenceSocial Scienceslcsh:MedicineTransportation02 engineering and technologyPreliminary analysisFogMathematical and Statistical TechniquesRisk FactorsMedicine and Health Sciences0202 electrical engineering electronic engineering information engineeringPsychologyPublic and Occupational Healthlcsh:ScienceIntelligent transportation systemMultidisciplinaryAdverse weatherStatistics05 social sciencesAccidents TrafficRegression analysisTransportation InfrastructureAutomobile drivingPhysical SciencesEngineering and Technology020201 artificial intelligence & image processingSafetyResearch ArticleAutomobile DrivingSafety ManagementMeteorologyResearch and Analysis MethodsCivil EngineeringMeteorology0502 economics and businessHumansStatistical MethodsVisibilityWeatherAnalysis of Variance050210 logistics & transportationlcsh:RTraffic SafetyCognitive PsychologyBiology and Life SciencesRoadsLogistic ModelsWeather dataEarth SciencesCognitive ScienceEnvironmental sciencelcsh:QMathematicsNeurosciencePLoS ONE
researchProduct

The security of mobile business applications based on mCRM

2020

A development of mobile technologies, and their common use in business, creates new challenges for people dealing with data security in the organization. This paper explores the types and nature of threats to the enterprise that result from the widespread use of business applications on smartphones (e.g. mobile CRM). The analysis has been focused on smartphones and tablets running on the Android operating system. We used STRIDE - a threat modeling technique commonly used to detect vulnerabilities in software security. We propose its modification to better design and implement solutions for the security of mobile devices. We also used the Data Flow Diagram and the Attack Tree concept to anal…

Attack treesInformation securityComputer science05 social sciencesAttack treeData securityMobile application02 engineering and technologyInformation securityComputer securitycomputer.software_genreSoftware security assurance020204 information systems0502 economics and businessThreat model0202 electrical engineering electronic engineering information engineeringSecurityData Protection Act 1998050211 marketingMobile technologyThreat modelingMobile devicecomputermCRM
researchProduct

HEART MOBILE LEARNING

2018

The widespread diffusion of mobile technologies in today’s society and the technological developments of recent years offers new opportunities for learning providing innovative techniques and tools in education. In this paper, we will introduce HeARt, an augmented reality mobile Learning system to support university medical students in their learning activities during an anatomy laboratory. Students usually use, in their daily anatomy laboratory, a physical human heart model to investigate and learn about heart anatomy. Even though these models are perfect education tools to observe details and touch "with hands" all the heart sections, they need a supplementary encyclopaedia to learn all h…

Augmented RealityMobile LearningComputer scienceMedicineHuman Anatomy
researchProduct

Augmented Reality Gamification for Human Anatomy

2019

This paper focuses on the use of Augmented Reality technologies in relation to the introduction of game design elements to support university medical students in their learning activities during a human anatomy laboratory. In particular, the solution we propose will provide educational contents visually connected to the physical organ, giving also the opportunity to handle a 3D physical model that is a perfect reproduction of a real human organ.

Augmented RealitySettore INF/01 - InformaticaRelation (database)Settore BIO/16 - Anatomia UmanaComputer scienceMobile learningReproduction (economics)GamificationGame designSettore MED/43 - Medicina LegaleHuman–computer interactionHuman anatomyHuman anatomyMedicineSettore ICAR/17 - DisegnoUniversity medicalAugmented reality
researchProduct

Fingerprint Quality Evaluation in a Novel Embedded Authentication System for Mobile Users

2015

The way people access resources, data and services, is radically changing using modern mobile technologies. In this scenario, biometry is a good solution for security issues even if its performance is influenced by the acquired data quality. In this paper, a novel embedded automatic fingerprint authentication system (AFAS) for mobile users is described. The goal of the proposed system is to improve the performance of a standard embedded AFAS in order to enable its employment in mobile devices architectures. The system is focused on the quality evaluation of the raw acquired fingerprint, identifying areas of poor quality. Using this approach, no image enhancement process is needed after the …

AuthenticationArticle SubjectComputer Networks and CommunicationsComputer sciencebusiness.industrymedia_common.quotation_subjectFingerprint (computing)Real-time computingFingerprint Verification CompetitionComputer Science Applications1707 Computer Vision and Pattern RecognitionTK5101-6720Fingerprint recognitionComputer Science ApplicationsComputer Networks and CommunicationEmbedded systemData qualityTelecommunicationMobile technologyQuality (business)businessMobile devicemedia_commonMobile Information Systems
researchProduct

A Multi-Expert Based Approach to Continuous Authentication of Mobile-Device Users

2003

Currently used in mobile devices PIN-based user authentication cannot provide a sufficient security level. Methods based on multi-modal user authentication involving biometrics (i.e. physical and behavioral characteristics of a person) may be employed to cope with this problem. However, dealing with physical characteristics only, these methods are either unable to provide continuous and user-friendly identity verification, or are resource consuming.

AuthenticationUser authenticationResource (project management)BiometricsHuman–computer interactionComputer scienceIdentity (object-oriented programming)Security levelComputer securitycomputer.software_genreMobile devicecomputer
researchProduct

Application of Radio Environment Map Reconstruction Techniques to Platoon-based Cellular V2X Communications

2020

Vehicle platoons involve groups of vehicles travelling together at a constant inter-vehicle distance, with different common benefits such as increasing road efficiency and fuel saving. Vehicle platooning requires highly reliable wireless communications to keep the group structure and carry out coordinated maneuvers in a safe manner. Focusing on infrastructure-assisted cellular vehicle to anything (V2X) communications, the amount of control information to be exchanged between each platoon vehicle and the base station is a critical factor affecting the communication latency. This paper exploits the particular structure and characteristics of platooning to decrease the control information exch…

Automobile DrivingComputer scienceReal-time computingvehicular communications02 engineering and technologylcsh:Chemical technologyradio environment mapsBiochemistryArticleAnalytical ChemistryElectrònica0202 electrical engineering electronic engineering information engineeringlcsh:TP1-1185Electrical and Electronic EngineeringInstrumentationIntelligent transportation systemComunicació i tecnologiaSpatial AnalysisCommunicationintelligent transportation systems020206 networking & telecommunicationsModels Theoreticalchannel acquisitionAtomic and Molecular Physics and OpticsKrigingVehicle platooning020201 artificial intelligence & image processingPlatoonspatial interpolation5GReflection mapping5GSensors
researchProduct