Search results
1 – 10 of 53Mingge Li, Zhongjun Yin, Xiaoming Huang, Jie Ma and Zhijie Liu
The purpose of this paper is to propose a casting process for the production of double-chamber soft fingers, which avoids the problems of air leakage and fracture caused by…
Abstract
Purpose
The purpose of this paper is to propose a casting process for the production of double-chamber soft fingers, which avoids the problems of air leakage and fracture caused by multistep casting. This proposed method facilitates the simultaneous casting of the inflation chamber and the jamming chamber.
Design/methodology/approach
An integrated molding technology based on the lost wax casting method is proposed for the manufacture of double-chamber soft fingers. The solid wax core is assembled with the mold, and then liquid silicone rubber is injected into it. After cooling and solidification, the mold is stripped off and heated in boiling water, so that the solid wax core melts and precipitates, and the integrated soft finger is obtained.
Findings
The performance and fatigue tests of the soft fingers produced by the proposed method have been carried out. The results show that the manufacturing method can significantly improve the fatigue resistance and stability of the soft fingers, while also avoiding the problems such as air leakage and cracking.
Originality/value
The improvement of the previous multistep casting method of soft fingers is proposed, and the integrated molding manufacturing method is proposed to avoid the problems caused by secondary bonding.
Details
Keywords
Tianlei Wang, Fei Ding and Zhenxing Sun
Stiffness adjusting ability is essential for soft robotic arms to perform complex tasks. A soft state enables dexterous operation and safe interaction, while a rigid state enables…
Abstract
Purpose
Stiffness adjusting ability is essential for soft robotic arms to perform complex tasks. A soft state enables dexterous operation and safe interaction, while a rigid state enables large force output or heavy weight carrying. However, making a compact integration of soft actuators with powerful stiffness adjusting mechanisms is challenging. This study aims to develop a piston-like particle jamming mechanism for enhanced stiffness adjustment of a soft robotic arm.
Design/methodology/approach
The arm has two pairs of differential tendons for spatial bending, and a jamming core consists of four jamming units with particles sealed inside braided tubes for stiffness adjustment. The jamming core is pushed and pulled smoothly along the tendons by a piston, which is then driven by a motor and a ball screw mechanism.
Findings
The tip displacement of the arm under 150 N jamming force and no more than 0.3 kg load is minimal. The maximum stiffening ratio measured in the experiment under 150 N jamming force is up to 6–25 depends on the bending direction and added load of the arm, which is superior to most of the vacuum powered jamming method.
Originality/value
The proposed robotic arm makes an innovative compact integration of tendon-driven robotic arm and motor-driven piston-like particle jamming mechanism. The jamming force is much larger compared to conventional vacuum-powered systems and results in a superior stiffening ability.
Details
Keywords
Radha Subramanyam, Y. Adline Jancy and P. Nagabushanam
Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data…
Abstract
Purpose
Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in wireless sensor network (WSN) and Internet of Things (IoT) applications. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes. Game theory optimization for distributed may increase the network performance. The purpose of this study is to survey the various operations that can be carried out using distributive and adaptive MAC protocol. Hill climbing distributed MAC does not need a central coordination system and location-based transmission with neighbor awareness reduces transmission power.
Design/methodology/approach
Distributed MAC in wireless networks is used to address the challenges like network lifetime, reduced energy consumption and for improving delay performance. In this paper, a survey is made on various cooperative communications in MAC protocols, optimization techniques used to improve MAC performance in various applications and mathematical approaches involved in game theory optimization for MAC protocol.
Findings
Spatial reuse of channel improved by 3%–29%, and multichannel improves throughput by 8% using distributed MAC protocol. Nash equilibrium is found to perform well, which focuses on energy utility in the network by individual players. Fuzzy logic improves channel selection by 17% and secondary users’ involvement by 8%. Cross-layer approach in MAC layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in WSN and IoT applications. Cross-layer and cooperative communication give energy savings of 27% and reduces hop distance by 4.7%. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes.
Research limitations/implications
Other optimization techniques can be applied for WSN to analyze the performance.
Practical implications
Game theory optimization for distributed may increase the network performance. Optimal cuckoo search improves throughput by 90% and reduces delay by 91%. Stochastic approaches detect 80% attacks even in 90% malicious nodes.
Social implications
Channel allocations in centralized or static manner must be based on traffic demands whether dynamic traffic or fluctuated traffic. Usage of multimedia devices also increased which in turn increased the demand for high throughput. Cochannel interference keep on changing or mitigations occur which can be handled by proper resource allocations. Network survival is by efficient usage of valid patis in the network by avoiding transmission failures and time slots’ effective usage.
Originality/value
Literature survey is carried out to find the methods which give better performance.
Details
Keywords
Elizabeth Frieda Ndamono Shipena and Attlee M. Gamundani
Internet of things (IoT) involves the connection of various devices. IoT’s application ranges from wearables: Smart Home Application, Health Care, Smart Offices, Smart Cities…
Abstract
Internet of things (IoT) involves the connection of various devices. IoT’s application ranges from wearables: Smart Home Application, Health Care, Smart Offices, Smart Cities, Agriculture, and Industrial Automation. While the number of connected devices grows by the day, so does the number of security risks and vulnerabilities that these devices face. Billions of the connected devices collect and transmit huge volumes of data making Data Security one of the most pressing technical concerns in IoT. Smart Office is one of the increasing IoT applications and Data Security has become today one of the most challenging areas in its application. It is important to identify data security threats. This chapter therefore presents a review of IoT Smart Office Data Security Threats based on existing research done.
Details
Keywords
Reham Tarek Alnounou, Rawan Ahmed Asiri, Sara Ayman Alhindi, Layan Marwan Shams, Sadia Samar Ali and Eren Özceylan
Saudi Arabia's 2030 vision targets an increase of 34% in non-oil revenue participation in the GDP, thus the need for automation and digital transformation. The Company ER is a…
Abstract
Purpose
Saudi Arabia's 2030 vision targets an increase of 34% in non-oil revenue participation in the GDP, thus the need for automation and digital transformation. The Company ER is a market leader producing high-quality dairy products in the Kingdom and is a pioneer in the production industry. The company has recently increased the capacity of its milk factory to meet its vision. An investment was made to automate the pallet handling procedures at the milk factory to provide increased production for daily consumption. The new automation transition in Company ER's milk factory provides a unique opportunity to utilize lean management tools to improve the current automated processes before commercialization.
Design/methodology/approach
OEE (overall equipment effectiveness) will monitor losses for different operational losses in the new automated system and indicate system improvements, with 85% as the target. Based on DMADV (design, measure, analyze, design and validate) methodology, this study analyzes the entire automated pallet handling system. It uses lean tools to identify areas for improvement, identify waste elements and propose solutions to achieve Company ER's OEE targets.
Findings
In this paper, the outcomes will be presented as documented solutions that address the losses encountered in the production system, showing a 12.8% increase in the system's OEE.
Research limitations/implications
Owing the time and resource constraint, this study only involved automated pallet handling procedures in a milk production facility. Hence, the generalization of the result is slightly limited. More studies in several different processes and sectors are required.
Practical implications
This study provided a valuable tool for researchers for gaining deeper understanding regarding the lean manufacturing and its implementation. For practitioners, it is useful to evaluate the degree of lean manufacturing tools in their material handling systems.
Originality/value
This study is the first attempt to develop lean manufacturing constructs for evaluating the automated pallet handling procedures in a milk production facility.
Details
Keywords
Faisal Lone, Harsh Kumar Verma and Krishna Pal Sharma
The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable…
Abstract
Purpose
The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.
Design/methodology/approach
This paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.
Findings
Despite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.
Originality/value
The proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.
Details
Keywords
The purpose of this research paper is to recover the autonomous flight performance of a mini unmanned aerial vehicle (UAV) via stochastically optimizing the wing over certain…
Abstract
Purpose
The purpose of this research paper is to recover the autonomous flight performance of a mini unmanned aerial vehicle (UAV) via stochastically optimizing the wing over certain parameters (i.e. wing taper ratio and wing aspect ratio) while there are lower and upper constraints on these redesign parameters.
Design/methodology/approach
A mini UAV is produced in the Iskenderun Technical University (ISTE) Unmanned Aerial Vehicle Laboratory. Its complete wing can vary passively before the flight with respect to the result of the stochastic redesign of the wing while maximizing autonomous flight performance. Flight control system (FCS) parameters (i.e. gains of longitudinal and lateral proportional-integral-derivative controllers) and wing redesign parameters mentioned before are simultaneously designed to maximize autonomous flight performance index using a certain stochastic optimization strategy named as simultaneous perturbation stochastic approximation (SPSA). Found results are used while composing UAV flight simulations.
Findings
Using stochastic redesign of mini UAV and simultaneously designing mini ISTE UAV over previously mentioned wing parameters and FCS, it obtained a maximum UAV autonomous flight performance.
Research limitations/implications
Permission of the directorate general of civil aviation in the Republic of Türkiye is essential for real-time UAV autonomous flights.
Practical implications
Stochastic redesign of mini UAV and simultaneously designing mini ISTE UAV wing parameters and FCS approach is very useful for improving any mini UAV autonomous flight performance cost index.
Social implications
Stochastic redesign of mini UAV and simultaneously designing mini ISTE UAV wing parameters and FCS approach succeeds confidence, highly improved autonomous flight performance cost index and easy service demands of mini UAV operators.
Originality/value
Creating a new approach to recover autonomous flight performance cost index (e.g. satisfying less settling time and less rise time, less overshoot during flight trajectory tracking) of a mini UAV and composing a novel procedure performing simultaneous mini UAV having passively morphing wing over certain parameters while there are upper and lower constraints and FCS design idea.
Details
Keywords
The war is pushing innovation on both sides to the limit, forcing each to adapt and adopt the latest in military and civilian technologies. Swift advances have been made in the…
Details
DOI: 10.1108/OXAN-DB283374
ISSN: 2633-304X
Keywords
Geographic
Topical
Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui
The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…
Abstract
The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.
Details
Keywords
This paper presents a survey of research into interactive robotic systems for the purpose of identifying the state of the art capabilities as well as the extant gaps in this…
Abstract
Purpose
This paper presents a survey of research into interactive robotic systems for the purpose of identifying the state of the art capabilities as well as the extant gaps in this emerging field. Communication is multimodal. Multimodality is a representation of many modes chosen from rhetorical aspects for its communication potentials. The author seeks to define the available automation capabilities in communication using multimodalities that will support a proposed Interactive Robot System (IRS) as an AI mounted robotic platform to advance the speed and quality of military operational and tactical decision making.
Design/methodology/approach
This review will begin by presenting key developments in the robotic interaction field with the objective of identifying essential technological developments that set conditions for robotic platforms to function autonomously. After surveying the key aspects in Human Robot Interaction (HRI), Unmanned Autonomous System (UAS), visualization, Virtual Environment (VE) and prediction, the paper then proceeds to describe the gaps in the application areas that will require extension and integration to enable the prototyping of the IRS. A brief examination of other work in HRI-related fields concludes with a recapitulation of the IRS challenge that will set conditions for future success.
Findings
Using insights from a balanced cross section of sources from the government, academic, and commercial entities that contribute to HRI a multimodal IRS in military communication is introduced. Multimodal IRS (MIRS) in military communication has yet to be deployed.
Research limitations/implications
Multimodal robotic interface for the MIRS is an interdisciplinary endeavour. This is not realistic that one can comprehend all expert and related knowledge and skills to design and develop such multimodal interactive robotic interface. In this brief preliminary survey, the author has discussed extant AI, robotics, NLP, CV, VDM, and VE applications that is directly related to multimodal interaction. Each mode of this multimodal communication is an active research area. Multimodal human/military robot communication is the ultimate goal of this research.
Practical implications
A multimodal autonomous robot in military communication using speech, images, gestures, VST and VE has yet to be deployed. Autonomous multimodal communication is expected to open wider possibilities for all armed forces. Given the density of the land domain, the army is in a position to exploit the opportunities for human–machine teaming (HMT) exposure. Naval and air forces will adopt platform specific suites for specially selected operators to integrate with and leverage this emerging technology. The possession of a flexible communications means that readily adapts to virtual training will enhance planning and mission rehearsals tremendously.
Social implications
Interaction, perception, cognition and visualization based multimodal communication system is yet missing. Options to communicate, express and convey information in HMT setting with multiple options, suggestions and recommendations will certainly enhance military communication, strength, engagement, security, cognition, perception as well as the ability to act confidently for a successful mission.
Originality/value
The objective is to develop a multimodal autonomous interactive robot for military communications. This survey reports the state of the art, what exists and what is missing, what can be done and possibilities of extension that support the military in maintaining effective communication using multimodalities. There are some separate ongoing progresses, such as in machine-enabled speech, image recognition, tracking, visualizations for situational awareness, and virtual environments. At this time, there is no integrated approach for multimodal human robot interaction that proposes a flexible and agile communication. The report briefly introduces the research proposal about multimodal interactive robot in military communication.
Details