76 research outputs found

    Robot trajectory planning using OLP and structured light 3D machine vision

    Get PDF
    This paper proposes a new methodology for robotic offline programming (OLP) addressing the issue of automatic program generation directly from 3D CAD models and verification through online 3D reconstruction. Limitations of current OLP include manufacturing tolerances between CAD and workpieces and inaccuracies in workpiece placement and modelled work cell. These issues are addressed and demonstrated through surface scanning, registration, and global and local error estimation. The method allows the robot to adjust the welding path designed from the CAD model to the actual workpiece. Alternatively, for non-repetitive tasks and where a CAD model is not available, it is possible to interactively define the path online over the scanned surface

    Qualitative Evaluation of the Java Intelligent Tutoring System

    Get PDF
    In an effort to support the growing trend of the Java programming language and to promote web-based personalized education, the Java Intelligent Tutoring System (JITS) was designed and developed. This tutoring system is unique in a number of ways. Most Intelligent Tutoring Systems require the teacher to author problems with corresponding solutions. JITS, on the other hand, requires the teacher to only supply the problem and problem specification. JITS is designed to “intelligently” examine the student’s submitted code and determines appropriate feedback based on a number of factors such as JITS’ cognitive model of the student, the student’s skill level, and problem details. JITS is intended to be used by beginner programming students in their first year of College or University. This paper discusses the important aspects of the design and development of JITS, the qualitative methods and procedures, and findings. Research was conducted at the Sheridan Institute of Technology and Advanced Learning, Ontario, Canada

    Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Get PDF
    A denial of service attack (DOS) is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.http://www.iiisci.org/journal/CV$/sci/pdfs/P129065.pd

    Methods for Marine Ecosystems Research through the Use of PDAs with Preservice Teachers

    Get PDF
    Science teachers are charged with the task of providing students in grades K-12 with opportunities that will enable them to make sense of science and develop habits of mind. One goal of science education is to prepare well-rounded citizens who are scientifically literate. Through inquiry-based learning, students formulate questions, perform investigations, and construct new understandings. It is important for preservice science teachers to be introduced to current techniques, discoveries, and debates in the field of science. The use of personal digital assistants (PDAs) can provide K-12 students with increased opportunities for exploring and learning through scientific investigations. In order for these devices to be successfully integrated into classroom instruction, changes in teaching methodologies must be adopted. This paper presents a model lesson that can be used to guide preservice teachers in the use of PDAs for studying a marine ecosystem. The field experience takes place on the shoreline of Long Island Sound at Stratford Point, in Stratford Connecticut

    Democracy and the internet: access, engagement and deliberation

    Get PDF
    The internet has the capacity to facilitate the creation of new forms of civic engagement, but the realisation of these opportunities requires institutional and cultural reinforcement. The democratic character of e-citizenship and the equal distribution of online resources to the public require the fulfilment of four conditions: access, engagement (incorporating education, motivation and trust), meaningful deliberation and a link between civic input and public policy output. Furthermore, the gap between the main features of cyberspace and the inherent prerequisites of democracy, such as a finite space and a set of rules, create tensions that need to be negotiated politically. Although the empirical evidence available includes some encouraging signs regarding the future use of the internet for civic engagement, the existing limitations and obstacles mean that the new media will complement, rather than replace, the old media as a democratic public sphere

    PERANCANGAN DESAIN PLTMH UNTUK MEMENUHI KEBUTUHAN LISTRIK DI DESA LEDAN KEC. BUNTU BATU KAB. ENREKANG

    Get PDF
    PERANCANGAN DESAIN PLTMH UNTUK MEMENUHI KEBUTUHAN LISTRIKDI DESA LEDAN KEC. BUNTU BATU KAB. ENREKAN
    • …
    corecore