944 resultados para Localization and tracking


Relevância:

80.00% 80.00%

Publicador:

Resumo:

The GuRm is a 1.2m tall, 23 degree of freedom humanoid consuucted at the University of Queensland for research into humanoid robotics. The key challenge being addressed by the GuRw projcct is the development of appropriate learning strategies for control and coodinadon of the robot’s many joints. The development of learning strategies is Seen as a way to sidestep the inherent intricacy of modeling a multi-DOP biped robot. This paper outlines the approach taken to generate an appmpria*e control scheme for the joinis of the GuRoo. The paper demonsrrates the determination of local feedback control parameters using a genetic algorithm. The feedback loop is then augmented by a predictive modulator that learns a form of feed-fonward control to overcome the irregular loads experienced at each joint during the gait cycle. The predictive modulator is based on thc CMAC architecture. Results from tats on the GuRoo platform show that both systems provide improvements in stability and tracking of joint control.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This thesis deals with the challenging problem of designing systems able to perceive objects in underwater environments. In the last few decades research activities in robotics have advanced the state of art regarding intervention capabilities of autonomous systems. State of art in fields such as localization and navigation, real time perception and cognition, safe action and manipulation capabilities, applied to ground environments (both indoor and outdoor) has now reached such a readiness level that it allows high level autonomous operations. On the opposite side, the underwater environment remains a very difficult one for autonomous robots. Water influences the mechanical and electrical design of systems, interferes with sensors by limiting their capabilities, heavily impacts on data transmissions, and generally requires systems with low power consumption in order to enable reasonable mission duration. Interest in underwater applications is driven by needs of exploring and intervening in environments in which human capabilities are very limited. Nowadays, most underwater field operations are carried out by manned or remotely operated vehicles, deployed for explorations and limited intervention missions. Manned vehicles, directly on-board controlled, expose human operators to risks related to the stay in field of the mission, within a hostile environment. Remotely Operated Vehicles (ROV) currently represent the most advanced technology for underwater intervention services available on the market. These vehicles can be remotely operated for long time but they need support from an oceanographic vessel with multiple teams of highly specialized pilots. Vehicles equipped with multiple state-of-art sensors and capable to autonomously plan missions have been deployed in the last ten years and exploited as observers for underwater fauna, seabed, ship wrecks, and so on. On the other hand, underwater operations like object recovery and equipment maintenance are still challenging tasks to be conducted without human supervision since they require object perception and localization with much higher accuracy and robustness, to a degree seldom available in Autonomous Underwater Vehicles (AUV). This thesis reports the study, from design to deployment and evaluation, of a general purpose and configurable platform dedicated to stereo-vision perception in underwater environments. Several aspects related to the peculiar environment characteristics have been taken into account during all stages of system design and evaluation: depth of operation and light conditions, together with water turbidity and external weather, heavily impact on perception capabilities. The vision platform proposed in this work is a modular system comprising off-the-shelf components for both the imaging sensors and the computational unit, linked by a high performance ethernet network bus. The adopted design philosophy aims at achieving high flexibility in terms of feasible perception applications, that should not be as limited as in case of a special-purpose and dedicated hardware. Flexibility is required by the variability of underwater environments, with water conditions ranging from clear to turbid, light backscattering varying with daylight and depth, strong color distortion, and other environmental factors. Furthermore, the proposed modular design ensures an easier maintenance and update of the system over time. Performance of the proposed system, in terms of perception capabilities, has been evaluated in several underwater contexts taking advantage of the opportunity offered by the MARIS national project. Design issues like energy power consumption, heat dissipation and network capabilities have been evaluated in different scenarios. Finally, real-world experiments, conducted in multiple and variable underwater contexts, including open sea waters, have led to the collection of several datasets that have been publicly released to the scientific community. The vision system has been integrated in a state of the art AUV equipped with a robotic arm and gripper, and has been exploited in the robot control loop to successfully perform underwater grasping operations.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Merlin has broad tumor-suppressor functions as its mutations have been identified in multiple benign tumors and malignant cancers. In all schwannomas, the majority of meningiomas and 1/3 of ependymomas Merlin loss is causative. In neurofibromatosis type 2, a dominantly inherited tumor disease because of the loss of Merlin, patients suffer from multiple nervous system tumors and die on average around age 40. Chemotherapy is not effective and tumor localization and multiplicity make surgery and radiosurgery challenging and morbidity is often considerable. Thus, a new therapeutic approach is needed for these tumors. Using a primary human in vitro model for Merlin-deficient tumors, we report that the Ras/Raf/mitogen-activated protein, extracellular signal-regulated kinase kinase (MEK)/extracellular signal-regulated kinase (ERK) scaffold, kinase suppressor of Ras 1 (KSR1), has a vital role in promoting schwannomas development. We show that KSR1 overexpression is involved in many pathological phenotypes caused by Merlin loss, namely multipolar morphology, enhanced cell-matrix adhesion, focal adhesion and, most importantly, increased proliferation and survival. Our data demonstrate that KSR1 has a wider role than MEK1/2 in the development of schwannomas because adhesion is more dependent on KSR1 than MEK1/2. Immunoprecipitation analysis reveals that KSR1 is a novel binding partner of Merlin, which suppresses KSR1's function by inhibiting the binding between KSR1 and c-Raf. Our proteomic analysis also demonstrates that KSR1 interacts with several Merlin downstream effectors, including E3 ubiquitin ligase CRL4DCAF1. Further functional studies suggests that KSR1 and DCAF1 may co-operate to regulate schwannomas formation. Taken together, these findings suggest that KSR1 serves as a potential therapeutic target for Merlin-deficient tumors.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Mass spectrometry imaging (MSI) is a powerful tool in metabolomics and proteomics for the spatial localization and identification of pharmaceuticals, metabolites, lipids, peptides and proteins in biological tissues. However, sample preparation remains a crucial variable in obtaining the most accurate distributions. Common washing steps used to remove salts, and solvent-based matrix application, allow analyte spreading to occur. Solvent-free matrix applications can reduce this risk, but increase the possibility of ionisation bias due to matrix adhesion to tissue sections. We report here the use of matrix-free MSI using laser desorption ionisation performed on a 12 T Fourier transform ion cyclotron resonance (FTICR) mass spectrometer. We used unprocessed tissue with no post-processing following thaw-mounting on matrix-assisted laser desorption ionisation (MALDI) indium-tin oxide (ITO) target plates. The identification and distribution of a range of phospholipids in mouse brain and kidney sections are presented and compared with previously published MALDI time-of-flight (TOF) MSI distributions.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Warehouse is an essential component in the supply chain, linking the chain partners and providing them with functions of product storage, inbound and outbound operations along with value-added processes. Allocation of warehouse resources should be efficient and effective to achieve optimum productivity and reduce operational costs. Radio frequency identification (RFID) is a technology capable of providing real-time information about supply chain operations. It has been used by warehousing and logistic enterprises to achieve reduced shrinkage, improved material handling and tracking as well as increased accuracy of data collection. However, both academics and practitioners express concerns about challenges to RFID adoption in the supply chain. This paper provides a comprehensive analysis of the problems encountered in RFID implementation at warehouses, discussing the theoretical and practical adoption barriers and causes of not achieving full potential of the technology. Lack of foreseeable return on investment (ROI) and high costs are the most commonly reported obstacles. Variety of standards and radio wave frequencies are identified as source of concern for decision makers. Inaccurate performance of the RFID within the warehouse environment is examined. Description of integration challenges between warehouse management system and RFID technology is given. The paper discusses the existing solutions to technological, investment and performance RFID adoption barriers. Factors to consider when implementing the RFID technology are given to help alleviate implementation problems. By illustrating the challenges of RFID in the warehouse environment and discussing possible solutions the paper aims to help both academics and practitioners to focus on key areas constituting an obstacle to the technology growth. As more studies will address these challenges, the realisation of RFID benefits for warehouses and supply chain will become a reality.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

As microblog services such as Twitter become a fast and convenient communication approach, identification of trendy topics in microblog services has great academic and business value. However detecting trendy topics is very challenging due to huge number of users and short-text posts in microblog diffusion networks. In this paper we introduce a trendy topics detection system under computation and communication resource constraints. In stark contrast to retrieving and processing the whole microblog contents, we develop an idea of selecting a small set of microblog users and processing their posts to achieve an overall acceptable trendy topic coverage, without exceeding resource budget for detection. We formulate the selection operation of these subset users as mixed-integer optimization problems, and develop heuristic algorithms to compute their approximate solutions. The proposed system is evaluated with real-time test data retrieved from Sina Weibo, the dominant microblog service provider in China. It's shown that by monitoring 500 out of 1.6 million microblog users and tracking their microposts (about 15,000 daily) with our system, nearly 65% trendy topics can be detected, while on average 5 hours earlier before they appear in Sina Weibo official trends.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Social media data are produced continuously by a large and uncontrolled number of users. The dynamic nature of such data requires the sentiment and topic analysis model to be also dynamically updated, capturing the most recent language use of sentiments and topics in text. We propose a dynamic Joint Sentiment-Topic model (dJST) which allows the detection and tracking of views of current and recurrent interests and shifts in topic and sentiment. Both topic and sentiment dynamics are captured by assuming that the current sentiment-topic-specific word distributions are generated according to the word distributions at previous epochs. We study three different ways of accounting for such dependency information: (1) Sliding window where the current sentiment-topic word distributions are dependent on the previous sentiment-topic-specific word distributions in the last S epochs; (2) skip model where history sentiment topic word distributions are considered by skipping some epochs in between; and (3) multiscale model where previous long- and shorttimescale distributions are taken into consideration. We derive efficient online inference procedures to sequentially update the model with newly arrived data and show the effectiveness of our proposed model on the Mozilla add-on reviews crawled between 2007 and 2011. © 2013 ACM 2157-6904/2013/12-ART5 $ 15.00.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A probabilistic indirect adaptive controller is proposed for the general nonlinear multivariate class of discrete time system. The proposed probabilistic framework incorporates input–dependent noise prediction parameters in the derivation of the optimal control law. Moreover, because noise can be nonstationary in practice, the proposed adaptive control algorithm provides an elegant method for estimating and tracking the noise. For illustration purposes, the developed method is applied to the affine class of nonlinear multivariate discrete time systems and the desired result is obtained: the optimal control law is determined by solving a cubic equation and the distribution of the tracking error is shown to be Gaussian with zero mean. The efficiency of the proposed scheme is demonstrated numerically through the simulation of an affine nonlinear system.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In this paper we show how event processing over semantically annotated streams of events can be exploited, for implementing tracing and tracking of products in supply chains through the automated generation of linked pedigrees. In our abstraction, events are encoded as spatially and temporally oriented named graphs, while linked pedigrees as RDF datasets are their specific compositions. We propose an algorithm that operates over streams of RDF annotated EPCIS events to generate linked pedigrees. We exemplify our approach using the pharmaceuticals supply chain and show how counterfeit detection is an implicit part of our pedigree generation. Our evaluation results show that for fast moving supply chains, smaller window sizes on event streams provide significantly higher efficiency in the generation of pedigrees as well as enable early counterfeit detection.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Encyclopaedia slavica sanctorum (eslavsanct.net) is designed as a complex heterogenous multimedia product. It is part of the project Encyclopaedia Slavica Sanctorum: Saints and Holy Places in Bulgaria (in electronic and Guthenberg versions). Until 2013, its web-based platform for online management and presentation of structured digital content has been prepared and numerous materials have been input. The platform is developed using the server technologies PHP, MySQL and HTML, JavaScript, CSS on the client side. The search in the e-ESS can be made by different parameters (12, or combinations of parameters), such as saints’ or feasts’ names, type of sainthood, types of texts dedicated to the saints, dates of saints’ commemorations, and several others. Both guests and registered users can search in the e-ESS but the latter have access to much more information including the publications of original sources. The e-platform allows for making statistics of what have been searched and read. The software used for content and access analysis is BI tool QlikView. As an analysis services provider, it is connected to the e-ESS objects repository and tracking services by a preliminary created data warehouse. The data warehouse is updated automatically, achieving real time analytics solution. The paper discusses some of the statistics results of the use of the e-ESS: the activities of the editors, users, and guests, the types of searches, the most often viewed object, such as the date of January 1 and the article on St. Basil the Great which is one of the richest encyclopaedia articles and includes both matadata and original sources published, both from medieval Slavonic manuscripts and popular culture records.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Maintenance of epithelial polarity depends on the correct localization and levels of polarity determinants. The evolutionarily conserved transmembrane protein Crumbs is crucial for the size and identity of the apical membrane, yet little is known about the molecular mechanisms controlling the amount of Crumbs at the surface. Here, we show that Crumbs levels on the apical membrane depend on a well-balanced state of endocytosis and stabilization. The adaptor protein 2 (AP-2) complex binds to a motif in the cytoplasmic tail of Crumbs that overlaps with the binding site of Stardust, a protein known to stabilize Crumbs on the surface. Preventing endocytosis by mutations in AP-2 causes expansion of the Crumbs-positive plasma membrane and polarity defects, which can be partially rescued by removing one copy of crumbs. Strikingly, knocking-down both AP-2 and Stardust retains Crumbs on the membrane. This study provides evidence for a molecular mechanism, based on stabilization and endocytosis, to adjust surface levels of Crumbs, which are essential for maintaining epithelial polarity.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The aquaporins (AQP) family of integral membrane protein channels mediate cellular water and solute flow. Although qualitative and quantitative differences in channel permeability, selectivity, subcellular localization and trafficking responses have been observed for different members of the AQP family, the signature homotetrameric quaternary structure is conserved. Using a variety of biophysical techniques, we show that mutations to an intracellular loop (loop D) of human AQP4 reduce oligomerization. Non-tetrameric AQP4 mutants are unable to relocalize to the plasma membrane in response to changes in extracellular tonicity, despite equivalent constitutive surface expression levels and water permeability to wild-type AQP4. A network of AQP4 loop D hydrogen bonding interactions, identified using molecular dynamics simulations and based on a comparative mutagenic analysis of AQPs 1, 3 and 4, suggest that loop D interactions may provide a general structural framework for tetrameric assembly within the AQP family.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Fibre lasers are light sources that are synonymous with stability. They can give rise to highly coherent continuous-wave radiation, or a stable train of mode locked pulses with well-defined characteristics. However, they can also exhibit an exceedingly diverse range of nonlinear operational regimes spanning a multi-dimensional parameter space. The complex nature of the dynamics poses significant challenges in the theoretical and experimental studies of such systems. Here, we demonstrate how the real-time experimental methodology of spatio-temporal dynamics can be used to unambiguously identify and discern between such highly complex lasing regimes. This two-dimensional representation of laser intensity allows the identification and tracking of individual features embedded in the radiation as they make round-trip circulations inside the cavity. The salient features of this methodology are highlighted by its application to the case of Raman fibre lasers and a partially mode locked ring fibre laser operating in the normal dispersion regime.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In the 1980's and 1990's, Argentina was undergoing significant political, social and economic changes as a result of the change over from a military driven government to elected governments. A major aspect of the change was an increased emphasis on privatization, and promotion of foreign and domestic investment in Argentina. Higher education leaders were increasingly drawn into developing a national strategy for changing the educational structure to help facilitate changes in other aspects of the society. Preliminary reviews by the Argentinean higher education leaders indicated that adaptation of the American community college promised to help achieve the national goals. ^ The purpose of this study was to determine: if and how the community college concept, an American invention, could be adapted to function in Argentina, a nation with a significantly different history of political, social, cultural and economic development. Achieving this purpose involved: identifying the key leaders in the movement that developed to apply the community college concept in Argentina; the study of their perspectives regarding the movement as it developed; and tracking the assistance given by selected American community college leaders. ^ The case study method was employed in this research, using interview and historical data collection. Key leaders from higher education in the United States and Argentina were interviewed in-depth, to determine their views. An interview protocol with appropriate sub-questions was followed to ensure complete coverage. The interviewees identified several major areas of education in need of change including, the system, access to the system, new areas of study, integration into the hemisphere and, in general, decentralization. Historical review revealed a steady development of the community college concept in Argentina reflected in documentation of events, conceptual writings and legal structures. ^ It was concluded that there is a community college structure beginning to emerge that, so far, in broad outline, follows the structure developed in the United States. It is anticipated however, that future developments will include conceptual aspects to the model reflective of Argentina. ^

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not.