Figure - available from: Mathematical Problems in Engineering
This content is subject to copyright. Terms and conditions apply.
Actuator inflation/deflation process.

Actuator inflation/deflation process.

Source publication
Article
Full-text available
An antagonistic pneumatic bidirectional rotary flexible joint was developed to improve both safety and environmental adaptability of service robots and associated human interactions. The joint comprises two semicircular rotary actuators with positive and negative symmetrical distributions and a pneumatic brake. As such, it achieves forward and reve...

Citations

... As an essential connection component between the manipulator and the end gripper, the wrist is mainly used to adjust the position and pose of the gripper and determine the contact state between the target object and the gripper. Its performance directly determines the function and application level of the entire manipulator [1,2]. There are many types of developed wrists, which can be divided into motors [3,4], hydraulics [5,6], linear cylinders [7], shape memory alloy [8,9], and pneumatic artificial muscles (PAMs) [10,11]. ...
... The drum-shaped airbag is a thin-walled, hollow, and highly elastic bladder installed inside the holder. The drum-shaped airbag is made from Dragon Skin 30 liquid silicone by parting casting [1]. ...
Article
Full-text available
A flexible pneumatic wrist with spatial position maintenance function is developed in this paper to settle the matter of insufficient flexibility of the robot wrist and self-braking technology. The wrist is made up of four artificial muscles and a pneumatic spherical brake in parallel, with 2 degrees of freedom. The wrist can realize multidirectional bending and adjust the wrist damping and braking in real time as required to achieve position maintenance. The theoretical model of the wrist bending angle is built based on torque balance. The variation of wrist bending angle and motion trajectory with air pressure is acquired through experiments. Simultaneously, the validity of the bending angle theoretical model is verified experimentally. A normally open pneumatic spherical brake is developed, and the mathematical model of braking torque is built and experimentally validated. Using a 3D dynamic capture system to compare the dynamic characteristics of the wrist under different excitation signals and different damping conditions. The experimental results reveal that the wrist has good flexibility and can achieve the functions of human hand pitch and yaw. The bending angle is 20.72° at 0.34 MPa. The pneumatic spherical brake has the function of spatial multidirection braking, and the braking force is adjustable. The maximum braking torque can reach 1.4 N m at 0.35 MPa.
Article
There is a drastic increase in Internet usage across the globe, thanks to mobile phone penetration. This extreme Internet usage generates huge volumes of data, in other terms, big data. Security and privacy are the main issues to be considered in big data management. Hence, in this article, Attribute-based Adaptive Homomorphic Encryption (AAHE) is developed to enhance the security of big data. In the proposed methodology, Oppositional Based Black Widow Optimization (OBWO) is introduced to select the optimal key parameters by following the AAHE method. By considering oppositional function, Black Widow Optimization (BWO) convergence analysis was enhanced. The proposed methodology has different processes, namely, process setup, encryption, and decryption processes. The researcher evaluated the proposed methodology with non-abelian rings and the homomorphism process in ciphertext format. Further, it is also utilized in improving one-way security related to the conjugacy examination issue. Afterward, homomorphic encryption is developed to secure the big data. The study considered two types of big data such as adult datasets and anonymous Microsoft web datasets to validate the proposed methodology. With the help of performance metrics such as encryption time, decryption time, key size, processing time, downloading, and uploading time, the proposed method was evaluated and compared against conventional cryptography techniques such as Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC). Further, the key generation process was also compared against conventional methods such as BWO, Particle Swarm Optimization (PSO), and Firefly Algorithm (FA). The results established that the proposed method is supreme than the compared methods and can be applied in real time in near future.