Posts

How to calculate a robot’s forward kinematics in 5 easy steps

Image
Calculating the forward kinematics is often a vital first step to using a new robot in research. While there are some good tutorials available online, up until now there hasn’t been a simple step-by-step guide for calculating forward kinematics. In this post, we provide a simple guide along with some tips on calculating the kinematics of any robotic manipulator. Calculating kinematics is a cornerstone skill for robotics engineers.  Kinematics can sometimes be a pain, however, being told to “go and calculate the Forward Kinematics” is almost robotics research shorthand for “go and get familiar with this robot”. It’s the vital first step when using any new robot in research, particularly for manipulators. Even though I had learned the theory of kinematics in university, it wasn’t until I had calculated various kinematic solutions for a few real research robots that the whole process started to feel intuitive. Even then, because I was not calculating kinematics e...

Robots at #ERW2015: From imagination to market

Image
Bridging the gap between cutting-edge research in academia and the vibrant robotics startup ecosystem is no easy task. This Wednesday in the UK city of Bristol, a free public event titled “From Imagination to Market” — the centre piece of European Robotics Week 2015 — took on that challenge by bringing together leading innovators, researchers, startups and strategists. Below are the key moments and insights from the event. Organised by euRobotics AISBL (which represents robotics stakeholders in Europe) and the Bristol Robotics Laboratory (BRL — one of the largest facilities of its kind in Europe), this event was packed insight, stories and advice. The day kicked off with an introduction to robots in science fiction by Michael Szollosy and a look at the field of RoboLaw by Andrea Bertolini, before taking a deep dive into the BRL’s state-of-the art research on swarms, human-robot interaction and soft robo...

ROBOTIC TECHNOLOGY FOR COAL MINING

Image
Mining for resources hidden under the surface of the earth has never been a job devoid of hazards. You can start with the fact the it’s under the earth, and there’s no natural light, and the spaces can get tiny so it’s clearly not a job even for the mildly claustrophobic. Then there’s the danger of cave-ins that do happen even with all the modern marvels that we have access to thanks to advances in structural engineering. When it comes to coal mining, however, the danger is several times greater due to added danger of highly flammable gases in certain parts. Other than the Japanese using them for what basically amounts to some amusing (robotic pets), and some disconcerting (robots that look like creepy versions of children or grown women, etc) toys, the use of robotic technology has almost overwhelmingly been either to go where man hasn’t or cannot go, or in some other cases to augment human ability to do what was hitherto very difficult. We have robotic rover vehicles landing on...

Bosch's Giant Robot Can Punch Weeds to Death

Image
At  IROS last month , researchers from a Bosch startup called Deepfield Robotics presented a paper on “Vision-Based High-Speed Manipulation for Robotic Ultra-Precise Weed Control,” which has like four distinct exciting-sounding phrases in it. We wanted to write about it immediately, but Deepfield asked us to hold off a bit until their fancy new website went live, which it now has. This means that we can show you video of their enormous agricultural robot that can autonomously detect and physically obliterate individual weeds in a tenth of a second. The stamping tool is 1 centimeter wide, and it drives weeds about 3 cm into the soil. It’s designed to detect (through leaf shape) and destroy small weeds that have just sprouted, although for larger weeds, it can hammer them multiple times in a row with a cycle time of under 100 ms. Testing on a real carrot crop, which has carrots spaced about 2 cm apart and an average of 20 weeds per meter growing very close to the ca...

HoloLens needs more work, but using it with 'Minecraft' is so damn cool

Image
Before going any further, let's be clear: HoloLens is clearly unfinished. You'll see a decent deal of enthusiasm below, but the head-mounted display (HMD) in its current form is in no way ready for mass consumption. It's the eye-opening possibilities these early HoloLens experiences deliver that drive much of the excitement. What  is  this thing? HoloLens is an augmented reality visor. Unlike virtual reality, which plunges the player into a private, immersive experience with the help of a completely enclosed headset, AR devices provide what amounts to a personal heads-up display. Unlike VR, you can see the world in front of you. An AR headset's lenses are best thought of as miniature see-through displays that throw computer-generated imagery on top of what your eyes would normally see. In its present state, an extremely limited field of view is the biggest limitation facing HoloLens. Imagine a small movie screen positioned inches awa...

How to hack Windows 10 password in less than 5 minutes

Image
Windows 10 Password Crack via Command Prompt Command Prompt (command shell or cmd.exe) is another free application in Windows operating system that can help you when you forgot Windows 10 password. Just run the application. Note : To use Command Prompt to reset password, you need to have another account to login as an administrator. Click "Start" and type "command" in the search box. Right-click on Command Prompt and "Run as administrator". Type "net user Username New password" in Command Prompt as below. Hit Enter. #microsoft #windows10 #password #hack #crack #infizeal

Veracrypt with PIM | Extra Security Added

Image
Encrypting your sensitive data is important. As you may know, CIA... C onfidentiality I ntegrity A vailability ...are the essential elements of Information Security. There are a number of tools and methods available out there, but not all encryption tools are same. VeraCrypt , a TrueCrypt alternative, is an open source file encryption software designed to protect your online privacy. VeraCrypt enters the market within months after  TrueCrypt died , almost similar to it, but with enhancements to further secure your data. A week ago, latest version VeraCrypt 1.12 released with a new feature called PIM, which stands for " Personal Iterations Multiplier ".PIM (Personal Iterations Multiplier) is a new parameter introduced in  VeraCrypt 1.12  to secure your data. Your Password is being used to mount the encrypted container or partition, whereas… PIM value will decide the number of iterations, or in simple term, the speed of the mounting and ...

Kali Linux 2.0 Unleashed | Most Powerful OS

Image
Offensive Security , the creators of Swiss army knife for Security researchers, Penetration testers and Hackers have finally released the much awaited and most powerful version of  Kali Linux 2.0 . Kali Linux 2.0 (Codename ‘Kali Sana’) , an open-source penetration testing platform brings hundreds of Penetration Testing, Forensics, Hacking and Reverse Engineering tools together into a Debian-based Linux distribution. Kali Linux 2.0 offers a redesigned user interface for streamlined work experience, along with a new multi-level menus and tool categories options. Kali Linux 2.0 is now a rolling distribution, means users will receive tools and core system updates frequently. Kali Linux 2.0 Features: Runs on Linux kernel 4.0,  use full Gnome 3 Desktop instead of gnome-fallback,  improved hardware and wireless driver coverage,  support for a variety of Desktop Environments,  updated desktop environment and tools,  Featuring new c...