mplementation of HMI-Guided Tracked Wheel Wireless Network Surveillance of a Weapon Robot
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 1
Abstract
As one of the major steps toward fully intelligent autonomous robotic weapon, this paper works have accomplished in three major areas: (1) design of the surveillance system by DM3730 processor (Beagleboard-xM), (2) implementation of the obstacle avoidance system, and (3) performance of the human machine interface surveillance system via wireless network surveillance equipment, such that the supervisor can control the vehicle by keyboard or genius mouse. In order to accomplish all these three achievements, there have been major additions and overhaul in both system software code and system circuit board developments. All these development including the developed algorithm, and hardware implementation are covered in this paper. The experimental results have shown the practicality of the DM3730 processor, obstacle avoidance systems, wireless network surveillance equipment, and the ZigBee wireless technology applied to weapon robots.
Authors and Affiliations
Manjusagar. L, Komala. M
Comparing Tesseract results with and without Character localization for Smartphone application
Tesseract is considered the most accurate free OCR engine in existence. Android operating system based Smartphones application where images taken from camera of mobile device or browsed from gallery are preprocessed....
Exemplary Instinctive Repression Of Worms
Key diligence is the routing procedure that absolute the packet in the network routing sachets fully associated to wireless set of connections has considered to a great coverage but the assumption on packed connectiv...
Business Analytics Focusing on Embeddable Reporting
The Business analytics is needed in Organizations where collection of data is increasingly large these data source need to be interpreted in an easy way to be able to make profitable decision in the limited time avai...
Data Security in Cloud Computing using RSA Algorithm
Cloud Computing is an emerging paradigm which has become today’s hottest research area due to its ability to reduce the costs associated with computing. In today’s era, it is most interesting and enticing technology whi...
A Novel Approach in Data Clustering using Population Based Optimization Algorithm to solve Economic Load Dispatch Problem
Computing the global optima of a functional has been extensively applied in a wide range of engineering applications. Nevertheless, it is well known they usually lack of effectiveness when dealing with complex nonline...