Unmanned Aerial Vehicles (UAVs) exhibit great agility but usually require an experienced pilot to operate them in certain applications such as inspection for disaster scenarios or buildings. The reduction of cognitive overload when driving this kind of aerial robot becomes a challenge and several solutions can be found in the literature. A new virtual control scheme for reducing this cognitive overload when controlling an aerial robot is proposed in this paper. The architecture is based on a novel interaction Drone Exocentric Advanced Metaphor (DrEAM) located in a Cave Automated Virtual Environment (CAVE) and a real robot containing an embedded controller based on quaternion formulation. The testing room, where real robots are evolving, is located away from the CAVE and they are connected via UDP in a ground station. The user controls manually a virtual drone through the DrEAM interaction metaphor, and the real robot imitates autonomously in real time the trajectory imposed by the user in the virtual environment. Experimental results illustrate the easy implementation and feasibility of the proposed scheme in two different scenarios. Results from these tests show that the mental effort when controlling a drone using the proposed virtual control scheme is lower than when controlling it in direct view. Moreover, the easy maneuverability and controllability of the real drone is also demonstrated in real time experiments.

Download full-text PDF

Source
http://dx.doi.org/10.1109/TVCG.2022.3160389DOI Listing

Publication Analysis

Top Keywords

control scheme
12
cognitive overload
8
aerial robot
8
virtual control
8
located cave
8
virtual environment
8
real robot
8
real time
8
virtual
6
real
6

Similar Publications

Purpose: Randomized trials have demonstrated similar local tumor control in patients treated with accelerated partial-breast irradiation (APBI) compared with whole-breast irradiation. However, the optimal APBI dose for maximizing tumor control and minimizing toxicity is uncertain.

Methods And Materials: We enrolled patients ≥18 years of age with grade 1 or 2 ductal carcinoma in situ or stage I invasive breast cancer and resection margins ≥2 mm between 2003 and 2011 to a sequential dose-escalation trial using 3-dimensional conformal external beam APBI giving twice daily 4 Gy fractions with total doses of 32 Gy, 36 Gy, and 40 Gy.

View Article and Find Full Text PDF

Valproic Acid and Lamotrigine Differentially Modulate the Telomere Length in Epilepsy Patients.

J Clin Med

January 2025

Departamento de Genética, Instituto Nacional de Neurología y Neurocirugía Manuel Velasco Suárez (INNNMVS), Mexico City 14269, Mexico.

: Antiseizure drugs (ASDs) are the primary therapy for epilepsy, and the choice varies according to seizure type. Epilepsy patients experience chronic mitochondrial oxidative stress and increased levels of pro-inflammatory mediators, recognizable hallmarks of biological aging; however, few studies have explored aging markers in epilepsy. Herein, we addressed for the first time the impact of ASDs on molecular aging by measuring the telomere length (TL) and mtDNA copy number (mtDNA-CN).

View Article and Find Full Text PDF

The technical development of implant-supported fixed dental prostheses (iFDP) initially concentrated on the computer-aided manufacturing of prosthetic restorations (CAM). Advances in information technologies have shifted the focus for optimizing digital workflows to AI-based processes for design (CAD). This pre-clinical pilot trial investigated the feasibility of the automatic design of three-unit iFDPs using CAD software (Dental Manger 2021, 3Shape; DentalCAD 3.

View Article and Find Full Text PDF

This paper introduces a novel energy-efficient lightweight, void hole avoidance, localization, and trust-based scheme, termed as Energy-Efficient and Trust-based Autonomous Underwater Vehicle (EETAUV) protocol designed for 6G-enabled underwater acoustic sensor networks (UASNs). The proposed scheme addresses key challenges in UASNs, such as energy consumption, network stability, and data security. It integrates a trust management framework that enhances communication security through node identification and verification mechanisms utilizing normal and phantom nodes.

View Article and Find Full Text PDF

The proliferation of the Internet of Things (IoT) has worsened the challenge of maintaining data and user privacy. IoT end devices, often deployed in unsupervised environments and connected to open networks, are susceptible to physical tampering and various other security attacks. Thus, robust, efficient authentication and key agreement (AKA) protocols are essential to protect data privacy during exchanges between end devices and servers.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!