The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, the demand for safer vehicles has increased. According to traffic accident reports prepared by the Metropolitan Police Department in Japan, almost all traffic accidents are caused by human errors such as driver negligence or operational mistakes. Therefore, future technologies need to be able to precisely detect driver's mistakes and adopt active control in order to increase vehicle...
This paper describes an extended manipulability measure for robot arm based on bi-articular muscle principle. There are several manipulability measures for serial link manipulator. However they can not be applied for manipulators which has animal-like actuator alignment. Bi-articular muscle is an unique actuator of animals. It connects two joints and drives both simultaneously. Conventional measures...
A new traction control which utilizes the maximum transmissible torque estimation (MTTE) scheme to execute the anti-slip control of electric vehicles is proposed in this study. Since the function of embedded knowledge mechanism, the chassis velocity and information about tire-road conditions is unnecessary. A closed-loop observer with disturbance estimation performance is employed to enhance the steering...
Wireless power transfer is required for the diffusion of Electric Vehicles (EVs) because it makes possible the process of automatically charging EVs. The technology of wireless power transfer requires three main elements: large air gaps, high efficiency and a large amount of power. Though, there has been no such technology, recently, the technology of electromagnetic resonant couplings was proposed...
Active front steering (AFS) is an effective technique to stabilize motion control such as direct yaw control (DYC) for vehicle. However, if AFS intervenes excessively during the steering process, it becomes difficult to resolve the interference between driver steering and automatic steering by AFS. As a result, vehicles are at present rarely equipped with AFS. We propose a reactive torque control...
In this paper, we introduce a novel DC-DC converterless ultracapacitor electric vehicle (EV) and propose methods to cope with voltage variation of ultracapacitor. In general capacitor applications, a DC-DC converter is used to suppress ultracapacitor's voltage variation. In the case of the proposed EV, the ultracapacitor storage system is directly connected to an inverter for the purpose of weight,...
This paper suggests two advantages of the biarticular muscle which has been said to play an important role in human's motion control; one is stiffness direction stabilization of an end effector which results in stabilization of the posture, and the other is inertia matrix diagonalization in the dynamics of a robot manipulator. In order to analyze these characteristics, we adopt three-pair six-muscle...
Traffic security is one of the most important problems to be improved for our daily environment, especially in Japan. Surveillance systems are effectively used to observe intrusion into dangerous and security area. They are well evaluated to monitor whether people enter such an area or not. A remote surveillance system has been developed, which supports users of mobile phones to facilitate network...
This paper describes a novel design of robot arm and its experimental verification. The proposed robot arm has a bi-articular driving mechanism. The bi-articular driving mechanism drives both shoulder and elbow joints simultaneously like a bi-articular muscles of animals. The mechanism is built by timing belt and pulleys. The proposed robot arm mimics human upper arm with 3 DC motors working as three...
This paper suggests control algorithm for a robot manipulator which has biarticular muscle torque input in addition to the conventional two monoarticular muscle torques. Using a modified Jacobian matrix which is based on the absolute angle of two joints, we derive simple relationship between an endpoint force/position and three muscle torques. Based on this relationship a feedback controller is developed...
This paper develops an automated tool for generating the student's course schedule. A lot of students course schedule are manually generated based on syllabus information, such as class title, summary and categories written by the teachers. However, at a large number of classes, it is very exhaustive to manually generate the course schedule forthe students, due to various constraint condition or criteria...
We address secure secret key distribution in wireless communication systems. There is the secrecy capacity concept that it can distribute information which the third parties can not eavesdrop because of the noise over the distribution channel. Then, we address secure secret key distribution in wireless communication systems using secrecy capacity concept. Wireless channel is noisier compared with...
Intrusion detection system records worm's signature, and detects the attack that lurks in traffic based on it. However, to detect the worm that corrects, and changes some oneself, a highly accurate detection technique for distinguishing the code that seems to be the worm included in traffic is requested. In this paper, we pay attention to the Toth et al.'s method to extract the executable code included...
In P2P systems, it is important to guarantee the efficiency and security of message routing between the source and the destination. Unfortunately, malicious attackers can easily insert a lot of nodes they controlled, and disturb the message routing between honest nodes. In order to counter such attacks, secure routing protocols which ensure successful message routing are needed. Furthermore, it is...
In this paper we compare four risk analysis methods: Mehari, Magerit, NIST800-30 and Microsoft's Security Management Guide. Mehari is a method for risk analysis and risk management developed by CLUSIF (Club de la Securite del' Information Francais). Magerit is a risk analysis and management methodology for information systems developed by CSAE (Consejo Superior de Administracion Electronica). NIST800-30...
This paper presents a versatile recognition processor that performs detection and recognition of image, video, sound and acceleration signals, while dissipating 0.15 muW/fps to 0.47 mW/fps. Given the low power dissipation of sub-mW/fps, this processor is suitable for use in portable electronics and wireless sensor networks (WSN). For instance, it detects human faces from a QVGA image with 81% accuracy...
Increasing demand for higher display resolution, greater color data depth, and narrower frame has resulted in increased requirements for higher data rates between the host controller and multiple display driver ICs through fewer transmission channels. To meet these requirements, a clock-embedded interface for LCD displays is presented in this paper. Only one pair of differential 2.0Gb/s serial data...
A motor control strategy for an input-split hybrid electric vehicle (HEV) is proposed. From a power characteristic analysis, it is found that the powertrain efficiency decreases for speed ratios at which power circulation occurs. Using dynamic models of an input-split HEV powertrain, a motor-generator control algorithm for obtaining high system efficiency is designed by inversion-based control. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.