Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- 2D Wiener Filter (1)
- Access Control (1)
- Anonymity (1)
- Authentication (1)
- Biometric Matching (1)
-
- Contrast Enhancement (1)
- Face Tracking (1)
- GTAW (1)
- HyperNet (1)
- Image Reshaping (1)
- Intelligent welding robot (1)
- Network hypervisor (1)
- Privacy (1)
- Programmable router (1)
- SDN (1)
- See-through Display (1)
- Virtual network (1)
- Virtualized welding (1)
- Welder rating system (1)
- Welder response modeling (1)
Articles 1 - 4 of 4
Full-Text Articles in Engineering
Virtualized Welding Based Learning Of Human Welder Behaviors For Intelligent Robotic Welding, Yukang Liu
Virtualized Welding Based Learning Of Human Welder Behaviors For Intelligent Robotic Welding, Yukang Liu
Theses and Dissertations--Electrical and Computer Engineering
Combining human welder (with intelligence and sensing versatility) and automated welding robots (with precision and consistency) can lead to next generation intelligent welding systems. In this dissertation intelligent welding robots are developed by process modeling / control method and learning the human welder behavior.
Weld penetration and 3D weld pool surface are first accurately controlled for an automated Gas Tungsten Arc Welding (GTAW) machine. Closed-form model predictive control (MPC) algorithm is derived for real-time welding applications. Skilled welder response to 3D weld pool surface by adjusting the welding current is then modeled using Adaptive Neuro-Fuzzy Inference System (ANFIS), and compared …
Robomirror: A Simulated Mirror Display With A Robotic Camera, Yuqi Zhang
Robomirror: A Simulated Mirror Display With A Robotic Camera, Yuqi Zhang
Theses and Dissertations--Electrical and Computer Engineering
Simulated mirror displays have a promising prospect in applications, due to its capability for virtual visualization. In most existing mirror displays, cameras are placed on top of the displays and unable to capture the person in front of the display at the highest possible resolution. The lack of a direct frontal capture of the subject's face and the geometric error introduced by image warping techniques make realistic mirror image rendering a challenging problem. The objective of this thesis is to explore the use of a robotic camera in tracking the face of the subject in front of the display to …
Efficient Anonymous Biometric Matching In Privacy-Aware Environments, Ying Luo
Efficient Anonymous Biometric Matching In Privacy-Aware Environments, Ying Luo
Theses and Dissertations--Electrical and Computer Engineering
Video surveillance is an important tool used in security and environmental monitoring, however, the widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been recently proposed to automatically redact images of selected individuals in the surveillance video for protection. To identify these individuals for protection, the most reliable approach is to use biometric signals as they are immutable and highly discriminative. If misused, these characteristics of biometrics can seriously defeat the goal of privacy protection. In this dissertation, an Anonymous Biometric Access Control (ABAC) procedure is proposed based on biometric signals for privacy-aware video surveillance. …
A Hypernet Architecture, Shufeng Huang
A Hypernet Architecture, Shufeng Huang
Theses and Dissertations--Computer Science
Network virtualization is becoming a fundamental building block of future Internet architectures. By adding networking resources into the “cloud”, it is possible for users to rent virtual routers from the underlying network infrastructure, connect them with virtual channels to form a virtual network, and tailor the virtual network (e.g., load application-specific networking protocols, libraries and software stacks on to the virtual routers) to carry out a specific task. In addition, network virtualization technology allows such special-purpose virtual networks to co-exist on the same set of network infrastructure without interfering with each other.
Although the underlying network resources needed to support …