Wireless Integrated Network Sensors (WINS) now provide a new monitoring and control capability for monitoring the borders of the country. Using this concept we can easily identify a stranger or some terrorists entering the border. The border area is divided into number of nodes. Each node is in contact with each other and with the main node. The noise produced by the foot-steps of the stranger are collected using the sensor. This sensed signal is then converted into power spectral density and the compared with reference value of our convenience. Accordingly the compared value is processed using a microprocessor, which sends appropriate signals to the main node. Thus the stranger is identified at the main node. A series of interface, signal processing, and communication systems have been implemented in micro power CMOS circuits. A micro power spectrum analyzer has been developed to enable low power operation of the entire WINS system.
MicroStrip Antenna
Introduction .
Micro-Strip Antennas Types .
Micro-Strip Antennas Shapes .
Types of Substrates (Dielectric Media) .
Comparison of various types of flat profile printed antennas .
Advantages & DisAdvantages of MSAs .
Applications of MSAs .
Radiation patterns of MSAs .
How to Optimizing the Substrate Properties for Increased Bandwidth ?
Comparing the different feed techniques .
MicroStrip Antenna
Introduction .
Micro-Strip Antennas Types .
Micro-Strip Antennas Shapes .
Types of Substrates (Dielectric Media) .
Comparison of various types of flat profile printed antennas .
Advantages & DisAdvantages of MSAs .
Applications of MSAs .
Radiation patterns of MSAs .
How to Optimizing the Substrate Properties for Increased Bandwidth ?
Comparing the different feed techniques .
The purpose of this presentation is to introduce the Body Area Network technology. At the beginning I have discussed the history and development of Body Sensor Network and how that grew into the more general concept of BAN. MobiHealth as a mature example of MBSN technology has been explained. I then continued on to take a look at a case study involving MobiHealth and the monitoring cardiac data. I concluded the paper by looking at some challenges related to BAN. We covered signal and path loss in the human body and some of the challenges associated with communication and power within the human body. This ppt demonstrates usability and the fusion of cutting edge technology and how it is shaping wearable technology.
CR : smart radio that has the ability to sense the external environment, learn from the history and make intelligent decisions to adjust its transmission parameters according
to the current state of the environment.
The purpose of this presentation is to introduce the Body Area Network technology. At the beginning I have discussed the history and development of Body Sensor Network and how that grew into the more general concept of BAN. MobiHealth as a mature example of MBSN technology has been explained. I then continued on to take a look at a case study involving MobiHealth and the monitoring cardiac data. I concluded the paper by looking at some challenges related to BAN. We covered signal and path loss in the human body and some of the challenges associated with communication and power within the human body. This ppt demonstrates usability and the fusion of cutting edge technology and how it is shaping wearable technology.
CR : smart radio that has the ability to sense the external environment, learn from the history and make intelligent decisions to adjust its transmission parameters according
to the current state of the environment.
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...Swapnil Jagtap
Secure information transmission is a basic issue for Wireless Sensor Networks (WSNs). Clustering is a practical approach to improve the execution of WSNs. In this paper, we study the safe and efficient data transmission in Cluster-based Wireless Sensor Networks (CWSNs). Here two Secure and Efficient data Transmission (SET) protocols are proposed namely (SET-IBS) and (SET-IBOOS) by using digital signature schemes. The SET-IBS security depends on the hardness of the discrete logarithm issues. In this paper, the feasibility of the SET-IBS and SET-IBOOS protocols is shown with respect to the security requirements and analysis against various attacks. The calculations and simulations are given to represent the effectiveness of the proposed execution over the current security protocols for CWSNs, as far as security overhead and energy consumption is considered. A WSN system consists of distributed devices using wireless sensor nodes to monitor the physical or environmental conditions, such as sound, temperature, air, vibration, and motion. The individual nodes in WSN are capable of sensing their environment, processing the information locally and sending data to one or more collection points in WSN. In this process, efficient data transmission is one of the most important issues in WSN. Many WSN is deployed in extreme physical environments for applications such as military domains, natural or artificial disasters or certain rescue operations with trustless surroundings. Secure and efficient data transmission is thus especially necessary and is demanded in many such practical WSNs.
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
Advances in embedded systems have resulted in the development of wireless sensor networks, which not
only provide unique opportunities for monitoring but also controlling homes, cities and the environments.
Recent advancements in wireless sensor network have resulted into many new protocols some of them are
specifically designed for sensor network for detecting the event and routing the event related information to
the base station in efficient manner. This paper surveys recent event driven routing protocols for wireless
sensor network. We have compared various event driven routing protocols using different parameters like
Sink Centric, Node Centric, Reliability, Congestion control, Energy Efficiency, Loss reliability and loss
recovery. We have also described LEACH and MECN protocols but as they are not e
Remote Monitoring of Crop Field Using Wireless Sensor NetworkIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKRutvik Pensionwar
With the development in data acquisition system, information-collection plays an increasingly important role in the field of Wireless Technology. There has been tremendous increase in the use of sensors in each and every field. In order to get fast response from these sensors the delay should be reduced. Also the congestion in the network should be tackled to increase the efficiency. Wireless Sensor Networks (WSNs) consist of many tiny wireless sensors which operate in an environment in order to collect data. In a typical WSN, data is gathered from environment by sensor nodes and then transmitted to a base station. All these operations are executed by sensor nodes with keeping in mind the limitation of power. Reliable communication, power efficiency, network congestion issues are among major concerns. So in our project our main focus is to avoid the packet loss by increasing the network efficiency and handling the congestion in the network by proper buffer management. Finally visualization of processed data is done at the base station and the future enhancement could be to directly send the sensed data to cloud storage.
Similar to A Border security Using Wireless Integrated Network Sensors (WINS) (20)
A Border security Using Wireless Integrated Network Sensors (WINS)Saurabh Giratkar
Wireless Integrated Network Sensors (WINS) now provide a new monitoring and control capability for monitoring the borders of the country. Using this concept we can easily identify a stranger or some terrorists entering the border. The border area is divided into number of nodes. Each node is in contact with each other and with the main node. The noise produced by the foot-steps of the stranger are collected using the sensor. This sensed signal is then converted into power spectral density and the compared with reference value of our convenience. Accordingly the compared value is processed using a microprocessor, which sends appropriate signals to the main node. Thus the stranger is identified at the main node. A series of interface, signal processing, and communication systems have been implemented in micro power CMOS circuits. A micro power spectrum analyzer has been developed to enable low power operation of the entire WINS system.
To Understand the Eco-System in Digital Media Marketing.Saurabh Giratkar
Title of the Dissertation Report is “To Understand the ecosystem of digital media marketing” and Objectives of the Dissertation are to understand the change in consumer buying behavior in digital era. Methodology used for achieving these objectives is a exploratory research. For achieving the objective, I have done one research using an online questionnaire. The title for the research is “Understand the consumer buying behaviour of Indian in digital era”.
Main findings of this Dissertation are given here. Indian customers are highly information seekers. They collect more information about a product before buying it. Internet penetration in India is key player for this phenomenon. Most of Indians are getting stimulus through advertisements, but they are not reaching to end phase of customers purchase journey, mainly in high involvement purchases. Brands are getting more touch point to reach their target group in this digital era. More details about findings are given this report.
The successful completion of this Dissertation indicates that the future of marketing is in the hands of digital. I conclude my research by quoting again that “Brands can’t sustain without digital presence”
Advertising in business is a form of marketing communication used to encourage, persuade, or manipulate an audience to take or continue to take some action. Most commonly, the desired result is to drive consumer behaviour with respect to a commercial offering. Advertising is defined by Richard F. Taflinger as “Advertising is the non-personal communication of information usually paid for and usually persuasive in nature about products, services or ideas by identified sponsors through the various media."
Impact of Packaging on Consumer Buying Behavior.Saurabh Giratkar
The aim of this thesis is to get the A study to point toward Impact of packaging on consumer buying behavior. The basic purpose of behind it is Animesh Packaging Industry wants to tie up with one Cracker Manufacturing firm and they want all packaging material which will require to pack their product from us and hence to decide the outer packaging this survey is taken out also to know how factors affects the behavior of customers. According to this research I try to find the positive relationship between independent variable and dependent variables. For collecting the data, I will use the questionnaire, while for analysis I will use SPSS 16. A sample of 100 consumers will be selected to test the reliability of the model. For that we create questionnaire on Monkeysearch.com and request the costumers to fill the survey online. The significance of the study, its delimitation and limitations are discussed. The research is based in India. The consumer buying behavior is dependent variable.
The packaging is the most important factor. Packaging elements like Packaging color. Background Image, Packaging Material, Font Style, Design of wrapper, Printed Information and Innovation is taken as predictors. Due to increasing self-service and changing consumers’ lifestyle the interest in package as a tool of sales promotion and stimulator of impulsive buying behavior is growing increasingly. So package performs an important role in marketing communications, especially in the point of sale and could be treated as one of the most important factors influencing consumer’s purchase decision. Literature analysis on question under investigation has shown that there is no agreement on classification of package elements as well as on research methods of package impact on consumer’s purchase decision.
External environment of taj & oberoi hotel industrySaurabh Giratkar
3. EXTERNAL ENVIRONMENT
Controlling Ministry
The Ministry of Tourism is the nodal agency for the formulation of national policies and programmes and for the co-ordination of activities of various Central Government Agencies, State Governments/UTs and the Private Sector for the development and promotion of tourism in the country. This Ministry is headed by the Union Minister of State for Tourism (Independent Charge).
The administrative head of the Ministry is the Secretary (Tourism). The Secretary also acts as the Director General (DG) Tourism. The office of the Director General of Tourism {now merged with the office of Secretary (Tourism)} provides executive directions for the implementation of various policies and programmes. Directorate General of Tourism has a field formation of 20 offices within the country and 14 offices abroad and one sub-ordinate office/project i.e. Indian Institute of Skiing and Mountaineering (IISM)/ Gulmarg Winter Sports Project. The overseas offices are primarily responsible for tourism promotion and marketing in their respective areas and the field offices in India are responsible for providing information service to tourists and to monitor the progress of field projects.The activities of IISM/GWSP have now been revived and various Ski and other courses are being conducted in the J&K valley.
Role and Functions of the Ministry of Tourism
The Ministry of Tourism functions as the nodal agency for the development of tourism in the country. It plays a crucial role in coordinating and supplementing the efforts of the State/Union Territory Governments, catalyzing private investment, strengthening promotional and marketing efforts and in providing trained manpower resources. The functions of the Ministry in this regard mainly consist of the following:
All Policy Matters, including: Development Policies Incentives, External Assistance, Manpower Development, Promotion & Marketing.
The Ministry of Tourism, Government of India has set some guidelines for the star classification as given in the table
TAJ Hotel
Founder Jamsetji Tata
Headquarters Mumbai, Maharashtra, India
Key people MD & CEO
Rakesh Sarna
The Indian Hotels Company (IHCL) and its subsidiaries, collectively known as Taj Hotels Resorts and Palaces, is one of Asia's largest and finest groups of hotels. Incorporated by the founder of the Tata group, Jamshedji Tata, the company opened its first property, the Taj Mahal Palace, in Bombay in 1903. The Taj, a symbol of Indian hospitality, completed its centenary year in 2003. Taj Hotels Resorts and Palaces comprises 93 hotels in 53 locations, including 25 Ginger hotels across India, with an additional 16 international. From world-renowned landmarks to modern business hotels, idyllic beach resorts to authentic grand palaces, each Taj hotel offers an unrivalled fusion of warm Indian hospitality, world-class service and modern luxury. Areas of Business:
Taj is their flagship brand for the world's most dis
Many organizations expect managers who manage employees to exhibit both management and leadership qualities. They are required to build relationships among direct-report employees and to motivate them to achieve individual and group goals. The degree to which managers can successfully manage their staff's performance will be important for evaluating their worth to the organization.
A Combined Effect
Defining managerial effectiveness depends on an organization's management model. One way to look at managerial effectiveness is this: it's the combined effect of a manager who uses different management tools and techniques. Phillip G. Clampitt's model includes communication technologies, data, knowledge, action, performance feedback, boundary spanning, change and innovation. In this model, a manager brings all his actions together, providing different kinds of assistance to employees, such as helping them adjust to change and come up with new ideas that lead to innovation.
Planning and Execution
Another way to look at managerial effectiveness concerns the approach a manager takes to get people to produce desired outcomes. Some managers are less focused on interpersonal skills, perhaps having zero charisma, and are keenly focused on planning and execution. They set goals, create a plan for implementing those goals, assume responsibility for their decisions and share the implementation plan with employees through effective communication. If they have a high degree of managerial effectiveness, the results will follow from their systematic style.
The theories of an early 20th century political philosopher, Mary Parker Follett, have added much to modern day management theory, organisations, and leadership.
Leadership is multi-faceted containing numerous qualities, function, and styles. It is a construct that continues to be debated during a revival in interest of the ideas of Mary Parker Follett. Her thoughts on management and leadership have been informative and inspirational. Indeed, management theoretician Peter Drucker called her the 'prophet of management' and his 'guru'. Follett's ideas are certainly relevant in contemporary society, not only for organisations, but also for the individual, as they continue to challenge the lay ideas of leadership.
Connecting Remote Users to Your Network with Windows Server 2003Saurabh Giratkar
Business professionals today require access to information on their network from anywhere at any time. Whether they are on the road with customers or working from home, it is critical to provide employees with remote access to the corporate network. This white paper outlines how Windows Server 2003 can provide telecommuters and mobile computing professionals with access to their private organization network resources. With integrated dial-up and virtual private networking services, Windows Server 2003 provides a complete remote access solution for medium-sized networks
Air pollution monitoring system using mobile gprs sensors array pptSaurabh Giratkar
ppt This paper contain brief introduction to vehicular pollution, effect of increase in vehicular pollution on environment as well on human health. To monitor this pollution wireless sensor network (WSN) system is proposed. The proposed system consists of a Mobile Data-Acquisition Unit (Mobile-DAQ) and a fixed Internet-Enabled Pollution Monitoring Server (Pollution-Server). The Mobile-DAQ unit integrates a single-chip microcontroller, air pollution sensors array, a General Packet Radio Service Modem (GPRS-Modem), and a Global Positioning System Module (GPS-Module). The Pollution-Server is a high-end personal computer application server with Internet connectivity. The Mobile-DAQ unit gathers air pollutants levels (CO, NO2, and SO2), and packs them in a frame with the GPS physical location, time, and date. The frame is subsequently uploaded to the GPRS-Modem and transmitted to the Pollution-Server via the public mobile network. A database server is attached to the Pollution- Server for storing the pollutants level for further usage by various clients such as environment protection agencies, vehicles registration authorities, and tourist and insurance companies.
Air pollution monitoring system using mobile gprs sensors arraySaurabh Giratkar
This paper contain brief introduction to vehicular pollution, effect of increase in vehicular pollution on environment as well on human health. To monitor this pollution wireless sensor network (WSN) system is proposed. The proposed system consists of a Mobile Data-Acquisition Unit (Mobile-DAQ) and a fixed Internet-Enabled Pollution Monitoring Server (Pollution-Server). The Mobile-DAQ unit integrates a single-chip microcontroller, air pollution sensors array, a General Packet Radio Service Modem (GPRS-Modem), and a Global Positioning System Module (GPS-Module). The Pollution-Server is a high-end personal computer application server with Internet connectivity. The Mobile-DAQ unit gathers air pollutants levels (CO, NO2, and SO2), and packs them in a frame with the GPS physical location, time, and date. The frame is subsequently uploaded to the GPRS-Modem and transmitted to the Pollution-Server via the public mobile network. A database server is attached to the Pollution- Server for storing the pollutants level for further usage by various clients such as environment protection agencies, vehicles registration authorities, and tourist and insurance companies.
In the field of computing, Trojans have been around for
even longer than computer viruses – but traditionally have
been less of a cause for concern amongst the community of
personal computer users. In recent years, however, they have
been the focus of increased attention from anti-virus
companies and heightened levels of user concern due to the
popularity of networked computers.
As the world is moving to an age of computers which
are open to sharing of resources and communication, a very
dark cloud has been thrown over by the unfortunate publishing
of easily used and abused programs so called as Trojans.
Almost every existing network operating system provides the
sort of features that make Trojans possible. If an awareness of
such programs is not made then sneakier people can easily
attack any networked computer with similar tactics without
warning.
The vulnerability that exists is that computers don’t
have any internal controls, it is the user who controls the
computers. If computers are not controlled properly, we’ll
either have increasingly serious security breaches or the
computer industry will go back to locked down main frame
type processing computers to force automatic controls.
As it is said, ”Prevention is better then cure” and hence
with the help of this paper we will be discussing the various
Trojan functions, Trojan variations, Media of infection and the
dis-infection procedures, which will assure prevention from a
Trojan attack.
Brain Computer Interface Next Generation of Human Computer InteractionSaurabh Giratkar
In the area of HCI research the main focus is on defining new ways of human interaction with computer system. With the passes of time a number of inventions have been made in this field. In initial days we used only keyboards to access our computer system (e.g. in Unix Terminal). In Second phase, after invention of mouse and other pointing devices, we started using graphical user interface using pointing devices like mouse which make the use of computer more easy and comfortable. Nowadays we are using pressure-driven mechanism, i.e. touch screen, which is common at ATMs, Mobile phones and PDAs etc. Although it is not as common in daily works but the release of tablet PCs and its popularity shows that the day is not much far when we wouldn’t be having keyboards and mouse at all.
All of these inventions have been made for balancing the requirements of society and user. E.g. Games, Multimedia Applications etc are not possible using only-Keyboard so we need mouse driven system for such applications, similarly we cannot have large keyboard on mobile so we need a touch screen system for mobiles. In addition to these traditional HCI models, there are some more advance HCI technology too for adding more flexibility and hence making the product more useful. E.g. swap card system at office doors for attendance and ATM-swap card for shopping. Speech processing systems are also there where we can access our computer system using our speech. Fig 1 shows most popular traditional HCI system.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
2. CCEERRTTIIFFIICCAATTEE
This is to certify that the Seminar report entitled
““BB oorrddeerr SS eeccuurriittyy UUssiinngg WWiirreelleessss
IInntteegg rraattee dd NNeettww oorr kk SS eennss oorr””
Being Submitted By
Mr. / Ms. Saurabh R. Giratkar
Of final year Engineering during the session 2013-2014
Is for the partial fulfillment for the requirement
For the award of engineering in Electronics and Telecommunication
under
Sant Gadge Baba Amravati University.
PPrrooff.. PP.. GG.. KKaauusshhiikk PPrrooff.. RR.. RR.. AAggrraawwaall
(Project & Seminar Guide) (Project & Seminar Co-Guide)
Prof. Dr. S. M. Gulhane
HOD
DDeeppaarrttmmeenntt ooff EElleeccttrroonniiccss aanndd TTeelleeccoommmmuunniiccaattiioonn EEnnggiinneeeerriinngg
JAWAHARLAL DARDA INSTITUTE OF ENGINEERING AND
TECHNOLOGY MIDC, YAVATMAL 445001
22001133--22001144
3. ACKNOWLEDGEMENT
It gives me a great pleasure to submit the seminar topic titled “BB OO RR DD EE RR
SS EE CC UU RR II TT YY UU SS II NN GG WW II RR EE LL EE SS SS II NN TT EE GG RR AA TT EE DD NN EE TT WW OO RR KK
SS EE NN SS OO RR ”. I wish to take this opportunity to express my heartiest gratitude with
pleasure to J.D.I.E.T., Yavatmal, which gave me an opportunity in fulfilling my most
cherished desire of reaching my goals.
I am indebted to a proactive guide Prof. P. G. Kaushik and co-guided by Prof.
R. R. Agrawal because without his valuable guidance this work would not have been a
success. His constructive, useful, timely suggestions and encouragement in every step
immensely helped me to carry out my seminar work. His invaluable presence was a
great boost for me in achieving up the goal.
I am very much indebted to the Head of the Department Dr. S. M. Gulhane and
Principal Dr. A. W. Kolhatkar, for providing all the facilities needed for successful
completion of this seminar and providing necessary assistance while preparing for this
seminar work.
I am very much thankful to all Professors and staff members of Electronics and
telecommunication Engineering Department. I also express my deep gratitude to my
parents and all my friends who directly and indirectly helped me to prepare for this
seminar.
SSuubbmmiitttteedd bbyy::
SSaauurraabbhh RR.. GGiirraattkkaarr
Final Year , section-c
Electronics& Telecommunication Engineering.
4. BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 1
LIST OF FIGURES PAGE NO.
1. Wireless Integrated Network Sensor 5
2. WINS Architecture 6
3. Wins nodes 7
4. A) Thermal Infrared Detector 9
B) A Micrograph of the Thermopile Junction Array 10
5. Nodal distance and Traffic 11
6. WINS micro power spectrum analyser architecture 13
7. Comparator plot 14
5. BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 2
TABLE OF CONTENTS
CHAPTER TITLE PAGE NO.
CERTIFICATE
ABSTRACT
LIST OF FIGURES
1. INTRODUCTION 4
2. WINS SYSTEM ARCHITECTURE 6
3. WINS NODE ARCHITECTURE 7
4. WINS MICRO SENSOR 9
5. ROUTING BETWEEN NODES 11
6. WINS DIGITAL SIGNAL PROCESSING 12
7. PSD COMPARSON 14
8. APPLICATION 16
9. PROS AND CONS 17
10. CONCLUSION 17
11. REFERENCES 18
6. BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 3
ABSTRACT
Wireless Integrated Network Sensors (WINS) now provide a new monitoring and
control capability for monitoring the borders of the country. Using this concept we can
easily identify a stranger or some terrorists entering the border. The border area is divided
into number of nodes. Each node is in contact with each other and with the main node.
The noise produced by the foot-steps of the stranger are collected using the sensor. This
sensed signal is then converted into power spectral density and the compared with
reference value of our convenience. Accordingly the compared value is processed using a
microprocessor, which sends appropriate signals to the main node. Thus the stranger is
identified at the main node. A series of interface, signal processing, and communication
systems have been implemented in micro power CMOS circuits. A micro power
spectrum analyzer has been developed to enable low power operation of the entire WINS
system.
Thus WINS require a Microwatt of power. But it is very cheaper when compared
to other security systems such as RADAR under use. It is even used for short distance
communication less than 1 Km. It produces a less amount of delay. Hence it is reasonably
faster. On a global scale, WINS will permit monitoring of land, water, and air resources
for environmental monitoring. On a national scale, transportation systems, and borders
will be monitored for efficiency, safety and security.
7. BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 4
BORDER SECURITY USING
WIRELESS INTEGRATED NETWORK SENSORS (WINS)
CHAPTER 1
INTRODUCTION
Wireless Integrated Network Sensors (WINS) combine sensing, signal
processing, decision capability, and wireless networking capability in a compact, low
power system. Compact geometry and low cost allows WINS to be embedded and
distributed at a small fraction of the cost of conventional wireline sensor and actuator
systems. On a local, wide-area scale, battlefield situational awareness will provide
personnel health monitoring and enhance security and efficiency. Also, on a metropolitan
scale, new traffic, security, emergency, and disaster recovery services will be enabled by
WINS. On a local, enterprise scale, WINS will create a manufacturing information
service for cost and quality control. The opportunities for WINS depend on the
development of scalable, low cost, sensor network architecture. This requires that sensor
information be conveyed to the user at low bit rate with low power transceivers.
Continuous sensor signal processing must be provided to enable constant monitoring of
events in an environment. Distributed signal processing and decision making enable
events to be identified at the remote sensor. Thus, information in the form of decisions is
conveyed in short message packets. Future applications of distributed embedded
processors and sensors will require massive numbers of devices. In this paper we have
concentrated in the most important application, Border Security.
9. BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 6
CHAPTER 2
WINS SYSTEM ARCHITECTURE
Conventional wireless networks are supported by complex protocols that are
developed for voice and data transmission for handhelds and mobile terminals. These
networks are also developed to support communication over long range (up to 1km or
more) with link bit rate over 100kbps. In contrast to conventional wireless networks, the
WINS network must support large numbers of sensors in a local area with short range
and low average bit rate communication (less than 1kbps). The network design must
consider the requirement to service dense sensor distributions with an emphasis on
recovering environment information. Multihop communication yields large power and
scalability advantages for WINS networks. Multihop communication, therefore, provides
an immediate advance in capability for the WINS narrow Bandwidth devices. However,
WINS Multihop Communication networks permit large power reduction and the
implementation of dense node distribution. The multihop communication has been shown
in the figure 2. The figure 1 represents the general structure of the wireless integrated
network sensors (WINS) arrangement.
Continuous operation low duty cycle
Figure 2. The wireless integrated network sensor (WINS) architecture.
10. BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 7
CHAPTER 3
WINS NODE ARCHITECTURE
The WINS node architecture (Figure 1) is developed to enable continuous
sensing, event detection, and event identification at low power. Since the event detection
process must occur continuously, the sensor, data converter, data buffer, and spectrum
analyzer must all operate at micro power levels. In the event that an event is detected, the
spectrum analyzer output may trigger the microcontroller. The microcontroller may then
issue commands for additional signal processing operations for identification of the event
signal. Protocols for node operation then determine whether a remote user or
neighbouring WINS node should be alerted. The WINS node then supplies an attribute of
the identified event, for example, the address of the event in an event look-up-table stored
in all network nodes. Total average system supply currents must be less than 30 A. Low
power, reliable, and efficient network operation is obtained with intelligent sensor nodes
that include sensor signal processing, control, and a wireless network interface.
Distributed network sensor devices must continuously monitor multiple sensor systems,
process sensor signals, and adapt to changing environments and user requirements, while
completing decisions on measured signals.
Figure 3. WINS nodes (shown as disks)
11. BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 8
For the particular applications of military security, the WINS sensor systems must
operate at low power, sampling at low frequency and with environmental background
limited sensitivity. The micro power interface circuits must sample at dc or low
frequency where “1/f” noise in these CMOS interfaces is large. The micropower signal
processing system must be implemented at low power and with limited word length. In
particular, WINS applications are generally tolerant to latency. The WINS node event
recognition may be delayed by 10 – 100 m sec, or longer. This permits low clock rate
signal processing and architecture design that minimizes computation and
communication power at the expense of latency. For example, in the latency-tolerant
WINS system, time division multiple access protocols may be implemented to reduce
communication power. Also, it is important to note that sensor signals are generally
narrowband signals (bandwidth less than 10 kHz) that require only low sample and
processing rates. Many of the primary WINS applications require sensor nodes powered
by compact battery cells. Total average system supply currents must be less than 30 A
to provide long operating life from typical compact Li coin cells (2.5 cm diameter and 1
cm thickness).
12. BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 9
CHAPTER 4
WINS MICRO SENSORS
Source signals (seismic, infrared, acoustic and others) all decay in amplitude
rapidly with radial distance from the source. To maximize detection range, sensor
sensitivity must be optimized. In addition, due to the fundamental limits of background
noise, a maximum detection range exists for any sensor. Thus, it is critical to obtain the
greatest sensitivity and to develop compact sensors that may be widely distributed.
Clearly, microelectromechanical systems (MEMS) technology provides an ideal path for
implementation of these highly distributed systems. The sensor-substrate “Sensorstrate”
is then a platform for support of interface, signal processing, and communication circuits.
Examples of WINS Micro Seismometer and infrared detector devices are shown in
Figure 3. The detector shown is the thermal detector. It just captures the harmonic signals
produced by the foot-steps of the stranger entering the border. These signals are then
converted into their PSD values and are then compared with the reference values set by
the user.
Figure 4 A. Thermal Infrared Detector
13. BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 10
Fig.4 B Micrograph of the Thermopile Junction Array
The WINS microsensor systems must be monitored continuously by the CMOS
micropower analog-to-digital converter (ADC). As was noted above, power requirements
constrain the ADC design to power levels of 30 W or less. Sensor sample rate for
typical microsensor applications is less than 1kHz (for example the infrared microsensor
bandwidth is 50Hz, thus limiting required sample rate to 100 Hz). Also, it is important to
note that the signal frequency is low. Specifically, the themopile infrared sensor may be
employed to detect temperature, presence, of motion at near dc signal frequencies.
Therefore, the ADC must show high stability (low input-referred noise at low frequency).
For the WINS ADC application, a first order Sigma-Delta (S-D) converter is chosen over
other architectures due to power constraints. The S-D architecture is also compatible with
the limitations of low cost digital CMOS technologies.
14. BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 11
CHAPTER 5
ROUTING BETWEEN NODES
The sensed signals are then routed to the major node. This routing is done
based on the shortest distance. That is the distance between the nodes is not considered,
but the traffic between the nodes is considered. This has been depicted in the figure 4. In
the figure, the distances between the nodes and the traffic between the nodes has been
clearly shown. For example, if we want to route the signal from the node 2 to node 4, the
shortest distance route will be from node 2 via node 3 to node 4. But the traffic through
this path is higher than the path node 2 to node 4. Where as this path is longer in distance.
Figure 5 . Nodal distance and Traffic
15. BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 12
CHAPTER 6
WINS DIGITAL SIGNAL PROCESSING
If a stranger enters the border, his foot-steps will generate harmonic signals. It can
be detected as a characteristic feature in a signal power spectrum. Thus, a spectrum
analyzer must be implemented in the WINS digital signal processing system. The
spectrum analyzer resolves the WINS input data into a low-resolution power spectrum.
Power spectral density (PSD) in each frequency “bins” is computed with adjustable band
location and width. Bandwidth and position for each power spectrum bin is matched to
the specific detection problem. The WINS spectrum analyzer must operate at W power
level. So the complete WINS system, containing controller and wireless network
interface components, achieves low power operation by maintaining only the micropower
components in continuous operation. The WINS spectrum analyzer system, shown in
Figure 7, contains a set of parallel filters.
The complete WINS system, containing controller and wireless network interface
components, achieves low power operation by maintaining only the micropower
components in continuous operation. The WINS spectrum analyzer system contains a set
of 8 parallel filters. Mean square power for each frequency bin, is computed at the output
of each filter. Each filter is assigned a coefficient set for PSD computation. Finally, PSD
values are compared with background reference values (that may be either downloaded or
learned). In the event that the measured PSD spectrum values exceed that of the
background reference values, the operation of a microcontroller is triggered. Thus, only if
an event appears does the microcontroller operate. Of course, the microcontroller may
support additional, more complex algorithms that provide capability (at higher power) for
event identification. The WINS spectrum analyzer architecture includes a data buffer.
Buffered data is stored during continuous computation of the PSD spectrum. If an event
is detected, the input data time series, including that acquired prior to the event, are
available to the microcontroller. Low power operation of the spectrum analyzer is
achieved through selection of an architecture that provides the required performance and
function while requiring only limited word length. First, since high resolution
measurements of PSD are required (5 Hz bandwidth passbands at frequencies of 5 – 50
16. BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 13
Hz with a 200 Hz input word rate) FIR filters would require an excessive number of taps
and corresponding power dissipation. In contrast, IIR filter architectures have provided
adequate resolution with limited word length. An example of the performance of a typical
filter is shown in Figure 8. Here, a series of input signals at frequencies of 10 – 70 Hz
were applied to the 8-bit data IIR filter with coefficients selected for a passband of 10 Hz
width centred at 45 Hz. This device dissipates 3Mw at 3V bias and at a 200Hz word rate.
Figure 6. WINS micropower spectrum analyzer architecture.
17. BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 14
CHAPTER 7
PSD COMPARISION
Each filter is assigned a coefficient set for PSD computation. Finally, PSD values
are compared with background reference values In the event that the measured PSD
spectrum values exceed that of the background reference values, the operation of a
microcontroller is triggered. Thus, only if an event appears, the micro controller operates.
Buffered data is stored during continuous computation of the PSD spectrum. If an event
is detected, the input data time series, including that acquired prior to the event, are
available to the micro controller. The micro controller sends a HIGH signal, if the
difference is high. It sends a LOW signal, if the difference is low. For a reference value
of 25db, the comparison of the DFT signals is shown in the figure 8.
Figure 7. Comparator plot
18. BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 15
CHAPTER 8
APPLICATION
1. SUPPORT PLUG-IN LINUX DEVICES: other development will include very small
but limited sensing device that interact with WINS NG node in heterogeneous network.
2. SMALL LIMITED SENAING DEVICE: interact with WINS NG node in
heterogeneous network
3. SCAVENGE ENERGY FROM THE ENVIORNMENT: small device might scavenge
there energy from the environment by means of photocells and piezoelectric materials,
capturing energy from vibration and achieving perpetual lifespan
19. BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 16
CHAPTER 9
PROS AND CONS
PROS:
1. It avoid hell lot of wiring
2. It can accommodate new devices at any time
3. Its flexible to go through physical partitions
4. It can be accessed through a centralized monitor
5. It is very cheaper, faster can be accessed in shorter distances having less amount of
delay, and also power consumption is in the order of microwatt.
CONS:
1. Its damn easy for hackers to hack it as we can’t control propagation of waves
2. Comparatively low speed of communication
3. Gets distracted by various elements like Blue-tooth
4. Still Costly at large.
20. BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 17
CHAPTER 10
CONCLUSION
A series of interface, signal processing, and communication systems have been
implemented in micropower CMOS circuits. A micropower spectrum analyzer has been
developed to enable low power operation of the entire WINS system. Thus WINS require
a Microwatt of power. But it is very cheaper when compared to other security systems
such as RADAR under use. It is even used for short distance communication less than 1
Km. It produces a less amount of delay. Hence it is reasonably faster. On a global scale,
WINS will permit monitoring of land, water, and air resources for environmental
monitoring. On a national scale, transportation systems, and borders will be monitored
for efficiency, safety and security.
21. BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 18
CHAPTER 11
REFERENCE
[1] M. J. Dong, G. Yung, and W. J. Kaiser, “Low Power Signal Processing Architectures
for Network Microsensors”, 1997 International Symposium on Low Power Electronics
and Design, Digest of Technical Papers (1997).
[2] A. A. Abidi, “Low-power radio-frequency ICs for portable communications”,
Proceedings of the IEEE, 83, (1995).
[3] Agre, J., Clare, L., Pottie, G., and Romanov, N. Development platform for self-
organizing wireless sensor networks. In Proceedings of Aerosense’99 (Orlando Fla., Apr.
Apr. 8–9). International Society of Optical Engineering, Bellingham, Wa., 1999, 257–
268.
[4] Asada, G., Dong, M., Lin, T., Newberg, F., Pottie, G., Marcy, H., and Kaiser, W.
Wireless integrated network sensors: Low-power systems on a chip. In Proceedings of
the 24th IEEE European Solid-State Circuits Conference (Den Hague, The Netherlands,
Sept. 21–25). Elsevier, 1998, 9–12.
[5] Bult, K., Burstein, A., Chang, D., Dong, M., Fielding, M., Kruglick, E., Ho, J., Lin,
F., Lin, T.-H., Kaiser, W., Marcy, H., Mukai, R., Nelson, P., Newberg, F., Pister, K.,
Pottie, G., Sanchez, H., Stafsudd, O., Tan, K., Ward, C., Xue, S., and Yao, J. Low-power
systems for wireless microsensors. In Proceedings of the International Symposium on
Low- Power Electronics and Design (Monterey, Calif., Aug. 12–14). IEEE, New York,
1996, 17–21.
[6] Dong, M., Yung, G., and Kaiser, W. Low-power signal processing architectures for
network microsensors. In Proceedings of the 1997 International Symposium on Low-
Power Electronics and Design (Monterey, Calif., Aug. 18–20). IEEE, New York, 1997,
173–177.
.