Mobile Cyber-Physical Labs: Integration of Mobile Devices with System and Control Laboratories

Author(s):  
Jared A. Frank ◽  
Anthony Brill ◽  
Vikram Kapila
Keyword(s):  
Robotics ◽  
2013 ◽  
pp. 1644-1661
Author(s):  
Ibrahima Ngom ◽  
Hamadou Saliah-Hassane ◽  
Claude Lishou

Failure to integrate heterogeneous wireless systems generally makes it difficult, if not impossible, for the continuation of remote working or remote experiments when human operators and equipment coexist through networks in a collaborative environment. Mobile laboratories using ubiquitous mobile communication for next-generation heterogeneous wireless systems have prospects for increasing the operation of distributed communication and mobile ubiquitous systems. All “technology assessors” concur that tomorrow's society will have access to smart objects (mobile devices or apparatuses, mobile equipment, e.g. robots) that contain “programs” that will assist with communication in everyday life. However one of the tomorrow’s challenges will consist of programming those objects to cooperate with and control telecommunications technologies. For a Mobile Laboratory to ensure consistent mobility in an environment, it must combine various wireless networks as a single integrated system. In this chapter we propose a Mobile Laboratory Model with mobile devices that take advantage of multiple mobile gateways by using Internet Protocol (IP) as the interconnection protocol to achieve the objective stated above.


Author(s):  
Ibrahima Ngom ◽  
Hamadou Saliah-Hassane ◽  
Claude Lishou

Failure to integrate heterogeneous wireless systems generally makes it difficult, if not impossible, for the continuation of remote working or remote experiments when human operators and equipment coexist through networks in a collaborative environment. Mobile laboratories using ubiquitous mobile communication for next-generation heterogeneous wireless systems have prospects for increasing the operation of distributed communication and mobile ubiquitous systems. All “technology assessors” concur that tomorrow’s society will have access to smart objects (mobile devices or apparatuses, mobile equipment, e.g. robots) that contain “programs” that will assist with communication in everyday life. However one of the tomorrow’s challenges will consist of programming those objects to cooperate with and control telecommunications technologies. For a Mobile Laboratory to ensure consistent mobility in an environment, it must combine various wireless networks as a single integrated system. In this chapter we propose a Mobile Laboratory Model with mobile devices that take advantage of multiple mobile gateways by using Internet Protocol (IP) as the interconnection protocol to achieve the objective stated above.


2020 ◽  
Vol 305 ◽  
pp. 00022
Author(s):  
Marius Leonard Olar ◽  
Marius Risteiu ◽  
Arun Fabian Panaite ◽  
Mihai Rebrisoreanu ◽  
Oliviu Musetoiu

Under the circumstances of a patient’s upper limb disability, aided by a robotic arm with faulty controls, assistance is needed, using augmented reality as an auxiliary. Our system, with a headset, using an internet connection and an augmented reality device, placed on the assistant’s head, can ensure communication between the two, for both remote supervision and control. The assistant can enhance the control over the robotic arm, while having a head up display on the augmented reality glasses, based on what the patient sees. The communication is established through PC or mobile devices, connected to the internet. Having the patient’s view, and enhanced control over the robotic arm, the assistant can interact with nearby smart objects.


Leonardo ◽  
2006 ◽  
Vol 39 (4) ◽  
pp. 345-347 ◽  
Author(s):  
Anthony Townsend

The adoption of mobile devices as the computers of the 21st century marks a shift away from the fixed terminals that dominated the first 50 years of computing. Associated with this shift will be a new emphasis on context-aware computing. This article examines design approaches to context-aware computing and argues that the evolution of this technology will be characterized by an interplay between top-down systems for command and control and bottom-up systems for collective action. This process will lead to the emergence of “contested-aware cities,” in which power struggles are waged in public spaces with the assistance of context-aware systems.


Author(s):  
Gianluca Paravati ◽  
Fabrizio Lamberti ◽  
Andrea Sanna ◽  
Cesare Celozzi

Recent improvements in technology have opened new, intriguing, and challenging scenarios for the latest generation of mobile devices, and users are asking for an ever larger spectrum of applications. In particular, implementation of interactive applications is an exciting task. In spite of the continuous improvements in the hardware components of mobile devices, several applications are still based on the remote visualization paradigm that adopts streaming based solutions. Nevertheless, some interactive applications introduce hard constraints to be met when low-delay systems have to be designed. Moreover, these systems have to cope with unstable network bandwidth and limited device capabilities. This Chapter first reviews classic strategies to design and implement remote visualization architectures and then presents recent developments regarding high-performance solutions for streaming interactive and customizable contents to mobile devices. In particular, the newest techniques that are specifically able to efficiently cope with bandwidth fluctuations are discussed, and a comparison between optimization based and control based approaches is addressed.


2017 ◽  
Vol 2017 ◽  
pp. 1-13 ◽  
Author(s):  
Wonhyung Park ◽  
Byeong Ho Kang

A lot of mobile applications which provided location information by using a location-based service are being developed recently. For instance, a smart phone would find my location and destination by running a program using a GPS chip in a device. However, the information leakage and the crime that misused the leaked information caused by the cyberattack of mobile information system occurred. So the interest and importance of information security are increasing. Also the number of users who has used mobile devices in Korea is increasing, and the security of mobile devices is becoming more important. Snort detection system has been used to detect and handle cyberattacks but the policy of Snort detection system is applied differently for each of the different kinds of equipment. It is expected that the security of mobile information system would be improved and information leakage would be blocked by selecting options through optimization of Snort detection policy to protect users who are using location-based service in mobile information system environment in this paper.


Author(s):  
Ji Wang ◽  
Weidong Bao ◽  
Lichao Sun ◽  
Xiaomin Zhu ◽  
Bokai Cao ◽  
...  

The soaring demand for intelligent mobile applications calls for deploying powerful deep neural networks (DNNs) on mobile devices. However, the outstanding performance of DNNs notoriously relies on increasingly complex models, which in turn is associated with an increase in computational expense far surpassing mobile devices’ capacity. What is worse, app service providers need to collect and utilize a large volume of users’ data, which contain sensitive information, to build the sophisticated DNN models. Directly deploying these models on public mobile devices presents prohibitive privacy risk. To benefit from the on-device deep learning without the capacity and privacy concerns, we design a private model compression framework RONA. Following the knowledge distillation paradigm, we jointly use hint learning, distillation learning, and self learning to train a compact and fast neural network. The knowledge distilled from the cumbersome model is adaptively bounded and carefully perturbed to enforce differential privacy. We further propose an elegant query sample selection method to reduce the number of queries and control the privacy loss. A series of empirical evaluations as well as the implementation on an Android mobile device show that RONA can not only compress cumbersome models efficiently but also provide a strong privacy guarantee. For example, on SVHN, when a meaningful (9.83,10−6)-differential privacy is guaranteed, the compact model trained by RONA can obtain 20× compression ratio and 19× speed-up with merely 0.97% accuracy loss.


2010 ◽  
pp. 154-158
Author(s):  
Paul Stack

Imagine the ability to monitor and control your building systems from your mobile phone. With advances in Information Technology, the integration of mobile devices with building management and automation systems is rarely exploited. Mobile solutions are currently being designed for personal communication and collection of information for various applications. The integration of mobile devices with inventory and stock systems, of which an example would be to check if spare parts are available for repair of a building system, like a pump, or if the part needs to be ordered. My research involves the use of building performance information, collected from sensors, meters and actuators for controlling building equipment, to support maintenance engineers and improve their decision-making process. This research is part of a project named ITOBO (Information and Communication Technology for Sustainable and Optimised Building Operation). ITOBO focuses on applying optimised maintenance procedures based on building performance levels and delve ...


Sign in / Sign up

Export Citation Format

Share Document