Patent classifications
B25J11/002
DEPLOYABLE ROBOTIC ARM
A robotic arm system comprising a deployment system or a base, a first joint, and a manipulator coupled to the deployment system or base at the first joint and movable relative to the deployment link or base about the first joint. The manipulator includes a manipulator link, a second joint coupled to the manipulator link distal from the first joint, an elevation linkage coupled to the manipulator link at the second joint, a wrist coupled to the elevation linkage distal from the second joint, and an end effector coupled to the wrist. The end effector can change elevation via the elevation link without changing orientation.
Teleoperated Robotic System with Impact Responsive Force Feedback
A teleoperated robotic system that includes master control arms, slave arms, and a mobile platform. In use, a user manipulates the master control arms to control movement of the slave arms. The teleoperated robotic system can include two master control arms and two slave arms. The master control arms and the slave arms can be mounted on the platform. The platform can provide support for the master control arms and for a teleoperator, or user, of the robotic system. Thus, a mobile platform can allow the robotic system to be moved from place to place to locate the slave arms in a position for use. Additionally, the user can be positioned on the platform, such that the user can see and hear, directly, the slave arms and the workspace in which the slave arms operate.
SYSTEMS AND METHODS FOR USE OF AUTONOMOUS ROBOTS FOR PERIMETER PROTECTION
Systems and methods for use of autonomous robot for perimeter protection may include a security system configured to receive, from a security device, a security signal, and detect a security event occurred based on the security signal, in response to the security signal being received. The security system may determine a security location for an autonomous mobile machine to perform a security task, in response to the security event being detected, and transmit, to the autonomous mobile machine, first instructions for the autonomous mobile machine to move to the security location to perform the security task.
REMOTE-CONTROLLED VEHICLE FOR OPERATIONS IN THE EXTREME CONDITIONS
In this invention it is disclosed a remote-controlled vehicle for operations in the extreme conditions (10) which comprises a base vehicle (100), a gripper (200), a manipulator arm (300), a mission module wherein base vehicle comprises front (110) and rear part (120), wherein on the front part of the base vehicle gripper is mounted and on the rear part of the base vehicle the manipulator arm is mounted and when in operation, the gripper and the manipulator arm are remotely operated. Also, it is disclosed whole system for remote operations comprising said remote-controlled vehicle and a control centre comprising a set of graphical user interfaces (GUI) and video displays (VD) arranged so that two way communication between the vehicle and control centre is established and wherein from GUI person can control and operate with the vehicle.
Mounting a sensor module to an unmanned ground vehicle
An unmanned ground vehicle includes a main body, a drive system supported by the main body, a manipulator arm pivotally coupled to the main body, and a sensor module. The drive system includes right and left driven track assemblies mounted on right and left sides of the main body. The manipulator arm includes a first link coupled to the main body, an elbow coupled to the first link, and a second link coupled to the elbow. The elbow is configured to rotate independently of the first and second links. The sensor module is mounted on the elbow.
SYSTEMS AND METHODS FOR RANDOMIZED AUTONOMOUS ROBOT SECURITY APPLICATIONS
Systems and methods for randomized autonomous robot security applications may include a security system that generate a patrol area of a facility and select a random waypoint from a plurality of waypoints in the patrol area for an autonomous mobile machine to surveillance. The security system may also select a surveillance task to be performed by the autonomous mobile machine at the random waypoint, and transmit, to the autonomous mobile machine, instructions to visit the random waypoint and perform the surveillance task. When the security system receives, from the autonomous mobile machine, an indication that the autonomous mobile machine has completed the surveillance task at the random waypoint, the security system may transmit a subsequent random waypoint of the plurality of waypoints of the patrol area along with a subsequent surveillance task to be performed at the subsequent random waypoint.
Robotic agriculture protection system
A system useful to protect a real estate property includes at least one sensor configured to monitor presence of a nuisance animal on the real estate property, a computerized control module including programming to diagnose the presence of the nuisance animal based upon data from the at least one sensor, and at least one mobile robotic device. The mobile robotic device is configured to move to a location of the nuisance animal on the real estate property based upon the data from the at least one sensor and emulate a predator to move the nuisance animal.
Teleoperated robotic system
A teleoperated robotic system that includes master control arms, slave arms, and a mobile platform. In use, a user manipulates the master control arms to control movement of the slave arms. The teleoperated robotic system can include two master control arms and two slave arms. The master control arms and the slave arms can be mounted on the platform. The platform can provide support for the master control arms and for a teleoperator, or user, of the robotic system. Thus, a mobile platform can allow the robotic system to be moved from place to place to locate the slave arms in a position for use. Additionally, the user can be positioned on the platform, such that the user can see and hear, directly, the slave arms and the workspace in which the slave arms operate.
System for physical-virtual environment fusion
A sensing system includes a sensor with a computing system and a memory in communication with the computing system, the memory storing a plurality of endpoints. The computing system is configured to receive activity preferences from a device at an endpoint and further determines the likeability of the activities at the endpoint. Further, it receives semantic identification preferences from the device in communication with the computing system and the system blurs the corresponding semantic identities based on the received preferences.
Systems and methods for automated cloud-based analytics for surveillance systems with unmanned aerial devices
Systems and methods for cloud-based surveillance for a target surveillance area are disclosed. At least two mobile input capture devices (ICDs) are communicatively connected to a cloud-based analytics platform via a data communication device. At least one user device can access to the cloud-based analytics platform. The cloud-based analytics platform automatically analyzes received 2-Dimensional (2D) video and/or image inputs for generating 3-Dimensional (3D) surveillance data and providing 3D display for a target surveillance area. In one embodiment, the at least two mobile ICDs are Unmanned Aerial Vehicles (UAVs).