In recent years, aerial robots have become increasingly popular, with potential applications in a variety of fields. Many of these robots are primarily designed to fly around and collect visual data from their surrounding environment, yet some are also able to grasp,...
TECHXPLORE
A unifying approach for controlling flying robotic insects
One of the key problems confronting researchers in the field of microrobotics is designing and implementing reliable controllers for insect-scale micro air vehicles (FWMAVs), which are tiny flying robots typically inspired by insects. In fact, although these...
A user-friendly approach for active reward learning in robots
In recent years, researchers have been trying to develop methods that enable robots to learn new skills. One option is for a robot to learn these new skills from humans, asking questions whenever it is unsure about how to behave, and learning from the human user's...
Batteries with fluorinated electrolytes that work at very high and low temperatures
Electrolytes are chemical components that enable the flow of ions between the cathode and anode inside batteries, ultimately providing electrical power to technological devices. Most conventional and readily available non-aqueous Li-ion batteries are fabricated using...
Box of Pain: A new tracer and fault injector for distributed systems
In computer science, distributed systems are systems with components located on different devices, which communicate with one another. While these systems have become increasingly common, they are typically filled with bugs.
Building 3-D models of unknown objects as they are manipulated by robots
Researchers at Rutgers University have recently developed a probabilistic approach for building 3-D models of unknown objects while they are being manipulated by a robot. Their approach, outlined in a paper pre-published on arXiv, uses a physics engine to verify...
Circular all-or-nothing: A new approach to protect data from key exposure
A team of researchers at Telecom ParisTech has developed a new method to protect encrypted data against key exposure. Their algorithm, presented in a paper pre-published on arXiv, transforms, fragments and disperses data so that it remains protected, unless all...
CycleMatch: a new approach for matching images and text
Researchers at Leiden University and the National University of Defense Technology (NUDT), in China, have recently developed a new approach for image-text matching, called CycleMatch. Their approach, presented in a paper published in Elsevier's Pattern Recognition...
DeepCrack: a new hierarchical CNN-based method for crack segmentation
Detecting and analyzing cracks in man-made structures is an important task that can help to ensure that buildings are safe and well-maintained. As employing human workers to inspect buildings regularly can be very expensive, researchers have been trying to develop...
DeepWiTraffic: A Wi-Fi based traffic monitoring system using deep learning
A team of researchers at the University of Memphis has recently developed a low-cost and portable traffic monitoring system (TMS) called DeepWiTraffic. This new system, presented in a paper pre-published on arXiv, combines Wi-Fi devices and deep learning.