45 research outputs found

    Radar Technology

    Get PDF
    In this book “Radar Technology”, the chapters are divided into four main topic areas: Topic area 1: “Radar Systems” consists of chapters which treat whole radar systems, environment and target functional chain. Topic area 2: “Radar Applications” shows various applications of radar systems, including meteorological radars, ground penetrating radars and glaciology. Topic area 3: “Radar Functional Chain and Signal Processing” describes several aspects of the radar signal processing. From parameter extraction, target detection over tracking and classification technologies. Topic area 4: “Radar Subsystems and Components” consists of design technology of radar subsystem components like antenna design or waveform design

    Automatic feature extraction from conventional CAD model to support feature-based design approach for the sheet metal stamping industries

    Get PDF
    Despite the continuing improvement in computer aided design (CAD) systems and improvements in computer aided manufacturing (CAM), the process planning activity has still not been completely integrated into the CAD/CAM cycle. Particularly in sheet metal stamping industries human interpretation of CAD data is required to extract the geometry and technological information of a component. As a result most CAD systems are used as advanced drafting and drawing management tools by designers. Thus the responsibility for interpreting the design data required for extracting the manufacturing part features still resides with the process planner. Which has increase possibilities of entering errors with design data. A need, therefore, exists to develop expert system for automatic features extraction from a CAD database. An application software was developed for automatic feature extraction from conventional CAD model database to impliment feature-based design approach for the sheet metal stamping industries

    Application of Cellular Automata to Detection of Malicious Network Packets

    Get PDF
    A problem in computer security is identification of attack signatures in network packets. An attack signature is a pattern of bits that characterizes a particular attack. Because there are many kinds of attacks, there are potentially many attack signatures. Furthermore, attackers may seek to avoid detection by altering the attack mechanism so that the bit pattern presented differs from the known signature. Thus, recognizing attack signatures is a problem in approximate string matching. The time to perform an approximate string match depends upon the length of the string and the number of patterns. For constant string length, the time to matchnpatterns is approximatelyO(n); the time increases approximately linearly as the number of patterns increases. A binary cellular automaton is a discrete, deterministic system of cells in which each cell can have one of two values. Cellular automata have the property that the next state of each cell can be evaluated independently of the others. If there is a processing element for each cell, the next states of all cells in a cellular automaton can be computed simultaneously. Because there is no programming paradigm for cellular automata, cellular automata to perform specific functions are createdad hocby hand or discovered using search methods such as genetic algorithms. This research has identified, through evolution by genetic algorithm, cellular automata that can perform approximate string matching for more than one pattern while operating in constant time with respect to the number of patterns, and in the presence of noise. Patterns were recognized by using the bits of a network packet payload as the initial state of a cellular automaton. After a predetermined number of cycles, the ones density of the cellular automaton was computed. Packets for which the ones density was below an experimentally determined threshold were identified as target packets. Six different cellular automaton rules were tested against a corpus of 7.2 million TCP packets in the IDEval data set. No rule produced false negative results, and false positive results were acceptably low

    Commande dynamique de robots déformables basée sur un modèle numérique

    Get PDF
    This work focuses on modeling and control of soft robots. It covers the entire development of the controller, from the modeling step to the practical experimental validation.From a theoretical point a view, large-scale dynamical systems along with model reduction algorithms are studied. In addition to the theoretical studies, different experimental setups are used to illustrate the results. A cable-driven soft robot and a pressurized soft arm are used to test the control algorithms. Through these different setups, we show that the method can handle different types of actuation, different geometries and mechanical properties. This emphasizes one of the interests of the method, its genericity.Cette thèse s'intéresse à la modélisation et à la commande de robots déformables (robots dont le mouvement se fait par déformation). Nous nous intéressons à la conception de lois de contrôle en boucle fermée répondant aux besoins spécifiques du contrôle dynamique de ces robots, sans restrictions fortes sur leur géométrie. La résolution de ce défi soulève des questions théoriques qui nous amènent au deuxième objectif de cette thèse: développer de nouvelles stratégies pour étudier les systèmes de grandes dimensions

    Geometric control of tissue growth and organisation

    Get PDF

    Process Organisation and Scheduling

    Get PDF

    Robotics in Germany and Japan

    Get PDF
    This book comprehends an intercultural and interdisciplinary framework including current research fields like Roboethics, Hermeneutics of Technologies, Technology Assessment, Robotics in Japanese Popular Culture and Music Robots. Contributions on cultural interrelations, technical visions and essays are rounding out the content of this book

    Space Communications: Theory and Applications. Volume 3: Information Processing and Advanced Techniques. A Bibliography, 1958 - 1963

    Get PDF
    Annotated bibliography on information processing and advanced communication techniques - theory and applications of space communication
    corecore