Search results for "clou"
showing 10 items of 830 documents
Real-time human collision detection for industrial robot cells
2017
A collision detection system triggering on human motion was developed using the Robot Operating System (ROS) and the Point Cloud Library (PCL). ROS was used as the core of the programs and for the communication with an industrial robot. Combining the depths fields from the 3D cameras was accomplished by the use of PCL. The library was also the underlying tool for segmenting the human from the registrated point clouds. Benchmarking of several collision algorithms was done in order to compare the solution. The registration process gave satisfactory results when testing the repetitiveness and the accuracy of the implementation. The segmentation algorithm was able to segment a person represente…
3D Point Cloud Descriptor for Posture Recognition
2018
International audience
Static and Dynamic Objects Analysis as a 3D Vector Field
2017
International audience; In the context of scene modelling, understanding, and landmark-based robot navigation, the knowledge of static scene parts and moving objects with their motion behaviours plays a vital role. We present a complete framework to detect and extract the moving objects to reconstruct a high quality static map. For a moving 3D camera setup, we propose a novel 3D Flow Field Analysis approach which accurately detects the moving objects using only 3D point cloud information. Further, we introduce a Sparse Flow Clustering approach to effectively and robustly group the motion flow vectors. Experiments show that the proposed Flow Field Analysis algorithm and Sparse Flow Clusterin…
Industry 4.0 Technologies for Manufacturing Sustainability: A Systematic Review and Future Research Directions
2021
Recent developments in manufacturing processes and automation have led to the new industrial revolution termed “Industry 4.0”. Industry 4.0 can be considered as a broad domain which includes: data management, manufacturing competitiveness, production processes and efficiency. The term Industry 4.0 includes a variety of key enabling technologies i.e., cyber physical systems, Internet of Things, artificial intelligence, big data analytics and digital twins which can be considered as the major contributors to automated and digital manufacturing environments. Sustainability can be considered as the core of business strategy which is highlighted in the United Nations (UN) Sustainability 2030 age…
Impact of accounting process characteristics on accounting outsourcing - Comparison of users and non-users of cloud-based accounting information syst…
2019
Article In Press The article of record as published may be found at https://doi.org/10.1016/j.accinf.2019.06.002 Prior literature informs us that a company's decision to outsource a business process depends on process characteristics such as how frequently the process is performed or how specific the assets required by the process are. In this article, we compare the effects of accounting process characteristics on outsourcing decisions across users of traditional and cloud-based accounting information systems (AIS). By focusing on outsourcing of accounting processes among small and medium sized enterprises, we investigate the effect of five business process characteristics (frequency, huma…
Towards Shipping 4.0. A preliminary gap analysis
2020
Abstract The paradigm of Industry 4.0 involves a substantial innovation to the value creation approach thought the supply chain and the application of digital enabling technologies like the Internet of Things (IoT), Big Data Analytics (BDA) and cloud computing. The fourth industrial revolution is thus expected to have a disruptive impact on maritime transport and shipping sectors, where smart ships and autonomous vessels well be part of a new and fully interconnected maritime ecosystem. Specific hardware components, such as sensors, actuators, or processors will be embedded in the ship’s key systems in order to provide valuable information to increase the efficiency, sustainability and safe…
Efficient Protection for VDI Workstations
2019
Many enterprises migrate to a private cloud VDI environment. In such an environment multiple workstations are served by a single powerful server. On such an environment each VDI workstation receives only a limited CPU power. An average of less than a quarter of a core per planned VDI workstation is a common setup. Under such cases, anti-virus and application control software load is multiplied by the number of VDI workstation running on each server. These security applications take merely a few percentages of a single core on a normal desktop. However, on a VDI server where the multiple VDI workstations run on a single server, they may consume 20-25 percent the load. Naturally, such an incr…
Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage
2019
Given two strings: pattern $p$ of length $m$ and text $t$ of length $n$ . The string matching problem is to find all (or some) occurrences of the pattern $p$ in the text $t$ . We introduce a new simple data structure, called index arrays, and design fast privacy-preserving matching algorithm for string matching. The motivation behind introducing index arrays is determined by the need for pattern matching on distributed cloud-based datasets with semi-trusted cloud providers. It is intended to use encrypted index arrays both to improve performance and protect confidentiality and privacy of user data.
Self-validating bundles for flexible data access control
2016
Modern cloud-based services offer free or low-cost content sharing with significant advantages for the users but also new issues in privacy and security. To protect sensitive contents (i.e., copyrighted, top secret, and personal data) from the unauthorized access, sophisticated access management systems or/and decryption schemes have been proposed, generally based on trusted applications at client side. These applications work also as access controllers, verifying specific permissions and restrictions accessing user’s resources. We propose secure bundles (S-bundles), which encapsulate a behavioral model (provided as bytecode) to define versatile stand-alone access controllers and encoding/d…
On Detection of Network-Based Co-residence Verification Attacks in SDN-Driven Clouds
2017
Modern cloud environments allow users to consume computational and storage resources in the form of virtual machines. Even though machines running on the same cloud server are logically isolated from each other, a malicious customer can create various side channels to obtain sensitive information from co-located machines. In this study, we concentrate on timely detection of intentional co-residence attempts in cloud environments that utilize software-defined networking. SDN enables global visibility of the network state which allows the cloud provider to monitor and extract necessary information from each flow in every virtual network in online mode. We analyze the extracted statistics on d…