Robot assisted emergency rescue system with a wireless sensor network

Study the history of the development of high-tech equipment to help people in case of natural disasters. The description of creating a rescue robot with wireless control sensor. Its main advantages: high noise immunity and low power consumption.

Подобные документы

  • Characteristics of the model research cyber-physical systems in industrial production. Description of the hardware installation process and software environment. Consideration of modern approaches to modeling distributed software and semantic data.

    статья, добавлен 23.02.2016

  • International recommendations on Using error control coding at different network layers. The complexity of decoding in the channel with independent errors. Providing security of data in a network with the help of coding methods. Public-key cryptography.

    книга, добавлен 08.03.2014

  • Application software, the main types of software and operating systems. Ethics and intellectual property rights: when it is possible to copy. Guidelines for creating documents. Characteristics of communication software. Computer terms and their use.

    учебное пособие, добавлен 11.10.2014

  • The concept and structure, as well as the laws of functioning of the Unified Modeling Language, history of its development. Precedents and conditions of effective use case diagrams. Research of a example of computer simulation and evaluation of results.

    презентация, добавлен 05.04.2016

  • Тhe main authorization methods for the web used to develop and build the logical structure of sites. Justification of the method of secure integration of users of a local network into web authorization, the ability to log in with personal local data.

    статья, добавлен 09.10.2018

  • The development of the document "functional requirements" for an automated system of monitoring program execution in company related to oil industry. The process of implementation of information system. The importance of proper writing of such a paper.

    статья, добавлен 13.02.2016

  • Extremalization functional object as the calculus of variations. Difficulties solution of variational problems. Using nonlinear compromise scheme on the basis of rational organization to address this multi-task. Examples of these mathematical models.

    статья, добавлен 29.07.2016

  • Classification of tools for the implementation of sensing systems. The necessity of application of sensing systems and some of their parameters are described, which are useful for robots with systems of artificial intelligence. Voxel or pixel graphics.

    статья, добавлен 26.04.2021

  • Analysis of data mining systems, development of document management systems. Development of an integrated system for intelligent information analysis. A model for using various statistical data of any format in the source of a digital organization.

    статья, добавлен 01.02.2024

  • Analysis of the specific features of automatic code generation for diagrams in the Dragon programming language. Computer’s training by creating an expert system as very different form of human learning. The algorithm of a trip by bus on Python 2.7.

    статья, добавлен 10.08.2018

  • Study of issues of maximizing small root bounds by linearization and applications of subjects of small secret exponents in RSA. Secure network coding over the integers, and the CCA proxy re-encryption without bilinear maps in the standard model.

    материалы конференции, добавлен 08.03.2014

  • Cryptography from the perspective of security and mechanisms to implement them: discussing issues such as e-mail security, public-key architecture, virtual private networks, Web services security, wireless security, and confidentiality and integrity.

    книга, добавлен 08.03.2014

  • Description of technology of off-wire computer networks with the productivity 100 Mb/s in the point of output and maintenance of information. Description of parameters of middle access and determination of multiple entrance. Physical layer, radio, WLAN.

    методичка, добавлен 10.08.2011

  • The history and development of computational technologies from physical switches to the microprocessor. Principles batch processing of computer data. Browse famous innovators in the field of interactive paradigm shifts and their main achievements.

    презентация, добавлен 28.12.2013

  • Состав и особенности учебного робототехнического комплекса "Электроника-УРТК", его основные устройства, способы управления, основные технические характеристики. Программное обеспечение учебного робототехнического комплекса. Работа с программой "Robot-2".

    лабораторная работа, добавлен 11.05.2012

  • Theoretical bases of construction of geographically distributed networks and mechanisms to ensure quality of service (QoS) in such networks. Principles of construction of networks with guaranteed quality of service. The main types of interfaces.

    методичка, добавлен 11.10.2014

  • Рассмотрение особенностей программного комплекса промышленной автоматизации Controller Development System. Ознакомление со свойствами и принципом действия web-визуализация данного программного пакета. Анализ технологии наблюдения за управлением.

    статья, добавлен 19.02.2019

  • The questions of energy efficiency of information systems. The study of existing methods to reduce energy consumption at the program level. A new approach to the development of energy-efficient software that passes through its entire life cycle.

    статья, добавлен 30.01.2016

  • The article considers an example that contains the main features of a relational database - tabular representation, primary key, foreign key. It is shown that this database is completely described by the new format. A comma-separated values (CSV) files.

    статья, добавлен 06.07.2023

  • A justification of need of development of intellectual service for monitoring of health and level of physical development of students of the Ufa state aviation technical university. The description of the main functions of intellectual service.

    статья, добавлен 06.05.2018

  • The advantages and disadvantages of PHP web development using Core PHP and PHP frameworks. Security and performance are investigated. The recommendations on using both approaches. The structure of application and key development things are highlighted.

    статья, добавлен 10.10.2023

  • Researching network attacks, security audit tools. Securing the router for administrative Access. Configuring a site-to-site VPN using cisco IOS and SDM. Configuring a remote Access VPN server and client. Security policy development and implementation.

    учебное пособие, добавлен 08.03.2014

  • The creation of an intuitive family tree on the basis of the online service Coggle, which is designed to develop mental maps. The main criteria that should be in the program for mobile application development. Structure of the mobile application.

    статья, добавлен 06.06.2023

  • Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.

    статья, добавлен 06.05.2018

  • The current state of application and development of cloud computing, the main advantages and disadvantages of their use in the states, enterprises and in scientific activity. Guidance documents in the field of cloud computing information security.

    статья, добавлен 23.10.2020

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.