19 research outputs found
MODELING OF MOBILE ROBOT WITH OBSTACLE AVOIDANCE USING FUZZY CONTROLLER
This paper presents the modeling of a robot's navigation using ultrasonic sensors under uncertainty. The robot tries to avoid obstacles by using the fuzzy logic controller to process the data coming from three ultrasonic sensors. To assess the performance of fuzzy logic optimized robot navigation controller with ultrasonic sensors, which measure the distance by calculating the time spent on the object and its return, the obstacles are placed in front of, left, and right of the robot. Mamdani fuzzy reasoning system is used for the designed controller for its intuitive properties and fewer setting parameters which reduces the amount of time spent on the programming of the controller. 25 rules are considered to cover a robotâs possible interactions with obstacles. For an easy understanding of navigation architecture and rapid algorithm implementation, in this paper, a MATLAB simulation framework is developed. MATLAB/Simulink is one of the best simulation tools required to design the architecture and verify algorithms with real-time constraints. Resultant models of the fuzzy optimized controller demonstrate the superior performance of the fuzzy logic controller with high adaptability to the environment while maintaining a sufficient level of accuracy. The designed fuzzy controller can be used in microprocessor/microcontroller-based robots owing to easiness in implementation and coding
State-of-the-Art Sensors Technology in Spain 2015: Volume 1
This book provides a comprehensive overview of state-of-the-art sensors technology in specific leading areas. Industrial researchers, engineers and professionals can find information on the most advanced technologies and developments, together with data processing. Further research covers specific devices and technologies that capture and distribute data to be processed by applying dedicated techniques or procedures, which is where sensors play the most important role. The book provides insights and solutions for different problems covering a broad spectrum of possibilities, thanks to a set of applications and solutions based on sensory technologies. Topics include: ⢠Signal analysis for spectral power ⢠3D precise measurements ⢠Electromagnetic propagation ⢠Drugs detection ⢠e-health environments based on social sensor networks ⢠Robots in wireless environments, navigation, teleoperation, object grasping, demining ⢠Wireless sensor networks ⢠Industrial IoT ⢠Insights in smart cities ⢠Voice recognition ⢠FPGA interfaces ⢠Flight mill device for measurements on insects ⢠Optical systems: UV, LEDs, lasers, fiber optics ⢠Machine vision ⢠Power dissipation ⢠Liquid level in fuel tanks ⢠Parabolic solar tracker ⢠Force sensors ⢠Control for a twin roto
NASA Tech Briefs, December 1988
This month's technical section includes forecasts for 1989 and beyond by NASA experts in the following fields: Integrated Circuits; Communications; Computational Fluid Dynamics; Ceramics; Image Processing; Sensors; Dynamic Power; Superconductivity; Artificial Intelligence; and Flow Cytometry. The quotes provide a brief overview of emerging trends, and describe inventions and innovations being developed by NASA, other government agencies, and private industry that could make a significant impact in coming years. A second bonus feature in this month's issue is the expanded subject index that begins on page 98. The index contains cross-referenced listings for all technical briefs appearing in NASA Tech Briefs during 1988
Second Annual Workshop on Space Operations Automation and Robotics (SOAR 1988)
Papers presented at the Second Annual Workshop on Space Operation Automation and Robotics (SOAR '88), hosted by Wright State University at Dayton, Ohio, on July 20, 21, 22, and 23, 1988, are documented herein. During the 4 days, approximately 100 technical papers were presented by experts from NASA, the USAF, universities, and technical companies. Panel discussions on Human Factors, Artificial Intelligence, Robotics, and Space Systems were held but are not documented herein. Technical topics addressed included knowledge-based systems, human factors, and robotics
Multi-Agent Systems
A multi-agent system (MAS) is a system composed of multiple interacting intelligent agents. Multi-agent systems can be used to solve problems which are difficult or impossible for an individual agent or monolithic system to solve. Agent systems are open and extensible systems that allow for the deployment of autonomous and proactive software components. Multi-agent systems have been brought up and used in several application domains
Recommended from our members
Patterns of injury and violence in YaoundĂŠ Cameroon: an analysis of hospital data.
BackgroundInjuries are quickly becoming a leading cause of death globally, disproportionately affecting sub-Saharan Africa, where reports on the epidemiology of injuries are extremely limited. Reports on the patterns and frequency of injuries are available from Cameroon are also scarce. This study explores the patterns of trauma seen at the emergency ward of the busiest trauma center in Cameroon's capital city.Materials and methodsAdministrative records from January 1, 2007, through December 31, 2007, were retrospectively reviewed; information on age, gender, mechanism of injury, and outcome was abstracted for all trauma patients presenting to the emergency ward. Univariate analysis was performed to assess patterns of injuries in terms of mechanism, date, age, and gender. Bivariate analysis was used to explore potential relationships between demographic variables and mechanism of injury.ResultsA total of 6,234 injured people were seen at the Central Hospital of YaoundÊ's emergency ward during the year 2007. Males comprised 71% of those injured, and the mean age of injured patients was 29 years (SD = 14.9). Nearly 60% of the injuries were due to road traffic accidents, 46% of which involved a pedestrian. Intentional injuries were the second most common mechanism of injury (22.5%), 55% of which involved unarmed assault. Patients injured in falls were more likely to be admitted to the hospital (p < 0.001), whereas patients suffering intentional injuries and bites were less likely to be hospitalized (p < 0.001). Males were significantly more likely to be admitted than females (p < 0.001)DiscussionPatterns in terms of age, gender, and mechanism of injury are similar to reports from other countries from the same geographic region, but the magnitude of cases reported is high for a single institution in an African city the size of YaoundÊ. As the burden of disease is predicted to increase dramatically in sub-Saharan Africa, immediate efforts in prevention and treatment in Cameroon are strongly warranted
Best Practices and Recommendations for Cybersecurity Service Providers
This chapter outlines some concrete best practices and recommendations for cybersecurity service providers, with a focus on data sharing, data protection and penetration testing. Based on a brief outline of dilemmas that cybersecurity service providers may experience in their daily operations, it discusses data handling policies and practices of cybersecurity vendors along the following five topics: customer data handling; information about breaches; threat intelligence; vulnerability-related information; and data involved when collaborating with peers, CERTs, cybersecurity research groups, etc. There is, furthermore, a discussion of specific issues of penetration testing such as customer recruitment and execution as well as the supervision and governance of penetration testing. The chapter closes with some general recommendations regarding improving the ethical decision-making procedures of private cybersecurity service providers
Ethical and Unethical Hacking
The goal of this chapter is to provide a conceptual analysis of ethical, comprising history, common usage and the attempt to provide a systematic classification that is both compatible with common usage and normatively adequate. Subsequently, the article identifies a tension between common usage and a normativelyadequate nomenclature. âEthical hackersâ are often identified with hackers that abide to a code of ethics privileging business-friendly values. However, there is no guarantee that respecting such values is always compatible with the all-things-considered morally best act. It is recognised, however, that in terms of assessment, it may be quite difficult to determine who is an ethical hacker in the âall things consideredâ sense, while society may agree more easily on the determination of who is one in the âbusiness-friendlyâ limited sense. The article concludes by suggesting a pragmatic best-practice approach for characterising ethical hacking, which reaches beyond business-friendly values and helps in the taking of decisions that are respectful of the hackersâ individual ethics in morally debatable, grey zones
Bit Bang 7: Future of Energy
This book is the 7th in the Bit Bang series of books produced as multidisciplinary teamwork exercises by doctoral students participating in the course Bit Bang 7: Future of Energy at Aalto University during the academic year 2014â2015. The course aims at fostering teamwork and multidisciplinary collaboration, as well as providing participants with a global, futurecentric perspective on the energy sector.
The growing global demand for energy and diminishing natural resources are driving the development of eco-efficient energy sources, new ways of doing business, and designing our living environment. Bit Bang 7 addresses the topic of energy sources and technologies from the perspective of their economic, environmental and social sustainability. The course elaborates on the interconnectedness of these phenomena, and links them to possible future scenarios, global megatrends and ethical considerations. Will we see disruptive changes in our energy future? Can we impact consumption patterns, ways of doing business, and our way of life? Are we creating a sustainable future for the generations to come?
Working in teams, the students set out to answer questions related to the changing energy sector and to brainstorm radical scenarios of what the future could hold. This joint publication contains articles produced as teamwork assignments for the course, in which the students were encouraged to take novel and radical views on the future of energy.
The Bit Bang series of courses is supported by the Multidisciplinary Institute of Digitalisation and Energy (MIDE). Previous Bit Bang publications are available from http:/mide.aalto.fi