Tele-operating system for continuous operation of lunar rover

Author(s):  
Y. Kuroda ◽  
M. Kawanishi ◽  
M. Matsukuma
2020 ◽  
Vol 10 (12) ◽  
pp. 4376
Author(s):  
Takumi Asakura ◽  
Wataru Yashima ◽  
Kouki Suzuki ◽  
Makoto Shimotou

Product delivery via logistic systems is becoming more efficient, rapidly and continuously bringing products to the customer. The continuous operation of logistic equipment, however, can lead to mechanical stoppages due to excessive use. To avoid system failures, fatigue in each part of the system should be monitored, enabling the accurate prediction of potential stoppages and thus promoting overall system efficiency. To date, various kinds of anomaly-detection methodologies have been proposed. Among them, the Mahalanobis–Taguchi method, which simply describes the extent of a failure using the Mahalanobis distance, has been utilized to detect changes in the mechanical condition of facilities. However, the technique has not yet been applied to anomaly detection in a logistic operating system. In this paper, anomaly detection using the Mahalanobis–Taguchi method targeting the operational characteristics of a large-scale vertical transfer system is proposed and the validity of the method is discussed. The calculation used to produce proper values of the Mahalanobis distance is first developed based on simple excitation using a shaker. Mahalanobis distances under conditions of continuous operation of the target vertical transfer system are then obtained; distances for the system in an artificially damaged condition are compared to values produced under normal conditions, and any significant increase is used as an indicator of a problem. The applicability of the approach to a case involving continuous long-term operation is discussed using a simulation in which the target vertical transfer system is in continuous operation over a two-year period.


Electronics ◽  
2020 ◽  
Vol 9 (5) ◽  
pp. 793
Author(s):  
Chanwoong Hwang ◽  
Junho Hwang ◽  
Jin Kwak ◽  
Taejin Lee

Most cyberattacks use malicious codes, and according to AV-TEST, more than 1 billion malicious codes are expected to emerge in 2020. Although such malicious codes have been widely seen around the PC environment, they have been on the rise recently, focusing on IoT devices such as smartphones, refrigerators, irons, and various sensors. As is known, Linux/embedded environments support various architectures, so it is difficult to identify the architecture in which malware operates when analyzing malware. This paper proposes an AI-based malware analysis technology that is not affected by the operating system or architecture platform. The proposed technology works intuitively. It uses platform-independent binary data rather than features based on the structured format of the executable files. We analyzed the strings from binary data to classify malware. The experimental results achieved 94% accuracy on Windows and Linux datasets. Based on this, we expect the proposed technology to work effectively on other platforms and improve through continuous operation/verification.


Author(s):  
E. Wisse ◽  
A. Geerts ◽  
R.B. De Zanger

The slowscan and TV signal of the Philips SEM 505 and the signal of a TV camera attached to a Leitz fluorescent microscope, were digitized by the data acquisition processor of a Masscomp 5520S computer, which is based on a 16.7 MHz 68020 CPU with 10 Mb RAM memory, a graphics processor with two frame buffers for images with 8 bit / 256 grey values, a high definition (HD) monitor (910 × 1150), two hard disks (70 and 663 Mb) and a 60 Mb tape drive. The system is equipped with Imaging Technology video digitizing boards: analog I/O, an ALU, and two memory mapped frame buffers for TV images of the IP 512 series. The Masscomp computer has an ethernet connection to other computers, such as a Vax PDP 11/785, and a Sun 368i with a 327 Mb hard disk and a SCSI interface to an Exabyte 2.3 Gb helical scan tape drive. The operating system for these computers is based on different versions of Unix, such as RTU 4.1 (including NFS) on the acquisition computer, bsd 4.3 for the Vax, and Sun OS 4.0.1 for the Sun (with NFS).


2020 ◽  
Vol 6 (1) ◽  
pp. 1
Author(s):  
Kuswanto Kuswanto ◽  
Juan Junius ◽  
Anita Christine Sembiring

Facility layout is integrated planning of the flow of a product in an operating system to obtain the most effective and efficient interrelation between workers, materials, machinery, and equipment as well as handling and transferring materials. A company engaged in furniture manufacturing has a problem in its production process, namely, the distance between machines is too far so that it affects the cost of handling materials. Distant workstations are found on profile machines, milling machines, measuring machines, cutting machines. Therefore, improvements must be made to the layout of facilities on the production floor so that facility layout is efficient and material handling costs are reduced. The problem-solving approach used is the Graph Method and CRAFT Algorithm. The results of the research show that material handling costs are reduced by 7.58% or Rp. 17,765 using the CRAFT algorithm.


2003 ◽  
Vol 777 ◽  
Author(s):  
J.S. Romero ◽  
A.G. Fitzgerald

AbstractCopper migration is observed in the SEM in amorphous GeSe2/Cu thin films when an electron beam is focused in pulsed or continuous operation on the surface of these thin films. The phenomenon can be explained using a simple model in which the population of D- centers is considered to increase upon electron irradiation. The increase in the D- center population is envisaged as due to the breaking of bonds by the electron radiation and by the constant presence of negative charge in irradiated regions. Changes in copper concentration of 20%-30% have been obtained. Additionally we have observed the local crystallization of amorphous GeSe2/Cu thin films in the TEM when the samples were subjected to intense electron bombardment. The crystalline product has been identified as Berzelianite (Cu2Se).


1987 ◽  
Author(s):  
M. SAKIYAMA ◽  
A. IWATA ◽  
M. YOSHIWA ◽  
R. YOSHIDA ◽  
Y. KAGAYA

Sign in / Sign up

Export Citation Format

Share Document