autonomousrobot.dev


#Autonomous Robot Development Meta


#Path planning


#Motion planning


#Benchmarking


#ROS Control Framework


#Multi-query planners


#Single-query planners


#Near-optimal planners


#Trajectory Optimization


#Search Based Planning Library


#Stochastic Trajectory Optimization


#Covariant Hamiltonian Optimization


#Dynamic Motion Primitives


#Thunder and Lightning algorithms


#Planning Scenes


#Collision aware planning


#Virtual maps of the environment


#Collision checking


#Flexible Collision Library


#Point Cloud Library


#6 degrees of freedom


#7 degrees of freedom


#Built Robotics


#Kryon Systems


#Anybotics | Autonomous inspection robotics


#Inverse kinematics


#Bluepoint Robotics


#Inverse Jacobian method


#Gradient projection method


#Mantis Robotics


#Legged Robots


#Machine Learning Engine


#Heuristic method


#Robot configuration


#Overlapping (shared) joints


#Stack of tasks


#Particle swarm optimization


#Position controller


#Velocity controller


#Force controller


#Libraries for generating target grasp


#Neural network for converting camera data to grasp poses


#Pre-Grasp, Grasp, Post-Grasp evaluation with heuristic pruning


#Manipulation pipeline development


#3D Perception


#Bounding convex decompositions of meshes


#LIDAR


#Object detection


#Image segmentation


#Deep neural network


#Simultaneous Localization and Mapping


#Point cloud segmentation


#Point cloud alignment


#Probabilistic model for visual perception


#Visual-inertial odometry


#Intrinsic camera calibration


#Extrinsic camera calibration


#Visual servoing tracking of objects for manipulation


#ROS Navigation stack


#3D headsets


#Solidworks​ ​assembly​ ​files


#CAD​ ​files


#​URDF​ ​specifications


#Actuator


#ROS​ ​Control


#Geometric fabrics


#1550nm LiDAR | Advantages: safety, range, and performance in various environmental conditions | Enhanced Eye Safety: absorbed more efficiently by cornea and lens of eye, preventing light from reaching sensitive retina | Longer Detection Range | Improved Performance in Adverse Weather Conditions such as as fog, rain, or dust | Reduced Interference from Sunlight and Other Light Sources | More expensive due to complexity and lower production volumes of their components


#SLAM | Simultaneous Localization and Mapping


#Vector database


#Multi-task robot agent


#Robot fleet


#Resistive RAM (ReRAM) technology | onsemi Treo platform to provide embedded non-volatile memory | ReRAM integration into Bipolar CMOS DMOS (BCD) process | Potential alternative to flash memory | Demand for faster, more efficient, and scalable memory solutions increasing | Lower power consumption | Less vulnerable to common hacking tactics | ReRAM can be integrated easily into chip designs without interfering with power analog components


#A-list celebrity home protector | Burglaries targeting high-end items | Burglary report on Lime Orchard Road | Burglar had smashed glass door of residence | Ransacked home and fled | Couple were not home at the time | Unknown whether any items were taken | Lime Orchard Road is within Hidden Valley gated community of Los Angeles in Beverly Hills | Penelope Cruz, Cameron Diaz, Jennifer Lawrence, Adele and Katy Perry have purchased homes there, in addition to Kidman and Urban | Kidman and Urban bought their home for $4.7 million in 2008 | 4,100-square-foot, five-bedroom home built in 1965 and sits on 1¼-acre lot | Property large windows have views of the canyons | Theirs is one of several celebrity properties burglarized in Los Angeles and across country recently | Connected to South American organized-theft rings


#Professional athlete home protector | South American crime rings | Targeting wealthy Southern California neighborhoods for sophisticated home burglaries | Behind burglaries at homes of professional athletes and celebrities | Theft groups conduct extensive research before plotting burglaries | Monitoring target whereabouts and weekly routines via social media | Tracking travel and schedules | Conducting physical surveillance at homes | Attacks staged while targets and their families are away | Robbers aware of where valuables are stored in homes prior to staging break-ins | Burglaries conducted in short amount of time | Bypass alarm systems | Use Wi-Fi jammers to block Wi-Fi connections | Disable devices | Cover security cameras | Obfuscate identities