In visual cryptography, the secret can be any written text, graphical representation, or picture. This technique, some time called visual secret sharing (VSS), allows visual infor...
Industrial inspection robots, which are to move around a nuclear power plant and carry out inspection tasks, must follow a given route while observing static and dynamic features ...
Discovering web navigational trends and understanding data mining results is undeniably advantageous to web designers and web-based application builders. It is also desirable to i...
Jiyang Chen, Tong Zheng, William Thorne, Osmar R. ...
We present a self-valuing learning technique which is capable of learning how to grasp unfamiliar objects and generalize the learned abilities. The learning system consists of two...
This paper presents an algorithm to track an industrial robot hand during its movement. Based on acquired image and knowing the robot hand model, the pose is obtained. This inform...