Author(s):  
Vahid Aryai ◽  
Mahsa Kharazi ◽  
Farid Ariai

<p><span lang="EN-AU">Four path planning and data exchange algorithms for cooperative search and coverage robotic missions are proposed and modified. The introduced methods are simulated using C++ programming environment and the results are discussed in detail for environments with static obstacles. It has been shown that using the <strong>“nearest zero-point”</strong> algorithm can greatly optimize the mission duration and also overlapping of the search trajectories. Finally, the results are compared with several existing algorithms.</span></p>


In the recent years there has been a tremendous growth in the field of engineering and sciences, which aided in the growth and development of fast and comfortable transportation media, with this development the number of automobiles have drastically increased, which for sure is a great technological achievement but sadly with this growth, the traffic and the hustle and bustle on roads is unstoppable and with it the number of accidents and road casualties have tremendously increased. But, there is no easy and practical way to reduce the usage of the automobiles. Every day the mankind read about thousands of people dying of road casualties and most of them die because the families or the concerned ones of the indulged people are not timely informed. The death casualties can be minimized to a great extent by just timely informing the families of the concerned ones. The prototype in this paper is an accident notification systemESP8266 NodeMCU and a simple vibration sensor is the heart of this system. The vibration sensor continuously senses the vibrations and on exceeding a predefined threshold limit, sends out a notification to registered numbers. In the past similar models have been proposed, which used costlier sensors such as Accelerometerbut the design in this paper, used simpler and cheaper sensor. Moreover, in earlier designs GSM technology was used but proposed design uses a Wi-Fi based controller, which in comparison to GSM technology is more reliable and fast. Also earlier GSM module needed an additional microcontroller such as Arduino but the use of NodeMCU eliminates the requirement of any additional controller. The prototype system in this paper makes the use of message queuing telemetry transport (MQTT) protocol, which is a very reliable and fast communication protocol which further uses subscribe and publish technology. The IoT cloud platform used in this prototype is Adafruit IO which is quite simpler when compared to other cloud platforms such as Losant Platform and moreover the data is updated every two seconds in Adafruit IO. For the notification purpose protocol is used with the help of IFTTT platform and ClickSend platform, Applets and Triggers are created to fulfill the requirement. The controller is programed using basic C and C++ programming languages and Arduino IDE serves as the programming environment, various library files have also been used for the programming purposes.


Author(s):  
Timothy K. Shih ◽  
Yule-Chyun Lin ◽  
Wen C. Pai ◽  
Chun-Chia Wang

Software metrics serve as a significant issue to improve software quality. It is an important research of software engineering. In line with the methodologies of object-oriented analysis and design widely developed, many software metrics techniques have been proposed. However, not many focus on the metrics evaluation of an inheritance hierarchy. In this paper, we propose a novel concept named unit repeated inheritance (URI) in Z notation to realize object-oriented software metrics. The approach describes an inheritance level technique (ILT) method as a guide to measure the software complexity of an inheritance hierarchy. The measures of inheritance metrics are formed based on the proposed mechanism. Also, we use Lex and Yacc to construct a windowing tool which is used in conjunction with a conventional C++ programming environment to assist a programmer to analyze and measure his/her C++ programs.


Author(s):  
Kin'ichi Mitsui ◽  
Hiroaki Nakamura ◽  
Theodore C. Law ◽  
Shahram Javey

2021 ◽  
pp. 102-105
Author(s):  
M.V. Kurkina ◽  
I.V. Ponomarev ◽  
D.I. Strokin

The active development of computer systems and information technologies implies an increase in the importance of ensuring the protection and security of information during its transfer or storage. Today, the fulfillment of the necessary data confidentiality requirements tends to the direction of cryptography and steganography. The choice of the applied method of encoding information directly depends on the goals of the user, as well as the available software. The main requirement for the message encoding process is the availability of acceptable computational complexity of the implementation. The article discusses methods of ensuring data confidentiality employing digital steganography, using BMP images as container files, and carrying out their subsequent compression to the JPEG format without losing hidden information. Mathematical methods of constructing a stegosystem for encoding ASCII are studied — a message, each character of which is encoded with exactly one byte. As a result, a computer program was created based on the Microsoft Visual Studio 2017 programming environment and the C# programming language (.NET Framework). The stereotype, in this case, is a sequence of steps between image pixels, into which information is embedded. In this case, the algorithm allows you to memorize not the entire sequence of steps (that is, not the entire keystroke), but only the first five characters of the key or half of the key.


2014 ◽  
Vol 644-650 ◽  
pp. 4144-4147
Author(s):  
Yuan Yuan Zhu ◽  
Wen Jie Yang ◽  
Lei Li ◽  
Xiao Kang Sun

Utilizing visual characteristics of human eyes, color additive theory can make richer colors from red (R), green (G) and blue (B), the three primary colors. Our people live in a colorful world, and color exists everywhere. Many experiments has proved that the three colors can be mixed together to get various colors. In the paper, color additive theory on RGB is shown in a fun, novel manner by user-friendly dynamic process under Microsoft Visual C++ programming environment, whose purpose is to intuitively present the effect of different color overlapping to the viewers. Following the steps of reading image’s data, displaying the pixels, generating color bitmap and showing the dynamical movement of images in single channel, the program displays the mixing process of any two of red, green, and blue colors to get brighter colors, which are called yellow, cyan and magenta and an equal combination of the three colors can get white color.


Sign in / Sign up

Export Citation Format

Share Document