Telecommunication networks coverage area expansion in disaster area using autonomous mobile robots: Hardware and software implementation

E. Budianto, M. S. Alvissalim, A. Hafidh, Adi Wibowo, Wisnu Jatmiko, Bob Hardian, Petrus Mursanto, Abdul Muis

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

Communication network expansion technology using autonomous robot covers three research fields which includes network expansion, network routing, and localization. On this research, we implement an efficient robot formation and network expansion algorithm on a simulator based on Open Dynamics Engine (ODE) library. We extended the robot formation algorithm to handle multiple sources implementation to keep communication linkage between communication towers. We also developed a network routing algorithm and implement the robot formation algorithm on real autonomous robots hardware. The result of simulation shows that our proposed communication network expansion technology is visible to be implemented. Therefore, we designed an autonomous robot meeting the requirement set in the simulation.

Original languageEnglish
Title of host publicationICACSIS 2011 - 2011 International Conference on Advanced Computer Science and Information Systems, Proceedings
Pages113-118
Number of pages6
Publication statusPublished - 1 Dec 2011
Event2011 International Conference on Advanced Computer Science and Information Systems, ICACSIS 2011 - Jakarta, Indonesia
Duration: 17 Dec 201118 Dec 2011

Publication series

NameICACSIS 2011 - 2011 International Conference on Advanced Computer Science and Information Systems, Proceedings

Conference

Conference2011 International Conference on Advanced Computer Science and Information Systems, ICACSIS 2011
Country/TerritoryIndonesia
CityJakarta
Period17/12/1118/12/11

Fingerprint

Dive into the research topics of 'Telecommunication networks coverage area expansion in disaster area using autonomous mobile robots: Hardware and software implementation'. Together they form a unique fingerprint.

Cite this