26,889 research outputs found
Evaluation of automated decisionmaking methodologies and development of an integrated robotic system simulation
A generic computer simulation for manipulator systems (ROBSIM) was implemented and the specific technologies necessary to increase the role of automation in various missions were developed. The specific items developed are: (1) capability for definition of a manipulator system consisting of multiple arms, load objects, and an environment; (2) capability for kinematic analysis, requirements analysis, and response simulation of manipulator motion; (3) postprocessing options such as graphic replay of simulated motion and manipulator parameter plotting; (4) investigation and simulation of various control methods including manual force/torque and active compliances control; (5) evaluation and implementation of three obstacle avoidance methods; (6) video simulation and edge detection; and (7) software simulation validation
Challenges in Vehicle Safety and Occupant Protection for Autonomous Electric Vertical Take-Off and Landing (eVTOL) Vehicles
The burgeoning electric Vertical Take-off and Landing (eVTOL) vehicle industry has generated a significant level of enthusiasm amongst aviation designers, manufacturers and researchers. This industry is determined to change the urban transportation paradigm from traditional ground-based vehicles (cars, taxis, buses) to air-based eVTOL vehicles which can be summoned, much like how conventional taxi services work currently. These new eVTOL vehicles are designed to be small and lightweight and operate autonomously without user intervention. There are many unknowns as to how the industry will mature. The logistics of creating a completely new category of vehicle along with its own set of rules are complex, and there are many known - and unknown - barriers to overcome. Some (of many) known barriers include airspace management, ground logistics, physical space, and, the vehicle design itself. There are many eVTOL vehicle manufacturers and organizations working these problems presently. This report will focus on one major barrier: the level of safety as it pertains to the framework of eVTOL vehicles. A high level of safety is necessary for the vehicles to gain acceptance as the public adapts to these autonomous ride-sharing services. An overview of current levels of transportation safety and some extrapolation into how eVTOL vehicles might compare is first presented. Next, a discussion categorizing the major differences between Crash Prevention and Crash Mitigation as it pertains to eVTOL vehicle safety is included with identification of current deficiencies. The report then expands into a framework for specific ideas that could use Crash Mitigation to improve vehicle safety through a crashworthy systems level approach with several designs highlighted. Finally, a brief discussion into the regulatory approach and potential guidelines as they pertain to new eVTOL vehicles is presented. Accordingly, much of the supplemental data will be taken from sources pertaining to either General Aviation (GA) aircraft, rotorcraft, or transport category aircraft, due to the lack of overarching data from eVTOL vehicles. As of this writing, the European Aviation Safety Agency has released a draft version of a VTOL Special Condition, with a comment period closing in late 2018. It is assumed that eventual expected operations and anticipated future regulations for VTOL vehicles will consist of some combination of these (and other) sources
Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph
Police SWAT teams and Military Special Forces face mounting pressure and
challenges from adversaries that can only be resolved by way of ever more
sophisticated inputs into tactical operations. Lethal Autonomy provides
constrained military/security forces with a viable option, but only if
implementation has got proper empirically supported foundations. Autonomous
weapon systems can be designed and developed to conduct ground, air and naval
operations. This monograph offers some insights into the challenges of
developing legal, reliable and ethical forms of autonomous weapons, that
address the gap between Police or Law Enforcement and Military operations that
is growing exponentially small. National adversaries are today in many
instances hybrid threats, that manifest criminal and military traits, these
often require deployment of hybrid-capability autonomous weapons imbued with
the capability to taken on both Military and/or Security objectives. The
Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of
Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that
required military response and police investigations against a fighting cell of
the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade
Controling interactions in motion control systems
Design of motion control systems should take into account (a) unconstrained
motion performed without interaction with environment or other systems, (b) constrained motion performed by certain functional interaction with environment or other system. Control in both cases can be formulated in terms of maintaining desired system configuration what makes essentially the same structure for common tasks: trajectory tracking, interaction force control, compliance control etc. It will be shown that the same design approach can be used for systems that maintain some functional relations like parallel robots
Enhancing data privacy and security in Internet of Things through decentralized models and services
exploits a Byzantine Fault Tolerant (BFT) blockchain, in order to perform collaborative and dynamic botnet detection by collecting and auditing IoT devices\u2019 network traffic flows as blockchain transactions. Secondly, we take the challenge to decentralize IoT, and design a hybrid blockchain architecture for IoT, by proposing Hybrid-IoT. In Hybrid-IoT, subgroups of IoT devices form PoW blockchains, referred to as PoW sub-blockchains. Connection among the PoW sub-blockchains employs a BFT inter-connector framework. We focus on the PoW sub-blockchains formation, guided by a set of guidelines based on a set of dimensions, metrics and bounds
Multi-Layer Cyber-Physical Security and Resilience for Smart Grid
The smart grid is a large-scale complex system that integrates communication
technologies with the physical layer operation of the energy systems. Security
and resilience mechanisms by design are important to provide guarantee
operations for the system. This chapter provides a layered perspective of the
smart grid security and discusses game and decision theory as a tool to model
the interactions among system components and the interaction between attackers
and the system. We discuss game-theoretic applications and challenges in the
design of cross-layer robust and resilient controller, secure network routing
protocol at the data communication and networking layers, and the challenges of
the information security at the management layer of the grid. The chapter will
discuss the future directions of using game-theoretic tools in addressing
multi-layer security issues in the smart grid.Comment: 16 page
- …