The paper aims at designing a system for border surveillance using the concept of smartdust
technology. Smartdusts are small dust like wireless sensor motes with multiple on-board sensors and
microcontroller. In real time, thousands of such smartdust motes must be deployed in a large area. The motes
can form a network among them and has wireless connection to outside world. Onboard hardware include a
variety of sensors for vibration/seismic, magnetic, acoustic and thermal signature recognition, a
microcontroller for processing these sensor values and a radio transceiver for communication over a wireless
network. In this experimental project, we have designed one central monitoring mote and two smartdust motes
using ARM controller, IEEE radio transceiver and sensors.The central monitoring mote also displays the
tracking history of intrusion on enabling a switch
Wireless Network For Strategic Boundary Supervision SystemjournalBEEI
The major trouble with national security is "Terrorism" happening in borders. In border areas, regular forces or even satellites cannot monitor accurately intruding. The wireless sensor network scheme gives a possible way to explain this issue. To outline a wireless remote system of estimated sensor motes that contains various installed sensors and a processor to detect and impart an adversary interruption crosswise over a border and war zones. The idea is to distribute many smartdust motes inside an enormous geological region. Every one of these motes shapes a remote system, and one of them will go about as the system organiser that can control the whole system and furthermore goes about as a passage to the outside world. The preferred standpoint with these little motes is that it can be conveyed in a couple of hours by a pair of men or even dropped from an airborne helicopter. Every mote comprises of an assortment of sensors to distinguish every single potential type of interruption.
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Editor IJMTER
In recent years, wsns detect to the fault sensor node based on round trip delay using path
in wireless sensor networks. Portable sensor node is low cost in Wsns . Measured in the round trip
delay time and number of sensor node. Existing method is used to large value of sensor node,
identification of sensor node time and distance . it is used to linear selection path, disadvantages are
data loss, more number of path, complexity. in this proposed method using distributed autonomous
sensor software implementation in NS2.it is detected fault sensor node and malfunction ,in this
analysis time and path using discrete Rtp. real time applicability in received signal strength ,separate
wavelength for end of the node avoid the data loss and complexity. Hardware implementation using
ZigBee and Microcontroller .Equal to the hardware and software implementation. It is overcomes to
the data loss. comparing the threshold and Rtd time. Finally, the algorithm is tested under different
number of faulty sensors in the same area. Our Simulation results demonstrate that the time
consumed to find out the faulty nodes in our proposed algorithm is relatively less with a large
number of faulty sensors existing in the network.
Wireless Sensor networks are dense networks, which consist of small low cost
sensors having severely constrained computational and energy resources, which operate in
an adhoc environment. Sensor network combines the aspects of distributed sensing,
computing and communication. Despite the numerous applications of sensor networks in
various fields there are various issues which need to be explored and resolved such as
resource constraints, routing, coverage, security, information collection and gathering etc.
In this paper we aim to provide the detailed overview of the wireless sensor technologies and
issues related to them, such as advancement of sensor technology, architecture, applications,
issues and the work done in the field of routing, coverage and security.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Wireless Network For Strategic Boundary Supervision SystemjournalBEEI
The major trouble with national security is "Terrorism" happening in borders. In border areas, regular forces or even satellites cannot monitor accurately intruding. The wireless sensor network scheme gives a possible way to explain this issue. To outline a wireless remote system of estimated sensor motes that contains various installed sensors and a processor to detect and impart an adversary interruption crosswise over a border and war zones. The idea is to distribute many smartdust motes inside an enormous geological region. Every one of these motes shapes a remote system, and one of them will go about as the system organiser that can control the whole system and furthermore goes about as a passage to the outside world. The preferred standpoint with these little motes is that it can be conveyed in a couple of hours by a pair of men or even dropped from an airborne helicopter. Every mote comprises of an assortment of sensors to distinguish every single potential type of interruption.
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Editor IJMTER
In recent years, wsns detect to the fault sensor node based on round trip delay using path
in wireless sensor networks. Portable sensor node is low cost in Wsns . Measured in the round trip
delay time and number of sensor node. Existing method is used to large value of sensor node,
identification of sensor node time and distance . it is used to linear selection path, disadvantages are
data loss, more number of path, complexity. in this proposed method using distributed autonomous
sensor software implementation in NS2.it is detected fault sensor node and malfunction ,in this
analysis time and path using discrete Rtp. real time applicability in received signal strength ,separate
wavelength for end of the node avoid the data loss and complexity. Hardware implementation using
ZigBee and Microcontroller .Equal to the hardware and software implementation. It is overcomes to
the data loss. comparing the threshold and Rtd time. Finally, the algorithm is tested under different
number of faulty sensors in the same area. Our Simulation results demonstrate that the time
consumed to find out the faulty nodes in our proposed algorithm is relatively less with a large
number of faulty sensors existing in the network.
Wireless Sensor networks are dense networks, which consist of small low cost
sensors having severely constrained computational and energy resources, which operate in
an adhoc environment. Sensor network combines the aspects of distributed sensing,
computing and communication. Despite the numerous applications of sensor networks in
various fields there are various issues which need to be explored and resolved such as
resource constraints, routing, coverage, security, information collection and gathering etc.
In this paper we aim to provide the detailed overview of the wireless sensor technologies and
issues related to them, such as advancement of sensor technology, architecture, applications,
issues and the work done in the field of routing, coverage and security.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A WSN primary outline issue for a sensor system is protection of the vitality accessible at every sensor node. We propose to convey different, versatile base stations to delay the lifetime of the sensor system. We split the lifetime of the sensor system into equivalent stretches of time known as rounds. Base stations are migrated toward the begin of a round. Our strategy utilizes a whole number straight program to focus new areas for the base stations and in view of steering convention to guarantee vitality proficient directing amid every round. We propose four assessment measurements and look at our answer utilizing these measurements. Taking into account the reproduction results we demonstrate that utilizing various, versatile base stations as per the arrangement given by our plans would altogether expand the lifetime of the sensor system.
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONSijasuc
Divergent modulation schemes have been proposed for the Internet of Things (IoT). Low Power Wide Area
Networks (LPWAN) technologies are gaining unprecedented acceptance in IoT application of sensor
networks. Chirp Spread Spectrum (CSS) is a prominent modulation technique proposed for LPWAN. Chirps
can traverse long distance and are resilient to noise and Doppler effects. Noise resilience along with
transmission range and low power requirement makes CSS a preferred modulation scheme for sensor
networks. LoRaWANTM, with its physical (PHY) layer using CSS, has emerged as the widely accepted
LPWAN solution. By using CSS modulation with orthogonal spreading factors (SF), LoRa offers wide
coverage to LPWAN applications while supporting a high volume of devices. However, scalability
performance of CSS has not been inadequately modeled. As with the suitability of the modulation scheme,
there are concerns on how chirps interact with the surrounding as the number of deployments bursts out
into higher volumes. We evaluate CSS at ISM band 868 MHz for spreading factor 7 to 12 at bandwidth 125
kHz for performance and scalability. Simultaneous transmissions were simulated with repeated iterations
and conclusions are arrived on collisions rate, packet error rate, and bit error. Suitability of using CSS for
sensor networks for future deployments is commended.
Herbal Cures Practised By Rural Populace In Varanasi Region Of Eastern U.P.(I...IOSR Journals
A survey based study to collect information regarding use of herbs as household treatment of common ailments in rural areas of Varanasi region of eastern U.P. was undertaken .In Varanasi as in other parts of India , the people especially those residing in rural and semi-urban areas still practise herbal cures for many of their ailments. In the present investigation a total of 40 medicinally important plant species belonging to 27 families were recorded which are frequently used by local populace to cure diseases such as cold,cough,fever,snake bite,boils piles etc.As plants are easily available and sometimes the only source of healthcare available to poor therefore there is a great need for preservation of such medicinal plants.
Evaluation of Level of Precursors of N-Nitrosamine in Vitro in Wistar Rats Fe...IOSR Journals
This study compares the level of Nitrite in urine, protein concentration and nitrite concentration in post mitochondrial fraction of rats fed different levels of dietary protein with concurrent administration of precursors of N-nitrosamine; dimethylamine hydrochloride (DMA-HCl) and sodium nitrite (NaNO2). Thirty Male Wistar rats were divided into three groups and were kept for four weeks. Group one was given high protein diet (64%), group two was given a normal protein diet (27%) and group three was given low protein diet (3.5%). All the groups were administered with 3mg NaNO2 and 20mg DMA-HCL/kg, using the application of spectrophotometric analysis, centrifugation, as well as colorimetric methods. Following administrations of the chemicals to the test animal groups, the concentration of 24 hours urinary excretion of nitrite was 7.417μg/ml in high protein fed rats, 2.063μg/ml in normal protein fed rats and 0.569 μg/ml in low protein fed rats. There was a significant difference (p<0.05) in the nitrite concentration in the group fed high protein diet with concurrent administration of NaNO2 and DMA-HCl. The wistar rats fed with high protein diet, excreted 5.8 to 7 times more nitrite in urine than the severely protein deprived animals. The protein and nitrite concentration of the post mitochondrial fraction of liver was highest in rats that were fed high protein diet. This study has revealed that nutrition status affects metabolism of foreign compounds including nitrites and dimethylamine hydrochloride.
Survey on Single image Super Resolution TechniquesIOSR Journals
Super-resolution is the process of recovering a high-resolution image from multiple lowresolutionimages
of the same scene. The key objective of super-resolution (SR) imaging is to reconstruct a
higher-resolution image based on a set of images, acquired from the same scene and denoted as ‘lowresolution’
images, to overcome the limitation and/or ill-posed conditions of the image acquisition process for
facilitating better content visualization and scene recognition. In this paper, we provide a comprehensive review
of existing super-resolution techniques and highlight the future research challenges. This includes the
formulation of an observation model and coverage of the dominant algorithm – Iterative back projection.We
critique these methods and identify areas which promise performance improvements. In this paper, future
directions for super-resolution algorithms are discussed. Finally results of available methods are given.
Voice Recognition Wireless Home Automation System Based On ZigbeeIOSR Journals
Abstract : In the recent years, the Home Automation systems has seen a rapid changes due to introduction of various wireless technologies The explosion in the wireless technology has seen the emergence of many standards, especially in the industrial, scientific and medical (ISM) radio band. ZigBee is an IEEE 802.15.4 standard for data communications with business and consumer devices. Zigbee is targeted at applications that requires low data rate, long battery life, and secure networking. Zigbee has a defined rate of 250 kbits/s, best suited for periodic or intermittent data or a single signal transmission from a sensor or input device. The wireless home Automation systems is supposed to be implemented in existing home environments, without any changes in the infrastructure. The automation centers on recognition of voice commands and uses low-power ZigBee wireless communication modules along with microcontroller. This system is most suitable for the elderly and the disabled persons especially those who live alone and since recognize voice so it is secure. The home automation system is intended to control all lights and electrical appliances in a home or office using voice commands. So in this paperwork our aim is to designed a voice recognition wireless ZigBee based home automation system. Keywords - Home automation, Microcontroller , Voice Recognition, ZigBee, Power Supply.
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading ChannelIOSR Journals
Abstract: MIMO-OFDM system in Rayleigh Fading Channel is very popular technique for mobile communication now a day’s for research. Here we want increase the capacity of MIMO-OFDM of system by using adaptive modulation, Algebraic Space-Time Codes (ASTC) encoder for MIMO Systems are based on quaternion algebras .we found that ergodic capacity has some limitation which reduce the system’s performance to overcome this we use ASTC code . ASTC code are full rank, full rate and non vanishing constant minimum determinant for increasing spectral efficiency and reducing Peak to Average Power Ratio (PAPR) . Keywords— Adaptive modulation ASTC code, Capacity, BER, Ergodic capacity, PAPR, Spectral Efficiency and SNR
Performance of Crusher Dust in High Plastic Gravel Soils As Road Construction...IOSR Journals
The performance of Flexible Pavement depends on the functions of the component layers especially Sub-base layers. Generally Sub-base layers are made up of natural soils like Gravels. Frequently gravel soils composed of high amount of fines which causes plasticity characteristics with adsorption of moisture under heavy loads and repeated traffic. Excess deformation leading several failure which require huge investment of money for their repairs. To reduce the excess deformation of the gravel soils and to increase the life period of the pavement there is a need to arrest their plastic characteristics and stabilization is one such techniques to improve the gravel soils by addition of industrial wastes. In this connection Crusher Dust has been selected as a Stabilizer to improve their qualities. Various percentage of Crusher Dust was added to gravel soil and tests like Plasticity, Compaction and Strength tests were conducted. By the addition of Crusher Dust Plasticity Characteristics were reduced and CBR values were improved. Addition of 25% of Crusher Dust make the mixes low-plastic and 35% of Crusher Dust make the mixes non-plastic, where high CBR values attained. Hence from the test results it is identified that addition of 25%-35% of Crusher Dust make the gravel soils meet the specification of MORTH as a sub-base material.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A WSN primary outline issue for a sensor system is protection of the vitality accessible at every sensor node. We propose to convey different, versatile base stations to delay the lifetime of the sensor system. We split the lifetime of the sensor system into equivalent stretches of time known as rounds. Base stations are migrated toward the begin of a round. Our strategy utilizes a whole number straight program to focus new areas for the base stations and in view of steering convention to guarantee vitality proficient directing amid every round. We propose four assessment measurements and look at our answer utilizing these measurements. Taking into account the reproduction results we demonstrate that utilizing various, versatile base stations as per the arrangement given by our plans would altogether expand the lifetime of the sensor system.
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONSijasuc
Divergent modulation schemes have been proposed for the Internet of Things (IoT). Low Power Wide Area
Networks (LPWAN) technologies are gaining unprecedented acceptance in IoT application of sensor
networks. Chirp Spread Spectrum (CSS) is a prominent modulation technique proposed for LPWAN. Chirps
can traverse long distance and are resilient to noise and Doppler effects. Noise resilience along with
transmission range and low power requirement makes CSS a preferred modulation scheme for sensor
networks. LoRaWANTM, with its physical (PHY) layer using CSS, has emerged as the widely accepted
LPWAN solution. By using CSS modulation with orthogonal spreading factors (SF), LoRa offers wide
coverage to LPWAN applications while supporting a high volume of devices. However, scalability
performance of CSS has not been inadequately modeled. As with the suitability of the modulation scheme,
there are concerns on how chirps interact with the surrounding as the number of deployments bursts out
into higher volumes. We evaluate CSS at ISM band 868 MHz for spreading factor 7 to 12 at bandwidth 125
kHz for performance and scalability. Simultaneous transmissions were simulated with repeated iterations
and conclusions are arrived on collisions rate, packet error rate, and bit error. Suitability of using CSS for
sensor networks for future deployments is commended.
Herbal Cures Practised By Rural Populace In Varanasi Region Of Eastern U.P.(I...IOSR Journals
A survey based study to collect information regarding use of herbs as household treatment of common ailments in rural areas of Varanasi region of eastern U.P. was undertaken .In Varanasi as in other parts of India , the people especially those residing in rural and semi-urban areas still practise herbal cures for many of their ailments. In the present investigation a total of 40 medicinally important plant species belonging to 27 families were recorded which are frequently used by local populace to cure diseases such as cold,cough,fever,snake bite,boils piles etc.As plants are easily available and sometimes the only source of healthcare available to poor therefore there is a great need for preservation of such medicinal plants.
Evaluation of Level of Precursors of N-Nitrosamine in Vitro in Wistar Rats Fe...IOSR Journals
This study compares the level of Nitrite in urine, protein concentration and nitrite concentration in post mitochondrial fraction of rats fed different levels of dietary protein with concurrent administration of precursors of N-nitrosamine; dimethylamine hydrochloride (DMA-HCl) and sodium nitrite (NaNO2). Thirty Male Wistar rats were divided into three groups and were kept for four weeks. Group one was given high protein diet (64%), group two was given a normal protein diet (27%) and group three was given low protein diet (3.5%). All the groups were administered with 3mg NaNO2 and 20mg DMA-HCL/kg, using the application of spectrophotometric analysis, centrifugation, as well as colorimetric methods. Following administrations of the chemicals to the test animal groups, the concentration of 24 hours urinary excretion of nitrite was 7.417μg/ml in high protein fed rats, 2.063μg/ml in normal protein fed rats and 0.569 μg/ml in low protein fed rats. There was a significant difference (p<0.05) in the nitrite concentration in the group fed high protein diet with concurrent administration of NaNO2 and DMA-HCl. The wistar rats fed with high protein diet, excreted 5.8 to 7 times more nitrite in urine than the severely protein deprived animals. The protein and nitrite concentration of the post mitochondrial fraction of liver was highest in rats that were fed high protein diet. This study has revealed that nutrition status affects metabolism of foreign compounds including nitrites and dimethylamine hydrochloride.
Survey on Single image Super Resolution TechniquesIOSR Journals
Super-resolution is the process of recovering a high-resolution image from multiple lowresolutionimages
of the same scene. The key objective of super-resolution (SR) imaging is to reconstruct a
higher-resolution image based on a set of images, acquired from the same scene and denoted as ‘lowresolution’
images, to overcome the limitation and/or ill-posed conditions of the image acquisition process for
facilitating better content visualization and scene recognition. In this paper, we provide a comprehensive review
of existing super-resolution techniques and highlight the future research challenges. This includes the
formulation of an observation model and coverage of the dominant algorithm – Iterative back projection.We
critique these methods and identify areas which promise performance improvements. In this paper, future
directions for super-resolution algorithms are discussed. Finally results of available methods are given.
Voice Recognition Wireless Home Automation System Based On ZigbeeIOSR Journals
Abstract : In the recent years, the Home Automation systems has seen a rapid changes due to introduction of various wireless technologies The explosion in the wireless technology has seen the emergence of many standards, especially in the industrial, scientific and medical (ISM) radio band. ZigBee is an IEEE 802.15.4 standard for data communications with business and consumer devices. Zigbee is targeted at applications that requires low data rate, long battery life, and secure networking. Zigbee has a defined rate of 250 kbits/s, best suited for periodic or intermittent data or a single signal transmission from a sensor or input device. The wireless home Automation systems is supposed to be implemented in existing home environments, without any changes in the infrastructure. The automation centers on recognition of voice commands and uses low-power ZigBee wireless communication modules along with microcontroller. This system is most suitable for the elderly and the disabled persons especially those who live alone and since recognize voice so it is secure. The home automation system is intended to control all lights and electrical appliances in a home or office using voice commands. So in this paperwork our aim is to designed a voice recognition wireless ZigBee based home automation system. Keywords - Home automation, Microcontroller , Voice Recognition, ZigBee, Power Supply.
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading ChannelIOSR Journals
Abstract: MIMO-OFDM system in Rayleigh Fading Channel is very popular technique for mobile communication now a day’s for research. Here we want increase the capacity of MIMO-OFDM of system by using adaptive modulation, Algebraic Space-Time Codes (ASTC) encoder for MIMO Systems are based on quaternion algebras .we found that ergodic capacity has some limitation which reduce the system’s performance to overcome this we use ASTC code . ASTC code are full rank, full rate and non vanishing constant minimum determinant for increasing spectral efficiency and reducing Peak to Average Power Ratio (PAPR) . Keywords— Adaptive modulation ASTC code, Capacity, BER, Ergodic capacity, PAPR, Spectral Efficiency and SNR
Performance of Crusher Dust in High Plastic Gravel Soils As Road Construction...IOSR Journals
The performance of Flexible Pavement depends on the functions of the component layers especially Sub-base layers. Generally Sub-base layers are made up of natural soils like Gravels. Frequently gravel soils composed of high amount of fines which causes plasticity characteristics with adsorption of moisture under heavy loads and repeated traffic. Excess deformation leading several failure which require huge investment of money for their repairs. To reduce the excess deformation of the gravel soils and to increase the life period of the pavement there is a need to arrest their plastic characteristics and stabilization is one such techniques to improve the gravel soils by addition of industrial wastes. In this connection Crusher Dust has been selected as a Stabilizer to improve their qualities. Various percentage of Crusher Dust was added to gravel soil and tests like Plasticity, Compaction and Strength tests were conducted. By the addition of Crusher Dust Plasticity Characteristics were reduced and CBR values were improved. Addition of 25% of Crusher Dust make the mixes low-plastic and 35% of Crusher Dust make the mixes non-plastic, where high CBR values attained. Hence from the test results it is identified that addition of 25%-35% of Crusher Dust make the gravel soils meet the specification of MORTH as a sub-base material.
Cost Effectiveness of Replacing Sand with Crushed Granite Fine (CGF) In the M...IOSR Journals
The economic gain of replacing sand with Crushed Granite Fines in the production of concrete was investigated. Compressive strength and slump tests were performed on fresh and hardened concrete using two nominal mixes of 1:1:2 and 1:1½: 3 with the sand component being partially replaced with Crushed Granite Fines. Compressive strength values above 30 N/mm² and 35 N/mm² were obtained for nominal mixes of 1:1:2 and 1:1½: 3 respectively when sand was partially replaced with 25 – 37.5% Crushed Granite Fines. Based on the economic analysis of the test results, replacement of sand with 25 – 37.5% Crushed Granite Fines is recommended for use in concrete production.
Performance Comparison of Uncoded OFDM & Uncoded Adaptive OFDM System Over AW...IOSR Journals
Adaptive OFDM (AOFDM) is the important approach to fourth generation of mobile
communication. Adaptive modulating scheme is employed according to channel fading condition for improving
the performance of OFDM. This gives improved data rate, spectral efficiency & throughput. OFDM is flexible
to adapt modulation schemes on subcarriers according instantaneous signal-to-noise ratio (SNR). In this paper,
we compare Bit Error Rate (BER),Mean Square Error(MSE), Spectral Efficiency, Throughput performance of
uncoded OFDM & uncoded adaptive OFDM with BPSK,QPSK & QAM modulation over AWGN channel.
Structural and Spectroscopical Studies for a Complex Macromolecule (hGH)IOSR Journals
Abstract: This paper tries to find the effect of the different environmental changes of ( pH, ionic strength, and temperature) on their tertiary structure of hGH by using UV sepctoscopy. We found that the hormone affected by chemical reagents change its conformation and folding. The present study is an attempt to discover what could happen to GH molecule when the biochemistry of body is changed. The results reveal that tryptophyl residues are inside the hormone, whereas tyrosyl residues are on the surface.
Eleven (11) composites, are unfilled and five each filled with varying contents of charcoal and wood dust separating bonded with melted spent thermoplastics have been compounded and their compressive strength, density, specific gravity, percentage shrinkage and percentage absorption determined.Composite density ranges (0.83-0.94)g/cm3, compressive strength from (6.92-16.14)n/mm2, percentage shrinkage from (1.01-4.76)% and percentage water absorption from (1.75-15.75)%. These results suggest that these composites (i) meet the allowable American standard for test and measurement (ASTM) for ceramic floor and wall tiles in compressor strength (0.2-22.1)minimum, % shrinkage (maximum 15%) and water absorption (maximum 16%) (ii)are appreciably strong compare to the gmelina-wood/cement composite and (iii) if comprehensively examined, composites may be useful in the building industry for the manufacture of tiles and boards and even compete favorably with the wood cement composites.
Application of Artificial Neural Network (Ann) In Operation of ReservoirsIOSR Journals
Abstract: Reservoir operation is an important element in water resources planning and management. It consists
of several parameters like inflow, storage, evaporation and demands that define the operation strategies for
giving a sequence of releases to meet the demands. The operating policy is a set of rules for determining the
quantities of water to be stored or released or withdrawn from a reservoir or system of several reservoirs under
various conditions. Reservoir operation frequently follows a conventional policy based on Guide curves (Rule
curves) that prescribes reservoir releases based on limited criteria such as current storage levels, season and
demands. Operating policies can be derived using system techniques such as simulation, optimisation and
combination of these two. System analysis has proved to be a potential tool in the planning, operation and
management of the available resources. In recent years, artificial intelligence techniques like Artificial Neural
Networks (ANN) have arisen as an alternative to overcome some of the limitations of traditional methods. In
most of the studies, feed forward structure and the back propagation algorithm have been used to design and
train the ANN models respectively. Detail analysis will be carried out to develop an ANN model for reservoir
operation and assess the application potential of ANN in attaining the reservoir operation objectives compared
with the conventional rule curves.
Key words:Artificial Neural Network, Back propagation, Guide curves (Rule curves), optimisation,reservoir
operation, simulation.
Removal of lead (II) and copper (II) ions from aqueous solution by baobab (Ad...IOSR Journals
High concentration of heavy metals in the environment can be detrimental to a variety of living species. The purpose of this research was to explore the use of baobab (Adsononsia digitata) fruit shells in the removal of lead(II) and copper(II) ions from aqueous solutions. Batch experiments were conducted to determine the effect of varying adsorption parameters on the removal of aqueous lead and copper ions. The adsorption of Pb(II) was found to be maximum at pH 5.5 using adsorbent dose of 0.7 g. The adsorption of Cu(II) was found to be optimum at pH 6 using adsorbent dosage of 0.9 g. The adsorption data conformed to Langmuir, Freundlich and Temkin isotherms. However the Temkin isotherm showed the best fitting model with highest R2 values for both lead and copper (0.9977 and 0.9967) respectively. Baobab fruit shells can be used as a cost effective adsorbent for the removal of lead(II) and copper(II) ions from aqueous solutions in the treatment of industrial effluent.
"Study of Java Access Control Mechanism”IOSR Journals
Abstract: a class as "a collection of data and methods." One of the important object-oriented techniques is
hiding the data within the class and making it available only through the methods. This technique is known as
encapsulation because it seals the data (and internal methods) safely inside the "capsule" of the class, where it
can be accessed only by trusted users.
Another reason for encapsulation is to protect your class against accidental or willful stupidity. A class
often contains a number of interdependent fields that must be in a consistent state. If you allow a users to
manipulate those fields directly, he may change one field without changing important related fields, thus leaving
the class in an inconsistent state. If, instead, he has to call a method to change the field, that method can be sure
to do everything necessary to keep the state consistent. Similarly, if a class defines certain methods for internal
use only, hiding these methods prevents users of the class from calling them.
The goal is : All the fields and methods of a class can always be used within the body of the class itself. Java
defines access control rules that restrict members of a class from being used outside the class that is done
through keeping the data (and internal methods) safely inside the "capsule" of the class, where it can be
accessed only by trusted users.
Keywords: Encapsulation, Access Control, Classes, Constructors, Methods.
Transformational Leadership at Muhammadiyah Primary Schoolson Emotional Intel...IOSR Journals
The aim of this research are examines the influence of Authentic Transformational Leadership behavior on Emotional Intelligence with intervening variables: Value CongruenceandTrust of the teachers and employees at MuhammadiyahPrimary Schools forward Bass &Avolio Theory. Quantitative approach used on this research. The samples in this study were 55 employees and 110 teachers. The finding indicate that Authentic Transformational Leadership behavior have significant direct effect on Emotional Intelligence. The significant influence was also shown by intervening variables: Value Congruence (positive), andTrust (negative). For further studies there is recommended to conduct similar studies in high school Muhammadiyah, considering there are differences in the curriculum and the emotional maturity of students and teachers
Promoting Industrial Training through Macro Economic Approach (The Importance...IOSR Journals
Libya is blessed with many factories but regrettably these factories failed due to lack of skills and experiences. Often Libya due to their uncoordinated, unregulated and fragmented nature delivery systems and policies are the challenges faced by the state. It is difficult to design a training system that ensures demand driven skills provision and involves stakeholders from key relevant sectors and this requires a study to identify problems and prosper solution for sustainable future development. Hence, the report adopted the approach which combines the results of studies being reviewed. I utilized analytical techniques to estimate the strength of a given set of findings across many different studies and sometime compare and draw conclusion. This has allowed the creation of a context from which this report emerged The report data solely rely on the empirical source which classified in primary and secondary source.The reported found out that the number of trainee dropped from 2000 to 2005 by an average of 26 students, in comparison to 1999. However, in 2006 and 2007, the number of trainee showed increased (by an average of 25 students). Due to this increased in trainee, oil production also increased at the beginning of the new millennium. This Indicate that training increase productivity and productivity growth can raise incomes and reduce poverty in a virtuous circle. Productivity growth reduces production costs and increases returns on investments, some of which turn into income for business owners and investors and some of which are turned into higher wages and national growth.
A Fossil Dicot Wood Aeschynomenoxylon Mohgaonsesp.Nov From The Deccan Intertr...IOSR Journals
The Deccan Intertrappean flora is mostly silicified and often very well preserved, representing the groups Thallophyta (fungi, algae and charophytes), water ferns, conifers and angiosperms with both monocotyledons and dicotyledons. The present wood is collected from the Deccan Intertrappean beds of Mohgaonkalan. The wood is angiospermic diffuse porus, vessels solitary and in multiples of two, usually small, occasionally of medium size. Xylem parenchyma scanty with paratracheal vasicentri type, Intervascular pitting are simple and alternate.Perforation plate simple. Fibers are non-septate and storied. Wood rays uniseriate only. Rays are homogenous and made up of procumbent cells only. It show its affinities with the reported species of Aeschynomene.
P- Delta Effect in Reinforced Concrete Structures of Rigid joint IOSR Journals
Popularity of High-Rise structures of rigid joint frame system are incresing day by day to accommodate growing people in metropoliton city and to construct the structures without any special structural component. However combination of rigid frame with RC structure get 30 storey as maximum storey and prone to collapse under severe displacement, axial force and moment, if the P-Delta effects does not included in analysis and design phase. Due to complexity and low knowledge of P-Delta analyses designers, engineers and architectures are prone to perform Linear Static analysis which may eventually become a cause of catastropic collapse of the high-rise. 12 cases and 2 different analysis are performed to give a light on the P-Delta effect in RC Structures of Rigid Joint which will aware and suggest concering person to understand, make experience and perform P-Delta analysis of the high-rise for safety using numeriacal modelling which may accelerate the process and reduce the complexities.
Feasibility of Nanofiltration process in dual stage in desalination of the se...IOSR Journals
The main objective of this paper is to predict the performances of NF membranes for seawater desalination utilizing a two. ROSA software was used in this study to verify the applicability of the NF in dual stage desalination process. Similarly to dual stage NF desalination process, an NF membrane was used in the first stage and BW membrane in the second stage.The first stage includes a nanofiltration membrane, but the second includes a nanofiltration or reverse osmosis (BW) membranes in order to produce potable water (TDS less than 1000mg/l). The effect of membranes type and seawater salinity is examined to achieve our objective. The results of energy requirements of NF–NF and NF–BW were eventually compared to single stage RO desalination in order to estimate the effectiveness of process.
Assessment of water supply facilities in Owo Local Government Area, Ondo Stat...IOSR Journals
The current study was carryout to investigate the status of water supply facilities in 24 rural
communities of Owo local government area of Ondo State, Nigeria. Former and informer interview,
questionnaire and physical assessment conducted. Secondary data from Nigeria National Population
Commission (NNPC) were used in this study. The major water supply facilities used by the communities were
mostly hand dug well and boreholes which in most cases were fitted with either electric or hand pump. It was
observed that all the boreholes fitted with hand pump were failed while 86 % of those fitted with electrics pump
were also failed. In the case of the hand dug well more than 37 % of all the hand dug well were failed. Borehole
failure was due to people ignorance, non availability of spare parts, constant water failure, poor maintenance
skills and attitude of the communities. The failures of the hand dug well were mainly due to low water table or
aquifer region. The survey assessment results revealed that sustainable water supply to the community could be
enhancing through the use of hand pump boreholes. Hand pump boreholes appeared more reliable with low
operational technology, their cost effectiveness affordability and available spare parts. The studies recommend
the involvement of the community participation in the overall management of the water facility in other to
enhance sustainability.
Wireless Sensor Network (WSN) is a promising field for research. As the use of this field increases, it is
required to give proper security to this field. So to ensure the security of communication of data or messages and to
control the use of data in WSN is of great importance. As sensor networks interact with responsive data and operate
in unfriendly unattended area, from the time of system design these security concerns should be addressed. The paper,
presents a modified Motesec security protocol which is a security mechanism for Wireless sensor network. In this
protocol a hash function based approach is used to detect replay attacks. For data access control key lock matching
method i.e. memory data access control policy is used to prevent unauthorized data access. Encoding and
reconstruction scheme is used to find out attacker. Flooding attack detection by comparing data rate. There is currently
massive research is present in the area of wireless sensor network security..Keywords: GPS,GCM,LBS Android.
Keywords: secure communication architecture, wireless Sensor network security.
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
A data dissemination protocol for wireless sensor networks has been engaged for modifying configuration fields and circulating management controls to the mote. Earlier, a data dissemination protocol faces the henceforth two consequences. First, they are works on sink based model; only the sink can circulate data item to other motes. Such model is not suitable for large user wireless sensor networks. Second, those protocols are not provide with any security and hence intruders will make problems to misuse the network. We provided the seDrip protocol. It allows the network mentors to authorize multiple network uses with various permissions to simultaneously and directly distributed data items to the mote. seDrip is implemented in an laboratory of network restricted resources mote to depict its large capability in practice.
This article presents a study of the state of the art of sensor networks wireless systems, which continue to develop and present a wide variety of Applications. These networks constitute a current and emerging field of study where combines the development of computers, wireless communications and devices mobile phones and integration with other disciplines such as agriculture, biology, medicine, etc. I know presents the main concept, components, topologies, standards, applications, problems and challenges, then delves into security solutions and concludes with basic simulation tools.
The development of wireless technology currently allows extending the notion of mobility for access to
information and communication anywhere and anytime. With the emergence of sensor networks
(Traditional (WSN) and vehicular (VSN)), new themes have been opened and new challenges have emerged
to meet the needs of individuals and the requirements of several application areas. Research today is much
focused on vehicular sensor networks (VSN), considerable efforts have emerged to introduce intelligence
into transport systems whose aim is to improve safety, efficiency and usability in road transport. These
networks will play an important role in building the Future Internet, where they will serve as a support for
various communication applications and integrated into our daily lives. In this paper, we surveyed the main
characteristic and applications of two type of Ad hoc networks WSN and VSN.
Wireless Sensor Network – Theoretical Findings and ApplicationsAshishDPatel1
Wireless sensor networks (WSN) consist of tiny sensor nodes scattered on a relatively large geographical area. The nodes are cooperative in nature, that is, they can communication with one another or to a central control unit. The work of each such node is to collect the information from surrounding like pressure, temperature, humidity, magnetic fields, optical fields etc [2]. Actually they are ad hoc network with some additional constraints. The node should be capable enough for power consumption, collection of data, self healing, mobility, self configuration to name a few. These features of WSN node differentiate it from conventional ad hoc networks [14]. This survey paper aims at reporting wireless sensor network, its design, networking of nodes, and security in system. In this paper, fundamentals of wireless sensor network are discussed. Different component like sensor, microcontroller, battery require for sensor networks are explained in detail. We have tried to include all the aspects of WSN. The Protocols, Operating Systems, tools require for WSN node programming and some security issues are also discussed.
A Review on Wireless Sensor Network Securityijtsrd
Wireless sensor networks are attracting more and more coverage. A number of surveillance, regulation, and tracking systems have been developed for different scenarios in recent years. Wireless Sensor Network WSN is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks. Vijay Kumar Kalakar | Hirdesh Chack | Syed Tariq Ali "A Review on Wireless Sensor Network Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31815.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/31815/a-review-on-wireless-sensor-network-security/vijay-kumar-kalakar
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical layer. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data between these protocol layers. For simulation purpose we are using Qualnet 5.0.2 simulator tool.
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNIAEME Publication
Wireless sensor networks are harshly restricted by storage capacity, energy and computing power. Wireless Sensor Networks have acquired a lot of attention by research community, manufacturer as well as actual users for monitoring remote trades and how to gather data in different environment. The wireless sensor nodes are especially battery powered devices having life can be extended for some times while long lasting and reliable for maintaining consumption of energy and network lifetime while designs applications and protocols. So it is essential to design effective and energy efficient protocol in order to enhance the network lifetime. In this paper we present the study of different energy efficient communication protocols of Wireless Sensor Networks (WSNs).Then some of the communication protocols which are widely used in WSNs to improve network performance are also discussed advantages and disadvantages of each protocols.
Air Programming on Sunspot with use of Wireless Networksijsrd.com
Wireless Sensor Networks (WSN) provides us an effective means to monitor physical environments. The computing nodes in a WSN are resource constrained devices whose resources need to be used sparingly. The main requirement of a WSN is to operate unattended in remote locations for extended periods of time. Physical conditions, environmental conditions, upgrades, user preferences, and errors within the code can all contribute to the need to modify currently running applications. Therefore, reprogramming of sensor nodes is required. One of the important terminologies that are associated with WSN network is that of OVER THE AIR PROGRAMMING. This concept has been utilized so far as for Imote2 sensors that has been relatively utilized for the processing of the Deluge port (DP). They have so far been able to successfully reboot each application. But this rebooting is still not reliable and secure as there are certain security features that are affected in the processing. I will provide a more reliable, robust and secure system that would have enriched functionalities of that of OTA programming on SUNSPOT. Some important features of the SUN SPOT that I will be utilizing in this practical approach is that it supports isolated application models such as sensor networks, it allows running multiple applications in one. It does not create overhead on the entire system node as it provides lower level asynchronous for proper message delivery. It also supports migration from one device to another. This paper focuses on developing a multi-hop routing protocol for communication among Sun SPOT sensor nodes and a user front-end (i.e. visualizer) to visualise the collected values from all the nodes. To test the routing protocol before deploying it to sensor nodes, a simulation using J-Sim is created.
Similar to Smartdust Network for Tactical Border Surveillance Using Multiple Signatures (20)
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 5, Issue 5 (Mar. - Apr. 2013), PP 01-10
www.iosrjournals.org
www.iosrjournals.org 1 | Page
Smartdust Network for Tactical Border Surveillance Using
Multiple Signatures
Seema.C.Mohan1
, S.Arulselvi2
(Department of Electronics and Communication Engineering, Bharath University, Tamil Nadu, India).
Abstract: The paper aims at designing a system for border surveillance using the concept of smartdust
technology. Smartdusts are small dust like wireless sensor motes with multiple on-board sensors and
microcontroller. In real time, thousands of such smartdust motes must be deployed in a large area. The motes
can form a network among them and has wireless connection to outside world. Onboard hardware include a
variety of sensors for vibration/seismic, magnetic, acoustic and thermal signature recognition, a
microcontroller for processing these sensor values and a radio transceiver for communication over a wireless
network. In this experimental project, we have designed one central monitoring mote and two smartdust motes
using ARM controller, IEEE radio transceiver and sensors.The central monitoring mote also displays the
tracking history of intrusion on enabling a switch.
Keywords:Advanced RISC Machine (ARM), Cortex microcontroller software interface standard (CMSIS), Inter
Integrated Circuit (I2
C), MEMS accelerometer, Serial Peripheral Interface (SPI),Smartdust mote.
I. Introduction
The greatest threat to national security is “Terrorism”, infiltrating through borders. In critical border
areas, regular forces or even satellites cannot monitor the intruding terrorists, as the area monitored is quite large
and complex. This paper proposes an innovative and effective solution to this problem by designing a next
generation, intelligent, ultra-small, dust like, wireless sensor motes with multiple onboard sensors and a
processor for detecting enemy intrusion across borders and battlefields. As the project is conceptualized on
„smartdust technology‟, a brief elucidation of smartdust definition is provided.
Smartdusts are dust size devices which are light in weight [1]. Each smartdust mote can be considered
as a tiny computer with one or more sensors, on-board power supply, a communication system and a controller.
It can communicate with other smartdust devices using the wireless radio network. The battery life of a
smartdust mote can vary from a few hours to ten years depending on the size and capability of the device. A
common mote communication scheme uses radio frequency signals to communicate over relatively short
distances. This allows designers to minimize mote size and reduce power consumption. When communicating ,
the devices pass each message to a neighbouring mote, which, in turn, passes the message onto a neighbouring
mote, and so on, until the message reaches the destination ie the central monitoring mote.The network of motes
continue to perform even if some of its communicaiton paths fail to operate. And once a mote is placed in an
existing network, it adapts to blend in with the other nodes to form a larger network; and when a mote fails, the
other devices in the network take over its load.Fig. 1 shows smartdusts deployed in a forest.
Figure 1: Smartdust deployed in a forest
2. Smartdust Network For Tactical Border Surveillance Using Multiple Signatures
www.iosrjournals.org 2 | Page
In real time, thousands of such motes are deployed in the field for detecting intrusion but in the project we are
employing only two smartdust sensor motes and a single monitoring mote on an experimental basis.
There are several existing border surveillance systems or methods in use today [2]. The most popular
methods are flying aircraft, deploying armed forces and ground surveillance using RADARS. The drawbacks of
these systems are discussed here;(a)Flying aircraft: the aircraft is usually run only for limited hours or for one
or two days. (b) Deploying armed forces: it is very difficult for the armed forces to monitor a large area with
great precision. Also, it is very unsafe and risky for the forces to remain at difficult terrains such as dense
forests, snow covered or mountain areas for days where bad weather conditions prevail. (c) Ground surveillance
using RADAR:No single RADAR can fulfill all border surveillance requirements with single RADAR
equipment. There is search RADAR that does the search function and once the search is done we would need
the track RADAR for the tracking. There is also complex RADAR equipment that could integrate two or more
RADAR functions in one RADAR instrument.RADAR as a whole is very huge and bulky. RADAR‟s are very
much visible owing to its big size and hence, it is subject to enemy detection.Due to the RADAR‟s bulkiness we
would require one or two men to carry it to the place of deployment or it is mounted on an armed vehicle.The
smartdust concept may be implemented in border surveillance applications in an effective and efficient way to
solve many of these problems as we shall see in the coming sections.
1.1 Related Work on border surveillance
There are several works carried out in the area of border surveillance. As an example, the study
conducted by T.J.Nohara explains the use of commercial approach to the deployment of radar surveillance[3].
The literature says, “surveillance solutions must be multi-mission suitable, scalable, flexible, maintainable,
upgradeable, interoperable, shareable, and affordable”, which is very true when it comes to border surveillance
and other security systems. Smartdust system satisfies the above mentioned features and its compact size is an
added advantage when deployed in the battlefields. To give another example, the work done by C.Neumann and
his colleagues explains about the protection of our borderlines as well as military camps using Radar
surveillance methods[4]. The challenges of remote border monitoring have been detailed in the work conducted
by P.Pratap and his colleagues[5]. The paper discusses three major issues to be addressed to build an effective
ground surveillance system and the issues are „providing reliable and efficient power‟, „providing adequate and
timely maintenance to minimize downtime‟ and „networking systems for effective data transmission‟.
Concluding, the work says that a system that overcomes these challenges will provide a “cost-effective solution
requiring minimal support infrastructure solution to meet border monitoring and protection needs.” Smartdust
system ensures that it meets these challenges, to be discussed in the following sections.Numerous other works
were carried out in designing border surveillance systems and also improving on the existing methodologies.
Most of the works carried out was about improving on the existing Radar technologies, using unmanned air
vehicles and fiber optic sensing [3][4][6][7].This paper proposes a system based on smartdusts for border
surveillance applications that can help solve many of the challenges posed by conventional systems especially
concerned to power consumption, maintainability, safety and coverage.
The system structure of the smartdust networks is presented in the next section followed by the
hardware and software design in the third and fourth sections. The third section also details about the
components used and it‟s set up. The software design section also includes a high level flow chart for the system
and the forthcoming section describe the output obtained when the system was put under test. The final section
describes the features, few concerns and some enhancements of the proposed project.
II. System Structure
The project aims to develop a system of two motes that communicates with a central monitoring mote.
The system structure can be broadly classified into two- smatdust mote circuit and the central monitoring mote
circuit. The block diagram for the smartdust network is shown in Fig. 2. The system consists of the following
components/modules:
a) Microcontroller: 32-bit ARM Cortex-M3 microcontroller, to control the smartdust mote.
b) Display: Graphics LCD, to show the intrusion type and tracking history.
c) Communication: IEEE 802.15.4 wireless protocol, for communication between motes.
d) Thermal sensor: Enhanced PIR sensor, to sense the acoustic sound signals.
e) Vibration sensor: 3-axis MEMS accelerometer, to sense the acoustic sound signals.
f) Acoustic sensor: MEMS Microphone is used to sense the acoustic sound signals.
g) Magnetic sensor: Intruders carrying weapons and moving in vehicles can be identified using their magnetic
signature in this AMR Magnetic sensor.
3. Smartdust Network For Tactical Border Surveillance Using Multiple Signatures
www.iosrjournals.org 3 | Page
Figure 2: Block diagram of smartdust network
Each smartdust mote consists of a variety of sensors like magnetic, thermal, acoustic and vibration sensors for
detecting the respective signatures. The controller present in the dust mote processes these values and sends
them over the wireless network using IEEE802.15.4 protocol. The structure designed for a smartdust mote is
shown in Fig. 3.
Figure 3:Proposed block diagram ofsmartdust mote
III. Hardware Design
The major hardware used in the project are ARM controller, sensors, transceiver, graphics display,
buzzer, crystal and power supply. The project intends to develop two smartdust mote boards and one central
monitoring mote. A list of the components used for the project work can be found in Table 1.
Table 1: List of components
Component Specification Number
ARM controller ARM LPC1313 3
Vibration sensor PHIDGETS 1104 2
Magnetic sensor KMA199E 2
MEMS microphone SPM0404HE5H 2
PIR sensor SB0081 2
IEEE802.15.4 radio transceiver MRF24J40 3
Graphics display NOKIA 5110 1
Crystal 12 MHz 3
Buzzer - 1
IEEE 802.15.4
Network
2.4GHZ
Dust
Mote
2
Dust
Mote
1
Central
Monitor
Mote
SPI Graphi
cs LCD
Buzze
r
4. Smartdust Network For Tactical Border Surveillance Using Multiple Signatures
www.iosrjournals.org 4 | Page
Other componenets used are LEDs and switches as per need.
The circuit diagram for the central monitoring mote and smartdust mote are shown in Fig. 4 and Fig.5
respectively.
Figure 4: Circuit diagram of central monitoring mote
Figure 5: Circuit diagram of smartdust mote
Each of the key components used in this work are detailed here.
i. ARM Controller - The project uses ARM Cortex M3 controller, which is the next generation 32 bit ARM
processor for embedded applications based on ARMv7-M architecture. The specialty of this ARM
controller is its Harvard architecture [8][9]. The separate instruction and data buses allow parallel
instruction fetching and data storage.The ARM Cortex - M3 controller has been chosen in this work for the
following reasons: better energy efficiency, more functionality out of battery life and ability to meet
5. Smartdust Network For Tactical Border Surveillance Using Multiple Signatures
www.iosrjournals.org 5 | Page
increasing energy demands for low energy products when compared to other controllers [8].It also has the
smallest code size for any microcontroller. Reducing the code size is the key to squeezing your application
code into minimum amount of flash [8].
ii. Magnetic sensor - The magnetic sensor used is KMA199E which is a magnetic angle sensor system
(numbered 3 in Fig.6). The MagnetoResistive (MR) sensor bridges and the mixed signal Integrated Circuit
(IC) are integrated into a single package. This angular measurement system KMA199E is pre-
programmed, pre-calibrated and therefore, ready to use. The KMA199E allows user specific adjustments
of angular range, zero angle and clamping voltages [10]. The settings are stored permanently in an
Electrically Erasable Programmable Read-Only Memory (EEPROM).
iii. MEMS Microphone - MEMS microphone is similar to the standard ECMs (Electro condenser
microphones) found in modern consumer electronics, except that the components are built onto a single
chip using CMOS technology, rather than assembled from discrete parts. It can sense the acoustic signals
[11]. The MEMS microphone used is SPM0404HE5H(numbered 2 in Fig.6).
iv. PIR Motion sensor - The motion detector module used is SB0081, which is a pyroelectric sensor module
developed for human body detection (numbered 1 in Fig.6). A PIR detector combined with a Fresnel lens
are mounted on a compact size PCB together with an analog IC, SB0081, and limited components to form
the module [12]. It has a very compact size and operates at 3.3V.
v. Vibration sensor - It is a piezoelectric transducer, which when displaced from the mechanical neutral axis;
the bending creates strain within the piezoelectric element and generates voltage (numbered 4 in Fig.6).
We have used PHIDGETS 1104 type in the project. The type of measurement used by the device is
ratiometric [13].
vi. Transceiver - The MRF24J40 is an IEEE 802.15.4™ Standard compliant 2.4 GHz RF transceiver [14].
The MRF24J40 creates a low-cost, low-power, low data rate (250 or 625 kbps) Wireless Personal Area
Network (WPAN) device (numbered 5 in Fig.6). The MRF24J40 interfaces many popular microcontrollers
via a 4-wire serial SPI interface, interrupt, wake and Reset pins.The MRF24J40 provides hardware support
for energy detection, Carrier Sense, CSMA-CA Algorithm, Automatic Packet Retransmission, Automatic
Acknowledgment. The Wireless Personal Area Network (WPAN) focuses on low-cost, low-speed
ubiquitous communication between devices. The range of operation is 10-100 meter and provides a
transfer rate of 250 Kbit/s. It uses CSMA/CA for collision avoidance. It supports secure communications
and employs peer -to-peer or star topology. The operating frequency band is 2400-2483.5 MHz with up to
sixteen channels. It uses Offset Quadrature Phase Shift Keying (OQPSK) modulation.
vii. Graphics LCD -The Graphics LCD used is Nokia 5110, which is a basic LCD screen for lots of
applications. It is mounted on an easy to solder PCB [15]. It uses the PCD8544 controller which is a low
power CMOS LCD controller/driver designed to drive a graphics display of 48 rows and 84 columns. This
is interfaced to the ARM microcontroller through serial bus interface. The logic supply voltage range VDD
to VSS is 2.7 to 3.3 V.
The system has been assembled in three boards, one each for the two sensor motes and one for the monitoring
mote. The experimental set up of the proposed system is shown in Fig. 6 and Fig.7.
Figure 6: Smartdust mote with sensors
6. Smartdust Network For Tactical Border Surveillance Using Multiple Signatures
www.iosrjournals.org 6 | Page
Figure 7:Smartdust monitoring mote
The MEMS microphone is connected to port AD0, metal sensor to AD2, PIR sensor to AD3, MEMS
accelerometer (vibration sensor) to I2
C port and transceiver through SPI.
IV. Software Design
This section details about the software aspects of the project. The development environment used is
LPCXpresso IDE, which is a suitable development tool for the LPC1000 series of ARM Cortex-M
microcontrollers.It is a complete tool chain for LPC1000 series of Cortex-M microcontrollers.The different
software‟s used in the project work are CMSIS (Cortex microcontroller software interface standard) from ARM,
IEEE 802.15.4 protocol stack, I2
C and SPI protocol drivers. The application code programming is done in
embedded C.CMSIS is a vendor independent hardware abstraction layer for the Cortex-M processor series. It
enables consistent and simple software interfaces to the processor and the peripherals thus; simplifying software
reuse.Creation of software is a major cost factor in the embedded industry. Standardizing the software interfaces
across all Cortex-M silicon vendor products, would lead to significant cost reduction when creating new projects
or migrating existing software to a new device. IEEE 802.15.4 protocol stackis the standard that specifies the
physical layer and media access control for low-rate wireless personal area networks. It provides low cost, low
speed communication between devices. Here, the emphasis is on low cost communication of nearby devices
with little or no underlying infrastructure. I2
C protocol driveris a two- wire interface standard. It is used to attach
low-speed peripherals to the controller. It uses Serial Data Line (SDA), Serial Clock (SCL). The bus speed is
100 Kbit/s.SPI protocol driveris a serial peripheral interface and is widely used with embedded systems because
it is simple and efficient interface. It has three signal wires that hold a clock (SCK), a “Master Out Slave In”
(MOSI) data line, and a “Master In Slave Out”. A high level process flow chart for the project is given in Fig.8
and Fig.9.
7. Smartdust Network For Tactical Border Surveillance Using Multiple Signatures
www.iosrjournals.org 7 | Page
Figure 8:Flow chart for sensor motes
8. Smartdust Network For Tactical Border Surveillance Using Multiple Signatures
www.iosrjournals.org 8 | Page
Figure 9: Flow chart for the monitoring mote
V. Result
The sensor motes were placed at a distance of 10 meters (test distance) apart and the monitoring mote
placed in its vicinity. On powering each of these boards using the on-board battery, the test LED in the boards
were switched ON indicating that wireless connection has been established between them. On giving the inputs,
(i)Presence of human, (ii) Human motion, (iii) Human speech and (iv) Movement of a metallic bar, near the
sensors, it was found to be detected by the sensors and communicated over to the monitoring mote which
displayed which mote detected what (type of input) in the graphics display. It also displayed the total number of
inputs it has sensed just to give an idea about the concentration or the strength of intrusion in that area. The
output obtained is shown in Fig.10 and Fig.11. The display in Fig.10 shows that the detection of intrusion has
happened near mote „1‟ and the type of input has been „human motion‟. It also shows a total of 6 which
indicates that it is the sixth time an intrusion were detected in its vicinity. Similarly, Fig.11 shows that mote 1
has detected presence of metal near its vicinity and it was the ninth time it has detected an intrusion.
Figure 10: Monitoring mote displaying intrusion, Sample 1.
9. Smartdust Network For Tactical Border Surveillance Using Multiple Signatures
www.iosrjournals.org 9 | Page
Figure 11: Monitoring mote displaying intrusion, Sample 2.
The system also displays a graph, Fig.12 that indicates the intrusion history by showing which mote has
displayed the intrusion on the press of a switch. It approximately gives an idea as to where or near which mote
the intrusion is maximum.
Figure 12: Graph showing intrusion history
VI. System features
Relying on the concept of using smartdust networks in border surveillance, thousands of motes may be
deployed in any terrain conditions, even inside a dense forest where satellite monitoring is impossible. The
smartdusts does not require any maintenance as once deployed they can run for many years. They are not easily
prone to enemy detection compared to their conventional counterparts. Variety of onboard sensors makes the
mote to identify any kind of intrusion, humans, machines or vehicles. The intrusion path can be tracked using
wireless communication between motes. Low power 32-bit ARM Cortex-M3 microcontroller enables the mote
to be operated for years from battery power. A portable monitoring node with graphics LCD is used for easy UI
where the intrusion path will be plotted graphically and alarm is raised.
VII. Conclusion
The proposed system of smartdusts for border surveillance applications was designed, developed and
tested in the laboratory. Few suggestions for the betterment of the project would be to make a distinction
between animals or humans that is intruding based on the comparison of temperatures. PIR sensor can make out
the difference in the body temperatures or the heat from animal and human bodies. Another major point of
apprehension would be the availability of the smartdust chips.Smartdust motes are not yet available on a large
scale and even if they do most of the motes are of the size of a deck of cards. We could hope for the future
motes to be of dust size at the same time available at a reasonable rate.The key downsides of using smartdust
networks in border surveillance is the pollution it causes because once deployed the smartdust mote remain in
the soil for years. Therefore, let us hope for greener smartdust mote circuits to be developed on a large scale.
Also, solar powered batteries can be of great benefit to the smartdust circuits as the circuits once deployed must
remain in soil for years without maintenance. Another area of enhancement that we could suggest is that the
smartdust motes could be made to give details such as the position of the intrusion and the weather conditions at
the place of intrusion.
References
[1] Doug Steel, Smartdust, UH ISRC Technology briefing, March 2005.
[2] Pratap.P, Kallberg J.M, Thomas L.A,Challenges of remote border monitoring, 2010 IEEE International Conference on Technologies
for Homeland Security (HST)
[3] Nohara, T.J;A commercial approach to successful persistent radar surveillance of sea, air and land along the northern Border, 2010
IEEE International Conference on Technologies for Homeland Security (HST)
[4] Neumann, C.; Weiss, G.; Wahlen, A.; Brehm, T:Ground Surveillance With Mmw Radar For Border Control And Camp Protection
Applications, EuropeanMicrowave Conference, 2007.
10. Smartdust Network For Tactical Border Surveillance Using Multiple Signatures
www.iosrjournals.org 10 | Page
[5] Pratap, P.; Kallberg, J.M.; Thomas, L.A;Challenges Of Remote Border Monitoring, 2010 IEEE International Conference on
Technologies for Homeland Security (HST)
[6] Girard, A.R.; Howell, A.S.; Hedrick, J.K;Border Patrol And Surveillance Missions Using Multiple Unmanned Air Vehicles, 2004.
CDC. 43rd IEEE Conference on Decision and Control
[7] Owen, Arch; Duckworth, Gregory; Worsley, Jerry, Optasense: Fibre Optic Distributed Acoustic Sensing For Border Monitoring,
2012 EuropeanIntelligence and Security Informatics Conference (EISIC)
[8] ShyamSadasivan, An introduction to the ARM Cortex-M3 Processor, October 2006, Open journal
[9] Cortex-M3 Technical reference manual from ARM, 2010, http://www.arm.com
[10] NXP Semiconductors, KMA199E, Programmable sensor, Rev.01-18, October 2007, http://www.nxp.com
[11] Knowles Acoustics, SPM0404HESH-PB specification, 2009
[12] SB0081, Product manual
[13] Phidgets, 1104_0_product_manual_September 30, 2009
[14] IEEE, MRF24J40, http://www.microchip.com
[15] PCD85441,ProductSpecification,1999, http://www.semiconductors.phillips.com