scispace - formally typeset
Search or ask a question

Answers from top 7 papers

More filters
Papers (7)Insight
Proceedings ArticleDOI
27 Aug 2007
17 Citations
Morpheus can be readily deployed without requiring changes in other domains.
Open accessProceedings ArticleDOI
14 Mar 2016
14 Citations
Experiments confirm that Morpheus provides correct behavior and good performance.
Proceedings ArticleDOI
04 Aug 2014
27 Citations
The Morpheus Project represents a departure from recent NASA programs and projects that traditionally require longer development lifecycles and testing at remote, dedicated testing facilities.
By utilizing morphological information about the flux of real astronomical sources during object detection, Morpheus shows resiliency to false-positive identifications of sources.
The higher degree of modularity of the Morpheus AUV allows it to "morph" or change its size and components for different applications.
Open accessProceedings ArticleDOI
Jeremy J. Hart, Jennifer D. Mitchell 
03 Mar 2012
4 Citations
Designed, developed, manufactured and operated in-house by engineers at JSC, the Morpheus Project represents an unprecedented departure from recent NASA programs and projects that traditionally require longer development lifecycles and testing at remote, dedicated testing facilities.
Open accessProceedings ArticleDOI
Yanju Chen, Ruben Martins, Yu Feng 
12 Aug 2019
35 Citations
Our experiments demonstrate that our approach outperforms MORPHEUS in terms of running time and solved benchmarks.

See what other people are reading

What is visualization?
5 answers
Visualization is the process of making invisible or complex information visible through various means such as graphics, images, and multimedia. It plays a crucial role in fields like scientific computing, education, media communication, and cultural studies. Visualization aids in understanding behavior, data analysis, and enhancing communication by appealing to the visual senses of the audience. In educational settings, visualization enhances students' comprehension, critical thinking skills, and ability to create schematic maps. Moreover, visualization techniques are essential in extracting meaningful insights from vast amounts of data in scientific and computational research. The evolution of visualization methods has led to innovative approaches like direct visualization, which involves creating visual representations directly from media objects, benefiting fields like humanities and cultural institutions.
How does blockchain's decentralized and tamper-resistant nature contribute to device authentication?
5 answers
Blockchain's decentralized and tamper-resistant nature significantly enhances device authentication in IoT environments. By leveraging blockchain technology, the authentication process becomes more secure and reliable. The use of public and private blockchain networks, along with Physical Unclonable Function (PUF), ensures the authenticity of devices and users accessing services within the network. Additionally, blockchain provides a cost-effective solution for ensuring confidentiality, authentication, and authorization in IoT systems, which is crucial due to the sensitive data transmitted by IoT devices. Furthermore, blockchain enables trustless and transparent technologies that can track devices and data exchanges, enhancing security and trust in industrial applications. This decentralized approach not only strengthens security but also streamlines the authentication process for devices in IoT ecosystems.
What is Stochastic Online Optimization in Dynamic Smart Manufacturing?
5 answers
Stochastic online optimization in dynamic smart manufacturing involves continuously optimizing decisions in real-time manufacturing systems, adapting to changes and disturbances. This approach utilizes methods like deep reinforcement learning, two-stage dynamic scheduling strategies, and online optimization techniques. By incorporating artificial intelligence, composite reward functions, and hybrid algorithms, such as the imperialist competitive algorithm with genetic algorithm hybridization, this method enhances decision-making abilities, handles unexpected events, and balances efficiency and profits in manufacturing processes. The use of stochastic gradient methods in online marketplacesfurther exemplifies the application of stochastic optimization in dynamically adjusting prices based on consumer and supplier behaviors, ensuring convergence to equilibrium in a realistic marketplace setting.
How does anti-tailgating protection and phsycial access control drive value for modern data center operstions?
5 answers
Anti-tailgating protection and physical access control play crucial roles in enhancing the efficiency and security of modern data center operations. By implementing innovative energy-aware management schemes, adaptive traffic isolation strategies, and distributed medium access control protocols, data centers can optimize resource allocation, reduce latency, and ensure fair bandwidth sharing among different types of network protocols. These measures not only improve operational performance but also enhance security by preventing unauthorized access and ensuring data integrity. The integration of these advanced technologies drives value by increasing system throughput, reducing completion times for critical flows, and achieving high bandwidth utilization even under heavy loads, ultimately leading to more reliable and efficient data center operations.
What are the key components of a validation cyber security model?
5 answers
The key components of a validation cybersecurity model include conducting cybersecurity audits to evaluate assurance, maturity, and readiness, as highlighted in the CyberSecurity Audit Model (CSAM). Additionally, threat modeling is crucial for identifying potential threats and addressing design flaws, serving as a valuable "return on investment" activity. Furthermore, implementing controls using emerging technologies like IoT, Blockchain, and Deep Learning can help mitigate risks and enhance security levels, as proposed in a cybersecurity framework validation study. Evaluating cyberattack detection systems through realistic setups, such as emulating power control infrastructures and monitoring systems, is essential for testing detection mechanisms effectively. These components collectively contribute to a comprehensive validation cybersecurity model that addresses cybersecurity weaknesses, enhances awareness, and ensures the integrity and safety of information systems.
What is the best design to understand physical activity behaviors?
5 answers
The best design to understand physical activity behaviors involves utilizing interactive technology, behavioral feedback, and user-centered visualization tools. By integrating these elements, designers can create effective interventions to promote physical activity. Interactive environments, supported by technology, can nudge individuals towards increased movement, while glanceable behavioral feedback in activity trackers can significantly impact user behaviors. Additionally, interactive visualization tools, such as those based on parallel coordinates, offer a user-centric approach to exploring physical activity data, enabling comprehensive data interpretation and detailed exploration of high-dimensional datasets. By combining these approaches, designers and practitioners can gain valuable insights into human behavior in urban environments and develop interventions that effectively promote sustained behavioral changes and healthier lifestyles.
What are the smart machines used in agriculture?
4 answers
Smart machines used in agriculture include Smart Agricultural Machines (SAMs), robots and artificial intelligence, a smart irrigation system, and a multi-purpose smart farming robot (MpSFR). SAMs are automated and remotely-controlled machines that integrate information and communication technologies for monitoring and control purposes. They can be remotely controlled using proprietary protocols, making it difficult to assess vulnerabilities for non-proprietary parties. Robots and artificial intelligence are anticipated to be used in farming, along with innovative technologies like the Internet of Things (IoT) and cloud computing. The smart irrigation system uses machine learning to estimate the water needs of crops based on temperature, humidity, and moisture data collected from sensors in the field. The MpSFR is a photovoltaic-powered battery-operated robot that automates the watering and spraying process in agriculture, using IoT sensors and computer vision to monitor soil moisture and plant health.
Why beagles are the best?
4 answers
Beagles are considered the best because they have a higher intake of 228Ra through food compared to humans, making them an appropriate experimental animal for extrapolating the organ distribution pattern of Th in humans. Additionally, Beagle is a design concept that aims to improve the quality of life and development of hospitalized adolescents with Cystic Fibrosis, providing various forms of playful interaction and motivating physical activity within the hospital. Furthermore, Beagle is a resource allocation protocol that allows multi-party, multimedia, multi-flow applications to optimize resource allocation using high-level application domain knowledge, resulting in better quality for applications and improved resource efficiency for the network. In the context of interactive visualization on the web, Beagle is a tool that mines the web for SVG-based visualizations, automatically classifies them by type, and provides insights into the prevalence of different visualization designs. Lastly, Web-Beagle is a web server for the pairwise global or local alignment of RNA secondary structures, offering a user-friendly platform for comparing and analyzing RNA sequences and structures.
What is the role of connectivity in in-car infotainment systems?
4 answers
Connectivity plays a crucial role in in-car infotainment systems. It enables the transmission of telemetry data, such as car speed, RPM, engine temperature, and oil level, to the IoT Cloud for analysis and display to the driver. Additionally, connectivity allows for the integration of mobile devices and internet-based services, enhancing the user's comfort and providing access to personal information through the automotive head unit. However, this connectivity also introduces security and privacy concerns, as demonstrated by studies on IVI system exploitations. To address these concerns, it is important to optimize antenna systems within the car to ensure adequate connectivity performance. Furthermore, systematic analysis and countermeasures are necessary to prevent unauthorized access and privacy attacks on the infotainment system.
What are the best practices for implementing and maintaining distributed accountability mechanisms for data sharing in a cloud context?
4 answers
Implementing and maintaining distributed accountability mechanisms for data sharing in a cloud context requires several best practices. One approach is to use a strong, accountable, and distributed auditing scheme that provides fine-grained read-write access and comparative analysis for accountability and auditing of data services. Another solution is to leverage blockchain technology and smart contracts to create an unforgeable log for auditing and automatic verification of Service Level Agreements (SLAs). Additionally, a fine-grained and controllably editable cloud-based data sharing scheme can be implemented, which allows the data owner to specify access control policies and enables tracing of malicious users. Utilizing a framework called Cloud Information Accountability can also ensure tracking of user data usage in the cloud, with features such as homomorphic encryption and distributed accountability. Finally, a concept of data sovereignty can be implemented, which provides transparency, trust, and security in virtual product development by generating an overview of data location and allowing data owners to maintain control over their data.
Can the use of interactive visualization tools be a potential solution to mitigate risk aversion in decision-making?
5 answers
Interactive visualization tools have the potential to mitigate risk aversion in decision-making. These tools can support decision makers by providing advanced visualization capabilities that improve the analysis workflow. They allow decision makers to explore and analyze pertinent information, generate and explore alternative options, and select the optimal decision by evaluating discerning criteria. Visualization systems can aid in the intelligence stage of decision-making by enabling data exploration and analysis. However, there is a scarcity of tools that support all stages of the decision-making process, particularly in terms of flexibility to manipulate decision alternatives, criteria, and preferences. Future research could focus on enhancing flexibility levels, exploring novel visualization paradigms, and increasing algorithmic support to ensure user-controlled automation.