scholarly journals The DESIGN AND DEVELOPMENT OF COMBAT ROBOT SYSTEM ON THE CIA VERSION N2MR3 USING THE INTERNET OF THINGS (IOT) BASED RASPBERRY PI 4.0

2021 ◽  
Vol 2 (Oktober) ◽  
pp. 1-10
Author(s):  
Melkianus Penu ◽  
Petrus Gunawan ◽  
Muhamat Maariful Huda

Abstract - Along with the rapid development of science and technology, including robot technology. It can lighten and help the work done by humans. In the military world, the role of robots is indispensable both in peace and in war. This research was carried out using a pure experimental method on the Design of a Propulsion System for Combat Robots using the Internet of Things (IoT) Based on Raspberry 4.0. The working principle of this combat robot is based on data sent using MiFi (Tx) which will then be processed using Raspberry 4.0 and transmitted to MiFi (Rx) via the Internet of Things (IoT). Furthermore, the data received will be processed so that the driving system will produce driving force using a differential drive system, the difference in rotation of the driving motor is regulated by the microprocessor to the MY 1061 speed control, the pulse signal sent by the Raspberry Pi will regulate the amount of current sent to the DC motor so that the motor can turn left and right.

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Rabia Saylam ◽  
Abdulkadir Ozdemir

Purpose This study aims to examine the perception of military people regarding the use of a network of various intelligent objects, the Internet of Things (IoT), in the future battlespace. Design/methodology/approach A research model that analyzes military acceptance of the IoT is proposed. The model is created by integrating the technology acceptance model and diffusion of innovation theory. Then an empirical study is conducted through a survey, and the proposed hypotheses are tested. The findings are obtained thanks to the structural equation model (SEM), which clearly reveals the overall dependency relationship among independent and dependent variables even when a dependent variable is an independent variable in another relationship. Findings The study clearly reveals the significant factors effecting the attitude toward the use of IoT in the military. It also uncovers potential barriers to the adoption of IoT in the military domain. Especially, risk factor seems to have no significant impact on the acceptance of IoT, and also, there seems to be a positive relationship between risk and trust contrary to an expected negative relationship. Originality/value To the best of the authors’ knowledge, this study is the first research analyzing the acceptance of IoT in the military domain through hypotheses in a SEM.


Author(s):  
Bill Karakostas

To improve the overall impact of the Internet of Things (IoT), intelligent capabilities must be developed at the edge of the IoT ‘Cloud.' ‘Smart' IoT objects must not only communicate with their environment, but also use embedded knowledge to interpret signals, and by making inferences augment their knowledge of their own state and that of their environment. Thus, intelligent IoT objects must improve their capabilities to make autonomous decisions without reliance to external computing infrastructure. In this chapter, we illustrate the concept of smart autonomous logistic objects with a proof of concept prototype built using an embedded version of the Prolog language, running on a Raspberry Pi credit-card-sized single-board computer to which an RFID reader is attached. The intelligent object is combining the RFID readings from its environment with embedded knowledge to infer new knowledge about its status. We test the system performance in a simulated environment consisting of logistics objects.


2012 ◽  
Vol 452-453 ◽  
pp. 932-936
Author(s):  
Xiang Dong Hu ◽  
Peng Qin Yu

With the rapid development of ubiquitous network and its applications, the key technologies of the Internet of things are actively researched all over the world. The Internet of things has tremendous attraction for adversaries, and it is easily attacked due to poor resource and non-perfect distribution of sensor nodes, then false data maybe be injected into network. Security is one of the most important demands for applications in the Internet of things, an algorithm of malicious nodes detection is proposed to protect the network from destruction based on weighted confidence filter, namely, the cluster heads take charge of collecting messages from nodes and computing their average of confidence in cluster-based network, then they aggregate data from nodes with higher confidence than average and ignore the others, they update confidence of each node by comparing the aggregation value and the received data, and regard it as the weight of exactness of message from node. A sensor node is judged to be a malicious one if its weight is lower than the set threshold. The simulation results show that the algorithm can detect malicious nodes with high detection ratio, low false alarm ratio and outstanding scalability.


2014 ◽  
Vol 2014 ◽  
pp. 1-10 ◽  
Author(s):  
Sun-Young Ihm ◽  
Aziz Nasridinov ◽  
Young-Ho Park

A rapid development in wireless communication and radio frequency technology has enabled the Internet of Things (IoT) to enter every aspect of our life. However, as more and more sensors get connected to the Internet, they generate huge amounts of data. Thus, widespread deployment of IoT requires development of solutions for analyzing the potentially huge amounts of data they generate. A top-kquery processing can be applied to facilitate this task. The top-kqueries retrievektuples with the lowest or the highest scores among all of the tuples in the database. There are many methods to answer top-kqueries, where skyline methods are efficient when considering all attribute values of tuples. The representative skyline methods are soft-filter-skyline (SFS) algorithm, angle-based space partitioning (ABSP), and plane-project-parallel-skyline (PPPS). Among them, PPPS improves ABSP by partitioning data space into a number of spaces using hyperplane projection. However, PPPS has a high index building time in high-dimensional databases. In this paper, we propose a new skyline method (called Grid-PPPS) for efficiently handling top-kqueries in IoT applications. The proposed method first performs grid-based partitioning on data space and then partitions it once again using hyperplane projection. Experimental results show that our method improves the index building time compared to the existing state-of-the-art methods.


2021 ◽  
Vol 12 (36) ◽  
pp. 11936-11954
Author(s):  
Kai-Li Wang ◽  
Yu-Hang Zhou ◽  
Yan-Hui Lou ◽  
Zhao-Kui Wang

With the rapid development of the Internet of Things (IoTs), photovoltaics (PVs) has a vast market supply gap of billion dollars.


Author(s):  
Ahmed Waleed Al-Khafaji

Physical security systems are applied to alert in advance a well-known vector of attacks. This paper presents an analysis of the research and assessment of physical security systems applying the PSMECA technique (analysis of modes, efforts, and criticality of physical security). The object of research and analysis is the physical security system of the Ministry of Education and Science of Iraq (as the infrastructure of the region's objects), as well as the area of the compact living of students and co-workers (campus). This paper discusses the organization of physical security systems, which are based on devices with low power consumption and function in the Internet of things environment. The main aim is to describe and develop a physical security system that functions in the Internet of things environment, as well as the development of a scheme for the research and development of models and methods for risk analysis, models of functions and components, models of failures and conducting research and analysis of occurrence failures of PSS. The generalized structural and hierarchical scheme of the physical security system of the infrastructure of the region is presented, as well as the applied application of the scheme is illustrated by the example of the physical security system of a student campus of one of the universities of Baghdad. The functional modeling scheme of the object is provided and is based on the use of the Raspberry Pi microcomputer and the Arduino microcontroller. The set-theoretical models of functions, components, and failures of the system under study, as well as the projection of a hierarchical failure structure in the table of the basic structural elements of the system, are presented. The IDEF0 diagram, showing a power outage scenario (accidental or intentional) in connection with lighting and video subsystems, is presented. The scheme of research and development of models and methods of analysis of risks of PSS is carried out in the paper. A PSMECA table for the CCTV system has been created, which allows you to more precisely determine the cause of the failure in the physical security system and the importance of failure criticality


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Jie Du

As the economy grows rapidly and IoT technology advances rapidly, the logistics industry as a service industry is growing rapidly around the world. The logistics industry, meanwhile, is the one that can best play the role of IoT. The rapid development of the logistics industry has brought great competition challenges to the logistics industry. To solve the competitive problems of the logistics industry cluster, this article introduces the research on the upgrade path and strategy of the logistics industry cluster based on the Internet of Things and uses the analytic hierarchy process, investigation method, and expert evaluation method to build the IoT technology information model and logistics cost. According to the established optimization model, the following are proposed: analyzing the problems existing in the logistics industry cluster, giving an upgrade path from the four aspects of manufacturing, technology, structure, and service, and giving specific strategic suggestions from the aspects of talents and enterprises. The accuracy rate of current analysis is as high as 90%, and the implementation rate of upgrade paths and strategy recommendations is as high as 95%.


Sign in / Sign up

Export Citation Format

Share Document