Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Control (2)
- Robotics (2)
- Access (1)
- Adaptive compression (1)
- App (1)
-
- Applied Machine Learning (1)
- Autonomous driving (1)
- Autonomous vehicle models (1)
- Autonomous vehicles (1)
- Bluetooth (1)
- Boat (1)
- CDPR (1)
- CV (1)
- Car (1)
- Computational Design (1)
- Computer vision (1)
- Consensus (1)
- Cybersecurity (1)
- Dance (1)
- Data System (1)
- Database (1)
- Embedded Systems (1)
- Event-triggered optimal output feedback control design (1)
- Fault injection (1)
- Formal methods (1)
- Hardware detection (1)
- Human-Computer Interaction (1)
- Human-Robot Interaction (1)
- Human-robot interaction (1)
- Human-robot interaction (HRI) (1)
- Publication
-
- All Dissertations (3)
- Chemical Engineering and Materials Science Faculty Research Publications (2)
- All Theses (1)
- Computer Engineering (1)
- Discovery Undergraduate Interdisciplinary Research Internship (1)
-
- Electrical Engineering (1)
- Graduate Theses and Dissertations (1)
- Graduate Theses, Dissertations, and Problem Reports (1)
- Publications (1)
- Symposium of Student Scholars (1)
- Theses and Dissertations (1)
- Theses and Dissertations--Mechanical Engineering (1)
- Williams Honors College, Honors Research Projects (1)
- Publication Type
Articles 1 - 16 of 16
Full-Text Articles in Controls and Control Theory
Digital Platform To Aid Youth Substance Abuse Prevention, Bingxuan Li
Digital Platform To Aid Youth Substance Abuse Prevention, Bingxuan Li
Discovery Undergraduate Interdisciplinary Research Internship
Through research and interviews, I discovered that a significant portion of students in Africa become drug addicts and drop out of school. The solution is to prevent youth substance abuse before it happens, so that more students in Africa may continue their education. With the strong motivation of expanding African student involvement in higher education, I participated DURI program to increase higher education rates in the Democratic Republic of the Congo, Africa. The local government is establishing rehabilitation centers to monitor at-risk students and prevent youth substance abuse, but due to extremely limited resources, it is critical to evaluate the …
Development Of Directed Randomization For Discussing A Minimal Security Architecture, Henrique Oyama, Dominic Messina, Keshav Kasturi Rangan, Akkarakaran Francis Leonard, Kip Nieman, Helen Durand, Katie Tyrrell, Katrina Hinzman, Michael Williamson
Development Of Directed Randomization For Discussing A Minimal Security Architecture, Henrique Oyama, Dominic Messina, Keshav Kasturi Rangan, Akkarakaran Francis Leonard, Kip Nieman, Helen Durand, Katie Tyrrell, Katrina Hinzman, Michael Williamson
Chemical Engineering and Materials Science Faculty Research Publications
Strategies for mitigating the impacts of cyberattacks on control systems using a control-oriented perspective have become of greater interest in recent years. Our group has contributed to this trend by developing several methods for detecting cyberattacks on process sensors, actuators, or both sensors and actuators simultaneously using an advanced optimization-based control strategy known as Lyapunov-based economic model predictive control (LEMPC). However, each technique comes with benefits and limitations, both with respect to one another and with respect to traditional information technology and computer science-type approaches to cybersecurity. An important question to ask, therefore, is what the goal should be of …
Modeling, Control And Estimation Of Reconfigurable Cable Driven Parallel Robots, Adhiti Raman Thothathri
Modeling, Control And Estimation Of Reconfigurable Cable Driven Parallel Robots, Adhiti Raman Thothathri
All Dissertations
The motivation for this thesis was to develop a cable-driven parallel robot (CDPR) as part of a two-part robotic device for concrete 3D printing. This research addresses specific research questions in this domain, chiefly, to present advantages offered by the addition of kinematic redundancies to CDPRs. Due to the natural actuation redundancy present in a fully constrained CDPR, the addition of internal mobility offers complex challenges in modeling and control that are not often encountered in literature.
This work presents a systematic analysis of modeling such kinematic redundancies through the application of reciprocal screw theory (RST) and Lie algebra while …
Multi-Robot Symbolic Task And Motion Planning Leveraging Human Trust Models: Theory And Applications, Huanfei Zheng
Multi-Robot Symbolic Task And Motion Planning Leveraging Human Trust Models: Theory And Applications, Huanfei Zheng
All Dissertations
Multi-robot systems (MRS) can accomplish more complex tasks with two or more robots and have produced a broad set of applications. The presence of a human operator in an MRS can guarantee the safety of the task performing, but the human operators can be subject to heavier stress and cognitive workload in collaboration with the MRS than the single robot. It is significant for the MRS to have the provable correct task and motion planning solution for a complex task. That can reduce the human workload during supervising the task and improve the reliability of human-MRS collaboration. This dissertation relies …
Event-Triggered Optimal Adaptive Control Of Partially Unknown Linear Continuous-Time Systems With State Delay, Rohollah Moghadam, Vignesh Narayanan, Sarangapani Jagannathan
Event-Triggered Optimal Adaptive Control Of Partially Unknown Linear Continuous-Time Systems With State Delay, Rohollah Moghadam, Vignesh Narayanan, Sarangapani Jagannathan
Publications
This paper proposes an event-triggered optimal adaptive output feedback control design approach by utilizing integral reinforcement learning (IRL) for linear time-invariant systems with state delay and uncertain internal dynamics. In the proposed approach, the general optimal control problem is formulated into the game-theoretic framework by treating the event-triggering threshold and the optimal control policy as players. A cost function is defined and a value functional, which includes the delayed system output, is considered. First, by using the value functional and applying stationarity conditions using the Hamiltonian function, the output game delay algebraic Riccati equation (OGDARE) and optimal control policy are …
Developing A Miniature Smart Boat For Marine Research, Michael Isaac Eirinberg
Developing A Miniature Smart Boat For Marine Research, Michael Isaac Eirinberg
Computer Engineering
This project examines the development of a smart boat which could serve as a possible marine research apparatus. The smart boat consists of a miniature vessel containing a low-cost microcontroller to live stream a camera feed, GPS telemetry, and compass data through its own WiFi access point. The smart boat also has the potential for autonomous navigation. My project captivated the interest of several members of California Polytechnic State University, San Luis Obispo’s (Cal Poly SLO) Marine Science Department faculty, who proposed a variety of fascinating and valuable smart boat applications.
Quantum Computing And Resilient Design Perspectives For Cybersecurity Of Feedback Systems, Keshav Kasturi Rangan, Jihan Abou Halloun, Henrique Oyama, Samantha Cherney, Ilham Azali Assoumani, Nazir Jairazbhoy, Helen Durand, Simon Ka Ng
Quantum Computing And Resilient Design Perspectives For Cybersecurity Of Feedback Systems, Keshav Kasturi Rangan, Jihan Abou Halloun, Henrique Oyama, Samantha Cherney, Ilham Azali Assoumani, Nazir Jairazbhoy, Helen Durand, Simon Ka Ng
Chemical Engineering and Materials Science Faculty Research Publications
Cybersecurity of control systems is an important issue in next-generation manufac- turing that can impact both operational objectives (safety and performance) as well as process designs (via hazard analysis). Cyberattacks differ from faults in that they can be coordinated efforts to exploit system vulnerabilities to create otherwise unlikely hazard scenarios. Because coordination and targeted process manipulation can be characteristics of attacks, some of the tactics previously analyzed in our group from a control system cybersecurity perspective have incorporated randomness to attempt to thwart attacks. The underlying assumption for the generation of this randomness has been that it can be achieved …
Smartphone Control Of Rc Cars, Weston R. Fitzgerald
Smartphone Control Of Rc Cars, Weston R. Fitzgerald
Electrical Engineering
The smartphone-controlled RC (remote-controlled) car is an inexpensive remote-controlled car designed to be fast and portable. Instead of manufacturing, packaging, and shipping a separate controller, the remote control is implemented in a phone application, which saves time and money in both the design process and the manufacturing process. Utilizing the user’s smartphone is more cost-effective since mobile devices are a common recurrence, and packaging fewer devices results in overall better portability of the product.
This smartphone-controlled car is speedy and intuitive to learn for typical smartphone users. The user can change the car’s speed and direction wirelessly using their phone; …
Improving Intelligent Transportation Safety And Reliability Through Lowering Costs, Integrating Machine Learning, And Studying Model Sensitivity, Cavender Holt
All Theses
As intelligent transportation becomes increasingly prevalent in the domain of transportation, it is essential to understand the safety, reliability, and performance of these systems. We investigate two primary areas in the problem domain. The first area concerns increasing the feasibility and reducing the cost of deploying pedestrian detection systems to intersections in order to increase safety. By allowing pedestrian detection to be placed in intersections, the data can be better utilized to create systems to prevent accidents from occurring. By employing a dynamic compression scheme for pedestrian detection, we show the reduction of network bandwidth improved by 2.12× over the …
Live Access Control Policy Error Detection Through Hardware, Bryce Mendenhall
Live Access Control Policy Error Detection Through Hardware, Bryce Mendenhall
Graduate Theses and Dissertations
Access Control (AC) is a widely used security measure designed to protect resources and infrastructure in an information system. The integrity of the AC policy is crucial to the protection of the system. Errors within an AC policy may cause many vulnerabilities such as information leaks, information loss, and malicious activities. Thus, such errors must be detected and promptly fixed. However, current AC error detection models do not allow for real-time error detection, nor do they provide the source of errors. This thesis presents a live error detection model called LogicDetect which utilizes emulated Boolean digital logic circuits to provide …
Control, Decision-Making, And Learning Approaches For Connected And Autonomous Driving Systems With Humans-In-The-Loop, Fangjian Li
All Dissertations
By virtue of vehicular connectivity and automation, the vehicle becomes increasingly intelligent and self-driving capable. However, no matter what automation level the vehicle can achieve, humans will still be in the loop despite their roles. First, considering the manual driving car as a disturbance to the connected and autonomous vehicles (CAVs), a novel string stability is proposed for mixed traffic platoons consisting of both autonomous and manual driving cars to guarantee acceptable motion fluctuation and platoon safety. Furthermore, humans are naturally considered as the rider in the passenger vehicle. A human-centered cooperative adaptive cruise control (CACC) is designed to improve …
Development Of A Compliant Gripper Driven By 3 Dof Soft Robot, Derek M. Price Ii, Ricardo Ramirez, Pt Angel Tran
Development Of A Compliant Gripper Driven By 3 Dof Soft Robot, Derek M. Price Ii, Ricardo Ramirez, Pt Angel Tran
Symposium of Student Scholars
Industrial robots are moving toward automation, which makes it increasingly necessary to replace the functions traditionally performed by humans with robotics. Pick and place operation is a prime example of such automation. Robots that pick up and place objects mimic the human action of picking an object up and placing it in a targeted location. It has led to the development of robotic end-effectors that have a human-like feel. Grippers can be articulated in various ways depending on their application area and well-defined desired tasks. As compliant and soft links deflect more under the same load than their rigid body …
Formation Control With Bounded Controls And Collision Avoidance: Theory And Application To Quadrotor Unmanned Air Vehicles, Zachary S. Lippay
Formation Control With Bounded Controls And Collision Avoidance: Theory And Application To Quadrotor Unmanned Air Vehicles, Zachary S. Lippay
Theses and Dissertations--Mechanical Engineering
This dissertation presents new results on multi-agent formation control and applies the new control algorithms to quadrotor unmanned air vehicles. First, this dissertation presents a formation control algorithm for double-integrator agents, where the formation is time varying and the agents’ controls satisfy a priori bounds (e.g., the controls accommodate actuator saturation). The main analytic results provide sufficient conditions such that all agents converge to the desired time-varying relative positions with one another and the leader, and have a priori bounded controls (if applicable). We also present results from rotorcraft experiments that demonstrate the algorithm with time-varying formations and bounded controls. …
Magic: The Gathering Card Virtualizer, Vincent Garbonick, Jacen C. Conlan, Jaret A. Varn
Magic: The Gathering Card Virtualizer, Vincent Garbonick, Jacen C. Conlan, Jaret A. Varn
Williams Honors College, Honors Research Projects
Any well-versed Magic: The Gathering (MTG) player or collector knows how difficult it can be to keep track of all cards in their collection. Some spend hours searching for that one specific card, and others are constantly scouring the internet for how much their collection costs. However, this issue does not only affect casual fans. Resale companies spend hours a day determining the costs of cards, and tournament judges painstakingly check players’ decks to ensure they are not cheating. To assist with these struggles, the design team proposed to create the MTG Card Virtualizer. This device scans MTG playing cards …
Learning Robot Motion From Creative Human Demonstration, Charles C. Dietzel
Learning Robot Motion From Creative Human Demonstration, Charles C. Dietzel
Theses and Dissertations
This thesis presents a learning from demonstration framework that enables a robot to learn and perform creative motions from human demonstrations in real-time. In order to satisfy all of the functional requirements for the framework, the developed technique is comprised of two modular components, which integrate together to provide the desired functionality. The first component, called Dancing from Demonstration (DfD), is a kinesthetic learning from demonstration technique. This technique is capable of playing back newly learned motions in real-time, as well as combining multiple learned motions together in a configurable way, either to reduce trajectory error or to generate entirely …
Performance Of Sensor Fusion For Vehicular Applications, Nikola Janevski
Performance Of Sensor Fusion For Vehicular Applications, Nikola Janevski
Graduate Theses, Dissertations, and Problem Reports
Sensor fusion is a key system in Advanced Driver Assistance Systems, ADAS. The perfor-
mance of the sensor fusion depends on many factors such as the sensors used, the kinematic
model used in the Extended Kalman Filter, EKF, the motion of the vehicles, the type of
road, the density of vehicles, and the gating methods. The interactions between parameters
and the extent to which individual parameters contribute to the overall accuracy of a sensor
fusion system can be difficult to assess.
In this study, a full-factorial experimental evaluation of a sensor fusion system based
on a real vehicle was performed. …