Journal of Automation and Control Engineering
-
This work focuses on the main problems of interactive object transfer between a human worker and an industrial robot: the recognition of the object with partial occlusion by barriers including the hand to the human worker, the evaluation of object grasping affordance, and coping with inaccessible grasping points. The proposed visual servoing system integrates different vision modules where each module encapsulates a number of visual algorithms responsible for visual servoing control in humanrobot collaboration.
7p praishy2 27-02-2019 16 2 Download
-
To create global map we take obstacles as natural landmarks, it is however necessary to find the correspondences between landmarks by use of a Bhatacharayya distance. Our experiments demonstrate the functionality of estimating the exact pose of the robot and the consistence of the global map of the environment.
4p cathydoll5 27-02-2019 21 1 Download
-
This paper addresses the fusion processing techniques of multi-sensor data perceived through IR sensors of the military robots for surveillance, in which they are positioned in a limited range with a close distance between each of the robots.
4p cathydoll5 27-02-2019 20 1 Download
-
In this research, a novel system is designed in scope of automated highways. The aim of this system is to provide safe, secure and fast transportation on highways. This system uses both road sensors and GNSS (Global Navigation Satellite System).
4p cathydoll5 27-02-2019 24 0 Download
-
The aim of the research is to create the Optimal Multidimensional Model for small and medium sized companies in order to help them map out the best supply chain. The supply chain Automated Multidimensional Model is an interactive system that helps industries with automated facilities and products pick the best supply chain model for their market and commodities.
4p cathydoll5 27-02-2019 26 0 Download
-
The obtained results show significant improvement in terms of quality and fidelity of extracted signal. Also, the improvements in terms of robustness by the proposed method work effectively against various common image-processing-based attacks especially against compression attacks.
4p cathydoll5 27-02-2019 12 2 Download
-
Our results illustrated that feature extracted from the averaged silhouettes which in them, the lower part of the body is eliminated are more suitable rather than those extracted from the complete averaged silhouettes.
3p cathydoll5 27-02-2019 13 0 Download
-
In this paper, we present obstacles avoidance and altitude control algorithms based on fuzzy sets and possibilities distributions to control the blimp’s complexity and main behaviors of the system.
7p cathydoll5 27-02-2019 25 3 Download
-
This solution does not require a high computational power. The methodology is a threedimensional map based approach, which uses the 3D map of the surrounding environment and data acquired by a tilting Laser Range Finder (LRF), to pinpoint the robot pose. Experimental results about the accuracy of the proposed method are presented in this paper.
5p cathydoll5 27-02-2019 13 0 Download
-
This article implements a face detection process as a preliminary step to monitor the state of drowsiness on vehicle's drivers. We propose an algorithm for pre-detection based on image processing and machine learning methods. A Gabor filter bank is used for facial features extraction.
4p cathydoll5 27-02-2019 31 0 Download
-
This paper describes a shape-changing robotic mannequin. It is designed to imitate shapes of different people to be used in online clothes retail and made-tomeasure garment industry. We discuss the challenges related to creation of a female robotic mannequin and describe the technical solutions.
3p cathydoll5 27-02-2019 20 5 Download
-
The discursive examination componentessay type uses double blind marking technique to assess the performances in examination and the system model was implemented using Apache Server, PHP Programming Language , HTML, Ajax, jQuery, Javascript and MySQL Database.
5p cathydoll5 27-02-2019 23 2 Download
-
In this work, exergy analysis of the wet-compression gas turbine cycle with recuperator and turbine blade cooling is performed. The exergy destructions in the system components and cycle exergy efficiency are estimated for varying pressure ratios and water injection ratios.
4p cathydoll5 27-02-2019 35 2 Download
-
The comprehensive diagnosis ontology database, including the knowledge domains of fault, collection and structure, is established. And the relationships among the ontology are described.
6p cathydoll5 27-02-2019 27 0 Download
-
The robot equations of motion are obtained from the implemented program and verified against those obtained using only Lagrange equation. The output of program for the 3 DOF robot was used to find the optimal torque using analytical optimization analysis for a given set of parameters. This procedure analysis can be used as a benchmark analysis for any optimization technique.
5p cathydoll5 27-02-2019 25 2 Download
-
In this paper, we have attempted to focus on the continuous transition of the biped mechanism from the single support phase (SSP) to the double support phase (DSP) and vice versa. Three methods have been compared for this purpose.
7p cathydoll5 27-02-2019 22 2 Download
-
In this paper, we have attempted to focus on the continuous transition of the biped mechanism from the single support phase (SSP) to the double support phase (DSP) and vice versa. Three methods have been compared for this purpose.
4p cathydoll5 27-02-2019 24 1 Download
-
In this paper we will examine the benefits which lead us to utilize service oriented architecture in large application development.
3p cathydoll5 27-02-2019 40 4 Download
-
The present paper employs an Particle Swarm Optimization (PSO) Improved via Genetic Algorithm (IPSO) based on Support Vector Machines (SVM) for efficient prediction of various stock indices. The main difference between PSO and IPSO is shown in a graph. Different indicators from the technical analysis field of study are used as input features.
4p cathydoll5 27-02-2019 79 3 Download
-
In this paper, we introduce a practical VANETs Privacy-Preserving System which aims to the prior location and identity privacy protecting. We propose the architecture and do some close analysis about that.
4p cathydoll5 27-02-2019 34 1 Download