Results 1 to 10 of about 65,097 (295)

IMUC: Edge–End–Cloud Integrated Multi-Unmanned System Payload Management and Computing Platform [PDF]

open access: goldDrones
Multi-unmanned systems are primarily composed of unmanned vehicles, drones, and multi-legged robots, among other unmanned robotic devices. By integrating and coordinating the operation of these robotic devices, it is possible to achieve collaborative ...
Jie Tang   +3 more
doaj   +3 more sources

High performance space VPX payload computing architecture study [PDF]

open access: closed2016 IEEE Aerospace Conference, 2016
This paper describes a functional reference design for a high-performance payload processor that captures images and spectra from multiple high-resolution instruments, processes and integrates multiple real-time data streams to perform feature recognition and spatial transformations providing autonomous navigation and rendezvous capability for future ...
Alena, Richard   +4 more
openaire   +4 more sources

Adaptive control system for collaborative sorting robotic arms based on multimodal sensor fusion and edge computing [PDF]

open access: yesScientific Reports
This paper presents an innovative adaptive control system for collaborative sorting robotic arms achieving three key technical breakthroughs: (1) a multimodal sensor fusion algorithm integrating vision, force, and position sensors with dynamic ...
Yanfang Feng
doaj   +2 more sources

Evolution of the Computational Pharmaceutics Approaches in the Modeling and Prediction of Drug Payload in Lipid and Polymeric Nanocarriers [PDF]

open access: yesPharmaceuticals, 2021
This review describes different trials to model and predict drug payload in lipid and polymeric nanocarriers. It traces the evolution of the field from the earliest attempts when numerous solubility and Flory-Huggins models were applied, to the emergence of molecular dynamic simulations and docking studies, until the exciting practically successful era
Shaymaa A. Abd-algaleel   +3 more
openaire   +3 more sources

The Research of UAV Payload Calculation and Payload Platform

open access: yesHangkong gongcheng jinzhan, 2021
Payload calculation and corresponding payload platform development are important steps in the design and development of a UAV.Because an accurate payload calculation can ensure that the structural payload bearing and the force transmission of the ...
DONG Yiwei   +5 more
doaj   +1 more source

Soft-Computing-Based Estimation of a Static Load for an Overhead Crane

open access: yesSensors, 2023
Payload weight detection plays an important role in condition monitoring and automation of cranes. Crane cells and scales are commonly used in industrial practice; however, when their installation to the hoisting equipment is not possible or costly, an ...
Tom Kusznir, Jaroslaw Smoczek
doaj   +1 more source

Improved prediction error expansion and mirroring embedded samples for enhancing reversible audio data hiding

open access: yesHeliyon, 2021
Many applications work by processing either small or big data, including sensitive and confidential ones, through computer networks like cloud computing. However, many systems are public and may not provide enough security mechanisms. Meanwhile, once the
Yoga Samudra, Tohari Ahmad
doaj   +1 more source

JPEG image steganography payload location based on optimal estimation of cover co-frequency sub-image

open access: yesEURASIP Journal on Image and Video Processing, 2021
The excellent cover estimation is very important to the payload location of JPEG image steganography. But it is still hard to exactly estimate the quantized DCT coefficients in cover JPEG image.
Jie Wang   +5 more
doaj   +1 more source

An efficient data hiding for ECG signals based on the integer wavelet transform and block standard deviation

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Herein, we present an improved electrocardiogram (ECG) steganography for the protection of patients’ sensitive data, such as blood pressure, glucose level, lipid profile, and other personal health information. Based on the integer wavelet transform (IWT),
Ching-Yu Yang, Wen-Fong Wang
doaj   +1 more source

IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN [PDF]

open access: yes, 2020
Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of deployment. However, the issues related to security is less explored. The IoT devices are light weight in nature and have low
Bhowmik, Deepayan   +2 more
core   +3 more sources

Home - About - Disclaimer - Privacy