position state
Recently Published Documents


TOTAL DOCUMENTS

27
(FIVE YEARS 9)

H-INDEX

5
(FIVE YEARS 2)

2021 ◽  
Vol 9 (1) ◽  
pp. 1-5
Author(s):  
Stephen Raj. S ◽  
Sripriya. P

These techniques introduce eye position state and it is parameter as a feasible means of sleepiness recognition. It has been recommended that an increase of eye sleepy state might indicates sleepiness. Thus this method can be used to caution the driver’s risk if driver drives the vehicle. These suggestion were derived from investigative an example of driver’s in attentive and sleepy situation. The gadget evaluate is base on tracking of the eye retina pupil (circular area) to calculate rate of eye sleepy condition. In this research study, individual change in the path of growing sleepiness from a drivers’ eye retina is examined. Data analysis study is interest on the improvement of a prepared display of sleepiness based on an arrangement of eye white and eye black measure values. This will use very accurate operational indicator of drowsiness. However, the main constraint of measure is that driver’s may not show this eye state until they are purely sleepy and/or weaken.


2021 ◽  
Vol 336 ◽  
pp. 02014
Author(s):  
Ying Xiong ◽  
Xuehua Tang ◽  
Congcong Shi ◽  
Yang Yang

For now, many hospitals that require nurses to move patients by hand from stretchers to a hospital bed, so a design of stretcher with auxiliary functions of lateral positioning and transferring for immobilized patients, which is a mechanical mechanism consisted of rigid rods, joints and sliders, was designed to help the nurses to move patients between beds and reduce their workload. Driven by motors, the rigid rods can be rotated, stretched or shortened so that the entire stretcher bed board can archive to a proper posture and position. In this paper, the following objectives will be achieved: (i) Create a schematic of the mechanism and describe the principles and functions (ii) the calculation of inverse kinematics, forward kinematics, dynamics (including energy), and PD control in the mechanism (iii) The motion process of simulating the mechanism using MATLAB (iv) Using MATLAB to create the plots of angle, torque, and position state (v) Using SolidWorks to construct the prototype and to implement the motion simulation of the mechanism (vi) Describe the practical application and future Extensions of this mechanism.


2020 ◽  
Vol 9 (3) ◽  
pp. 307-326 ◽  
Author(s):  
Felix Odartey-Wellington ◽  
Amin Alhassan ◽  
Sarah MacRae

Following the 2017 killing of Maxwell Adam Mahama by a lynch mob in Ghana, this article engages with the subject of lynching in Ghana through a content analysis of newsmedia items relating to the practice. While reactions to Mahama’s killing invite optimism that lynching as a form of instant (in)justice is being problematized in Ghana, this study leads to a less optimistic position. State, media and public responses to Mahama’s killing were compared vis-à-vis similar killings of two police officers ‐ Jerry Wornoo and Richard Owusu-Sekyere ‐ in 1998. Drawing on the relevant literature, this study concluded that a number of factors combined to make Mahama, Wornoo and Owusu-Sekyere ‘newsworthy victims’. In contrast, victims in several lynching cases reported by Ghanaian media between 1999 and May 2017 were not deemed newsworthy, thus attracting less attention. Consequently, there have been missed opportunities following the Wornoo and Owusu-Sekyere killings to make critical systemic interventions in Ghana to prevent lynching. Hence, it is argued, the mere sensationalization of Mahama’s lynching may not trigger the requisite systemic social change. Recommendations are made to harness the momentum from Mahama’s killing to address instant (in)justice.


Robotics ◽  
2020 ◽  
Vol 9 (3) ◽  
pp. 74
Author(s):  
Kai Zhang ◽  
Ruizhen Gao ◽  
Jingjun Zhang

This paper presents an obstacle-avoidance trajectory tracking method based on a nonlinear model prediction, with a dynamic environment considered in the trajectory tracking of nonholonomic mobile robots for obstacle avoidance. In this method, collision avoidance is embedded into the trajectory tracking control problem as a nonlinear constraint of the position state, which changes with time to solve the obstacle-avoidance problem in dynamic environments. The CasADi toolkit was used in MATLAB to generate a real-time, efficient C++ code with inequality constraints to avoid collisions. Trajectory tracking and obstacle avoidance in dynamic and static environments are trialed using MATLAB and CasADi simulations, and the effectiveness of the proposed control algorithm is verified.


Author(s):  
Elena Frolova

The Canadian healthcare system is an industry that Canadians are rightfully proud of, and it ranks among the world’s leading healthcare systems (ranked 16th by Bloomberg). This sector is almost 100% state-funded, but every citizen is obliged to pay a medical care tax that is rather significant. As a result, every Canadian is entitled to equal healthcare, regardless of his or her financial position. State-guaranteed medical services are paid from the state foundations that accumulate insurance pools from the provincial tax revenues under the statutory health insurance program. All Canadian residents have a special plastic Health Card they are obliged to show in each medical institution they make recourse to. This card can also serve as an identity document. Pensioners are entitled to a Health 65Card with a wider range of services. Canadian healthcare is provided free of charge, with the exception of certain areas, such as dentistry, cosmetology, and ophthalmology. The majority (actually, more than a half) of medical practitioners are family doctors, and every Canadian has the right to choose a family doctor irrespective of his or her residential address.


2019 ◽  
Vol 2019 ◽  
pp. 1-15 ◽  
Author(s):  
Dongdong Peng ◽  
Tian Zhou ◽  
Chao Xu ◽  
Wanyuan Zhang ◽  
Jiajun Shen

Terrain-aided navigation is a promising approach to submerged position updates for autonomous underwater vehicles by matching terrain measurements against an underwater reference map. With an accurate prediction of tidal depth bias, a two-dimensional point mass filter, only estimating the horizontal position, has been proven to be effective for terrain-aided navigation. However, the tidal depth bias is unpredictable or predicts in many cases, which will result in the rapid performance degradation if a two-dimensional point mass filter is still used. To address this, a marginalized point mass filter in three dimensions is presented to concurrently estimate and compensate the tidal depth bias in this paper. In the method, the tidal depth bias is extended as a state variable and estimated using the Kalman filter, whereas the horizontal position state is still estimated by the original two-dimensional point mass filter. With the multibeam sonar, simulation experiments in a real underwater digital map demonstrate that the proposed method is able to accurately estimate the tidal depth bias and to obtain the robust navigation solution in suitable terrain.


2019 ◽  
Vol 2019 ◽  
pp. 1-11 ◽  
Author(s):  
Fute Shang ◽  
Buhong Wang ◽  
Fuhu Yan ◽  
Tengyao Li

Location verification is a promising approach among various ADS-B security mechanisms, which can monitor announced positions in ADS-B messages with estimated positions. Based on common assumption that the attacker is equipped with only a single device, this mechanism can estimate the position state through analysis of time measurements of messages using multilateration algorithm. In this paper, we propose the formal model of multidevice false data injection attacks in the ATC system against the location verification. Assuming that attackers equipped with multiple devices can manipulate the ADS-B messages in distributed receivers without any mutual interference, such attacker can efficiently construct attack vectors to change the results of multilateration. The feasibility of a multidevice false data injection attack is demonstrated experimentally. Compared with previous multidevice attacks, the multidevice false data injection attacks can offer lower cost and more covert attacks. The simulation results show that the proposed attack can reduce the attackers’ cost by half and achieve better time synchronization to bypass the existing anomaly detection. Finally, we discuss the real-world constraints that limit their effectiveness and the countermeasures of these attacks.


Sign in / Sign up

Export Citation Format

Share Document