Explore chapters and articles related to this topic
Application
Published in Benny Raphael, Construction and Building Automation, 2023
Connectivity using Wi-Fi is now common. Wi-Fi uses radio signals to connect to the internet through a wireless router. This technology can also be used to track devices by locating the router to which the device is connected. Signal strength has been used to identify the location of devices using this concept. Zigbee is another global standard for wireless communication and is cheaper as well as energy efficient.
Using deep learning in an embedded system for real-time target detection based on images from an unmanned aerial vehicle: vehicle detection as a case study
Published in International Journal of Digital Earth, 2023
Fang Huang, Shengyi Chen, Qi Wang, Yingjie Chen, Dandan Zhang
A certain amount of hardware support is required to meet the above requirements. All the hardware and its connections are shown in Figure 1. The system hardware can be divided into two parts: the onboard and the ground parts. The onboard equipment is composed of a DJI M600 Pro UAV, an NVIDIA Jetson TX2 embedded development board, a charge-coupled device (CCD) camera, a global positioning system (GPS) module, and a wireless Wi-Fi module on the TX2. The TX2, CCD camera, and GPS module are fixed on the simple pan of the UAV. The TX2 draws power from the UAV through a voltage-stabilizing module, while the CCD camera and GPS module are powered by the TX2. The ground part consists of a USB-powered high-power wireless router and a laptop server. The TX2 from the onboard equipment and the server on the ground communicate through a LAN composed of routers.
Proactive flow control using adaptive beam forming for smart intra-layer data communication in wireless network on chip
Published in Automatika, 2023
Dinesh Kumar T.R., Karthikeyan A.
As illustrated in Figure 1, the suggested architecture is based on an 8 × 8 multi-core (64 cores) WiNoC topology. Each layer has four clusters, each with 64 cores (8 × 8 cores). Unlike mesh topologies, which connect each core or processing element (PE) to a router, the proposed PF SDC system creates a scalable architecture by sharing a single wired router among four PEs (cores and memories). In a mesh topology, 16 cores have 16 wired routers. However, in the suggested architecture, each cluster of 16 cores (4 × 4 cores) has 4 wired routers, as shown in Figure 1. A wireless router is also installed in the heart of each cluster, making it wirelessly accessible to all four wired routers. The Intelligent Head Agent (IHA) in each cluster is the wireless router. To make the most of the wireless medium, the IHA employs appropriate flow control methods. The routing method incorporating a wireless link should be used if it minimizes the total path length compared to the wired path between a pair of source and destination hubs without WIs. This can cause a hotspot in the WIs as multiple messages try to use WiFi shortcuts at the same time, overloading the WIs and increasing latency. This challenge can be solved using a proactive flow control approach with distributed routing. The goal is to use as little power and resources as possible to do intra-layer communication over a wireless link with low latency and high throughput.
Security in Internet of Drones: A Comprehensive Review
Published in Cogent Engineering, 2022
Snehal Samanth, Prema K V, Mamatha Balachandra
Semal et al. have proposed a group authenticated certificateless key agreement protocol to ensure security in untrusted UAV networks communication. The protocol has two main phases: the initialization phase and the group key agreement phase. The group key agreement phase has a setup phase, two rounds, followed by a key generation phase. The experiment is conducted using two Rasberry Pi (one acting as client, and another as server), and a wireless router. The implementation has been done using C language. Analysis of the proposed scheme shows that it exhibits different security features like mutual authentication, mutual key agreement, joint key control, non-repudiation, forward secrecy, known key security, key freshness, conditional privacy, entity revocation, and key escrow elimination; and also the proposed scheme provides the best security features when compared with some existing authenticated certificateless key agreement protocols. Formal analysis of the protocol is done using the Scyther tool. Scyther tool shows that the proposed protocol provides different security features like session key secrecy, non-injective synchronization, non-injective agreement, aliveness, and weak agreement. The total time elapsed for the group key agreement phase through WLAN is 598 ms, and that through loop-back interface is 471 ms. The extra total time in the WLAN interface is due to (n-1) bilinear pairing operations (Semal etal., 2018).