mplementation of HMI-Guided Tracked Wheel Wireless Network Surveillance of a Weapon Robot
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 1
Abstract
As one of the major steps toward fully intelligent autonomous robotic weapon, this paper works have accomplished in three major areas: (1) design of the surveillance system by DM3730 processor (Beagleboard-xM), (2) implementation of the obstacle avoidance system, and (3) performance of the human machine interface surveillance system via wireless network surveillance equipment, such that the supervisor can control the vehicle by keyboard or genius mouse. In order to accomplish all these three achievements, there have been major additions and overhaul in both system software code and system circuit board developments. All these development including the developed algorithm, and hardware implementation are covered in this paper. The experimental results have shown the practicality of the DM3730 processor, obstacle avoidance systems, wireless network surveillance equipment, and the ZigBee wireless technology applied to weapon robots.
Authors and Affiliations
Manjusagar. L, Komala. M
Image Compression through Data Representation in Frequency Domain
Data compression is a very important field these days. You can find it in any web page, network devices, application files etc. Its importance has grown during the years as a necessity of storage and time of transpor...
Mobile Positioning Techniques in GSM Cellular Networks based on Signal Strength
Locating the site of a mobile user with a high degree of correctness is a research interest that holds the key to a get through in many service challenges faced by operators in the wireless communication world. The b...
A Comparitive Study of Cloud Computing Models for Academic Environment
Cloud computing is becoming main computing paradigm. The use of cloud computing has been increased exponentially. It has various characteristics and advantages of on-demand computing, shared infrastructure, pay-per-u...
An Approach to Identify Node Clones in Wireless Sensor Networks
Sensor nodes that are deployed in hostile environments are susceptible to capture and compromise. An adversary may gain private information from these sensors, clone and logically deploy them in the network to launch...
Effect Self Loop Avoidance Weighted NDFA Method Using Fuzzy Cache Counter Classifier Algorithm for Efficient and Fastest Reachable Path in Travelling Networks
Now a days in computer path networks or travelling networks, the routing of vehicles or moving objects is mainly based on the best path. This will help in minimize the costs of paths in a place, city or any specified...