SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "L773:9781467365635 "

Search: L773:9781467365635

  • Result 1-7 of 7
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Chew, Weng Chuen, et al. (author)
  • ReCon-AVe: Remote Controlled Automobile Vehicle For Data Mining And Analysis
  • 2015
  • In: 39TH ANNUAL IEEE COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2015), VOL 2. - : IEEE. - 9781467365635 ; , s. 569-574
  • Conference paper (peer-reviewed)abstract
    • This paper explores the control of an automobile mounted with a BlackWidow 1.0 microcontroller from a remote location using a smartphone or a computer as a data mining and analysis device as well as for the purposes of first response search and rescue during a disaster relief operation. Custom application programs; ReCon-A for the Android platform and ReCon-V for Microsoft Windows are designed specifically for this project to control the ReCon-AVe vehicle. It is found that the remote controllers are able to control the automobile from distance of more than 20m away in indoor conditions using direct connections. In outdoor conditions, communications using the computer as the remote controller can reach up to 35m while using the smartphone can achieve up to 25m away. Other than that, tests show that the response time of ReCon-AVe is less than 60ms in indoor conditions and 85ms in outdoor conditions. In addition, it can provide visual feedback to the user at a minimum 16fps that also comes with a panning capability. Apart from that, ReCon-AVe proves its capabilities to acquire two different types of sensory data obtained from sensors and then have them transferred back to the user wirelessly for data mining and analysis.
  •  
2.
  • Jia Wei Tang, Samuel, et al. (author)
  • Real-Time Lane Detection and Rear-End Collision Warning System On A Mobile Computing Platform
  • 2015
  • In: 39TH ANNUAL IEEE COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2015), VOL 2. - : IEEE. - 9781467365635 ; , s. 563-568
  • Conference paper (peer-reviewed)abstract
    • Accident prevention systems have recently been a part of many modern cars to reduce injuries and casualties on the road. However, the high cost of components and equipment have limited such safety systems to higher-end and luxury vehicles. This paper proposes an economical method of using a smartphone application for real-time lane detection and rear-end collision warning system for drivers on the road. The Android-based application uses image-processing algorithms coupled with the monoscopic camera on the smartphone as the main sensor to perform lane and vehicle detections. The novelty of this work lies in the use of the monocular vision of the camera to estimate the distance with the vehicle up ahead. The system is able to distinguish unintentional lane departure and if the driver is traveling too close to the vehicle ahead. An acoustic warning will notify the driver of a potential accident.
  •  
3.
  • Ray, Apala, et al. (author)
  • Applicability of LTE Public Key Infrastructure Based Device Authentication in Industrial Plants
  • 2015. - 9
  • In: Proceedings - IEEE Computer Society's International Computer Software and Applications Conference. - 9781467365642 - 9781467365635 ; , s. 510-515
  • Conference paper (peer-reviewed)abstract
    • The security in industrial automation domain using cryptography mechanisms is being discussed in both industry and academia. An efficient key management system is required to support cryptography for both symmetric key and public/private key encryption. The key management should ensure that the device is verified before distributing the initial key parameters to devices. The software/firmware used in the device comes from manufacturers, therefore the initial authenticity of the device can be easily verified with the help of manufacturers. Mobile telecommunication is an industrial segment where wireless devices are being used for a long time and the security of the wireless device management has been considered through a standard driven approach. Therefore, it is interesting to analyse the security authentication mechanisms used in mobile communication, specified in Long-Term-Evolution (LTE) standard. This paper analyses the initial device authentication using public key infrastructure in LTE standard, and discusses if, where and how the studied solutions can be tailored for device authenticity verification in industrial plant automation systems.
  •  
4.
  • Seceleanu, Cristina (author)
  • Cyber-physical Systems : Interoperability and Distributed Intelligence
  • 2015
  • In: 39th IEEE Annual Computer Software and Applications Conference COMPSAC 2015. - 9781467365635 ; , s. 45-45
  • Conference paper (peer-reviewed)abstract
    • Ranging from automation systems and robots to smart grids and electronically coupled vehicle convoys, cyber-physical systems are the result of bringing together two worlds: the physical and the digital. Such a marriage poses a variety of challenges in terms of managing the complexity of the often large numbers of inter-connected devices and services, as well as understanding and solving the emerging technological and IT governance issues. These and other aspects have motivated this panel, aimed at discussing the underlying problems, benefits and risks associated with the distributed intelligence of cyber-physical systems.
  •  
5.
  • Seceleanu, Tiberiu (author)
  • Complex Systems : Simply, Improve Life
  • 2015
  • In: Proceedings - International Computer Software and Applications Conference. - 9781467365635 ; , s. 49-49
  • Conference paper (peer-reviewed)abstract
    • Cyber-Physical Systems, building on embedded systems and ICT are large complex systems that pose challenges at multiple stages, out of which we mention here design, ownership and utilization. These systems are more and more penetrating our every-day life, impacting on multiple aspects of our activities. In spite of their complexity, or due to that, these systems are offering new opportunities for improving the quality of our lives, simplify our work while helping us to improve the results, and provide support for longer life-spans. 
  •  
6.
  • Seceleanu, Tiberiu, et al. (author)
  • Message from ECpE Symposium Organizing Committee
  • 2015
  • In: Proceedings - International Computer Software and Applications ConferenceVolume 2. - 9781467365635 ; , s. 4-4
  • Conference paper (other academic/artistic)
  •  
7.
  • Thekkilakattil, Abhilash, et al. (author)
  • Ethics Aspects of Embedded and Cyber-Physical Systems
  • 2015
  • In: 39th IEEE Annual Computer Software and Applications Conference, COMPSAC 2015, Taichung, Taiwan, 1-5 July 2015. - : IEEE. - 0730-3157. - 9781467365635
  • Conference paper (peer-reviewed)abstract
    • The growing complexity of software employed in the cyber-physical domain is calling for a thorough study of both its functional and extra-functional properties. Ethical aspects are among important extra-functional properties, that cover the whole life cycle with different stages from design, development, deployment/production to use of cyber physical systems. One of the ethical challenges involved is the question of identifying the responsibilities of each stakeholder associated with the development and use of a cyber-physical system. This challenge is made even more pressing by the introduction of autonomous increasingly intelligent systems that can perform functionalities without human intervention, because of the lack of experience, best practices and policies for such technology. In this article, we provide a framework for responsibility attribution based on the amount of autonomy and automation involved in AI based cyber-physical systems. Our approach enables traceability of anomalous behaviors back to the responsible agents, be they human or software, allowing us to identify and separate the 'responsibility' of the decision-making software from human responsibility. This provides us with a framework to accommodate the ethical 'responsibility' of the software for AI based cyber-physical systems that will be deployed in the future, underscoring the role of ethics as an important extra-functional property. Finally, this systematic approach makes apparent the need for rigorous communication protocols between different actors associated with the development and operation of cyber-physical systems that further identifies the ethical challenges involved in the form of group responsibilities.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-7 of 7

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view