701 research outputs found

    Autonomous tracking of salinity-intrusion fronts by a long-range autonomous underwater vehicle

    Get PDF
    © The Author(s), 2022. This article is distributed under the terms of the Creative Commons Attribution License. The definitive version was published in Zhang, Y., Yoder, N., Kieft, B., Kukulya, A., Hobson, B. W., Ryan, S., & Gawarkiewicz, G. G. Autonomous tracking of salinity-intrusion fronts by a long-range autonomous underwater vehicle. Ieee Journal of Oceanic Engineering, (2022): 1-9, https://doi.org/10.1109/JOE.2022.3146584.Shoreward intrusions of anomalously salty water along the continental shelf of the Middle Atlantic Bight are often observed in spring and summer. Exchange of heat, nutrients, and carbon across the salinity-intrusion front has a significant impact on the marine ecosystem and fisheries. In this article, we developed a method of using an autonomous underwater vehicle (AUV) to detect a salinity-intrusion front and track the front's movement. Autonomous front detection is based on the different vertical structures of salinity in the two distinct water types: the vertical difference of salinity is large in the intruding saltier water because of the salinity “tongue” at mid-depth, but is small in the nearshore fresher water due to absence of the salinity anomaly. Every time the AUV crosses and detects the front, the vehicle makes a turn at an oblique angle to cross the front, thus zigzagging through the front to map the frontal zone. The AUV's zigzags sweep back and forth to track the front as it moves over time. From June 25 to 30, 2021, a Tethys-class long-range AUV mapped and tracked a salinity-intrusion front on the southern New England shelf. The frontal tracking revealed the salinity intrusion's 3-D structure and temporal evolution with unprecedented detail.This work was supported in part by the National Science Foundation under Grant OCE-1851261 and in part by the David and Lucile Packard Foundation

    Contact-less and Programming-less Human-Robot Collaboration

    Get PDF
    AbstractIn today's manufacturing environment, safe human-robot collaboration is of paramount importance, to improve efficiency and flexibility. Targeting the safety issue, this paper presents an approach for human-robot collaboration in a shared workplace in close proximity, where real data driven 3D model of a robot and multiple depth images of the workplace are used for monitoring and decision-making to perform a task. The strategy for robot control depends on the current task and the information about the operator's presence and position. A case study of assembly is carried out in a robotic assembly cell with human collaboration. The results show that this approach can be applied in real-world applications such as human-robot collaborative assembly with human operators safeguarded at all time

    Challenges in the Safety-Security Co-Assurance of Collaborative Industrial Robots

    Full text link
    The coordinated assurance of interrelated critical properties, such as system safety and cyber-security, is one of the toughest challenges in critical systems engineering. In this chapter, we summarise approaches to the coordinated assurance of safety and security. Then, we highlight the state of the art and recent challenges in human-robot collaboration in manufacturing both from a safety and security perspective. We conclude with a list of procedural and technological issues to be tackled in the coordinated assurance of collaborative industrial robots.Comment: 23 pages, 4 tables, 1 figur

    Pervasive surveillance-agent system based on wireless sensor networks: design and deployment

    Get PDF
    Nowadays, proliferation of embedded systems is enhancing the possibilities of gathering information by using wireless sensor networks (WSNs). Flexibility and ease of installation make these kinds of pervasive networks suitable for security and surveillance environments. Moreover, the risk for humans to be exposed to these functions is minimized when using these networks. In this paper, a virtual perimeter surveillance agent, which has been designed to detect any person crossing an invisible barrier around a marked perimeter and send an alarm notification to the security staff, is presented. This agent works in a state of 'low power consumption' until there is a crossing on the perimeter. In our approach, the 'intelligence' of the agent has been distributed by using mobile nodes in order to discern the cause of the event of presence. This feature contributes to saving both processing resources and power consumption since the required code that detects presence is the only system installed. The research work described in this paper illustrates our experience in the development of a surveillance system using WNSs for a practical application as well as its evaluation in real-world deployments. This mechanism plays an important role in providing confidence in ensuring safety to our environment

    Working together: a review on safe human-robot collaboration in industrial environments

    Get PDF
    After many years of rigid conventional procedures of production, industrial manufacturing is going through a process of change toward flexible and intelligent manufacturing, the so-called Industry 4.0. In this paper, human-robot collaboration has an important role in smart factories since it contributes to the achievement of higher productivity and greater efficiency. However, this evolution means breaking with the established safety procedures as the separation of workspaces between robot and human is removed. These changes are reflected in safety standards related to industrial robotics since the last decade, and have led to the development of a wide field of research focusing on the prevention of human-robot impacts and/or the minimization of related risks or their consequences. This paper presents a review of the main safety systems that have been proposed and applied in industrial robotic environments that contribute to the achievement of safe collaborative human-robot work. Additionally, a review is provided of the current regulations along with new concepts that have been introduced in them. The discussion presented in this paper includes multidisciplinary approaches, such as techniques for estimation and the evaluation of injuries in human-robot collisions, mechanical and software devices designed to minimize the consequences of human-robot impact, impact detection systems, and strategies to prevent collisions or minimize their consequences when they occur

    Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph

    Full text link
    Police SWAT teams and Military Special Forces face mounting pressure and challenges from adversaries that can only be resolved by way of ever more sophisticated inputs into tactical operations. Lethal Autonomy provides constrained military/security forces with a viable option, but only if implementation has got proper empirically supported foundations. Autonomous weapon systems can be designed and developed to conduct ground, air and naval operations. This monograph offers some insights into the challenges of developing legal, reliable and ethical forms of autonomous weapons, that address the gap between Police or Law Enforcement and Military operations that is growing exponentially small. National adversaries are today in many instances hybrid threats, that manifest criminal and military traits, these often require deployment of hybrid-capability autonomous weapons imbued with the capability to taken on both Military and/or Security objectives. The Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that required military response and police investigations against a fighting cell of the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade

    Business analytics in industry 4.0: a systematic review

    Get PDF
    Recently, the term “Industry 4.0” has emerged to characterize several Information Technology and Communication (ICT) adoptions in production processes (e.g., Internet-of-Things, implementation of digital production support information technologies). Business Analytics is often used within the Industry 4.0, thus incorporating its data intelligence (e.g., statistical analysis, predictive modelling, optimization) expert system component. In this paper, we perform a Systematic Literature Review (SLR) on the usage of Business Analytics within the Industry 4.0 concept, covering a selection of 169 papers obtained from six major scientific publication sources from 2010 to March 2020. The selected papers were first classified in three major types, namely, Practical Application, Reviews and Framework Proposal. Then, we analysed with more detail the practical application studies which were further divided into three main categories of the Gartner analytical maturity model, Descriptive Analytics, Predictive Analytics and Prescriptive Analytics. In particular, we characterized the distinct analytics studies in terms of the industry application and data context used, impact (in terms of their Technology Readiness Level) and selected data modelling method. Our SLR analysis provides a mapping of how data-based Industry 4.0 expert systems are currently used, disclosing also research gaps and future research opportunities.The work of P. Cortez was supported by FCT - Fundação para a CiĂȘncia e Tecnologia within the R&D Units Project Scope: UIDB/00319/2020. We would like to thank to the three anonymous reviewers for their helpful suggestions
    • 

    corecore