摘要:
An automatic assembly apparatus or robot holds a pin in an instrumented gripper, moves open loop to the "detection region" in which airflow forces, primarily lateral forces, in the vicinity of the hole may be dependably sensed. Relatively large lateral airflow forces in the detection region are sensed and the pin is moved toward the hole. The airflow forces exhibit an abrupt force change as the pin reaches the insertion point within the "capture region" of the hole defined by the mechanical chamfer or significantly extended as a result of the virtual chamfer of airflow through the hole. The insertion point is the point where lateral X,Y force vectors balance to a null, where Z force readings change from complex X,Y,Z force vectors to simple Z force vectors. The controller commands an open loop move to place the pin within the detection region; then commands a closed loop move, using a skirt around the pin or the pin itself as a probe, and sampling the force vectors until the insertion point is detected; then commands a move in the Z direction to put the pin into the hole. Insertion success or failure is detected by sampling the Z force vectors for blockage by the plate, or by sampling pressure as the pin plugs the hole. Retry routines follow detection of any insertion failure.
摘要:
A network file system and method wherein a storage area network Universal File System allows any host in a heterogeneous based storage area network to read or write data as if in its native format. Any host coupled to the storage area network may be configured to access any storage device on the storage area network. By augmenting the operating system of a host, the host is enabled to mount the Universal File System. Subsequent to mounting the Universal File System, a host may read data from and write data to the Universal File System.
摘要:
A computer-utilizing security system and method involving a collection of personally selected strong-reaction sensory and/or historical multimedia-type cues in combination with a related set of structured information. The cue combination is submitted by one or more individuals to be authorized to access a secure environment, so that when a multimedia cue along with a set of queries contained in and regarding the related information are presented for gaining entry to the secured environment, an authorized individual may readily respond to the queries with correct reactions based on strong personal recall.
摘要:
A recovery logging method wherein when a node in a computer network becomes unavailable, file systems which require verification and are locked are logged in a recovery log and checking of other file systems continues. In this manner, the host node effectively utilizes time which would otherwise be spent waiting for a file system to become available. Upon completing available file system verifications, those file systems which were logged are checked for availability via background processing. When a logged file system becomes available, it is then verified. During the time spent waiting for a logged file system to become available, the affected node is available for other processing.
摘要:
A boat portage dolly for a boat that includes mounting gudgeons (30) on the transom (34), the dolly having a bifurcated carriage (20) with downwardly distending legs (22) attached to an upright frame member (24). The upright member also contains a pair of apertures (28) and an axle (36) is attached between the distal end of the legs. A wheel (40), preferably including a pneumatic tire, is rotatably mounted on the axle. The dolly is mated to the boat by placing the apertures over the gudgeons and penetrating holes in the gudgeons with a bent rod (44) that is contiguous with the inner surface of the carriage, holding the dolly in place tightly against the transom of the boat. The boat is portaged to water by lifting the bow by a single person and wheeling the vessel wheelbarrow fashion. Other embodiments change construction techniques of the carriage and retaining means.
摘要:
A method for constructing the Minkowski sum and derivative morphological combinations of arbitray polyhedra uses operations supported in current CAD/CAM systems. The method has application to three-dimensional modeling of very large scale integrated (VLSI) circuits, their design and simulation of fabrication, and to automated mechanical assembly. The method also has application to n-dimensional modeling in robotics as well as other applications of CAD/CAM systems. In one aspect, an exact Minkowski sum of two polyhedra is obtained by a generalization of sweeping a face along an edge. More generally, according to a second aspect, the Minkowski sum of two polyhedra is computed as the union of linear translational sweeps enabled by the first aspect. The method implements techniques and formulas which greatly reduces the overall cost of the computation of Minkowski sums and, in particular, avoids computations involving non-transversal polyhedra. In a third aspect, the method reduces the difficulty of computing the Minkowski sum of a convex polyhedron and a general polyhedron by using simpler surrogate sets for the convex polyhedron.