1,961 research outputs found

    Sensor Observability Index: Evaluating Sensor Alignment for Task-Space Observability in Robotic Manipulators

    Full text link
    In this paper, we propose a preliminary definition and analysis of the novel concept of sensor observability index. The goal is to analyse and evaluate the performance of distributed directional or axial-based sensors to observe specific axes in task space as a function of joint configuration in serial robot manipulators. For example, joint torque sensors are often used in serial robot manipulators and assumed to be perfectly capable of estimating end effector forces, but certain joint configurations may cause one or more task-space axes to be unobservable as a result of how the joint torque sensors are aligned. The proposed sensor observability provides a method to analyse the quality of the current robot configuration to observe the task space. Parallels are drawn between sensor observability and the traditional kinematic Jacobian for the particular case of joint torque sensors in serial robot manipulators. Although similar information can be retrieved from kinematic analysis of the Jacobian transpose in serial manipulators, sensor observability is shown to be more generalizable in terms of analysing non-joint-mounted sensors and other sensor types. In addition, null-space analysis of the Jacobian transpose is susceptible to false observability singularities. Simulations and experiments using the robot Baxter demonstrate the importance of maintaining proper sensor observability in physical interactions.Comment: 7 pages, 5 figures, conference pape

    Vision- and tactile-based continuous multimodal intention and attention recognition for safer physical human-robot interaction

    Full text link
    Employing skin-like tactile sensors on robots enhances both the safety and usability of collaborative robots by adding the capability to detect human contact. Unfortunately, simple binary tactile sensors alone cannot determine the context of the human contact -- whether it is a deliberate interaction or an unintended collision that requires safety manoeuvres. Many published methods classify discrete interactions using more advanced tactile sensors or by analysing joint torques. Instead, we propose to augment the intention recognition capabilities of simple binary tactile sensors by adding a robot-mounted camera for human posture analysis. Different interaction characteristics, including touch location, human pose, and gaze direction, are used to train a supervised machine learning algorithm to classify whether a touch is intentional or not with an F1-score of 86%. We demonstrate that multimodal intention recognition is significantly more accurate than monomodal analyses with the collaborative robot Baxter. Furthermore, our method can also continuously monitor interactions that fluidly change between intentional or unintentional by gauging the user's attention through gaze. If a user stops paying attention mid-task, the proposed intention and attention recognition algorithm can activate safety features to prevent unsafe interactions. We also employ a feature reduction technique that reduces the number of inputs to five to achieve a more generalized low-dimensional classifier. This simplification both reduces the amount of training data required and improves real-world classification accuracy. It also renders the method potentially agnostic to the robot and touch sensor architectures while achieving a high degree of task adaptability.Comment: 11 pages, 8 figures, preprint under revie

    Increased phosphorylation of Cx36 gap junctions in the AII amacrine cells of RD retina

    Get PDF
    Retinal degeneration (RD) encompasses a family of diseases that lead to photoreceptor death and visual impairment. Visual decline due to photoreceptor cell loss is further compromised by emerging spontaneous hyperactivity in inner retinal cells. This aberrant activity acts as a barrier to signals from the remaining photoreceptors, hindering therapeutic strategies to restore light sensitivity in RD. Gap junctions, particularly those expressed in AII amacrine cells, have been shown to be integral to the generation of aberrant activity. It is unclear whether gap junction expression and coupling are altered in RD. To test this, we evaluated the expression and phosphorylation state of connexin36, the gap junction subunit predominantly expressed in AII amacrine cells, in two mouse models of RD, rd10 (slow degeneration) and rd1 (fast degeneration). Using Ser293-P antibody, which recognizes a phosphorylated form of connexin36, we found that phosphorylation of connexin36 in both slow and fast RD models was significantly greater than in wildtype controls. This elevated phosphorylation may underlie the increased gap junction coupling of AII amacrine cells exhibited by RD retina

    Jet Noise Receptivity to Nozzle-upstream Perturbations in Compressible Heated Jets

    Full text link
    Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/97078/1/AIAA2012-2259.pd

    Network Deficiency Exacerbates Impairment in a Mouse Model of Retinal Degeneration

    Get PDF
    Neural oscillations play an important role in normal brain activity, but also manifest during Parkinson’s disease, epilepsy, and other pathological conditions. The contribution of these aberrant oscillations to the function of the surviving brain remains unclear. In recording from retina in a mouse model of retinal degeneration (RD), we found that the incidence of oscillatory activity varied across different cell classes, evidence that some retinal networks are more affected by functional changes than others. This aberrant activity was driven by an independent inhibitory amacrine cell oscillator. By stimulating the surviving circuitry at different stages of the neurodegenerative process, we found that this dystrophic oscillator further compromises the function of the retina. These data reveal that retinal remodeling can exacerbate the visual deficit, and that aberrant synaptic activity could be targeted for RD treatment

    Dual Space Preconditioning for Gradient Descent

    Get PDF
    The conditions of relative smoothness and relative strong convexity were recently introduced for the analysis of Bregman gradient methods for convex optimization. We introduce a generalized left-preconditioning method for gradient descent, and show that its convergence on an essentially smooth convex objective function can be guaranteed via an application of relative smoothness in the dual space. Our relative smoothness assumption is between the designed preconditioner and the convex conjugate of the objective, and it generalizes the typical Lipschitz gradient assumption. Under dual relative strong convexity, we obtain linear convergence with a generalized condition number that is invariant under horizontal translations, distinguishing it from Bregman gradient methods. Thus, in principle our method is capable of improving the conditioning of gradient descent on problems with non-Lipschitz gradient or non-strongly convex structure. We demonstrate our method on p-norm regression and exponential penalty function minimization.Comment: SIAM J. Optim, accepte

    Global affordability of fluoride toothpaste

    Get PDF
    <p>Abstract</p> <p>Objective</p> <p>Dental caries remains the most common disease worldwide and the use of fluoride toothpaste is a most effective preventive public health measure to prevent it. Changes in diets following globalization contribute to the development of dental caries in emerging economies. The aim of this paper is to compare the cost and relative affordability of fluoride toothpaste in high-, middle- and low-income countries. The hypothesis is that fluoride toothpaste is not equally affordable in high-, middle- and low-income countries.</p> <p>Methods</p> <p>Data on consumer prices of fluoride toothpastes were obtained from a self-completion questionnaire from 48 countries. The cost of fluoride toothpaste in high-, middle- and low-income countries was compared and related to annual household expenditure as well as to days of work needed to purchase the average annual usage of toothpaste per head.</p> <p>Results</p> <p>The general trend seems to be that the proportion of household expenditure required to purchase the annual dosage of toothpaste increases as the country's per capita household expenditure decreases. While in the UK for the poorest 30% of the population only 0.037 days of household expenditure is needed to purchase the annual average dosage (182.5 g) of the lowest cost toothpaste, 10.75 days are needed in Kenya. The proportion of annual household expenditure ranged from 0.02% in the UK to 4% in Zambia to buy the annual average amount of lowest cost toothpaste per head.</p> <p>Conclusion</p> <p>Significant inequalities in the affordability of this essential preventive care product indicate the necessity for action to make it more affordable. Various measures to improve affordability based on experiences from essential pharmaceuticals are proposed.</p

    Understanding Russian Offensive Cyber to Repair Private-Public Relations in Critical Infrastructure Defense

    Get PDF
    This policy study assesses how concepts of monitoring IT (Information Technology) and OT (Operational Technology) mitigate the success of Russian Offensive Cyber Operations (OCO) against critical infrastructure. The study answers, "how can monitoring systems that surveil both IT and OT mitigate offensive Russian cyber operations against critical infrastructure?" Current scholarship shows substantial efforts to reform cyber defenses – exemplified by the US's changes since the early 2000s. Although reforms resulted in new defensive programs, they contributed to a convoluted system that made private-public cooperation difficult. Combined with technological trends that emphasized cost-efficiencies, these reforms created a contentious balance between private and public organizations where infrastructure providers valued costs over security. This unfortunate position supports Russia's strategy. Russian cyber-attacks since 2007 illustrate increasingly destructive capabilities that manipulate critical infrastructure vulnerabilities and weak defenses. This study examines Russian cyber-attacks since 2007 to test if Moscow's cyber tactics create abnormal behavioral traits that modern surveillance, IT-OT monitoring, could detect. Through comparative case studies of Russian OCO, the study builds common TTPs (Tactics, Techniques, and Procedures) and possible warning signs. The results are the foundation of several policy recommendations. The study used data from established technical trade associates, non-governmental organizations, government agencies, translated Russian strategy documents, and scholarly literature that discussed Russia's cyber activities. The analysis indicates that Russia's offensive cyber creates several observable behavioral traits that IT-OT monitoring would detect, mitigating Russian OCO's success against critical infrastructure. However, the technique needs to intervene when an attacker is in initial set-up phases, as the beginning segments of a Russian OCO are the most vulnerable to detection. The study recommends streamlining government cybersecurity and regulatory agencies, providing the necessary intelligence to customize defensive systems, and broadening access to commercial solutions. These steps would help create a collaborative relationship between the public and private sector while encouraging the broad adoption of IT-OT monitoring. The study concludes that the government should focus on policies that support industry to encourage cybersecurity modernization and avoid problems seen in America's reforms during the 2000s

    Database Queries in Java

    Get PDF
    In conventional programming languages like Java, the interface for accessing databases is often inelegant. Typically, an entire separate database query language must be embedded inside a conventional programming language for programmers to access the full power and speed of a database. Programmers, though, prefer working entirely from within their conventional programming languages, both for general-purpose computation and for database access. This thesis explores how database operations can be expressed using the existing syntax of conventional programming languages. Programmers are able to write all their code –both general purpose code and database access code– in a single language. To run these database operations efficiently though, algorithms are needed for finding these database operations and optimizing them. This thesis focuses on techniques that can be easily adopted because they do not require changes to existing compilers. Three systems have been developed: Queryll, JReq, and HadoopToSQL. Each system examines the problem from the context of functional-style code, imperative-style code, and MapReduce-style code respectively
    corecore