Autonomous Home Automated Hexapod Robot
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 9
Abstract
This paper focuses on design and implementation of six legged robot that is capable of monitoring and performing house hold works independently. The Autonomous Home utomated Hexapod is developed with three AT89C52 icrocontrollers which functions as brain of the robot to which all operating functions of each module are chronologically programmed in it. The legs of the robot were developed with 2 servo motors to provide two degree for each leg. Several itional sensors like TSOP1738 (IR), RF transmitter and ceiver, DS1307 (Real Time Clock) have been embedded into robot in modular form to make it work autonomously.
Authors and Affiliations
Addanki Purna Ramesh , Ch Sesha Kiran Kumar
Modified OCABTR based Hierarchical Two Level Data Aggregation in Wireless Sensor Networks
In Wireless Sensor Network (WSN), it is necessary to optimize the energy of the sensor node. Each sensor node is equipped with a battery which is used for sensing and processing the data. Cluster based data aggregation a...
Human Talent Prediction in HRM using C4.5 Classification Algorithm
In HRM, among the challenges for HR professionals is to manage an organization’s talents, especially to ensure the right person for the right job at the right time. Human talent prediction is an alternative to handle thi...
A Study on Enhancement of Loadability of Large-Scale Emerging Power Systems by Using FACTS Controllers
This study presents comprehensive review of various ethods/techniques for incorporation of differential algebraic equations (DAE) model of FACTS controllers and different type of loads such as a static, dynamic, and com...
QoS Analysis of the Integrated UMTS and WLAN Ad Hoc Network in different Security Schemes with Wormhole Attack under large Scalability for CBR Voice Interactive Traffic
The selection of security schemes against Wormhole Attack (WHA) in next generation heterogeneous networks is based on major factors: authentication, confidentiality, and integrity and data availability. The effect of thi...
Prevention Of WormholeAttacks In Geographic Routing Protocol
As mobile ad hoc network applications are deployed, security emerges as a central requirement..Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Boun...