Xxxxxxx-ROS software interface scheme Sample Clauses

Xxxxxxx-ROS software interface scheme. The Charlie USV capabilities in the exploitation of various at-field operations, at both low or high level of autonomy, in single or multi-vehicle frameworks are proved by a huge number of experimental results obtained in the last ten years of the vehicle employment at field. The main features that are exploited within the CADDY framework are the general path-following guidance system and the high level mission control. The path-following guidance system is based on a virtual-target based algorithm, ensuring global stability and robustness to disturbances and uncertainties. A complementary speed adaption scheme is integrated with the guidance module in such a way to improve the path-following performance. An exemplificative result set is reported in Fig. 2.2.3, where the difference between the simple path- following algorithm and the combined guidance plus speed adaptation can be evaluated. In the top plots the path reference and the vehicle motion are represented: in the top-right plot the vehicle performs a curve section closer to the reference in virtue of a speed reduction. Lower plots show the evolution of the cross-track error (i.e. the perpendicular distance of the vehicle with respect to the path), highlighting the lower values of the error during the motion in case of speed adaption exploitation. The goal of the high-level mission control system is the execution of predefined action plans, tracing and maintaining the consistency of the mission state, and allowing an online mission plan update by human operator interaction. The state of a generic mission evolves on the basis of occurrences of specific conditions, that can be related either to continuous-time or event-driver conditions; with the aim of making the state evolution handling homogeneous, from the point of view of the management of different notifications from different layers of the architecture, a logical interface based on event generation and dispatch has been developed. The need of defining the mission plan with a modular and top-down approach, complemented by the possibility of describing separately the management of emergencies and exceptions, usually field of intervention of the system engineer, from the planning of the specific mission, usually carried out by the end-user (or at least with his/her strong cooperation), brings to the definition of a sort of programming language for the mission plan description and automatic construction of the mission software structure. To this a...
AutoNDA by SimpleDocs

Related to Xxxxxxx-ROS software interface scheme

  • Software Licence The following licence terms apply whether HP provides software to Customer as part of a managed service or as a separate software transaction.

  • Client Software You may only use the client software with the ERP solution. You may install an unlimited number of copies of the client software to access your ERP solution.

  • Software License Terms (a) Software that is made available by a Provider to Recipient in connection with any Service (any such Software being referred to herein as “TSA-Licensed Software”) provided hereunder will be subject to the terms set forth in this Section 3.5 except as otherwise provided in the applicable Service Schedule. The Provider hereby grants to the Recipient a non-exclusive, non-transferable license to use, in object code form, any TSA-Licensed Software that is made available by the Provider pursuant to a Service Schedule. For the avoidance of doubt, the Provider that makes available any TSA-Licensed Software in connection with the provision of any Service retains the unrestricted right to enhance or otherwise modify such TSA-Licensed Software at any time, provided that such enhancements or other modifications do not disrupt the provision of such Service to the Recipient.

  • Software Licensing Contractor represents and warrants that the software, if any, as delivered to City, does not contain any program code, virus, worm, trap door, back door, time or clock that would erase data or programming or otherwise cause the software to become inoperable, inaccessible, or incapable of being used in accordance with its user manuals, either automatically, upon the occurrence of licensor-selected conditions or manually on command. Contractor further represents and warrants that all third party software, delivered to City or used by Contractor in the performance of the Contract, is fully licensed by the appropriate licensor.

  • Network Interface Device (NID) 2.7.1 The NID is defined as any means of interconnection of end-user customer premises wiring to BellSouth’s distribution plant, such as a cross-connect device used for that purpose. The NID is a single-line termination device or that portion of a multiple-line termination device required to terminate a single line or circuit at the premises. The NID features two independent xxxxxxxx or divisions that separate the service provider’s network from the end user’s customer-premises wiring. Each chamber or division contains the appropriate connection points or posts to which the service provider and the end user each make their connections. The NID provides a protective ground connection and is capable of terminating cables such as twisted pair cable.

  • Software License Subject to the terms of this Agreement, Viasat grants to you a personal, non-exclusive, non-assignable and non-transferable license to use and display the software provided by or on behalf of Viasat (including any updates) only for the purpose of accessing the Service ("Software") on any computer(s) on which you are the primary user or which you are authorized to use. Our Privacy Policies provide important information about the Software applications we utilize. Please read the terms very carefully, as they contain important disclosures about the use and security of data transmitted to and from your computer. Unauthorized copying of the Software, including, without limitation, software that has been modified, merged or included with the Software, or the written materials associated therewith, is expressly forbidden. You may not sublicense, assign, or transfer this license or the Software except as permitted in writing by Viasat. Any attempt to sublicense, assign or transfer any of the rights, duties or obligations under this license is void and may result in termination by Viasat of this Agreement and the license. You agree that you shall not copy or duplicate or permit anyone else to copy or duplicate any part of the Software, or create or attempt to create, or permit others to create or attempt to create, by reverse engineering or otherwise, the source programs or any part thereof from the object programs or from other information made available under this Agreement.

  • Access to Network Interface Device (NID 2.4.3.1. Due to the wide variety of NIDs utilized by BellSouth (based on subscriber size and environmental considerations), Mpower may access the on-premises wiring by any of the following means: BellSouth shall allow Mpower to connect its loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premise. Mpower agrees to install compatible protectors and test jacks and to maintain the protection system and equipment and to indemnify BellSouth pursuant to Section 8 of the General Terms and Conditions of this Agreement.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Hardware and Software Requirements In order to access and retain Disclosures electronically, you must satisfy the following computer hardware and software requirements: access to the Internet; an email account and related software capable of receiving email through the Internet; a web browser which is SSL-compliant and supports secure sessions, and hardware capable of running this software.

Time is Money Join Law Insider Premium to draft better contracts faster.