Search results for "clou"

showing 10 items of 830 documents

Real-time human collision detection for industrial robot cells

2017

A collision detection system triggering on human motion was developed using the Robot Operating System (ROS) and the Point Cloud Library (PCL). ROS was used as the core of the programs and for the communication with an industrial robot. Combining the depths fields from the 3D cameras was accomplished by the use of PCL. The library was also the underlying tool for segmenting the human from the registrated point clouds. Benchmarking of several collision algorithms was done in order to compare the solution. The registration process gave satisfactory results when testing the repetitiveness and the accuracy of the implementation. The segmentation algorithm was able to segment a person represente…

0209 industrial biotechnologyComputer sciencebusiness.industryPoint cloudProcess (computing)02 engineering and technologyBenchmarkingCollisionlaw.inventionIndustrial robot020901 industrial engineering & automationlawCollision detectionComputer visionSegmentationArtificial intelligencebusinessCollision avoidance2017 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems (MFI)
researchProduct

3D Point Cloud Descriptor for Posture Recognition

2018

International audience

0209 industrial biotechnologyComputer sciencebusiness.industryPosture recognitionPoint cloud[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]02 engineering and technology[ INFO.INFO-CV ] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020901 industrial engineering & automation[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV][ INFO.INFO-TI ] Computer Science [cs]/Image Processing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer visionArtificial intelligencebusinessComputingMilieux_MISCELLANEOUS
researchProduct

Static and Dynamic Objects Analysis as a 3D Vector Field

2017

International audience; In the context of scene modelling, understanding, and landmark-based robot navigation, the knowledge of static scene parts and moving objects with their motion behaviours plays a vital role. We present a complete framework to detect and extract the moving objects to reconstruct a high quality static map. For a moving 3D camera setup, we propose a novel 3D Flow Field Analysis approach which accurately detects the moving objects using only 3D point cloud information. Further, we introduce a Sparse Flow Clustering approach to effectively and robustly group the motion flow vectors. Experiments show that the proposed Flow Field Analysis algorithm and Sparse Flow Clusterin…

0209 industrial biotechnologyComputer sciencebusiness.industry[INFO.INFO-RB] Computer Science [cs]/Robotics [cs.RO][ INFO.INFO-RB ] Computer Science [cs]/Robotics [cs.RO]ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONPoint cloud[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]Context (language use)Motion detection02 engineering and technology[ INFO.INFO-CV ] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV][INFO.INFO-CV] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020901 industrial engineering & automationFlow (mathematics)Motion estimation0202 electrical engineering electronic engineering information engineering[INFO.INFO-RB]Computer Science [cs]/Robotics [cs.RO]020201 artificial intelligence & image processingSegmentationComputer visionArtificial intelligenceCluster analysisbusinessEuclidean vector2017 International Conference on 3D Vision (3DV)
researchProduct

Industry 4.0 Technologies for Manufacturing Sustainability: A Systematic Review and Future Research Directions

2021

Recent developments in manufacturing processes and automation have led to the new industrial revolution termed “Industry 4.0”. Industry 4.0 can be considered as a broad domain which includes: data management, manufacturing competitiveness, production processes and efficiency. The term Industry 4.0 includes a variety of key enabling technologies i.e., cyber physical systems, Internet of Things, artificial intelligence, big data analytics and digital twins which can be considered as the major contributors to automated and digital manufacturing environments. Sustainability can be considered as the core of business strategy which is highlighted in the United Nations (UN) Sustainability 2030 age…

0209 industrial biotechnologyEngineeringTechnologyIndustry 4.0QH301-705.5QC1-999Big dataInternet of Things02 engineering and technology020901 industrial engineering & automationSustainable businessSettore ING-IND/17 - Impianti Industriali Meccanici0502 economics and businessGeneral Materials Sciencesmart manufacturingCloud manufacturingBiology (General)InstrumentationQD1-999cloud manufacturingFluid Flow and Transfer Processesbusiness.industryProcess Chemistry and TechnologyTPhysics05 social sciencesGeneral EngineeringCyber-physical systemartificial intelligenceIndustry 4.0sustainabilityEngineering (General). Civil engineering (General)sustainable manufacturingComputer Science ApplicationsEngineering managementmanufacturingChemistrySustainabilityStrategic managementDigital manufacturingInternet of ThingTA1-2040business050203 business & managementApplied Sciences
researchProduct

Impact of accounting process characteristics on accounting outsourcing - Comparison of users and non-users of cloud-based accounting information syst…

2019

Article In Press The article of record as published may be found at https://doi.org/10.1016/j.accinf.2019.06.002 Prior literature informs us that a company's decision to outsource a business process depends on process characteristics such as how frequently the process is performed or how specific the assets required by the process are. In this article, we compare the effects of accounting process characteristics on outsourcing decisions across users of traditional and cloud-based accounting information systems (AIS). By focusing on outsourcing of accounting processes among small and medium sized enterprises, we investigate the effect of five business process characteristics (frequency, huma…

0209 industrial biotechnologyInformation Systems and ManagementulkoistaminenProcess (engineering)Business processcloud-based accounting information systemsaccountingsmall and medium-sized enterprisesAccountingCloud computing02 engineering and technologyAsset specificitytransaction costsManagement Information SystemsOutsourcingpilvipalvelut020901 industrial engineering & automationAccounting0502 economics and businessTransaction costkirjanpitobusiness.industrytransaktiokustannukset05 social scienceseconomics050201 accountingkustannuksetVariety (cybernetics)outsourcingAccounting information systembusinesspienet ja keskisuuret yrityksetFinance
researchProduct

Towards Shipping 4.0. A preliminary gap analysis

2020

Abstract The paradigm of Industry 4.0 involves a substantial innovation to the value creation approach thought the supply chain and the application of digital enabling technologies like the Internet of Things (IoT), Big Data Analytics (BDA) and cloud computing. The fourth industrial revolution is thus expected to have a disruptive impact on maritime transport and shipping sectors, where smart ships and autonomous vessels well be part of a new and fully interconnected maritime ecosystem. Specific hardware components, such as sensors, actuators, or processors will be embedded in the ship’s key systems in order to provide valuable information to increase the efficiency, sustainability and safe…

0209 industrial biotechnologysmart shipBig Data Analytics (BDA)business.industryComputer scienceSupply chainBig dataCloud computing02 engineering and technologyGap analysisBusiness modelIndustry 4.0Maturity (finance)Industrial and Manufacturing EngineeringInternet of Things (IoT)Engineering management020303 mechanical engineering & transports020901 industrial engineering & automation0203 mechanical engineeringArtificial IntelligenceSettore ING-IND/17 - Impianti Industriali MeccaniciSustainabilityValue chainbusinessProcedia Manufacturing
researchProduct

Efficient Protection for VDI Workstations

2019

Many enterprises migrate to a private cloud VDI environment. In such an environment multiple workstations are served by a single powerful server. On such an environment each VDI workstation receives only a limited CPU power. An average of less than a quarter of a core per planned VDI workstation is a common setup. Under such cases, anti-virus and application control software load is multiplied by the number of VDI workstation running on each server. These security applications take merely a few percentages of a single core on a normal desktop. However, on a VDI server where the multiple VDI workstations run on a single server, they may consume 20-25 percent the load. Naturally, such an incr…

021110 strategic defence & security studiesCPU power dissipationWorkstationComputer sciencebusiness.industry0211 other engineering and technologiesControl softwareSingle serverCloud computing02 engineering and technologycomputer.software_genreVirtualizationlaw.inventionlawControl system0202 electrical engineering electronic engineering information engineeringOperating system020201 artificial intelligence & image processingSingle-corebusinesscomputer2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)
researchProduct

Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage

2019

Given two strings: pattern $p$ of length $m$ and text $t$ of length $n$ . The string matching problem is to find all (or some) occurrences of the pattern $p$ in the text $t$ . We introduce a new simple data structure, called index arrays, and design fast privacy-preserving matching algorithm for string matching. The motivation behind introducing index arrays is determined by the need for pattern matching on distributed cloud-based datasets with semi-trusted cloud providers. It is intended to use encrypted index arrays both to improve performance and protect confidentiality and privacy of user data.

021110 strategic defence & security studiesTheoretical computer scienceComputer sciencebusiness.industry0211 other engineering and technologiesCloud computing02 engineering and technologyString searching algorithmData structureEncryptionSimple (abstract algebra)Computer data storagePattern matchingbusinessBlossom algorithm2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
researchProduct

Self-validating bundles for flexible data access control

2016

Modern cloud-based services offer free or low-cost content sharing with significant advantages for the users but also new issues in privacy and security. To protect sensitive contents (i.e., copyrighted, top secret, and personal data) from the unauthorized access, sophisticated access management systems or/and decryption schemes have been proposed, generally based on trusted applications at client side. These applications work also as access controllers, verifying specific permissions and restrictions accessing user’s resources. We propose secure bundles (S-bundles), which encapsulate a behavioral model (provided as bytecode) to define versatile stand-alone access controllers and encoding/d…

021110 strategic defence & security studiesbundle information-centric security access policy bytecodeComputer sciencebusiness.industrySettore ING-INF/03 - Telecomunicazioni0211 other engineering and technologies020207 software engineeringAccess controlCloud computing02 engineering and technologyClient-sideComputer securitycomputer.software_genreMetadataData access0202 electrical engineering electronic engineering information engineeringData Protection Act 1998businesscomputerAccess structure
researchProduct

On Detection of Network-Based Co-residence Verification Attacks in SDN-Driven Clouds

2017

Modern cloud environments allow users to consume computational and storage resources in the form of virtual machines. Even though machines running on the same cloud server are logically isolated from each other, a malicious customer can create various side channels to obtain sensitive information from co-located machines. In this study, we concentrate on timely detection of intentional co-residence attempts in cloud environments that utilize software-defined networking. SDN enables global visibility of the network state which allows the cloud provider to monitor and extract necessary information from each flow in every virtual network in online mode. We analyze the extracted statistics on d…

021110 strategic defence & security studiesbusiness.industryComputer scienceVisibility (geometry)0211 other engineering and technologiesBotnetCloud computingcloud environments02 engineering and technologycomputer.software_genrepilvipalvelutInformation sensitivityMode (computer interface)Virtual machine0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingState (computer science)co-residence detectiontietoturvavirtual networksbusinessVirtual networkcomputerComputer network
researchProduct