If you have any problems related to the accessibility of any content (or if you want to request that a specific publication be accessible), please contact (firstname.lastname@example.org). We will work to respond to each request in as timely a manner as possible.
Now showing items 1-10 of 25
Intent Understanding Using an Activation Spreading Architecture
In this paper, we propose a new approach for recognizing intentions of humans by observing their activities with a color plus depth (RGB-D) camera. Activities and goals are modeled as a distributed network of inter-connected ...
A Novel Cpu/Gpu Simulation Environment for Large-Scale Biologically Realistic Neural Modeling
Computational Neuroscience is an emerging field that provides unique opportunities to study complex brain structures through realistic neural simulations. However, as biological details are added to models, the execution ...
Understanding Agency in Interactions Between Children With Autism and Socially Assistive Robots
Socially assistive robotics (SAR) has increasingly been shown to have potential as a tool for social skills therapy for children with autism, a developmental disorder associated with atypical social development. This work ...
Reliable Security Algorithm for Drones Using Individual Characteristics From an EEG Signal
Unmanned aerial vehicles (UAVs) have been applied for both civilian and military applications
ParkSense: Automatic Parking Positioning by Leveraging In-Vehicle Magnetic Field Variation
Drivers often park their vehicles without consciously (physically or mentally) noting down the parked location which makes it hard and inconvenient for the users to later locate their vehicles. Existing solutions either ...
Extended rapidly exploring random tree-based dynamic path planning and replanning for mobile robots
It is necessary for a mobile robot or even a multi-robot team to be able to efficiently plan a path from its starting or current location to a desired goal location. This is a trivial task when the environment is static. ...
Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC
Fog computing, as a new paradigm, has many characteristics that are different from cloud computing. Due to the resources being limited, fog nodes/MEC hosts are vulnerable to cyberattacks. Lightweight intrusion detection ...
Recent Developments in Deep Learning for Engineering Applications
The aim of this Special Issue is to present new academic research advances and industrial developments of machine learning with emphasis on deep learning for engineering applications. We received twenty-four (24) submissions ...
VETO: An Immersive Virtual Environment for Tele-Operation
This work investigates an over-arching question: how can an immersive virtual environment be connected with its intelligent physical counterpart to allow for a more efficient man-machine collaboration. To this end, an ...