Biblio
In light of the problem for garbage cleaning in small water area, an intelligent miniature water surface garbage cleaning robot with unmanned driving and convenient operation is designed. Based on STC12C5A60S2 as the main controller in the design, power module, transmission module and cleaning module are controlled together to realize the function of cleaning and transporting garbage, intelligent remote control of miniature water surface garbage cleaning robot is realized by the WiFi module. Then the prototype is developed and tested, which will verify the rationality of the design. Compared with the traditional manual driving water surface cleaning devices, the designed robot realizes the intelligent control of unmanned driving, and achieves the purpose of saving human resources and reducing labor intensity, and the system operates security and stability, which has certain practical value.
In this paper, we applied IoT (Internet of things) technology and SMS (short message service) technology to vehicle security system, and designed vehicle remote control system to ensure the vehicle security. Besides, we discussed the method that converted the displacement increment to latitude and longitude increment in order to solve the problem that how to accurately obtain the current location information when GPS (Global Positioning System) failed. The hardware system can realize such function that owners by sending an SMS, or by sending the password through web side of IoT platform, you can remotely control the car alarm system opening or closing, and query vehicle position and other functions. Through this method, it is easy to achieve security for vehicle positioning and tracking.
In this paper, the mathematical framework of behavioral system will be applied to detect the cyber-attack on the networked control system which is used to control the remotely operated underwater vehicle ROV. The Intelligent Generalized Predictive Controller IGPC is used to control the ROV. The IGPC is designed with fault-tolerant ability. In consequence of the used fault accommodation technique, the proposed cyber-attacks detector is able to clearly detect the presence of attacker control signal and to distinguish between the effects of the attacker signal and fault on the plant side. The test result of the suggested method demonstrates that it can be considerably used for detection of the cyber-attack.