Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 2 of 2 matches in All Departments
This book constitutes the refereed proceedings of the First Robotic Grasping and Manipulation Challenge, RGMC 2016, held at IROS 2016, Daejeon, South Korea, in October 2016.The 13 revised full papers presented were carefully reviewed and are describing the rules, results, competitor systems and future directions of the inaugural competition. The competition was designed to allow researchers focused on the application of robot systems to compare the performance of hand designs as well as autonomous grasping and manipulation solutions across a common set of tasks. The competition was comprised of three tracks that included hand-in-hand grasping, fully autonomous grasping, and simulation.
NIST Special Publication 800-82. This document provides guidance for establishing secure industrial control systems (ICS). These ICS, which include supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations such as skid-mounted Programmable Logic Controllers (PLC) are often found in the industrial control sectors. ICS are typically used in industries such as electric, water and wastewater, oil and natural gas, transportation, chemical, pharmaceutical, pulp and paper, food and beverage, and discrete manufacturing (e.g., automotive, aerospace, and durable goods.) SCADA systems are generally used to control dispersed assets using centralized data acquisition and supervisory control. DCS are generally used to control production systems within a local area such as a factory using supervisory and regulatory control. PLCs are generally used for discrete control for specific applications and generally provide regulatory control. These control systems are vital to the operation of the U.S. critical infrastructures that are often highly interconnected and mutually dependent systems. It is important to note that approximately 90 percent of the nation's critical infrastructures are privately owned and operated. Federal agencies also operate many of the ICS mentioned above; other examples include air traffic control and materials handling (e.g., Postal Service mail handling.) This document provides an overview of these ICS and typical system topologies, identifies typical threats and vulnerabilities to these systems, and provides recommended security countermeasures to mitigate the associated risks. National Institute of Standards and Technology. U.S. Department of Commerce.
|
You may like...
Jurassic Park Trilogy Collection
Sam Neill, Laura Dern, …
Blu-ray disc
(1)
R311 Discovery Miles 3 110
|