The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2018
DOI: 10.1177/1729881418770011
|View full text |Cite
|
Sign up to set email alerts
|

Robot Operating System 2

Abstract: It is no secret that robotic systems are expanding into many human roles or are augmenting human roles. The Robot Operating System is an open-source standard for the robotic industry that enables locomotion, manipulation, navigation, and recognition tasks by integrating sensors, motors, and controllers into reusable modules over a distributed messaging architecture. As reliance on robotic systems increases, these systems become high value targets, for example, in autonomous vehicles where human life is at risk… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 50 publications
(18 citation statements)
references
References 23 publications
(27 reference statements)
0
9
0
Order By: Relevance
“…In our experiments, the Nengo simulator has been used to implement the system [40]. Our mobile robot is controlled with the Robot Operating System (ROS) [41].…”
Section: Reproducing Fear Conditioning Using Mobile Robotsmentioning
confidence: 99%
“…In our experiments, the Nengo simulator has been used to implement the system [40]. Our mobile robot is controlled with the Robot Operating System (ROS) [41].…”
Section: Reproducing Fear Conditioning Using Mobile Robotsmentioning
confidence: 99%
“…An underlying assumption in many of the sources we reviewed was that computing devices are assumed to be housed within a controlled physical location and managed. Since autonomous robotic systems are not in such an environment, and may be exposed to physical attacks (invasive attacks involving physical manipulations on semiconductors like microprobing, and non-invasive attacks where side channel leakage can occur like power analysis) [20], this assumption is invalid and this type of system will need system level protection. System level protection can range from the highest level of security, tamper protection with countermeasures, to lowest level, evidence of tampering.…”
Section: System Level Trust Evaluationmentioning
confidence: 99%
“…This demonstrates that even a well-known library, like OpenSSL, can be compromised if the physical hardware is compromised. Since, in an autonomous robotic system, nodes may be captured, an assumption of physical security may be invalid [36].…”
Section: Software Level Trust Evaluationmentioning
confidence: 99%
“…The docking method uses the Rive function package of ROS to complete the graphic visualization operation and projects the point cloud obtained by Lidar onto the map established by ROS [7]. Lidar is one of the important devices for sensing the environment and using the principle of Lidar ranging and the controller and scanner to image the position and angle of laser emission.…”
Section: A Implement Of Wheelchair/nursing-bed Automatic Docking Schemementioning
confidence: 99%
“…the wheelchair adjusts its posture, turn both wheels at point D , then we can get(7) and(8).' B and ' C can be obtained from (5) (6) (7) (8).…”
mentioning
confidence: 99%