Telekontrol Hexapod Spy Robot Menggunakan Wifi Berbasis Web Server
Abstract
Keywords
Full Text:
PDFReferences
Harsono, D., Suhendro, B., Laksono, R., Rancang Bangun Robot Hexapod dengan Kendali Jarak Jauh.
STTN-BTNN, 2012.
I. K. A. K. W. Ady Aryanto I Nyoman; Muriarka, I Gede, “Hexapod
Robot Dengan Kendali Website Menggunakan Mikrokomputer dan
Mikrokontroler,” JOSIKOM J. Online Sist. Komput., no. Vol 1, No 1
(2015), 2015.
I. C. Mauko and S. Tunliu, “Kontrol Arah Gerak Web Kamera
(Webcam) Berbasis Web,” J. Ilm. Flash, vol. 2, no. 2, p. 106, 2019.
M. Rashid, M. Aras, and A. Radzak, “Development of Hexapod Robot
with Manoeuvrable Wheel,” Institutions, vol. 49, no. January, 2012.
S. Zhong, Y. Zhu, X. Chi, H. Shi, H. Sun, and S. Wang, “Optical
lensless-camera communications aided by neural network,” Appl. Sci.,
vol. 9, no. 16, 2019.
M. Simscape, “Pemodelan Dan Analisa Struktur Mekanika Pada
Kontrol Sistem Adaptif End Effector Dengan Dynamixel AX-18A
Motor Servo,” vol. 3, no. 1, pp. 1–12, 2018.
A. N. Kokoulin, A. I. Tur, A. A. Yuzhakov, and A. I. Knyazev,
“Hierarchical convolutional neural network architecture in distributed
facial recognition system,” Proc. 2019 IEEE Conf. Russ. Young Res.
Electr. Electron. Eng. ElConRus 2019, pp. 258–262, 2019.
S. Bipasha Biswas and M. Tariq Iqbal, “Solar Water Pumping System
Control Using a Low Cost ESP32 Microcontroller,” Can. Conf. Electr.
Comput. Eng., vol. 2018-May, pp. 1–5, 2018.
A. Chairunnas, “Penerapan Algoritma Tripod Gait Pada Robot
Hexapod Menggunakan Arduino Mega128,” vol. 7, no. 1, pp. 37–48,
G. Papandreou, T. Zhu, L.-C. Chen, S. Gidaris, J. Tompson, and K.
Murphy, “Personlab: Person pose estimation and instance segmentation
with a bottom-up, part-based, geometric embedding model,” in
Proceedings of the European Conference on Computer Vision (ECCV),
, pp. 269–286.
K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image
recognition,” in Proceedings of the IEEE conference on computer
vision and pattern recognition, 2016, pp. 770–778.
C. Liu, J. Han, and Q. Wei, “Browser Identification Based on
Encrypted Traffic BT - 2016 International Conference on
Communications, Information Management and Network Security,”
, pp. 360–363.
Refbacks
- There are currently no refbacks.