While modern quadruped robots can jump or even somersault, without proper control, landing from the air could cause serious impacts and damages to both the mechanical and electrical components of robots. The landing p...
详细信息
ISBN:
(纸本)9798350342291
While modern quadruped robots can jump or even somersault, without proper control, landing from the air could cause serious impacts and damages to both the mechanical and electrical components of robots. The landing process often faces different robot's poses and velocities, e.g., vertical, horizontal, and/or pitch movements, as well as contact phase change, e.g., from initial two-leg contact to final four-leg contact phase. Also, the time left for the robot to respond to emerging contacts is extremely short before giving rise to any damage. Considering all these challenges, this paper proposes a compliant landing control framework for quadruped robots. First, based on a 2-D rigid body model, we formulate the computing of reference landing trajectories with as much compliance as possible as a quadratic programming problem, which can be solved quickly online. Then, a model-predictive control algorithm is used to determine the joint torque commands for following the reference trajectories to realize compliant landing. The effectiveness of the proposed framework has been verified with various landing scenarios in both simulation and real experiments.
The advanced computing and communication between components within the intelligent transportation system creates vulnerabilities that can be exploited by bad actors. To ensure the safety of autonomous vehicles and sec...
详细信息
ISBN:
(纸本)9798350399462
The advanced computing and communication between components within the intelligent transportation system creates vulnerabilities that can be exploited by bad actors. To ensure the safety of autonomous vehicles and secure the infrastructure, we must first understand how a cyber attack propagates through the intelligent transportation system. This propagation occurs through communications between individual agents and entire subsystems. By understanding the impact of component and subsystem interactions, we can better fortify the intelligent transportation system against cyber attacks. This paper presents an agent-based model for detection of and recovery from cyber attacks on the intelligent transportation system for autonomous vehicles. In this model, vehicles, pedestrians, and intelligent infrastructure are represented as distinct agent populations. Simulations were run to test the spread of cyber attack while considering the origin and aggressiveness of the attack, and detection and defense capabilities. The simulations showed that clusters of distinct agents will form based on communication ranges. These clusters can quickly merge as new agents are introduced. Preventing the introduction of new agents can isolate subsystems affected by an attack.
This paper addresses the challenge of acoustic scene mapping (ASM) in complex indoor environments with multiple sound sources. Unlike existing methods that rely on prior data association or SLAM frameworks, we propose...
详细信息
ISBN:
(纸本)9798350377712;9798350377705
This paper addresses the challenge of acoustic scene mapping (ASM) in complex indoor environments with multiple sound sources. Unlike existing methods that rely on prior data association or SLAM frameworks, we propose a novel particle filter-based iterative framework, termed IASM, for ASM using a mobile robot equipped with a microphone array and LiDAR. I-ASM harnesses an innovative "implicit association" to align sound sources with Direction of Arrival (DoA) observations without requiring explicit pairing, thereby streamlining the mapping process. Given inputs including an occupancy map, DoA estimates from various robot positions, and corresponding robot pose data, I-ASM performs multi-source mapping through an iterative cycle of "Filtering-Clustering-Implicit Associating". The proposed framework has been tested in real-world scenarios with up to 10 concurrent sound sources, demonstrating its robustness against missing and false DoA estimates while achieving high-quality ASM results. To benefit the community, we open-source all the codes and data at https://***/AISLAB-sustech/Acoustic-Scene-Mapping
Signed Distance Fields are a common surface representation method widely used for both 3D mapping and obstacle avoidance. While the former traditionally uses projective Truncated Signed Distance Fields (TSDF), the lat...
详细信息
ISBN:
(纸本)9798350377712;9798350377705
Signed Distance Fields are a common surface representation method widely used for both 3D mapping and obstacle avoidance. While the former traditionally uses projective Truncated Signed Distance Fields (TSDF), the latter often requires a complete Euclidean Signed Distance Field (ESDF) representation of the environment. In this paper, we propose a unified system by combining both methods to generate force vectors to nearby obstacles from a TSDF-based 3D reconstruction. We introduce a new merging scheme to better capture the geometry of the object, with no post-processing requirements, and a way to increase the effective range of the system. Validation experiments demonstrate the accuracy of the force vector calculation by comparing it against an ideal simulated environment. The exibility of the system is demonstrated by implementing a haptic feedback teleoperation setup, which is validated through a user study in a teleoperation task. Through this, it is shown that the proposed method provides a statistically significant improvement to the task. Finally, a brief description on future improvements to the system is presented.
The rapid growth of the digital industry has created a higher demand for robust Network Intrusion Detection systems (NIDS) to protect valuable information and the integrity of network infrastructures as the digital in...
详细信息
ISBN:
(纸本)9798331518097
The rapid growth of the digital industry has created a higher demand for robust Network Intrusion Detection systems (NIDS) to protect valuable information and the integrity of network infrastructures as the digital industry grows rapidly. One of the most important challenges in the current intrusion detection landscape is the growing sophistication of cyber threats, including zero-day attacks, polymorphic malware, and advanced persistent threats, which are difficult to detect using traditional methods. Furthermore, systems often suffer from high false positive rates and struggle to scale effectively in real-time applications. Traditionally, intrusion detection methods were quite effective, but performance is still lacking due to the inability to adapt to evolving threats. Recent breakthroughs include deep learning approaches, ensemble methods, and hybrid detection models. However, these are still plagued by high computational overhead and a lack of transparency in their decision-making processes. The work exploits Optuna for the optimization of hyperparameters, specifically in the performance improvement of various ML models. Among the best-ranked frameworks for the optimization of hyperparameters, Optuna provides a principled method for tuning hyperparameters, resulting in significantly enhanced accuracy and efficiency of the intrusion detection model. The implication of this research work is that it searches for the best configuration of parameters for each algorithm with balanced false positives and detection rates. The study includes an overall scenario of recent development in NIDS. More precisely, this paper shows how Hyperparameter tuning attains very superior model performance compared to other models. The comparative results presented have shown that models which are optimized using Optuna surpass the non-optimized ones by a huge margin with respect to accuracy, recall, precision, and F1-score. The paper also discusses ensemble techniques by integrating the
As the global automotive industry transitions to more ecologically friendly and sustainable forms of transportation, electric automobiles, or EVs, have shown a great deal of promise as a replacement for conventional i...
详细信息
Corrosion of reinforcing bars is a major factor affecting the durability of reinforced concrete structures. The volume of corroded reinforcement expands and the protective layer gradually cracks, which in turn reduces...
详细信息
ISBN:
(纸本)9798350364200;9798350364194
Corrosion of reinforcing bars is a major factor affecting the durability of reinforced concrete structures. The volume of corroded reinforcement expands and the protective layer gradually cracks, which in turn reduces the serviceability of the structure. In this study, a fibre optic intelligent corrosion monitoring device based on magnetic sensing is investigated. A new type of magnetic probe is designed for sensing the corrosion of steel reinforcement, and strain sensing is carried out by utilizing high elasticity diaphragm and fibre optic grating structure. A finite element method is utilized to simulate the sensitivity and linearity of the device under different magnetic forces. The experimental results show that the sensor has good mechanical response effect and the fibre optic diaphragm stress sensing structure has good linearity, which can achieve longterm high-precision non-destructive monitoring of rebar corrosion.
An increase in the number of power consumers leads to scale up a power supply grids, and the introduction of Smart Grid (SG) for connecting components and subsystems of distributed generation, increases the complexity...
详细信息
The paper introduces a novel framework for safe and autonomous aerial physical interaction in industrial settings. It comprises two main components: a neural network-based target detection system enhanced with edge co...
详细信息
ISBN:
(纸本)9798350357899;9798350357882
The paper introduces a novel framework for safe and autonomous aerial physical interaction in industrial settings. It comprises two main components: a neural network-based target detection system enhanced with edge computing for reduced onboard computational load, and a control barrier function (CBF)-based controller for safe and precise maneuvering. The target detection system is trained on a dataset under challenging visual conditions and evaluated for accuracy across various unseen data with changing lighting conditions. Depth features are utilized for target pose estimation, with the entire detection framework offloaded into low-latency edge computing. The CBF-based controller enables the UAV to converge safely to the target for precise contact. Simulated evaluations of both the controller and target detection are presented, alongside an analysis of real-world detection performance.
This article studies the problem of adaptive optimized finite-time tracking control for a class of nonlinear single-input single-output systems in the form of pure-feedback. In order to realizing the finite optimal co...
详细信息
暂无评论