This document summarizes an object tracking system that uses RF transmitters attached to objects, receivers to detect the transmitted signals, and a mobile phone interface. Objects are tagged with unique IDs. When an object enters a receiver's range, its ID and location are stored in a database. Users can query an object's location by sending an SMS message via a GSM modem connected to the database. The modem retrieves the object's location and description from the database and sends it back in a return SMS. The system allows users to track objects entering or leaving receiver ranges and locate objects on demand. It provides a low-cost infrastructure for wide-area object tracking using existing cellular networks.
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...Conference Papers
This document describes an indoor tracking system that uses Bluetooth Low Energy (BLE) devices and the K-Nearest Neighbor algorithm. The system was deployed in a laboratory measuring 990cm x 770cm. BLE scanners collected signal strength data from BLE beacons placed in the lab. Using the highest signal strength values from 3 scanners, the KNN algorithm estimated the region where the beacon was located. Testing found the system was able to accurately estimate the location region of target beacons.
Implementation of vehicle ventilation system using node mcu esp8266 for remot...Journal Papers
This document summarizes an implementation of a vehicle ventilation system using a NodeMCU microcontroller as an Internet of Things platform. Temperature and rain sensors connected to the microcontroller collect data on vehicle conditions. A mobile application allows users to remotely monitor sensor readings and control vehicle accessories like windows and fans. Test results found that activating the ventilation system reduced average vehicle temperature by up to 12.4 degrees Celsius. The system provides a low-cost solution for remote monitoring of vehicle temperature.
Secure Distributed Collection of Data Using Participator Sensing ParadigmIJERA Editor
Distributed collection of data has been made possible with the deployment of sensor devices across many
geographical areas. Mobile phone users who employ sensors to acquire local knowledge pertaining to
temperature, product pricing, transportation facilities and so on can participate in the network that is distributed
in nature. Such network can acquire varied knowledge from diversified geographical locations. This kind of
knowledge acquisition from across the globe is known as participatory sensing (PS). Of late it has become
ubiquitous and rigorous research is on this field. Cristofaro and Soriente studied the operations of PS recently
and came to know the fact that participation of mobile users is at risk when incentives or not considered and the
users’ privacy is at stake. Their framework could provide privacy besides improving the rate of mobile user
participation in PS. However, their solution can be enhanced with respect to query privacy in the operations of
PS. Towards this end we propose a framework that incorporates TLS security among the network so as to ensure
foolproof security in the distributed collection of data through participatory sensing.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Mobile grid and cloud computing enables utilizing mobile devices' resources in distributed computing environments. It allows offloading computation and data storage to remote servers. However, applying these approaches in mobile ad hoc networks poses challenges due to node mobility, limited resources, and unstable connectivity. Future research directions include developing energy-efficient resource allocation that considers mobility patterns and transmission costs, as well as task migration methods that estimate costs accurately in dynamic networks. Mobile ad hoc computational grids show promise for applications with intensive processing needs like threat detection and 3D mapping, but overcoming the constrained environment remains an open problem.
Wireless Data Acquisition System Using ARM Cortex M-3IOSR Journals
The document describes a wireless data acquisition system using an ARM Cortex M-3 processor. The system collects data from gas, humidity, and temperature sensors and transmits the data wirelessly via Bluetooth to a host computer. The host computer uses virtual instrument software to process and display the received data in real-time. The system provides wireless and real-time data collection that can be used in applications like industrial monitoring and mobile meter reading.
This document discusses positioning techniques for mobile devices, comparing Android and iPhone approaches. It covers GPS, WiFi, and cellular positioning methods, as well as APIs available on each platform. Location-based services that require continuous tracking can significantly drain batteries; the document discusses various approaches to address this problem and improve energy efficiency of positioning algorithms.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...Conference Papers
This document describes an indoor tracking system that uses Bluetooth Low Energy (BLE) devices and the K-Nearest Neighbor algorithm. The system was deployed in a laboratory measuring 990cm x 770cm. BLE scanners collected signal strength data from BLE beacons placed in the lab. Using the highest signal strength values from 3 scanners, the KNN algorithm estimated the region where the beacon was located. Testing found the system was able to accurately estimate the location region of target beacons.
Implementation of vehicle ventilation system using node mcu esp8266 for remot...Journal Papers
This document summarizes an implementation of a vehicle ventilation system using a NodeMCU microcontroller as an Internet of Things platform. Temperature and rain sensors connected to the microcontroller collect data on vehicle conditions. A mobile application allows users to remotely monitor sensor readings and control vehicle accessories like windows and fans. Test results found that activating the ventilation system reduced average vehicle temperature by up to 12.4 degrees Celsius. The system provides a low-cost solution for remote monitoring of vehicle temperature.
Secure Distributed Collection of Data Using Participator Sensing ParadigmIJERA Editor
Distributed collection of data has been made possible with the deployment of sensor devices across many
geographical areas. Mobile phone users who employ sensors to acquire local knowledge pertaining to
temperature, product pricing, transportation facilities and so on can participate in the network that is distributed
in nature. Such network can acquire varied knowledge from diversified geographical locations. This kind of
knowledge acquisition from across the globe is known as participatory sensing (PS). Of late it has become
ubiquitous and rigorous research is on this field. Cristofaro and Soriente studied the operations of PS recently
and came to know the fact that participation of mobile users is at risk when incentives or not considered and the
users’ privacy is at stake. Their framework could provide privacy besides improving the rate of mobile user
participation in PS. However, their solution can be enhanced with respect to query privacy in the operations of
PS. Towards this end we propose a framework that incorporates TLS security among the network so as to ensure
foolproof security in the distributed collection of data through participatory sensing.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Mobile grid and cloud computing enables utilizing mobile devices' resources in distributed computing environments. It allows offloading computation and data storage to remote servers. However, applying these approaches in mobile ad hoc networks poses challenges due to node mobility, limited resources, and unstable connectivity. Future research directions include developing energy-efficient resource allocation that considers mobility patterns and transmission costs, as well as task migration methods that estimate costs accurately in dynamic networks. Mobile ad hoc computational grids show promise for applications with intensive processing needs like threat detection and 3D mapping, but overcoming the constrained environment remains an open problem.
Wireless Data Acquisition System Using ARM Cortex M-3IOSR Journals
The document describes a wireless data acquisition system using an ARM Cortex M-3 processor. The system collects data from gas, humidity, and temperature sensors and transmits the data wirelessly via Bluetooth to a host computer. The host computer uses virtual instrument software to process and display the received data in real-time. The system provides wireless and real-time data collection that can be used in applications like industrial monitoring and mobile meter reading.
This document discusses positioning techniques for mobile devices, comparing Android and iPhone approaches. It covers GPS, WiFi, and cellular positioning methods, as well as APIs available on each platform. Location-based services that require continuous tracking can significantly drain batteries; the document discusses various approaches to address this problem and improve energy efficiency of positioning algorithms.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Determining a person’s physical position in a multi-building indoor space using wifi fingerprinting on UJIIndoor Data Set to construct machine learning models.
The document summarizes a study on using Wi-Fi signals for indoor location fingerprinting. It discusses how fingerprinting involves two phases: a calibration phase where signal strength is recorded at calibration points, and a location estimation phase where current signal strength is compared to the fingerprint map. It evaluates the k-nearest neighbor algorithm using Euclidean, Manhattan, and Chebychev distances to estimate location. Tests of this approach involved collecting Wi-Fi signal data at calibration points in four rooms and a hall to generate a fingerprint map for location estimation. The accuracy of Euclidean and Manhattan distances was found to be better than Chebychev distance for this location fingerprinting method.
Abstract: Wireless location finding is one of the key technologies for wireless sensor networks. GPS is the technology used but it can be used for the outdoor location. When we deal with the indoor locations GPS does not work. Indoor locations include buildings like supermarkets, big malls, parking, universities, and locations under the same roof. In these areas the accuracy of the GPS location is greatly reduced. Location showed on the map in not correct when the GPS is used under the indoor environments. But for the indoor localization it requires the higher accuracy sp GPS is not feasible for the current view. And also when the GPS is used in the mobile device it consumes a lot of the mobile battery to run the application which causes the drainage of the mobile battery within some hours. So to find out the accurate location for indoor environment we use the RSSI based trilateral localization algorithm. The algorithm has the low cost and the algorithm does not require any additional hardware support and moreover the algorithm is easy to understand. The algorithm consumes very less battery as compared to the battery consumption of the GPS. Because of these this algorithm has become the mainstream localization algorithm in the wireless sensor networks. With the development of the wireless sensor networks and the smart devices the WIFI access points are also increasing. The mobile smart devices detect three or more known WIFI hotspots positions. And using the values from the WIFI routers it calculates the current location of the mobile device. In this paper we have proposed a system so that we can find out the exact location of the mobile device under the indoor environment and can navigate to the destination using the navigation function and also can enable the low consumption of the smart mobile battery for the tracking purpose.
Goals:
1. Useful at the places where GPS cannot work
2. Reduces the battery consumption
3. Routers are used.
4. Provides the path as well as the information of the location as per the requirement of user.
The document discusses enhancing indoor localization using IoT techniques. It proposes a framework that uses a quaternion-based extended Kalman filter for heading estimation in pedestrian dead reckoning (PDR), along with low pass filtering and adaptive step length methodology. This approach achieved an average error of 0.16 meters, representing 0.07% of the total 210 meters traveled in experiments. The document also discusses using IoT devices to further improve indoor localization accuracy.
The proposed System for Indoor Location TrackingEditor IJCATR
Indoor location tracking systems are used to locate people or certain objects in buildings and in closed areas. For example,
finding co-workers in a large office building, locating customers within a shopping mall and locating patients in the hospital are a few
applications of indoor location tracking systems. Indoor tracking capability opens up multiple possibilities. To address this need, this
paper describes the implementation of a Bluetooth-based indoor location tracking system that utilizes the integrated Bluetooth modules
in any today's mobile phones to specify and display the location of the individuals in a certain building. The proposed system aims for
location tracking/monitoring and marketing applications for whom want to locate individuals carrying mobile phones and advertise
products and services.
Comparative Performance Analysis of Wireless Communication Protocols for Inte...chokrio
The systems based on intelligent sensors are currently expanding, due to theirs functions and theirs performances of intelligence: transmitting and receiving data in real-time, computation and processing algorithms, metrology remote, diagnostics, automation and storage measurements…The radio frequency wireless communication with its multitude offers a better solution for data traffic in this kind of systems. The mains objectives of this paper is to present a solution of the problem related to the selection criteria of a better wireless communication technology face up to the constraints imposed by the intended application and the evaluation of its key features. The comparison between the different wireless technologies (Wi-Fi, Wi-Max, UWB, Bluetooth, ZigBee, ZigBeeIP, GSM/GPRS) focuses on their performance which depends on the areas of utilization. Furthermore, it shows the limits of their characteristics. Study findings can be used by the developers/ engineers to deduce the optimal mode to integrate and to operate a system that guarantees quality of communication, minimizing energy consumption, reducing the implementation cost and avoiding time constraints.
Pedestrain Monitoring System using Wi-Fi Technology And RSSI Based Localizationijwmn
This document describes a pedestrian monitoring system that uses Wi-Fi signals from smartphones to track pedestrian movement on streets. The system consists of sniffing stations that capture Wi-Fi packets from smartphones and measure signal strength. Data on MAC addresses and signal strength is sent to a tracking server over 3G networks. The document discusses challenges like packet loss and analyzing different scanning and hopping times to maximize packet capture while smartphones move. Test results show that scanning intervals of 1-5 seconds and hopping times that yield a ratio of channels scanned to time of around 14 captured the most packets.
A novel password based mutual authentication technique for 4 g mobile communi...eSAT Publishing House
The document describes a proposed password-based mutual authentication technique for 4G mobile communications. The technique aims to authenticate both the subscriber and network using the subscriber's password. It involves four phases: subscriber enrollment where the subscriber chooses an ID and password which are stored on their SIM card; subscriber authentication which occurs during each connection attempt where the subscriber provides their ID and password for verification; network authentication where the network also verifies itself to the subscriber; and a password change phase where the subscriber can update their password without server involvement. The proposed technique is claimed to provide advantages such as minimizing computation, preventing multiple SIMs with the same ID, and not requiring storage of ID/password on the server.
RSA Algorithm as a Data Security Control Mechanism in RFIDIOSR Journals
The document summarizes how RSA encryption can be used as a data security mechanism for RFID tags. It begins with background on RFID and existing security issues like eavesdropping, replay attacks, and cloning attacks. It then provides an overview of the RSA encryption algorithm and gives an example of how it can encrypt a message using a public key and decrypt it with a private key. The proposed solution is to have RFID readers first authenticate tags by having the tag encrypt its password using RSA and the reader decrypting it before transmitting any other data. This prevents unauthorized readers from accessing tag data. The conclusion recommends RSA as a robust approach to mitigate RFID data security issues through use of public and private keys.
The document summarizes three research papers on mobile phones and location-based services. Paper 1 proposes an algorithm called adaptive-interval cloaking that decreases location data accuracy to satisfy anonymity constraints for location-based services. Paper 2 outlines a people-centric urban sensor network architecture that leverages the mobility and heterogeneity of sensing nodes. Paper 3 develops an authentication and payment protocol for mobile systems considering limitations of mobile devices.
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...IOSR Journals
This document describes a design of a Gabor filter for noise reduction in images of betel vine leaves to aid in disease segmentation. A Gabor filter is designed using Verilog HDL and implemented on a CADENCE platform. The filter takes pixel inputs from images that have undergone preprocessing like Sobel edge detection and segmentation. It convolves the pixels with stored filter coefficients to reduce noise and segment the diseased areas. The proposed Gabor filter achieves noiseless segmentation with increased speed and reduced delays compared to existing methods. It utilizes fewer resources with minimal warnings. The system could be enhanced further with 2D/3D processing and neural network training.
A performance of radio frequency and signal strength of LoRa with BME280 sensorTELKOMNIKA JOURNAL
LoRa is a Radio Frequency module that can send packet data up to 3 km in FSPL.LoRa has 3 different Frequency Radios i.e, 915 MHz, 868 MHz, and 433 MHz. LoRa testing is based on different distances, BME280 provides Barometric Pressure, Temperature, and Humidity data. An analysis from the results of the Received Signal Strength to the distance (m) to the farthest point to prove and provide QoS data from LoRa 915 MHz. Sensor nodes are built using ADR and Automatic sleep mode algorithms. Communication systems between nodes are built dynamic sensor nodes in mesh networking. Monitoring signal transferring on the 915 MHz Frequency waveform is carried out using the Textronix Spectrum analyzer. Based on the BME280 Data packet transmission from the LoRa 915 MHz Transmitter to the Receiver Receiver at a distance of 100m is -84 dBm and at a distance of 500m is -107 dBm. The LoRa Internet Gateway has 2 types of settings, i.e, application, and gateway, this setting is to find out the location of the gateway with longitude and latitude. Furthermore, the gateway holds Sensor data from the End node, while the Application Server displays sensor data in the form of Graphics in realtime.
This document discusses indoor positioning using Wi-Fi signals. It examines the accuracy of location fingerprinting based indoor positioning using Wi-Fi. The study achieved a positioning accuracy of 2.0 to 2.5 meters. It found that using additional access points, including those in other buildings and in the 5GHz frequency band, improved accuracy. The document also provides background on Wi-Fi technology and discusses applications of indoor positioning like tracking goods, people and animals.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...ijwmn
This paper proposes a virtual architecture for three-dimensional (3D) wireless sensor networks (WSNs), a dynamic coordinate system, and a scalable energy-efficient training protocol for collections of nodes deployed in the space that are initially anonymous, asynchronous, and unaware of their initial location. The 3D WSNs considered comprise massively deployed tiny energy-constrained commodity sensors and one or more sink nodes that provide an interface to the outside world. The proposed architecture is a generalization of a two-dimensional virtual architecture previously proposed in the literature, in which a flexible and intuitive coordinate system is imposed onto the deployment area and the anonymous nodes are partitioned into clusters where data can be gathered from the environment and synthesized under local control. The architecture solves the hidden sensors problem that occurs because of irregularities in rugged deployment areas or environments containing buildings by training the network of nodes arbitrarily dispersed in the 3D space. In addition, we derive two simple and energy-efficient routing protocols, respectively for dense and sparse networks, based on the proposed dynamic coordinate system. They are used to minimize the power expended in collecting and routing data to the sink node, thus increasing the lifetime of the network.
Indoor Tracking System. Detailed information and comparision between two efficient systems, RFID based and WIFI based. Made it referring two institutional research papers. ONLY FOR EDUCATIONAL PURPOSES! Never implemented! :P
PoLTE has developed Positioning over LTE (PoLTE) Macro, a solution that leverages existing LTE infrastructure to accurately locate devices indoors and outdoors using a single cell tower. PoLTE Macro uses signals transmitted by user devices to determine their location within 6 meters, providing a significant improvement over previous single tower methods that could only locate devices within kilometers. This allows mobile network operators to offer new location-based services and monetize their network infrastructure without additional equipment investments.
El documento describe cómo la música se ha desarrollado desde los tiempos primitivos como una forma de expresión de sentimientos e ideas. Explica que la música organiza sonidos y silencios usando melodía y ritmo para crear experiencias en el oyente. También discute cómo la música afecta la percepción y puede servir para entretenimiento, comunicación y ambientación.
El documento describe diferentes sistemas de proyección para representar el espacio tridimensional en dos dimensiones, incluyendo la proyección paralela ortogonal, la proyección paralela oblicua y la perspectiva caballera. Explica que la perspectiva caballera se basa en proyecciones paralelas ortogonales sobre un triángulo rectángulo que luego se proyectan de forma oblicua sobre un plano, y detalla los ángulos y coeficientes de reducción utilizados.
Este documento describe las experiencias exitosas de un docente en formación al implementar un proyecto didáctico sobre la asignatura de español en un grupo de sexto grado. El proyecto consistió en la realización de una obra de teatro basada en un cuento. Aunque inicialmente los alumnos mostraron inconformidad con el trabajo colaborativo requerido, finalmente pudieron representar escenas que fomentaron valores como la honestidad, solidaridad y respeto. El proceso permitió al docente dirigir el aprendizaje de los estudiantes
Determining a person’s physical position in a multi-building indoor space using wifi fingerprinting on UJIIndoor Data Set to construct machine learning models.
The document summarizes a study on using Wi-Fi signals for indoor location fingerprinting. It discusses how fingerprinting involves two phases: a calibration phase where signal strength is recorded at calibration points, and a location estimation phase where current signal strength is compared to the fingerprint map. It evaluates the k-nearest neighbor algorithm using Euclidean, Manhattan, and Chebychev distances to estimate location. Tests of this approach involved collecting Wi-Fi signal data at calibration points in four rooms and a hall to generate a fingerprint map for location estimation. The accuracy of Euclidean and Manhattan distances was found to be better than Chebychev distance for this location fingerprinting method.
Abstract: Wireless location finding is one of the key technologies for wireless sensor networks. GPS is the technology used but it can be used for the outdoor location. When we deal with the indoor locations GPS does not work. Indoor locations include buildings like supermarkets, big malls, parking, universities, and locations under the same roof. In these areas the accuracy of the GPS location is greatly reduced. Location showed on the map in not correct when the GPS is used under the indoor environments. But for the indoor localization it requires the higher accuracy sp GPS is not feasible for the current view. And also when the GPS is used in the mobile device it consumes a lot of the mobile battery to run the application which causes the drainage of the mobile battery within some hours. So to find out the accurate location for indoor environment we use the RSSI based trilateral localization algorithm. The algorithm has the low cost and the algorithm does not require any additional hardware support and moreover the algorithm is easy to understand. The algorithm consumes very less battery as compared to the battery consumption of the GPS. Because of these this algorithm has become the mainstream localization algorithm in the wireless sensor networks. With the development of the wireless sensor networks and the smart devices the WIFI access points are also increasing. The mobile smart devices detect three or more known WIFI hotspots positions. And using the values from the WIFI routers it calculates the current location of the mobile device. In this paper we have proposed a system so that we can find out the exact location of the mobile device under the indoor environment and can navigate to the destination using the navigation function and also can enable the low consumption of the smart mobile battery for the tracking purpose.
Goals:
1. Useful at the places where GPS cannot work
2. Reduces the battery consumption
3. Routers are used.
4. Provides the path as well as the information of the location as per the requirement of user.
The document discusses enhancing indoor localization using IoT techniques. It proposes a framework that uses a quaternion-based extended Kalman filter for heading estimation in pedestrian dead reckoning (PDR), along with low pass filtering and adaptive step length methodology. This approach achieved an average error of 0.16 meters, representing 0.07% of the total 210 meters traveled in experiments. The document also discusses using IoT devices to further improve indoor localization accuracy.
The proposed System for Indoor Location TrackingEditor IJCATR
Indoor location tracking systems are used to locate people or certain objects in buildings and in closed areas. For example,
finding co-workers in a large office building, locating customers within a shopping mall and locating patients in the hospital are a few
applications of indoor location tracking systems. Indoor tracking capability opens up multiple possibilities. To address this need, this
paper describes the implementation of a Bluetooth-based indoor location tracking system that utilizes the integrated Bluetooth modules
in any today's mobile phones to specify and display the location of the individuals in a certain building. The proposed system aims for
location tracking/monitoring and marketing applications for whom want to locate individuals carrying mobile phones and advertise
products and services.
Comparative Performance Analysis of Wireless Communication Protocols for Inte...chokrio
The systems based on intelligent sensors are currently expanding, due to theirs functions and theirs performances of intelligence: transmitting and receiving data in real-time, computation and processing algorithms, metrology remote, diagnostics, automation and storage measurements…The radio frequency wireless communication with its multitude offers a better solution for data traffic in this kind of systems. The mains objectives of this paper is to present a solution of the problem related to the selection criteria of a better wireless communication technology face up to the constraints imposed by the intended application and the evaluation of its key features. The comparison between the different wireless technologies (Wi-Fi, Wi-Max, UWB, Bluetooth, ZigBee, ZigBeeIP, GSM/GPRS) focuses on their performance which depends on the areas of utilization. Furthermore, it shows the limits of their characteristics. Study findings can be used by the developers/ engineers to deduce the optimal mode to integrate and to operate a system that guarantees quality of communication, minimizing energy consumption, reducing the implementation cost and avoiding time constraints.
Pedestrain Monitoring System using Wi-Fi Technology And RSSI Based Localizationijwmn
This document describes a pedestrian monitoring system that uses Wi-Fi signals from smartphones to track pedestrian movement on streets. The system consists of sniffing stations that capture Wi-Fi packets from smartphones and measure signal strength. Data on MAC addresses and signal strength is sent to a tracking server over 3G networks. The document discusses challenges like packet loss and analyzing different scanning and hopping times to maximize packet capture while smartphones move. Test results show that scanning intervals of 1-5 seconds and hopping times that yield a ratio of channels scanned to time of around 14 captured the most packets.
A novel password based mutual authentication technique for 4 g mobile communi...eSAT Publishing House
The document describes a proposed password-based mutual authentication technique for 4G mobile communications. The technique aims to authenticate both the subscriber and network using the subscriber's password. It involves four phases: subscriber enrollment where the subscriber chooses an ID and password which are stored on their SIM card; subscriber authentication which occurs during each connection attempt where the subscriber provides their ID and password for verification; network authentication where the network also verifies itself to the subscriber; and a password change phase where the subscriber can update their password without server involvement. The proposed technique is claimed to provide advantages such as minimizing computation, preventing multiple SIMs with the same ID, and not requiring storage of ID/password on the server.
RSA Algorithm as a Data Security Control Mechanism in RFIDIOSR Journals
The document summarizes how RSA encryption can be used as a data security mechanism for RFID tags. It begins with background on RFID and existing security issues like eavesdropping, replay attacks, and cloning attacks. It then provides an overview of the RSA encryption algorithm and gives an example of how it can encrypt a message using a public key and decrypt it with a private key. The proposed solution is to have RFID readers first authenticate tags by having the tag encrypt its password using RSA and the reader decrypting it before transmitting any other data. This prevents unauthorized readers from accessing tag data. The conclusion recommends RSA as a robust approach to mitigate RFID data security issues through use of public and private keys.
The document summarizes three research papers on mobile phones and location-based services. Paper 1 proposes an algorithm called adaptive-interval cloaking that decreases location data accuracy to satisfy anonymity constraints for location-based services. Paper 2 outlines a people-centric urban sensor network architecture that leverages the mobility and heterogeneity of sensing nodes. Paper 3 develops an authentication and payment protocol for mobile systems considering limitations of mobile devices.
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...IOSR Journals
This document describes a design of a Gabor filter for noise reduction in images of betel vine leaves to aid in disease segmentation. A Gabor filter is designed using Verilog HDL and implemented on a CADENCE platform. The filter takes pixel inputs from images that have undergone preprocessing like Sobel edge detection and segmentation. It convolves the pixels with stored filter coefficients to reduce noise and segment the diseased areas. The proposed Gabor filter achieves noiseless segmentation with increased speed and reduced delays compared to existing methods. It utilizes fewer resources with minimal warnings. The system could be enhanced further with 2D/3D processing and neural network training.
A performance of radio frequency and signal strength of LoRa with BME280 sensorTELKOMNIKA JOURNAL
LoRa is a Radio Frequency module that can send packet data up to 3 km in FSPL.LoRa has 3 different Frequency Radios i.e, 915 MHz, 868 MHz, and 433 MHz. LoRa testing is based on different distances, BME280 provides Barometric Pressure, Temperature, and Humidity data. An analysis from the results of the Received Signal Strength to the distance (m) to the farthest point to prove and provide QoS data from LoRa 915 MHz. Sensor nodes are built using ADR and Automatic sleep mode algorithms. Communication systems between nodes are built dynamic sensor nodes in mesh networking. Monitoring signal transferring on the 915 MHz Frequency waveform is carried out using the Textronix Spectrum analyzer. Based on the BME280 Data packet transmission from the LoRa 915 MHz Transmitter to the Receiver Receiver at a distance of 100m is -84 dBm and at a distance of 500m is -107 dBm. The LoRa Internet Gateway has 2 types of settings, i.e, application, and gateway, this setting is to find out the location of the gateway with longitude and latitude. Furthermore, the gateway holds Sensor data from the End node, while the Application Server displays sensor data in the form of Graphics in realtime.
This document discusses indoor positioning using Wi-Fi signals. It examines the accuracy of location fingerprinting based indoor positioning using Wi-Fi. The study achieved a positioning accuracy of 2.0 to 2.5 meters. It found that using additional access points, including those in other buildings and in the 5GHz frequency band, improved accuracy. The document also provides background on Wi-Fi technology and discusses applications of indoor positioning like tracking goods, people and animals.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...ijwmn
This paper proposes a virtual architecture for three-dimensional (3D) wireless sensor networks (WSNs), a dynamic coordinate system, and a scalable energy-efficient training protocol for collections of nodes deployed in the space that are initially anonymous, asynchronous, and unaware of their initial location. The 3D WSNs considered comprise massively deployed tiny energy-constrained commodity sensors and one or more sink nodes that provide an interface to the outside world. The proposed architecture is a generalization of a two-dimensional virtual architecture previously proposed in the literature, in which a flexible and intuitive coordinate system is imposed onto the deployment area and the anonymous nodes are partitioned into clusters where data can be gathered from the environment and synthesized under local control. The architecture solves the hidden sensors problem that occurs because of irregularities in rugged deployment areas or environments containing buildings by training the network of nodes arbitrarily dispersed in the 3D space. In addition, we derive two simple and energy-efficient routing protocols, respectively for dense and sparse networks, based on the proposed dynamic coordinate system. They are used to minimize the power expended in collecting and routing data to the sink node, thus increasing the lifetime of the network.
Indoor Tracking System. Detailed information and comparision between two efficient systems, RFID based and WIFI based. Made it referring two institutional research papers. ONLY FOR EDUCATIONAL PURPOSES! Never implemented! :P
PoLTE has developed Positioning over LTE (PoLTE) Macro, a solution that leverages existing LTE infrastructure to accurately locate devices indoors and outdoors using a single cell tower. PoLTE Macro uses signals transmitted by user devices to determine their location within 6 meters, providing a significant improvement over previous single tower methods that could only locate devices within kilometers. This allows mobile network operators to offer new location-based services and monetize their network infrastructure without additional equipment investments.
El documento describe cómo la música se ha desarrollado desde los tiempos primitivos como una forma de expresión de sentimientos e ideas. Explica que la música organiza sonidos y silencios usando melodía y ritmo para crear experiencias en el oyente. También discute cómo la música afecta la percepción y puede servir para entretenimiento, comunicación y ambientación.
El documento describe diferentes sistemas de proyección para representar el espacio tridimensional en dos dimensiones, incluyendo la proyección paralela ortogonal, la proyección paralela oblicua y la perspectiva caballera. Explica que la perspectiva caballera se basa en proyecciones paralelas ortogonales sobre un triángulo rectángulo que luego se proyectan de forma oblicua sobre un plano, y detalla los ángulos y coeficientes de reducción utilizados.
Este documento describe las experiencias exitosas de un docente en formación al implementar un proyecto didáctico sobre la asignatura de español en un grupo de sexto grado. El proyecto consistió en la realización de una obra de teatro basada en un cuento. Aunque inicialmente los alumnos mostraron inconformidad con el trabajo colaborativo requerido, finalmente pudieron representar escenas que fomentaron valores como la honestidad, solidaridad y respeto. El proceso permitió al docente dirigir el aprendizaje de los estudiantes
Palvelualojen työnantajat PALTAn suhdannekatsaus 1/2013 julkistettiin 21.5.2013. Katsauksen luvut perustuvat 15.5.2013 tilanteeseen. PALTA julkaisee suhdannekatsauksia neljä kertaa vuodessa.
La síntesis de proteínas ocurre en dos etapas: 1) la transcripción del ADN en el núcleo produce un ARNm, y 2) la traducción del ARNm en el citoplasma produce una proteína. Durante la transcripción, la polimerasa copia el ADN en un ARNm que puede salir del núcleo. Luego, durante la traducción, los ribosomas usan el ARNm para colocar los aminoácidos en el orden correcto y formar la proteína.
La síntesis de proteínas comienza con el paso de la información genética del ADN al ARN mensajero (ARNm) en un proceso llamado transcripción. El ARNm luego se une a los ribosomas en el citoplasma para dirigir la traducción, donde la secuencia de nucleótidos del ARNm determina la secuencia de aminoácidos de la proteína. Una vez completada la traducción, la proteína recién formada presenta una secuencia de aminoácidos determinada por la secuencia original del ADN.
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...CSCJournals
This document summarizes an intelligent road accident analysis and monitoring system that uses GIS, WiMAX/GPRS, and location-based services. The system aims to help reduce road accidents by allowing real-time accident reporting and response. It collects accident data using mobile devices and transfers it to a database via wireless networks. The data is then analyzed using statistical reports, decision making tools, and smart diagnosis to identify accident patterns and recommend safety solutions. The system is intended to help police respond faster to accidents and notify other emergency services.
International Journal of Engineering (IJE) Volume (2) Issue (1)CSCJournals
The document summarizes an intelligent GIS-based road accident analysis and real-time monitoring system that uses WiMAX/GPRS. It discusses the motivation and need for such a system to better analyze accidents and identify accident-prone locations. It then describes the system architecture, which utilizes telegeoinformatics to enable interoperability across different components. It also discusses strategies for adapting the system to different client devices. Finally, it outlines the use of terminal-centric and network-centric positioning methods like A-GPS and CGI-TA for location services and monitoring within an open, IP-based telecommunications network.
IRJET- A Survey on Various Location Tracking SystemsIRJET Journal
This document summarizes 10 research papers on various location tracking systems. It begins by defining location tracking systems and their importance in fields like transportation, security, and more. It then summarizes the key technologies used in location tracking like GPS, GSM, RFID, and Google Maps. The majority of the papers discussed Android-based systems that use GPS signals from smartphones to determine and share a target's location in real-time. Several papers focused on using SMS messages or mobile apps to alert contacts if a target strayed from their planned route or moved outside a predefined area. Overall, the document provides an overview of different techniques for real-time person and object tracking using wireless technologies and location-based services.
This document provides a review of the Internet of Things (IoT). It defines IoT as connecting physical objects to the internet through sensors that allow the objects to communicate and exchange data. The review discusses the history and key elements of IoT, including sensing, communication, data analytics, and delivery of information to users. It also outlines the layers of IoT architecture, enabling technologies like RFID and wireless sensor networks, and both advantages and security threats of the IoT approach. The goal is to provide a generalized overview of the widely known IoT technology.
Wireless Network For Strategic Boundary Supervision SystemjournalBEEI
The major trouble with national security is "Terrorism" happening in borders. In border areas, regular forces or even satellites cannot monitor accurately intruding. The wireless sensor network scheme gives a possible way to explain this issue. To outline a wireless remote system of estimated sensor motes that contains various installed sensors and a processor to detect and impart an adversary interruption crosswise over a border and war zones. The idea is to distribute many smartdust motes inside an enormous geological region. Every one of these motes shapes a remote system, and one of them will go about as the system organiser that can control the whole system and furthermore goes about as a passage to the outside world. The preferred standpoint with these little motes is that it can be conveyed in a couple of hours by a pair of men or even dropped from an airborne helicopter. Every mote comprises of an assortment of sensors to distinguish every single potential type of interruption.
IRJET- Personal Assistant for Visually Impaired People in MallsIRJET Journal
This document proposes a personal assistant system for visually impaired people navigating indoor areas like malls using WiFi fingerprinting. The system uses existing WiFi access points to locate a user's position by comparing received signal strength indicator (RSSI) values to a database of reference points mapped to specific locations. It determines the shortest route between locations using Dijkstra's algorithm on a graph of reference points. The system was designed to help the large visually impaired population navigate complex indoor areas more easily using a mobile app and WiFi positioning without the need for additional infrastructure deployment. It aims to provide an indoor location system as an alternative to GPS which does not work well inside buildings.
This document summarizes a proposed train collision avoidance system called Object Collision Avoidance with Train using Android based Kit (OAK). The system uses ultrasonic sensors, an ARM7 microcontroller, GPS, GSM and MEMS sensors to detect objects on the track and send alerts to prevent collisions. If an object is detected, the system classifies it as manageable or unmanageable. For unmanageable objects, alerts are sent via GSM to the driver, guard and control room. The GPS tracks train location and MEMS detects abnormal train movement. The system aims to provide a low-cost, robust and efficient solution to prevent train collisions and ensure passenger safety.
Indoor Positioning System using Magnetic Positioning and BLE beaconsIRJET Journal
This document presents an indoor positioning system that uses magnetic positioning and Bluetooth Low Energy (BLE) beacons. It discusses how magnetic positioning works by detecting disturbances in the Earth's magnetic field caused by structural elements in buildings. An Android application is proposed that would collect magnetic fingerprints using the phone's magnetometer and send them to IndoorAtlas' API to determine the user's location. BLE beacons would also be used to improve positioning accuracy. The system does not require dedicated infrastructure. Magnetic positioning coupled with BLE allows for accurate indoor localization without extra hardware costs. It is presented as a potential standard for indoor positioning systems.
IRJET- Smart Accident Detection and Emergency Notification System using IoT a...IRJET Journal
This document describes a smart accident detection and emergency notification system using IoT and mobile computing. The system uses MEMS sensors to detect vehicle vibrations during an accident and ultrasonic sensors to calculate distance. It then sends accident location data like coordinates, time, and angle of impact to emergency contacts via GSM module. This is intended to reduce response time and save lives by quickly notifying authorities and loved ones after a crash when emergency services are lacking. The system architecture incorporates sensors, microcontroller, GPS, GSM and modules for user registration, location updating, and accident notification.
Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.IRJET Journal
This document describes a wireless sensor network system for environmental monitoring using Internet of Things (IoT) technology. Key points:
- Sensor nodes collect data from sensors and send it wirelessly to a Raspberry Pi base station using a Zigbee protocol. The base station sends the data to a cloud server.
- The system monitors parameters like temperature, humidity, CO2, and vibration. Real-time sensor data is fetched by a web server and displayed to users via the Internet.
- The Raspberry Pi acts as the base station, connecting to multiple sensor nodes. It contains a database and web server to store and display the sensor data remotely.
- Common sensor nodes used include MQ2 and
The document describes a proposed smartdust network system for tactical border surveillance using multiple sensor signatures. The system consists of two smartdust sensor motes equipped with seismic, magnetic, acoustic, and thermal sensors and a central monitoring mote. The smartdust motes are designed using an ARM microcontroller, IEEE 802.15.4 radio transceiver, and various MEMS sensors. They form an ad-hoc wireless network to detect intrusions based on sensor signatures and relay information to the central monitoring mote. The central mote also displays the intrusion tracking history. The system is intended to address limitations of existing border surveillance methods like aircraft, armed forces, and ground RADAR systems by providing a low-cost, low
The document describes a proposed smartdust network system for tactical border surveillance using multiple sensor signatures. The system consists of two smartdust sensor motes equipped with seismic, magnetic, acoustic, and thermal sensors and a central monitoring mote. The smartdust motes are designed using an ARM microcontroller, IEEE 802.15.4 radio transceiver, and various MEMS sensors. They form an ad-hoc wireless network to detect intrusions based on sensor signatures and relay information to the central monitoring mote. The central mote also displays the intrusion tracking history. The system aims to provide an effective low-cost solution for monitoring large border areas with minimal infrastructure.
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesIOSR Journals
Abstract: The paper aims at designing a system for border surveillance using the concept of smartdust
technology. Smartdusts are small dust like wireless sensor motes with multiple on-board sensors and
microcontroller. In real time, thousands of such smartdust motes must be deployed in a large area. The motes
can form a network among them and has wireless connection to outside world. Onboard hardware include a
variety of sensors for vibration/seismic, magnetic, acoustic and thermal signature recognition, a
microcontroller for processing these sensor values and a radio transceiver for communication over a wireless
network. In this experimental project, we have designed one central monitoring mote and two smartdust motes
using ARM controller, IEEE radio transceiver and sensors.The central monitoring mote also displays the
tracking history of intrusion on enabling a switch.
Keywords:Advanced RISC Machine (ARM), Cortex microcontroller software interface standard (CMSIS), Inter
Integrated Circuit (I2C), MEMS accelerometer, Serial Peripheral Interface (SPI),Smartdust mote.
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesIOSR Journals
The paper aims at designing a system for border surveillance using the concept of smartdust
technology. Smartdusts are small dust like wireless sensor motes with multiple on-board sensors and
microcontroller. In real time, thousands of such smartdust motes must be deployed in a large area. The motes
can form a network among them and has wireless connection to outside world. Onboard hardware include a
variety of sensors for vibration/seismic, magnetic, acoustic and thermal signature recognition, a
microcontroller for processing these sensor values and a radio transceiver for communication over a wireless
network. In this experimental project, we have designed one central monitoring mote and two smartdust motes
using ARM controller, IEEE radio transceiver and sensors.The central monitoring mote also displays the
tracking history of intrusion on enabling a switch
This seminar presentation discusses the development of a mobile distributed system for personal security. The system uses GPS and LBS technologies to track a user's location and send emergency alerts via SMS or email with their coordinates. It has a client-server architecture with the mobile phone as the client and synchronization between servers. The system aims to provide location tracking and alerts even when GPS is unavailable by using cell tower or WiFi access point information to determine approximate location. It addresses the problem of location tracking without GPS through a combination of existing technologies and custom developments.
Rfid based traffic controller using gsmramesh chatty
This document provides an overview of embedded systems and RFID technology. It discusses that embedded systems have dedicated functions and operate in real-time within larger mechanical systems. They contain microprocessors or DSPs and are used widely in consumer, industrial, and military applications. RFID technology allows wireless identification of tags attached to objects using radio frequencies. It has advantages like non-line-of-sight reading but also disadvantages like potential privacy issues. The document reviews the history and components of RFID systems.
A survey on hiding user privacy in location based services through clusteringeSAT Journals
Abstract Smartphone’s are being more and more popular as the technology being evolve. The Smartphone’s are capable of providing the location aware services like GPS. They share all the location information with the central location server. When user submit any query then these query also carries some personal information of the user. This query and information is then submitted to the LGS server. At the LBS server this information is not much confidential. Someone can use this information to make user panic. To overcome this we are proposing the new collaborative approach to hide user’s personal data from the LBS server. Our approach does not lead to make changes in the architecture of the LBS server. And we are also not going to use the third party server. Here we are going to use the other user’s device to search other users query so that other user can be get hide from the LBS server. Keywords: Mobile networks, location-based services, location privacy, Bayesian inference attacks, epidemic models
This document discusses the vision of a cloud-centric Internet of Things. It describes how ubiquitous sensing through wireless sensor networks can measure environmental indicators across many areas of life. As these sensing devices proliferate in communicating networks, they create the Internet of Things by seamlessly blending sensors and actuators with our environment. This generates enormous amounts of data that must be stored, processed, and presented seamlessly through cloud computing as a unifying framework. The document outlines key enabling technologies like RFID, wireless sensor networks, and addressing schemes. It also discusses applications, challenges, and the future direction of cloud-based IoT.
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
SATTA MATKA DPBOSS KALYAN MATKA RESULTS KALYAN CHART KALYAN MATKA MATKA RESULT KALYAN MATKA TIPS SATTA MATKA MATKA COM MATKA PANA JODI TODAY BATTA SATKA MATKA PATTI JODI NUMBER MATKA RESULTS MATKA CHART MATKA JODI SATTA COM INDIA SATTA MATKA MATKA TIPS MATKA WAPKA ALL MATKA RESULT LIVE ONLINE MATKA RESULT KALYAN MATKA RESULT DPBOSS MATKA 143 MAIN MATKA KALYAN MATKA RESULTS KALYAN CHART
Profiles of Iconic Fashion Personalities.pdfTTop Threads
The fashion industry is dynamic and ever-changing, continuously sculpted by trailblazing visionaries who challenge norms and redefine beauty. This document delves into the profiles of some of the most iconic fashion personalities whose impact has left a lasting impression on the industry. From timeless designers to modern-day influencers, each individual has uniquely woven their thread into the rich fabric of fashion history, contributing to its ongoing evolution.
Cover Story - China's Investment Leader - Dr. Alyce SUmsthrill
In World Expo 2010 Shanghai – the most visited Expo in the World History
https://www.britannica.com/event/Expo-Shanghai-2010
China’s official organizer of the Expo, CCPIT (China Council for the Promotion of International Trade https://en.ccpit.org/) has chosen Dr. Alyce Su as the Cover Person with Cover Story, in the Expo’s official magazine distributed throughout the Expo, showcasing China’s New Generation of Leaders to the World.
SATTA MATKA SATTA FAST RESULT KALYAN TOP MATKA RESULT KALYAN SATTA MATKA FAST RESULT MILAN RATAN RAJDHANI MAIN BAZAR MATKA FAST TIPS RESULT MATKA CHART JODI CHART PANEL CHART FREE FIX GAME SATTAMATKA ! MATKA MOBI SATTA 143 spboss.in TOP NO1 RESULT FULL RATE MATKA ONLINE GAME PLAY BY APP SPBOSS
Discover the Beauty and Functionality of The Expert Remodeling Serviceobriengroupinc04
Unlock your kitchen's true potential with expert remodeling services from O'Brien Group Inc. Transform your space into a functional, modern, and luxurious haven with their experienced professionals. From layout reconfiguration to high-end upgrades, they deliver stunning results tailored to your style and needs. Visit obriengroupinc.com to elevate your kitchen's beauty and functionality today.
Call8328958814 satta matka Kalyan result satta guessing➑➌➋➑➒➎➑➑➊➍
Satta Matka Kalyan Main Mumbai Fastest Results
Satta Matka ❋ Sattamatka ❋ New Mumbai Ratan Satta Matka ❋ Fast Matka ❋ Milan Market ❋ Kalyan Matka Results ❋ Satta Game ❋ Matka Game ❋ Satta Matka ❋ Kalyan Satta Matka ❋ Mumbai Main ❋ Online Matka Results ❋ Satta Matka Tips ❋ Milan Chart ❋ Satta Matka Boss❋ New Star Day ❋ Satta King ❋ Live Satta Matka Results ❋ Satta Matka Company ❋ Indian Matka ❋ Satta Matka 143❋ Kalyan Night Matka..
During the budget session of 2024-25, the finance minister, Nirmala Sitharaman, introduced the “solar Rooftop scheme,” also known as “PM Surya Ghar Muft Bijli Yojana.” It is a subsidy offered to those who wish to put up solar panels in their homes using domestic power systems. Additionally, adopting photovoltaic technology at home allows you to lower your monthly electricity expenses. Today in this blog we will talk all about what is the PM Surya Ghar Muft Bijli Yojana. How does it work? Who is eligible for this yojana and all the other things related to this scheme?
Ellen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women MagazineCIOWomenMagazine
In this article, we will dive into the extraordinary life of Ellen Burstyn, where the curtains rise on a story that's far more attractive than any script.
[To download this presentation, visit:
https://www.oeconsulting.com.sg/training-presentations]
This presentation is a curated compilation of PowerPoint diagrams and templates designed to illustrate 20 different digital transformation frameworks and models. These frameworks are based on recent industry trends and best practices, ensuring that the content remains relevant and up-to-date.
Key highlights include Microsoft's Digital Transformation Framework, which focuses on driving innovation and efficiency, and McKinsey's Ten Guiding Principles, which provide strategic insights for successful digital transformation. Additionally, Forrester's framework emphasizes enhancing customer experiences and modernizing IT infrastructure, while IDC's MaturityScape helps assess and develop organizational digital maturity. MIT's framework explores cutting-edge strategies for achieving digital success.
These materials are perfect for enhancing your business or classroom presentations, offering visual aids to supplement your insights. Please note that while comprehensive, these slides are intended as supplementary resources and may not be complete for standalone instructional purposes.
Frameworks/Models included:
Microsoft’s Digital Transformation Framework
McKinsey’s Ten Guiding Principles of Digital Transformation
Forrester’s Digital Transformation Framework
IDC’s Digital Transformation MaturityScape
MIT’s Digital Transformation Framework
Gartner’s Digital Transformation Framework
Accenture’s Digital Strategy & Enterprise Frameworks
Deloitte’s Digital Industrial Transformation Framework
Capgemini’s Digital Transformation Framework
PwC’s Digital Transformation Framework
Cisco’s Digital Transformation Framework
Cognizant’s Digital Transformation Framework
DXC Technology’s Digital Transformation Framework
The BCG Strategy Palette
McKinsey’s Digital Transformation Framework
Digital Transformation Compass
Four Levels of Digital Maturity
Design Thinking Framework
Business Model Canvas
Customer Journey Map
Prescriptive analytics BA4206 Anna University PPTFreelance
Business analysis - Prescriptive analytics Introduction to Prescriptive analytics
Prescriptive Modeling
Non Linear Optimization
Demonstrating Business Performance Improvement
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...APCO
The Radar reflects input from APCO’s teams located around the world. It distils a host of interconnected events and trends into insights to inform operational and strategic decisions. Issues covered in this edition include: