{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:34:56Z","timestamp":1742920496565,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030959029"},{"type":"electronic","value":"9783030959036"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-95903-6_39","type":"book-chapter","created":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T13:03:32Z","timestamp":1643720612000},"page":"366-374","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Design of\u00a0a\u00a0Robot Vision System for\u00a0Microconvex Recognition"],"prefix":"10.1007","author":[{"given":"Chihiro","family":"Yukawa","sequence":"first","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Tetsuya","family":"Oda","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Nobuki","family":"Saito","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Aoto","family":"Hirata","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Tomoya","family":"Yasunaga","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Kyohei","family":"Toyoshima","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Kengo","family":"Katayama","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,2,2]]},"reference":[{"key":"39_CR1","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1016\/j.ijpe.2018.08.019","volume":"204","author":"L Dalenogare","year":"2018","unstructured":"Dalenogare, L., et al.: The expected contribution of industry 4.0 technologies for industrial performance. Int. J. Prod. Econ. (IJPE-2018) 204, 383\u2013394 (2018)","journal-title":"Int. J. Prod. Econ. (IJPE-2018)"},{"key":"39_CR2","doi-asserted-by":"crossref","unstructured":"Shang, L., et al.: Detection of rail surface defects based on CNN image recognition and classification. In: The IEEE 20th International Conference on Advanced Communication Technology (ICACT), pp. 45\u201351 (2018)","DOI":"10.23919\/ICACT.2018.8323642"},{"issue":"21","key":"39_CR3","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.ifacol.2018.09.412","volume":"51","author":"J Li","year":"2018","unstructured":"Li, J., et al.: Real-time detection of steel strip surface defects based on improved yolo detection network. IFAC-PapersOnLine 51(21), 76\u201381 (2018)","journal-title":"IFAC-PapersOnLine"},{"key":"39_CR4","doi-asserted-by":"crossref","unstructured":"Oda, T., et al.: Design and implementation of a simulation system based on deep Q-Network for mobile actor node control in wireless sensor and actor networks. In: Proceedings of The IEEE 31st International Conference on Advanced Information Networking and Applications Workshops, pp. 195-200 (2017)","DOI":"10.1109\/WAINA.2017.67"},{"key":"39_CR5","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-030-61108-8_32","volume-title":"Advances on Broad-Band Wireless Computing, Communication and Applications","author":"N Saito","year":"2021","unstructured":"Saito, N., Oda, T., Hirata, A., Hirota, Y., Hirota, M., Katayama, K.: Design and implementation of a DQN based AAV. In: Barolli, L., Takizawa, M., Enokido, T., Chen, H.-C., Matsuo, K. (eds.) BWCCA 2020. LNNS, vol. 159, pp. 321\u2013329. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-61108-8_32"},{"key":"39_CR6","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/978-3-030-79728-7_16","volume-title":"Innovative Mobile and Internet Services in Ubiquitous Computing","author":"N Saito","year":"2022","unstructured":"Saito, N., Oda, T., Hirata, A., Toyoshima, K., Hirota, M., Barolli, L.: Simulation results of a DQN based AAV testbed in corner environment: a comparison study for normal DQN and TLS-DQN. In: Barolli, L., Yim, K., Chen, H.-C. (eds.) IMIS 2021. LNNS, vol. 279, pp. 156\u2013167. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-79728-7_16"},{"key":"39_CR7","doi-asserted-by":"publisher","first-page":"100394","DOI":"10.1016\/j.iot.2021.100394","volume":"14","author":"N Saito","year":"2021","unstructured":"Saito, N., et al.: A tabu list strategy based DQN for AAV mobility in indoor single-path environment: implementation and performance evaluation. Internet Things 14, 100394 (2021)","journal-title":"Internet Things"},{"key":"39_CR8","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/978-3-030-89899-1_4","volume-title":"Advances on P2P, Parallel, Grid, Cloud and Internet Computing","author":"N Saito","year":"2022","unstructured":"Saito, N., Oda, T., Hirata, A., Yukawa, C., Kulla, E., Barolli, L.: A LiDAR based mobile area decision method for TLS-DQN: improving control for AAV mobility. In: Barolli, L. (ed.) 3PGCIC 2021. LNNS, vol. 343, pp. 30\u201342. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-89899-1_4"},{"key":"39_CR9","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.neucom.2017.05.015","volume":"275","author":"H Wang","year":"2018","unstructured":"Wang, H., et al.: Automatic illumination planning for robot vision inspection system. Neurocomputing 275, 19\u201328 (2018)","journal-title":"Neurocomputing"},{"key":"39_CR10","doi-asserted-by":"crossref","unstructured":"Zuxiang, W., et al.: Design of safety capacitors quality inspection robot based on machine vision. In: 2017 First International Conference on Electronics Instrumentation and Information Systems (EIIS), pp. 1\u20134 (2017)","DOI":"10.1109\/EIIS.2017.8298545"},{"key":"39_CR11","doi-asserted-by":"publisher","first-page":"106539","DOI":"10.1016\/j.asoc.2020.106539","volume":"95","author":"J Li","year":"2020","unstructured":"Li, J., et al.: Cognitive visual anomaly detection with constrained latent representations for industrial inspection robot. Appl. Soft Comput. 95, 106539 (2020)","journal-title":"Appl. Soft Comput."},{"key":"39_CR12","unstructured":"Ruiz-del-Solar, J., et al.: A survey on deep learning methods for robot vision. arXiv preprintarXiv:1803.10862 (2018)"},{"key":"39_CR13","doi-asserted-by":"crossref","unstructured":"Matsui, T., et al.: FPGA implementation of a fuzzy inference based quadrotor attitude control system. In: Proceedings of IEEE GCCE-2021, pp. 691\u2013692 (2021)","DOI":"10.1109\/GCCE53005.2021.9622054"},{"key":"39_CR14","doi-asserted-by":"crossref","unstructured":"Saito, N., et al.: Approach of fuzzy theory and hill climbing based recommender for schedule of life. In: Procedings of LifeTech-2020, pp. 368\u2013369 (2020)","DOI":"10.1109\/LifeTech48969.2020.1570620405"},{"key":"39_CR15","doi-asserted-by":"crossref","unstructured":"Ozera, K., et al.: A fuzzy approach for secure clustering in MANETs: effects of distance parameter on system performance. In: Proceedings of IEEE WAINA-2017, pp. 251\u2013258 (2017)","DOI":"10.1109\/WAINA.2017.52"},{"key":"39_CR16","doi-asserted-by":"crossref","unstructured":"Elmazi, D., et al.: Selection of Secure Actors in Wireless Sensor and Actor Networks Using Fuzzy Logic. In: Proceedings of BWCCA-2015, pp. 125\u2013131 (2015)","DOI":"10.1109\/BWCCA.2015.51"},{"key":"39_CR17","doi-asserted-by":"crossref","unstructured":"Elmazi, D., et al.: Selection of rendezvous point in content centric networks using fuzzy logic. In: Proceedings of NBiS-2015, pp. 345\u2013350 (2015)","DOI":"10.1109\/NBiS.2015.53"},{"issue":"6","key":"39_CR18","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1007\/s11740-014-0558-7","volume":"8","author":"MF Zaeh","year":"2014","unstructured":"Zaeh, M.F., et al.: Improvement of the machining accuracy of milling robots. Prod. Eng. Res. Devel. 8(6), 737\u2013744 (2014). https:\/\/doi.org\/10.1007\/s11740-014-0558-7","journal-title":"Prod. Eng. Res. Devel."},{"key":"39_CR19","doi-asserted-by":"crossref","unstructured":"Yukawa, C., et al.: Design of a fuzzy inference based robot vision for CNN training image acquisition. In: Proceedings of IEEE GCCE-2020, pp. 871\u2013872 (2021)","DOI":"10.1109\/GCCE53005.2021.9621830"},{"issue":"5","key":"39_CR20","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1109\/91.873577","volume":"8","author":"Q Liang","year":"2000","unstructured":"Liang, Q., et al.: Interval type-2 fuzzy logic systems: theory and design. IEEE Trans. Fuzzy Syst. 8(5), 535\u2013550 (2000)","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"6","key":"39_CR21","doi-asserted-by":"publisher","first-page":"808","DOI":"10.1109\/TFUZZ.2006.879986","volume":"14","author":"JM Mendel","year":"2006","unstructured":"Mendel, J.M.: Interval type-2 fuzzy logic systems made simple. IEEE Trans. Fuzzy Syst. 14(6), 808\u2013821 (2006)","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"39_CR22","unstructured":"Dongrui, W., et al.: Comparison and practical implementation of type-reduction algorithms for type-2 fuzzy sets and systems. In: 2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2011), pp. 2131\u20132138 (2011)"},{"issue":"3","key":"39_CR23","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1109\/TFUZZ.2012.2227488","volume":"21","author":"JM Mendel","year":"2012","unstructured":"Mendel, J.M.: On KM algorithms for solving type-2 fuzzy set problems. IEEE Trans. Fuzzy Syst. 21(3), 426\u2013446 (2012)","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"39_CR24","doi-asserted-by":"crossref","unstructured":"Wang, Y., et al.: Automatic image stitching using SIFT. In: Proceedings of International Conference on Audio, Language and Image Processing (IEEE-2008), pp. 568-571 (2008)","DOI":"10.1109\/ICALIP.2008.4589984"},{"key":"39_CR25","unstructured":"Yosinski, J., et al.: How transferable are features in deep neural networks? arXiv preprintarXiv:1411.1792 (2014)"},{"issue":"1","key":"39_CR26","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/JPROC.2020.3004555","volume":"109","author":"F Zhuang","year":"2020","unstructured":"Zhuang, F., et al.: A comprehensive survey on transfer learning. Proc. IEEE 109(1), 43\u201376 (2020)","journal-title":"Proc. IEEE"},{"key":"39_CR27","unstructured":"Dosovitskiy, A., et al.: An image is worth 16$$\\times $$16 words: transformers for image recognition at scale. arXiv preprintarXiv:2010.11929 (2020)"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Internet, Data &amp; Web Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-95903-6_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,17]],"date-time":"2024-09-17T18:32:45Z","timestamp":1726597965000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-95903-6_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030959029","9783030959036"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-95903-6_39","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"2 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EIDWT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Emerging Internetworking, Data & Web Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Okayama","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 February 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 February 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eidwt2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}