THE LEADING EDGE FIRE FIGHTING ROBOT - A STUDY
نویسندگان
چکیده
منابع مشابه
Neural network control for a fire-fighting robot
The paper dis cusses the development of an associative, neural network as an on-line algorithm to train and control a fire-fighting robot. Learning is externally supervised with encoded target actions. The robot acquires basic navigation skills as well as the ability to detect a fire and to extinguish it. _____________________________________
متن کاملVirtual Reality Simulation of Fire Fighting Robot Dynamic and Motion
This paper presents one approach in designing a Fire Fighting Robot which has been contested annually in a robotic student competition in many countries following the rules initiated at the Trinity College. The approach makes use of computer simulation and animation in a virtual reality environment. In the simulation, the amount of time, starting from home until the flame is destroyed, can be c...
متن کاملMultiple Robot Path Planning Strategies for Bush Fire Fighting
This paper addresses path planning strategies for multiple robots to cooperate to extinguish a many fronted bush fire where the need to deliver adequate water to each fire front and for each vehicle to carry a limited supply of water is taken into account, as is the time to extinguish each fire front, whose ferocity is proportional to the quantity of water required (estimated) to extinguish it....
متن کاملFire-fighting Robot International Competitions: Education through Interdisciplinary Design
2 Igor M. Verner, Department of Education in Technology and Science, Technion – Israel Institute of Technology, Haifa 32000, Israel, [email protected] Abstract -This paper introduces the Trinity College FireFighting Home Robot Contest (TCFFHRC), evaluates the curricular impact of the contest at university and highschool levels, and provides examples of student projects inspired by...
متن کاملDoS: Fighting Fire with Fire
We consider DoS attacks on servers in which attackers’ requests are indistinguishable from legitimate requests. Most current defenses against this class of attack rely on legitimate users in aggregate having more of some resource (CPU cycles, memory cycles, human attention, etc.) than attackers. A server so defended asks prospective clients to prove their legitimacy by spending some of this res...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Engineering Applied Sciences and Technology
سال: 2020
ISSN: 2455-2143
DOI: 10.33564/ijeast.2020.v05i02.054