7 research outputs found
Autonomous mobile robots in manufacturing : Highway Code development, simulation and testing
A dynamic and flexible manufacturing environment presents many challenges in the movement of Autonomous Mobile Robots (AMRs), leading to delays due to the complexity of operations while negotiating even a simple route. Therefore, an understanding of rules related to AMR movement is important both from a utility perspective as well as a safety perspective. Our survey from literature and industry has revealed a gap in methodology to test rules related to AMR movement in a factory environment. Testing purely through simulations would not able to capture the nuances of shop floor interactions whereas physical testing alone would be incredibly time-consuming and potentially hazardous. This work presents a new methodology
that can make use of observations of AMR behaviour on selected cases on the shop floor and build up the fidelity of those simulations based on observations.
This paper presents the development of a Highway Code for AMRs, development of simulation models for an ideal-AMR (based on the rules from the Highway Code) and physical testing of real-AMR in an industrial environment. Finally, a behavioural comparison of an ideal-AMR and a real-AMR in five scenarios (taken from the shop floor of an industrial partner) is presented. This work could enable informed decisions regarding the implementation of AMRs through identification of any adverse behaviours which could then be mitigated either through
improvements on the AMR or through establishing shop floor protocols that reduce the potential impact of these behaviours
A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
In recent years secret permutations have been widely used for protecting different types of multimedia data, including speech files, digital images and videos. Based on a general model of permutation-only multimedia ciphers, this paper performs a quantitative cryptanalysis on the performance of these kind of ciphers against plaintext attacks. When the plaintext is of size MxN and with L different levels of values, the following quantitative cryptanalytic findings have been concluded under the assumption of a uniform distribution of each element in the plaintext: (1) all permutation-only multimedia ciphers are practically insecure against known/chosen-plaintext attacks in the sense that only O(log_L(MN)) known/chosen plaintexts are sufficient to recover not less than (in an average sense) half elements of the plaintext; (2) the computational complexity of the known/chosen-plaintext attack is only O(n(MN)^2), where n is the number of known/chosen plaintexts used. When the plaintext has a non-uniform distribution, the number of required plaintexts and the computational complexity is also discussed. Experiments are given to demonstrate the real performance of the known-plaintext attack for a typical permutation-only image cipher