Conference PaperPDF Available

An industrial application of behavior-oriented robotics

Authors:

Abstract and Figures

The so-called RoboGuard is a mobile security device which is tightly integrated into the existing surveillance framework developed and marketed by Quadrox, a Belgian SME. RoboGuards are semi-autonomous mobile robots providing video streams via wireless Intranets to existing watchguard systems, supplemented by various basic and optional behaviors. RoboGuards fill several market-niches. Especially, they are a serious alternative to the standard approach of using closed circuit television for surveillance. Low production cost, user friendliness, and support for easy add-on functionalities were important design targets, which were achieved by following the AI paradigm of behavior-oriented robotics.
Content may be subject to copyright.
Proceedings of the 2001 IEEE 
International Conference on Robotics & Automation
Seoul, Korea • May 21-26, 2001
0-7803-6475-9/01/$10.00 © 2001 IEEE
749
750
751
path-planning
motion-control
motor-control
strategic
[communication, plausibility checks]
[obstacle-avoidance, short paths]
[vectors, curves, dead-reckoning]
[PID-speed controller]
[drivers, tasks, control-support]
operating system
752
parse packet
compute
control state
send 0x40
compute
correction values
set new
pulsewidth
read quadrature
decoders
update position
and orientation
MC68332 onboard TPU
M M
Channels: ABCDEF
QDEC 1
QDEC 1
QDEC 2
QDEC 2
PWM
PWM
100 Hz IRQ
Motion- and Motor-Control LayersHigher Layers
Cockpit
PC
Application
Transport
Internet
Network
Data Link
Physical
Internet
transmission
Ethernet
Wireless
Ethernet
Wireless
Bridge
Onboard
PC
RoboCube
Serial Port
Data
Serial Port
Inband Handshake
753
754
... The communication between the moving robot and FCC is achieved wirelessly via WiFi. Specifically, the raw images and information collected from the monitoring sites are pre-processed by robots as the edge nodes [25,26,46], and then transmitted to FCC for storage, computing and analysis. It is assumed that a robot can negotiate with the other robot or FCC in the IIoT. ...
... The specific data collection enhancement algorithm of encrypted image is presented as Algorithm 1 below. The location privacy of mobile robots in the collection process of the IIoT [46] is very important, as it lays the basis for positioning and fixed substation location data. The location information obtained by the robot itself is preset in the robot program. ...
Article
Full-text available
To solve the security problems of the moving robot system in the fog network of the Industrial Internet of Things (IIoT), this paper presents a privacy‐preserving data integration scheme in the moving robot system. First, a novel data collection enhancement algorithm is proposed to enhance the image effects, and a k‐anonymous location and data privacy protection protocol based on Ad hoc network (Ad hoc‐based KLDPP protocol) is designed in secure data collection phase to protect the privacy of location and network data. Second, the secure multiparty computation with verifiable key sharing is introduced to realize the valid computation against share cheating in the robot system. Third, the ciphertext classification method in a neural network is considered in the secure data storage process to realize the special application. Finally, experiments and simulations are conducted on the robot system of fog computing in the IIoT. The results demonstrate that the proposed scheme can improve the security and efficiency of the said robot system.
... In the IIoT, numerous nodes are deployed in an edge network to monitor the device status or physical environment (e.g., the working status of a transformer substation) [41]. In this paper, the moving robot system of a transformer substation is taken as the monitor, which will collect and encrypt the image data from the transformer substation and send them to the fog control center (FCC). ...
Article
Full-text available
Deep learning in robot systems is a popular application that can learn and train the results per requirements, but that collects sensitive information in the training process, easily causing leakage of users’ private information. To date, privacy-preserving deep learning models in robot systems have been sparsely researched. To solve the privacy leakage problem of deep learning in robot systems and fill the gap in robotics deep learning privacy research, in this paper a novel privacy-preserving image multi-classification deep-learning (PIDL) model in robot systems is presented. In PIDL, two schemes are proposed that adopt two groups of encrypted activation and cost functions—sigmoid plus cross-entropy function (PIDLSC) and softmax plus log-likelihood function (PIDLSL)—with secure calculation protocols, which are applied in a fog control center (FCC) with a non-colluding honest server by homomorphic encryption to improve the training efficiency, solve the encryption computation questions, and protect data and model privacy in robot systems. Security analysis and performance evaluation demonstrate that the proposed schemes realize security, correctness, and efficiency with low communication and computational costs.
... 10 The Airport Night Surveillance Expert Robot (ANSER) is a system composed of an autonomous mobile robot that uses a non-di®erential GPS to perform night patrols in civilian airports and similar wide outdoor areas. 11 A Robotic Security Guard for remote surveillance of indoor environments has been the focus of a research project at the AASS Learning System Lab. 12 The NCCU Security Warrior is an autonomous humanoid robot for indoors that also can interact with humans, 13 it has two arms and is able to make patrols around prede¯ned routes and put out¯res using its extinguisher. The Knight scope 14 features autonomous motion, autonomous charging, sending live streaming video, and uploading data to the server all the time, its design for outdoors and indoors. ...
Article
Among the possible fields in human society in which robotics can be applied, the possibility of a robotic guard has been imagined since long time. Human guards usually perform a range of tasks in which a robot can provide help. Security personnel not only perform security tasks and patrolling services, but also have to interact with people, providing additional information about the area they safeguard. In this paper, we present the design, development and preliminary tests of RobotMan, an anthropomorphic robot commissioned by a security company that should serve in security roles, such as patrolling large indoor areas and acting as a telepresence platform for the human guards, and guidance roles such as welcoming visitors and providing information. In the preliminary experiment, the new robot and a human guard were employed the roles of security and guidance in a manufacturing center. The results of the experiment collected from 96 participants highlighted differences in participants’ behavior when interacting with the robot rather than the human and a different perception of likeability and authority of the robot depending on subtle differences in its appearance and behavior. These results provide useful indication for the employment of robot guards in a real world situation.
... There is a free I/O address space within PC for adding extension cards or prototype cards, we can mention the I/O address space 300hex to 31Fhex and the address 1B0hex to 1Bfhex, which means, we can add up to 32 I/O cards of 16 bits each [9], [13]- [17]. The interface to this bus is based on an address comparator, as example the TTL circuit 74HCT688, some 8 bits three states latches such as 74HCT573, and some 8 bits three states buffers such as 74HCT245. ...
Conference Paper
In this paper , a microcomputer based approach to retrofit old industrial machines is studied, the old electronic command is based on discrete logic devices or 8 bits microprocessors. The major problems of this design are: no flexibility of the system, risk to loose the operating program stored in EPROM’s, and the cost of maintenance. Three solutions for this type of problem have been investigated, which are the use of a microcontroller, the use of an Industrial Programmable Automata (IPA) , and finally the use of a general purpose Personal Computer(PC). In each solution we provide the advantages and inconvenient, then we choose the best fit solution depending on type of industrial machine. As an application , we renovated an old industrial machine based on 8 bits microprocessor INTEL 8085 where the mechanic, hydraulic , and pneumatic parts are healthy , however the electronic components were defected. Principally, the operating program could have been damaged. We chose the solution based on PC in order to reduce the price of the conception. The input/output cards and the power supply card of the old system
... It is difficult to meet the requirement of increasing the quality of power supply, improve the intelligence of the substation. In this case, the intelligent substation inspection robot was gradually applied to the substation instead of manual inspection [2]. The substation inspection robot is combined with the integrated centralized monitoring system, so that it can periodically inspect the operation of each equipment in the substation and achieve the function of video surveillance, information collection, data detection, intelligent analysis and early detection of security risks in the substation environment. ...
... The RoboGuard, developed using behaviour-oriented robotics, are semiautonomous mobile robots capable of providing video stream to human guards [7]. The Airport Night Surveillance Expert Robot (ANSER) is a system composed of an autonomous mobile robot that uses a non-differential GPS to perform night patrols in civilian airports and similar wide outdoor areas [8]. A Robotic Security Guard for remote surveillance of indoor environments has been the focus of a research project at the AASS Learning System Lab [9]. ...
Conference Paper
Full-text available
Security is one of the possible fields in human society in which robotics can be applied. Human guards usually perform a range of tasks in which a robot can provide help. A security company collaborated with us in the design and development of a robot that should serve in patrolling large indoor areas, interacting with humans, welcoming, providing information, and be a telepresence platform for the human security guards. In this paper we present a preliminary experiment which involved this new robot in two roles: security and guidance. The former being important especially during night, and the latter being common in daytime, when guards are usually interacting with people who ask them information. The results of the experiment with 55 participants showed how the perception of the appearance of the robot and its effectiveness are influenced by its behaviour and its related perceived more authoritative or kinder traits. These results provide useful indication for the employment of robot guards in a real world situation.
Chapter
These sixty contributions from researchers in ethology, ecology, cybernetics, artificial intelligence, robotics, and related fields delve into the behaviors and underlying mechanisms that allow animals and, potentially, robots to adapt and survive in uncertain environments. They focus in particular on simulation models in order to help characterize and compare various organizational principles or architectures capable of inducing adaptive behavior in real or artificial animals. Jean-Arcady Meyer is Director of Research at CNRS, Paris. Stewart W. Wilson is a Scientist at The Rowland Institute for Science, Cambridge, Massachusetts. Bradford Books imprint
Chapter
These sixty contributions from researchers in ethology, ecology, cybernetics, artificial intelligence, robotics, and related fields delve into the behaviors and underlying mechanisms that allow animals and, potentially, robots to adapt and survive in uncertain environments. They focus in particular on simulation models in order to help characterize and compare various organizational principles or architectures capable of inducing adaptive behavior in real or artificial animals. Jean-Arcady Meyer is Director of Research at CNRS, Paris. Stewart W. Wilson is a Scientist at The Rowland Institute for Science, Cambridge, Massachusetts. Bradford Books imprint
Chapter
August 8-12, 1994, Brighton, England From Animals to Animats 3 brings together research intended to advance the front tier of an exciting new approach to understanding intelligence. The contributors represent a broad range of interests from artificial intelligence and robotics to ethology and the neurosciences. Unifying these approaches is the notion of "animat"—an artificial animal, either simulated by a computer or embodied in a robot, which must survive and adapt in progressively more challenging environments. The 58 contributions focus particularly on well-defined models, computer simulations, and built robots in order to help characterize and compare various principles and architectures capable of inducing adaptive behavior in real or artificial animals. Topics Include Individual and collective behavior • Neural correlates of behavior • Perception and motor control • Motivation and emotion • Action selection and behavioral sequences • Ontogeny, learning, and evolution • Internal world models and cognitive processes • Applied adaptive behavior • Autonomous robots • Heirarchical and parallel organizations • Emergent structures and behaviors • Problem solving and planning • Goal-directed behavior • Neural networks and evolutionary computation • Characterization of environments Bradford Books imprint
Chapter
August 8-12, 1994, Brighton, England From Animals to Animats 3 brings together research intended to advance the front tier of an exciting new approach to understanding intelligence. The contributors represent a broad range of interests from artificial intelligence and robotics to ethology and the neurosciences. Unifying these approaches is the notion of "animat"—an artificial animal, either simulated by a computer or embodied in a robot, which must survive and adapt in progressively more challenging environments. The 58 contributions focus particularly on well-defined models, computer simulations, and built robots in order to help characterize and compare various principles and architectures capable of inducing adaptive behavior in real or artificial animals. Topics Include Individual and collective behavior • Neural correlates of behavior • Perception and motor control • Motivation and emotion • Action selection and behavioral sequences • Ontogeny, learning, and evolution • Internal world models and cognitive processes • Applied adaptive behavior • Autonomous robots • Heirarchical and parallel organizations • Emergent structures and behaviors • Problem solving and planning • Goal-directed behavior • Neural networks and evolutionary computation • Characterization of environments Bradford Books imprint
Chapter
From Animals to Animats 4 brings together the latest research at the frontier of an exciting new approach to understanding intelligence. The Animals to Animats Conference brings together researchers from ethology, psychology, ecology, artificial intelligence, artificial life, robotics, engineering, and related fields to further understanding of the behaviors and underlying mechanisms that allow natural and synthetic agents (animats) to adapt and survive in uncertain environments. The work presented focuses on well-defined models—robotic, computer-simulation, and mathematical—that help to characterize and compare various organizational principles or architectures underlying adaptive behavior in both natural animals and animats. Bradford Books imprint
Article
Key system and supporting technology issues associated with the design and development of effective general-purpose unmanned mobile robots for operation in unstructured outdoor environments are examined within the context of an advanced telerobotic mobile system developed by the Naval Ocean Systems Center (NOSC) -- The Unmanned Ground Vehicle Program Teleoperated Vehicle (TOy).