• Title/Summary/Keyword: cloud robotics

Search Result 57, Processing Time 0.019 seconds

Classification of Objects using CNN-Based Vision and Lidar Fusion in Autonomous Vehicle Environment

  • G.komali ;A.Sri Nagesh
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.67-72
    • /
    • 2023
  • In the past decade, Autonomous Vehicle Systems (AVS) have advanced at an exponential rate, particularly due to improvements in artificial intelligence, which have had a significant impact on social as well as road safety and the future of transportation systems. The fusion of light detection and ranging (LiDAR) and camera data in real-time is known to be a crucial process in many applications, such as in autonomous driving, industrial automation and robotics. Especially in the case of autonomous vehicles, the efficient fusion of data from these two types of sensors is important to enabling the depth of objects as well as the classification of objects at short and long distances. This paper presents classification of objects using CNN based vision and Light Detection and Ranging (LIDAR) fusion in autonomous vehicles in the environment. This method is based on convolutional neural network (CNN) and image up sampling theory. By creating a point cloud of LIDAR data up sampling and converting into pixel-level depth information, depth information is connected with Red Green Blue data and fed into a deep CNN. The proposed method can obtain informative feature representation for object classification in autonomous vehicle environment using the integrated vision and LIDAR data. This method is adopted to guarantee both object classification accuracy and minimal loss. Experimental results show the effectiveness and efficiency of presented approach for objects classification.

A Longitudinal Study on Customers' Usable Features and Needs of Activity Trackers as IoT based Devices (사물인터넷 기반 활동량측정기의 고객사용특성 및 욕구에 대한 종단연구)

  • Hong, Suk-Ki;Yoon, Sang-Chul
    • Journal of Internet Computing and Services
    • /
    • v.20 no.1
    • /
    • pp.17-24
    • /
    • 2019
  • Since the information of $4^{th}$ Industrial Revolution is introduced in WEF (World Economic Forum) in 2016, IoT, AI, Big Data, 5G, Cloud Computing, 3D/4DPrinting, Robotics, Nano Technology, and Bio Engineering have been rapidly developed as business applications as well as technologies themselves. Among the diverse business applications for IoT, wearable devices are recognized as the leading application devices for final customers. This longitudinal study is compared to the results of the 1st study conducted to identify customer needs of activity trackers, and links the identified users' needs with the well-known marketing frame of marketing mix. For this longitudinal study, a survey was applied to university students in June, 2018, and ANOVA were applied for major variables on usable features. Further, potential customer needs were identified and visualized by Word Cloud Technique. According to the analysis results, different from other high tech IT devices, activity trackers have diverse and unique potential needs. The results of this longitudinal study contribute primarily to understand usable features and their changes according to product maturity. It would provide some valuable implications in dynamic manner to activity tracker designers as well as researchers in this arena.

Projection mapping onto multiple objects using a projector robot

  • Yamazoe, Hirotake;Kasetani, Misaki;Noguchi, Tomonobu;Lee, Joo-Ho
    • Advances in robotics research
    • /
    • v.2 no.1
    • /
    • pp.45-57
    • /
    • 2018
  • Even though the popularity of projection mapping continues to increase and it is being implemented in more and more settings, most current projection mapping systems are limited to special purposes, such as outdoor events, live theater and musical performances. This lack of versatility arises from the large number of projectors needed and their proper calibration. Furthermore, we cannot change the positions and poses of projectors, or their projection targets, after the projectors have been calibrated. To overcome these problems, we propose a projection mapping method using a projector robot that can perform projection mapping in more general or ubiquitous situations, such as shopping malls. We can estimate a projector's position and pose with the robot's self-localization sensors, but the accuracy of this approach remains inadequate for projection mapping. Consequently, the proposed method solves this problem by combining self-localization by robot sensors with position and pose estimation of projection targets based on a 3D model. We first obtain the projection target's 3D model and then use it to accurately estimate the target's position and pose and thus achieve accurate projection mapping with a projector robot. In addition, our proposed method performs accurate projection mapping even after a projection target has been moved, which often occur in shopping malls. In this paper, we employ Ubiquitous Display (UD), which we are researching as a projector robot, to experimentally evaluate the effectiveness of the proposed method.

3D Image Scan Automation Planning based on Mobile Rover (이동식 로버 기반 스캔 자동화 계획에 대한 연구)

  • Kang, Tae-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.8
    • /
    • pp.1-7
    • /
    • 2019
  • When using conventional 3D image scanning methods, it is common for image scanning to be done manually, which is labor-intensive. Scanning a space made up of complicated equipment or scanning a narrow space that is difficult for the user to enter, is problematic, resulting in quality degradation due to the presence of shadow areas. This paper proposes a method to scan an image using a rover equipped with a scanner in areas where it is difficult for a person to enter. To control the scan path precisely, the 3D image remote scan automation method based on the rover move rule definition is described. Through the study, the user can automate the 3D scan plan in a desired manner by defining the rover scan path as the rule base.

A Study on Establishment of Mid- to Long-Term Comprehensive Development Plan for the Bank of Korea Library (시대적 변화에 따른 경제·금융전문도서관 발전 방향 모색에 관한 연구 - 한국은행 도서관을 중심으로 -)

  • Noh, Younghee;Ko, Jae-Min;Chang, Inho;Ro, Ji-Yoon
    • Journal of Korean Library and Information Science Society
    • /
    • v.52 no.2
    • /
    • pp.65-84
    • /
    • 2021
  • This study aimed to analyze the overall operation status of the Bank of Korea library representing the economic library in Korea, investigate user satisfaction and demand, and to propose a direction for the development of the economic library in the future. To this end, a case study was conducted on changes in the external environment of major libraries at home and abroad, and a user survey was conducted. As a result, the future tasks include introducing smart systems, robotics some library services, non-face-to-face service response spaces that reflect the times, introducing big data analysis services, strengthening user-tailored systems, and activating SNS communication. It proposed developing specialized libraries, online reference and research support services, and providing original DBs for publications to strengthen expertise, maintaining and expanding cloud services, maintaining and expanding cooperative projects, and collecting national knowledge and information.

Data Augmentation for Tomato Detection and Pose Estimation (토마토 위치 및 자세 추정을 위한 데이터 증대기법)

  • Jang, Minho;Hwang, Youngbae
    • Journal of Broadcast Engineering
    • /
    • v.27 no.1
    • /
    • pp.44-55
    • /
    • 2022
  • In order to automatically provide information on fruits in agricultural related broadcasting contents, instance image segmentation of target fruits is required. In addition, the information on the 3D pose of the corresponding fruit may be meaningfully used. This paper represents research that provides information about tomatoes in video content. A large amount of data is required to learn the instance segmentation, but it is difficult to obtain sufficient training data. Therefore, the training data is generated through a data augmentation technique based on a small amount of real images. Compared to the result using only the real images, it is shown that the detection performance is improved as a result of learning through the synthesized image created by separating the foreground and background. As a result of learning augmented images using images created using conventional image pre-processing techniques, it was shown that higher performance was obtained than synthetic images in which foreground and background were separated. To estimate the pose from the result of object detection, a point cloud was obtained using an RGB-D camera. Then, cylinder fitting based on least square minimization is performed, and the tomato pose is estimated through the axial direction of the cylinder. We show that the results of detection, instance image segmentation, and cylinder fitting of a target object effectively through various experiments.

A Design of Authentication Mechanism for Secure Communication in Smart Factory Environments (스마트 팩토리 환경에서 안전한 통신을 위한 인증 메커니즘 설계)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2024
  • Smart factories represent production facilities where cutting-edge information and communication technologies are fused with manufacturing processes, reflecting rapid advancements and changes in the global manufacturing sector. They capitalize on the integration of robotics and automation, the Internet of Things (IoT), and the convergence of artificial intelligence technologies to maximize production efficiency in various manufacturing environments. However, the smart factory environment is prone to security threats and vulnerabilities due to various attack techniques. When security threats occur in smart factories, they can lead to financial losses, damage to corporate reputation, and even human casualties, necessitating an appropriate security response. Therefore, this paper proposes a security authentication mechanism for safe communication in the smart factory environment. The components of the proposed authentication mechanism include smart devices, an internal operation management system, an authentication system, and a cloud storage server. The smart device registration process, authentication procedure, and the detailed design of anomaly detection and update procedures were meticulously developed. And the safety of the proposed authentication mechanism was analyzed, and through performance analysis with existing authentication mechanisms, we confirmed an efficiency improvement of approximately 8%. Additionally, this paper presents directions for future research on lightweight protocols and security strategies for the application of the proposed technology, aiming to enhance security.