SlideShare a Scribd company logo
1 of 21
Download to read offline
Presented By....
SAURABH R. GIRATKAR
Guided By Co-Guide By
Prof. P. G. Kaushik Prof. R. R. Agrawal
JAWAHARLAL DARDA INSTITUTE OF ENGINEERING & TECHNOLOGY,
YAVATMAL
DEPARTMENT OF ELECTRONICS & TELECOMMUNICATION ENGINEERING
OVERVIEW…
 WINS Introduction
 Evolution
 Working Principle
 SystemArchitecture
 NodeArchitecture
 Micro sensor
 Digital Signal Processing
 SpectrumAnalysis
 Characteristics & applications
 Cons & Pros
 Reference
 Conclusion
ABSRACT…
 Provides a new monitoring for the
borders of the country.
 Easy identification of strangers or
some terrorists entering the border
area.
 Border area is partitioned into no. of
mutually connected nodes.
 Noise detection, Image
processing, Biometric scanning,
Thermal detection, Density
comparison, AV modulation etc.
are the main key roles.
INTRODUCTION…
 WIRE LESS INTEGRATED NETWORK SENSOR (WINS).
 WINS provide a new monitoring and control capability for
monitoring the Border of the country.
 Require a few microwatt of power to operate, so it is cheaper
than the conventional radar system.
 It produce a less amount delay to detect the target.
 It is reasonably faster.
 On global scale wins will permit monitoring of land ,water
and air resources for environment monitoring.
Evolution Of WINS…
 WINS Initiated in 1993 under
DARPA in US.
 LWIM program began in 1995.
 In 1998,WINS introduced for wide
variety of applications such as
multihop, self-assembled, wireless
network algorithms for operating at
micropower levels.
Distributed sensor at Border…
WINS System Architecture…
 WINS architecture
includes sensor, data
converter, signal
processing, and control
functions.
 The micro power
components operate
continuously for event
recognition, while the
network interface operates
at low duty cycle.
Continuous operation low duty cycle
WINS Node Architecture…
1998: WINS developed by the authors  contiguous sensing, signal processing for event
detection, local control of actuators, event classification, communication at low power
 Event detection is contiguous  micropower levels
 Event detected => alert process to identify the event
 Further processing? Alert remote user / neighboring node?
 Communication betweenWINS nodes
sensor
actuator
signal processing for
event detection
control
Processing
event classification &
identification
wireless
internet
interface
continuously vigilant operation low-duty cycle operation
Cont…
 WINS nodes are distributed at high density in an
environment to be monitored.
 WINS node data is transferred over the asymmetric
wireless link to an end user.
WINS MICRO SENSORS…
 The detector shown is the thermal detector. It just captures the harmonic
signals produced by the footsteps of the stranger entering the border.
Whole area is partitioned into hexagonal region.
 These signals are then converted into their PSD values and are then
compared with the reference values set by the user.
Micro Sensor and Thermal
Conductivity…
Sensor boards…
(a) Mica network Board
(b) Mica Sensor Board
(c) Mica Power Board
(d)TWR-ISM-002 Radar Board
(e) All of the boards attached
together.
Packaging
Assembled Sensor Boards…
WINS DSP…
 If a stranger enters the border, his foot-steps will generate harmonic signals. It
can be detected as a characteristic feature in a signal power spectrum.Thus, a
spectrum analyzer must be implemented in theWINS.
 The spectrum analyzer resolves theWINS input data into a low-resolution
power spectrum.
WINS micropower spectrum analyzer architecture
WINS Characteristics & Applications…
 Characteristics:
 Support large numbers of sensor.
 Dense sensor distributions .
 These sensor are also developed to support short distance RF
communication.
 Internet access to sensors, controls and processor.
Cont…
 Applications:
 On a global scale,WINS will permit monitoring of land, water,
and air resources for environmental monitoring .
 On a national scale, transportation systems, and borders will be
monitored for efficiency, safety, and security.
 On a local, enterprise scale,WINS will create a manufacturing
information service for cost and quality control.
Pros & Cons
 PROS:
 It avoid hell lot of wiring.
 It can accommodate new devices at any time.
 Its flexible to go through physical partitions.
 It can be accessed through a centralized monitor.
 CONS:
 Its damn easy for hackers to hack it as we cant control
propagation of waves.
 Comparatively low speed of communication.
 Gets distracted by various elements like Blue-tooth.
Unanticipated Faulty Behavior…
 We experienced several
failure as a result of
undetectable, incorrectly
download program and
depleted energy level etc.
 For example node will detect
false event when sensor board
is overheated.
Reference…
 http://en.wikipedia.org/wiki/WINS
 http://en.wikipedia.org/wiki/Micro_sensors
 M. J. Dong, G.Yung, andW. J. Kaiser,“Low Power Signal Processing
Architectures for Network Microsensors”, 1997 International
Symposium on Low Power Electronics and Design, Digest ofTechnical
Papers (1997).
 A.A.Abidi,“Low-power radio-frequency ICs for portable
communications”, Proceedings of the IEEE, 83, (1995).
 D. B. Leeson,“A simple model of feedback oscillator noise spectra”.
Conclusion…
 Densely distributed sensor
networks.
 Application specific
networking architectures
 Development platforms are
now available .
 The network is self-
monitoring and secure.
 Now it is possible to secure
the border with an invisible
wall of thousands or even
millions of tiny interconnected
sensors.
A Border security Using Wireless Integrated Network Sensors (WINS)

More Related Content

What's hot

WIRELWIRELESS INTEGRATED NETWORK SENSORS
WIRELWIRELESS INTEGRATED NETWORK SENSORSWIRELWIRELESS INTEGRATED NETWORK SENSORS
WIRELWIRELESS INTEGRATED NETWORK SENSORSDeepak Kumar Mohapatra
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor networkJawhar Ali
 
Sensors On 3d Digitization
Sensors On 3d DigitizationSensors On 3d Digitization
Sensors On 3d DigitizationRajan Kumar
 
Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless CommunicationShubham Srivastava
 
Electronics seminar topics
Electronics seminar topicsElectronics seminar topics
Electronics seminar topics123seminarsonly
 
Virtual retinal display ppt
Virtual retinal display pptVirtual retinal display ppt
Virtual retinal display pptHina Saxena
 
Ppt presentation
Ppt presentationPpt presentation
Ppt presentationvishal4799
 
Wearable Biosensors Report
Wearable Biosensors ReportWearable Biosensors Report
Wearable Biosensors ReportShubham Rokade
 
Healthcare Monitoring Using Wireless Sensor Networks
Healthcare Monitoring Using Wireless Sensor NetworksHealthcare Monitoring Using Wireless Sensor Networks
Healthcare Monitoring Using Wireless Sensor NetworksEbin Ephrem Elavathingal
 
Under Water wireless communication
Under Water wireless communicationUnder Water wireless communication
Under Water wireless communicationEr. Saba karim
 
Seminar on pervasive computing
Seminar  on pervasive computingSeminar  on pervasive computing
Seminar on pervasive computingLikan Patra
 
Securing Underwater Wireless Communication
Securing Underwater Wireless CommunicationSecuring Underwater Wireless Communication
Securing Underwater Wireless CommunicationDipaloke Arunodoy
 
Digital Notice Board
Digital Notice BoardDigital Notice Board
Digital Notice BoardRaaki Gadde
 
Presentation on Wireless border security system
Presentation on  Wireless border security systemPresentation on  Wireless border security system
Presentation on Wireless border security systemStudent
 
Microelectronic pill
Microelectronic pillMicroelectronic pill
Microelectronic pillnirmalk1503
 

What's hot (20)

WIRELWIRELESS INTEGRATED NETWORK SENSORS
WIRELWIRELESS INTEGRATED NETWORK SENSORSWIRELWIRELESS INTEGRATED NETWORK SENSORS
WIRELWIRELESS INTEGRATED NETWORK SENSORS
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
 
Wireless Body Sensor Networks
Wireless Body Sensor Networks Wireless Body Sensor Networks
Wireless Body Sensor Networks
 
Sensors On 3d Digitization
Sensors On 3d DigitizationSensors On 3d Digitization
Sensors On 3d Digitization
 
Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless Communication
 
Electronics seminar topics
Electronics seminar topicsElectronics seminar topics
Electronics seminar topics
 
Virtual retinal display ppt
Virtual retinal display pptVirtual retinal display ppt
Virtual retinal display ppt
 
BATTERY LESS PHONE
BATTERY LESS PHONE BATTERY LESS PHONE
BATTERY LESS PHONE
 
Ppt presentation
Ppt presentationPpt presentation
Ppt presentation
 
Ambient backscatter
Ambient backscatterAmbient backscatter
Ambient backscatter
 
Wearable Biosensors Report
Wearable Biosensors ReportWearable Biosensors Report
Wearable Biosensors Report
 
Healthcare Monitoring Using Wireless Sensor Networks
Healthcare Monitoring Using Wireless Sensor NetworksHealthcare Monitoring Using Wireless Sensor Networks
Healthcare Monitoring Using Wireless Sensor Networks
 
Under Water wireless communication
Under Water wireless communicationUnder Water wireless communication
Under Water wireless communication
 
The E-Bomb
The E-BombThe E-Bomb
The E-Bomb
 
Seminar on pervasive computing
Seminar  on pervasive computingSeminar  on pervasive computing
Seminar on pervasive computing
 
Securing Underwater Wireless Communication
Securing Underwater Wireless CommunicationSecuring Underwater Wireless Communication
Securing Underwater Wireless Communication
 
Digital Notice Board
Digital Notice BoardDigital Notice Board
Digital Notice Board
 
Presentation on Wireless border security system
Presentation on  Wireless border security systemPresentation on  Wireless border security system
Presentation on Wireless border security system
 
Microelectronic pill
Microelectronic pillMicroelectronic pill
Microelectronic pill
 
WBAN
WBANWBAN
WBAN
 

Similar to A Border security Using Wireless Integrated Network Sensors (WINS)

Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02Sindhu Nathan
 
A Wireless Sensor Network ( Wsn )
A Wireless Sensor Network ( Wsn )A Wireless Sensor Network ( Wsn )
A Wireless Sensor Network ( Wsn )Joanna Paulsen
 
A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)Saurabh Giratkar
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applicationsDeepshika Reddy
 
Wireless border security system
Wireless border security systemWireless border security system
Wireless border security systemBllu
 
Wireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High RateWireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High RateDon Norwood
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor networkrahulkumargiri
 
Wireless applications in various areas
Wireless applications in various areasWireless applications in various areas
Wireless applications in various areasAmulya Anu
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKTejas Wasule
 
BORDER_SECURITY_USING_WIRELESS_INTEGRATE.pdf
BORDER_SECURITY_USING_WIRELESS_INTEGRATE.pdfBORDER_SECURITY_USING_WIRELESS_INTEGRATE.pdf
BORDER_SECURITY_USING_WIRELESS_INTEGRATE.pdfsunadstar
 
Wireless Mesh Networking - A development path
Wireless Mesh Networking - A development pathWireless Mesh Networking - A development path
Wireless Mesh Networking - A development patheveryunitone
 
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor NetworkEnergetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor NetworkIRJET Journal
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkPREMKUMAR
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network reportGanesh Khadsan
 

Similar to A Border security Using Wireless Integrated Network Sensors (WINS) (20)

Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
 
A Wireless Sensor Network ( Wsn )
A Wireless Sensor Network ( Wsn )A Wireless Sensor Network ( Wsn )
A Wireless Sensor Network ( Wsn )
 
A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applications
 
Wireless border security system
Wireless border security systemWireless border security system
Wireless border security system
 
Wireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High RateWireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High Rate
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor network
 
Wireless applications in various areas
Wireless applications in various areasWireless applications in various areas
Wireless applications in various areas
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
BORDER_SECURITY_USING_WIRELESS_INTEGRATE.pdf
BORDER_SECURITY_USING_WIRELESS_INTEGRATE.pdfBORDER_SECURITY_USING_WIRELESS_INTEGRATE.pdf
BORDER_SECURITY_USING_WIRELESS_INTEGRATE.pdf
 
Oj3425062509
Oj3425062509Oj3425062509
Oj3425062509
 
Ii2414621475
Ii2414621475Ii2414621475
Ii2414621475
 
Unit 2-basic wireless sensor
Unit 2-basic wireless sensorUnit 2-basic wireless sensor
Unit 2-basic wireless sensor
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless Mesh Networking - A development path
Wireless Mesh Networking - A development pathWireless Mesh Networking - A development path
Wireless Mesh Networking - A development path
 
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor NetworkEnergetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
 
Sensor net
Sensor netSensor net
Sensor net
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
 
Bm32410415
Bm32410415Bm32410415
Bm32410415
 

More from Saurabh Giratkar

To Understand the Eco-System in Digital Media Marketing.
To Understand the Eco-System in Digital Media Marketing.To Understand the Eco-System in Digital Media Marketing.
To Understand the Eco-System in Digital Media Marketing.Saurabh Giratkar
 
Impact of Packaging on Consumer Buying Behavior.
Impact of Packaging on Consumer Buying Behavior.Impact of Packaging on Consumer Buying Behavior.
Impact of Packaging on Consumer Buying Behavior.Saurabh Giratkar
 
External environment of taj & oberoi hotel industry
External environment of taj & oberoi hotel industryExternal environment of taj & oberoi hotel industry
External environment of taj & oberoi hotel industrySaurabh Giratkar
 
Connecting Remote Users to Your Network with Windows Server 2003
Connecting Remote Users to Your Network with Windows Server 2003Connecting Remote Users to Your Network with Windows Server 2003
Connecting Remote Users to Your Network with Windows Server 2003Saurabh Giratkar
 
OBJECT DECOMPOSITION BASED ON SKELETON ANALYSIS FOR ROAD EXTRATION
OBJECT DECOMPOSITION BASED ON SKELETON ANALYSIS FOR ROAD EXTRATIONOBJECT DECOMPOSITION BASED ON SKELETON ANALYSIS FOR ROAD EXTRATION
OBJECT DECOMPOSITION BASED ON SKELETON ANALYSIS FOR ROAD EXTRATIONSaurabh Giratkar
 
Air pollution monitoring system using mobile gprs sensors array ppt
Air pollution monitoring system using mobile gprs sensors array pptAir pollution monitoring system using mobile gprs sensors array ppt
Air pollution monitoring system using mobile gprs sensors array pptSaurabh Giratkar
 
Air pollution monitoring system using mobile gprs sensors array
Air pollution monitoring system using mobile gprs sensors arrayAir pollution monitoring system using mobile gprs sensors array
Air pollution monitoring system using mobile gprs sensors arraySaurabh Giratkar
 
Certificate authorities under attack :A
Certificate authorities under attack :ACertificate authorities under attack :A
Certificate authorities under attack :ASaurabh Giratkar
 
Brain Computer Interface Next Generation of Human Computer Interaction
Brain Computer Interface Next Generation of Human Computer InteractionBrain Computer Interface Next Generation of Human Computer Interaction
Brain Computer Interface Next Generation of Human Computer InteractionSaurabh Giratkar
 

More from Saurabh Giratkar (13)

To Understand the Eco-System in Digital Media Marketing.
To Understand the Eco-System in Digital Media Marketing.To Understand the Eco-System in Digital Media Marketing.
To Understand the Eco-System in Digital Media Marketing.
 
Impact of Packaging on Consumer Buying Behavior.
Impact of Packaging on Consumer Buying Behavior.Impact of Packaging on Consumer Buying Behavior.
Impact of Packaging on Consumer Buying Behavior.
 
Economy Australia
Economy AustraliaEconomy Australia
Economy Australia
 
External environment of taj & oberoi hotel industry
External environment of taj & oberoi hotel industryExternal environment of taj & oberoi hotel industry
External environment of taj & oberoi hotel industry
 
Managerial Effectiveness
Managerial Effectiveness Managerial Effectiveness
Managerial Effectiveness
 
Mary parker follett
Mary parker follettMary parker follett
Mary parker follett
 
Connecting Remote Users to Your Network with Windows Server 2003
Connecting Remote Users to Your Network with Windows Server 2003Connecting Remote Users to Your Network with Windows Server 2003
Connecting Remote Users to Your Network with Windows Server 2003
 
OBJECT DECOMPOSITION BASED ON SKELETON ANALYSIS FOR ROAD EXTRATION
OBJECT DECOMPOSITION BASED ON SKELETON ANALYSIS FOR ROAD EXTRATIONOBJECT DECOMPOSITION BASED ON SKELETON ANALYSIS FOR ROAD EXTRATION
OBJECT DECOMPOSITION BASED ON SKELETON ANALYSIS FOR ROAD EXTRATION
 
Air pollution monitoring system using mobile gprs sensors array ppt
Air pollution monitoring system using mobile gprs sensors array pptAir pollution monitoring system using mobile gprs sensors array ppt
Air pollution monitoring system using mobile gprs sensors array ppt
 
Air pollution monitoring system using mobile gprs sensors array
Air pollution monitoring system using mobile gprs sensors arrayAir pollution monitoring system using mobile gprs sensors array
Air pollution monitoring system using mobile gprs sensors array
 
Trojans
TrojansTrojans
Trojans
 
Certificate authorities under attack :A
Certificate authorities under attack :ACertificate authorities under attack :A
Certificate authorities under attack :A
 
Brain Computer Interface Next Generation of Human Computer Interaction
Brain Computer Interface Next Generation of Human Computer InteractionBrain Computer Interface Next Generation of Human Computer Interaction
Brain Computer Interface Next Generation of Human Computer Interaction
 

Recently uploaded

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Recently uploaded (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

A Border security Using Wireless Integrated Network Sensors (WINS)

  • 1. Presented By.... SAURABH R. GIRATKAR Guided By Co-Guide By Prof. P. G. Kaushik Prof. R. R. Agrawal JAWAHARLAL DARDA INSTITUTE OF ENGINEERING & TECHNOLOGY, YAVATMAL DEPARTMENT OF ELECTRONICS & TELECOMMUNICATION ENGINEERING
  • 2. OVERVIEW…  WINS Introduction  Evolution  Working Principle  SystemArchitecture  NodeArchitecture  Micro sensor  Digital Signal Processing  SpectrumAnalysis  Characteristics & applications  Cons & Pros  Reference  Conclusion
  • 3. ABSRACT…  Provides a new monitoring for the borders of the country.  Easy identification of strangers or some terrorists entering the border area.  Border area is partitioned into no. of mutually connected nodes.  Noise detection, Image processing, Biometric scanning, Thermal detection, Density comparison, AV modulation etc. are the main key roles.
  • 4. INTRODUCTION…  WIRE LESS INTEGRATED NETWORK SENSOR (WINS).  WINS provide a new monitoring and control capability for monitoring the Border of the country.  Require a few microwatt of power to operate, so it is cheaper than the conventional radar system.  It produce a less amount delay to detect the target.  It is reasonably faster.  On global scale wins will permit monitoring of land ,water and air resources for environment monitoring.
  • 5. Evolution Of WINS…  WINS Initiated in 1993 under DARPA in US.  LWIM program began in 1995.  In 1998,WINS introduced for wide variety of applications such as multihop, self-assembled, wireless network algorithms for operating at micropower levels.
  • 7. WINS System Architecture…  WINS architecture includes sensor, data converter, signal processing, and control functions.  The micro power components operate continuously for event recognition, while the network interface operates at low duty cycle. Continuous operation low duty cycle
  • 8. WINS Node Architecture… 1998: WINS developed by the authors  contiguous sensing, signal processing for event detection, local control of actuators, event classification, communication at low power  Event detection is contiguous  micropower levels  Event detected => alert process to identify the event  Further processing? Alert remote user / neighboring node?  Communication betweenWINS nodes sensor actuator signal processing for event detection control Processing event classification & identification wireless internet interface continuously vigilant operation low-duty cycle operation
  • 9. Cont…  WINS nodes are distributed at high density in an environment to be monitored.  WINS node data is transferred over the asymmetric wireless link to an end user.
  • 10. WINS MICRO SENSORS…  The detector shown is the thermal detector. It just captures the harmonic signals produced by the footsteps of the stranger entering the border. Whole area is partitioned into hexagonal region.  These signals are then converted into their PSD values and are then compared with the reference values set by the user.
  • 11. Micro Sensor and Thermal Conductivity…
  • 12. Sensor boards… (a) Mica network Board (b) Mica Sensor Board (c) Mica Power Board (d)TWR-ISM-002 Radar Board (e) All of the boards attached together. Packaging
  • 14. WINS DSP…  If a stranger enters the border, his foot-steps will generate harmonic signals. It can be detected as a characteristic feature in a signal power spectrum.Thus, a spectrum analyzer must be implemented in theWINS.  The spectrum analyzer resolves theWINS input data into a low-resolution power spectrum. WINS micropower spectrum analyzer architecture
  • 15. WINS Characteristics & Applications…  Characteristics:  Support large numbers of sensor.  Dense sensor distributions .  These sensor are also developed to support short distance RF communication.  Internet access to sensors, controls and processor.
  • 16. Cont…  Applications:  On a global scale,WINS will permit monitoring of land, water, and air resources for environmental monitoring .  On a national scale, transportation systems, and borders will be monitored for efficiency, safety, and security.  On a local, enterprise scale,WINS will create a manufacturing information service for cost and quality control.
  • 17. Pros & Cons  PROS:  It avoid hell lot of wiring.  It can accommodate new devices at any time.  Its flexible to go through physical partitions.  It can be accessed through a centralized monitor.  CONS:  Its damn easy for hackers to hack it as we cant control propagation of waves.  Comparatively low speed of communication.  Gets distracted by various elements like Blue-tooth.
  • 18. Unanticipated Faulty Behavior…  We experienced several failure as a result of undetectable, incorrectly download program and depleted energy level etc.  For example node will detect false event when sensor board is overheated.
  • 19. Reference…  http://en.wikipedia.org/wiki/WINS  http://en.wikipedia.org/wiki/Micro_sensors  M. J. Dong, G.Yung, andW. J. Kaiser,“Low Power Signal Processing Architectures for Network Microsensors”, 1997 International Symposium on Low Power Electronics and Design, Digest ofTechnical Papers (1997).  A.A.Abidi,“Low-power radio-frequency ICs for portable communications”, Proceedings of the IEEE, 83, (1995).  D. B. Leeson,“A simple model of feedback oscillator noise spectra”.
  • 20. Conclusion…  Densely distributed sensor networks.  Application specific networking architectures  Development platforms are now available .  The network is self- monitoring and secure.  Now it is possible to secure the border with an invisible wall of thousands or even millions of tiny interconnected sensors.