Robotics (Computer Science) Research Papers (original) (raw)
"A Roadmap for U.S. Robotics: From Internet to Robotics - 2013 Edition.". Robots are being used more widely than expected in a variety of sectors, and the trend is likely to continue with robotics becoming as ubiquitous as computer... more
"A Roadmap for U.S. Robotics: From Internet to Robotics - 2013 Edition.". Robots are being used more widely than expected in a variety of sectors, and the trend is likely to continue with robotics becoming as ubiquitous as computer technology over the next 15 years. That is the message Henrik Christensen, Georgia Tech's KUKA Chair of Robotics in the College of Computing, will bring to the Congressional Robotics Caucus on March 20 as he presents "A Roadmap for U.S. Robotics: From Internet to Robotics - 2013 Edition." The report, which outlines the progress of robots in multiple industries over the last five years and identifies goals for the coming decade, highlights robotics as a key economic enabler with the potential to transform U.S. society.
Abstract Competitive robotics programs are shown by a number of researchers to be increasing in popularity, with team organizations and competition events being successfully diffused and adapted across the nation. This study examined,... more
Abstract
Competitive robotics programs are shown by a number of researchers to be increasing in popularity, with team organizations and competition events being successfully diffused and adapted across the nation. This study examined, through the application of the Diffusion of Innovations theory developed by Everett Rogers, as well as how and to what degree these STEM-based learning programs for school-age children are being effectively diffused in a state which has a lack of technology access and a persistent digital divide. The basis of this study consisted of interviews with adult mentors and coaches who lead and guide these student robotics teams. In terms of Diffusion of Innovations Theory, this study examined whether and how the coaches and mentors may be the change agents and innovators who are diffusing competitive robotics technology through these programs. Participants were interviewed about the factors that assist and hinder this innovation’s diffusion and adoption in Mississippi. Further, the study also examined what STEM-based knowledge students may be gaining through the diffusion of this innovation.
Keywords: diffusion, robotics, STEM, innovations, Rogers, Everett
Illumination invariance remains the most researched, yet the most challenging aspect of automatic face recognition. In this paper we investigate the discriminative power of colour-based invariants in the presence of large illumination... more
Illumination invariance remains the most researched, yet the most challenging aspect of automatic face recognition. In this paper we investigate the discriminative power of colour-based invariants in the presence of large illumination changes between training and test data, when appearance changes due to cast shadows and non-Lambertian effects are significant. Specifically, there are three main contributions: (i) we employ a more sophisticated photometric model of the camera and show how its parameters can be estimated, (ii) we derive several novel colour-based face invariants, and (iii) on a large database of video sequences we examine and evaluate the largest number of colour-based representations in the literature. Our results suggest that colour invariants do have a substantial discriminative power which may increase the robustness and accuracy of recognition from low resolution images.
Design a nonlinear controller for second order nonlinear uncertain dynamical systems (e.g., Internal Combustion Engine) is one of the most important challenging works. This paper focuses on the design of a robust backstepping adaptive... more
Design a nonlinear controller for second order nonlinear uncertain dynamical systems (e.g., Internal Combustion Engine) is one of the most important challenging works. This paper focuses on the design of a robust backstepping adaptive feedback linearization controller (FLC) for internal combustion (IC) engine in presence of uncertainties. In order to provide high performance nonlinear methodology, feedback linearization controller is selected. Pure feedback linearization controller can be used to control of partly unknown nonlinear dynamic parameters of IC engine. In order to solve the uncertain nonlinear dynamic parameters, implement easily and avoid mathematical model base controller, Mamdani’s performance/error-based fuzzy logic methodology with two inputs and one output and 49 rules is applied to pure feedback linearization controller. The results demonstrate that the error-based fuzzy feedback linearization controller is a model-free controllers which works well in certain and partly uncertain system. Pure feedback linearization controller and error-based feedback linearization like controller with have difficulty in handling unstructured model uncertainties. To solve this problem applied backstepping-based tuning method to error-based fuzzy feedback linearization controller for adjusting the feedback linearization controller gain ( ). This controller has acceptable performance in presence of uncertainty (e.g., overshoot=1%, rise time=0.48 second, steady state error = 1.3e-9 and RMS error=1.8e-11).
Here in this text, I aim to discuss briefly the basics of how Artificial Neural Networks function and also how they have been present in our daily life. My purpose is to do that in a way someone with just basic knowledge or even no... more
Here in this text, I aim to discuss briefly the basics of how Artificial Neural Networks function and also how they have been present in our daily life. My purpose is to do that in a way someone with just basic knowledge or even no knowledge at all about this topic would be able to understand it at least a little.
This paper aims to show the possible and actual synergies between social robotics and sociology. The author argues that social robots are one of the best fields of inquiry to provide a bridge between the two cultures – the one represented... more
This paper aims to show the possible and actual synergies between social robotics and sociology. The author argues that social robots are one of the best fields of inquiry to provide a bridge between the two cultures – the one represented by the social sciences and the humanities on the one hand, and the one represented by the natural sciences and engineering on the other. To achieve this result, quantitative and qualitative analyses are implemented. By using scientometric tools like Ngram Viewer, search engines such as Google Scholar, and hand calculations, the author detects the emergence of the term-and-concept ‘social robots’ in its current use, the absolute and relative frequencies of this term in the scientific literature in the period 1800-2008, the frequency distribution of publications including this term in the period 2000-2019, and the magnitude of publications in which the term ‘social robots’ is associated to the term ‘sociology’ or 'social work'. Finally, employing qualitative analysis and focusing on exemplary cases, this paper shows different ways of implementing researches that relate sociology to robotics, from a theoretical or instrumental point of view. It is argued that sociologists and engineers could work in a team to observe, analyze, and describe the interaction between humans and social robots, by using research techniques and theoretical frames provided by sociology. In turn, this knowledge can be used to build more effective and humanlike social robots.
Knowing the geometry of a space is desirable for many applications, e.g. sound source localization, sound field reproduction or auralization. In circumstances where only acoustic signals can be obtained, estimating the geometry of a room... more
Knowing the geometry of a space is desirable for many applications, e.g. sound source localization, sound field reproduction or auralization. In circumstances where only acoustic signals can be obtained, estimating the geometry of a room is a challenging proposition. Existing methods have been proposed to reconstruct a room from the room impulse responses (RIRs). However, the sound source and microphones must be deployed in a feasible region of the room for it to work, which is impractical when the room is unknown. This work propose to employ a robot equipped with a sound source and four acoustic sensors, to follow a proposed path planning strategy to moves around the room to collect first image sources for room geometry estimation. The strategy can effectively drives the robot from a random initial location through the room so that the room geometry is guaranteed to be revealed. Effectiveness of the proposed approach is extensively validated in a synthetic environment, where the results obtained are highly promising.
This Foreword, about robots, written in both poetry as well as prose, introduces the edited collection _Androids, Cyborgs, and Robots in Contemporary Culture and Society_, edited by Steven J. Thompson (IGI Global, 2018). The link on the... more
This Foreword, about robots, written in both poetry as well as prose, introduces the edited collection _Androids, Cyborgs, and Robots in Contemporary Culture and Society_, edited by Steven J. Thompson (IGI Global, 2018). The link on the thumbnail cover at
https://www.igi-global.com/book/_/179222 will take you directly to the published Foreword, which is open access. The attached PDF, sent directly to me from IGI-Global to use here, is presented with written permission of the publisher.
This work presents the safety and verification arguments for the development of an autonomous robot platform capable of leading humans around a building. It uses Goal Structuring Notation (GSN) to develop a pattern, a re-usable GSN... more
This work presents the safety and verification arguments for the development of an autonomous robot platform capable of leading humans around a building. It uses Goal Structuring Notation (GSN) to develop a pattern, a re-usable GSN fragment, that can form part of the safety case surrounding the interaction of a mobile guide robot to: record the decisions taken during the design phase, ensure safe operation around humans, and identify where mitigation must be introduced.
This paper aims to provide a solution for the blind people to walk safely by detecting obstacle and generating corresponding alert signal according to the distance of the obstacle. The solution is provided by developing a walking... more
This paper aims to provide a solution for the blind people to walk safely by detecting obstacle and generating corresponding alert signal according to the distance of the obstacle. The solution is provided by developing a walking assistant embedded in a spectacle glass with an obstacle detection module and an alarm generator. There is only one ultrasonic sensor in the obstacle detection module which can cover 3 meter distance and 60 degree angle to detect the obstacles. The obstacle detection module generates high frequency signal through the ultrasonic sensor and evaluate the echo which is received back by the sensor. Then the distance of the obstacle is measured and this information about the obstacle is delivered to a blind using the alarm generator which generates alarm corresponding to the distance. Experimental studies show that the proposed methodology provides a more cost effective, lesser weighty, simpler walk-in assistant for the blinds than existing dominant work.
An introductory course on Software Engineering remains one of the hardest subjects to teach largely because of the wide range of topics the area encompasses. I have believed for some time that we often tend to teach too many concepts and... more
An introductory course on Software Engineering remains one of the hardest
subjects to teach largely because of the wide range of topics the area encompasses.
I have believed for some time that we often tend to teach too many
concepts and topics in an introductory course resulting in shallow knowledge
and little insight on application of these concepts. And Software Engineering
is finally about application of concepts to efficiently engineer good software
solutions.
International Journal of Computer Science and Technology (IJCST) is devoted to fields of Computer Science and Technology. The IJCST is a open access peer-reviewed scientific journal published in electronic form as well as print form. The... more
International Journal of Computer Science and Technology (IJCST) is devoted to fields of Computer Science and Technology. The IJCST is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
We present the exploring/exploiting tree (EET) algorithm for motion planning. The EET planner deliberately trades probabilistic completeness for computational efficiency. This tradeoff enables the EET planner to outperform... more
We present the exploring/exploiting tree (EET) algorithm for motion planning. The EET planner deliberately trades probabilistic completeness for computational efficiency. This tradeoff enables the EET planner to outperform state-of-the-art sampling-based planners by up to three orders of magnitude. We show that these considerable speedups apply for a variety of challenging real-world motion planning problems. The performance improvements are achieved by leveraging work space information to continuously adjust the sampling behavior of the planner. When the available information captures the planning problem's inherent structure, the planner's sampler becomes increasingly exploitative. When the available information is less accurate, the planner automatically compensates by increasing local configuration space exploration. We show that active balancing of exploration and exploitation based on workspace information can be a key ingredient to enabling highly efficient motion planning in practical scenarios.
1 Abstract-This is a research on the design of an automatic robot with the ability to dance. This biped robot has 10 joints to make the right moves that are required in the dance, because the dance is commonly known as "salsa choke". A... more
1 Abstract-This is a research on the design of an automatic robot with the ability to dance. This biped robot has 10 joints to make the right moves that are required in the dance, because the dance is commonly known as "salsa choke". A detailed description of the design was done with respect to the development of the structure of each piece from simulations and real parts; additionally, the movement of joints using the forward kinematics supported by Denavit-Hartenberg algorithm.
Dynamically changing background ("dynamic background") still presents a great challenge to many motion-based video surveillance systems. In the context of event detection, it is a major source of false alarms. There is a strong need from... more
Dynamically changing background ("dynamic background") still presents a great challenge to many motion-based video surveillance systems. In the context of event detection, it is a major source of false alarms. There is a strong need from the security industry either to detect and suppress these false alarms, or dampen the effects of background changes, so as to increase the sensitivity to meaningful events of interest. In this paper, we restrict our focus to one of the most common causes of dynamic background changes: that of swaying tree branches and their shadows under windy conditions. Considering the ultimate goal in a video analytics pipeline, we formulate a new dynamic background detection problem as a signal processing alternative to the previously described but unreliable computer vision-based approaches. Within this new framework, we directly reduce the number of false alarms by testing if the detected events are due to characteristic background motions. In addition, we introduce a new dataset suitable for the evaluation of dynamic background detection. It consists of real-world events detected by a commercial surveillance system from two static surveillance cameras. The research question we address is whether dynamic background can be detected reliably and efficiently using simple motion features and in the presence of similar but meaningful events such as loitering. Inspired by the tree aerodynamics theory, we propose a novel method named local variation persistence (LVP), that captures the key characteristics of swaying motions. The method is posed as a convex optimization problem whose variable is the local variation. We derive a computationally efficient algorithm for solving the optimization problem, the solution of which is then used to form a powerful detection statistic. On our newly collected dataset, we demonstrate that the proposed LVP achieves excellent detection results and outperforms the best alternative adapted from existing art in the dynamic background literature.
High dimensional data is frequently found in various field of study basically in the process of running data analysis; individuals have applied the various techniques available to manage high dimensional data. However, Principal... more
High dimensional data is frequently found in various field of study basically in the process of running data analysis; individuals have applied the various techniques available to manage high dimensional data. However, Principal Components Analysis (PCA) and Linear Discriminant Analysis (LDA) have been applied in high dimensional data, reducing the process of classifying features under consideration.
We would like to invite you to join this exciting new project as a chapter contributor. Since this is a textbook, a great deal of this chapter entails a survey on the topic under the paradigm of cyber-physical systems, what can be done... more
We would like to invite you to join this exciting new project as a chapter contributor. Since this is a textbook, a great deal of this chapter entails a survey on the topic under the paradigm of cyber-physical systems, what can be done onboard and remotely, the distributed nature of the system and some exercises on futurology (anticipating trends can shed some light on upcoming designs). IET will bring great visibility to your work. You are welcome to suggest another topic/chapter title if you feel it would be more suitable. Each chapter should be around 20-25 pages each and can be submitted as a Word or Latex File. The IET will send you additional information (formatting, permission form, etc.) with the contributor's agreement once you have agreed to contribute to the book. Visit http:// www.theiet.org/resources/author-hub/books/index.cfm to get all information you need as a contributor to an IET research-level book. Each book is expected to have a total number of 500 printed pages (based on approximately 550 words per page with a 20% allowance for figures and tables). We have included a tentative schedule and list of topics below. If this is something you would consider, please send me the title of your chapter, a short description/abstract of the chapter content, and your full contact details. We will expect original content and new results for this book. You can, of course, reuse published material but the percentage of material reuse for the chapter should be less than 40%. The IET will run a piracy software on the full manuscript to control that you are including original material and will reject chapters who contain a large amount of already-published material so please do take this into consideration.
We present Graph-Clear, a novel pursuit-evasion problem on graphs which models the detection of intruders in complex indoor environments by robot teams. The environment is represented by a graph, and a robot team can execute sweep and... more
We present Graph-Clear, a novel pursuit-evasion problem on graphs which models the detection of intruders in complex indoor environments by robot teams. The environment is represented by a graph, and a robot team can execute sweep and block actions on vertices and edges respectively. A sweep action detects intruders in a vertex and represents the capability of the robot team to detect intruders in the region associated to the vertex. Similarly, a block action prevents intruders from crossing an edge and represents the capability to detect intruders as they move between regions. Both actions may require multiple robots to be executed. A strategy is a sequence of block and sweep actions detecting all intruders. When solving instances of Graph-Clear the goal is to determine optimal strategies, i.e. strategies using the least number of robots. We prove that for the general case of graphs the problem of computing optimal strategies is NP-hard. Next, for the special case of trees we provide a polynomial time algorithm. The algorithm ensures that throughout the execution of the strategy all cleared vertices form a connected subtree, and we show it produces optimal strategies.
Research creates both knowledge and technology which are put into practical use through the process of innovation. The success in achieving applied scientific technologies can be measured in the form of technological solutions, patents,... more
Research creates both knowledge and technology which are put into practical use through the process of innovation. The success in achieving applied scientific technologies can be measured in the form of technological solutions, patents, inventions, published research papers, etc. The purpose of the research was to formulate an economic framework and develop technological solutions for Zimbabwe with respect to knowledge generation, innovation and enterprise development. This was compounded by an exploration for opportunities in cybersecurity and machine learning for use in the knowledge generation and dissemination business. Cybersecurity is an amalgamation of technologies, processes and operations purposed to preserve and protect computer information systems from cyber-attacks or unauthorized access. Machine Learning (ML) entails the automatic data analysis of large data sets and production of models for the general relationships found among data. The Pragmatism paradigm was used as the research philosophy in this research as it epitomizes the congruity between knowledge and action. The qualitative aspect was primarily used in the knowledge generation component which was based on an integral research architecture which combines descriptive, narrative, theoretical, and experimental survey methods, through focused group discussions as the major research design. The quantitative dimension used an experiment as a research design to explore prototype models for cybersecurity and machine learning. Priority projects for strategic investment were identified for commercialization and these were on post-harvest technologies; small scale mining/mineral value addition/bio mining; clean water alternatives; tiles technologies from mining waste; ICT innovations in Machine Learning and Cybersecurity; and defence technologies. A Bayesian Network model for Cybersecurity was developed to guide implementation of future cybersecurity systems in Africa. The research used the KDDCup 1999 intrusion detection benchmark dataset in order to build an efficient network intrusion detection system. The sample comprised primary data with 42 variables in a set of 494,020 instances that was analysed using mainly the SNORT open-source software and other Bayesian Network supportive platforms. A Bayesian Network model was developed which took into consideration the most efficient ML algorithms.
This paper deals with memory management issues of robotics. In our proposal we break one of the major issues in creating humanoid. . Database issue is the complicated thing in robotics schema design here in our proposal we suggest new... more
This paper deals with memory management issues of robotics. In our proposal we break one of the major
issues in creating humanoid. . Database issue is the complicated thing in robotics schema design here in
our proposal we suggest new concept called NOSQL database for the effective data retrieval, so that the
humanoid robots will get the massive thinking ability in searching each items using chained instructions.
For query transactions in robotics we need an effective consistency transactions so by using latest
technology called CloudTPS which guarantees full ACID properties so that the robot can make their
queries using multi-item transactions through this we obtain data consistency in data retrievals. In addition
we included map reduce concepts it can splits the job to the respective workers so that it can process the
data in a parallel way.
The minimum rule base Proportional Integral Derivative (PID) Fuzzy Computed Torque Controller with application to spherical motor is presented in this research. The popularity of PID Fuzzy Computed Torque Controller can be attributed to... more
The minimum rule base Proportional Integral Derivative (PID) Fuzzy Computed Torque Controller with application to spherical motor is presented in this research. The popularity of PID Fuzzy Computed Torque Controller can be attributed to their robust performance in a wide range of operating conditions and partly to their functional simplicity. PID methodology has three inputs and if any input is described with seven linguistic values, and any rule has three conditions we will need 343 rules. It is too much work to write 343 rules and have lots of problem to design embedded control system e.g., Field Programmable Gate Array (FPGA). In this research the PID-like fuzzy controller can be constructed as a parallel structure of a PD-like fuzzy controller and a conventional PI controller to have the minimum rule base and acceptable trajectory follow disturbance to control of spherical motor. However computed torque controller is work based on cancelling decoupling and nonlinear terms of dynamic parameters for each direction of three degree of freedom spherical motor, this controller is work based on motor dynamic model and this technique is highly sensitive to the knowledge of all parameters of nonlinear spherical motor‟s dynamic equation. This research is used to reduce or eliminate the computed torque controller problem based on minimum rule base fuzzy logic theory to control of three degrees of freedom spherical motor system and testing of the quality of process control in the simulation environment of MATLAB/SIMULINK Simulator.
Index Term—PID
Is sex work (specifically, prostitution) vulnerable to technological unemployment? Several authors have argued that it is. They claim that the advent of sophisticated sexual robots will lead to the displacement of human prostitutes, just... more
Is sex work (specifically, prostitution) vulnerable to technological unemployment? Several authors have argued that it is. They claim that the advent of sophisticated sexual robots will lead to the displacement of human prostitutes, just as, say, the advent of sophisticated manufacturing robots have displaced many traditional forms of factory labour. But are they right? In this article, I critically assess the argument that has been made in favour of this displacement hypothesis. Although I grant the argument a degree of credibility, I argue that the opposing hypothesis -- that prostitution will be resilient to technological unemployment -- is also worth considering. Indeed, I argue that increasing levels of technological unemployment in other fields may well drive more people into the sex work industry. Furthermore, I argue that no matter which hypothesis you prefer -- displacement or resilience -- you can make a good argument for the necessity of a basic income guarantee, either as an obvious way to correct for the precarity of sex work, or as a way to disincentivise those who may be drawn to prostitution.
The paper is prepared for exploring the communication as well as the interaction between two species-humans and robots. The variables like sex, emotion, lust and sex have already been taken in terms of completing the study. The innovation... more
The paper is prepared for exploring the communication as well as the interaction between two species-humans and robots. The variables like sex, emotion, lust and sex have already been taken in terms of completing the study. The innovation of the technology and its continuous impact on the future trends and the society will be vividly discussed. Robotics Artificial Intelligence (AI) technology is regarded as one of the sophisticated and rigorous as well as modern technologies out there. Yet, this technology possesses implications in terms of ethical as well as a social point of view. The alteration in the behaviour of human due to the introduction of robot sex and the dilemmas associated with will be
Minkowski sums have numerous applications in robot path planning, collision detection, assembly planning and more. While there are algorithms and implementations for computing Minkowski sums of polygons, implementing such algorithms for... more
Minkowski sums have numerous applications in robot path planning, collision detection, assembly planning and more. While there are algorithms and implementations for computing Minkowski sums of polygons, implementing such algorithms for freeform geometry (e.g., B-spline curves) presents new and difficult challenges.
In this work we have implemented algorithms for the computation of Minkowksi
sums of freeform curves. We present our symbolic representation of the boundary of the Minkowski sum as an implicit bivariate polynomial equation in the parameter space.
The solution is a univariate curve in the parameter space that is mapped to a curve in the Euclidean plane. This curve is further processed to remove unwanted branches. The computations required for this processing are performed by defining conditions on the curves, and applying a constraint solver to compute the result based on these conditions.
We extend our results to the computation of Minkowski sums of freeform surfaces in R3. We represent the boundary of the Minkowski sum as a system of implicit multivariate polynomial equations in the parameter space. The solution is a bivariate manifold in the parameter space, which is sampled and mapped to the Euclidean space.
Finally, we show how to compute a surface Minkowski sum that is constrained to a plane. Unlike the full surface Minkowski sum, the solution to this problem is a univariate curve and therefore easier to process. The result can be applied, for example, in path planning of a freeform robot moving on a floor while avoiding three-dimensional freeform obstacles.
Keywords: Minkowksi sums, freeform geometry
Tanaman hias janda bolong membutuhkan perawatan khusus karena rentan terhadap suhu dan kelembapan udara. Janda bolong merupakan tanaman dari spesies Araceae atau talas-talasan yang dapat bertahan hidup secara optimum di suhu 23-30°C dan... more
Tanaman hias janda bolong membutuhkan perawatan khusus karena rentan terhadap suhu dan kelembapan udara. Janda bolong merupakan tanaman dari spesies Araceae atau talas-talasan yang dapat bertahan hidup secara optimum di suhu 23-30°C dan kelembapan udara kurang dari 40%. Adapun penelitian terdahulu yang dikerjakan oleh Anak Agung Gde Ekayana, dapat diketahui bahwa sistem monitoring masih terbatas pada platform ThingSpeak. Hal tersebut terdapat kelemahan yaitu jika ingin melihat data monitoring, maka pengguna harus login dulu kedalam platform ThingSpeak, sehingga dirasa tidak efisien. Oleh karena itu, pada penelitian ini penulis menekankan pada sisi integrasi bot telegram pada sistem monitoring sebagai inovasi unggulan. Hasil dari penelitian ini, yaitu prototipe berupa hardware (alat monitoring) dan Software (website, bot telegram, serta source code). Pengujian telah dilakukan sebanyak 2 kali secara bertahap, yaitu dengan menggunakan standar ISO25010 (functional suitabillity) dan pengujian sistem monitoring. Penelitian ini diharapkan dapat menunjang perkembangan ilmu pengetahuan terutama di bidang ilmu komputer.
This research presents some exceedingly challenging problems in a Robot Vacuum Cleaner (RVC) such as the inefficiency of power or energy supply, which deals with the el ectrical circuit and the problem of it missing some paths or gap... more
This research presents some exceedingly challenging problems in a Robot Vacuum Cleaner (RVC) such as the inefficiency of power or energy supply, which deals with the el ectrical circuit and the problem of it missing some paths or gap while cleaning the room, which is the kinematics of the RVC, they were mathematically modeled. The research work approaches each of the selected problems to be modeled mathematically by first formulating the problem as a mathematical expression in terms of variables, functions and equations. An ODE (Ordinary Differential Equation) was obtained for the electric circuit model and then simulated to obtain a sinusoidal result, while a matrix was a cquired for the kinematics and a graph plotted to see its behavior at seventytwo different angles with intervals of 0:5:360 degrees. The system was simulated using MATLAB to study and understand the behavior of the RVC. At the end of the research firstly, it was concluded from the sinusoidal graph obtained for the model of the electrical circuit, that when the Ordinary Differential Equation (ODL) provided is been applied in test running any RVC electrical circuit, there would not be any problem of power fa ilure or battery discharge. Secondly, it was concluded from observation that the graph gotten for the kinematics at the bases of every 5point interval in 360 degrees beginning with 0, that when the matrix provided is applied in building a robot vacuum cle aner, there would be no missing of some part of the room while executing its duty of cleaning
Although all roads have signboards indicating maximum speed limit for sake of driver’s safety, but still people does not obey speed limit rules and cause accidents. The project aims in designing an efficient system which can automatically... more
Although all roads have signboards indicating maximum speed limit for sake of driver’s safety, but still people does not obey speed limit rules and cause accidents. The project aims in designing an efficient system which can automatically monitor individual vehicle speed and also count vehicles on road. The system is designed using PIC microcontroller, IR sensors, LCD and LED indicators. The Microcontroller is programmed using Embedded C language.
In explorations it is often required for mobile robotic explorers to update a base station about the progress of the mission. Robots may form a mobile ad hoc network to establish connectivity. To connect mobile robots and base stations... more
In explorations it is often required for mobile
robotic explorers to update a base station about the progress of
the mission. Robots may form a mobile ad hoc network to establish
connectivity. To connect mobile robots and base stations
two strategies have been suggested: multi-hop and rendezvous.
For multi-hop connections mobile robots form a daisy chain
propagating data between both ends. In rendezvous, robots
carry data by driving between communicating entities. While
both strategies have been implemented and tested, no formal
comparison of both strategies has been done. We determine
various parameters having an impact on the exploration time of
both strategies. Using a mathematical model we quantitatively
evaluate their impact. Better understanding of the parameters
allows to optimize both strategies for a given application.
A general assertion whether rendezvous or multi-hop yields
shorter exploration times cannot be made.
Nowadays with evolving technologies, it is possible to connect real world with virtual world by using some intelligent sensors or physical object. Internet of Things (IoT) is one of such technology. The rise of interest in IoT is leading... more
Nowadays with evolving technologies, it is possible to connect real world with virtual world by using some intelligent sensors or physical object. Internet of Things (IoT) is one of such technology. The rise of interest in IoT is leading to a new era in which all objects, devices and sensors that are connected over the internet. This will change the pattern of how we collect and analyse data to make our systems more efficient. This will in turn improve quality of mankind. Using IoT the user will be able to communicate and control physical devices. This survey paper describes and compares some major protocols like MQTT, AMQP, CoAP, XMPP, HTTP/HTTPS, RESTFUL SERVICES and WEBSOCKETS. Comparison of IoT protocols is done based on parameters like what type of transport, security, Architectural style it provides and how it works in Low power and lossy network. We have mentioned whether the protocol support Publisher/Subscriber mode or Request/response mode for communication. We have also discussed some major cloud platforms that are used in IoT like AWS, AZURE, firebase cloud computing. We have made comparative study on cloud platform based on its computing architecture, services, load balancing techniques and security.
Majority of the issues faced by the farmers can be solved by technology not only from the R&D of hybrid plants and seeds but also by providing information about new markets, producing value added products when market is down, platforms to... more
Majority of the issues faced by the farmers can be solved by technology not only from the R&D of hybrid plants and seeds but also by providing information about new markets, producing value added products when market is down, platforms to raise queries regarding agricultural problems, the fertilizers usage for these crops, the soil conditions in which these crops yield more, and the suitable climatic and environmental conditions for these crops, etc. This project FARMING ASSIST WEB APPLICATION is a prototype model to solve the issues faced by farmers in the current environment. This project will provide information about weather, current market, information about various
crops, fertilizer required at various intervals of time, best crop that is to be planted at your field, etc. This project can act as a survey to the farming issues without a field work.
Sudoku is a pretty popular number game. The goal of this game is to fill a 9x9 matrix with unique numbers, and there should not be repeated numbers in each row, column, or block. This paper proposed a solution to solve Sudoku using the... more
Sudoku is a pretty popular number game. The goal of this game is to fill a 9x9 matrix with unique numbers, and there should not be repeated numbers in each row, column, or block. This paper proposed a solution to solve Sudoku using the Backtracking Algorithm. This algorithm is quite efficient because it does not have to check all the possibilities that exist, but which leads to only the solution that will be processed, namely by pruning every element that does not lead to the solution. Thus the time required is quite efficient and suitable for use in reasonably complex numbers games like sudoku. By implementing the backtracking algorithm in the sudoku game, the complexity of the algorithm can be as large 𝜽 (n3).
Today, human activities constitute the primary environmental impact on the planet. In this context, commitments to sustainability, or minimization of damage, prove insufficient. To develop regenerative, futuring capabilities,... more
Today, human activities constitute the primary environmental impact on the planet. In this context, commitments to sustainability, or minimization of damage, prove insufficient. To develop regenerative, futuring capabilities, architectural design needs to extend beyond the form and function of things and engage with the management of complex systems. Such systems involve multiple types of dynamic phenomena—biotic and abiotic, technical and cultural—and can be understood as living. Engagement with such living systems implies manipulation of pervasive and unceasing change, irrespective of whether it is valued by design stakeholders or actively managed towards homeostatic or homeorhetic conditions. On one hand, such manipulation of continuity requires holistic and persistent design involvements that are beyond natural capabilities of human designers. On the other hand, practical, political, or creative implications of reliance on automated systems capable of tackling such tasks are as yet underexplored. In response to this challenge, this paper considers an experimental approach that utilized methods of critical making and speculative designing to explore potentials of autonomous architecture. Presented experiments combined knowledge of animal architecture with intelligent behaviors of robotic devices.
In recent years automatic vision based technology has become important to many areas including agricultural fields and food industry. Robotic harvesting offers an attractive solution to reducing labour costs while enabling more regular... more
In recent years automatic vision based technology has become important to many areas including agricultural fields and food industry. Robotic harvesting offers an attractive solution to reducing labour costs while enabling more regular and selective harvesting techniques. The automation technology used in harvesting the yellow bell pepper makes use of open source computer vision platform to detect the crop amidst the foliage using various image processing techniques and send appropriate signals to move the robot to harvest the crop. The web camera feeds real time images to the microcontroller where the digital image is filtered to remove noise and subjected to various feature extraction such as colour detection and size determination and the processed image is displayed over the internet .The detected bell pepper can be harvested by moving the robot with appropriate commands sent over a web application which serves as a communication platform between the user and the robot interfaced using the Bluetooth module.
The concept of systems thinking has been difficult for most people to comprehend. Both terms "system" and "thinking" often bring different understanding to people. The common associations with systems are computer systems and management... more
The concept of systems thinking has been difficult for most people to comprehend. Both terms "system" and "thinking" often bring different understanding to people. The common associations with systems are computer systems and management control systems. The primary objective is to reflect on the paradigms or philosophical enquiry and the application of systems and systems thinking, acknowledging the value of critical thinking in Information System. The primary objective of the paper is to define what system thinking is about and reflects on paradigms and the applications of systems and system thinking, acknowledging the value of critical thinking in Information Systems. The concept of system thinking in 1987 was credited to Barry Richmond, a well-known person in the area of systems thinking and systems dynamics.One of the leaders in the field, Senge (1990) defined systems thinking as a discipline for seeing wholes and a framework for seeing interrelationships rather than things, for seeing patterns of change rather than static snapshots. According to Senge, there are people who handle complex systems and work in an intuitive domain, which our educational systems fail to acknowledge.The definition of systems thinking provided by Senge did not take into consideration the purpose of system thinking making the understanding of the concept difficult. However, the fact that Senge emphasized on the systems thinking as a discipline and framework, pointing to its nature as a system, evokes a specific deeper meaning of the concept. The theory of system thinking has greatly influenced how we understand and change organizations (Carter, 2005). According to the author, systems thinking "is a way of helping a person to view systems from a broad perspective that includes seeing overall structures, patterns and cycles in systems, rather than seeing only specific events in the system". The application of the system theory is referred to as system analysis and of which system thinking forms a major component. When you view a system in a broad perspective, it helps you to identify the major causes of issues in the organization in order to know the best way to address the issues. The broad view or perspective can help consultants to identify solutions to tackle the various problems in the system provided the consultant focus on the whole system. When touching on the concept of system thinking, it is equally important to acknowledge the value of critical thinking in IS. One basic criticism levelled at IT education is the fact that by the time you are ready to apply the skills, they might be out of date. The question then is; what is the essence of learning a technological skill when in the next few years it becomes outdated? The question raised is one of the basic concepts around which critical thinking in IT is based. In order to move with the pace at which technology changes, it is important to carefully consider how we design and build our systems, learn about the technology of today and its relation to the business world. To have this information will put us in a better or advanced position to better respond to the changing world intelligently. In summary, when touching the concept of critical thinking, it is important to pinpoint certain cognitive skills. A typical example of these skills is one explained by Facione
This paper defines an-Autonomous Fire Fighting Robot‖ which recognizes and quenches the fire automatically. It detects the fire by using IR Flame sensor and Ultrasonic sensor is utilized for obstacles dodging. First as it moves near to... more
This paper defines an-Autonomous Fire Fighting Robot‖ which recognizes and quenches the fire automatically. It detects the fire by using IR Flame sensor and Ultrasonic sensor is utilized for obstacles dodging. First as it moves near to the flame, then it detects the fire automatically and pumps motor to spray extinguisher which is controlled through motor driver circuit. Arduino Mega is used as microcontroller to program all the autonomous AI code and performing all the major functionalities. It is also connected to the local server by using Wi-Fi module. Our robot can help in all the organizations like banks, industries, factories, bakeries etc.