Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 3 de 3
Filtrar
Mais filtros











Base de dados
Intervalo de ano de publicação
1.
J Adv Res ; 8(4): 333-341, 2017 Jul.
Artigo em Inglês | MEDLINE | ID: mdl-28413690

RESUMO

A computational algorithm is developed for estimating accurately the attitude of a robotic arm which moves along a predetermined path. This algorithm requires preliminary input data obtained in the static mode to yield phase observables for the precise, 3-axis attitude determination of a swinging manipulator in the dynamic mode. Measurements are recorded simultaneously by three GPS L1 receivers and then processed in several steps to accomplish this task. First, artkconv batch executable converts GPS receiver readings into RINEX format to generate GPS observables and ephemeris for multiple satellites. Then baseline vectors determination is carried out by baseline constrained Least-Squares Ambiguity Decorrelation (LAMBDA) method that uses double difference carrier phase estimates as input to calculate integer solution for each baseline. Finally, attitude determination is made by employing alternatively Least-squares attitude determination (LSAD) in the static mode and extended Kalman filter in the dynamic mode. The algorithm presented in this paper is applied to recorded data on Mitsubishi RV-M1 robotic arm in order to produce attitude estimates. These results are confirmed by another set of Euler angles independently evaluated from robotic arm postures obtained along the predefined trajectory.

2.
J Adv Res ; 6(3): 479-92, 2015 May.
Artigo em Inglês | MEDLINE | ID: mdl-26257946

RESUMO

Computing the optimal geometric structure of manipulators is one of the most intricate problems in contemporary robot kinematics. Robotic manipulators are designed and built to perform certain predetermined tasks. There is a very close relationship between the structure of the manipulator and its kinematic performance. It is therefore important to incorporate such task requirements during the design and synthesis of the robotic manipulators. Such task requirements and performance constraints can be specified in terms of the required end-effector positions, orientations and velocities along the task trajectory. In this work, we present a comprehensive method to develop the optimal geometric structure (DH parameters) of a non-redundant six degree of freedom serial manipulator from task descriptions. In this work we define, develop and test a methodology to design optimal manipulator configurations based on task descriptions. This methodology is devised to investigate all possible manipulator configurations that can satisfy the task performance requirements under imposed joint constraints. Out of all the possible structures, the structures that can reach all the task points with the required orientations are selected. Next, these candidate structures are tested to see whether they can attain end-effector velocities in arbitrary directions within the user defined joint constraints, so that they can deliver the best kinematic performance. Additionally least power consuming configurations are also identified.

3.
Sensors (Basel) ; 15(3): 5820-64, 2015 Mar 10.
Artigo em Inglês | MEDLINE | ID: mdl-25763649

RESUMO

Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc.) and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in most of the cases these objects need protection. In these applications, data privacy itself might not be as important as the privacy of source location. In addition to the source location privacy, sink location privacy should also be provided. Providing an efficient end-to-end privacy solution would be a challenging task to achieve due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observability, capture likelihood, and safety period. We extend this work to allow for countermeasures against multi-local and global adversaries. We present a network model protected against a sophisticated threat model: passive /active and local/multi-local/global attacks. This work provides a solution for end-to-end anonymity and location privacy as well. We will introduce a framework called fortified anonymous communication (FAC) protocol for WSN.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA