26,889 research outputs found

    Evaluation of automated decisionmaking methodologies and development of an integrated robotic system simulation

    Get PDF
    A generic computer simulation for manipulator systems (ROBSIM) was implemented and the specific technologies necessary to increase the role of automation in various missions were developed. The specific items developed are: (1) capability for definition of a manipulator system consisting of multiple arms, load objects, and an environment; (2) capability for kinematic analysis, requirements analysis, and response simulation of manipulator motion; (3) postprocessing options such as graphic replay of simulated motion and manipulator parameter plotting; (4) investigation and simulation of various control methods including manual force/torque and active compliances control; (5) evaluation and implementation of three obstacle avoidance methods; (6) video simulation and edge detection; and (7) software simulation validation

    Challenges in Vehicle Safety and Occupant Protection for Autonomous Electric Vertical Take-Off and Landing (eVTOL) Vehicles

    Get PDF
    The burgeoning electric Vertical Take-off and Landing (eVTOL) vehicle industry has generated a significant level of enthusiasm amongst aviation designers, manufacturers and researchers. This industry is determined to change the urban transportation paradigm from traditional ground-based vehicles (cars, taxis, buses) to air-based eVTOL vehicles which can be summoned, much like how conventional taxi services work currently. These new eVTOL vehicles are designed to be small and lightweight and operate autonomously without user intervention. There are many unknowns as to how the industry will mature. The logistics of creating a completely new category of vehicle along with its own set of rules are complex, and there are many known - and unknown - barriers to overcome. Some (of many) known barriers include airspace management, ground logistics, physical space, and, the vehicle design itself. There are many eVTOL vehicle manufacturers and organizations working these problems presently. This report will focus on one major barrier: the level of safety as it pertains to the framework of eVTOL vehicles. A high level of safety is necessary for the vehicles to gain acceptance as the public adapts to these autonomous ride-sharing services. An overview of current levels of transportation safety and some extrapolation into how eVTOL vehicles might compare is first presented. Next, a discussion categorizing the major differences between Crash Prevention and Crash Mitigation as it pertains to eVTOL vehicle safety is included with identification of current deficiencies. The report then expands into a framework for specific ideas that could use Crash Mitigation to improve vehicle safety through a crashworthy systems level approach with several designs highlighted. Finally, a brief discussion into the regulatory approach and potential guidelines as they pertain to new eVTOL vehicles is presented. Accordingly, much of the supplemental data will be taken from sources pertaining to either General Aviation (GA) aircraft, rotorcraft, or transport category aircraft, due to the lack of overarching data from eVTOL vehicles. As of this writing, the European Aviation Safety Agency has released a draft version of a VTOL Special Condition, with a comment period closing in late 2018. It is assumed that eventual expected operations and anticipated future regulations for VTOL vehicles will consist of some combination of these (and other) sources

    Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph

    Full text link
    Police SWAT teams and Military Special Forces face mounting pressure and challenges from adversaries that can only be resolved by way of ever more sophisticated inputs into tactical operations. Lethal Autonomy provides constrained military/security forces with a viable option, but only if implementation has got proper empirically supported foundations. Autonomous weapon systems can be designed and developed to conduct ground, air and naval operations. This monograph offers some insights into the challenges of developing legal, reliable and ethical forms of autonomous weapons, that address the gap between Police or Law Enforcement and Military operations that is growing exponentially small. National adversaries are today in many instances hybrid threats, that manifest criminal and military traits, these often require deployment of hybrid-capability autonomous weapons imbued with the capability to taken on both Military and/or Security objectives. The Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that required military response and police investigations against a fighting cell of the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade

    Controling interactions in motion control systems

    Get PDF
    Design of motion control systems should take into account (a) unconstrained motion performed without interaction with environment or other systems, (b) constrained motion performed by certain functional interaction with environment or other system. Control in both cases can be formulated in terms of maintaining desired system configuration what makes essentially the same structure for common tasks: trajectory tracking, interaction force control, compliance control etc. It will be shown that the same design approach can be used for systems that maintain some functional relations like parallel robots

    Enhancing data privacy and security in Internet of Things through decentralized models and services

    Get PDF
    exploits a Byzantine Fault Tolerant (BFT) blockchain, in order to perform collaborative and dynamic botnet detection by collecting and auditing IoT devices\u2019 network traffic flows as blockchain transactions. Secondly, we take the challenge to decentralize IoT, and design a hybrid blockchain architecture for IoT, by proposing Hybrid-IoT. In Hybrid-IoT, subgroups of IoT devices form PoW blockchains, referred to as PoW sub-blockchains. Connection among the PoW sub-blockchains employs a BFT inter-connector framework. We focus on the PoW sub-blockchains formation, guided by a set of guidelines based on a set of dimensions, metrics and bounds

    Multi-Layer Cyber-Physical Security and Resilience for Smart Grid

    Full text link
    The smart grid is a large-scale complex system that integrates communication technologies with the physical layer operation of the energy systems. Security and resilience mechanisms by design are important to provide guarantee operations for the system. This chapter provides a layered perspective of the smart grid security and discusses game and decision theory as a tool to model the interactions among system components and the interaction between attackers and the system. We discuss game-theoretic applications and challenges in the design of cross-layer robust and resilient controller, secure network routing protocol at the data communication and networking layers, and the challenges of the information security at the management layer of the grid. The chapter will discuss the future directions of using game-theoretic tools in addressing multi-layer security issues in the smart grid.Comment: 16 page
    corecore