Development of IoT self-tuning control device using Wi-Fi

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimizing Power Consumption of Wi-Fi inbuild IoT device

The Internet of Things (IoT) – connection of small smart sensors, actuators and other devices to the Internet – is a key concept within the smart home. To ease deployment, such devices are often wireless and battery powered. An important question is the wireless interface used. The ubiquity of WiFi in homes today makes this an attractive option, but the relatively high power requirements of Wi-...

متن کامل

Using RFID and Wi-Fi in Healthcare

Europe faces a considerable challenge in providing good quality health care in the forthcoming future as the aging population increases. The phenomenon also results in a considerable cost on society due to the dependency on the public health sector particularly because such individuals would not be able to contribute to the economy. On the other hand, younger persons would need to make alternat...

متن کامل

Remote Monitoring and Control of Industrial Robot based on Android Device and Wi-Fi Communication

Robot control systems are usually complex systems whose users must be well trained to use them. Also, control process is mainly carried out near the robot or by using wired connections. There is a need for a solution that can provide convenient and intuitive robot control with user’s location independence, easy adjustment and simultaneously monitoring of robot motion tasks. Android devices are ...

متن کامل

Wi-Fi Walkman

Wireless home entertainment center refers to a device able to handle heterogeneous media and to connect client devices located within the house and the outside world (i.e., the Internet).

متن کامل

Surveying Wi-fi Security

This paper is a study of the use and possible flaws of the two basic cryptographic protocols (WEP, WPA) in Wi-Fi Networks. It is presenting some very easy to implement methods to gain malicious access to such networks by disclosing the network secret key, using Windows Operating Systems, like Win XP. It is also describing the shutter of the myth saying that the MAC Address filtering is a safe p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings of International Conference on Artificial Life and Robotics

سال: 2023

ISSN: ['2188-7829', '2435-9157']

DOI: https://doi.org/10.5954/icarob.2023.os7-4