Free Essay

Remote Controlled Spy Robot

In:

Submitted By tejasreereddy
Words 3588
Pages 15
International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 7, July 2014

DESIGN AND IMPLEMENTATION OF REMOTE OPERATED SPY
ROBOT CONTROL SYSTEM
Wai Mo Mo Khaing1, Kyaw Thiha2
Department of Mechatronic Engineering, Mandalay Technological University
Mandalay, Myanmar

Abstract- Spy robots are remotely controlled robots, equipped with a camera, transmitting video data to the intervention troop. They are made to small and compact enough to easily transport. In this paper, the project supposes a movable spy robot with a remote controller by using PIC 16F628A and PIC 16F877. The spy robot is made up of a wireless camera, an antenna, batteries and four movable wheels. The two different PICs are used to remotely control along wireless system and to control Spy robot. CCD camera is used to capture information surrounding the robot. A 4 bits LCD display is mounted on remote controller to view user command. To use the Spy robot in the dark area as night, the CCD is set up with LED that connected by lighting circuit. Radio Frequency modules signals are used in wireless remote control system for transmitting and receiving wireless logic signals to control the motors of the
Spy robot control system. The three Brush DC motors and the two L298N are involved in Remote
Operated Spy Robot. L298N are used to drive the
Brush DC motors respectively. In this paper,
Remote Operated Spy Robot is a small robot designed for spying, surveillances and inspection purposes. Index Terms-Microcontroller,
L298N, spy robot
I.

CCD

camera,

INTRODUCTION

In practice, it is usually an electro-mechanical machine which is guided by computer or laptop, mobile or electronic programming, and is thus able to do tasks on its own. Wireless controlled robots use
RF circuits which have drawbacks of limited working range, frequency range and limited control. Spy robot can capture audio and video information from the surroundings and can be sending to a remote station through RF signal [1].The control of robot involves three distinct phases: perception, processing and action. Generally, the preceptors are sensors mounted on the robot, processing is done by the on-board microcontroller or processor, and the task is

performed using motors or with some other actuators
[2].When the user controls by remote controller, the spy robot will move to desired destination and spy images around the robot in this project. This robot is not quite huge one and designed to be easy transportation. The block diagram of remote operated spy robot is shown in figure 1;

Figure 1: Overview Block Diagram of the System
II.

SYSTEM COMPONENTS

A. Microcontroller
A remote operated Spy robot is based on the two microcontrollers such as PIC16F628A and
PIC16F877. In these two types of microcontrollers, a total of 35 instructions (reduced instruction set) are available, complemented by a large register set.
These devices have integrated features to reduce external components, thus reducing system cost, enhancing system reliability and reducing power consumption. In figure 2(a), PORTA pins 1,2,3,18,17 and 13 are connected with LCD display which is mounted in the remote controller. The controls bits of these pins are RA0, RA1, RA2, RA3, RA4 and RA7 of
PORTA. PORTB 0 to 6 except PORTB2 and the controls bits PORTB6,7,9,10,11 and 12 are used for the user inputs which are forward, backward, left, right, CCD left and CCD right.PORTB7 bit no: 13 is used for data output pin. The power supply of this controller is +5V DC and connected the pin no: 14.
The Ground is pin no: 5.

1952
ISSN: 2278 – 7798

All Rights Reserved © 2014 IJSETR

International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 7, July 2014

Figure 2(a): PIC16F628A microcontroller pins assign
In figure 2(b), the motor is driven by motor driver circuit which controls by PORTB0 to 5 (pin no: 33 to 38). The power supply of this controller is also +5V DC and connected the pin no: 11 and 30.
The Ground is pin no: 12 and 31.

3(b), PORTB5 and PORTB4 (pin no: 38 and 37) are connected the motor driver‟s pin no: 5 and 7 (input 1 and input 2) for data input. And then, motor driver‟s pin no: 2 and 3 are used for data output which is connected the Brush DC motor.
The next L298N motor driver is connected with
PIC16F877 for Spy robot movement direction.
PORTB3 and PORTB2 (pin no: 36 and 35) are connected the motor driver‟s pin no: 5 and 7 (input 1 and input 2) for data input and pin no: 2 and 3 as data output for rare wheel left motor activate. PORTB1 and PORTB0 (pin no: 34 and 33) are connected the motor driver‟s pin no: 10 and 12 (input 3and input 4) are used for data input and pin no: 13 and14 as data output for rare wheel right motor activate. +12V power is supplied L298N motor driver because 12V
Brush DC motors are used in this project.
Most permanent magnet DC powered electric motors use Brushes to transmit power from the source (battery) to commutate. The brushed DC motors are used in this project because the brushes will wear down and needs replaced, similar to how brake pads wear on disc brakes. Therefore, three brushed DC motor are using for rotating camera and rare wheels respectively mounted in this system.
C. CCD Sensor

Figure 2(b): PIC16F877 microcontroller pins assign
B. L298N Motor Driver
L298N is a dual H-Bridge motor driver, so it can drive the motors which can be controlled in both clockwise and counter clockwise direction. L298N is an integrated monolithic circuit in a 15-lead
Multiwatt. It has operating supply voltage up to 46V, total DC current up to 4V and also had an over temperature protection. L298N motor driver has four inputs and outputs pin so that it can drive two DC motors and one stepper motor.

Charge-coupled devices (CCDs) find wide applications in almost all digital image-acquisition devices. The wireless CCD camera (in figure 4) has audio and video system.

Transmitter
Receiver
Figure 4: Wireless CCD Camera
The range of transmitted is 100ft visible around the Spy robot and resolution is 1024×800. Power is supplied to CCD camera by +12V from lead acid battery. This camera can move left and right direction to see survey around the robot. There is no USB port in this camera so that saving and records process of the project need capture card as shown in figure 5.

Figure 3(b): L298 Motor Driver pin assign
In the project, L298N motor driver is connected with PIC16877 microcontroller for CCD camera rotation of left and right function. As shown in fig

Figure 5: Wireless CCD Camera

1953
ISSN: 2278 – 7798

All Rights Reserved © 2014 IJSETR

International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 7, July 2014

III.

HARDWARE CONFIGURATION

A. Remote Controller Configuration
The remote controller consist six press button which is forward, backward, left, right, CCD left and
CCD right as shown in figure 6(a). Moreover, it consists of (16×2) LCD which is used for user‟s command directions.

controller takes serial input and transmits these signals through RF through its antenna connected at pin 4. The transmission occurs at the rate of 1 Kbps10 Kbps. The transmitted data is received by an RF receiver operating at the same frequency as that of the transmitter.
The voltage Regulator LM7805 is used to supply power the microcontroller. For versatile PIC
16F628A microcontroller, LM7805 regulator is suitable to control the incoming voltage stable.
LM7805 regulator is used not only to be stable the voltage but also the voltage to be 5.
LM7805 regulator is connected with a battery.
The regulator supplies power to the RF transmitter module and the PIC 16F628A respectively. The microcontroller records the user command and then sends it to the RF transmitter module. The RF module sends the data to the spy robot as radio frequencies via its antenna. The whole remote controller circuit is composed as in figure 7.

Figure 6(a): Remote controller
In figure 6(b), Drawbars antenna is used because the frequency is determined by the length of antenna.
A 9V battery is used to supply the power to the whole controller circuit.

Figure 6(b): Remote controller circuit
The project uses mainly two different PIC
16F628A and PIC 16F877 microcontrollers respectively to develop the remote operated spy robot. In remote controller circuit, PIC 16F628A is used. PIC 16F628A is an 18 pins and 8 bits microcontroller. RF module is mainly used to command the robot by wireless communication.
RF module operates at Radio Frequency and transmits data or command with 434 MHz. RF modules comprises of an RF Transmitter and RF
Receiver. The transmitter RF module on the remote

Figure 7: Circuit Diagram for the remote controller
B. The Spy Robot Configuration
In Spy Robot (vehicle), it consists of a microcontroller, a CCD sensor (camera), four movable wheels, three DC motors, three motor drivers, two voltage regulators, a RF receiver module. The PIC 16F877 microcontroller which has
40 pins is used in construction of spy robot. The voltage regulator LM7805 is used again to have stable power 5V for the microcontroller.

1954
ISSN: 2278 – 7798

All Rights Reserved © 2014 IJSETR

International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 7, July 2014

PIC 16F877 is performed not only receiving the user command via RF receiver module but also instruct the motor driver to move as directly as by use command. There are two motors for rare wheel and one motor for camera motion. These three motors need 12V power supply. To activate the motors,
L298N motor drivers are used in this project.
There are required two motor drivers: ones for motor of CCD sensor camera and next for motors of rare wheels. In this system, Brush DC motors are used for all required motorized equipments. Each
Brush DC motor is applied on each rare wheel. Rare wheels can perform forward and backward functions because of Brush DC motor‟s reversible abilities.
Brush DC motors join with worm gear as a set in this project for moving control as shown in figure 8. The two set are mounted on rare wheels respectively and also one for camera motion. Worm gear is used to reduce a large speed ratio of the motors.
In left and right operation of spy robot, the system proposes the PIC‟s controls. To rotate the left direction, while the left motor will move reverse, the right motor will move forward. To rotate the right direction, while the right motor will turn reverse, the left motor will turn forward.
This project builds a rotatable CCD sensor camera on top of the Spy Robot. For rotation of camera, the system uses a motor especially for camera. If the motor spins forwardly is left camera rotation, the motor spins reversely is right camera rotation, vice versa.

Figure 9: Circuit Diagram for the spy robot vehicle
IV.

SIMULATION AND TEXT RESULT

For the system, the simulation result is done by using Proteus professional schematic software. After the two programs are compiled as hex files, the compiled code sent to a PICs microcontroller to load the microcontrollers with no errors. The programs have successful complication and then the circuit is tested using the proteus software as shown in figure
10. This control system is completely tested and can be used remotely to enter and exit dangerous places.
In this system, remote is used as the main controller.
PIC16F628A sends the signals to the PIC16F877 to operate the Brush DC motor from the L298N motor driver. Figure8: Brush DC motor connect with worm gear
To control the angle of camera rotation, two limited switches are mounted on the both left and right side of the camera respectively. When the CCD camera touches the limited switch, it‟s stopped. The camera is not worked for reverse function after it reached the limited switch. So diodes are mounted on each limited switches respectively. These diodes will help the limited switch in the function of rotating the camera reversely. These diodes permit the motor for reverse direction.

Figure10: Simulate Result of Spy Robot
For “Straight Forward”, the two rare wheel motors are rotated clockwise in direction. When the two rare wheel motors are rotated counter clockwise,

1955
ISSN: 2278 – 7798

All Rights Reserved © 2014 IJSETR

International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 7, July 2014

the spy robot will move “Straight Backward” direction. The spy robot turns to the left when rare wheel‟s left motor rotates counter clockwise and rare wheel‟s right motor rotates clockwise direction. To work the camera turn to right, rare wheel‟s left motor is rotated clockwise and rare wheel‟s right motor is rotated counter clockwise direction. When CCD camera turns to Left, CCD camera‟s motor is rotated clockwise direction. If CCD camera‟s motor is rotated counter clockwise direction, the camera will move to the right.

The RB7 is used for serial data input/output pins with the baud rate 9600 and password “a”. Loop command is used to perform all of the function in this program transmission and receiving.
Program flowchart for Spy robot is shown in figure 12 (a) and figure 12 (b).

Figure 11(a): Programming for Remote Controller

Figure 11(b): Programming for Spy Robot Vehicle
Basic Pro programming language is used for the development of PIC microcontroller. They include file “modedefs.bas” has to be declared because it assigns the variables such as „B1‟ for transmit in figure 11(a) and „w‟ for receive in figure 11 (b) that are used in the program. PICs pin of PORTA and
PORTB are used as input and output pins.
PIC16F628A‟s PORTA pins which are analog inputs are connected with LCD display which is mounted in the remote controller. PIC16F877‟s PORTB pins are used to drive the L298N motor driver.

Figure 12(a): Program for Transmission

1956
ISSN: 2278 – 7798

All Rights Reserved © 2014 IJSETR

International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 7, July 2014

of a night vision camera, which will increase the visibility in case of no light at all. Lighting circuit is shown in figure 13(a) used in this project to use the
Spy robot in the dark area as night. For night vision in figure 13(b), three LED is set up on the top of the
CCD camera that connected by lighting circuit.
Lighting circuit need +12V power supply.

Figure 13(a): Night Vision Circuit

Figure 13(b): Night Vision at dark area

Figure 12(b): Program for Receiving
The robot equipped with a wireless camera, which is not very useful in situations where the visibility or light level is very low. For night or dark area, Spy robot will be almost impossible for identifying objects because the lights, which are provided on the robot, are fixed therefore it may not be possible to view those objects which are in the dark. At night or dark area where light is low a lighting circuit can be mounted on the robot instead

The system is designed to develop a spy robot with wireless CCD sensor by using two different
PICs. The spy robot contains especially two main sections. The first section of spy robot is transmission and receiving between spy robot and remote controller for the robot movement. There are also two main parts; between the CCD sensor‟s transmitter and receiver. And another is that the robot sends back the images and capturing it. In these processes, Radio
Frequency (RF) module is used for wireless communication between the remote controller and spy robot. The remote controller will send user commands to the robot. The camera set on the robot captures the surrounding conditions while the robot moves along user desired direction. And then the robot sends back the images captured by the camera as video and audio format. The remote controller

1957
ISSN: 2278 – 7798

All Rights Reserved © 2014 IJSETR

International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 7, July 2014

consists of by six buttons and a 4 bits LCD (16×2).
This LCD is used to show the user‟s command in words and the user can know clearly that the user has given what command to the robot. Six buttons is built for six functions such as forward, backward, left, and right operations for the robot movements and another left, right operation for the camera rotation.

the camera transmitter. Then the capture card is connected to the Laptop. In figure 15, the user can see the vision about the surrounding conditions of the spy robot and can save as video file for later review.
Lead acid battery can be rechargeable but it can last an hour longer and detect within the transmit range
100ft area. The user can also click the record button to make the recording while the robot is moving and resting. Figure 14(a): Front View of Spy Robot
Figure15: Capturing Images with Laptop
V. CONCLUSION

Figure 14(b): Top View of Spy robot
The spy robot is made up of four wheels vehicle and a camera. Each rare wheels of the vehicle has been set by each motor for vehicle‟s motion. The front wheels of the vehicle are permanently fixed on an axis is shown in figure 14(a). The vehicle can move forward and backward directions and also move left and right directions easily. LED lighting circuit is mounted on each below side of the camera for the purpose of night vision or to view in dark areas. The camera is placed on the head of the vehicle and it is made to perform left and right rotation.
Performing to be able rotating the camera is intended to view more widely. While the spy robot makes motivation, the camera records the video and audio and then sends back to the user directly and simultaneously. The project uses the capture card to record and store the video and audio that sent from

This type of robot can perform difficult and repetitive works for humans. It can have a very risky job and such dangerous job could be done by using small spy robot. But it is useful to check and look out the places where dangerous poison gases have. Spy robot can also be used in searching people who are in building destroyed by the earthquake. Because of the wireless camera is installed in spy robots, it can be used remotely to enter and exit dangerous place that human cannot. When the user controls by remote controller, the spy robot will move to desired destination and spy images around the robot. The user can check and recommend from computer with the wireless remote controller. Lightening LED is mounted on Spy robot and has a stand which is a place for rescuing device. The robot is not quite huge one and designed to be easy in transportation. For the whole system, the required power is supplied by Lead acid batteries which connected the voltage regulator.
VI.

FURTHER EXTENSION

This operation system is the spy robot with wireless remote control. The CCD camera can modify range more than 100ft .The wireless camera can be able to upgrade with the 360 degree left and right directions by using PIC program so that the functionality is having a movement at many sides.
Moreover, this camera can upgrade to move up and

1958
ISSN: 2278 – 7798

All Rights Reserved © 2014 IJSETR

International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 7, July 2014

down directions. Instead of DC motors which driver the CCD camera, stepper motors can also be used.
The spy robot can be commanded directly by laptop keyboard without using remote controller. For the advance of spy robot, it can be built a robot with wireless visual system that the user can observe and control the situation via computer or mobile.

[11] http://en.wikipedia.org/wiki/DC_Motor
[12] http://www.campuscomponent.com “L298N
Motor Driver”

ACKNOWLEDGEMENT
The author is very thankful and deeper gratitude to Dr. Wut Yi Win, Associate Professor and Head of
Mechatronics Department, for her encouragements, useful discussion and her kind support in carrying out this paper. The author wishes to extend her gratitude to Dr. Kyaw Thiha, Associate Professor, for his kind guidance, help and permission and suggestions for completion of the paper.
REFERENCES
[1]

www.circuitstoday.com “Mobile Operated Spy
Robot”

[2]

www.retron.com “wireless spy camera robots”

[3]

Microchip, “PIC16F627A/628A/648A Data
Sheet”, ISO/TS 16949:2002, Microchip
Technology Incorporated, USA, 2005.

[4]

Microchip, “PIC16F87X Data Sheet 40-pin8Bit CMOS FLASH Micro controller”, ISO
9001/ QS-9000, Microchip Technology
Incorporated, USA, 2001.

[5]

D. Ibrahim, “Microcontroller Based Applied
Digital Control”, ISBN: 0-470-86335-8, John
Wiley & Sons, Ltd, England, 2006.

[6]

J. Iovine, “PIC Robotics: A Beginner‟s Guide to
Robotics Projects Using the PICmicro”,
McGraw-Hill, 2004.

[7]

T. Wilmshurst, “Designing Embedded Systems with PIC Microcontrollers”, ISBN-10: 0-75066755-9, Elsevier, 2007.

[8]

P. Robert, “Introduction to Gear Design”,
Continuing Education and Development,
Course No: M03-016, 2012.

[9]

Ad Hoc, Project Report, 2D1426 Robotics and
Autonomous Systems.
[10] http://en.wikipedia.org/wiki/Charge-coupled device 1959
ISSN: 2278 – 7798

All Rights Reserved © 2014 IJSETR

Similar Documents

Free Essay

Remote Controlled Robot

...Issue 7, July 2014 DESIGN AND IMPLEMENTATION OF REMOTE OPERATED SPY ROBOT CONTROL SYSTEM Wai Mo Mo Khaing1, Kyaw Thiha2 Department of Mechatronic Engineering, Mandalay Technological University Mandalay, Myanmar Abstract- Spy robots are remotely controlled robots, equipped with a camera, transmitting video data to the intervention troop. They are made to small and compact enough to easily transport. In this paper, the project supposes a movable spy robot with a remote controller by using PIC 16F628A and PIC 16F877. The spy robot is made up of a wireless camera, an antenna, batteries and four movable wheels. The two different PICs are used to remotely control along wireless system and to control Spy robot. CCD camera is used to capture information surrounding the robot. A 4 bits LCD display is mounted on remote controller to view user command. To use the Spy robot in the dark area as night, the CCD is set up with LED that connected by lighting circuit. Radio Frequency modules signals are used in wireless remote control system for transmitting and receiving wireless logic signals to control the motors of the Spy robot control system. The three Brush DC motors and the two L298N are involved in Remote Operated Spy Robot. L298N are used to drive the Brush DC motors respectively. In this paper, Remote Operated Spy Robot is a small robot designed for spying, surveillances and inspection purposes. Index Terms-Microcontroller, L298N, spy robot I. CCD camera, performed using motors or with...

Words: 3588 - Pages: 15

Premium Essay

Drones Today

...of Contents Thesis statement 2 Introduction 2 Brief Description of the Technology 3 Clarification of characteristics; drones vs. robot 4 Comparison between Drone and Robot: 5 Figure 1.1 5 Historical Development 6 Evolution of drone technology 7 Current exploits of drone technology 8 Future applications 10 Political and Legal Influences 11 Review/ Explanation of current federal law 13 Economic Questions and Considerations 14 Figure 2.1 15 Psychological Considerations and Sociological Effects 18 Cultural Context 20 Implications on the Environments 23 Drone Patrol Rivers for Pollution 24 “How Quad-rotors are Heroes in Times of Disaster” 24 Moral and Ethical Implications 25 “Air Force Bug-bot Nano Drone Technology” 25 Humanoids: Future is Today 26 Conclusion 27 References 28 Thesis statement The innovation of the drone has opened up an assortment of possibilities that will aid humanity in progressing towards a safe and secure environment. Resistance has been established by the global community due to how this technology was first exploited by the military. Our aim is to acknowledge this advancement as progress and research crucial evidence that supports the future implications on exploiting UAV technology. Introduction Drones are semi-autonomous flying vehicles that can be remote controlled from a distance. The first large-scale production of the unmanned flying vehicle was proposed by Reginald Denny who served with the British...

Words: 8446 - Pages: 34

Premium Essay

Nintendo's

...mentioned in a speech last year that Indian soldiers will soon have robots assisting them to counter terrorist attack. We are yet to hear more on that thought. The word “robot” was first used in a 1921 play titled R.U.R.: Rossum’s Universal Robots, by Czechoslovakian writer Karel Capek. Robot is a Czech word meaning “worker.” Merriam-Webster defines robot as “a machine that looks like a human being and perform various complex acts; a device that automatically performs complicated, often repetitive tasks; a mechanism guided by automatic controls.” ISO describes a robot as “an automatically controlled reprogrammable, multipurpose manipulator programmable in three or more axes, which may be either fixed in place or mobile for use in industrial automation applications. “ Yet, all these definition do give us a rough idea about what comprises a robot, which needs to sense the outside world and act accordingly. There are motors, pulleys, gears, gearbox, levers, chains, and many more mechanical systems, enabling locomotion. There are sound, light, magnetic field and other sensors that help the robot collect information about its environment. There are microcontrollers powered by powerful software that help the robot make sense environmental data captured and tell it what to do next. There are microphones, speakers, displays, etc that help the robot interact with humans. 1.1 Objectives The main objectives of using robot are mentioned below...

Words: 8546 - Pages: 35

Free Essay

Exploration of Drones

...Changing the way something is done often improves it. This is the heart of technology. Technology has evolved into nanotechnology. Nanotechnology is a “technology executed on the scale of less than 100 nanometers, the goal of which is to control individual atoms and molecules, especially to computer chips and other microscopic devices.” Nanotechnology may one day improve the quality of life, thereby extending the life span of humans, by using “small autonomous robot, or nanobot, that can be sent into the human body to repair cells and cure cancers.” (nanotechnology). It is the continued advancement in nanotechnology that has been used to downsize the combative drones that we associate with the war, to the small Unmanned Aerial Vehicles (sUAV), and into the hands of hobbyist all over the world. The technology for radio-controlled aircraft has been around for decades with guidelines set forth from the FAA that restricted the use of the radio-controlled aircrafts to specified areas. Where there were once groups of radio-controlled flyers is now groups of drone users....

Words: 14074 - Pages: 57

Free Essay

Tjmax

...Barbarians at the Gateway (and just about everywhere else): A Brief Managerial Introduction to Information Security Issues1 a gallaugher.com case provided free to faculty & students for non-commercial use © Copyright 1997-2009, John M. Gallaugher, Ph.D. – for more info see: http://www.gallaugher.com/chapters.html
 Draft version last modified: Dec. 7 , 2009 – comments welcome john.gallaugher@bc.edu
 Note: this is an earlier version of the chapter. All chapters updated Dec. 2009 are now hosted (and still free) at http://www.flatworldknowledge.com. For details see the ‘Courseware’ section of http://gallaugher.com 
 INTRODUCTION  
 LEARNING
OBJECTIVES:
 After
studying
this
section
you
should
be
able
to:

 1. Recognize
that
information
security
breaches
are
on
the
rise.
 2. Understand
the
potentially
damaging
impact
of
security
breaches.
 3. Recognize
that
information
security
must
be
made
a
top
organizational
priority.
 
 Sitting
in
the
parking
lot
of
a
Minneapolis
Marshalls,
a
hacker
armed
with
a
laptop
and
a
 telescope‐shaped
antenna
infiltrated
the
store’s
network
via
an
insecure
Wi‐Fi
base
station.

 The
attack
launched
what
would
become
a
billion‐dollar
plus
nightmare
scenario
for
TJX,
 the
parent
of
retail
chains
that
include
Marshalls,
Home
Goods,
and
T.J.
Maxx.
Over
a
period
 of
several
months,
the
hacker
and
his
gang
stole
at
least
45.7
million
credit
and
debit
card
 numbers,
and
pilfered
driver’s
license
and
other
private
information
from
an
additional
 ...

Words: 15885 - Pages: 64

Premium Essay

Mount Fuji

...Employers, job seekers, and puzzle lovers everywhere delight in William Poundstone's HOW WOULD YOU MOVE MOUNT FUJI? "Combines how-to with be-smart for an audience of job seekers, interviewers, Wired-style cognitive science hobbyists, and the onlooking curious. . . . How Would You Move Mount Fuji? gallops down entertaining sidepaths about the history of intelligence testing, the origins of Silicon Valley, and the brain-jockey heroics of Microsoft culture." — Michael Erard, Austin Chronicle "A charming Trojan Horse of a book While this slim book is ostensibly a guide to cracking the cult of the puzzle in Microsoft's hiring practices, Poundstone manages to sneak in a wealth of material on the crucial issue of how to hire in today's knowledge-based economy. How Would You Move Mount Fuji? delivers on the promise of revealing the tricks to Microsoft's notorious hiring challenges. But, more important, Poundstone, an accomplished science journalist, shows how puzzles can — and cannot — identify the potential stars of a competitive company.... Poundstone gives smart advice to candidates on how to 'pass' the puzzle game.... Of course, let's not forget the real fun of the book: the puzzles themselves." — Tom Ehrenfeld, Boston Globe "A dead-serious book about recruiting practices and abstract reasoning — presented as a puzzle game.... Very, very valuable to some job applicants — the concepts being more important than the answers. It would have usefulness as well to interviewers with...

Words: 78201 - Pages: 313

Premium Essay

Future of Technology

...THE FUTURE OF TECHNOLOGY OTHER ECONOMIST BOOKS Guide to Analysing Companies Guide to Business Modelling Guide to Business Planning Guide to Economic Indicators Guide to the European Union Guide to Financial Markets Guide to Management Ideas Numbers Guide Style Guide Dictionary of Business Dictionary of Economics International Dictionary of Finance Brands and Branding Business Consulting Business Ethics Business Strategy China’s Stockmarket Globalisation Headhunters and How to Use Them Successful Mergers Wall Street Essential Director Essential Economics Essential Finance Essential Internet Essential Investment Essential Negotiation Pocket World in Figures THE FUTURE OF TECHNOLOGY THE ECONOMIST IN ASSOCIATION WITH PROFILE BOOKS LTD Published by Profile Books Ltd 3a Exmouth House, Pine Street, London ec1r 0jh Copyright © The Economist Newspaper Ltd 2005 All rights reserved. Without limiting the rights under copyright reserved above, no part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise), without the prior written permission of both the copyright owner and the publisher of this book. The greatest care has been taken in compiling this book. However, no responsibility can be accepted by the publishers or compilers for the accuracy of the information presented. Where opinion is expressed it is that of the author and does not necessarily...

Words: 128899 - Pages: 516

Free Essay

Nit-Silchar B.Tech Syllabus

...NATIONAL INSTITUTE OF TECHNOLOGY SILCHAR Bachelor of Technology Programmes amï´>r¶ JH$s g§ñWmZ, m¡Úmo{ à VO o pñ Vw dZ m dY r V ‘ ñ Syllabi and Regulations for Undergraduate PROGRAMME OF STUDY (wef 2012 entry batch) Ma {gb Course Structure for B.Tech (4years, 8 Semester Course) Civil Engineering ( to be applicable from 2012 entry batch onwards) Course No CH-1101 /PH-1101 EE-1101 MA-1101 CE-1101 HS-1101 CH-1111 /PH-1111 ME-1111 Course Name Semester-1 Chemistry/Physics Basic Electrical Engineering Mathematics-I Engineering Graphics Communication Skills Chemistry/Physics Laboratory Workshop Physical Training-I NCC/NSO/NSS L 3 3 3 1 3 0 0 0 0 13 T 1 0 1 0 0 0 0 0 0 2 1 1 1 1 0 0 0 0 4 1 1 0 0 0 0 0 0 2 0 0 0 0 P 0 0 0 3 0 2 3 2 2 8 0 0 0 0 0 2 2 2 2 0 0 0 0 0 2 2 2 6 0 0 8 2 C 8 6 8 5 6 2 3 0 0 38 8 8 8 8 6 2 0 0 40 8 8 6 6 6 2 2 2 40 6 6 8 2 Course No EC-1101 CS-1101 MA-1102 ME-1101 PH-1101/ CH-1101 CS-1111 EE-1111 PH-1111/ CH-1111 Course Name Semester-2 Basic Electronics Introduction to Computing Mathematics-II Engineering Mechanics Physics/Chemistry Computing Laboratory Electrical Science Laboratory Physics/Chemistry Laboratory Physical Training –II NCC/NSO/NSS Semester-4 Structural Analysis-I Hydraulics Environmental Engg-I Structural Design-I Managerial Economics Engg. Geology Laboratory Hydraulics Laboratory Physical Training-IV NCC/NSO/NSS Semester-6 Structural Design-II Structural Analysis-III Foundation Engineering Transportation Engineering-II Hydrology &Flood...

Words: 126345 - Pages: 506

Free Essay

La Singularidad

...NOTE: This PDF document has a handy set of “bookmarks” for it, which are accessible by pressing the Bookmarks tab on the left side of this window. ***************************************************** We are the last. The last generation to be unaugmented. The last generation to be intellectually alone. The last generation to be limited by our bodies. We are the first. The first generation to be augmented. The first generation to be intellectually together. The first generation to be limited only by our imaginations. We stand both before and after, balancing on the razor edge of the Event Horizon of the Singularity. That this sublime juxtapositional tautology has gone unnoticed until now is itself remarkable. We're so exquisitely privileged to be living in this time, to be born right on the precipice of the greatest paradigm shift in human history, the only thing that approaches the importance of that reality is finding like minds that realize the same, and being able to make some connection with them. If these books have influenced you the same way that they have us, we invite your contact at the email addresses listed below. Enjoy, Michael Beight, piman_314@yahoo.com Steven Reddell, cronyx@gmail.com Here are some new links that we’ve found interesting: KurzweilAI.net News articles, essays, and discussion on the latest topics in technology and accelerating intelligence. SingInst.org The Singularity Institute for Artificial Intelligence: think tank devoted to increasing...

Words: 237133 - Pages: 949

Premium Essay

Communication

...EFFECTS OF TELEVISION ON SOCIETY | | | EFFECTS OF TELEVISION ON SOCIETY Television broadcast has broad effects on the society all around the world. The strong verbal and non verbal combination and the facility to highlight different subject matters created one of the most important impressions in mass media. There are so many angles to see as to what extent TV has brought about changes in daily life of people and the nations as well. Here we will see some of the key changes affected by TV transmissions in general. Seeing is believing The authenticity of news and other informative material has never been more acceptable to people through other means of communication than the one available on TV. People already informed about an event still like to see the news along with footage on TV. For instance, the winning run scored by your favorite team in an exciting match is something people would like to see again and again although they know the outcome of the match. So is about visuals on accidents and unusual events like hanging of Iraqi leader Saddam Hussain etc. Changes in timings Most people have tuned their daily timings in accordance with their popular programs. Students tend to finish their homework before their favorite show. Housewives would make their cooking schedule as not to miss the soap tonight. Men would get ready for relaxing by watching programs of their interest. Much noticeable change is in bed-timings. Early to bed... dictum seems to have...

Words: 13057 - Pages: 53

Premium Essay

Ladtecx

...You should spend about 40 minutes on this task. Many high-level positions in companies are filled by men even though the workforce in many developed countries is more than 50 per cent female. Companies should be required to allocate a certain percentage of these positions to women. To what extent do you agree? Write at least 250 words. Model answer In many countries these days, females make up over 50 per cent of the workforce, and increasingly highly skilled women are taking managerial positions. However, it is still a fact that high positions such as CEO posts are still dominated by men. Although this is not desirable, I do not personally believe that imposed quotas are the solution. Firstly, I believe companies have a right to choose the best person for the job, whatever their gender, in order to contribute to the success of the business. Forcing companies to hire, promote and appoint women could negatively affect business in the short term and even the long term. Secondly, to my mind the solution to this problem should be solved outside the workplace. Girls need to be encouraged to take more male-dominated subjects at school and later at university, and to aspire to do well in their careers. Girls and boys also need to be taught equality from an early age. This education can take place in schools and career programmes and in the home. To those who argue that quotas are a good way to initiate this change, I would like to point out that artificially imposing rules has not always...

Words: 10459 - Pages: 42

Premium Essay

Computer Tricks

...EC-Council Press | The Experts: EC-Council EC-Council’s mission is to address the need for well educated and certified information security and e-business practitioners. EC-Council is a global, member based organization comprised of hundreds of industry and subject matter experts all working together to set the standards and raise the bar in Information Security certification and education. EC-Council certifications are viewed as the essential certifications needed where standard configuration and security policy courses fall short. Providing a true, hands-on, tactical approach to security, individuals armed with the knowledge disseminated by EC-Council programs are securing networks around the world and beating the hackers at their own game. The Solution: EC-Council Press The EC-Council | Press marks an innovation in academic text books and courses of study in information security, computer forensics, disaster recovery, and end-user security. By repurposing the essential content of EC-Council’s world class professional certification programs to fit academic programs, the EC-Council | Press was formed. With 8 Full Series, comprised of 27 different books, the EC-Council | Press is set to revolutionize global information security programs and ultimately create a new breed of practitioners capable of combating this growing epidemic of cybercrime and the rising threat of cyber war. This Certification: C|EH – Certified Ethical Hacker Certified Ethical Hacker is a certification...

Words: 61838 - Pages: 248

Free Essay

Dfdgfg

...Build Your Report | Symantec http://www.symantec.com/threatreport/print.jsp?id=highlights... BOOKMARK THIS PAGE | PRINT THIS PAGE | CLOSE Internet Security Threat Report Volume 17 Custom Report SHARE THIS PAGE Symantec blocked a total of over 5.5 billion malware attacks in 2011, an 81% increase over 2010. Web based attacks increased by 36% with over 4,500 new attacks each day. 403 million new variants of malware were created in 2011, a 41% increase of 2010. SPAM volumes dropped by 34% in 2011 over rates in 2010. 39% of malware attacks via email used a link to a web page. Mobile vulnerabilities continued to rise, with 315 discovered in 2011. Only 8 zero-day vulnerabilities were discovered in 2011 compared with 14 in 2010. 50% of targeted attacks were aimed at companies with less than 2500 employees. Overall the number of vulnerabilities discovered in 2011 dropped 20%. Only 42% of targeted attacks are aimed at CEOs, Senior Managers and Knowledge Workers. In 2011 232 million identities were exposed. An average of 82 targeted attacks take place each day. Mobile threats are collecting data, tracking users and sending premium text messages. You are more likely to be infected by malware placed on a legitimate web site than one created by a hacker. Introduction Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network, which is made up of more than 64.6 million attack sensors and...

Words: 44470 - Pages: 178

Free Essay

English

...4 Cinematography We are affected and defined by light. Light is the most important tool we have to work with, not only as cinematographers, but as people. —Laszlo Kovacs Courtesy Everett Collection Section 4.1 The “Look” of a Scene CHAPTER 4 Chapter Objectives After reading this chapter, students should: • Have a working knowledge of the cinematographer’s job • Understand the difference between cinematography and mise en scène and recognize the importance of each • Understand the importance of color and lighting and how they affect the tone and feel of a film • Be familiar with different methods of photographing a film, and with terms such as panning, tilting, tracking shots, deep focus, and aspect ratios • Understand how different focal length lenses affect the look of a shot • Recognize what special effects can do for a movie—and what they can’t do 4.1 The “Look” of a Scene W hen we are first introduced to Don Vito Corleone in The Godfather, played by Marlon Brando, the Mafia boss is sitting in the study of his home. Along with his consigliore, or adviser, Tom Hagen (Robert Duvall), Corleone is listening to a line of people requesting favors on the day of his daughter’s wedding. Corleone is immensely powerful, as we learn by the scope of the favors he is asked to grant, which in one case includes the desire of a singer to be cast in a film to revive his musical career, and Corleone’s ability to grant them. However, it is not just what...

Words: 13907 - Pages: 56

Premium Essay

Computer

...Chapter 1 Structure and Functions of a Computer "Hardware: the parts of a computer that can be kicked." ~ Jeff Pesis After completing this chapter, you will be able to: 1. Explain the importance of computer literacy. 2. Define the term computer. 3. Identify the components of a computer. 4. Compare the uses of various types of: input devices, output devices, and storage devices. 5. Describe categories of computers and their uses. Structure and Functions of a Computer 1 1.0 Introduction A computer is an electronic machine designed for the storage and processing of data. The machinery is called hardware, and this highly sophisticated equipment needs equally sophisticated programs (called software) to become a working computer system. Modern society has come to depend very heavily on the use of computer systems. Banks, businesses, government departments, industries, shops, people at home and school all rely on computer to play a vital role in their daily activities. These activities are centered on information. In business, the computer system has been used a lot and replaced filing cabinets as means of storing information, and clerical workers as a means of processing it. By storing and processing information on a computer system, these businesses can function more quickly and efficiently, because information can be found and collated much faster. Discovery Learning: A computer was also called a data processor. Why? 1.1 Major Parts and Functions A Computer is...

Words: 47755 - Pages: 192