...Issue 7, July 2014 DESIGN AND IMPLEMENTATION OF REMOTE OPERATED SPY ROBOT CONTROL SYSTEM Wai Mo Mo Khaing1, Kyaw Thiha2 Department of Mechatronic Engineering, Mandalay Technological University Mandalay, Myanmar Abstract- Spy robots are remotely controlled robots, equipped with a camera, transmitting video data to the intervention troop. They are made to small and compact enough to easily transport. In this paper, the project supposes a movable spy robot with a remote controller by using PIC 16F628A and PIC 16F877. The spy robot is made up of a wireless camera, an antenna, batteries and four movable wheels. The two different PICs are used to remotely control along wireless system and to control Spy robot. CCD camera is used to capture information surrounding the robot. A 4 bits LCD display is mounted on remote controller to view user command. To use the Spy robot in the dark area as night, the CCD is set up with LED that connected by lighting circuit. Radio Frequency modules signals are used in wireless remote control system for transmitting and receiving wireless logic signals to control the motors of the Spy robot control system. The three Brush DC motors and the two L298N are involved in Remote Operated Spy Robot. L298N are used to drive the Brush DC motors respectively. In this paper, Remote Operated Spy Robot is a small robot designed for spying, surveillances and inspection purposes. Index Terms-Microcontroller, L298N, spy robot I. CCD camera, performed using motors or with...
Words: 3588 - Pages: 15
...of Contents Thesis statement 2 Introduction 2 Brief Description of the Technology 3 Clarification of characteristics; drones vs. robot 4 Comparison between Drone and Robot: 5 Figure 1.1 5 Historical Development 6 Evolution of drone technology 7 Current exploits of drone technology 8 Future applications 10 Political and Legal Influences 11 Review/ Explanation of current federal law 13 Economic Questions and Considerations 14 Figure 2.1 15 Psychological Considerations and Sociological Effects 18 Cultural Context 20 Implications on the Environments 23 Drone Patrol Rivers for Pollution 24 “How Quad-rotors are Heroes in Times of Disaster” 24 Moral and Ethical Implications 25 “Air Force Bug-bot Nano Drone Technology” 25 Humanoids: Future is Today 26 Conclusion 27 References 28 Thesis statement The innovation of the drone has opened up an assortment of possibilities that will aid humanity in progressing towards a safe and secure environment. Resistance has been established by the global community due to how this technology was first exploited by the military. Our aim is to acknowledge this advancement as progress and research crucial evidence that supports the future implications on exploiting UAV technology. Introduction Drones are semi-autonomous flying vehicles that can be remote controlled from a distance. The first large-scale production of the unmanned flying vehicle was proposed by Reginald Denny who served with the British...
Words: 8446 - Pages: 34
...mentioned in a speech last year that Indian soldiers will soon have robots assisting them to counter terrorist attack. We are yet to hear more on that thought. The word “robot” was first used in a 1921 play titled R.U.R.: Rossum’s Universal Robots, by Czechoslovakian writer Karel Capek. Robot is a Czech word meaning “worker.” Merriam-Webster defines robot as “a machine that looks like a human being and perform various complex acts; a device that automatically performs complicated, often repetitive tasks; a mechanism guided by automatic controls.” ISO describes a robot as “an automatically controlled reprogrammable, multipurpose manipulator programmable in three or more axes, which may be either fixed in place or mobile for use in industrial automation applications. “ Yet, all these definition do give us a rough idea about what comprises a robot, which needs to sense the outside world and act accordingly. There are motors, pulleys, gears, gearbox, levers, chains, and many more mechanical systems, enabling locomotion. There are sound, light, magnetic field and other sensors that help the robot collect information about its environment. There are microcontrollers powered by powerful software that help the robot make sense environmental data captured and tell it what to do next. There are microphones, speakers, displays, etc that help the robot interact with humans. 1.1 Objectives The main objectives of using robot are mentioned below...
Words: 8546 - Pages: 35
...Changing the way something is done often improves it. This is the heart of technology. Technology has evolved into nanotechnology. Nanotechnology is a “technology executed on the scale of less than 100 nanometers, the goal of which is to control individual atoms and molecules, especially to computer chips and other microscopic devices.” Nanotechnology may one day improve the quality of life, thereby extending the life span of humans, by using “small autonomous robot, or nanobot, that can be sent into the human body to repair cells and cure cancers.” (nanotechnology). It is the continued advancement in nanotechnology that has been used to downsize the combative drones that we associate with the war, to the small Unmanned Aerial Vehicles (sUAV), and into the hands of hobbyist all over the world. The technology for radio-controlled aircraft has been around for decades with guidelines set forth from the FAA that restricted the use of the radio-controlled aircrafts to specified areas. Where there were once groups of radio-controlled flyers is now groups of drone users....
Words: 14074 - Pages: 57
...Barbarians at the Gateway (and just about everywhere else): A Brief Managerial Introduction to Information Security Issues1 a gallaugher.com case provided free to faculty & students for non-commercial use © Copyright 1997-2009, John M. Gallaugher, Ph.D. – for more info see: http://www.gallaugher.com/chapters.html Draft version last modified: Dec. 7 , 2009 – comments welcome john.gallaugher@bc.edu Note: this is an earlier version of the chapter. All chapters updated Dec. 2009 are now hosted (and still free) at http://www.flatworldknowledge.com. For details see the ‘Courseware’ section of http://gallaugher.com INTRODUCTION LEARNING OBJECTIVES: After studying this section you should be able to: 1. Recognize that information security breaches are on the rise. 2. Understand the potentially damaging impact of security breaches. 3. Recognize that information security must be made a top organizational priority. Sitting in the parking lot of a Minneapolis Marshalls, a hacker armed with a laptop and a telescope‐shaped antenna infiltrated the store’s network via an insecure Wi‐Fi base station. The attack launched what would become a billion‐dollar plus nightmare scenario for TJX, the parent of retail chains that include Marshalls, Home Goods, and T.J. Maxx. Over a period of several months, the hacker and his gang stole at least 45.7 million credit and debit card numbers, and pilfered driver’s license and other private information from an additional ...
Words: 15885 - Pages: 64
...Employers, job seekers, and puzzle lovers everywhere delight in William Poundstone's HOW WOULD YOU MOVE MOUNT FUJI? "Combines how-to with be-smart for an audience of job seekers, interviewers, Wired-style cognitive science hobbyists, and the onlooking curious. . . . How Would You Move Mount Fuji? gallops down entertaining sidepaths about the history of intelligence testing, the origins of Silicon Valley, and the brain-jockey heroics of Microsoft culture." — Michael Erard, Austin Chronicle "A charming Trojan Horse of a book While this slim book is ostensibly a guide to cracking the cult of the puzzle in Microsoft's hiring practices, Poundstone manages to sneak in a wealth of material on the crucial issue of how to hire in today's knowledge-based economy. How Would You Move Mount Fuji? delivers on the promise of revealing the tricks to Microsoft's notorious hiring challenges. But, more important, Poundstone, an accomplished science journalist, shows how puzzles can — and cannot — identify the potential stars of a competitive company.... Poundstone gives smart advice to candidates on how to 'pass' the puzzle game.... Of course, let's not forget the real fun of the book: the puzzles themselves." — Tom Ehrenfeld, Boston Globe "A dead-serious book about recruiting practices and abstract reasoning — presented as a puzzle game.... Very, very valuable to some job applicants — the concepts being more important than the answers. It would have usefulness as well to interviewers with...
Words: 78201 - Pages: 313
...THE FUTURE OF TECHNOLOGY OTHER ECONOMIST BOOKS Guide to Analysing Companies Guide to Business Modelling Guide to Business Planning Guide to Economic Indicators Guide to the European Union Guide to Financial Markets Guide to Management Ideas Numbers Guide Style Guide Dictionary of Business Dictionary of Economics International Dictionary of Finance Brands and Branding Business Consulting Business Ethics Business Strategy China’s Stockmarket Globalisation Headhunters and How to Use Them Successful Mergers Wall Street Essential Director Essential Economics Essential Finance Essential Internet Essential Investment Essential Negotiation Pocket World in Figures THE FUTURE OF TECHNOLOGY THE ECONOMIST IN ASSOCIATION WITH PROFILE BOOKS LTD Published by Profile Books Ltd 3a Exmouth House, Pine Street, London ec1r 0jh Copyright © The Economist Newspaper Ltd 2005 All rights reserved. Without limiting the rights under copyright reserved above, no part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise), without the prior written permission of both the copyright owner and the publisher of this book. The greatest care has been taken in compiling this book. However, no responsibility can be accepted by the publishers or compilers for the accuracy of the information presented. Where opinion is expressed it is that of the author and does not necessarily...
Words: 128899 - Pages: 516
...NATIONAL INSTITUTE OF TECHNOLOGY SILCHAR Bachelor of Technology Programmes amï´>r¶ JH$s g§ñWmZ, m¡Úmo{ à VO o pñ Vw dZ m dY r V ‘ ñ Syllabi and Regulations for Undergraduate PROGRAMME OF STUDY (wef 2012 entry batch) Ma {gb Course Structure for B.Tech (4years, 8 Semester Course) Civil Engineering ( to be applicable from 2012 entry batch onwards) Course No CH-1101 /PH-1101 EE-1101 MA-1101 CE-1101 HS-1101 CH-1111 /PH-1111 ME-1111 Course Name Semester-1 Chemistry/Physics Basic Electrical Engineering Mathematics-I Engineering Graphics Communication Skills Chemistry/Physics Laboratory Workshop Physical Training-I NCC/NSO/NSS L 3 3 3 1 3 0 0 0 0 13 T 1 0 1 0 0 0 0 0 0 2 1 1 1 1 0 0 0 0 4 1 1 0 0 0 0 0 0 2 0 0 0 0 P 0 0 0 3 0 2 3 2 2 8 0 0 0 0 0 2 2 2 2 0 0 0 0 0 2 2 2 6 0 0 8 2 C 8 6 8 5 6 2 3 0 0 38 8 8 8 8 6 2 0 0 40 8 8 6 6 6 2 2 2 40 6 6 8 2 Course No EC-1101 CS-1101 MA-1102 ME-1101 PH-1101/ CH-1101 CS-1111 EE-1111 PH-1111/ CH-1111 Course Name Semester-2 Basic Electronics Introduction to Computing Mathematics-II Engineering Mechanics Physics/Chemistry Computing Laboratory Electrical Science Laboratory Physics/Chemistry Laboratory Physical Training –II NCC/NSO/NSS Semester-4 Structural Analysis-I Hydraulics Environmental Engg-I Structural Design-I Managerial Economics Engg. Geology Laboratory Hydraulics Laboratory Physical Training-IV NCC/NSO/NSS Semester-6 Structural Design-II Structural Analysis-III Foundation Engineering Transportation Engineering-II Hydrology &Flood...
Words: 126345 - Pages: 506
...NOTE: This PDF document has a handy set of “bookmarks” for it, which are accessible by pressing the Bookmarks tab on the left side of this window. ***************************************************** We are the last. The last generation to be unaugmented. The last generation to be intellectually alone. The last generation to be limited by our bodies. We are the first. The first generation to be augmented. The first generation to be intellectually together. The first generation to be limited only by our imaginations. We stand both before and after, balancing on the razor edge of the Event Horizon of the Singularity. That this sublime juxtapositional tautology has gone unnoticed until now is itself remarkable. We're so exquisitely privileged to be living in this time, to be born right on the precipice of the greatest paradigm shift in human history, the only thing that approaches the importance of that reality is finding like minds that realize the same, and being able to make some connection with them. If these books have influenced you the same way that they have us, we invite your contact at the email addresses listed below. Enjoy, Michael Beight, piman_314@yahoo.com Steven Reddell, cronyx@gmail.com Here are some new links that we’ve found interesting: KurzweilAI.net News articles, essays, and discussion on the latest topics in technology and accelerating intelligence. SingInst.org The Singularity Institute for Artificial Intelligence: think tank devoted to increasing...
Words: 237133 - Pages: 949
...EFFECTS OF TELEVISION ON SOCIETY | | | EFFECTS OF TELEVISION ON SOCIETY Television broadcast has broad effects on the society all around the world. The strong verbal and non verbal combination and the facility to highlight different subject matters created one of the most important impressions in mass media. There are so many angles to see as to what extent TV has brought about changes in daily life of people and the nations as well. Here we will see some of the key changes affected by TV transmissions in general. Seeing is believing The authenticity of news and other informative material has never been more acceptable to people through other means of communication than the one available on TV. People already informed about an event still like to see the news along with footage on TV. For instance, the winning run scored by your favorite team in an exciting match is something people would like to see again and again although they know the outcome of the match. So is about visuals on accidents and unusual events like hanging of Iraqi leader Saddam Hussain etc. Changes in timings Most people have tuned their daily timings in accordance with their popular programs. Students tend to finish their homework before their favorite show. Housewives would make their cooking schedule as not to miss the soap tonight. Men would get ready for relaxing by watching programs of their interest. Much noticeable change is in bed-timings. Early to bed... dictum seems to have...
Words: 13057 - Pages: 53
...You should spend about 40 minutes on this task. Many high-level positions in companies are filled by men even though the workforce in many developed countries is more than 50 per cent female. Companies should be required to allocate a certain percentage of these positions to women. To what extent do you agree? Write at least 250 words. Model answer In many countries these days, females make up over 50 per cent of the workforce, and increasingly highly skilled women are taking managerial positions. However, it is still a fact that high positions such as CEO posts are still dominated by men. Although this is not desirable, I do not personally believe that imposed quotas are the solution. Firstly, I believe companies have a right to choose the best person for the job, whatever their gender, in order to contribute to the success of the business. Forcing companies to hire, promote and appoint women could negatively affect business in the short term and even the long term. Secondly, to my mind the solution to this problem should be solved outside the workplace. Girls need to be encouraged to take more male-dominated subjects at school and later at university, and to aspire to do well in their careers. Girls and boys also need to be taught equality from an early age. This education can take place in schools and career programmes and in the home. To those who argue that quotas are a good way to initiate this change, I would like to point out that artificially imposing rules has not always...
Words: 10459 - Pages: 42
...EC-Council Press | The Experts: EC-Council EC-Council’s mission is to address the need for well educated and certified information security and e-business practitioners. EC-Council is a global, member based organization comprised of hundreds of industry and subject matter experts all working together to set the standards and raise the bar in Information Security certification and education. EC-Council certifications are viewed as the essential certifications needed where standard configuration and security policy courses fall short. Providing a true, hands-on, tactical approach to security, individuals armed with the knowledge disseminated by EC-Council programs are securing networks around the world and beating the hackers at their own game. The Solution: EC-Council Press The EC-Council | Press marks an innovation in academic text books and courses of study in information security, computer forensics, disaster recovery, and end-user security. By repurposing the essential content of EC-Council’s world class professional certification programs to fit academic programs, the EC-Council | Press was formed. With 8 Full Series, comprised of 27 different books, the EC-Council | Press is set to revolutionize global information security programs and ultimately create a new breed of practitioners capable of combating this growing epidemic of cybercrime and the rising threat of cyber war. This Certification: C|EH – Certified Ethical Hacker Certified Ethical Hacker is a certification...
Words: 61838 - Pages: 248
...Build Your Report | Symantec http://www.symantec.com/threatreport/print.jsp?id=highlights... BOOKMARK THIS PAGE | PRINT THIS PAGE | CLOSE Internet Security Threat Report Volume 17 Custom Report SHARE THIS PAGE Symantec blocked a total of over 5.5 billion malware attacks in 2011, an 81% increase over 2010. Web based attacks increased by 36% with over 4,500 new attacks each day. 403 million new variants of malware were created in 2011, a 41% increase of 2010. SPAM volumes dropped by 34% in 2011 over rates in 2010. 39% of malware attacks via email used a link to a web page. Mobile vulnerabilities continued to rise, with 315 discovered in 2011. Only 8 zero-day vulnerabilities were discovered in 2011 compared with 14 in 2010. 50% of targeted attacks were aimed at companies with less than 2500 employees. Overall the number of vulnerabilities discovered in 2011 dropped 20%. Only 42% of targeted attacks are aimed at CEOs, Senior Managers and Knowledge Workers. In 2011 232 million identities were exposed. An average of 82 targeted attacks take place each day. Mobile threats are collecting data, tracking users and sending premium text messages. You are more likely to be infected by malware placed on a legitimate web site than one created by a hacker. Introduction Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network, which is made up of more than 64.6 million attack sensors and...
Words: 44470 - Pages: 178
...4 Cinematography We are affected and defined by light. Light is the most important tool we have to work with, not only as cinematographers, but as people. —Laszlo Kovacs Courtesy Everett Collection Section 4.1 The “Look” of a Scene CHAPTER 4 Chapter Objectives After reading this chapter, students should: • Have a working knowledge of the cinematographer’s job • Understand the difference between cinematography and mise en scène and recognize the importance of each • Understand the importance of color and lighting and how they affect the tone and feel of a film • Be familiar with different methods of photographing a film, and with terms such as panning, tilting, tracking shots, deep focus, and aspect ratios • Understand how different focal length lenses affect the look of a shot • Recognize what special effects can do for a movie—and what they can’t do 4.1 The “Look” of a Scene W hen we are first introduced to Don Vito Corleone in The Godfather, played by Marlon Brando, the Mafia boss is sitting in the study of his home. Along with his consigliore, or adviser, Tom Hagen (Robert Duvall), Corleone is listening to a line of people requesting favors on the day of his daughter’s wedding. Corleone is immensely powerful, as we learn by the scope of the favors he is asked to grant, which in one case includes the desire of a singer to be cast in a film to revive his musical career, and Corleone’s ability to grant them. However, it is not just what...
Words: 13907 - Pages: 56
...Chapter 1 Structure and Functions of a Computer "Hardware: the parts of a computer that can be kicked." ~ Jeff Pesis After completing this chapter, you will be able to: 1. Explain the importance of computer literacy. 2. Define the term computer. 3. Identify the components of a computer. 4. Compare the uses of various types of: input devices, output devices, and storage devices. 5. Describe categories of computers and their uses. Structure and Functions of a Computer 1 1.0 Introduction A computer is an electronic machine designed for the storage and processing of data. The machinery is called hardware, and this highly sophisticated equipment needs equally sophisticated programs (called software) to become a working computer system. Modern society has come to depend very heavily on the use of computer systems. Banks, businesses, government departments, industries, shops, people at home and school all rely on computer to play a vital role in their daily activities. These activities are centered on information. In business, the computer system has been used a lot and replaced filing cabinets as means of storing information, and clerical workers as a means of processing it. By storing and processing information on a computer system, these businesses can function more quickly and efficiently, because information can be found and collated much faster. Discovery Learning: A computer was also called a data processor. Why? 1.1 Major Parts and Functions A Computer is...
Words: 47755 - Pages: 192