130 resultados para payload


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Since the analysis of the lunar rocks and soil samples, brought to Earth by the Apollo missions, it is believed that the Moon has a waterless nature and also other volatile species are strongly depleted. Advancement in analysis techniques helped to identify water and other volatile species in lunar volcanic glasses. Additionally, recent lunar space missions detected water and volatile organic compounds in the region of the lunar poles where permanently shadowed craters are existing. All known lunar soil samples available on Earth come from the lunar near side, close to the equator. To verify the most recent measurement results and to enhance the knowledge of the geological history of the Moon it is of high interest to perform in situ measurements on the lunar poles. For this reason the Russian space agency, Roskosmos, developed aprogram for the scientific exploration of the lunar poles. The Gas Analysis Package (GAP) is part of the selected scientific payload aboard the Luna-Resurs Lander. This instrument uses pyrolytic cells and will apply laser spectroscopy, gas chromatography and mass spectrometry to detect and analyze volatile components trapped in the lunar soil. An existing ion optical design of a compact reflectron type time-of-flight mass spectrometer, originally built for the MEAP/P-BACE balloon mission, was chosen as a part of the GAP instrument. The scope of this thesis is the development of the interface between gas chromatography (GC) and this Neutral Gas Mass Spectrometer (NGMS) to perform coupled GC-MS measurements. In the first part of this thesis the interfacing concept was developed and verified by coupling the NGMS prototype to gas chromatography. The second part of this thesis is devoted to the development of the NGMS flight version.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

El presente trabajo muestra el avance que se tiene en el proyecto denominado “Diseño y Construcción de un Nano-Satélite”, que se lleva a cabo en la ESIME U.P.-Ticoman del Instituto Politécnico Nacional. Este proyecto tiene como objetivo principal introducir a los alumnos en el que hacer espacial, se trata de un satélite con un peso de un kilogramo y es un cubo de 10 cm de lado y cuya carga útil tiene MEMS (sistema de micro-electromecánicos) que harán las veces de péndulo electrónico, lo anterior y los armónicos gravitacionales permitirán determinar la forma de la tierra. Se presenta el fundamento matemático, los componentes del satélite, el diseño preliminar de la estructura, la manufactura de la estructura, los resultados de un ensaye estructural destructivo y el análisis estático por elementos finitos.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cancer remains one of the world’s most devastating diseases, with more than 10 million new cases every year. However, traditional treatments have proven insufficient for successful medical management of cancer due to the chemotherapeutics’ difficulty in achieving therapeutic concentrations at the target site, non-specific cytotoxicity to normal tissues, and limited systemic circulation lifetime. Although, a concerted effort has been placed in developing and successfully employing nanoparticle(NP)-based drug delivery vehicles successfully mitigate the physiochemical and pharmacological limitations of chemotherapeutics, work towards controlling the subcellular fate of the carrier, and ultimately its payload, has been limited. Because efficient therapeutic action requires drug delivery to specific organelles, the subcellular barrier remains critical obstacle to maximize the full potential of NP-based delivery vehicles. The aim of my dissertation work is to better understand how NP-delivery vehicles’ structural, chemical, and physical properties affect the internalization method and subcellular localization of the nanocarrier. ^ In this work we explored how side-chain and backbone modifications affect the conjugated polymer nanoparticle (CPN) toxicity and subcellular localization. We discovered how subtle chemical modifications had profound consequences on the polymer’s accumulation inside the cell and cellular retention. We also examined how complexation of CPN with polysaccharides affects uptake efficiency and subcellular localization. ^ This work also presents how changes to CPN backbone biodegradability can significantly affect the subcellular localization of the material. A series of triphenyl phosphonium-containing CPNs were synthesized and the effect of backbone modifications have on the cellular toxicity and intracellular fate of the material. A mitochondrial-specific polymer exhibiting time-dependent release is reported. Finally, we present a novel polymerization technique which allows for the controlled incorporation of electron-accepting benzothiadiazole units onto the polymer chain. This facilitates tuning CPN emission towards red emission. ^ The work presented here, specifically, the effect that side-chain and structure, polysaccharide formulation and CPN degradability have on material’s uptake behavior, can help maximize the full potential of NP-based delivery vehicles for improved chemotherapeutic drug delivery.^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Chaque année, le piratage mondial de la musique coûte plusieurs milliards de dollars en pertes économiques, pertes d’emplois et pertes de gains des travailleurs ainsi que la perte de millions de dollars en recettes fiscales. La plupart du piratage de la musique est dû à la croissance rapide et à la facilité des technologies actuelles pour la copie, le partage, la manipulation et la distribution de données musicales [Domingo, 2015], [Siwek, 2007]. Le tatouage des signaux sonores a été proposé pour protéger les droit des auteurs et pour permettre la localisation des instants où le signal sonore a été falsifié. Dans cette thèse, nous proposons d’utiliser la représentation parcimonieuse bio-inspirée par graphe de décharges (spikegramme), pour concevoir une nouvelle méthode permettant la localisation de la falsification dans les signaux sonores. Aussi, une nouvelle méthode de protection du droit d’auteur. Finalement, une nouvelle attaque perceptuelle, en utilisant le spikegramme, pour attaquer des systèmes de tatouage sonore. Nous proposons tout d’abord une technique de localisation des falsifications (‘tampering’) des signaux sonores. Pour cela nous combinons une méthode à spectre étendu modifié (‘modified spread spectrum’, MSS) avec une représentation parcimonieuse. Nous utilisons une technique de poursuite perceptive adaptée (perceptual marching pursuit, PMP [Hossein Najaf-Zadeh, 2008]) pour générer une représentation parcimonieuse (spikegramme) du signal sonore d’entrée qui est invariante au décalage temporel [E. C. Smith, 2006] et qui prend en compte les phénomènes de masquage tels qu’ils sont observés en audition. Un code d’authentification est inséré à l’intérieur des coefficients de la représentation en spikegramme. Puis ceux-ci sont combinés aux seuils de masquage. Le signal tatoué est resynthétisé à partir des coefficients modifiés, et le signal ainsi obtenu est transmis au décodeur. Au décodeur, pour identifier un segment falsifié du signal sonore, les codes d’authentification de tous les segments intacts sont analysés. Si les codes ne peuvent être détectés correctement, on sait qu’alors le segment aura été falsifié. Nous proposons de tatouer selon le principe à spectre étendu (appelé MSS) afin d’obtenir une grande capacité en nombre de bits de tatouage introduits. Dans les situations où il y a désynchronisation entre le codeur et le décodeur, notre méthode permet quand même de détecter des pièces falsifiées. Par rapport à l’état de l’art, notre approche a le taux d’erreur le plus bas pour ce qui est de détecter les pièces falsifiées. Nous avons utilisé le test de l’opinion moyenne (‘MOS’) pour mesurer la qualité des systèmes tatoués. Nous évaluons la méthode de tatouage semi-fragile par le taux d’erreur (nombre de bits erronés divisé par tous les bits soumis) suite à plusieurs attaques. Les résultats confirment la supériorité de notre approche pour la localisation des pièces falsifiées dans les signaux sonores tout en préservant la qualité des signaux. Ensuite nous proposons une nouvelle technique pour la protection des signaux sonores. Cette technique est basée sur la représentation par spikegrammes des signaux sonores et utilise deux dictionnaires (TDA pour Two-Dictionary Approach). Le spikegramme est utilisé pour coder le signal hôte en utilisant un dictionnaire de filtres gammatones. Pour le tatouage, nous utilisons deux dictionnaires différents qui sont sélectionnés en fonction du bit d’entrée à tatouer et du contenu du signal. Notre approche trouve les gammatones appropriés (appelés noyaux de tatouage) sur la base de la valeur du bit à tatouer, et incorpore les bits de tatouage dans la phase des gammatones du tatouage. De plus, il est montré que la TDA est libre d’erreur dans le cas d’aucune situation d’attaque. Il est démontré que la décorrélation des noyaux de tatouage permet la conception d’une méthode de tatouage sonore très robuste. Les expériences ont montré la meilleure robustesse pour la méthode proposée lorsque le signal tatoué est corrompu par une compression MP3 à 32 kbits par seconde avec une charge utile de 56.5 bps par rapport à plusieurs techniques récentes. De plus nous avons étudié la robustesse du tatouage lorsque les nouveaux codec USAC (Unified Audion and Speech Coding) à 24kbps sont utilisés. La charge utile est alors comprise entre 5 et 15 bps. Finalement, nous utilisons les spikegrammes pour proposer trois nouvelles méthodes d’attaques. Nous les comparons aux méthodes récentes d’attaques telles que 32 kbps MP3 et 24 kbps USAC. Ces attaques comprennent l’attaque par PMP, l’attaque par bruit inaudible et l’attaque de remplacement parcimonieuse. Dans le cas de l’attaque par PMP, le signal de tatouage est représenté et resynthétisé avec un spikegramme. Dans le cas de l’attaque par bruit inaudible, celui-ci est généré et ajouté aux coefficients du spikegramme. Dans le cas de l’attaque de remplacement parcimonieuse, dans chaque segment du signal, les caractéristiques spectro-temporelles du signal (les décharges temporelles ;‘time spikes’) se trouvent en utilisant le spikegramme et les spikes temporelles et similaires sont remplacés par une autre. Pour comparer l’efficacité des attaques proposées, nous les comparons au décodeur du tatouage à spectre étendu. Il est démontré que l’attaque par remplacement parcimonieux réduit la corrélation normalisée du décodeur de spectre étendu avec un plus grand facteur par rapport à la situation où le décodeur de spectre étendu est attaqué par la transformation MP3 (32 kbps) et 24 kbps USAC.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cable-driven parallel robots offer significant advantages in terms of workspace dimensions and payload capability. They are attractive for many industrial tasks to be performed on a large scale, such as handling and manufacturing, without a substantial increase in costs and mechanical complexity with respect to a small-scale application. However, since cables can only sustain tensile stresses, cable tensions must be kept within positive limits during the end-effector motion. This problem can be managed by overconstraining the end-effector and controlling cable tensions. Tension control is typically achieved by mounting a load sensor on all cables, and using specific control algorithms to avoid cable slackness or breakage while the end-effector is controlled in a desired position. These algorithms require multiple cascade control loops and they can be complex and computationally demanding. To simplify the control of overconstrained cable-driven parallel robots, this Thesis proposes suitable mechanical design and hybrid control strategies. It is shown how a convenient design of the cable guidance system allows kinematic modeling to be simplified, without introducing geometric approximations. This guidance system employs swiveling pulleys equipped with position and tension sensors and provides a parallelogram arrangement of cables. Furthermore, a hybrid force/position control in the robot joint space is adopted. According to this strategy, a particular set of cables is chosen to be tension-controlled, whereas the other cables are length-controlled. The force-controlled cables are selected based on the computation of a novel index called force-distribution sensitivity to cable-tension errors. This index aims to evaluate the maximum expected cable-tension error in the length-controlled cables if a unit tension error is committed in the force-controlled cables. In practice, the computation of the force-distribution sensitivity allows determining which cables are best to be force-controlled, to ensure the lowest error in the overall force distribution when a hybrid force/position joint-space strategy is used.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the last decades, we saw a soaring interest in autonomous robots boosted not only by academia and industry, but also by the ever in- creasing demand from civil users. As a matter of fact, autonomous robots are fast spreading in all aspects of human life, we can see them clean houses, navigate through city traffic, or harvest fruits and vegetables. Almost all commercial drones already exhibit unprecedented and sophisticated skills which makes them suitable for these applications, such as obstacle avoidance, simultaneous localisation and mapping, path planning, visual-inertial odometry, and object tracking. The major limitations of such robotic platforms lie in the limited payload that can carry, in their costs, and in the limited autonomy due to finite battery capability. For this reason researchers start to develop new algorithms able to run even on resource constrained platforms both in terms of computation capabilities and limited types of endowed sensors, focusing especially on very cheap sensors and hardware. The possibility to use a limited number of sensors allowed to scale a lot the UAVs size, while the implementation of new efficient algorithms, performing the same task in lower time, allows for lower autonomy. However, the developed robots are not mature enough to completely operate autonomously without human supervision due to still too big dimensions (especially for aerial vehicles), which make these platforms unsafe for humans, and the high probability of numerical, and decision, errors that robots may make. In this perspective, this thesis aims to review and improve the current state-of-the-art solutions for autonomous navigation from a purely practical point of view. In particular, we deeply focused on the problems of robot control, trajectory planning, environments exploration, and obstacle avoidance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Continuum parallel robots (CPRs) are manipulators employing multiple flexible beams arranged in parallel and connected to a rigid end-effector. CPRs promise higher payload and accuracy than serial CRs while keeping great flexibility. As the risk of injury during accidental contacts between a human and a CPR should be reduced, CPRs may be used in large-scale collaborative tasks or assisted robotic surgery. There exist various CPR designs, but the prototype conception is rarely based on performance considerations, and the CPRs realization in mainly based on intuitions or rigid-link parallel manipulators architectures. This thesis focuses on the performance analysis of CPRs, and the tools needed for such evaluation, such as workspace computation algorithms. In particular, workspace computation strategies for CPRs are essential for the performance assessment, since the CPRs workspace may be used as a performance index or it can serve for optimal-design tools. Two new workspace computation algorithms are proposed in this manuscript, the former focusing on the workspace volume computation and the certification of its numerical results, while the latter aims at computing the workspace boundary only. Due to the elastic nature of CPRs, a key performance indicator for these robots is the stability of their equilibrium configurations. This thesis proposes the experimental validation of the equilibrium stability assessment on a real prototype, demonstrating limitations of some commonly used assumptions. Additionally, a performance index measuring the distance to instability is originally proposed in this manuscript. Differently from the majority of the existing approaches, the clear advantage of the proposed index is a sound physical meaning; accordingly, the index can be used for a more straightforward performance quantification, and to derive robot specifications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The work presented in this thesis aims to contribute to innovation in the Urban Air Mobility and Delivery sector and represents a solid starting point for air logistics and its future scenarios. The dissertation focuses on modeling, simulation, and control of a formation of multirotor aircraft for cooperative load transportation, with particular attention to environmental sustainability. First, a simulation and test environment is developed to assess technologies for suspended load stabilization. Starting from the mathematical model of two identical multirotors, formation-flight-keeping and collision-avoidance algorithms are analyzed. This approach guarantees both the safety of the vehicles within the formation and that of the payload, which may be made of people in the very near future. Afterwards, a mathematical model for the suspended load is implemented, as well as an active controller for its stabilization. The key focus of this part is represented by both analysis and control of payload oscillatory motion, by thoroughly investigating load kinetic energy decay. At this point, several test cases were introduced, in order to understand which strategy is the most effective and safe in terms of future applications in the field of air logistics.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

La sicurezza informatica è la pratica di proteggere i sistemi critici e le informazioni sensibili dagli attacchi digitali. Note anche come sicurezza IT, le misure della sicurezza informatica sono progettate per combattere le minacce contro sistemi in rete e applicazioni, che hanno origine sia all’interno che all’esterno di un’organizzazione. Al giorno d'oggi, la minaccia informatica globale continua a evolversi ad un ritmo rapido, con un numero crescente di violazioni dei dati ogni anno. Lo scopo di questo documento è di offrire inizialmente una panoramica su quelli che sono i contesti della sicurezza informatica e le varie tipologie di attacco, per poi mostrare, attraverso la realizzazione di tre casi d'uso, delle modalità con cui violare la sicurezza di una rete tramite costruzione di pacchetti ARP anomali sfruttando l'utilizzo della libreria Scapy. La prima di queste simulerà una casistica di attacco noto come ARP Spoofing dove si tenta di andare ad avvelenare la tabella ARP di un host. Il secondo caso d'uso genera dei pacchetti ARP anomali con all'interno del payload relativo a datagrammi UDP o segmenti TCP causando un possibile sovraccarico della rete, potendo perciò simulare degli attacchi DoS. Il terzo e ultimo caso d'uso genera uno scambio di informazioni ARP tra host di due LAN differenti attraverso l'uso di pacchetti TCP o UDP creando una specie di tunneling tra i due host. I risultati finali permettono di verificare che tramite l'utilizzo di un semplice protocollo come ARP, si possano in realtà generare nuove modalità con cui minacciare la sicurezza informatica. Questo ci fa quindi dedurre la possibilità di poter creare numerose metodologie di attacco, utilizzando la vastità di protocolli utilizzati nelle reti, confermando che il cybercrimine è sempre in continua evoluzione

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Miniaturized flying robotic platforms, called nano-drones, have the potential to revolutionize the autonomous robots industry sector thanks to their very small form factor. The nano-drones’ limited payload only allows for a sub-100mW microcontroller unit for the on-board computations. Therefore, traditional computer vision and control algorithms are too computationally expensive to be executed on board these palm-sized robots, and we are forced to rely on artificial intelligence to trade off accuracy in favor of lightweight pipelines for autonomous tasks. However, relying on deep learning exposes us to the problem of generalization since the deployment scenario of a convolutional neural network (CNN) is often composed by different visual cues and different features from those learned during training, leading to poor inference performances. Our objective is to develop and deploy and adaptation algorithm, based on the concept of latent replays, that would allow us to fine-tune a CNN to work in new and diverse deployment scenarios. To do so we start from an existing model for visual human pose estimation, called PULPFrontnet, which is used to identify the pose of a human subject in space through its 4 output variables, and we present the design of our novel adaptation algorithm, which features automatic data gathering and labeling and on-device deployment. We therefore showcase the ability of our algorithm to adapt PULP-Frontnet to new deployment scenarios, improving the R2 scores of the four network outputs, with respect to an unknown environment, from approximately [−0.2, 0.4, 0.0,−0.7] to [0.25, 0.45, 0.2, 0.1]. Finally we demonstrate how it is possible to fine-tune our neural network in real time (i.e., under 76 seconds), using the target parallel ultra-low power GAP 8 System-on-Chip on board the nano-drone, and we show how all adaptation operations can take place using less than 2mWh of energy, a small fraction of the available battery power.