Robot assisted emergency rescue system with a wireless sensor network
Study the history of the development of high-tech equipment to help people in case of natural disasters. The description of creating a rescue robot with wireless control sensor. Its main advantages: high noise immunity and low power consumption.
Подобные документы
The conclusions of our previous and other ongoing experiments to create a knowledge base on a given topic. Development of remote control system for home automation, forming a wireless connection for remote control of the position of the servomotor.
статья, добавлен 26.08.2020Development of a basic robotics workstation with the method of training students in accordance with the specific needs of the robot teachers. The robot can also be used to install programs in the ROS environment, you need to install a Kinect add-on.
статья, добавлен 26.08.2020The problem is to find the reliable sensor for detection of dangerous tilt angle. Task is to identify the sensor properties as sensitivity, zero shift and also uncertainty of measurement. Before using it is necessary to identify sensor properties.
статья, добавлен 26.08.2020Robots and controllers: interfaces, operating system. Binary, analog, position sensor. Kinematics, driving program. Balancing robots: simulation, double inverted pendulum. Micro mouse contest. Maze exploration algorithms. Real-time image processing.
учебное пособие, добавлен 25.11.2013Возможности схем реализации сети Ethernet. Описание повторителей, мостов и переключателей. Схема обработки пакетов в маршрутизаторе. Топология WLAN (Wireless Local Area Network; Wireless) c базовой станцией. Понятие инкапсуляции и демультиплексирования.
презентация, добавлен 31.10.2017Improvement of devices containing electronic elements. Application of mechatronic systems in the automotive industry. Using Solidworks software for the design of mobile robot on four or more wheeled chassis. Calculation of stresses of structural parts.
статья, добавлен 13.10.2020An integrated approach to the study of different kinds of virus attacks that are launched against wireless networks and computer systems. Characteristics of certificate programs provide protective mechanisms and practical tools for information security.
книга, добавлен 08.03.2014Analysis of the need for sensors to detect the working environment and collect the necessary information to perform specific tasks in industrial robotics. Object detection algorithm using background subtraction methods for the operation of a robotic arm.
статья, добавлен 01.02.2019Modelling Rich Interaction: status–event analysis, sensor-based systems, rich environments in task analysis. Screen-button – HIT, MISS, widget. GTA - conceptual framework, tools, elicitation techniques. The main functions placeholders, its types.
презентация, добавлен 28.12.2013The definition of Green-orientation of modern CAD systems to optimize FPGA-projects on energy consumption based on the activity signals of the scheme. Method of estimation of FPGA-project in the distribution of the dynamic component of power consumption.
статья, добавлен 23.02.2016A concentrator intended for collect and processing signals of the origin of fire from different sensors is developed. Information from the sensors is transmitted through the system of main and remote concentrators to the fire extinguishing system.
статья, добавлен 21.06.2016Geometrical form of normal wear of die's working surface. Measuring system on base of threecoordinate machine-tool with numerical program control. Profile of natural wear of die is described by polynomial of third order with high degree of authenticity.
статья, добавлен 14.09.2016The laptop as a portable personal computer, in the case of which combined typical PC components, including display, keyboard, and the device instructions and the battery. Active matrix display technology and color screens. Wireless: Enabler for Mobility.
реферат, добавлен 08.04.2015The concept of cloud computing. Types of clouds. Advantages and disadvantages of using the network technology. Examining the main parts of the computing system. Studying the protection problems of information security in corporate and public systems.
реферат, добавлен 20.03.2016A mechanical or virtual artificial agentis which guided by a computer program or circuitry. A breed of robots that are designed to increase the utilization by modularizing their architecture. The functionality and effectiveness of a modular robot.
презентация, добавлен 05.12.2015Sensor - a device that measures physical quantity and converts it into a signal. The context-aware systems a combination of hardware and software that analyze the state of the user and the environment and adapt their work to the changing condition.
статья, добавлен 30.04.2019Понятие кластеризации, цели построения кластеров. Характеристика офисной сети Industrial Ethernet, ее взаимодействие с Intranet, Internet. Общие принципы работы и основные стандарты Wi-Fi, GSM, EDGE, 3G и 4G. Коммуникационный протокол Wireless HART.
реферат, добавлен 01.03.2011The Internet - a global association of computer networks. E-mail - system for sending messages between users. Guaranteeing the flow of information between customers, establishment of a virtual connection - the tasks of Transmission Control Protocol.
контрольная работа, добавлен 20.05.2016The detailed description of the existing HRM system in the retail company. The advantages and disadvantages of its components and business intelligence applications. System drawbacks and the main directions for necessary additions and improvements.
реферат, добавлен 20.03.2016Development of software and algorithm of the information system for monitoring fires. Possibilities detecting fire from sensor, predicting its spread and assessing the source of ignition. Realization of information through sound and visual signals.
статья, добавлен 22.12.2016Развитие информационных технологий. Бурный процесс информатизации всех сфер современного общества. Развитие индустрии информационных технологий в развитых странах на современном этапе. Страны-участники мирового рынка high-tech и high-hume технологий.
реферат, добавлен 27.03.2013This paper explores the development and application of a long-short-term memory model for virtual distributed system control optimization using the TensorFlow and Keras frameworks. In the context of the rapid development of information technologies.
статья, добавлен 18.09.2024- 23. Network topology
Study the ways in which computer systems or network devices connect to each other. Possibilities of using network topology. Features and issues of bus topology, star topology, ring topology, mesh topology, tree topology, daisy chain and hybrid topology.
реферат, добавлен 11.10.2017 Steganographic communication with quantum information. Software integrity checking expressions for robust tamper detection. Exposing digital forgeries through specular highlights on the eye. Imaging sensor noise as digital X-ray for revealing forgeries.
курс лекций, добавлен 08.03.2014The study of accidents and disasters involving a variety of critical infrastructures, assessment of the level of fault tolerance software management systems. The calculation method based optimization of software testing management system infrastructure.
статья, добавлен 28.02.2016