期刊文献+

机器人一体机远程监控平台的音视频传输研究与设计 被引量:1

Research and Design of Audio and Video Transmission in Remote Monitoring Platform of Robot Integrated Machine
下载PDF
导出
摘要 文章分析了一个典型的机器人一体机(RIM)远程控制方案,研究了该方案中的用于解决海量数据传输问题的监控平台。在数据传输过程中,音视频数据的传输效率是个亟待解决的问题。文章也对该控制方案中的结构进行了深入研究与分析,详细叙述了广域网音视频传输系统的需求,设计并实现了广域网中不同局域网之间的音视频信息的传输,为移动机器人的遥操作提供支持,介绍了系统所用到的关键技术并对系统进行了测试与分析。该方案简单明了,实现方便,通过了相关测试。 This paper analyzed classical Robot Integrated Machine(RIM) remote control scheme, studied a monitoring platform in the scheme to solve the problem of massive data transmission. In data transmission, the transmission efficiency of the audio and video data is a very important problem to be solved. The paper also deeply researched and analyzed the structure in the scheme, described requirements in detail the audio and video transmission system in Wide Area Network, designed and realized the audio and video information transmission between the different LANs in a WAN, provided support for a mobile robot teleoperation, introduced the key technology used in system and tested and analyzed the system. This scheme is simple, easy to implement, through the relevant test.
作者 王文明
出处 《信息网络安全》 2014年第3期17-23,共7页 Netinfo Security
基金 科技部科技创新基金[12C26213603779]
关键词 音频 视频 遥操作 机器人一体机 网络传输 audio video teleoperation RIM network transmission
  • 相关文献

参考文献16

  • 1WANG Wen-ruing. Application oriented designing for remote control scheme of robot integrated machine[J]. International Core Journal of Scientific Research Engineering Index ( ICSREI ), 2012, (2):39-43. 被引量:1
  • 2王文明.机器人一体机远程监控平台研究与设计[J].信息网络安全,2012(11):17-22. 被引量:4
  • 3刘思音.基于XMPP的机器人遥操作平台设计[D].北京:北京理工大学,2006. 被引量:1
  • 4王亚浩.广域网音视频传输技术设计与实现研究[D].北京:北京理工大学.2009. 被引量:1
  • 5WANG Wen-ming, YU Ya-peng. Robot visual design with the panorama synthesis function[J]. International Conference on Computer Science and Education ( ICCSE ) , 2013,(6):23-27. 被引量:1
  • 6Maria Guadalupe Jimenez Velasco, Angelica Munoz Melendez. Multi- robot Motion Coordination based on Swing Propagation[C].Seventh Mexican International Conference on Computer Science.2006:186-191. 被引量:1
  • 7李磊,叶涛,谭民,陈细军.移动机器人技术研究现状与未来[J].机器人,2002,24(5):475-480. 被引量:347
  • 8朱张斌.机器人遥操作中安全技术研究[D].广东:华南理工大学,2012. 被引量:2
  • 9张克敏..基于虚拟现实的机器人仿真研究[D].重庆大学,2012:
  • 10胡萍,符秀辉.基于Web的机器人遥操作系统[J].仪器仪表学报,2005,26(z1):479-480. 被引量:3

二级参考文献18

  • 1刘少强,王爱民,樊晓平,黄惟一.实现比率遥操作系统稳定性与性能折衷的策略[J].控制理论与应用,2005,22(4):661-665. 被引量:6
  • 2蒋新松.未来机器人技术发展方向的探讨[J].机器人,1996,18(5):285-291. 被引量:45
  • 3王越超.多机器人协作系统研究:博士论文[M].哈尔滨工业大学,1999.. 被引量:1
  • 4[3]TAYLOR, Web-basedtelerobotics. Robotica 1999, 17:49~57. 被引量:1
  • 5Yokokohji Y,Yoshikawa T. Bilateral control of master-slave manipula- tors for ideal kinesthetic coupling-formulation and erperiment [J]. IEEE Transactions on Robotics and Automation, 1994, 10(5) :605-619. 被引量:1
  • 6Yasuyoshi Y ,Yokokohji Y.Analysis of maneuverability and stability of microteleoperation systems[C]//Proc of IEEE Int Conf on Ro- botics and Automation. San Diego,CA: IEEE Rob and Auto Society, 1994,1:237-242. 被引量:1
  • 7Jong Hyeon Park, et al. Sliding-Mode Controller for Bilateral Teleo- peration with Varying Time Delay [C]. International Conference on Advanced Intelligent Mechatronics. 1999.311-316. 被引量:1
  • 8WANG Wen-ming.Application oriented designing for remote control scheme of robot integrated machine[J]. ICSREI International Core Journal of Scientific Research Engineering Index. 2012, (03): 39-43. 被引量:1
  • 9Anthony Jones,Jim ohlund. Network Programming for Microsoft Windows-2nd[M].Washington: Microsoft press, 2002. 被引量:1
  • 10王景文.网络监控软件的设计与实践[D]北京:北京理工大学,2012. 被引量:1

共引文献353

同被引文献39

  • 1MellP, Grance T. The NIST definition of cloud computing (draft)[J].NIST special publication, 2011, 800(145):7-12. 被引量:1
  • 2ClarkB, Deshane T, Dow E M, et al. Xen and the Art of RepeatedResearch[C]//USENIX Annual Technical Conference, FPJEENIX Track.2004: 135-144. 被引量:1
  • 3KVM.Kernel based virtual machine[EB/OL] http://www.linux-kvm.org/page/Main一Page,2014-9-11. 被引量:1
  • 4PayneB D, De Carbone M D P, Lee W. Secure and flexible monitoringof virtual machines[C]//Computer Security Applications Conference,2007. ACSAC 2007. Twenty-Third Annual. IEEE, 2007: 385-397. 被引量:1
  • 5NanceK, Hay B, Bishop M. virtual machine introspection[J].IEEEComputer Society, 2008. 被引量:1
  • 6XiongH, Liu Z, Xu W, et al. Libvmi: A Library for Bridging theSemantic Gap between Guest OS and VMM[C]//Computer andInformation Technology (CIT), 2012 IEEE 12th International Conferenceon. IEEE, 2012: 549-556. 被引量:1
  • 7WangY, Hu C, Li B. Vmdetector: a VMM-based platform to detecthidden process by multi-view comparison[C]//High-Assurance SystemsEngineering (HASE), 2011 IEEE 13th International Symposium on. IEEE,2011: 307-312. 被引量:1
  • 8Li tty L, Lagar-CavilJa H A, Lie D. Hypervisor Support for IdentifyingCovertly Executing Binaries[C]//USENIX Security Symposium. 2008:243-258. 被引量:1
  • 9TomlinsonA. Introduction to the TPM [M]//Smart Cards, Tokens,Security and Applications. New York: Spring US,2008:155-172. 被引量:1
  • 10SailerR, Zhang X,Jaeger T, et al. Design and Implementation of aTCG-based Integrity Measurement Architecture[C]//USENIX SecuritySymposium. 2004,13: 223-238. 被引量:1

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部