Search results

1 – 10 of 56
Article
Publication date: 18 May 2020

Zhiyu Ni, Yewei Zhang, Xinhui Shen, Shunan Wu and Zhigang Wu

When a manipulator captures an unknown space object, inertia parameters of endpoint payload should be timely obtained to handle possible unexpected parameter variations and…

Abstract

Purpose

When a manipulator captures an unknown space object, inertia parameters of endpoint payload should be timely obtained to handle possible unexpected parameter variations and monitor the system’s operating conditions. Therefore, this study aims to present an identification method for estimating the inertia parameter of the payload carried by a flexible two-link space manipulator.

Design/methodology/approach

The original nonlinear dynamics model of the manipulator is linearized at a selected working point. Subsequently, the system modal frequencies with and without payload are determined using the subspace identification algorithm, and the difference of these frequencies is computed. Furthermore, by adjusting the structural configuration of the manipulator, multiple sets of frequency differences are obtained. Therefore, the inertia parameters of the payload, i.e. the mass and the moment of inertia, can be derived from the frequency differences by solving a least-squares problem.

Findings

The proposed method can effectively estimate the payload parameters and has satisfactory identification accuracy.

Practical implications

The approach’s implementation provides a practical reference for determining inertia parameters of an unknown space target in the capture process.

Originality/value

The study proposes a novel method for identifying the inertia parameters of the payload of a flexible two-link space manipulator using the estimated system frequencies.

Details

Aircraft Engineering and Aerospace Technology, vol. 92 no. 6
Type: Research Article
ISSN: 1748-8842

Keywords

Article
Publication date: 12 June 2007

Sarandis Mitropoulos, Dimitrios Patsos and Christos Douligeris

Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by corresponding…

1987

Abstract

Purpose

Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by corresponding mechanisms within an organization. However, these systems currently lack the capability of producing and enforcing response policies, mainly due to their limited incident response (IR) functionality. This paper explores the nature of SIMs while proposing a set of requirements that could be satisfied by SIMs for the efficient and effective handling of security incidents.

Design/methodology/approach

These requirements are presented in a high‐level architectural concept and include policy visualization, system intelligence to enable automated policy management, as well as, data mining elements for inspection, evaluation and enhancements of IR policies.

Findings

A primitive mechanism that could guarantee the freshness and accuracy of state information that SIMs provide in order to launch solid response alarms and actions for a specific incident or a series of incidents is proposed, along with a role based access control administrative model (ARBAC) based on a corporate model for IR. Basic forensic and trace‐back concepts that should be integrated into SIMs in order to provide the rich picture of the IR puzzle are also examined.

Practical implications

The support of policy compliance and validation tools to SIMs is also addressed.

Originality/value

The aforementioned properties could greatly assist in automating the IR capability within an organization.

Details

Information Management & Computer Security, vol. 15 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 December 1997

Keith Antonelli and Guy Immega

From elephant trunks to octopus legs and human tongues, nature abounds with tentacles that are adept at manipulation. Kinetic Sciences Inc. has developed a robotic tentacle that…

Abstract

From elephant trunks to octopus legs and human tongues, nature abounds with tentacles that are adept at manipulation. Kinetic Sciences Inc. has developed a robotic tentacle that moves like an organic tentacle and extends and contracts with independently controlled bending and compliance in two or more regions. Remote tendon‐driven actuation keeps actuator mass away from the manipulator for impressive strength‐to‐weight performance. Customizable in length and diameter, and optionally available with wrist‐rotate, gripper, and computer control, the KSI Tentacletm has broad potential for a variety of teleoperated or automated applications including vacuuming, spray washing, general materials handling, agricultural harvesting, robotic refuelling, inspection, and endoscopy. The KSI Tentacletm manipulator is suited to low‐cost mass‐production, and thus can be considered a “disposable robot”.

Details

Industrial Robot: An International Journal, vol. 24 no. 6
Type: Research Article
ISSN: 0143-991X

Keywords

Article
Publication date: 7 April 2015

George Exarchakos, Luca Druda, Vlado Menkovski and Antonio Liotta

This paper aims to argue on the efficiency of Quality of Service (QoS)-based adaptive streaming with regards to perceived quality Quality of Experience (QoE). Although QoS…

456

Abstract

Purpose

This paper aims to argue on the efficiency of Quality of Service (QoS)-based adaptive streaming with regards to perceived quality Quality of Experience (QoE). Although QoS parameters are extensively used even by high-end adaptive streaming algorithms, achieved QoE fails to justify their use in real-time streaming videos with high motion. While subjective measurements of video quality are difficult to be applied at runtime, objective QoE assessment can be easier to automate. For end-to-end QoS optimization of live streaming of high-motion video, objective QoE is a more applicable approach. This paper contributes to the understanding of how specific QoS parameters affect objective QoE measurements on real-time high-motion video streaming.

Design/methodology/approach

The paper approached the question through real-life and extensive experimentation using the Skype adaptive mechanisms. Two Skype terminals were connected through a QoS impairment box. A reference video was used as input to one Skype terminal and streamed on one direction. The impairment box was stressing the stream with different conditions. Received video was stored and compared against the reference video.

Findings

After the experimental analysis, the paper concludes that adaptive mechanisms based on QoS-related heuristics fail to follow unexpected changes to stream requirements. High-motion videos are an example of this variability, which makes the perceived quality sensitive to jitter more than to packet loss. More specifically, Skype seems to use if-else heuristics to decide its behavior to QoS changes. The weaknesses to high-motion videos seem to lie on this rigidity.

Research limitations/implications

Due to the testbed developed, the results may be different if experiments are run over networks with simultaneous streams and a variety of other traffic patterns. Finally, other streaming clients and algorithms would contribute to a more reliable generalization.

Practical implications

The paper motivates video streaming engineers to emphasize their efforts toward QoE and end-to-end optimization.

Originality/value

The paper identifies the need of a generic adaptive streaming algorithm able to accommodate a big range of video characteristics. The effect of QoS variability to high-motion video streaming helps in modeling and design.

Details

International Journal of Pervasive Computing and Communications, vol. 11 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Abstract

Details

Transforming Information Security
Type: Book
ISBN: 978-1-83909-928-1

Article
Publication date: 21 January 2022

Jie Li, Chenyang Yin, Yunde Shi, Suya Dai and Xingsong Wang

Periodic inspection of bridge cables is essential, and cable-climbing robots can replace human workers to perform risky tasks and improve inspection efficiency. However, cable…

Abstract

Purpose

Periodic inspection of bridge cables is essential, and cable-climbing robots can replace human workers to perform risky tasks and improve inspection efficiency. However, cable inspection robots often fail to surmount large obstacles and cable clamps. The purpose of this paper is to develop a practical cable inspection robot with stronger obstacle-surmounting performance and circumferential rotation capability.

Design/methodology/approa/ch

A cable inspection robot with novel elastic suspension mechanisms and circumferential rotation mechanisms is designed and proposed in this study. The supporting force and spring deformation of the elastic suspension are investigated and calculated. Dynamic analysis of obstacle surmounting and circumferential rotation is performed. Experiments are conducted on vertical and inclined cables to test the obstacle-surmounting performance and cable-clamp passing of the robot. The practicality of the robot is then verified in field tests.

Findings

With its elastic suspension mechanisms, the cable inspection robot can carry a 12.4 kg payload and stably climb a vertical cable. The maximum heights of obstacles surmounted by the driving wheels and the passive wheels of the robot are 15 mm and 13 mm, respectively. Equipped with circumferential rotation mechanisms, the robot can flexibly rotate and successfully pass cable clamps.

Originality/value

The novel elastic suspension mechanism and circumferential rotation mechanism improve the performance of the cable inspection robot and solve the problem of surmounting obstacles and cable clamps. Application of the robot can promote the automation of bridge cable inspection.

Details

Industrial Robot: the international journal of robotics research and application, vol. 49 no. 5
Type: Research Article
ISSN: 0143-991X

Keywords

Article
Publication date: 9 March 2015

Eugene Ferry, John O Raw and Kevin Curran

The interoperability of cloud data between web applications and mobile devices has vastly improved over recent years. The popularity of social media, smartphones and cloud-based…

2093

Abstract

Purpose

The interoperability of cloud data between web applications and mobile devices has vastly improved over recent years. The popularity of social media, smartphones and cloud-based web services have contributed to the level of integration that can be achieved between applications. This paper investigates the potential security issues of OAuth, an authorisation framework for granting third-party applications revocable access to user data. OAuth has rapidly become an interim de facto standard for protecting access to web API data. Vendors have implemented OAuth before the open standard was officially published. To evaluate whether the OAuth 2.0 specification is truly ready for industry application, an entire OAuth client server environment was developed and validated against the speciation threat model. The research also included the analysis of the security features of several popular OAuth integrated websites and comparing those to the threat model. High-impacting exploits leading to account hijacking were identified with a number of major online publications. It is hypothesised that the OAuth 2.0 specification can be a secure authorisation mechanism when implemented correctly.

Design/methodology/approach

To analyse the security of OAuth implementations in industry a list of the 50 most popular websites in Ireland was retrieved from the statistical website Alexa (Noureddine and Bashroush, 2011). Each site was analysed to identify if it utilised OAuth. Out of the 50 sites, 21 were identified with OAuth support. Each vulnerability in the threat model was then tested against each OAuth-enabled site. To test the robustness of the OAuth framework, an entire OAuth environment was required. The proposed solution would compose of three parts: a client application, an authorisation server and a resource server. The client application needed to consume OAuth-enabled services. The authorisation server had to manage access to the resource server. The resource server had to expose data from the database based on the authorisation the user would be given from the authorisation server. It was decided that the client application would consume emails from Google’s Gmail API. The authorisation and resource server were modelled around a basic task-tracking web application. The client application would also consume task data from the developed resource server. The client application would also support Single Sign On for Google and Facebook, as well as a developed identity provider “MyTasks”. The authorisation server delegated authorisation to the client application and stored cryptography information for each access grant. The resource server validated the supplied access token via public cryptography and returned the requested data.

Findings

Two sites out of the 21 were found to be susceptible to some form of attack, meaning that 10.5 per cent were vulnerable. In total, 18 per cent of the world’s 50 most popular sites were in the list of 21 OAuth-enabled sites. The OAuth 2.0 specification is still very much in its infancy, but when implemented correctly, it can provide a relatively secure and interoperable authentication delegation mechanism. The IETF are currently addressing issues and expansions in their working drafts. Once a strict level of conformity is achieved between vendors and vulnerabilities are mitigated, it is likely that the framework will change the way we access data on the web and other devices.

Originality/value

OAuth is flexible, in that it offers extensions to support varying situations and existing technologies. A disadvantage of this flexibility is that new extensions typically bring new security exploits. Members of the IETF OAuth Working Group are constantly refining the draft specifications and are identifying new threats to the expanding functionality. OAuth provides a flexible authentication mechanism to protect and delegate access to APIs. It solves the password re-use across multiple accounts problem and stops the user from having to disclose their credentials to third parties. Filtering access to information by scope and giving the user the option to revoke access at any point gives the user control of their data. OAuth does raise security concerns, such as defying phishing education, but there are always going to be security issues with any authentication technology. Although several high impacting vulnerabilities were identified in industry, the developed solution proves the predicted hypothesis that a secure OAuth environment can be built when implemented correctly. Developers must conform to the defined specification and are responsible for validating their implementation against the given threat model. OAuth is an evolving authorisation framework. It is still in its infancy, and much work needs to be done in the specification to achieve stricter validation and vendor conformity. Vendor implementations need to become better aligned in order to provider a rich and truly interoperable authorisation mechanism. Once these issues are resolved, OAuth will be on track for becoming the definitive authentication standard on the web.

Details

Information & Computer Security, vol. 23 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 8 January 2018

Miel Vander Sande, Ruben Verborgh, Patrick Hochstenbach and Herbert Van de Sompel

The purpose of this paper is to detail a low-cost, low-maintenance publishing strategy aimed at unlocking the value of Linked Data collections held by libraries, archives and…

1020

Abstract

Purpose

The purpose of this paper is to detail a low-cost, low-maintenance publishing strategy aimed at unlocking the value of Linked Data collections held by libraries, archives and museums (LAMs).

Design/methodology/approach

The shortcomings of commonly used Linked Data publishing approaches are identified, and the current lack of substantial collections of Linked Data exposed by LAMs is considered. To improve on the discussed status quo, a novel approach for publishing Linked Data is proposed and demonstrated by means of an archive of DBpedia versions, which is queried in combination with other Linked Data sources.

Findings

The authors show that the approach makes publishing Linked Data archives easy and affordable, and supports distributed querying without causing untenable load on the Linked Data sources.

Research limitations/implications

The proposed approach significantly lowers the barrier for publishing, maintaining, and making Linked Data collections queryable. As such, it offers the potential to substantially grow the distributed network of queryable Linked Data sources. Because the approach supports querying without causing unacceptable load on the sources, the queryable interfaces are expected to be more reliable, allowing them to become integral building blocks of robust applications that leverage distributed Linked Data sources.

Originality/value

The novel publishing strategy significantly lowers the technical and financial barriers that LAMs face when attempting to publish Linked Data collections. The proposed approach yields Linked Data sources that can reliably be queried, paving the way for applications that leverage distributed Linked Data sources through federated querying.

Details

Journal of Documentation, vol. 74 no. 1
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 18 May 2015

Oualid Araar, Nabil Aouf and Jose Luis Vallejo Dietz

This paper aims to present a new vision-based approach for both the identification and the estimation of the relative distance between the unmanned aerial vehicle (UAV) and power…

Abstract

Purpose

This paper aims to present a new vision-based approach for both the identification and the estimation of the relative distance between the unmanned aerial vehicle (UAV) and power pylon. Autonomous power line inspection using small UAVs, has been the focus of many research works over the past couple of decades. Automatic detection of power pylons is a primary requirement to achieve such autonomous systems. It is still a challenging task due to the complex geometry and cluttered background of these structures.

Design/methodology/approach

The identification solution proposed, avoids the complexity of classic object recognition techniques. Instead of searching the whole image for the pylon template, low-level geometric priors with robust colour attributes are combined to remove the pylon background. The depth estimation, on the other hand, is based on a new concept which exploits the ego-motion of the inspection UAV to estimate its distance from the pylon using just a monocular camera.

Findings

An algorithm is tested on a quadrotor UAV, using different kinds of metallic power pylons. Both simulation and real-world experiments, conducted in different backgrounds and illumination conditions, show very promising results.

Research limitations/implications

In the real tests carried out, the Inertial Navigation System (INS) of the vehicle was used to estimate its ego-motion. A more reliable solution should be considered for longer distances, by either fusing INS and global positioning system data or using visual navigation techniques such as visual odometry.

Originality/value

A simple yet efficient solution is proposed that allows the UAV to reliably identify the pylon, with still a low processing cost. Considering a monocular solution is a major advantage, given the limited payload and processing power of such small vehicles.

Details

Industrial Robot: An International Journal, vol. 42 no. 3
Type: Research Article
ISSN: 0143-991X

Keywords

Article
Publication date: 4 January 2016

Yue Zhang, Cheng Wei, Dong Pan and Yang Zhao

– The purpose of this paper is to provide an accurate dynamic model for the flexible cable capture mechanism and to analyze the dynamic characteristics in the capturing process.

Abstract

Purpose

The purpose of this paper is to provide an accurate dynamic model for the flexible cable capture mechanism and to analyze the dynamic characteristics in the capturing process.

Design/methodology/approach

The absolute nodal coordinate formulation (ANCF) that based on the continuum mechanics approach is applied in the capture task using flexible cables. An ANCF cable element in which axial and bending strain energy are taken into account is presented to model the flexible cables. The generalized coordinates of ANCF are absolute displacements and slopes and make no small deformation assumptions; therefore, this element has a remarkable superiority in the large rotation and deformation analysis of flexible cables compared to the conventional floating frame of reference formulation (FFRF). The mass matrix of the cable element is constant, which will reduce the degree of non-linearity of the dynamic equations. The contact force between the steel cables and capture rod is calculated by the non-linear contact dynamic model, in which material and geometry properties of contact bodies are considered.

Findings

The stress distribution of steel cables is investigated in the numerical studies which show that the closer to the ends of the cable, the larger axial forces and smaller bending moments they will be. The reduction of grasping velocity will lead to a decrease in the contact force and the oversize peak value of contact force is more likely to be avoided when reducing the elastic modulus of steel cables to obtain a greater soft capture capability.

Practical implications

The work shows a practical possibility to improve modeling accuracy of the capture mechanism. Results of the analyses can provide references for the design and analysis of the capture task.

Originality/value

The ANCF is first used in the analysis of the capture task with flexible cables, and some useful results which have not been published before are obtained.

Details

Aircraft Engineering and Aerospace Technology: An International Journal, vol. 88 no. 1
Type: Research Article
ISSN: 0002-2667

Keywords

1 – 10 of 56