600,758 research outputs found

    Development of PAN (personal area network) for Mobile Robot Using Bluetooth Transceiver

    Get PDF
    In recent years, wireless applications using radio frequency (RF) have been rapidly evolving in personal computing and communications devices. Bluetooth technology was created to replace the cables used on mobile devices. Bluetooth is an open specification and encompasses a simple low-cost, low power solution for integration into devices. This research work aim was to provide a PAN (personal area network) for computer based mobile robot that supports real-time control of four mobile robots from a host mobile robot. With ad hoc topology, mobile robots may request and establish a connection when it is within the range or terminated the connection when it leaves the area. A system that contains both hardware and software is designed to enable the robots to participate in multi-agent robotics system (MARS). Computer based mobile robot provide operating system that enabled development of wireless connection via IP address

    Application of bus emulation techniques to the design of a PCI/MC68000 bridge

    Get PDF
    Bridges easy the interconnection and communication of devices that operate using different buses. In fact, we can see a computer as a hierarchy of buses to which devices are connected. In this paper we design a PCI/MC68000 bridge in order to improve communications between a Personal Computer and a MC68000 based system. The previous interface between both devices was based on the old 16-bit ISA bus, which represented a bottleneck in their communication. However, the methodology described here is generic and can be applied to the design of PCI bridges to other buses. We finish this work with an analysis of the bridge performance improvement which can also be easily adapted to other situations. As an example our interface is used in an interesting situation, i.e., updating the obsolete control unit of a highly valuable system (an industrial robot)

    A user view of office automation or the integrated workstation

    Get PDF
    Central data bases are useful only if they are kept up to date and easily accessible in an interactive (query) mode rather than in monthly reports that may be out of date and must be searched by hand. The concepts of automatic data capture, data base management and query languages require good communications and readily available work stations to be useful. The minimal necessary work station is a personal computer which can be an important office tool if connected into other office machines and properly integrated into an office system. It has a great deal of flexibility and can often be tailored to suit the tastes, work habits and requirements of the user. Unlike dumb terminals, there is less tendency to saturate a central computer, since its free standing capabilities are available after down loading a selection of data. The PC also permits the sharing of many other facilities, like larger computing power, sophisticated graphics programs, laser printers and communications. It can provide rapid access to common data bases able to provide more up to date information than printed reports. Portable computers can access the same familiar office facilities from anywhere in the world where a telephone connection can be made

    Software-defined radio using LabVIEW and the PC sound card: A teaching platform for digital communications

    Get PDF
    Different modulation techniques and protocols require a standard communications laboratory for engineering courses to be equipped with a broad set of equipment, tools and accessories. However, the high costs involved in a hardware-based laboratory can become prohibitively expensive for many institutions. Software simulations alone can replicate most real-world applications with much lower costs. Nevertheless, they do not replace the real-world feeling provided by hardware-based systems, which can produce and receive physical signals to and from the exterior media. Advances in computer technology are allowing software-defined radio (SDR) concepts to be applied in many areas of communications. In this type of system, the baseband processing is performed completely in software while an analog RF front end hardware can be used for RF processing. The use of a software-defined radio platform in a digital communications laboratory can offer the benefits of software simulations coupled with the enthusiasm presented by hardware-based systems. A low-cost software-defined radio teaching platform implemented in LabVIEW using the personal computer sound card was developed for a digital communications laboratory along with a set of exercises to help students assimilate the concepts involved in communications theory and system implementation. This system allows for the generation, reception, processing, and analysis of signals in a 4 QAM (quadrature amplitude modulation) transceiver using the personal computer sound card to transmit and receive modulated signals. This teaching platform provides the means necessary to explore the theoretical concepts of digital communication systems in a laboratory environment. National Instruments\u27 LabVIEW graphical programming environment allows a more intuitive way of coding, which helps students to spend more time learning the relevant theory concepts and less time coding the applications. Being a flexible and modular system, modifications can be made for optimization and use with different and/or more complex techniques

    Opportunistic Scheduling and Beamforming for MIMO-SDMA Downlink Systems with Linear Combining

    Full text link
    Opportunistic scheduling and beamforming schemes are proposed for multiuser MIMO-SDMA downlink systems with linear combining in this work. Signals received from all antennas of each mobile terminal (MT) are linearly combined to improve the {\em effective} signal-to-noise-interference ratios (SINRs). By exploiting limited feedback on the effective SINRs, the base station (BS) schedules simultaneous data transmission on multiple beams to the MTs with the largest effective SINRs. Utilizing the extreme value theory, we derive the asymptotic system throughputs and scaling laws for the proposed scheduling and beamforming schemes with different linear combining techniques. Computer simulations confirm that the proposed schemes can substantially improve the system throughput.Comment: To appear in the Proceedings of the 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Athens, Greece, September 3 - 7, 200

    Transborder Data Flow: Separating the Privacy Interests of Individuals and Corporations

    Get PDF
    The merger of computer and communications technologies in the past two decades has revolutionized information processing throughout the world. The most recent telecommunications advances possible direct international transfers of sensitive personal data via computer-satellite links. Computerized data bases containing commercial information identifying citizens of one country are now routinely transferred to and stored in another, often without the knowledge of the individuals identified in the data. Numerous European countries have enacted data protection legislation with the avowed intent to protect their citizens from the improper use of personal information that is transferred extranationally. These data protection laws prohibit the export of such information under certain specified conditions

    The Internet and Its Legal Ramifications in Taiwan

    Get PDF
    Part I of this Article briefly introduces the five main legal issues related to Internet use in Taiwan. Part II discusses network-related copyright issues, including the doctrine of fair use, personal and corporate use of the Internet, and one of the first court cases in Taiwan on this issue. Part III discusses issues arising from commercial activity on the Internet, including the validity of on-line contracts, the use of digital signatures for authentication, and the applicability of Taiwan\u27s Broadcasting and Television Law, Cable Television Law, and Fair Trade Law to regulating commercial advertising on the Internet. Part IV discusses the relationship of the Internet and conventional mass communications media such as television and radio. It addresses the question of free speech, libelous or obscene content, and other issues which are familiar in a mass communications context but remain to be addressed as relating to the Internet. Part V deals with the protection of personal data on the Internet, especially in relation to the recently enacted Computer Processed Personal-Data Protection Law, and also touches on the protection of e-mail addresses and domain names. Part VI considers larceny, fraud, and other criminal acts perpetrated via computer networks (old crimes in new guises that have been termed “white collar” crime)

    The Internet and Its Legal Ramifications in Taiwan

    Get PDF
    Part I of this Article briefly introduces the five main legal issues related to Internet use in Taiwan. Part II discusses network-related copyright issues, including the doctrine of fair use, personal and corporate use of the Internet, and one of the first court cases in Taiwan on this issue. Part III discusses issues arising from commercial activity on the Internet, including the validity of on-line contracts, the use of digital signatures for authentication, and the applicability of Taiwan\u27s Broadcasting and Television Law, Cable Television Law, and Fair Trade Law to regulating commercial advertising on the Internet. Part IV discusses the relationship of the Internet and conventional mass communications media such as television and radio. It addresses the question of free speech, libelous or obscene content, and other issues which are familiar in a mass communications context but remain to be addressed as relating to the Internet. Part V deals with the protection of personal data on the Internet, especially in relation to the recently enacted Computer Processed Personal-Data Protection Law, and also touches on the protection of e-mail addresses and domain names. Part VI considers larceny, fraud, and other criminal acts perpetrated via computer networks (old crimes in new guises that have been termed “white collar” crime)
    corecore