Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Assistive Device (1)
- Client (1)
- Collision Detection (1)
- Control systems (1)
- Demand response (1)
-
- Discrete Event System (1)
- Energy efficiency (1)
- External Force/Torque Observers (1)
- Human Motor Movement (1)
- Node (1)
- Open automated demand response (1)
- Path planning (1)
- Reaching Task (1)
- Relative Weight Analysis (1)
- Robot Modeling (1)
- Robotics (1)
- Safety in Human-Robot Interaction (1)
- Server (1)
- Trajectory Planning (1)
- Vision system (1)
- Visually Impaired (1)
Articles 1 - 5 of 5
Full-Text Articles in Computer Engineering
On Sensorless Collision Detection And Measurement Of External Forces In Presence Of Modeling Inaccuracies, Vahid Sotoudehnejad
On Sensorless Collision Detection And Measurement Of External Forces In Presence Of Modeling Inaccuracies, Vahid Sotoudehnejad
Electronic Thesis and Dissertation Repository
The field of human-robot interaction has garnered significant interest in the last decade. Every form of human-robot coexistence must guarantee the safety of the user. Safety in human-robot interaction is being vigorously studied, in areas such as collision avoidance, soft actuators, light-weight robots, computer vision techniques, soft tissue modeling, collision detection, etc. Despite the safety provisions, unwanted collisions can occur in case of system faults. In such cases, before post-collision strategies are triggered, it is imperative to effectively detect the collisions. Implementation of tactile sensors, vision systems, sonar and Lidar sensors, etc., allows for detection of collisions. However, due to …
A Hybrid Visual Control Scheme To Assist The Visually Impaired With Guided Reaching Tasks, Duane Jacques
A Hybrid Visual Control Scheme To Assist The Visually Impaired With Guided Reaching Tasks, Duane Jacques
Electronic Thesis and Dissertation Repository
In recent years, numerous researchers have been working towards adapting technology developed for robotic control to use in the creation of high-technology assistive devices for the visually impaired. These types of devices have been proven to help visually impaired people live with a greater degree of confidence and independence. However, most prior work has focused primarily on a single problem from mobile robotics, namely navigation in an unknown environment. In this work we address the issue of the design and performance of an assistive device application to aid the visually-impaired with a guided reaching task. The device follows an eye-in-hand, …
Design Of An Energy Efficient Virtual End Node Client Using Openadr2.0a And Smap, Kevin Navero
Design Of An Energy Efficient Virtual End Node Client Using Openadr2.0a And Smap, Kevin Navero
BioResource and Agricultural Engineering
Demand Response (DR) describes the set of actions taken to impose a reduction in electrical loads to stabilize the power grid and decrease costs. It is used when power grid emergencies or extremely high demand and congestion, threaten the electricity supply-demand balance. Automated Demand Response (ADR) describes a web-based control system that triggers DR events automatically by signaling other pre-programmed control systems. This project intends to use the OpenADR2.0 specifications provided by the OpenADR Alliance to construct an open source Virtual End Node (VEN) client to retrieve DR signals. The Simple Measurement and Actuation Profile (sMAP) software is also used …
Emulation Of Industrial Control Field Device Protocols, Robert M. Jaromin
Emulation Of Industrial Control Field Device Protocols, Robert M. Jaromin
Theses and Dissertations
It has been shown that thousands of industrial control devices are exposed to the Internet, however, the extent and nature of attacks on such devices remains unknown. The first step to understanding security problems that face modern supervisory control and data acquisition (SCADA) and industrial controls networks is to understand the various attacks launched on Internet-connected field devices. This thesis describes the design and implementation of an industrial control emulator on a Gumstix single-board computer as a solution. This emulator acts as a decoy field device, or honeypot, intended to be probed and attacked via an Internet connection. Evaluation techniques …
Caddy: A 2005 Roborodentia Entry With Vision And Path Planning Abilities, Taylor Braun-Jones
Caddy: A 2005 Roborodentia Entry With Vision And Path Planning Abilities, Taylor Braun-Jones
Computer Engineering
Roborodentia is an autonomous robotics competition held each year during Cal Poly’s Open House. For the 2005 competition, robot entries needed to navigate a maze searching for three randomly placed golf balls, collect them, and then deposit the balls in the “nest” at the end of the maze. A newly added aspect for the 2005 competition included two bonus balls that were placed on a platform behind the wall in two predetermined corners of the maze.
Caddy is a robot that was entered into the 2005 Roborodentia competition. Caddy included a vision system that allowed searching for balls down untraveled …