Search results for: autonomous flight
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 946

Search results for: autonomous flight

316 Current Status and Future Trends of Mechanized Fruit Thinning Devices and Sensor Technology

Authors: Marco Lopes, Pedro D. Gaspar, Maria P. Simões

Abstract:

This paper reviews the different concepts that have been investigated concerning the mechanization of fruit thinning as well as multiple working principles and solutions that have been developed for feature extraction of horticultural products, both in the field and industrial environments. The research should be committed towards selective methods, which inevitably need to incorporate some kinds of sensor technology. Computer vision often comes out as an obvious solution for unstructured detection problems, although leaves despite the chosen point of view frequently occlude fruits. Further research on non-traditional sensors that are capable of object differentiation is needed. Ultrasonic and Near Infrared (NIR) technologies have been investigated for applications related to horticultural produce and show a potential to satisfy this need while simultaneously providing spatial information as time of flight sensors. Light Detection and Ranging (LIDAR) technology also shows a huge potential but it implies much greater costs and the related equipment is usually much larger, making it less suitable for portable devices, which may serve a purpose on smaller unstructured orchards. Portable devices may serve a purpose on these types of orchards. In what concerns sensor methods, on-tree fruit detection, major challenge is to overcome the problem of fruits’ occlusion by leaves and branches. Hence, nontraditional sensors capable of providing some type of differentiation should be investigated.

Keywords: fruit thinning, horticultural field, portable devices, sensor technologies

Procedia PDF Downloads 122
315 Prediction of the Aerodynamic Stall of a Helicopter’s Main Rotor Using a Computational Fluid Dynamics Analysis

Authors: Assel Thami Lahlou, Soufiane Stouti, Ismail Lagrat, Hamid Mounir, Oussama Bouazaoui

Abstract:

The purpose of this research work is to predict the helicopter from stalling by finding the minimum and maximum values that the pitch angle can take in order to fly in a hover state condition. The stall of a helicopter in hover occurs when the pitch angle is too small to generate the thrust required to support its weight or when the critical angle of attack that gives maximum lift is reached or exceeded. In order to find the minimum pitch angle, a 3D CFD simulation was done in this work using ANSYS FLUENT as the CFD solver. We started with a small value of the pitch angle θ, and we kept increasing its value until we found the thrust coefficient required to fly in a hover state and support the weight of the helicopter. For the CFD analysis, the Multiple Reference Frame (MRF) method with k-ε turbulent model was used to study the 3D flow around the rotor for θmin. On the other hand, a 2D simulation of the airfoil NACA 0012 was executed with a velocity inlet Vin=ΩR/2 to visualize the flow at the location span R/2 of the disk rotor using the Spallart-Allmaras turbulent model. Finding the critical angle of attack at this position will give us the ability to predict the stall in hover flight. The results obtained will be exposed later in the article. This study was so useful in analyzing the limitations of the helicopter’s main rotor and thus, in predicting accidents that can lead to a lot of damage.

Keywords: aerodynamic, CFD, helicopter, stall, blades, main rotor, minimum pitch angle, maximum pitch angle

Procedia PDF Downloads 20
314 Security Analysis of Mod. S Transponder Technology and Attack Examples

Authors: M. Rutkowski, J. Cwiklak, M. Grzegorzewski, M. Adamski

Abstract:

All class A Airplanes have to be equipped with Mod. S transponder for ATC surveillance purposes. This technology was designed to provide a robust and dependable solution to localize, identify and exchange data with the airplane. The purpose of this paper is to analyze potential hazards that are a result of lack of any security or encryption on a design level. Secondary Surveillance Radars rely on an active response from an airplane. SSR radar installation is broadcasting a directional interrogation signal to the planes in range on 1030MHz frequency with DPSK modulation. If the interrogation is correctly received by the transponder located on the plane, a proper answer is sent on 1090MHz with PPM modulation containing plane’s SQUAWK, barometric altitude, GPS coordinates and 24bit unique address code. This technology does not use any kind of encryption. All of the specifications from the previous chapter can be found easily on the internet. Since there is no encryption or security measure to ensure the credibility of the sender and message, it is highly hazardous to use such technology to ensure the safety of the air traffic. The only thing that identifies the airplane is the 24-bit unique address. Most of the planes have been sniffed by aviation enthusiasts and cataloged in web databases. In the moment of writing this article, The PoFung Technologies has announced that they are planning to release all band SDR transceiver – this device would be more than enough to build your own Mod. S Transponder. With fake transponder, a potential terrorist can identify as a different airplane. By replacing the transponder in a poorly controlled airspace, hijackers can enter another airspace identifying themselves as another plane and land in the desired area.

Keywords: flight safety, hijack, mod S transponder, security analysis

Procedia PDF Downloads 281
313 Imaginations of the Silk Road in Sven Hedin’s Travel Writings: 1900-1936

Authors: Kexin Tan

Abstract:

The Silk Road is a concept idiosyncratic in nature. Western scholars co-created and conceptualized in its early days, transliterated into the countries along the Silk Road, redefined, reimagined, and reconfigured by the public in the second half of the twentieth century. Therefore, the image is not only a mirror of the discursive interactions between East and West but Self and Other. The travel narrative of Sven Hedin, through which the Silk Road was enriched in meanings and popularized, is the focus of this study. This article examines how the Silk Road was imagined in three key texts of Sven Hedin: The Silk Road, The Wandering Lake, and The Flight of “Big Horse”. Three recurring themes are extracted and analyzed: the Silk Road, the land of enigmas, the virgin land, and the reconnecting road. Ideas about ethnotypes and images drawn from theorists such as Joep Leerssen have been deployed in the analysis. This research tracks how the images were configured, concentrating on China’s ethnotypes, travel writing tropes, and the Silk Road discourse that preceded Sven Hedin. Hedin’s role in his expedition, his geopolitical viewpoints, and the commercial considerations of his books are also discussed in relation to the intellectual construct of the Silk Road. It is discovered that the images of the Silk Road and the discursive traditions behind it are mobile rather than static, inclusive than antithetical. The paradoxical characters of the Silk Road reveal the complexity of the socio-historical background of Hedin’s time, as well as the collision of discursive traditions and practical issues. While it is true that Hedin’s discursive construction of the Silk Road image embodies the bias of Self-West against Other-East, its characteristics such as fluidity and openness could probably offer a hint at its resurgence in the postcolonial era.

Keywords: the silk road, Sven Hedin, imagology, ethnotype, travelogue

Procedia PDF Downloads 174
312 From Transference Love to Self Alienation in the Therapeutic Relationship: A Case Study

Authors: Efi Koutantou

Abstract:

The foundation of successful therapy is the bond between the psychotherapist and the patient, Psychoanalysis would argue. The present study explores lived experiences of a psychotherapeutic relationship in different moments, initial and final with special reference to the transference love developed through the process. The fight between moments of ‘leaving a self’ behind and following ‘lines of flight’ in the process of creating a new subjectivity and ‘becoming-other’ will be explored. Moments between de-territorialisation – surpassing given constraints such as gender, family and religion, kinship bonds - freeing the space in favor of re-territorialisation – creation of oneself creation of oneself will also be analyzed. The generation of new possibilities of being, new ways of self-actualization for this patient will be discussed. The second part of this study will explore the extent to which this ‘transference love’ results for this specific patient to become ‘the discourse of the other’; it is a desideratum whether the patient finally becomes a subject of his/her own through his/her own self-exploration of new possibilities of existence or becomes alienated within the thought of the therapist. The way in which the patient uses or is (ab)used by the transference love in order to experience and undergo alienation from an ‘authority’ which may or may not sacrifice his/her own thought in favor of satisfying the therapist will be investigated. Finally, from an observer’s perspective and from the analysis of the results of this therapeutic relationship, the counter-transference will also be analyzed, in terms of an attempt of the analyst to relive and satisfy his/her own desires through the life of the analysand. The accession and fall of an idealized self will be analyzed, the turn of the transference love into ‘hate’ will conclude this case study through a lived experience in the therapeutic procedure; a relationship which can be called to be a mixture of a real relationship and remnants from a past object relationship.

Keywords: alienation, authority, counter-transference, hate, transference love

Procedia PDF Downloads 195
311 The Influence of Surface Roughness on the Flow Fields Generated by an Oscillating Cantilever

Authors: Ciaran Conway, Nick Jeffers, Jeff Punch

Abstract:

With the current trend of miniaturisation of electronic devices, piezoelectric fans have attracted increasing interest as an alternative means of forced convection over traditional rotary solutions. Whilst there exists an abundance of research on various piezo-actuated flapping fans in the literature, the geometries of these fans all consist of a smooth rectangular cross section with thicknesses typically of the order of 100 um. The focus of these studies is primarily on variables such as frequency, amplitude, and in some cases resonance mode. As a result, the induced flow dynamics are a direct consequence of the pressure differential at the fan tip as well as the pressure-driven ‘over the top’ vortices generated at the upper and lower edges of the fan. Rough surfaces such as golf ball dimples or vortex generators on an aircraft wing have proven to be beneficial by tripping the boundary layer and energising the adjacent air flow. This paper aims to examine the influence of surface roughness on the airflow generation of a flapping fan and determine whether the induced wake can be manipulated or enhanced by energising the airflow around the fan tip. Particle Image Velocimetry (PIV) is carried out on mechanically oscillated rigid fans with various surfaces consisting of pillars, perforations and cell-like grids derived from the wing topology of natural fliers. The results of this paper may be used to inform the design of piezoelectric fans and possibly aid in understanding the complex aerodynamics inherent in flapping wing flight.

Keywords: aerodynamics, oscillating cantilevers, PIV, vortices

Procedia PDF Downloads 200
310 Applications of Drones in Infrastructures: Challenges and Opportunities

Authors: Jin Fan, M. Ala Saadeghvaziri

Abstract:

Unmanned aerial vehicles (UAVs), also referred to as drones, equipped with various kinds of advanced detecting or surveying systems, are effective and low-cost in data acquisition, data delivery and sharing, which can benefit the building of infrastructures. This paper will give an overview of applications of drones in planning, designing, construction and maintenance of infrastructures. The drone platform, detecting and surveying systems, and post-data processing systems will be introduced, followed by cases with details of the applications. Challenges from different aspects will be addressed. Opportunities of drones in infrastructure include but not limited to the following. Firstly, UAVs equipped with high definition cameras or other detecting equipment are capable of inspecting the hard to reach infrastructure assets. Secondly, UAVs can be used as effective tools to survey and map the landscape to collect necessary information before infrastructure construction. Furthermore, an UAV or multi-UVAs are useful in construction management. UVAs can also be used in collecting roads and building information by taking high-resolution photos for future infrastructure planning. UAVs can be used to provide reliable and dynamic traffic information, which is potentially helpful in building smart cities. The main challenges are: limited flight time, the robustness of signal, post data analyze, multi-drone collaboration, weather condition, distractions to the traffic caused by drones. This paper aims to help owners, designers, engineers and architects to improve the building process of infrastructures for higher efficiency and better performance.

Keywords: bridge, construction, drones, infrastructure, information

Procedia PDF Downloads 107
309 Experimental Evaluation of Stand Alone Solar Driven Membrane Distillation System

Authors: Mejbri Sami, Zhani Khalifa, Zarzoum Kamel, Ben Bacha Habib, Koschikowski Joachim, Pfeifle Daniel

Abstract:

Many places worldwide, especially arid and semi-arid remote regions, are suffering from the lack of drinkable water and the situation will be aggravated in the near future. Furthermore, remote areas are characterised by lack of conventional energy sources, skilled personnel and maintenance facilities. Therefore, the development of small to medium size, stand-alone and robust solar desalination systems is needed to provide independent fresh water supply in remote areas. This paper is focused on experimental studies on compact membrane distillation (MD) solar desalination prototype located at the Mechanical Engineering Department site, Kairouan University, Kairouan, Tunisia. The pilot system is designed and manufactured as a part of a research and development project funded by the MESRS/BMBF. The pilot system is totally autonomous. The electrical energy required to operate the unit is generated through a field of 4 m² of photovoltaic panels, and the heating of feed water is provided by a field of 6 m² of solar collectors. The Kairouan plant performance of the first few months of operation is presented. The highest freshwater production of 150 L/d is obtained on a sunny day in July of 633 W/m²d.

Keywords: experimental, membrane distillation, solar desalination, Permeat gap

Procedia PDF Downloads 118
308 Meteorological Risk Assessment for Ships with Fuzzy Logic Designer

Authors: Ismail Karaca, Ridvan Saracoglu, Omer Soner

Abstract:

Fuzzy Logic, an advanced method to support decision-making, is used by various scientists in many disciplines. Fuzzy programming is a product of fuzzy logic, fuzzy rules, and implication. In marine science, fuzzy programming for ships is dramatically increasing together with autonomous ship studies. In this paper, a program to support the decision-making process for ship navigation has been designed. The program is produced in fuzzy logic and rules, by taking the marine accidents and expert opinions into account. After the program was designed, the program was tested by 46 ship accidents reported by the Transportation Safety Investigation Center of Turkey. Wind speed, sea condition, visibility, day/night ratio have been used as input data. They have been converted into a risk factor within the Fuzzy Logic Designer application and fuzzy rules set by marine experts. Finally, the expert's meteorological risk factor for each accident is compared with the program's risk factor, and the error rate was calculated. The main objective of this study is to improve the navigational safety of ships, by using the advance decision support model. According to the study result, fuzzy programming is a robust model that supports safe navigation.

Keywords: calculation of risk factor, fuzzy logic, fuzzy programming for ship, safety navigation of ships

Procedia PDF Downloads 171
307 Ethical Concerns in the Internet of Things and Smart Devices: Case Studies and Analysis

Authors: Mitchell Browe, Oriehi Destiny Anyaiwe, Zahraddeen Gwarzo

Abstract:

The Internet of Things (IoT) is a major evolution of technology and of the internet, which has the power to revolutionize the way people live. IoT has the power to change the way people interact with each other and with their homes; It has the ability to give people new ways to interact with and monitor their health; It can alter socioeconomic landscapes by providing new and efficient methods of resource management, saving time and money for both individuals and society as a whole; It even has the potential to save lives through autonomous vehicle technology and smart security measures. Unfortunately, nearly every revolution bears challenges which must be addressed to minimize harm by the new technology upon its adopters. IoT represents an internet technology revolution which has the potential to risk privacy, safety, and security of its users, should devices be developed, implemented, or utilized improperly. This article examines past and current examples of these ethical faults in an attempt to highlight the importance of consumer awareness of potential dangers of these technologies in making informed purchasing and utilization decisions, as well as to reveal how deficiencies and limitations of IoT devices should be better addressed by both companies and by regulatory bodies. Aspects such as consumer trust, corporate transparency, and misuse of individual data are all factors in the implementation of proper ethical boundaries in the IoT.

Keywords: IoT, ethical concerns, privacy, safety, security, smart devices

Procedia PDF Downloads 64
306 A Comparative Study of Various Control Methods for Rendezvous of a Satellite Couple

Authors: Hasan Basaran, Emre Unal

Abstract:

Formation flying of satellites is a mission that involves a relative position keeping of different satellites in the constellation. In this study, different control algorithms are compared with one another in terms of ΔV, velocity increment, and tracking error. Various control methods, covering continuous and impulsive approaches are implemented and tested for satellites flying in low Earth orbit. Feedback linearization, sliding mode control, and model predictive control are designed and compared with an impulsive feedback law, which is based on mean orbital elements. Feedback linearization and sliding mode control approaches have identical mathematical models that include second order Earth oblateness effects. The model predictive control, on the other hand, does not include any perturbations and assumes circular chief orbit. The comparison is done with 4 different initial errors and achieved with velocity increment, root mean square error, maximum steady state error, and settling time. It was observed that impulsive law consumed the least ΔV, while produced the highest maximum error in the steady state. The continuous control laws, however, consumed higher velocity increments and produced lower amounts of tracking errors. Finally, the inversely proportional relationship between tracking error and velocity increment was established.

Keywords: chief-deputy satellites, feedback linearization, follower-leader satellites, formation flight, fuel consumption, model predictive control, rendezvous, sliding mode

Procedia PDF Downloads 86
305 Folk Media and Political Movement: A Case Study on the Bodos of North East India

Authors: Faguna Barmahalia

Abstract:

Politics of ethnic identity in the north-east India is well-known phenomenon. The ethnic assertion in this region is mostly linguistic and cultural in nature. Most of the ethnic groups in the north-east region have been demanding either autonomous or separate state to maintain their socio-cultural identity. After the Indian Independence, the ethnic groups of people think that they have not developed till. Despite having many natural resources, North East India remained backward in terms of economic, education as well as politics. In this scenario, many educated and middle-class elite people have involved in working for the all-round development of their community. The Bodos are one of the major tribes in North Eeast India. In Assam, the Bodos are assumed by themselves to be exploited and suppressed by the Assamese Hindu society. Consequently, the socio-cultural identity movement has emerged among the Bodos.The main aims of my study are: i. to focus on how the Bodos of Assam are using the folk media in their political movement and iii. To analyse the role of folklore towards serving the ethnic unity and nationalism among the Bodos. Methodology: The study is based on the primary and secondary sources. Interview and observation method was conducted for collecting the primary data. For secondary source, some printed books, magazines and others materials published by the distinguished publishers and websites have been used.

Keywords: media, culture, nationalism, politics

Procedia PDF Downloads 195
304 A Generic Middleware to Instantly Sync Intensive Writes of Heterogeneous Massive Data via Internet

Authors: Haitao Yang, Zhenjiang Ruan, Fei Xu, Lanting Xia

Abstract:

Industry data centers often need to sync data changes reliably and instantly from a large-scale of heterogeneous autonomous relational databases accessed via the not-so-reliable Internet, for which a practical universal sync middle of low maintenance and operation costs is most wanted, but developing such a product and adapting it for various scenarios are a very sophisticated and continuous practice. The authors have been devising, applying, and optimizing a generic sync middleware system, named GSMS since 2006, holding the principles or advantages that the middleware must be SyncML-compliant and transparent to data application layer logic, need not refer to implementation details of databases synced, does not rely on host computer operating systems deployed, and its construction is light weighted and hence, of low cost. A series of ultimate experiments with GSMS sync performance were conducted for a persuasive example of a source relational database that underwent a broad range of write loads, say, from one thousand to one million intensive writes within a few minutes. The tests proved that GSMS has achieved an instant sync level of well below a fraction of millisecond per record sync, and GSMS’ smooth performances under ultimate write loads also showed it is feasible and competent.

Keywords: heterogeneous massive data, instantly sync intensive writes, Internet generic middleware design, optimization

Procedia PDF Downloads 105
303 Resilient Machine Learning in the Nuclear Industry: Crack Detection as a Case Study

Authors: Anita Khadka, Gregory Epiphaniou, Carsten Maple

Abstract:

There is a dramatic surge in the adoption of machine learning (ML) techniques in many areas, including the nuclear industry (such as fault diagnosis and fuel management in nuclear power plants), autonomous systems (including self-driving vehicles), space systems (space debris recovery, for example), medical surgery, network intrusion detection, malware detection, to name a few. With the application of learning methods in such diverse domains, artificial intelligence (AI) has become a part of everyday modern human life. To date, the predominant focus has been on developing underpinning ML algorithms that can improve accuracy, while factors such as resiliency and robustness of algorithms have been largely overlooked. If an adversarial attack is able to compromise the learning method or data, the consequences can be fatal, especially but not exclusively in safety-critical applications. In this paper, we present an in-depth analysis of five adversarial attacks and three defence methods on a crack detection ML model. Our analysis shows that it can be dangerous to adopt machine learning techniques in security-critical areas such as the nuclear industry without rigorous testing since they may be vulnerable to adversarial attacks. While common defence methods can effectively defend against different attacks, none of the three considered can provide protection against all five adversarial attacks analysed.

Keywords: adversarial machine learning, attacks, defences, nuclear industry, crack detection

Procedia PDF Downloads 139
302 Student's Perception on the Relationship between Teacher's Supportive Teaching, Thwarting Teaching, Their Needed Satisfaction, Frustration, and Motivational Regulation at Vocational High School

Authors: Chi C. Lin, Chih. H. Hsieh, Chi H. Lin

Abstract:

The present study attempted to develop and test a self-determination theory dual-process model among teachers’ need supportive teaching, need thwarting teaching, and students’ need satisfaction, need frustration, and motivation regulation on vocational high school learners. This study adopted a survey questionnaire method. Participants were 736 (472 males, 264 females) vocational high school students in Taiwan. The instrument included five sets: the Teachers’ Need Supportive Teaching Scale, the Teachers’ Need Thwart Teaching Scale, the Need Satisfaction Scale, the Need Frustration Scale, and the Motivational Regulation Scale. A Structural equation modeling was used for the data analyses, results indicated that (1) teachers’ need supportive teaching had direct effects on students’ need satisfaction; (2) teachers’ thwarting teaching also had a direct effect on students’ need frustration; (3) teachers’ need supportive teaching had a negative direct effect on students’ need frustration; (4) students’ need satisfaction had direct effects on their autonomous motivation and control motivation, respectively; (5) students’ need frustration also had direct effects on their control motivation and motivation, respectively; (6) the model proposed in this study fit mostly with the empirical data.

Keywords: motivational regulation, need satisfaction, need frustration, supportive teaching, thwart teaching, vocational high school students

Procedia PDF Downloads 117
301 MEET (Maximise the Erasmus Experience Together): Gains, Challenges and Proposals

Authors: Susana Olmos, Catherine Spencer

Abstract:

Every year our School in DIT (Dublin Institute of Technology) hosts approximately 80 Erasmus students from partner universities across Europe. Our own students are required to spend a compulsory 3rd year abroad on study and/or work placements. This is an extremely rewarding experience for all of the students, however, it can also be a challenging one. With this in mind, we started a project which aimed to make this transition as easy and productive as possible. The project, which is called MEET: Maximise the Erasmus Experience Together, focuses on the students’ own active engagement in learning and preparation – outside of the classroom –and their own self-directed pursuit of opportunities to develop their confidence and preparedness, which would work as an important foundation for the transformative learning that study abroad implies. We focussed on creating more structured opportunities where Erasmus students from our partner universities (currently studying at DIT) and our second-year students could interact and learn from each other, and in so doing improve both their language and intercultural skills. Our experience so far has been quite positive and we have seen how students taking part in this project have developed as autonomous learners as well as enhanced both their linguistic and intercultural knowledge. As the linguistic element of our project was one of our main priorities, we asked the students to keep a reflective diary on the activities that were organised by the group in the TL. Also, we use questionnaires as well as personal interviews to assess their development. However, there are challenges and proposals we would make to bring this project forward for the near future.

Keywords: erasmus, intercultural competence, linguistic competence, extra curriculum activities

Procedia PDF Downloads 362
300 University Lecturers' Attitudes towards Learner Autonomy in the EFL Context in Vietnam

Authors: Nhung T. Bui

Abstract:

Part of the dilemma facing educational reforms in Vietnam as in other Asian contexts is how to encourage more independence in students’ learning approaches. Since 2005, the Ministry of Education and Training of Vietnam has included the students’ ability to learn independently in its national education objectives. While learner autonomy has been viewed as a goal in the teaching and learning English as a foreign language (EFL) and there has been a considerable literature on strategies to stimulate autonomy in learners, teachers’ voices have rarely been heard. Given that teachers play a central role in helping their students to be more autonomous, especially in an inherent Confucian heritage culture like Vietnam, their attitudes towards learner autonomy should be investigated before any practical implementations could be undertaken. This paper reports significant findings of a survey questionnaire with 262 lecturers of English from 5 universities in Hanoi, Vietnam giving opinions regarding the practices and prospects of learner autonomy in their classrooms. The study reveals that lecturers perceive they should be more responsible than their students in all class-related activities; they most appreciate their students’ ability to learn cooperatively and that they consider stimulating students’ interest as the most important teaching strategy to promote learner autonomy. Lecturers, then, are strongly suggested to gradually ‘empower’ their students through the application of out-of-classroom activities; of learning activities which requires collaboration and team spirit; and of activities which could boost students’ interest in learning English.

Keywords: English as a foreign language, higher education, learner autonomy, Vietnam

Procedia PDF Downloads 252
299 Psychodidactic Strategies to Facilitate Flow of Logical Thinking in Preparation of Academic Documents

Authors: Deni Stincer Gomez, Zuraya Monroy Nasr, Luis Pérez Alvarez

Abstract:

The preparation of academic documents such as thesis, articles and research projects is one of the requirements of the higher educational level. These documents demand the implementation of logical argumentative thinking which is experienced and executed with difficulty. To mitigate the effect of these difficulties this study designed a thesis seminar, with which the authors have seven years of experience. It is taught in a graduate program in Psychology at the National Autonomous University of Mexico. In this study the authors use the Toulmin model as a mental heuristic and for the application of a set of psychodidactic strategies that facilitate the elaboration of the plot and culmination of the thesis. The efficiency in obtaining the degree in the groups exposed to the seminar has increased by 94% compared to the 10% that existed in the generations that were not exposed to the seminar. In this article the authors will emphasize the psychodidactic strategies used. The Toulmin model alone does not guarantee the success achieved. A set of actions of a psychological nature (almost psychotherapeutic) and didactics of the teacher also seem to contribute. These are actions that derive from an understanding of the psychological, epistemological and ontogenetic obstacles and the most frequent errors in which thought tends to fall when it is demanded a logical course. The authors have grouped the strategies into three groups: 1) strategies to facilitate logical thinking, 2) strategies to strengthen the scientific self and 3) strategies to facilitate the act of writing the text. In this work the authors delve into each of them.

Keywords: psychodidactic strategies, logical thinking, academic documents, Toulmin model

Procedia PDF Downloads 165
298 An Effective Decision-Making Strategy Based on Multi-Objective Optimization for Commercial Vehicles in Highway Scenarios

Authors: Weiming Hu, Xu Li, Xiaonan Li, Zhong Xu, Li Yuan, Xuan Dong

Abstract:

Maneuver decision-making plays a critical role in high-performance intelligent driving. This paper proposes a risk assessment-based decision-making network (RADMN) to address the problem of driving strategy for the commercial vehicle. RADMN integrates two networks, aiming at identifying the risk degree of collision and rollover and providing decisions to ensure the effectiveness and reliability of driving strategy. In the risk assessment module, risk degrees of the backward collision, forward collision and rollover are quantified for hazard recognition. In the decision module, a deep reinforcement learning based on multi-objective optimization (DRL-MOO) algorithm is designed, which comprehensively considers the risk degree and motion states of each traffic participant. To evaluate the performance of the proposed framework, Prescan/Simulink joint simulation was conducted in highway scenarios. Experimental results validate the effectiveness and reliability of the proposed RADMN. The output driving strategy can guarantee the safety and provide key technical support for the realization of autonomous driving of commercial vehicles.

Keywords: decision-making strategy, risk assessment, multi-objective optimization, commercial vehicle

Procedia PDF Downloads 122
297 A Diagnostic Comparative Analysis of on Simultaneous Localization and Mapping (SLAM) Models for Indoor and Outdoor Route Planning and Obstacle Avoidance

Authors: Seyed Esmail Seyedi Bariran, Khairul Salleh Mohamed Sahari

Abstract:

In robotics literature, the simultaneous localization and mapping (SLAM) is commonly associated with a priori-posteriori problem. The autonomous vehicle needs a neutral map to spontaneously track its local position, i.e., “localization” while at the same time a precise path estimation of the environment state is required for effective route planning and obstacle avoidance. On the other hand, the environmental noise factors can significantly intensify the inherent uncertainties in using odometry information and measurements obtained from the robot’s exteroceptive sensor which in return directly affect the overall performance of the corresponding SLAM. Therefore, the current work is primarily dedicated to provide a diagnostic analysis of six SLAM algorithms including FastSLAM, L-SLAM, GraphSLAM, Grid SLAM and DP-SLAM. A SLAM simulated environment consisting of two sets of landmark locations and robot waypoints was set based on modified EKF and UKF in MATLAB using two separate maps for indoor and outdoor route planning subject to natural and artificial obstacles. The simulation results are expected to provide an unbiased platform to compare the estimation performances of the five SLAM models as well as on the reliability of each SLAM model for indoor and outdoor applications.

Keywords: route planning, obstacle, estimation performance, FastSLAM, L-SLAM, GraphSLAM, Grid SLAM, DP-SLAM

Procedia PDF Downloads 432
296 Automated Irrigation System with Programmable Logic Controller and Photovoltaic Energy

Authors: J. P. Reges, L. C. S. Mazza, E. J. Braga, J. A. Bessa, A. R. Alexandria

Abstract:

This paper proposes the development of control and automation of irrigation system located sunflower harvest in the Teaching Unit, Research and Extension (UEPE), the Apodi Plateau in Limoeiro do Norte. The sunflower extraction, which in turn serves to get the produced oil from its seeds, animal feed, and is widely used in human food. Its nutritional potential is quite high what makes of foods produced from vegetal, very rich and healthy. The focus of research is to make the autonomous irrigation system sunflower crop from programmable logic control energized with alternative energy sources, solar photovoltaics. The application of automated irrigation system becomes interesting when it provides convenience and implements new forms of managements of the implementation of irrigated cropping systems. The intended use of automated addition to irrigation quality and consequently brings enormous improvement for production of small samples. Addition to applying the necessary and sufficient features of water management in irrigation systems, the system (PLC + actuators + Renewable Energy) will enable to manage the quantitative water required for each crop, and at the same time, insert the use of sources alternative energy. The entry of the automated collection will bring a new format, and in previous years, used the process of irrigation water wastage base and being the whole manual irrigation process.

Keywords: automation, control, sunflower, irrigation, programming, renewable energy

Procedia PDF Downloads 387
295 Closed Loop Traffic Control System Using PLC

Authors: Chinmay Shah

Abstract:

The project is all about development of a close loop traffic light control system using PLC (Programmable Logic Controller). This project is divided into two parts which are hardware and software. The hardware part for this project is a model of four way junction of a traffic light. Three indicator lamps (Red, Yellow and Green) are installed at each lane for represents as traffic light signal. This traffic control model is a replica of actuated traffic control. Actuated traffic control system is a close loop traffic control system which controls the timing of the indicator lamps depending on the fluidity of traffic for a particular lane. To make it autonomous, in each lane three IR sensors are placed which helps to sense the percentage of traffic present on any particular lane. The IR Sensors and Indicator lamps are connected to LG PLC XGB series. The PLC controls every signal which is coming from the inputs (IR Sensors) to software and display to the outputs (Indicator lamps). Default timing for the indicator lamps is 30 seconds for each lane. But depending on the percentage of traffic present, if the traffic is nearly 30-35%, green lamp will be on for 10 seconds, for 65-70% traffic it will be 20 seconds, for full 100% traffic it will be on for full 30 seconds. The software part that operates with LG PLC is “XG 5000” Programmer. Using this software, the ladder logic diagram is programmed to control the traffic light base on the flow chart. At the end of this project, the traffic light system is actuated successfully by PLC.

Keywords: close loop, IR sensor, PLC, light control system

Procedia PDF Downloads 550
294 Visual Servoing for Quadrotor UAV Target Tracking: Effects of Target Information Sharing

Authors: Jason R. King, Hugh H. T. Liu

Abstract:

This research presents simulation and experimental work in the visual servoing of a quadrotor Unmanned Aerial Vehicle (UAV) to stabilize overtop of a moving target. Most previous work in the field assumes static or slow-moving, unpredictable targets. In this experiment, the target is assumed to be a friendly ground robot moving freely on a horizontal plane, which shares information with the UAV. This information includes velocity and acceleration information of the ground target to aid the quadrotor in its tracking task. The quadrotor is assumed to have a downward-facing camera which is fixed to the frame of the quadrotor. Only onboard sensing for the quadrotor is utilized for the experiment, with a VICON motion capture system in place used only to measure ground truth and evaluate the performance of the controller. The experimental platform consists of an ArDrone 2.0 and a Create Roomba, communicating using Robot Operating System (ROS). The addition of the target’s information is demonstrated to help the quadrotor in its tracking task using simulations of the dynamic model of a quadrotor in Matlab Simulink. A nested PID control loop is utilized for inner-loop control the quadrotor, similar to previous works at the Flight Systems and Controls Laboratory (FSC) at the University of Toronto Institute for Aerospace Studies (UTIAS). Experiments are performed with ground truth provided by an indoor motion capture system, and the results are analyzed. It is demonstrated that a velocity controller which incorporates the additional information is able to perform better than the controllers which do not have access to the target’s information.

Keywords: quadrotor, target tracking, unmanned aerial vehicle, UAV, UAS, visual servoing

Procedia PDF Downloads 324
293 Obtaining High-Dimensional Configuration Space for Robotic Systems Operating in a Common Environment

Authors: U. Yerlikaya, R. T. Balkan

Abstract:

In this research, a method is developed to obtain high-dimensional configuration space for path planning problems. In typical cases, the path planning problems are solved directly in the 3-dimensional (D) workspace. However, this method is inefficient in handling the robots with various geometrical and mechanical restrictions. To overcome these difficulties, path planning may be formalized and solved in a new space which is called configuration space. The number of dimensions of the configuration space comes from the degree of freedoms of the system of interest. The method can be applied in two ways. In the first way, the point clouds of all the bodies of the system and interaction of them are used. The second way is performed via using the clearance function of simulation software where the minimum distances between surfaces of bodies are simultaneously measured. A double-turret system is held in the scope of this study. The 4-D configuration space of a double-turret system is obtained in these two ways. As a result, the difference between these two methods is around 1%, depending on the density of the point cloud. The disparity between the two forms steadily decreases as the point cloud density increases. At the end of the study, in order to verify 4-D configuration space obtained, 4-D path planning problem was realized as 2-D + 2-D and a sample path planning is carried out with using A* algorithm. Then, the accuracy of the configuration space is proved using the obtained paths on the simulation model of the double-turret system.

Keywords: A* algorithm, autonomous turrets, high-dimensional C-space, manifold C-space, point clouds

Procedia PDF Downloads 129
292 Application of Bim Model Data to Estimate ROI for Robots and Automation in Construction Projects

Authors: Brian Romansky

Abstract:

There are many practical, commercially available robots and semi-autonomous systems that are currently available for use in a wide variety of construction tasks. Adoption of these technologies has the potential to reduce the time and cost to deliver a project, reduce variability and risk in delivery time, increase quality, and improve safety on the job site. These benefits come with a cost for equipment rental or contract fees, access to specialists to configure the system, and time needed for set-up and support of the machines while in use. Calculation of the net ROI (Return on Investment) requires detailed information about the geometry of the site, the volume of work to be done, the overall project schedule, as well as data on the capabilities and past performance of available robotic systems. Assembling the required data and comparing the ROI for several options is complex and tedious. Many project managers will only consider the use of a robot in targeted applications where the benefits are obvious, resulting in low levels of adoption of automation in the construction industry. This work demonstrates how data already resident in many BIM (Building Information Model) projects can be used to automate ROI estimation for a sample set of commercially available construction robots. Calculations account for set-up and operating time along with scheduling support tasks required while the automated technology is in use. Configuration parameters allow for prioritization of time, cost, or safety as the primary benefit of the technology. A path toward integration and use of automatic ROI calculation with a database of available robots in a BIM platform is described.

Keywords: automation, BIM, robot, ROI.

Procedia PDF Downloads 71
291 Carbonation of Wollastonite (001) competing Hydration: Microscopic Insights from Ion Spectroscopy and Density Functional Theory

Authors: Peter Thissen

Abstract:

In this work, we report about the influence of the chemical potential of water on the carbonation reaction of wollastonite (CaSiO3) as model surface of cement and concrete. Total energy calculations based on density functional theory (DFT) combined with kinetic barrier predictions based on nudge elastic band (NEB) method show that the exposure of the water-free wollastonite surface to CO2 results in a barrier-less carbonation. CO2 reacts with the surface oxygen and forms carbonate (CO32-) complexes together with a major reconstruction of the surface. The reaction comes to a standstill after one carbonate monolayer has been formed. In case one water monolayer is covering the wollastonite surface, the carbonation is no more barrier-less, yet ending in a localized monolayer. Covered with multilayers of water, the thermodynamic ground state of the wollastonite completely changes due to a metal-proton exchange reaction (MPER, also called early stage hydration) and Ca2+ ions are partially removed from solid phase into the H2O/wollastonite interface. Mobile Ca2+ react again with CO2 and form carbonate complexes, ending in a delocalized layer. By means of high resolution time-of-flight secondary-ion mass-spectroscopy images (ToF-SIMS), we confirm that hydration can lead to a partially delocalization of Ca2+ ions on wollastonite surfaces. Finally, we evaluate the impact of our model surface results by means of Low Energy Ion Scattering (LEIS) spectroscopy combined with careful discussion about the competing reactions of carbonation vs. hydration.

Keywords: Calcium-silicate, carbonation, hydration, metal-proton exchange reaction

Procedia PDF Downloads 347
290 Analysis of Thermoelectric Coolers as Energy Harvesters for Low Power Embedded Applications

Authors: Yannick Verbelen, Sam De Winne, Niek Blondeel, Ann Peeters, An Braeken, Abdellah Touhafi

Abstract:

The growing popularity of solid state thermoelectric devices in cooling applications has sparked an increasing diversity of thermoelectric coolers (TECs) on the market, commonly known as “Peltier modules”. They can also be used as generators, converting a temperature difference into electric power, and opportunities are plentiful to make use of these devices as thermoelectric generators (TEGs) to supply energy to low power, autonomous embedded electronic applications. Their adoption as energy harvesters in this new domain of usage is obstructed by the complex thermoelectric models commonly associated with TEGs. Low cost TECs for the consumer market lack the required parameters to use the models because they are not intended for this mode of operation, thereby urging an alternative method to obtain electric power estimations in specific operating conditions. The design of the test setup implemented in this paper is specifically targeted at benchmarking commercial, off-the-shelf TECs for use as energy harvesters in domestic environments: applications with limited temperature differences and space available. The usefulness is demonstrated by testing and comparing single and multi stage TECs with different sizes. The effect of a boost converter stage on the thermoelectric end-to-end efficiency is also discussed.

Keywords: thermoelectric cooler, TEC, complementary balanced energy harvesting, step-up converter, DC/DC converter, energy harvesting, thermal harvesting

Procedia PDF Downloads 249
289 Deep Learning Application for Object Image Recognition and Robot Automatic Grasping

Authors: Shiuh-Jer Huang, Chen-Zon Yan, C. K. Huang, Chun-Chien Ting

Abstract:

Since the vision system application in industrial environment for autonomous purposes is required intensely, the image recognition technique becomes an important research topic. Here, deep learning algorithm is employed in image system to recognize the industrial object and integrate with a 7A6 Series Manipulator for object automatic gripping task. PC and Graphic Processing Unit (GPU) are chosen to construct the 3D Vision Recognition System. Depth Camera (Intel RealSense SR300) is employed to extract the image for object recognition and coordinate derivation. The YOLOv2 scheme is adopted in Convolution neural network (CNN) structure for object classification and center point prediction. Additionally, image processing strategy is used to find the object contour for calculating the object orientation angle. Then, the specified object location and orientation information are sent to robotic controller. Finally, a six-axis manipulator can grasp the specific object in a random environment based on the user command and the extracted image information. The experimental results show that YOLOv2 has been successfully employed to detect the object location and category with confidence near 0.9 and 3D position error less than 0.4 mm. It is useful for future intelligent robotic application in industrial 4.0 environment.

Keywords: deep learning, image processing, convolution neural network, YOLOv2, 7A6 series manipulator

Procedia PDF Downloads 222
288 Proposal of Non-Destructive Inspection Function Based on Internet of Things Technology Using Drone

Authors: Byoungjoon Yu, Jihwan Park, Sujung Sin, Junghyun Im, Minsoo Park, Sehwan Park, Seunghee Park

Abstract:

In this paper, we propose a technology to monitor the soundness of an Internet-based bridge using a non-conductive inspection function. There has been a collapse accident due to the aging of the bridge structure, and it is necessary to prepare for the deterioration of the bridge. The NDT/SHM system for maintenance of existing bridge structures requires a large number of inspection personnel and expensive inspection costs, and access of expensive and large equipment to measurement points is required. Because current drone inspection equipment can only be inspected through camera, it is difficult to inspect inside damage accurately, and the results of an internal damage evaluation are subjective, and it is difficult for non-specialists to recognize the evaluation results. Therefore, it is necessary to develop NDT/SHM techniques for maintenance of new-concept bridge structures that allow for free movement and real-time evaluation of measurement results. This work is financially supported by Korea Ministry of Land, Infrastructure, and Transport (MOLIT) as 'Smart City Master and Doctor Course Grant Program' and a grant (14SCIP-B088624-01) from Construction Technology Research Program funded by Ministry of Land, Infrastructure and Transport of Korean government.

Keywords: Structural Health Monitoring, SHM, non-contact sensing, nondestructive testing, NDT, Internet of Things, autonomous self-driving drone

Procedia PDF Downloads 253
287 Artificially Intelligent Context Aware Personal Computer Assistant (ACPCA)

Authors: Abdul Mannan Akhtar

Abstract:

In this paper a novel concept of a self learning smart personalized computer assistant (ACPCA) is established which is a context aware system. Based on user habits, moods, and other routines/situational reactions the system will manage various services and suggestions at appropriate times including what schedule to follow, what to watch, what software to be used, what should be deleted etc. This system will utilize a hybrid fuzzyNeural model to predict what the user will do next and support his actions. This will be done by establishing fuzzy sets of user activities, choices, preferences etc. and utilizing their combinations to predict his moods and immediate preferences. Various application of context aware systems exist separately e.g. on certain websites for music or multimedia suggestions but a personalized autonomous system that could adapt to user’s personality does not exist at present. Due to the novelty and massiveness of this concept, this paper will primarily focus on the problem establishment, product features and its functionality; however a small mini case is also implemented on MATLAB to demonstrate some of the aspects of ACPCA. The mini case involves prediction of user moods, activity, routine and food preference using a hybrid fuzzy-Neural soft computing technique.

Keywords: context aware systems, APCPCA, soft computing techniques, artificial intelligence, fuzzy logic, neural network, mood detection, face detection, activity detection

Procedia PDF Downloads 449