73 resultados para Batteries (Ordnance)
Resumo:
To date, most quad-rotor aerial robots have been based on flying toys. Although such systems can be used as prototypes, they are not sufficiently robust to serve as experimental robotics platforms. We have developed the X-4 Flyer, a quad-rotor robot using custom-built chassis and avionics with off-the-shelf motors and batteries, to be a highly reliable experimental platform. The vehicle uses tuned plant dynamics with an onboard embedded attitude controller to stabilise flight. A linear SISO controller was designed to regulate flyer attitude.
Resumo:
This paper discusses hardware design principles for long-term solar-powered wireless sensor networks. We argue that the assumptions and principles appropriate for long-term operation from primary cells are quite different from the solar power case with its abundant energy and regular charging cycles. We present data from a long-term deployment that illustrates the use of solar energy and rechargeable batteries to achieve 24x7 operation for over two years, since March 2005.
Resumo:
Managing livestock movement in extensive systems has environmental and production benefits. Currently permanent wire fencing is used to control cattle; this is both expensive and inflexible. Cattle are known to respond to auditory and visual cues and we investigated whether these can be used to manipulate their behaviour. Twenty-five Belmont Red steers with a mean live weight of 270kg were each randomly assigned to one of five treatments. Treatments consisted of a combination of cues (audio, tactile and visual stimuli) and consequence (electrical stimulation). The treatments were electrical stimulation alone, audio plus electrical stimulation, vibration plus electrical stimulation, light plus electrical stimulation and electrified electric fence (6kV) plus electrical stimulation. Cue stimuli were administered for 3s followed immediately by electrical stimulation (consequence) of 1kV for 1s. The experiment tested the operational efficacy of an on-animal control or virtual fencing system. A collar-halter device was designed to carry the electronics, batteries and equipment providing the stimuli, including audio, vibration, light and electrical of a prototype virtual fencing device. Cattle were allowed to travel along a 40m alley to a group of peers and feed while their rate of travel and response to the stimuli were recorded. The prototype virtual fencing system was successful in modifying the behaviour of the cattle. The rate of travel of cattle along the alley demonstrated the large variability in behavioural response associated with tactile, visual and audible cues. The experiment demonstrated virtual fencing has potential for controlling cattle in extensive grazing systems. However, larger numbers of cattle need to be tested to derive a better understanding of the behavioural variance. Further controlled experimental work is also necessary to quantify the interaction between cues, consequences and cattle learning.
Resumo:
A mathematical model is developed to simulate the discharge of a LiFePO4 cathode. This model contains 3 size scales, which match with experimental observations present in the literature on the multi-scale nature of LiFePO4 material. A shrinking-core is used on the smallest scale to represent the phase-transition of LiFePO4 during discharge. The model is then validated against existing experimental data and this validated model is then used to investigate parameters that influence active material utilisation. Specifically the size and composition of agglomerates of LiFePO4 crystals is discussed, and we investigate and quantify the relative effects that the ionic and electronic conductivities within the oxide have on oxide utilisation. We find that agglomerates of crystals can be tolerated under low discharge rates. The role of the electrolyte in limiting (cathodic) discharge is also discussed, and we show that electrolyte transport does limit performance at high discharge rates, confirming the conclusions of recent literature.
Resumo:
Autonomous underwater vehicles (AUVs) are increasingly used, both in military and civilian applications. These vehicles are limited mainly by the intelligence we give them and the life of their batteries. Research is active to extend vehicle autonomy in both aspects. Our intent is to give the vehicle the ability to adapt its behavior under different mission scenarios (emergency maneuvers versus long duration monitoring). This involves a search for optimal trajectories minimizing time, energy or a combination of both. Despite some success stories in AUV control, optimal control is still a very underdeveloped area. Adaptive control research has contributed to cost minimization problems, but vehicle design has been the driving force for advancement in optimal control research. We look to advance the development of optimal control theory by expanding the motions along which AUVs travel. Traditionally, AUVs have taken the role of performing the long data gathering mission in the open ocean with little to no interaction with their surroundings, MacIver et al. (2004). The AUV is used to find the shipwreck, and the remotely operated vehicle (ROV) handles the exploration up close. AUV mission profiles of this sort are best suited through the use of a torpedo shaped AUV, Bertram and Alvarez (2006), since straight lines and minimal (0 deg - 30 deg) angular displacements are all that are necessary to perform the transects and grid lines for these applications. However, the torpedo shape AUV lacks the ability to perform low-speed maneuvers in cluttered environments, such as autonomous exploration close to the seabed and around obstacles, MacIver et al. (2004). Thus, we consider an agile vehicle capable of movement in six degrees of freedom without any preference of direction.
Resumo:
This review collects and summarises the biological applications of the element cobalt. Small amounts of the ferromagnetic metal can be found in rock, soil, plants and animals, but is mainly obtained as a by-product of nickel and copper mining, and is separated from the ores (mainly cobaltite, erythrite, glaucodot and skutterudite) using a variety of methods. Compounds of cobalt include several oxides, including: green cobalt(II) (CoO), blue cobalt(II,III) (Co3O4), and black cobalt(III) (Co2O3); four halides including pink cobalt(II) fluoride (CoF2), blue cobalt(II) chloride (CoCl2), green cobalt(II) bromide (CoBr2), and blue-black cobalt(II) iodide (CoI2). The main application of cobalt is in its metal form in cobalt-based super alloys, though other uses include lithium cobalt oxide batteries, chemical reaction catalyst, pigments and colouring, and radioisotopes in medicine. It is known to mimic hypoxia on the cellular level by stabilizing the α subunit of hypoxia inducing factor (HIF), when chemically applied as cobalt chloride (CoCl2). This is seen in many biological research applications, where it has shown to promote angiogenesis, erythropoiesis and anaerobic metabolism through the transcriptional activation of genes such as vascular endothelial growth factor (VEGF) and erythropoietin (EPO), contributing significantly to the pathophysiology of major categories of disease, such as myocardial, renal and cerebral ischaemia, high altitude related maladies and bone defects. As a necessary constituent for the formation of vitamin B12, it is essential to all animals, including humans, however excessive exposure can lead to tissue and cellular toxicity. Cobalt has been shown to provide promising potential in clinical applications, however further studies are necessary to clarify its role in hypoxia-responsive genes and the applications of cobalt-chloride treated tissues.
Resumo:
A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.
Resumo:
This thesis examines the role of mobile telephony in rural communities in Papua New Guinea (PNG). It is a threshold study which reports on research conducted in the earliest stages of mobile phone adoption in these areas. It explores the ways in which this new technology changes people’s lives, social structures and relationships. The research focuses on non-urban communities, which previously had little or no access to modern communication technologies, but which are in some cases still using traditional forms of communication such as drums. It has found that the introduction of mobile telecommunications has generally been viewed positively, although several negative concerns have been strongly felt. Specific benefits related to enhanced communication with relatives and friends living away from home villages, and use of the technology in time-critical emergencies or crises. Difficulties have arisen with respect to the cost of owning and operating a handset, as well as financial and logistical challenges when recharging handset batteries, particularly in areas with no mains electricity supply. Perceived damaging effects of mobile phone access related to sex, crime and pornography. The changes taking place are described through a social lens, by foregrounding the perceptions of villagers. The perspectives of key informants, such as telecommunication company managers, are also discussed. Employing the technique of triangulation (using different methods and sources) has helped to validate the findings of the research project. The sources constantly overlap and agree on the main themes, such as those outlined above. PNG is a developing country which performs poorly on a wide range of development indicators. A large majority of the people live outside of the major towns and cities. It is therefore worthwhile investigating the introduction of mobile phone technology in rural areas. These areas often have poor access to services, including transport, health, education and banking. Until 2007, communities in such regions fell outside of mobile phone coverage areas. In the case of all ten villages discussed in this thesis, there has never been any landline telephone infrastructure available. Therefore, this research on mobile phones is in effect documenting the first ever access to any kind of phone in these communities. This research makes a unique contribution to knowledge about the role of communication in PNG, and has implications for policy, practice and theory. In the policy arena, the thesis aids understanding of the impact which communication sector competition and regulation can have on rural and relatively isolated communities. There are three practical problems which have emerged from the research: cost, battery recharging difficulties and breakage are all major obstacles to uptake and use of mobile telephony in rural communities. Efforts to reduce usage costs, enable easier recharging, and design more robust handsets would allow for increased utilisation of mobile phones for a range of purposes. With respect to the realm of theory, this research sits amongst the most recent scholarship in the mobile phone field, located within the broader communication theory area. It recommends cautionary reading of any literature which suggests that mobile phones will reduce poverty and increase incomes in poor, rural communities in developing countries. Nonetheless, the present research adds weight to mobile phone studies which suggest that the primary advantages of mobile phones in such settings are for the satisfactions of communication of itself, and for social interaction among loved ones.
Resumo:
Voltage drop and rise at network peak and off–peak periods along with voltage unbalance are the major power quality problems in low voltage distribution networks. Usually, the utilities try to use adjusting the transformer tap changers as a solution for the voltage drop. They also try to distribute the loads equally as a solution for network voltage unbalance problem. On the other hand, the ever increasing energy demand, along with the necessity of cost reduction and higher reliability requirements, are driving the modern power systems towards Distributed Generation (DG) units. This can be in the form of small rooftop photovoltaic cells (PV), Plug–in Electric Vehicles (PEVs) or Micro Grids (MGs). Rooftop PVs, typically with power levels ranging from 1–5 kW installed by the householders are gaining popularity due to their financial benefits for the householders. Also PEVs will be soon emerged in residential distribution networks which behave as a huge residential load when they are being charged while in their later generation, they are also expected to support the network as small DG units which transfer the energy stored in their battery into grid. Furthermore, the MG which is a cluster of loads and several DG units such as diesel generators, PVs, fuel cells and batteries are recently introduced to distribution networks. The voltage unbalance in the network can be increased due to the uncertainties in the random connection point of the PVs and PEVs to the network, their nominal capacity and time of operation. Therefore, it is of high interest to investigate the voltage unbalance in these networks as the result of MGs, PVs and PEVs integration to low voltage networks. In addition, the network might experience non–standard voltage drop due to high penetration of PEVs, being charged at night periods, or non–standard voltage rise due to high penetration of PVs and PEVs generating electricity back into the grid in the network off–peak periods. In this thesis, a voltage unbalance sensitivity analysis and stochastic evaluation is carried out for PVs installed by the householders versus their installation point, their nominal capacity and penetration level as different uncertainties. A similar analysis is carried out for PEVs penetration in the network working in two different modes: Grid to vehicle and Vehicle to grid. Furthermore, the conventional methods are discussed for improving the voltage unbalance within these networks. This is later continued by proposing new and efficient improvement methods for voltage profile improvement at network peak and off–peak periods and voltage unbalance reduction. In addition, voltage unbalance reduction is investigated for MGs and new improvement methods are proposed and applied for the MG test bed, planned to be established at Queensland University of Technology (QUT). MATLAB and PSCAD/EMTDC simulation softwares are used for verification of the analyses and the proposals.
Resumo:
This paper describes system identification, estimation and control of translational motion and heading angle for a cost effective open-source quadcopter — the MikroKopter. The dynamics of its built-in sensors, roll and pitch attitude controller, and system latencies are determined and used to design a computationally inexpensive multi-rate velocity estimator that fuses data from the built-in inertial sensors and a low-rate onboard laser range finder. Control is performed using a nested loop structure that is also computationally inexpensive and incorporates different sensors. Experimental results for the estimator and closed-loop positioning are presented and compared with ground truth from a motion capture system.
Resumo:
We examine the solution of the two-dimensional Cahn-Hilliard-reaction (CHR) equation in the xy plane as a model of Li+ intercalation into LiFePO4 material. We validate our numerical solution against the solution of the depth-averaged equation, which has been used to model intercalation in the limit of highly orthotropic diffusivity and gradient penalty tensors. We then examine the phase-change behaviour in the full CHR system as these parameters become more isotropic, and find that as the Li+ diffusivity is increased in the x direction, phase separation persists at high currents, even in small crystals with averaged coherency strain included. The resulting voltage curves decrease monotonically, which has previously been considered a hallmark of crystals that fill homogeneously.
Resumo:
A number of tests and test batteries are available for the prediction of older driver safety, but many of these have not been validated against standardized driving outcome measures. The aim of this study was to evaluate a series of previously described screening tests in terms of their ability to predict the potential for safe and unsafe driving. Participants included 79 community-dwelling older drivers (M=72.16 years, SD=5.46; range 65-88 years; 57 males and 22 females) who completed a previously validated multi-disciplinary driving assessment, a hazard perception test, a hazard change detection test and a battery of vision and cognitive tests. Participants also completed a standardized on-road driving assessment. The multi-disciplinary test battery had the highest predictive ability with a sensitivity of 80% and a specificity of 73%, followed by the hazard perception test which demonstrated a sensitivity of 75% and a specificity of 61%. These findings suggest that a relatively simple and practical battery of tests from a range of domains has the capacity to predict safe and unsafe driving in older adults.
Resumo:
The aim of children's vision screenings is to detect visual problems that are common in this age category through valid and reliable tests. Nevertheless, the cost effectiveness of paediatric vision screenings, the nature of the tests included in the screening batteries and the ideal screening age has been the cause of much debate in Australia and worldwide. Therefore, the purpose of this review is to report on the current practice of children's vision screenings in Australia and other countries, as well as to evaluate the evidence for and against the provision of such screenings. This was undertaken through a detailed investigation of peer-reviewed publications on this topic. The current review demonstrates that there is no agreed vision screening protocol for children in Australia. This appears to be a result of the lack of strong evidence supporting the benefit of such screenings. While amblyopia, strabismus and, to a lesser extent refractive error, are targeted by many screening programs during pre-school and at school entry, there is less agreement regarding the value of screening for other visual conditions, such as binocular vision disorders, ocular health problems and refractive errors that are less likely to reduce distance visual acuity. In addition, in Australia, little agreement exists in the frequency and coverage of screening programs between states and territories and the screening programs that are offered are ad hoc and poorly documented. Australian children stand to benefit from improved cohesion and communication between jurisdictions and health professionals to enable an equitable provision of validated vision screening services that have the best chance of early detection and intervention for a range of paediatric visual problems.
Resumo:
Bomb technicians perform their work while encapsulated in explosive ordnance disposal (EOD) suits. Designed primarily for safety, these suits have an unintended consequence of impairing the body’s natural mechanisms for heat dissipation. Purpose: To quantify the heat strain encountered during an EOD operational scenario in the tropical north of Australia. Methods: All active police male bomb technicians, located in a tropical region of Australia (n=4, experience 7 ± 2.1 yrs, age 34 ± 2 yrs, height 182.3 ± 5.4 cm, body mass 95 ± 4 kg, VO2max 46 ± 5.7 ml.kg-1.min-1) undertook an operational scenario wearing the Med-Eng EOD 9 suit and helmet (~32 kg). The climatic conditions ranged between 27.1–31.8°C ambient temperature, 66-88% relative humidity, and 30.7-34.3°C wet bulb globe temperature. The scenario involved searching a two story non air-conditioned building for a target; carrying and positioning equipment for taking an X-ray; carrying and positioning equipment to disrupt the target; and finally clearing the site. Core temperature and heart rate were continuously monitored, and were used to calculate a physiological strain index (PSI). Urine specific gravity (USG) assessed hydration status and heat associated symptomology were also recorded. Results: The scenario was completed in 121 ± 22 mins (23.4 ± 0.4% work, 76.5 ± 0.4% rest/recovery). Maximum core temperature (38.4 ± 0.2°C), heart rate (173 ± 5.4 bpm, 94 ± 3.3% max), PSI (7.1 ± 0.4) and USG (1.031 ± 0.002) were all elevated after the simulated operation. Heat associated symptomology highlighted that moderate-severe levels of fatigue and thirst were universally experienced, muscle weakness and heat sensations experienced by 75%, and one bomb technician reported confusion and light-headedness. Conclusion: All bomb technicians demonstrated moderate-high levels of heat strain, evidenced by elevated heart rate, core body temperature and PSI. Severe levels of dehydration and noteworthy heat-related symptoms further highlight the risks to health and safety faced by bomb technicians operating in tropical locations.