Covert Robotics: Covert Path Planning

نویسنده

  • Mohamed Marzouqi
چکیده

T s s a target itself. Another example is to guard a secured environment, where it is important to be covert as well as overt at the same time, in this way the chances are higher for the robot to see an intruder before the opposite happens. A covert robot may be used as well for hostage rescue, for example by sending an insect size covert robot with a camera to the hostage area to send images that may lead for better rescuing plan.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Covert Robotics: Covert Path Planning in Unknown Environments

1 Introduction Covert Robotics is an interesting research problem which we have presented earlier in [Marzouqi and Jarvis, 2003; Marzouqi and Jarvis, 2004]. The aim of the research is to create autonomous mobile robots with the ability to accomplish different types of navigation missions covertly, i.e. without being observed by one or more, possibly hostile, sentries operating within the same e...

متن کامل

Distance Transform Based Visibility Measures for Covert Path Planning in Known but Dynamic Environments

The notion of visibility evaluation in known, initially unknown and dynamic obstacle strewn environments is relevant for many robot navigation scenarios and is particularly relevant in covert robot operations where the robot should try and remain hidden from nominated ‘sentry’ points whilst simultaneously finding an efficient path to a goal. This paper presents an elegant way of measuring visib...

متن کامل

Covert contraceptive use: prevalence, motivations, and consequences.

This article examines women's covert use of contraceptives, that is, their use of a method without their husbands' knowledge. Three questions are addressed: (1) How is covert use measured? (2) How prevalent is it? and (3) What are the factors underlying covert use? Existing studies are used together with survey and qualitative data collected in 1997 in an urban setting in Zambia from married wo...

متن کامل

Pathways of embodied simulation

Recently, so called simulation (or emulation) theories [e.g. 1 ch. 9, 2-5] have discovered and embraced, to a greater or lesser degree, the old empiricist and associationist idea that thinking is covert action and perception. In brief, covert action refers to the brain’s ability to reactivate several of the neural processes and structures used to produce an overt action, but without any overt m...

متن کامل

Design of Transport Layer Based Hybrid Covert Channel Detection Engine

Computer network is unpredictable due to information warfare and is prone to various attacks. Such attacks on network compromise the most important attribute, the privacy. Most of such attacks are devised using special communication channel called ``Covert Channel''. The word ``Covert'' stands for hidden or non-transparent. Network Covert Channel is a concealed communication path within legitim...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003