Design and Development of Multitasking Robot
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 1
Abstract
A method for integrating real time obstacle avoidance capability in two-legged walking robots i.e.Biped using parallel leg mechanism. Elaborating the way of different task assign to a robot i.e., introducing a multitasking robot especially design for military purpose. The method involving the use of digital image processing for capturing real world data and analyzing path in real-time and if any motion occur then scaling is done and it will be detected by FPS technique and robot will itself protected by using gun mechanism. All these mechanism were embedded on the propeller IC and stretch sensor is use for mimic all the action which is perform by programmer same action will be perform by robot. This robot is a wireless robot that can move around and communication can be take place between server and client by using wifi through Winsock i.e., window socket.
Authors and Affiliations
Bhawana D. Parate, J. J. Shah
Advanced Embedded Wireless Robot with Motion Detection System and Live Video / Audio Transmission
this paper is to design and develop an intelligence robot to detect dangerous Gas/Smoke by using an 8 bit microcontroller. In our project the robot is designed to move automatically. The robot acts according to the...
Access Control And Privacy Preserving Mechanisms On Sensitive Data
The privacy preserving module anonymizes the data to convene privacy requirements and sketchiness constraints on predicates set by the access control device. We make this communication as the problem of k-anonymous....
A Cryptographic Based Implementation Of Secure Hash Algorithm By Using Microblaze Processor
Hash function is simply an algorithm that takes a string of any length and reduces it to a unique fixed length string. Hash functions are used to ensure data and message integrity, password validity as well as the bas...
Design of Energy Efficient Logic Using Adiabatic Technique
With the adiabatic switching approach, the circuit energies are conserved rather than dissipated as heat. Depending on the application and the system requirements, this approach can be used to reduce the power dissip...
Network Coding Equivalent Content Distribution (NCECD) Scheme in P2P Networks
Anonymizing networks such as Tor allow users to access internet services privately by using a series of routers to hide the client’s IP address from the server. The success of such networks that However has been limit...