scholarly journals An Introduction to Swarm Robotics

ISRN Robotics ◽  
2013 ◽  
Vol 2013 ◽  
pp. 1-10 ◽  
Author(s):  
Iñaki Navarro ◽  
Fernando Matía

Swarm robotics is a field of multi-robotics in which large number of robots are coordinated in a distributed and decentralised way. It is based on the use of local rules, and simple robots compared to the complexity of the task to achieve, and inspired by social insects. Large number of simple robots can perform complex tasks in a more efficient way than a single robot, giving robustness and flexibility to the group. In this article, an overview of swarm robotics is given, describing its main properties and characteristics and comparing it to general multi-robotic systems. A review of different research works and experimental results, together with a discussion of the future swarm robotics in real world applications completes this work.

2020 ◽  
Vol 5 (49) ◽  
pp. eabe4385
Author(s):  
Marco Dorigo ◽  
Guy Theraulaz ◽  
Vito Trianni

Swarm robotics will tackle real-world applications by leveraging automatic design, heterogeneity, and hierarchical self-organization.


Robotica ◽  
2012 ◽  
Vol 31 (3) ◽  
pp. 345-359 ◽  
Author(s):  
Jan Carlo Barca ◽  
Y. Ahmet Sekercioglu

SUMMARYWe present a review of recent activities in swarm robotic research, and analyse existing literature in the field to determine how to get closer to a practical swarm robotic system for real world applications. We begin with a discussion of the importance of swarm robotics by illustrating the wide applicability of robot swarms in various tasks. Then a brief overview of various robotic devices that can be incorporated into swarm robotic systems is presented. We identify and describe the challenges that should be resolved when designing swarm robotic systems for real world applications. Finally, we provide a summary of a series of issues that should be addressed to overcome these challenges, and propose directions for future swarm robotic research based on our extensive analysis of the reviewed literature.


Inventions ◽  
2021 ◽  
Vol 6 (3) ◽  
pp. 49
Author(s):  
Zain-Aldeen S. A. Rahman ◽  
Basil H. Jasim ◽  
Yasir I. A. Al-Yasir ◽  
Raed A. Abd-Alhameed ◽  
Bilal Naji Alhasnawi

In this paper, a new fractional order chaotic system without equilibrium is proposed, analytically and numerically investigated, and numerically and experimentally tested. The analytical and numerical investigations were used to describe the system’s dynamical behaviors including the system equilibria, the chaotic attractors, the bifurcation diagrams, and the Lyapunov exponents. Based on the obtained dynamical behaviors, the system can excite hidden chaotic attractors since it has no equilibrium. Then, a synchronization mechanism based on the adaptive control theory was developed between two identical new systems (master and slave). The adaptive control laws are derived based on synchronization error dynamics of the state variables for the master and slave. Consequently, the update laws of the slave parameters are obtained, where the slave parameters are assumed to be uncertain and are estimated corresponding to the master parameters by the synchronization process. Furthermore, Arduino Due boards were used to implement the proposed system in order to demonstrate its practicality in real-world applications. The simulation experimental results were obtained by MATLAB and the Arduino Due boards, respectively, with a good consistency between the simulation results and the experimental results, indicating that the new fractional order chaotic system is capable of being employed in real-world applications.


2021 ◽  
Vol 336 ◽  
pp. 06013
Author(s):  
Jizhaxi Dao ◽  
Zhijie Cai ◽  
Rangzhuoma Cai ◽  
Maocuo San ◽  
Mabao Ban

Corpus serves as an indispensable ingredient for statistical NLP research and real-world applications, therefore corpus construction method has a direct impact on various downstream tasks. This paper proposes a method to construct Tibetan text classification corpus based on a syllable-level processing technique which we refer as TC_TCCNL. Empirical evidence indicates that the algorithm is able to produce a promising performance, which may lay a starting point for research on Tibetan text classification in the future.


Author(s):  
Bruce H. Thomas

Entertainment systems are one of the successful utilisations of augmented reality technologies to real world applications. This chapter provides my personal insights into the future directions of the use of augmented reality with gaming applications. This chapter explores a number of advances in technologies that may enhance augmented reality gaming. The features for both indoor and outdoor augmented reality are examined in context of their desired attributes for the gaming community. A set of concept games for outdoor augmented reality are presented to highlight novel features of this technology.


2012 ◽  
Vol 569 ◽  
pp. 343-346
Author(s):  
Xiang Hong Wang ◽  
Hong Wei Hu ◽  
Zhi Yong Zhang

Received acoustic emission (AE) signals are transmitted across structural interfaces in many real-world applications. This paper studies attenuation of the signals across two common structural interfaces. The experimental results indicate that interface has effects on attenuation, which depends on the relative scales of structures. Signal energy is strengthened due to multiple flections of signals on the small-size structure when an interface is constructed by different scales. Thus the received signals are distorted worse than the original signals. So it is a better way to mount sensors on a simple structure with a size as much as a structure incurred AE sources.


2017 ◽  
Vol 1 (2) ◽  
pp. 76-90 ◽  
Author(s):  
Jassim Happa ◽  
Michael Goldsmith

Purpose Several attack models attempt to describe behaviours of attacks with the intent to understand and combat them better. However, all models are to some degree incomplete. They may lack insight about minor variations about attacks that are observed in the real world (but are not described in the model). This may lead to similar attacks being classified as the same type of attack, or in some cases the same instance of attack. The appropriate solution would be to modify the model or replace it entirely. However, doing so may be undesirable as the model may work well for most cases or time and resource constraints may factor in as well. This paper aims to explore the potential value of adding information about attacks and attackers to existing models. Design/methodology/approach This paper investigates used cases of minor variations in attacks and how it may and may not be appropriate to communicate subtle differences in existing attack models through the use of annotations. In particular, the authors investigate commonalities across a range of existing models and identify where and how annotations may be helpful. Findings The authors propose that nuances (of attack properties) can be appended as annotations to existing attack models. Using annotations appropriately should enable analysts and researchers to express subtle but important variations in attacks that may not fit the model currently being used. Research limitations/implications This work only demonstrated a few simple, generic examples. In the future, the authors intend to investigate how this annotation approach can be extended further. Particularly, they intend to explore how annotations can be created computationally; the authors wish to obtain feedback from security analysts through interviews, identify where potential biases may arise and identify other real-world applications. Originality/value The value of this paper is that the authors demonstrate how annotations may help analysts communicate and ask better questions during identification of unknown aspects of attacks faster,e.g. as a means of storing mental notes in a structured manner, especially while facing zero-day attacks when information is incomplete.


2010 ◽  
Vol 09 (06) ◽  
pp. 873-888 ◽  
Author(s):  
TZUNG-PEI HONG ◽  
CHING-YAO WANG ◽  
CHUN-WEI LIN

Mining knowledge from large databases has become a critical task for organizations. Managers commonly use the obtained sequential patterns to make decisions. In the past, databases were usually assumed to be static. In real-world applications, however, transactions may be updated. In this paper, a maintenance algorithm for rapidly updating sequential patterns for real-time decision making is proposed. The proposed algorithm utilizes previously discovered large sequences in the maintenance process, thus greatly reducing the number of database rescans and improving performance. Experimental results verify the performance of the proposed approach. The proposed algorithm provides real-time knowledge that can be used for decision making.


Robotica ◽  
2019 ◽  
Vol 37 (12) ◽  
pp. 2011-2013
Author(s):  
Qining Wang ◽  
Nicola Vitiello ◽  
Samer Mohammed ◽  
Sunil Agrawal

While initially conceived for human motion augmentation, wearable robots have gradually evolved as technological aids in motion assistance and rehabilitation. There are increasing real-world applications in industrial and medical scenarios. Though efforts have been made on wearable robotic systems, e.g. robotic prostheses and exoskeletons, there are still several challenges in kinematics and actuation solutions, dynamic analysis and control of human-robot systems, neuro-control and human-robot interfaces; ergonomics and human-in-the-loop optimization. Meanwhile, real-world applications in industrial or medical scenarios are facing difficulties considering effectiveness.


2017 ◽  
Vol 14 (4) ◽  
pp. 172988141772078 ◽  
Author(s):  
Seda Kul ◽  
Süleyman Eken ◽  
Ahmet Sayar

Traffic surveillance cameras are widely used in traffic management and information systems. Processing streaming media in real time is resource and time-consuming processes and even impossible to realize in most real-world applications. To overcome the performance problems in such applications, this article introduces a middleware system based on pub/sub messaging protocol and a dispatcher to preprocess the streams in real time. Experimental results show that proposed middleware may be utilized in different areas such as infrastructure planning, traffic management, and prevention of traffic offenses.


Sign in / Sign up

Export Citation Format

Share Document