The document describes a proposed smartdust network system for tactical border surveillance using multiple sensor signatures. The system consists of two smartdust sensor motes equipped with seismic, magnetic, acoustic, and thermal sensors and a central monitoring mote. The smartdust motes are designed using an ARM microcontroller, IEEE 802.15.4 radio transceiver, and various MEMS sensors. They form an ad-hoc wireless network to detect intrusions based on sensor signatures and relay information to the central monitoring mote. The central mote also displays the intrusion tracking history. The system is intended to address limitations of existing border surveillance methods like aircraft, armed forces, and ground RADAR systems by providing a low-cost, low
Wireless Network For Strategic Boundary Supervision SystemjournalBEEI
The major trouble with national security is "Terrorism" happening in borders. In border areas, regular forces or even satellites cannot monitor accurately intruding. The wireless sensor network scheme gives a possible way to explain this issue. To outline a wireless remote system of estimated sensor motes that contains various installed sensors and a processor to detect and impart an adversary interruption crosswise over a border and war zones. The idea is to distribute many smartdust motes inside an enormous geological region. Every one of these motes shapes a remote system, and one of them will go about as the system organiser that can control the whole system and furthermore goes about as a passage to the outside world. The preferred standpoint with these little motes is that it can be conveyed in a couple of hours by a pair of men or even dropped from an airborne helicopter. Every mote comprises of an assortment of sensors to distinguish every single potential type of interruption.
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Editor IJMTER
In recent years, wsns detect to the fault sensor node based on round trip delay using path
in wireless sensor networks. Portable sensor node is low cost in Wsns . Measured in the round trip
delay time and number of sensor node. Existing method is used to large value of sensor node,
identification of sensor node time and distance . it is used to linear selection path, disadvantages are
data loss, more number of path, complexity. in this proposed method using distributed autonomous
sensor software implementation in NS2.it is detected fault sensor node and malfunction ,in this
analysis time and path using discrete Rtp. real time applicability in received signal strength ,separate
wavelength for end of the node avoid the data loss and complexity. Hardware implementation using
ZigBee and Microcontroller .Equal to the hardware and software implementation. It is overcomes to
the data loss. comparing the threshold and Rtd time. Finally, the algorithm is tested under different
number of faulty sensors in the same area. Our Simulation results demonstrate that the time
consumed to find out the faulty nodes in our proposed algorithm is relatively less with a large
number of faulty sensors existing in the network.
Wireless Sensor networks are dense networks, which consist of small low cost
sensors having severely constrained computational and energy resources, which operate in
an adhoc environment. Sensor network combines the aspects of distributed sensing,
computing and communication. Despite the numerous applications of sensor networks in
various fields there are various issues which need to be explored and resolved such as
resource constraints, routing, coverage, security, information collection and gathering etc.
In this paper we aim to provide the detailed overview of the wireless sensor technologies and
issues related to them, such as advancement of sensor technology, architecture, applications,
issues and the work done in the field of routing, coverage and security.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Wireless Network For Strategic Boundary Supervision SystemjournalBEEI
The major trouble with national security is "Terrorism" happening in borders. In border areas, regular forces or even satellites cannot monitor accurately intruding. The wireless sensor network scheme gives a possible way to explain this issue. To outline a wireless remote system of estimated sensor motes that contains various installed sensors and a processor to detect and impart an adversary interruption crosswise over a border and war zones. The idea is to distribute many smartdust motes inside an enormous geological region. Every one of these motes shapes a remote system, and one of them will go about as the system organiser that can control the whole system and furthermore goes about as a passage to the outside world. The preferred standpoint with these little motes is that it can be conveyed in a couple of hours by a pair of men or even dropped from an airborne helicopter. Every mote comprises of an assortment of sensors to distinguish every single potential type of interruption.
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Editor IJMTER
In recent years, wsns detect to the fault sensor node based on round trip delay using path
in wireless sensor networks. Portable sensor node is low cost in Wsns . Measured in the round trip
delay time and number of sensor node. Existing method is used to large value of sensor node,
identification of sensor node time and distance . it is used to linear selection path, disadvantages are
data loss, more number of path, complexity. in this proposed method using distributed autonomous
sensor software implementation in NS2.it is detected fault sensor node and malfunction ,in this
analysis time and path using discrete Rtp. real time applicability in received signal strength ,separate
wavelength for end of the node avoid the data loss and complexity. Hardware implementation using
ZigBee and Microcontroller .Equal to the hardware and software implementation. It is overcomes to
the data loss. comparing the threshold and Rtd time. Finally, the algorithm is tested under different
number of faulty sensors in the same area. Our Simulation results demonstrate that the time
consumed to find out the faulty nodes in our proposed algorithm is relatively less with a large
number of faulty sensors existing in the network.
Wireless Sensor networks are dense networks, which consist of small low cost
sensors having severely constrained computational and energy resources, which operate in
an adhoc environment. Sensor network combines the aspects of distributed sensing,
computing and communication. Despite the numerous applications of sensor networks in
various fields there are various issues which need to be explored and resolved such as
resource constraints, routing, coverage, security, information collection and gathering etc.
In this paper we aim to provide the detailed overview of the wireless sensor technologies and
issues related to them, such as advancement of sensor technology, architecture, applications,
issues and the work done in the field of routing, coverage and security.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A WSN primary outline issue for a sensor system is protection of the vitality accessible at every sensor node. We propose to convey different, versatile base stations to delay the lifetime of the sensor system. We split the lifetime of the sensor system into equivalent stretches of time known as rounds. Base stations are migrated toward the begin of a round. Our strategy utilizes a whole number straight program to focus new areas for the base stations and in view of steering convention to guarantee vitality proficient directing amid every round. We propose four assessment measurements and look at our answer utilizing these measurements. Taking into account the reproduction results we demonstrate that utilizing various, versatile base stations as per the arrangement given by our plans would altogether expand the lifetime of the sensor system.
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONSijasuc
Divergent modulation schemes have been proposed for the Internet of Things (IoT). Low Power Wide Area
Networks (LPWAN) technologies are gaining unprecedented acceptance in IoT application of sensor
networks. Chirp Spread Spectrum (CSS) is a prominent modulation technique proposed for LPWAN. Chirps
can traverse long distance and are resilient to noise and Doppler effects. Noise resilience along with
transmission range and low power requirement makes CSS a preferred modulation scheme for sensor
networks. LoRaWANTM, with its physical (PHY) layer using CSS, has emerged as the widely accepted
LPWAN solution. By using CSS modulation with orthogonal spreading factors (SF), LoRa offers wide
coverage to LPWAN applications while supporting a high volume of devices. However, scalability
performance of CSS has not been inadequately modeled. As with the suitability of the modulation scheme,
there are concerns on how chirps interact with the surrounding as the number of deployments bursts out
into higher volumes. We evaluate CSS at ISM band 868 MHz for spreading factor 7 to 12 at bandwidth 125
kHz for performance and scalability. Simultaneous transmissions were simulated with repeated iterations
and conclusions are arrived on collisions rate, packet error rate, and bit error. Suitability of using CSS for
sensor networks for future deployments is commended.
On Fuzzy - Semi Open Sets and Fuzzy - Semi Closed Sets in Fuzzy Topologic...IOSR Journals
Abstract: The aim of this paper is to introduce the concept of fuzzy - semi open and fuzzy - semi closed sets of a fuzzy topological space. Some characterizations are discussed, examples are given and properties are established. Also, we define fuzzy - semi interior and fuzzy - semi closure operators. And we introduce fuzzy
- t-set, -SO extremely disconnected space analyse the relations between them.
MSC 2010: 54A40, 03E72.
Revealing the Agency Cost, Management Behavior in the Practice of Tri Hita Ka...IOSR Journals
The research aims to dig and explain the practice of Tri Hita Karana (THK) cultural values implemented at LPD in relation to the agency costs. Ethnomethodology method is used in the research to understand principle’s and agent’s behavior with respect to THK cultural values. Research result shows that indexicality of THK cultural values such as parahyangan, pawongan and palemahan form reflexivity of agency cost items. The reflexivity of agency cost of parahyangan raises cost of pura development, ceremonial and donation for ceremonies. The reflexivity of agency cost of pawongan raises cost of education, health, ngaben-nyekah and funeral charity. The reflexivity of agency cost of palemahan raises cost of market, village hall, and sport facilities development, and beach arrangement. THK values and agency cost are important aspects to be considered in company management in order to maintain a balance relationship between God, Human and Environment to create harmonization in an organization.
Performance Analysis of Rake Receivers in IR–UWB SystemIOSR Journals
ABSTRACT : Suppression of interference in time domain equalizers is attempted for high data rate impulse radio (IR) ultra wideband communication system. The narrow band systems may cause interference with UWB devices as it is having very low transmission power and the large bandwidth. SRAKE receiver improves system performance by equalizing signals from different paths. This enables the use of SRAKE receiver techniques in IR UWB systems A semi analytical approach is used to investigate the BER performance of SRAKE receiver on IEEE 802.15.3a UWB channel models. Study on non-line of sight indoor channel models (both CM3 and CM4) illustrates that bit error rate performance of SRake receiver with NBI performs better than that of Rake receiver without NBI Keywords – Bit error rate, Impulse radio, Non-line of sight, SRAKE receiver, Ultra wideband (UWB)
Modification of Disc Brakes Using Rotating Brake PadsIOSR Journals
Under the topic ‘Modification of Disc Brakes using Rotating Friction Pads’, I have studied different
components of disc brake which includes rotor, calipers, and fixed friction pads.My main aim is to increase the
braking effect by modifying the existing design by using rotating friction pad. This friction pad is made to rotate
in opposite direction as that of rotor, this is done by using a separate assembly of compound gear train. In this
assembly 2 shafts are used, one shaft is connected between tire and gear and second shaft connects gear and
rotating friction pad. Both the gears are meshed with each other. As the wheel rotates in clockwise direction,
the gear attached to it will also rotate. Other gear which is in meshed position with first gear will rotate in anticlockwise
direction. This will help to move friction pad in anti-clockwise direction as that of wheel’s clockwise
motion. Aim for using rotating friction pad is to provide maximum possible friction which results in retardation
of motion, rotating friction pad not only will provide the friction due to contact but will also provide the friction
due to rotation. Calculations regarding speed of gears, and motion of wheel will clearly elaborate the idea, this
slight modification helps in reducing braking time. Important thing in this innovation is that the energy required
to stop the wheel or disc of brakes is transmitted from wheel only
On Spaces of Entire Functions Having Slow Growth Represented By Dirichlet SeriesIOSR Journals
In this paper spaces of entire function represented by Dirichlet Series have been considered. A
norm has been introduced and a metric has been defined. Properties of this space and a characterization of
continuous linear functionals have been established.
Feature Extraction of an Image by Using Adaptive Filtering and Morpological S...IOSR Journals
Abstract: For enhancing an image various enhancement schemes are used which includes gray scale manipulation, filtering and Histogram Equalization, Where Histogram equalization is one of the well known image enhancement technique. It became a popular technique for contrast enhancement because it is simple and effective. The basic idea of Histogram Equalization method is to remap the gray levels of an image. Here using morphological segmentation we can get the segmented image. Morphological reconstruction is used to segment the image. Comparative analysis of different enhancement and segmentation will be carried out. This comparison will be done on the basis of subjective and objective parameters. Subjective parameter is visual quality and objective parameters are Area, Perimeter, Min and Max intensity, Avg Voxel Intensity, Std Dev of Intensity, Eccentricity, Coefficient of skewness, Coefficient of Kurtosis, Median intensity, Mode intensity. Keywords: Histogram Equalization, Segmentation, Morphological Reconstruction .
Analysis of the Demand for Eggs in City Of MalangIOSR Journals
This research was aimed at determining the factors that influence the demand for eggs in the City of Malang and knowing the elasticity of demand in relation to the changes in price of the eggs in the City of Malang. Data collection was conducted from November 2012 to December 2012 from the consumers who purchase eggs at the traditional markets in the City of Malang (Dinoyo market and Pasar Besar market). The research method being employed in this study was a survey method. Sampling was conducted through purposive sampling method. The data collected included the primary data from 200 respondents through direct observations and interviews and the secondary data that were obtained from certain relevant agencies. Data were then analyzed by using multiple linear regressions in logarithms. Regression analysis result showed that the independent variables together significantly affected (P < 0.01) the dependent variable with a value of R ² was 0.731. Partially that each of the prices of the eggs, household income, the family members, and education, affected the demand for eggs in the City of Malang. The price elasticity of demand for eggs is elastic with a value of -2.824. The value of the income elasticity of demand for eggs was 0.022 which was inelastic, which means that eggs are normal goods or commodity. The value of cross-price elasticity of demand for eggs to broiler meat was -4.451, which means that the broiler meat are not as substitutes (commodity) for eggs of egg-laying chickens.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A WSN primary outline issue for a sensor system is protection of the vitality accessible at every sensor node. We propose to convey different, versatile base stations to delay the lifetime of the sensor system. We split the lifetime of the sensor system into equivalent stretches of time known as rounds. Base stations are migrated toward the begin of a round. Our strategy utilizes a whole number straight program to focus new areas for the base stations and in view of steering convention to guarantee vitality proficient directing amid every round. We propose four assessment measurements and look at our answer utilizing these measurements. Taking into account the reproduction results we demonstrate that utilizing various, versatile base stations as per the arrangement given by our plans would altogether expand the lifetime of the sensor system.
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONSijasuc
Divergent modulation schemes have been proposed for the Internet of Things (IoT). Low Power Wide Area
Networks (LPWAN) technologies are gaining unprecedented acceptance in IoT application of sensor
networks. Chirp Spread Spectrum (CSS) is a prominent modulation technique proposed for LPWAN. Chirps
can traverse long distance and are resilient to noise and Doppler effects. Noise resilience along with
transmission range and low power requirement makes CSS a preferred modulation scheme for sensor
networks. LoRaWANTM, with its physical (PHY) layer using CSS, has emerged as the widely accepted
LPWAN solution. By using CSS modulation with orthogonal spreading factors (SF), LoRa offers wide
coverage to LPWAN applications while supporting a high volume of devices. However, scalability
performance of CSS has not been inadequately modeled. As with the suitability of the modulation scheme,
there are concerns on how chirps interact with the surrounding as the number of deployments bursts out
into higher volumes. We evaluate CSS at ISM band 868 MHz for spreading factor 7 to 12 at bandwidth 125
kHz for performance and scalability. Simultaneous transmissions were simulated with repeated iterations
and conclusions are arrived on collisions rate, packet error rate, and bit error. Suitability of using CSS for
sensor networks for future deployments is commended.
On Fuzzy - Semi Open Sets and Fuzzy - Semi Closed Sets in Fuzzy Topologic...IOSR Journals
Abstract: The aim of this paper is to introduce the concept of fuzzy - semi open and fuzzy - semi closed sets of a fuzzy topological space. Some characterizations are discussed, examples are given and properties are established. Also, we define fuzzy - semi interior and fuzzy - semi closure operators. And we introduce fuzzy
- t-set, -SO extremely disconnected space analyse the relations between them.
MSC 2010: 54A40, 03E72.
Revealing the Agency Cost, Management Behavior in the Practice of Tri Hita Ka...IOSR Journals
The research aims to dig and explain the practice of Tri Hita Karana (THK) cultural values implemented at LPD in relation to the agency costs. Ethnomethodology method is used in the research to understand principle’s and agent’s behavior with respect to THK cultural values. Research result shows that indexicality of THK cultural values such as parahyangan, pawongan and palemahan form reflexivity of agency cost items. The reflexivity of agency cost of parahyangan raises cost of pura development, ceremonial and donation for ceremonies. The reflexivity of agency cost of pawongan raises cost of education, health, ngaben-nyekah and funeral charity. The reflexivity of agency cost of palemahan raises cost of market, village hall, and sport facilities development, and beach arrangement. THK values and agency cost are important aspects to be considered in company management in order to maintain a balance relationship between God, Human and Environment to create harmonization in an organization.
Performance Analysis of Rake Receivers in IR–UWB SystemIOSR Journals
ABSTRACT : Suppression of interference in time domain equalizers is attempted for high data rate impulse radio (IR) ultra wideband communication system. The narrow band systems may cause interference with UWB devices as it is having very low transmission power and the large bandwidth. SRAKE receiver improves system performance by equalizing signals from different paths. This enables the use of SRAKE receiver techniques in IR UWB systems A semi analytical approach is used to investigate the BER performance of SRAKE receiver on IEEE 802.15.3a UWB channel models. Study on non-line of sight indoor channel models (both CM3 and CM4) illustrates that bit error rate performance of SRake receiver with NBI performs better than that of Rake receiver without NBI Keywords – Bit error rate, Impulse radio, Non-line of sight, SRAKE receiver, Ultra wideband (UWB)
Modification of Disc Brakes Using Rotating Brake PadsIOSR Journals
Under the topic ‘Modification of Disc Brakes using Rotating Friction Pads’, I have studied different
components of disc brake which includes rotor, calipers, and fixed friction pads.My main aim is to increase the
braking effect by modifying the existing design by using rotating friction pad. This friction pad is made to rotate
in opposite direction as that of rotor, this is done by using a separate assembly of compound gear train. In this
assembly 2 shafts are used, one shaft is connected between tire and gear and second shaft connects gear and
rotating friction pad. Both the gears are meshed with each other. As the wheel rotates in clockwise direction,
the gear attached to it will also rotate. Other gear which is in meshed position with first gear will rotate in anticlockwise
direction. This will help to move friction pad in anti-clockwise direction as that of wheel’s clockwise
motion. Aim for using rotating friction pad is to provide maximum possible friction which results in retardation
of motion, rotating friction pad not only will provide the friction due to contact but will also provide the friction
due to rotation. Calculations regarding speed of gears, and motion of wheel will clearly elaborate the idea, this
slight modification helps in reducing braking time. Important thing in this innovation is that the energy required
to stop the wheel or disc of brakes is transmitted from wheel only
On Spaces of Entire Functions Having Slow Growth Represented By Dirichlet SeriesIOSR Journals
In this paper spaces of entire function represented by Dirichlet Series have been considered. A
norm has been introduced and a metric has been defined. Properties of this space and a characterization of
continuous linear functionals have been established.
Feature Extraction of an Image by Using Adaptive Filtering and Morpological S...IOSR Journals
Abstract: For enhancing an image various enhancement schemes are used which includes gray scale manipulation, filtering and Histogram Equalization, Where Histogram equalization is one of the well known image enhancement technique. It became a popular technique for contrast enhancement because it is simple and effective. The basic idea of Histogram Equalization method is to remap the gray levels of an image. Here using morphological segmentation we can get the segmented image. Morphological reconstruction is used to segment the image. Comparative analysis of different enhancement and segmentation will be carried out. This comparison will be done on the basis of subjective and objective parameters. Subjective parameter is visual quality and objective parameters are Area, Perimeter, Min and Max intensity, Avg Voxel Intensity, Std Dev of Intensity, Eccentricity, Coefficient of skewness, Coefficient of Kurtosis, Median intensity, Mode intensity. Keywords: Histogram Equalization, Segmentation, Morphological Reconstruction .
Analysis of the Demand for Eggs in City Of MalangIOSR Journals
This research was aimed at determining the factors that influence the demand for eggs in the City of Malang and knowing the elasticity of demand in relation to the changes in price of the eggs in the City of Malang. Data collection was conducted from November 2012 to December 2012 from the consumers who purchase eggs at the traditional markets in the City of Malang (Dinoyo market and Pasar Besar market). The research method being employed in this study was a survey method. Sampling was conducted through purposive sampling method. The data collected included the primary data from 200 respondents through direct observations and interviews and the secondary data that were obtained from certain relevant agencies. Data were then analyzed by using multiple linear regressions in logarithms. Regression analysis result showed that the independent variables together significantly affected (P < 0.01) the dependent variable with a value of R ² was 0.731. Partially that each of the prices of the eggs, household income, the family members, and education, affected the demand for eggs in the City of Malang. The price elasticity of demand for eggs is elastic with a value of -2.824. The value of the income elasticity of demand for eggs was 0.022 which was inelastic, which means that eggs are normal goods or commodity. The value of cross-price elasticity of demand for eggs to broiler meat was -4.451, which means that the broiler meat are not as substitutes (commodity) for eggs of egg-laying chickens.
The abrasive particulates on the cutting wheel influence the quality of cut. The surface finish, and the temperature raise during the cutting processes is governed by various parameters such as size of the particulates, its shape, roundness of edges at the particulates and strength of the bond between particulates and resins. The composite parting-off wheel is superior to that of commercial counterparts. A composite parting-off wheel was fabricated using powder metallurgy technique. The composite powders were prepared using an ingeniously designed and developed horizontal axis ball mill. The parting-wheel was able to cut metals bars such as aluminium, copper and mild steel with relative ease. It was found out that the mechanical properties such as compressive strength, hardness and tensile strength was better than conventional abrasive wheels. The cutting ratio was superior to the abrasive wheels and CZT was lower in comparison
Organizational citizenship Behavior as Attitude Integrity in Measurement of I...IOSR Journals
Quality of Human Resource represent one of the factor which to increase performance productivity an institution or organization. Therefore, needed Human Resource having high interest because interest or membership will be able to support the make-up of employees performance achievement. During the time at generally in governance institution not yet had officer with adequate interest, proved with still lower officer productivity and is difficult measure officer performance [in] governance institution scope. Performance Management System in a modern concept of human resource management is an objective and transparent performance measurement model of Organizational Citizenship Behavior in giving reward to individual’s sacrifice for organization. Three main elements of individual’s sacrifice performed in Organizational Citizenship Behavior (OCB) are compliance, loyality, and participation.The organization shoud appreciate these attitudes by giving clear job description and brief rewardsystemcriteriato encourage the individual’s job motivation. Combined with theindividual assessment of job description, job grading is used to compile a correct Key Performance Indexand a precise salary component. The aim of this action research is to give a comprehensive solution for Hospital X, in order to determine a Key Performance Indexsmodel, in response to some problems such as jobmotivation, work stress and performance. An interviews with hospital’s director and Human Resources section was conducted to compile the KPI. The results of this research can be recommended to the hospital to make a comprehensive performance assessment consist of the review of employee's job descriptions, Key Performance Indicator (KPI), job grading, specifying fundamental salary based on work,Bonus Scame and score summary
“Rover - Remote Operated Vehicle for Extraction and Reconnaissance”IOSR Journals
Inspired from differential drive mechanism of army tank and chain drive of tank for movement of rover. Try to deploy the concept of crane working in rover for extraction purpose. Use the camera for the security purpose and surveillance in rover for the reconnaissance purpose.
Use “pro-engineering software” for designing purpose of rover. It is prototype to explain the concept of differential drive mechanism and its use in robotics.
An Empirical Study on Patient Delight and the Impact of Human and Non-Human F...IOSR Journals
Health, one of the Fundamental Human Rights has been accepted in the Indian Constitution. Today the healthcare industry has emerged as one of the most challenging sectors as well as one of the largest service sector industries in India. Patient perceived service quality become the prominent aspect to choose between hospitals. The purpose of this paper is to evaluate patient perceived service quality in Indian hospitals. Further the impact of the dimensions on patient satisfaction and patient delight is examined. A questionnaire was administered to the in-patients and multiple regression analysis has been used to examine the impact of the dimensions on patient satisfaction and patient delight. Findings emphasize eight distinct dimensions of patient perceived service quality and the impact on patient satisfaction and patient delight. A positive and significant relationship with patient satisfaction and patient delight has been found, except two dimensions. The results of this study are limited, as they are based on Indian hospitals. The contribution of this research paper, incorporate patient delight in health care sector. In addition, this paper highlights the importance of emotional attachment for patient satisfaction and patient delight in health care.
Parametric Variation Based Analysis AND Effective Design of Rectangular Patch...IOSR Journals
Abstract : This paperdevelops an understanding of creating and improving the design of microstripantenna by the performance analysis of resultsfromitsvarious configurationsrelating to rectangular patch microstripantenna. Furthermore, itaccommodates a simulated patch antennawith effective results for bluetooth applicationsatafrequency of 2.4GHz. The proposed antenna is not only designed on the formulated calculations but also analyzed on different sizes, positions and orientations of substrate, feeding point and slots respectively. Propagation parameters are greatly improved by amendments suggested by the analysis of the variation based studies provided by this paper. The initial resultsobtained using formulae based designs are compared with the ameliorated results to illustrate the effects of such variations on antenna parameters. The final antenna show significantly improved return losses of -46.7dB, VSWR of 1.0093, Bandwidth of 180MHz and a far field radiation pattern with a gain of 2.2782dB. The Antenna designed is optimized and interpreted with Ansoft HFSS 13.0 simulator. Keywords: Bluetooth, rectangular patch antenna, feedpoint, trial and error method, slot orientation, wide bandwidth
A Comprehensive lossless modified compression in medical application on DICOM...IOSR Journals
ABSTRACT : In current days, Digital Imaging and Communication in Medicine (DICOM) is widely used for
viewing medical images from different modalities, distribution and storage. Image processing can be processed
by photographic, optical and electronic means, because digital methods are precise, fast and flexible, image
processing using digital computers are the most common method. Image Processing can extract information,
modify pictures to improves and change their structure (image editing, composition and image compression
etc.). Image compression is the major entities of storage system and communication which is capable of
crippling disadvantages of data transmission and image storage and also capable of reducing the data
redundancy. Medical images are require to stored for future reference of the patients and their hospital findings
hence, the medical image need to undergo the process of compression before storing it. Medical images are
much important in the field of medicine, all these Medical image compression is necessary for huge database
storage in Medical Centre and medical data transfer for the purpose of diagnosis. Presently Discrete cosine
transforms (DCT), Run Length Encoding Lossless compression technique, Wavelet transforms (DWT), are the
most usefully and wider accepted approach for the purpose of compression. On basis of based on discrete
wavelet transform we present a new DICOM based lossless image compression method. In the proposed
method, each DICOM image stored in the data set is compressed on the basis of vertically, horizontally and
diagonally compression. We analyze the results from our study of all the DICOM images in the data set using
two quality measures namely PSNR and RMSE. The performance and comparison was made over each images
stored in the set of data set of DICOM images. This work is presenting the performance comparison between
input images (without compression) and after compression results for each images in the data set using DWT
method. Further the performance of DWT method with HAAR process is compared with 2D-DWT method using
the quality metrics of PSNR & RMSE. The performance of these methods for image compression has been
simulated using MATLAB.
Keywords: JPEG, DCT, DWT, SPIHT, DICOM, VQ, Lossless Compression, Wavelet Transform, image
Compression, PSNR, RMSE
Six Sigma Implementation to reduce rejection rate of Pump Casings at local Ma...IOSR Journals
Six Sigma is being Implemented all over the World as a successful Quality Improvement
Methodology. This article provides a description of Six Sigma Project implemented at Local manufacturing
Company. The Company Manufactures Pump Casings where it was receiving high nonconformance rate that
resulted in to Rejection of Product. This study deals with Six Sigma DMAIC methodology implementation and
gives a frame work of how the non-conformance rate was first monitored and then brought in to acceptance
limits. A complete Coverage of the statistical analysis performed during the study is given and results are
shown to describe that how Six Sigma helped the Project members to Improve Quality of Pump casings at
manufacturing facility.
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...IOSR Journals
Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding information
in other information. There are many application of Steganography with different carrier file format. Here we
perform Steganography Technique with sending OTP on receiver mobile, which is one of the best secured
technique in current scenario. This technique is hiding file information into image with OTP password that is
only known by receiver. And can decrypt using that OTP only this is pure Steganography. Pure Steganography
means that there is none prior information shared by two communication parties. We are not sharing OTP
information by two communication parties. So this is more secure than other technique.
Key Words : Steganography, OTP, ICT, Password, IP, UDP, SIHS, LSB.
Idiosyncratic Effect of Corporate Solvency Management Strategies on Corporate...IOSR Journals
The study identifies and evaluates the association among corporate solvency management strategies and the corporate performance valuation in Chemical industry of Pakistan. The study uses purposive sampling or judgmental sampling for selecting 30 sample companies from the sector; covering 10 years financial statements data ranging from year 2002 to 2011. Balanced panel data is taken for the purpose of study. Levin, Lin & Chu test is used to check the stationarity of data whereas White Test is used to check the heteroskedasticity of data. Panel Least square technique with fixed effects is used to generalize the relationship between studied variables. The study observed that the performance of the chemical sector in terms of market to book value is affected by internal firm and industry specific factors related to solvency management strategic decisions. Findings of the study provide with the overview of historic performance and the potential performance of the selected sector to help policy makers including finance, economics and industry experts for creating value through the idiosyncratic resources.
A Learning and Improvement Model in Entrepreneurial LeadershipIOSR Journals
Currently entrepreneurial leadership has expended and increased momentum as developingmodel of both in research and practice. Though, there is not sufficient knowledgeon the theoretical and intangible basis of this emerging area of analysisandlot of questions are raised up on how to grow entrepreneur leadershipabilities, capabilitiesprecisely in university students. The basicmotive of thistheoretical paper is to slight the gap through offering the theoretical andconceptual basics of entrepreneur leadership. This paper has also examinedvariousfeatures of entrepreneurial education in the perspective of universitygiven entrepreneur-ship programs and then projected a model for entrepreneurial-leadership enlargement. The projected model describes entrepreneurial leadershipenlargementbase on a dynamic progression of “experimental, social interactive,observational and reflective learning” which make available a base for entrepreneur leadership exercise, enlightenment and research.
Study of Mitotic Index and DNA profile when exposure to He-Ne laser and UVC r...IOSR Journals
In vitro, He-Ne laser show a modifying response of cells to ionizing radiations. So there is a need to show the effect of He-Ne laser (632.8nm), Ultraviolet radiation UVC (250nm) and He-Ne laser pre and post irradiation against the UVC radiation of Mitotic index of femur and in vivo to DNA of testis in Mice. In this study 100 albino male mice were divided into five groups, the first group Control which have (10) number of mice, the second group Laser which have (27) number of mice were divided into three groups different time periods (5, 10, 15 min), the third group Ultraviolet radiation (UVC) which have (9) number of mice and duration of exposure one hour, the fourth group laser (5, 10 and 15 min) + UVC (1h) which have (27) number of mice, with ½ hour time interval between the two irradiations and the finally group UVC (1h) + laser (5, 10, 15 min) which have (27) number of mice, with ½ hour time interval between the two irradiations was monitor the effect of radiation on mice according to the classification totals above after various time periods (7, 14, 21 days). Mitotic index as shown increase the percentage of Mononucleus and less increase of Dinucleus after exposure of the radiation according to the classification totals above. The He-Ne laser per-irradiation show a protection properties, which appeared the DNA damage against UVC light irradiation. But the He-Ne laser pre-irradiation against UVC irradiation farther more reduce the DNA testis damaging. UVC shows a damaging effect on the DNA. This damage was reduced by the He-Ne laser pre- irradiation. Thus Laser pre-irradiation may be attributed to the induction of endogenous of radio protectors or which may be involved in DNA damage repair.
Wireless Sensor Network (WSN) is a promising field for research. As the use of this field increases, it is
required to give proper security to this field. So to ensure the security of communication of data or messages and to
control the use of data in WSN is of great importance. As sensor networks interact with responsive data and operate
in unfriendly unattended area, from the time of system design these security concerns should be addressed. The paper,
presents a modified Motesec security protocol which is a security mechanism for Wireless sensor network. In this
protocol a hash function based approach is used to detect replay attacks. For data access control key lock matching
method i.e. memory data access control policy is used to prevent unauthorized data access. Encoding and
reconstruction scheme is used to find out attacker. Flooding attack detection by comparing data rate. There is currently
massive research is present in the area of wireless sensor network security..Keywords: GPS,GCM,LBS Android.
Keywords: secure communication architecture, wireless Sensor network security.
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
A data dissemination protocol for wireless sensor networks has been engaged for modifying configuration fields and circulating management controls to the mote. Earlier, a data dissemination protocol faces the henceforth two consequences. First, they are works on sink based model; only the sink can circulate data item to other motes. Such model is not suitable for large user wireless sensor networks. Second, those protocols are not provide with any security and hence intruders will make problems to misuse the network. We provided the seDrip protocol. It allows the network mentors to authorize multiple network uses with various permissions to simultaneously and directly distributed data items to the mote. seDrip is implemented in an laboratory of network restricted resources mote to depict its large capability in practice.
This article presents a study of the state of the art of sensor networks wireless systems, which continue to develop and present a wide variety of Applications. These networks constitute a current and emerging field of study where combines the development of computers, wireless communications and devices mobile phones and integration with other disciplines such as agriculture, biology, medicine, etc. I know presents the main concept, components, topologies, standards, applications, problems and challenges, then delves into security solutions and concludes with basic simulation tools.
The development of wireless technology currently allows extending the notion of mobility for access to
information and communication anywhere and anytime. With the emergence of sensor networks
(Traditional (WSN) and vehicular (VSN)), new themes have been opened and new challenges have emerged
to meet the needs of individuals and the requirements of several application areas. Research today is much
focused on vehicular sensor networks (VSN), considerable efforts have emerged to introduce intelligence
into transport systems whose aim is to improve safety, efficiency and usability in road transport. These
networks will play an important role in building the Future Internet, where they will serve as a support for
various communication applications and integrated into our daily lives. In this paper, we surveyed the main
characteristic and applications of two type of Ad hoc networks WSN and VSN.
Wireless Sensor Network – Theoretical Findings and ApplicationsAshishDPatel1
Wireless sensor networks (WSN) consist of tiny sensor nodes scattered on a relatively large geographical area. The nodes are cooperative in nature, that is, they can communication with one another or to a central control unit. The work of each such node is to collect the information from surrounding like pressure, temperature, humidity, magnetic fields, optical fields etc [2]. Actually they are ad hoc network with some additional constraints. The node should be capable enough for power consumption, collection of data, self healing, mobility, self configuration to name a few. These features of WSN node differentiate it from conventional ad hoc networks [14]. This survey paper aims at reporting wireless sensor network, its design, networking of nodes, and security in system. In this paper, fundamentals of wireless sensor network are discussed. Different component like sensor, microcontroller, battery require for sensor networks are explained in detail. We have tried to include all the aspects of WSN. The Protocols, Operating Systems, tools require for WSN node programming and some security issues are also discussed.
A Review on Wireless Sensor Network Securityijtsrd
Wireless sensor networks are attracting more and more coverage. A number of surveillance, regulation, and tracking systems have been developed for different scenarios in recent years. Wireless Sensor Network WSN is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks. Vijay Kumar Kalakar | Hirdesh Chack | Syed Tariq Ali "A Review on Wireless Sensor Network Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31815.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/31815/a-review-on-wireless-sensor-network-security/vijay-kumar-kalakar
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical layer. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data between these protocol layers. For simulation purpose we are using Qualnet 5.0.2 simulator tool.
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNIAEME Publication
Wireless sensor networks are harshly restricted by storage capacity, energy and computing power. Wireless Sensor Networks have acquired a lot of attention by research community, manufacturer as well as actual users for monitoring remote trades and how to gather data in different environment. The wireless sensor nodes are especially battery powered devices having life can be extended for some times while long lasting and reliable for maintaining consumption of energy and network lifetime while designs applications and protocols. So it is essential to design effective and energy efficient protocol in order to enhance the network lifetime. In this paper we present the study of different energy efficient communication protocols of Wireless Sensor Networks (WSNs).Then some of the communication protocols which are widely used in WSNs to improve network performance are also discussed advantages and disadvantages of each protocols.
Air Programming on Sunspot with use of Wireless Networksijsrd.com
Wireless Sensor Networks (WSN) provides us an effective means to monitor physical environments. The computing nodes in a WSN are resource constrained devices whose resources need to be used sparingly. The main requirement of a WSN is to operate unattended in remote locations for extended periods of time. Physical conditions, environmental conditions, upgrades, user preferences, and errors within the code can all contribute to the need to modify currently running applications. Therefore, reprogramming of sensor nodes is required. One of the important terminologies that are associated with WSN network is that of OVER THE AIR PROGRAMMING. This concept has been utilized so far as for Imote2 sensors that has been relatively utilized for the processing of the Deluge port (DP). They have so far been able to successfully reboot each application. But this rebooting is still not reliable and secure as there are certain security features that are affected in the processing. I will provide a more reliable, robust and secure system that would have enriched functionalities of that of OTA programming on SUNSPOT. Some important features of the SUN SPOT that I will be utilizing in this practical approach is that it supports isolated application models such as sensor networks, it allows running multiple applications in one. It does not create overhead on the entire system node as it provides lower level asynchronous for proper message delivery. It also supports migration from one device to another. This paper focuses on developing a multi-hop routing protocol for communication among Sun SPOT sensor nodes and a user front-end (i.e. visualizer) to visualise the collected values from all the nodes. To test the routing protocol before deploying it to sensor nodes, a simulation using J-Sim is created.
1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 5, Issue 5 (Mar. - Apr. 2013), PP 01-10
www.iosrjournals.org
www.iosrjournals.org 1 | Page
Smartdust Network for Tactical Border Surveillance Using
Multiple Signatures
Seema.C.Mohan1
, S.Arulselvi2
(Department of Electronics and Communication Engineering, Bharath University, Tamil Nadu, India).
Abstract: The paper aims at designing a system for border surveillance using the concept of smartdust
technology. Smartdusts are small dust like wireless sensor motes with multiple on-board sensors and
microcontroller. In real time, thousands of such smartdust motes must be deployed in a large area. The motes
can form a network among them and has wireless connection to outside world. Onboard hardware include a
variety of sensors for vibration/seismic, magnetic, acoustic and thermal signature recognition, a
microcontroller for processing these sensor values and a radio transceiver for communication over a wireless
network. In this experimental project, we have designed one central monitoring mote and two smartdust motes
using ARM controller, IEEE radio transceiver and sensors.The central monitoring mote also displays the
tracking history of intrusion on enabling a switch.
Keywords:Advanced RISC Machine (ARM), Cortex microcontroller software interface standard (CMSIS), Inter
Integrated Circuit (I2
C), MEMS accelerometer, Serial Peripheral Interface (SPI),Smartdust mote.
I. Introduction
The greatest threat to national security is “Terrorism”, infiltrating through borders. In critical border
areas, regular forces or even satellites cannot monitor the intruding terrorists, as the area monitored is quite large
and complex. This paper proposes an innovative and effective solution to this problem by designing a next
generation, intelligent, ultra-small, dust like, wireless sensor motes with multiple onboard sensors and a
processor for detecting enemy intrusion across borders and battlefields. As the project is conceptualized on
„smartdust technology‟, a brief elucidation of smartdust definition is provided.
Smartdusts are dust size devices which are light in weight [1]. Each smartdust mote can be considered
as a tiny computer with one or more sensors, on-board power supply, a communication system and a controller.
It can communicate with other smartdust devices using the wireless radio network. The battery life of a
smartdust mote can vary from a few hours to ten years depending on the size and capability of the device. A
common mote communication scheme uses radio frequency signals to communicate over relatively short
distances. This allows designers to minimize mote size and reduce power consumption. When communicating ,
the devices pass each message to a neighbouring mote, which, in turn, passes the message onto a neighbouring
mote, and so on, until the message reaches the destination ie the central monitoring mote.The network of motes
continue to perform even if some of its communicaiton paths fail to operate. And once a mote is placed in an
existing network, it adapts to blend in with the other nodes to form a larger network; and when a mote fails, the
other devices in the network take over its load.Fig. 1 shows smartdusts deployed in a forest.
Figure 1: Smartdust deployed in a forest
2. Smartdust Network For Tactical Border Surveillance Using Multiple Signatures
www.iosrjournals.org 2 | Page
In real time, thousands of such motes are deployed in the field for detecting intrusion but in the project we are
employing only two smartdust sensor motes and a single monitoring mote on an experimental basis.
There are several existing border surveillance systems or methods in use today [2]. The most popular
methods are flying aircraft, deploying armed forces and ground surveillance using RADARS. The drawbacks of
these systems are discussed here;(a)Flying aircraft: the aircraft is usually run only for limited hours or for one
or two days. (b) Deploying armed forces: it is very difficult for the armed forces to monitor a large area with
great precision. Also, it is very unsafe and risky for the forces to remain at difficult terrains such as dense
forests, snow covered or mountain areas for days where bad weather conditions prevail. (c) Ground surveillance
using RADAR:No single RADAR can fulfill all border surveillance requirements with single RADAR
equipment. There is search RADAR that does the search function and once the search is done we would need
the track RADAR for the tracking. There is also complex RADAR equipment that could integrate two or more
RADAR functions in one RADAR instrument.RADAR as a whole is very huge and bulky. RADAR‟s are very
much visible owing to its big size and hence, it is subject to enemy detection.Due to the RADAR‟s bulkiness we
would require one or two men to carry it to the place of deployment or it is mounted on an armed vehicle.The
smartdust concept may be implemented in border surveillance applications in an effective and efficient way to
solve many of these problems as we shall see in the coming sections.
1.1 Related Work on border surveillance
There are several works carried out in the area of border surveillance. As an example, the study
conducted by T.J.Nohara explains the use of commercial approach to the deployment of radar surveillance[3].
The literature says, “surveillance solutions must be multi-mission suitable, scalable, flexible, maintainable,
upgradeable, interoperable, shareable, and affordable”, which is very true when it comes to border surveillance
and other security systems. Smartdust system satisfies the above mentioned features and its compact size is an
added advantage when deployed in the battlefields. To give another example, the work done by C.Neumann and
his colleagues explains about the protection of our borderlines as well as military camps using Radar
surveillance methods[4]. The challenges of remote border monitoring have been detailed in the work conducted
by P.Pratap and his colleagues[5]. The paper discusses three major issues to be addressed to build an effective
ground surveillance system and the issues are „providing reliable and efficient power‟, „providing adequate and
timely maintenance to minimize downtime‟ and „networking systems for effective data transmission‟.
Concluding, the work says that a system that overcomes these challenges will provide a “cost-effective solution
requiring minimal support infrastructure solution to meet border monitoring and protection needs.” Smartdust
system ensures that it meets these challenges, to be discussed in the following sections.Numerous other works
were carried out in designing border surveillance systems and also improving on the existing methodologies.
Most of the works carried out was about improving on the existing Radar technologies, using unmanned air
vehicles and fiber optic sensing [3][4][6][7].This paper proposes a system based on smartdusts for border
surveillance applications that can help solve many of the challenges posed by conventional systems especially
concerned to power consumption, maintainability, safety and coverage.
The system structure of the smartdust networks is presented in the next section followed by the
hardware and software design in the third and fourth sections. The third section also details about the
components used and it‟s set up. The software design section also includes a high level flow chart for the system
and the forthcoming section describe the output obtained when the system was put under test. The final section
describes the features, few concerns and some enhancements of the proposed project.
II. System Structure
The project aims to develop a system of two motes that communicates with a central monitoring mote.
The system structure can be broadly classified into two- smatdust mote circuit and the central monitoring mote
circuit. The block diagram for the smartdust network is shown in Fig. 2. The system consists of the following
components/modules:
a) Microcontroller: 32-bit ARM Cortex-M3 microcontroller, to control the smartdust mote.
b) Display: Graphics LCD, to show the intrusion type and tracking history.
c) Communication: IEEE 802.15.4 wireless protocol, for communication between motes.
d) Thermal sensor: Enhanced PIR sensor, to sense the acoustic sound signals.
e) Vibration sensor: 3-axis MEMS accelerometer, to sense the acoustic sound signals.
f) Acoustic sensor: MEMS Microphone is used to sense the acoustic sound signals.
g) Magnetic sensor: Intruders carrying weapons and moving in vehicles can be identified using their magnetic
signature in this AMR Magnetic sensor.
3. Smartdust Network For Tactical Border Surveillance Using Multiple Signatures
www.iosrjournals.org 3 | Page
Figure 2: Block diagram of smartdust network
Each smartdust mote consists of a variety of sensors like magnetic, thermal, acoustic and vibration sensors for
detecting the respective signatures. The controller present in the dust mote processes these values and sends
them over the wireless network using IEEE802.15.4 protocol. The structure designed for a smartdust mote is
shown in Fig. 3.
Figure 3:Proposed block diagram ofsmartdust mote
III. Hardware Design
The major hardware used in the project are ARM controller, sensors, transceiver, graphics display,
buzzer, crystal and power supply. The project intends to develop two smartdust mote boards and one central
monitoring mote. A list of the components used for the project work can be found in Table 1.
Table 1: List of components
Component Specification Number
ARM controller ARM LPC1313 3
Vibration sensor PHIDGETS 1104 2
Magnetic sensor KMA199E 2
MEMS microphone SPM0404HE5H 2
PIR sensor SB0081 2
IEEE802.15.4 radio transceiver MRF24J40 3
Graphics display NOKIA 5110 1
Crystal 12 MHz 3
Buzzer - 1
IEEE 802.15.4
Network
2.4GHZ
Dust
Mote
2
Dust
Mote
1
Central
Monitor
Mote
SPI Graphi
cs LCD
Buzze
r
4. Smartdust Network For Tactical Border Surveillance Using Multiple Signatures
www.iosrjournals.org 4 | Page
Other componenets used are LEDs and switches as per need.
The circuit diagram for the central monitoring mote and smartdust mote are shown in Fig. 4 and Fig.5
respectively.
Figure 4: Circuit diagram of central monitoring mote
Figure 5: Circuit diagram of smartdust mote
Each of the key components used in this work are detailed here.
i. ARM Controller - The project uses ARM Cortex M3 controller, which is the next generation 32 bit ARM
processor for embedded applications based on ARMv7-M architecture. The specialty of this ARM
controller is its Harvard architecture [8][9]. The separate instruction and data buses allow parallel
instruction fetching and data storage.The ARM Cortex - M3 controller has been chosen in this work for the
following reasons: better energy efficiency, more functionality out of battery life and ability to meet
5. Smartdust Network For Tactical Border Surveillance Using Multiple Signatures
www.iosrjournals.org 5 | Page
increasing energy demands for low energy products when compared to other controllers [8].It also has the
smallest code size for any microcontroller. Reducing the code size is the key to squeezing your application
code into minimum amount of flash [8].
ii. Magnetic sensor - The magnetic sensor used is KMA199E which is a magnetic angle sensor system
(numbered 3 in Fig.6). The MagnetoResistive (MR) sensor bridges and the mixed signal Integrated Circuit
(IC) are integrated into a single package. This angular measurement system KMA199E is pre-
programmed, pre-calibrated and therefore, ready to use. The KMA199E allows user specific adjustments
of angular range, zero angle and clamping voltages [10]. The settings are stored permanently in an
Electrically Erasable Programmable Read-Only Memory (EEPROM).
iii. MEMS Microphone - MEMS microphone is similar to the standard ECMs (Electro condenser
microphones) found in modern consumer electronics, except that the components are built onto a single
chip using CMOS technology, rather than assembled from discrete parts. It can sense the acoustic signals
[11]. The MEMS microphone used is SPM0404HE5H(numbered 2 in Fig.6).
iv. PIR Motion sensor - The motion detector module used is SB0081, which is a pyroelectric sensor module
developed for human body detection (numbered 1 in Fig.6). A PIR detector combined with a Fresnel lens
are mounted on a compact size PCB together with an analog IC, SB0081, and limited components to form
the module [12]. It has a very compact size and operates at 3.3V.
v. Vibration sensor - It is a piezoelectric transducer, which when displaced from the mechanical neutral axis;
the bending creates strain within the piezoelectric element and generates voltage (numbered 4 in Fig.6).
We have used PHIDGETS 1104 type in the project. The type of measurement used by the device is
ratiometric [13].
vi. Transceiver - The MRF24J40 is an IEEE 802.15.4™ Standard compliant 2.4 GHz RF transceiver [14].
The MRF24J40 creates a low-cost, low-power, low data rate (250 or 625 kbps) Wireless Personal Area
Network (WPAN) device (numbered 5 in Fig.6). The MRF24J40 interfaces many popular microcontrollers
via a 4-wire serial SPI interface, interrupt, wake and Reset pins.The MRF24J40 provides hardware support
for energy detection, Carrier Sense, CSMA-CA Algorithm, Automatic Packet Retransmission, Automatic
Acknowledgment. The Wireless Personal Area Network (WPAN) focuses on low-cost, low-speed
ubiquitous communication between devices. The range of operation is 10-100 meter and provides a
transfer rate of 250 Kbit/s. It uses CSMA/CA for collision avoidance. It supports secure communications
and employs peer -to-peer or star topology. The operating frequency band is 2400-2483.5 MHz with up to
sixteen channels. It uses Offset Quadrature Phase Shift Keying (OQPSK) modulation.
vii. Graphics LCD -The Graphics LCD used is Nokia 5110, which is a basic LCD screen for lots of
applications. It is mounted on an easy to solder PCB [15]. It uses the PCD8544 controller which is a low
power CMOS LCD controller/driver designed to drive a graphics display of 48 rows and 84 columns. This
is interfaced to the ARM microcontroller through serial bus interface. The logic supply voltage range VDD
to VSS is 2.7 to 3.3 V.
The system has been assembled in three boards, one each for the two sensor motes and one for the monitoring
mote. The experimental set up of the proposed system is shown in Fig. 6 and Fig.7.
Figure 6: Smartdust mote with sensors
6. Smartdust Network For Tactical Border Surveillance Using Multiple Signatures
www.iosrjournals.org 6 | Page
Figure 7:Smartdust monitoring mote
The MEMS microphone is connected to port AD0, metal sensor to AD2, PIR sensor to AD3, MEMS
accelerometer (vibration sensor) to I2
C port and transceiver through SPI.
IV. Software Design
This section details about the software aspects of the project. The development environment used is
LPCXpresso IDE, which is a suitable development tool for the LPC1000 series of ARM Cortex-M
microcontrollers.It is a complete tool chain for LPC1000 series of Cortex-M microcontrollers.The different
software‟s used in the project work are CMSIS (Cortex microcontroller software interface standard) from ARM,
IEEE 802.15.4 protocol stack, I2
C and SPI protocol drivers. The application code programming is done in
embedded C.CMSIS is a vendor independent hardware abstraction layer for the Cortex-M processor series. It
enables consistent and simple software interfaces to the processor and the peripherals thus; simplifying software
reuse.Creation of software is a major cost factor in the embedded industry. Standardizing the software interfaces
across all Cortex-M silicon vendor products, would lead to significant cost reduction when creating new projects
or migrating existing software to a new device. IEEE 802.15.4 protocol stackis the standard that specifies the
physical layer and media access control for low-rate wireless personal area networks. It provides low cost, low
speed communication between devices. Here, the emphasis is on low cost communication of nearby devices
with little or no underlying infrastructure. I2
C protocol driveris a two- wire interface standard. It is used to attach
low-speed peripherals to the controller. It uses Serial Data Line (SDA), Serial Clock (SCL). The bus speed is
100 Kbit/s.SPI protocol driveris a serial peripheral interface and is widely used with embedded systems because
it is simple and efficient interface. It has three signal wires that hold a clock (SCK), a “Master Out Slave In”
(MOSI) data line, and a “Master In Slave Out”. A high level process flow chart for the project is given in Fig.8
and Fig.9.
7. Smartdust Network For Tactical Border Surveillance Using Multiple Signatures
www.iosrjournals.org 7 | Page
Figure 8:Flow chart for sensor motes
8. Smartdust Network For Tactical Border Surveillance Using Multiple Signatures
www.iosrjournals.org 8 | Page
Figure 9: Flow chart for the monitoring mote
V. Result
The sensor motes were placed at a distance of 10 meters (test distance) apart and the monitoring mote
placed in its vicinity. On powering each of these boards using the on-board battery, the test LED in the boards
were switched ON indicating that wireless connection has been established between them. On giving the inputs,
(i)Presence of human, (ii) Human motion, (iii) Human speech and (iv) Movement of a metallic bar, near the
sensors, it was found to be detected by the sensors and communicated over to the monitoring mote which
displayed which mote detected what (type of input) in the graphics display. It also displayed the total number of
inputs it has sensed just to give an idea about the concentration or the strength of intrusion in that area. The
output obtained is shown in Fig.10 and Fig.11. The display in Fig.10 shows that the detection of intrusion has
happened near mote „1‟ and the type of input has been „human motion‟. It also shows a total of 6 which
indicates that it is the sixth time an intrusion were detected in its vicinity. Similarly, Fig.11 shows that mote 1
has detected presence of metal near its vicinity and it was the ninth time it has detected an intrusion.
Figure 10: Monitoring mote displaying intrusion, Sample 1.
9. Smartdust Network For Tactical Border Surveillance Using Multiple Signatures
www.iosrjournals.org 9 | Page
Figure 11: Monitoring mote displaying intrusion, Sample 2.
The system also displays a graph, Fig.12 that indicates the intrusion history by showing which mote has
displayed the intrusion on the press of a switch. It approximately gives an idea as to where or near which mote
the intrusion is maximum.
Figure 12: Graph showing intrusion history
VI. System features
Relying on the concept of using smartdust networks in border surveillance, thousands of motes may be
deployed in any terrain conditions, even inside a dense forest where satellite monitoring is impossible. The
smartdusts does not require any maintenance as once deployed they can run for many years. They are not easily
prone to enemy detection compared to their conventional counterparts. Variety of onboard sensors makes the
mote to identify any kind of intrusion, humans, machines or vehicles. The intrusion path can be tracked using
wireless communication between motes. Low power 32-bit ARM Cortex-M3 microcontroller enables the mote
to be operated for years from battery power. A portable monitoring node with graphics LCD is used for easy UI
where the intrusion path will be plotted graphically and alarm is raised.
VII. Conclusion
The proposed system of smartdusts for border surveillance applications was designed, developed and
tested in the laboratory. Few suggestions for the betterment of the project would be to make a distinction
between animals or humans that is intruding based on the comparison of temperatures. PIR sensor can make out
the difference in the body temperatures or the heat from animal and human bodies. Another major point of
apprehension would be the availability of the smartdust chips.Smartdust motes are not yet available on a large
scale and even if they do most of the motes are of the size of a deck of cards. We could hope for the future
motes to be of dust size at the same time available at a reasonable rate.The key downsides of using smartdust
networks in border surveillance is the pollution it causes because once deployed the smartdust mote remain in
the soil for years. Therefore, let us hope for greener smartdust mote circuits to be developed on a large scale.
Also, solar powered batteries can be of great benefit to the smartdust circuits as the circuits once deployed must
remain in soil for years without maintenance. Another area of enhancement that we could suggest is that the
smartdust motes could be made to give details such as the position of the intrusion and the weather conditions at
the place of intrusion.
References
[1] Doug Steel, Smartdust, UH ISRC Technology briefing, March 2005.
[2] Pratap.P, Kallberg J.M, Thomas L.A,Challenges of remote border monitoring, 2010 IEEE International Conference on Technologies
for Homeland Security (HST)
[3] Nohara, T.J;A commercial approach to successful persistent radar surveillance of sea, air and land along the northern Border, 2010
IEEE International Conference on Technologies for Homeland Security (HST)
[4] Neumann, C.; Weiss, G.; Wahlen, A.; Brehm, T:Ground Surveillance With Mmw Radar For Border Control And Camp Protection
Applications, EuropeanMicrowave Conference, 2007.
10. Smartdust Network For Tactical Border Surveillance Using Multiple Signatures
www.iosrjournals.org 10 | Page
[5] Pratap, P.; Kallberg, J.M.; Thomas, L.A;Challenges Of Remote Border Monitoring, 2010 IEEE International Conference on
Technologies for Homeland Security (HST)
[6] Girard, A.R.; Howell, A.S.; Hedrick, J.K;Border Patrol And Surveillance Missions Using Multiple Unmanned Air Vehicles, 2004.
CDC. 43rd IEEE Conference on Decision and Control
[7] Owen, Arch; Duckworth, Gregory; Worsley, Jerry, Optasense: Fibre Optic Distributed Acoustic Sensing For Border Monitoring,
2012 EuropeanIntelligence and Security Informatics Conference (EISIC)
[8] ShyamSadasivan, An introduction to the ARM Cortex-M3 Processor, October 2006, Open journal
[9] Cortex-M3 Technical reference manual from ARM, 2010, http://www.arm.com
[10] NXP Semiconductors, KMA199E, Programmable sensor, Rev.01-18, October 2007, http://www.nxp.com
[11] Knowles Acoustics, SPM0404HESH-PB specification, 2009
[12] SB0081, Product manual
[13] Phidgets, 1104_0_product_manual_September 30, 2009
[14] IEEE, MRF24J40, http://www.microchip.com
[15] PCD85441,ProductSpecification,1999, http://www.semiconductors.phillips.com