• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 66
  • 14
  • 9
  • 5
  • 4
  • 4
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 127
  • 29
  • 24
  • 22
  • 15
  • 15
  • 12
  • 11
  • 11
  • 11
  • 11
  • 11
  • 10
  • 10
  • 10
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Génération automatique et sécuritaire de trajectoires pour un robot collaboratif / Automatic and safe generation of trajectories for a collaborative robot

Dufour, Kévin January 2017 (has links)
Parce que la robotique collaborative vise à libérer les robots des barrières physiques les séparant des opérateurs humains, de nouveaux défis apparaissent autour de la sécurité de ces derniers. S'il est possible de diminuer la dangerosité des robots en amont de leur conception, les logiciels qui les contrôlent doivent impérativement intégrer des mesures de sécurité, afin d'être compatibles avec des environnements humains dynamiques. Les algorithmes classiques de planification de trajectoire nécessitant de lourds calculs, il est avantageux de modifier la trajectoire en temps réel pour l'adapter à l'environnement dangereux. Dans ce projet de recherche, un algorithme de cinématique inverse, sous forme de problème d'optimisation, est utilisé afin de générer la commande du robot à partir d'une trajectoire définie hors-ligne. L'ajout de contraintes de sécurité à ce problème est particulièrement étudié : dans un premier temps, l'indice de manipulabilité, qui traduit la distance du robot à une configuration singulière, est considéré. Ainsi, il doit être maximisé tout au long de la trajectoire afin d'assurer la meilleure mobilité disponible. Dans un deuxième temps, le facteur humain a été intégré par la prise en compte du confort de celui-ci : afin de réduire le stress éprouvé par l'opérateur face à un robot aux mouvements imprévisibles, on s'assure de minimiser la distance entre l'effecteur et le regard de l'humain pour garantir une plus grande visibilité de la tâche. Dans les deux cas, nous avons présenté une formulation originale de ces critères afin de les intégrer dans le problème d'optimisation. Par ailleurs la contrainte d'évitement d'obstacles a aussi été utilisée, de même que la relaxation de la trajectoire, qui permet au robot de dévier un peu de cette dernière pendant une portion de la durée de la tâche. Enfin des tests en simulation et avec le robot réel Baxter de Rethink Robotics ont permis de valider notre approche et de vérifier les performances en conditions réelles, en utilisant une caméra RGB-D et un logiciel de détection d'humain en temps réel. / Abstract : Because collaborative robots are aimed at working in the vicinity of human workers without physical security fences, they bring new challenges about security. Even if robots can be conceived to be less harmful, their software has to integrate security features in order to be suitable for dynamic human environments. Since classical path planning algorithms require heavy calculations, it is interesting to modify the trajectory in real time to adapt it to the dangerous environment. In this research project, an inverse kinematics solver, in the form of an optimization problem, is used to generate the command of the robot to follow a trajectory defined offline. The addition of security constraints is studied: first, the manipulability index, which reflects the distance of the robot to singular configurations, is considered. Thus, it should be maximized all along the trajectory to ensure the best mobility available. Then the human is integrated by taking into account its comfort: in order to reduce the stress of working near an unpredictable moving robot, the distance between the end-effector and the human gaze is minimized to guarantee a greater visibility of the task. In both cases, we have presented a new formulation of those criteria to integrate them into the optimization problem. Moreover, the collision avoidance constraint is used, as well as the trajectory relaxation, which allows the robot to deviate from its trajectory for a certain amount of time during the task. Finally tests in simulation and with the real Baxter robot from Rethink Robotics validated our approach and the performance has been evaluated in real conditions, using a RGB-D camera and a real time human tracker software.
52

Reducing redundant functionalities of an application portfolio : Case study Swedish municipality

Kara, Vikesh, Paidi, Vijay Pratap January 2011 (has links)
Many government organizations consist of complex application portfolios with significant redundant functionalities and in order to run this portfolio, 80% of the IT budget is consumed by maintenance cost. Eliminating redundant functionalities improves efficiency, operational performance and decreases maintenance costs. A midsized Swedish municipality has a complex application portfolio with redundant functionalities, and this study aims to suggest actions for reducing redundant functionalities of citizen related applications. In order to identify redundant functionalities in a complex organization such as the government, all surrounding complexities need to be identified. Therefore, by performing a literature study, Application Portfolio Rationalization has been selected as an approach for reducing redundant functionalities. An online survey was conducted for gathering data about applications and the total response rate was 46.5%. The collected data was analyzed to identify complexities and applications with similar purpose and functions. Finally, actions were suggested for reducing redundant functionalities of applications by consolidating them with the “best-in-class” application, and implementing a central database for reducing redundant storage of data by the applications.
53

Motion Design and Control of a Snake Robot in Complex Environments Based on a Continuous Curve Model / 複雑環境におけるヘビ型ロボットの連続曲線モデルを用いた動作設計と制御

Takemori, Tatsuya 24 September 2021 (has links)
京都大学 / 新制・課程博士 / 博士(工学) / 甲第23505号 / 工博第4917号 / 新制||工||1768(附属図書館) / 京都大学大学院工学研究科機械理工学専攻 / (主査)教授 松野 文俊, 教授 泉田 啓, 教授 小森 雅晴 / 学位規則第4条第1項該当 / Doctor of Philosophy (Engineering) / Kyoto University / DGAM
54

Detekce duplicitního provozu / Duplicate Traffic Detection

Krch, Petr January 2013 (has links)
This thesis describes methods for duplicate traffic detection in computer networks. At first, it analyzes the problem of redundant traffic including the description of its origin and causes. The thesis describes on what data and what methods we are able to detect an operation as duplicate. Finally, this thesis explains design of redudant traffic detection algorithm including testing plan and results evaluation.
55

Eliminating Redundant and Less-informative RSS News Articles Based on Word Similarity and A Fuzzy Equivalence Relation

Garcia, Ian 10 January 2007 (has links) (PDF)
The Internet has marked this era as the information age. There is no precedent in the amazing amount of information, especially network news, that can be accessed by Internet users these days. As a result, the problem of seeking information in online news articles is not the lack of them but being overwhelmed by them. This brings huge challenges regarding processing of online news feeds, i.e., how to determine which news article is important, how to determine the quality of each news article, and how to filter irrelevant and redundant information. In this thesis, we propose a method for filtering redundant and less-informative RSS news articles that solves the problem of excessive number of news feeds observed in RSS news aggregators. Our filtering approach measures similarity among RSS news entries by using the Fuzzy-Set Information Retrieval model and a fuzzy equivalent relation for computing word/sentence similarity to detect redundant and less-informative news articles.
56

Fault Detection for Unmanned Aerial Vehicles with Non-Redundant Sensors

Cannon, Brandon Jeffrey 01 November 2014 (has links) (PDF)
To operate, autonomous systems of necessity employ a variety of sensors to perceive their environment. Many small unmanned aerial vehicles (UAV) are unable to carry redundant sensors due to size, weight, and power (SWaP) constraints. Faults in these sensors can cause undesired behavior, including system instability. Thus, detection of faults in these non-redundant sensors is of paramount importance.The problem of detecting sensor faults in non-redundant sensors on board autonomous aircraft is non-trivial. Factors that make development of a solution difficult include both an inability to perfectly characterize systems and sensors as well as the SWaP constraints inherent with small UAV. An additional challenge is the ability of a fault-detection method to strike a balance between false-alarm rate and detection rate.This thesis explores two model-based methods of fault-detection for non-redundant sensors, a Kalman filter based method and a particle filter based method. The Kalman filter based method employs tests of mean and covariance on the normalized innovation sequence to detect faults, while the particle filter based method uses a function of the average particle weights.The Kalman filter based approach was implemented in real time on board an autonomous rotorcraft using an extended Kalman Filter (EKF). Faults tested included varied levels of bias, drift, and increased noise. Metrics included false-alarm rate, detection rate, and delay to detection. The particle filter based approach was implemented on a simulated system. This was then compared with an implementation of the EKF based approach for the same system. The same fault types and metrics were also used for these tests.The EKF based method of fault-detection performed well onboard the autonomous rotorcraft and should be generalizable to other systems for which an EKF or Kalman filter can be implemented. The theory indicates that the particle filter based algorithm should have performed better, though the simulations showed poor detection characteristics in comparison to the Kalman filter based method. Future work should be performed to explore improvements to the particle filter based method.
57

Motion Estimation and Compensation in the Redundant Wavelet Domain

Cui, Suxia 02 August 2003 (has links)
Despite being the prefered approach for still-image compression for nearly a decade, wavelet-based coding for video has been slow to emerge, due primarily to the fact that the shift variance of the discrete wavelet transform hinders motion estimation and compensation crucial to modern video coders. Recently it has been recognized that a redundant, or overcomplete, wavelet transform is shift invariant and thus permits motion prediction in the wavelet domain. In this dissertation, other uses for the redundancy of overcomplete wavelet transforms in video coding are explored. First, it is demonstrated that the redundant-wavelet domain facilitates the placement of an irregular triangular mesh to video images, thereby exploiting transform redundancy to implement geometries for motion estimation and compensation more general than the traditional block structure widely employed. As the second contribution of this dissertation, a new form of multihypothesis prediction, redundant wavelet multihypothesis, is presented. This new approach to motion estimation and compensation produces motion predictions that are diverse in transform phase to increase prediction accuracy. Finally, it is demonstrated that the proposed redundant-wavelet strategies complement existing advanced video-coding techniques and produce significant performance improvements in a battery of experimental results.
58

Cartesian control of truss-based manipulators using the virtual serial manipulator approach

Mayhew, IV, James Bernard January 1996 (has links)
No description available.
59

A Comparison of Two Methods Used to Deal with Saturation of Multiple, Redundant Aircraft Control Effectors

Nelson, Mark D. 18 September 2001 (has links)
A comparison of two methods to deal with allocating controls for unattainable moments in an aircraft was performed using a testbed airframe that resembled an F/A-18 with a large control effector suite. The method of preserving the desired moment direction to deal with unattainable moments is currently used in a specific control allocator. A new method of prioritizing the pitch axis is compared to the moment-direction preservation. Realtime piloted simulations are completed to evaluate the characteristics and performance of these methods. A direct comparison between the method of preserving the moment direction by scaling the control solution vector and prioritizing the pitching moment axis is performed for a specific case. Representative maneuvers are flown with a highly unstable airframe to evaluate the ability to achieve the specific task. Flight performance and pilot interpretation are used to evaluate the two methods. Pilot comments and performance results favored the method of pitch-axis prioritization. This method provided favorable flight characteristics compared to the alternative method of preserving the moment direction for the specific tasks detailed in this paper. NOTE: An updated copy of this ETD was added on 09/28/2010. / Master of Science
60

NOW IS THE RIGHT TIME FOR SOLID STATE

Berard, Al, Nixon, Chris, Lockard, Michael 10 1900 (has links)
International Telemetering Conference Proceedings / October 23-26, 2000 / Town & Country Hotel and Conference Center, San Diego, California / For the last 30 years Magnetic Tape Systems have been the primary means of recording data from airborne instrumentation systems. Increasing data rates and harsh environmental requirements have often exceeded the ability of tape-based systems to keep pace with technology. Throughout this time data recordings have been made mostly with analog longitudinal systems and most recently with digital recording systems that record on commercial DLT, and super VHS tape media. The recordings are played back with the same type of tape device allowing for the data to be processed and/or archived. Since not all data reduction facilities can process the same type of tape media, often tapes are dubbed from one type of tape media format to another, corrupting the translated data. This paper examines operational and data reduction benefits, and life cycle cost of Solid State Recorders as a replacement for existing airborne tape recorders.

Page generated in 0.0529 seconds