You are currently viewing a new version of our website. To view the old version click .

Electronics, Volume 13, Issue 14

July-2 2024 - 207 articles

Cover Story: The efficient operation and interaction of autonomous robots are crucial in fields like security, environmental monitoring, and disaster response. Processing large sensor data on-device leads to high computational demands, battery consumption, and heat issues. This study proposes an Edge-Driving Robotics Platform (EDRP) and a Local Dynamic Map Platform (LDMP) using 5G edge computing and Kubernetes to address these challenges. The EDRP offloads robot functions to an edge cloud, while the LDMP shares dynamic object information based on the ETSI TR 103 324 standard, ensuring robot cooperation and compatibility with C-ITS components. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (207)

  • Article
  • Open Access
1,602 Views
16 Pages

The formation of unmanned surface vehicles (USVs) stands as a paramount concern in USV formation control research. In addressing this, this paper introduces a novel formation strategy for USVs, which accounts for their arbitrary initial positions and...

  • Article
  • Open Access
3 Citations
2,609 Views
16 Pages

Research on Path Planning Method for Autonomous Patrol Robots

  • Qiang Zou,
  • Haipeng Wang,
  • Tianle Zhang,
  • Zhengqi Li and
  • Yaoming Zhuang

For autonomous patrol robots, how to complete multi-point path planning efficiently is a crucial challenge. To address this issue, this work proposes a practical and efficient path planning method for patrol robots. Firstly, the evaluation function o...

  • Article
  • Open Access
2 Citations
2,631 Views
15 Pages

Although Three-dimensional (3D) printers have legitimate applications in various fields, they also present opportunities for misuse by criminals who can infringe upon intellectual property rights, manufacture counterfeit medical products, or create u...

  • Article
  • Open Access
2 Citations
2,423 Views
14 Pages

This paper presents a study on the double-loop controller design technique for a single-phase power factor correction (PFC) three-level (TL) boost converter. Designing a double-loop controller using conventional methods is challenging due to the 120...

  • Article
  • Open Access
1,668 Views
12 Pages

This study presents an innovative method to optimize convolutional neural networks (CNNs) tailored for the prevalent low-power platforms in IoT and embedded devices, which are integral to smart city infrastructures. Our approach introduces a novel &l...

  • Article
  • Open Access
9 Citations
2,446 Views
13 Pages

A YOLOv5 aluminum profile defect detection algorithm that integrates attention and multi-scale features is proposed in this paper to address the issues of the low detection accuracy, high false detection rates, and high missed detection rates that ar...

  • Article
  • Open Access
4 Citations
1,490 Views
20 Pages

Secret sharing is a data security technique that divides secret information into multiple parts, embeds these parts into various shares, and distributes these shares to different participants. The original secret information can be retrieved only whe...

  • Article
  • Open Access
1 Citations
1,712 Views
31 Pages

In the not-too-distant future, humans will return to the Moon and step foot for the first time on Mars. Eventually, humanity will colonize these celestial bodies, where living and working will be commonplace. Energy is fundamental to all life. The en...

  • Article
  • Open Access
5 Citations
7,115 Views
19 Pages

Data Stealing Attacks against Large Language Models via Backdooring

  • Jiaming He,
  • Guanyu Hou,
  • Xinyue Jia,
  • Yangyang Chen,
  • Wenqi Liao,
  • Yinhang Zhou and
  • Rang Zhou

Large language models (LLMs) have gained immense attention and are being increasingly applied in various domains. However, this technological leap forward poses serious security and privacy concerns. This paper explores a novel approach to data steal...

  • Article
  • Open Access
4 Citations
2,387 Views
16 Pages

Robots in hazardous environments demand precise and advanced motion control, making extensive simulations crucial for verifying the safety of motion planning. This paper presents a simulation system that enables interactive path editing, allowing for...

of 21

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Electronics - ISSN 2079-9292