THE INTEGRATION OF A VIRTUAL ENVIRONMENT AND 3D MODELING TOOLS IN A NETWORKED ROBOT SYSTEM

2006 ◽  
Vol 06 (01) ◽  
pp. 65-85
Author(s):  
JIACHENG TAN ◽  
GORDON J. CLAPWORTHY ◽  
IGOR R. BELOUSOV

This paper presents interfacing techniques to integrate a virtual environment (VE), computer graphics, image-based modeling, and other technologies in a networked system for robot control. Technologies such as networked robotics have advanced rapidly in the past decade, bringing a physical aspect to the usage of the Internet. Various applications of Internet telerobotics have been investigated and a variety of techniques have been proposed to increase the control robustness and efficiency of such systems. In this paper, we introduce a teleoperated robot manipulator that uses VE and other supporting technologies as a human-system interface to suppress the variable communication latency of the Internet. The paper focuses on the control techniques and the system structure that supports the implementation of the techniques.

2008 ◽  
Vol 2008 ◽  
pp. 1-9 ◽  
Author(s):  
Peter Quax ◽  
Jeroen Dierckx ◽  
Bart Cornelissen ◽  
Wim Lamotte

The explosive growth of the number of applications based on networked virtual environment technology, both games and virtual communities, shows that these types of applications have become commonplace in a short period of time. However, from a research point of view, the inherent weaknesses in their architectures are quickly exposed. The Architecture for Large-Scale Virtual Interactive Communities (ALVICs) was originally developed to serve as a generic framework to deploy networked virtual environment applications on the Internet. While it has been shown to effectively scale to the numbers originally put forward, our findings have shown that, on a real-life network, such as the Internet, several drawbacks will not be overcome in the near future. It is, therefore, that we have recently started with the development of ALVIC-NG, which, while incorporating the findings from our previous research, makes several improvements on the original version, making it suitable for deployment on the Internet as it exists today.


2012 ◽  
Vol 4 ◽  
pp. 38-42
Author(s):  
Jin Liang Bian

With the Internet spread and deepening of the application, the development of enterprises Internet and e-commerce business has become an inevitable trend. Network security has drawn more and more attention. Therefore, it is necessary to monitor network information real-timely by using an effective information filtering systems in the network security. So the paper discussed the system structure, the estimation methods and key technology of the Network Information Filtering System in the general and in detail.


Author(s):  
Zhiping Wang ◽  
Xinxin Zheng ◽  
Zhichen Yang

The Internet of Things (IoT) technology is an information technology developed in recent years with the development of electronic sensors, intelligence, network transmission and control technologies. This is the third revolution in the development of information technology. This article aims to study the algorithm of the Internet of Things technology, through the investigation of the hazards of athletes’ sports training, scientifically and rationally use the Internet of Things technology to collect data on safety accidents in athletes’ sports training, thereby reducing the risk of athletes’ sports training and making athletes better. In this article, the methods of literature research, analysis and condensing, questionnaire survey, theory and experiment combination, etc., investigate the safety accident data collection of the Internet of Things technology in athletes’ sports training, and provide certain theories and methods for future in-depth research practice basis. The experimental results in this article show that 82% of athletes who are surveyed under the Internet of Things technology will have partial injuries during training, reducing the risk of safety accidents in athletes’ sports training, and better enabling Chinese athletes to achieve a consistent level of competition and performance through a virtuous cycle of development.


Author(s):  
Haiting Huang

In order to explore the application of IoT technology in robots and the promotion of IoT robot technology to the economy, by comparing traditional technology and IoT intelligent robot technology, this article combines it with economic development to analyze the promotion of IoT robot to economic development. Based on the ultra-wideband ranging method, this paper designs an ultra-wideband radio frequency positioning system and applies it to the robot’s positioning process. Moreover, this article combines the application of robots in the current social and economic development to construct the system structure, and conducts functional analysis with manufacturing robots and monitoring robots as the main body. After constructing an intelligent robot based on the Internet of Things technology, by comparing the traditional technology and the intelligent robot technology of the Internet of Things, this article combines it with economic development to analyze the promotion of IoT robot to economic development. From the analysis results of this article, it can be seen that the advancement of IoT robot technology can effectively promote economic development.


Author(s):  
Rekha Bhatia ◽  
Manpreet Singh Gujral

Due to the ever increasing number of web services available through the Internet, the privacy as a fundamental human right is endangered. Informed consent and collection of information are two important aspects while interacting on the Internet through web services. The ease of data access and the ready availability of it through Internet, made it easier for interested parties to intrude into the individual's privacy in unprecedented ways. The regulatory and technical solutions adopted to curb this have achieved only a limited success. The main culprits in this regard are the incompatibilities in the regulatory measures and standards. This research work focuses on privacy preserving access control for sharing sensitive information in the arena of web services, provides some recent outlooks towards the critical need of privacy aware access control technologies and a comprehensive review of the existing work in this arena. Besides, a novel framework for privacy aware access to web services is also provided.


1994 ◽  
Vol 3 (4) ◽  
pp. 255-264 ◽  
Author(s):  
Rich Gossweiler ◽  
Robert J. Laferriere ◽  
Michael L. Keller ◽  
Randy Pausch

This paper is an introductory level tutorial describing how to implement a distributed multiparticipant virtual environment (VE). This tutorial is intended for students who are competent programmers and who now wish to implement a distributed multiparticipant application. We describe the fundamental concepts of distributed computing for multiplayer simulations and provide a concrete example, including C source code available via the Internet. The template program demonstrates a simple multiplayer, distributed application, where each player controls the position of a space ship, and communicates the ship's position data over the network. The template uses broadcast communication and a technique called dead-reckoning to improve performance. We give detailed instructions on how to obtain and modify the template, so that students can quickly create their own distributed applications. We conclude by briefly discussing advanced issues that are important when constructing more sophisticated multiparticipant VEs.


2011 ◽  
Vol 328-330 ◽  
pp. 1322-1325 ◽  
Author(s):  
Xiu Hui Fu ◽  
Shu Li Ouyang

In recent years, internet based telerobotics has become more and more important in our lives and scientific research, there are many scholars dedicated to this research fields, especially the cooperation in the system. So, in order to research the cooperation problems in operator with operator, robot with robot and operator with robot in multi-operator multi-robot teleoperation system, built a two-operator two-robot telecooperation system, realized the two operators control the two robots cooperating with each other to complete items handover respectively. This article has given the solution of the items handover in the cooperative teleoperation system, designed the telecooperation robot system, given the specific experiment process and verified the feasibility of the scheme through the remote cooperation handover experiment. The realization of the system has the very prominent realistic significance, especially provides the experiment platform for the research of the multi-robot telecooperation system.


2005 ◽  
Vol 2005 (1) ◽  
pp. 415-419
Author(s):  
Jill L. Bodnar

ABSTRACT The National Oceanic and Atmospheric Administration (NOAA) Sanctuaries Hazardous Incident Emergency Logistics Database System (SHIELDS) is an Internet-based information system designed to improve access to critical data, plans, and tools for National Marine Sanctuary (NMS) personnel and their partners for contingency planning and response situations. At the core of the SHIELDS project is a website developed for each of the thirteen National Marine Sanctuaries and one coral reef ecosystem reserve in the sanctuary designation process. Each site hosts general planning and response information, such as policies and contingency plans. More so, SHIELDS takes advantage of leading information technology to improve the availability of vital response information and folds it into one comprehensive website. The use of Geographic Information System (GIS) data has expanded from static hardcopy maps to web-based interactive mapping, allowing Internet users to easily examine Sanctuary-specific geographic data from any location. SHIELDS offers NOAA modeling tools to analyze the fate of pollutants and live buoy data for real-time oceanographic conditions. Web-based databases within SHIELDS allow the user to enter or query information on personnel contact and location, potential Sanctuary threats, geographic response plans (GRPs) and Resources and UnderSea Threats (RUST) data, post updated incident text and documentation, or look up response glossary terms. Although SHIELDS relies extensively on the use of the Internet to distribute its information, it has also been designed to work as a stand-alone product for those inevitable circumstances when Internet access is not available during a response. The user can load the SHIELDS webpages and data onto their personal computer and carry it to any remote location to access the same data found on the Internet. SHIELDS provides the most comprehensive incident planning and response information for the National Marine Sanctuary Program (NMSP). This ensures that NOAA fulfills its role as stewards of Sanctuary resources and provides effective and timely response information about their trust resources.


2007 ◽  
Vol 18 (10) ◽  
pp. 1583-1590 ◽  
Author(s):  
LONG GUO ◽  
XU CAI

Around us, the society structure and external field, such as government policy, the newspaper, the internet and other mass media, play a special role in shaping the attitudes, beliefs and public opinion. For studying the role of the society structure and the external field, we propose a new opinion model based on the former models. With computer simulations of opinion dynamics, we find that the smaller the clustering coefficient and the society size, the easier the consensus phase is reached and other interesting results.


Sign in / Sign up

Export Citation Format

Share Document