SlideShare a Scribd company logo
1 of 14
Download to read offline
Safety Tracker
An initiative towards ensuring safety of factory employees
Abhishek Das – abhishek.d@itcinfotech.com
Narendra Patil – narendra.patil@itcinfotech.com
Roshan Joseph– roshan.joseph@itcinfotech.com
Background
1. The news of factory employees falling victim to unforgiving work conditions has become a
regular column in our newspapers.
2. No matter what safety measures are taken, people are still falling prey to fast and heavy
machinery, high altitude environments, high voltage zones, et al.
3. Most of these events are a result of ignorance, lack of supervision and defiance.
4. Such events demanded actions; in the form of improvised supervision, automatic alert and
manual intimation systems.
5. Hence, we came up with an IoT solution, which facilitates these actions, even from remote
locations.
6. Sensor equipped gears networked with employees and supervisor(s) in-charge, presented in
a web-hosted dashboard is what our solution is all about.
7. Not only can employees be monitored at an individual level, but also can be intimated
whenever he takes out any of his protective gears, while working under high risk
conditions.
Operational Construction
1. Each employee is provided with sensor equipped
protective gears that talk to a gateway fitted into his
helmet over Wi-Fi.
2. This gateway is responsible for mapping him onto
the dashboard presented to his supervisor.
3. The status of each of his gear, be it his helmet,
glove or boot can be monitored from the
dashboard.
4. Removal of any such equipment immediately raises
an alarm in form of a red light within his zone.
Besides, his safety status is marked red in the
dashboard at the supervisor’s end, from where the
latter can turn the buzzer on, fitted at the former’s
helmet, as an intimation asking him to wear his
gear.
Solution Architecture
Raspberry Pi
Atomiton
TQL Engine
Employee
Avatar
Buzzer
Alert Light
Safety
Gears
Hardware Setup
Boot equipped with a
Pressure Sensor connected
to a Wi-Fi module
Helmet equipped with a
Buzzer and an IR Sensor
connected with a
Raspberry Pi fixed inside
Dashboard
Avatar – Safe Condition
Avatar – Unsafe Condition
Simulator – Safe Condition
Simulator – Unsafe Condition
Live Camera – Safe Condition
Live Camera – Unsafe Condition
Looking Forward
1. The biggest challenge that we faced was in miniaturizing the sensor setup for each
equipment so that there is no hindrance to wearing the equipment. We are working towards
further reducing their dimensions so that we have a final blueprint for bulk manufacturing
of these devices.
2. Till now, we have equipped the helmet and boot with sensors that can track the safety state.
We are planning on equipping the gloves too so that we cover all the three aspects of
ensuring safety of a plant worker, at a general level.
3. Integrating every device to Atomiton’s TQL Engine was also a challenge. Although we
fairly managed to make things work, we are looking forward to achieve a better model so
that we can scale out easily with increasing number of devices.
4. As of now, we have our solution running in our own premises. We are planning to have it
deployed over one of the public clouds – preferably as an Azure WebApp so that the scope
in not just restricted to the network in the factory.
Thank You.
Abhishek Das – abhishek.d@itcinfotech.com
Narendra Patil – narendra.patil@itcinfotech.com
Roshan Joseph– roshan.joseph@itcinfotech.com

More Related Content

Similar to Safety Tracker

Similar to Safety Tracker (20)

Assisting gear
Assisting gearAssisting gear
Assisting gear
 
Smart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionSmart Surveillance System through Computer Vision
Smart Surveillance System through Computer Vision
 
Secured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasSecured Spy for Highly Secured Areas
Secured Spy for Highly Secured Areas
 
Intelligent Wheel Chair Based on Internet of Things
Intelligent Wheel Chair Based on Internet of ThingsIntelligent Wheel Chair Based on Internet of Things
Intelligent Wheel Chair Based on Internet of Things
 
Comparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi TechnologyComparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi Technology
 
Minder RTP Product Overview
Minder RTP Product OverviewMinder RTP Product Overview
Minder RTP Product Overview
 
Home Security System based on IOT: A Systematic Alert System
Home Security System based on IOT: A Systematic Alert SystemHome Security System based on IOT: A Systematic Alert System
Home Security System based on IOT: A Systematic Alert System
 
Minder Product Demo
Minder Product DemoMinder Product Demo
Minder Product Demo
 
IoT Based Smart Surveillance System
IoT Based Smart Surveillance SystemIoT Based Smart Surveillance System
IoT Based Smart Surveillance System
 
IRJET- TOUCH ME NOT-A Women Safety Device
IRJET- TOUCH ME NOT-A Women Safety DeviceIRJET- TOUCH ME NOT-A Women Safety Device
IRJET- TOUCH ME NOT-A Women Safety Device
 
IRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoTIRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoT
 
Voice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance SystemVoice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance System
 
IoT Based Home Automation System_revised_27_06_2021.pptx
IoT Based Home Automation System_revised_27_06_2021.pptxIoT Based Home Automation System_revised_27_06_2021.pptx
IoT Based Home Automation System_revised_27_06_2021.pptx
 
Internet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of thingsInternet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of things
 
Home Security Systems using Camera and Android Application
Home Security Systems using Camera and Android ApplicationHome Security Systems using Camera and Android Application
Home Security Systems using Camera and Android Application
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
 
RealNET – Internet of Things in Everyday Life using Raspberry Pi
RealNET – Internet of Things in Everyday Life using Raspberry PiRealNET – Internet of Things in Everyday Life using Raspberry Pi
RealNET – Internet of Things in Everyday Life using Raspberry Pi
 
IRJET-Wireless Controlling of Remote Electrical Device using Android Smartphone
IRJET-Wireless Controlling of Remote Electrical Device using Android SmartphoneIRJET-Wireless Controlling of Remote Electrical Device using Android Smartphone
IRJET-Wireless Controlling of Remote Electrical Device using Android Smartphone
 
IRJET - IoT based Anti Theft Detection and Alerting System using Raspberry Pi
IRJET - IoT based Anti Theft Detection and Alerting System using Raspberry PiIRJET - IoT based Anti Theft Detection and Alerting System using Raspberry Pi
IRJET - IoT based Anti Theft Detection and Alerting System using Raspberry Pi
 
RAT Trap: Home Surveillance System Using IoT & AI
RAT Trap: Home Surveillance System Using IoT & AIRAT Trap: Home Surveillance System Using IoT & AI
RAT Trap: Home Surveillance System Using IoT & AI
 

Recently uploaded

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Recently uploaded (20)

WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 

Safety Tracker

  • 1. Safety Tracker An initiative towards ensuring safety of factory employees Abhishek Das – abhishek.d@itcinfotech.com Narendra Patil – narendra.patil@itcinfotech.com Roshan Joseph– roshan.joseph@itcinfotech.com
  • 2. Background 1. The news of factory employees falling victim to unforgiving work conditions has become a regular column in our newspapers. 2. No matter what safety measures are taken, people are still falling prey to fast and heavy machinery, high altitude environments, high voltage zones, et al. 3. Most of these events are a result of ignorance, lack of supervision and defiance. 4. Such events demanded actions; in the form of improvised supervision, automatic alert and manual intimation systems. 5. Hence, we came up with an IoT solution, which facilitates these actions, even from remote locations. 6. Sensor equipped gears networked with employees and supervisor(s) in-charge, presented in a web-hosted dashboard is what our solution is all about. 7. Not only can employees be monitored at an individual level, but also can be intimated whenever he takes out any of his protective gears, while working under high risk conditions.
  • 3. Operational Construction 1. Each employee is provided with sensor equipped protective gears that talk to a gateway fitted into his helmet over Wi-Fi. 2. This gateway is responsible for mapping him onto the dashboard presented to his supervisor. 3. The status of each of his gear, be it his helmet, glove or boot can be monitored from the dashboard. 4. Removal of any such equipment immediately raises an alarm in form of a red light within his zone. Besides, his safety status is marked red in the dashboard at the supervisor’s end, from where the latter can turn the buzzer on, fitted at the former’s helmet, as an intimation asking him to wear his gear.
  • 4. Solution Architecture Raspberry Pi Atomiton TQL Engine Employee Avatar Buzzer Alert Light Safety Gears
  • 5. Hardware Setup Boot equipped with a Pressure Sensor connected to a Wi-Fi module Helmet equipped with a Buzzer and an IR Sensor connected with a Raspberry Pi fixed inside
  • 7. Avatar – Safe Condition
  • 8. Avatar – Unsafe Condition
  • 9. Simulator – Safe Condition
  • 10. Simulator – Unsafe Condition
  • 11. Live Camera – Safe Condition
  • 12. Live Camera – Unsafe Condition
  • 13. Looking Forward 1. The biggest challenge that we faced was in miniaturizing the sensor setup for each equipment so that there is no hindrance to wearing the equipment. We are working towards further reducing their dimensions so that we have a final blueprint for bulk manufacturing of these devices. 2. Till now, we have equipped the helmet and boot with sensors that can track the safety state. We are planning on equipping the gloves too so that we cover all the three aspects of ensuring safety of a plant worker, at a general level. 3. Integrating every device to Atomiton’s TQL Engine was also a challenge. Although we fairly managed to make things work, we are looking forward to achieve a better model so that we can scale out easily with increasing number of devices. 4. As of now, we have our solution running in our own premises. We are planning to have it deployed over one of the public clouds – preferably as an Azure WebApp so that the scope in not just restricted to the network in the factory.
  • 14. Thank You. Abhishek Das – abhishek.d@itcinfotech.com Narendra Patil – narendra.patil@itcinfotech.com Roshan Joseph– roshan.joseph@itcinfotech.com