SlideShare a Scribd company logo
1 of 20
SMART WORK-ASSISTING GEAR
Aruna Benny
Roll.no:NIE15CS006
Seminar Guide: Remya
Raveendran
CONTENT
 Abstract
 Introduction
 Literature Survey
 Methodology Used
 Advantages and Disadvantages
 Future Scope
 Conclusion
 References
ABSTRACT
 This describes the use of IoT hardware and protocols.
 This gear is a wearable glove device
 which can be used in various work spaces where power tools
are being constantly used.
 This proposed system is built around a micro-processor
acting as the central server.
 At the same time many sensors are interfaced with
microcontrollers.
 which act as the link for data transmission and perform
various tasks.
ABSTRACT CONTD...
 The gloves contain safety features.
 So workers are unable to use any dangerous power tools
without wearing proper equipment.
 A simple sweep based camera module is used.
 To live-stream the captured video whenever any power tool
is switched On.
 This system proliferates the value of safety of a worker in a
factory floor.
INTRODUCTION
 Power tools became a very important part of the factory
floor.
 Everyday, millions of people go to work and operate
potentially life threatening machines.
 Injuries in power tool related accidents, results a huge loss
of precious work-force and other resources.
 The idea of Connected Machines is an appealing one.
 It can be applied to the large as well as small scale
machines.
 Internet-of-Things provides safety and improves efficiency
with help of the aforementioned ideas .
LITERATURE SURVEY
 There have been a few attempts at building devices for
factory workers like the Australian SmartCap
Which measures brain activity to detect fatigue.
 AIG, reportedly invested in Human Condition Safety(HCS), a
company which makes wearable devices.
monitor the workers in a factory.
 There has been no significant product that directly monitors
the physical safety of the factory floor workers.
ADVANTAGES & DISADVANTAGES OF
EXISTING SYSTEM
Advantages
 help to increases employee
productivity.
 Wearables can help keep
employees safe.
 Flexibility
 Work from anywhere.
 Convenience.
 Enhanced communication.
 Faster information process.
 Greater information accuracy.
 Automated reminders.
 Benefits administration.
 No drug level monitoring.
Disadvantages
 Some privacy concerns
regarding wearables.
 Equipments can be
heavy/Expensive.
 Can cause irritation in heat,
side effects such as
headache.
 Human error during
information input
 Need specialized knowledge.
 Fear of loss of confidential
data.
 Costly technology to update
the system.
METHODOLOGY USED
 Wearable can be included in any type of protective gear.
 Screen on the wearable and physical button allows which
machine wants to work with.
 This data and data from sensors allows Raspberry Pi to make
decisions.
 A self-built capacitive sensor monitors if it is worn or not.
 Wearable is provided a piece of protective gear.
 Any additional gear required to be worn for specific machine will
have just the capacitive sensor.
 This is analyzed by microcontroller.
 Which act as an MQTT client.
 Client send information to be server on the Raspberry Pi (MQTT
broker).
MQTT BROKER-CLIENT WORKING
MQTT
 Message Queue Telemetry Transport
 ISO standard (ISO/IEC PRF 20922) Publish-Subscribe-based
“Light Weight” messaging protocol.
 For used on the top of TCP/IP protocol.
 Designed for connections with remote locations where a “small
code footprint” is required .
 Or the network bandwidth is limited.
 Publish-Subscribe message pattern requires a message broker.
 They are responsible for distributing messages to interested
clients.
 MQTT is highly secure IoT protocol.
 Used to implement smart devices.
 Requires broker/centralized server to act as a communication
link between all the connected device in the system.
MQTT CONT...
 Raspberry Pi  microprocessor  broker.
 Due to the small footprint of MQTT the data packets size are
smaller.
• Transmission of data takes lower time other IoT protocols.
• Consumer much less power during operations.
 In compared with HTTP gigabit network  5100 ms/request,
MQTT’s average Publish-Subscribe latency  120 ms/loopback
request.
 It is dependent on the availability of WiFi/plugged internet.
 Due to which it has low range.
 Can only be used in a local network in one isolated institution.
 In which the operations of power tools are not going to be shared
outside the work place.
MQTT CONT...
 It has several modes of usage.
 PUBLISH function  to send data to one of the channels.
 SUBSCRIBE function  to listen to the channel and receive
the transmitted data.
 It consumes less power.
 As it is being used in QoS 2 mode
 The data is received is highly secure and not damaged in
any possible way.
 QoS 2 mode increases the overall time of operation, but
increases the safety of the system.
 Due to the small size of data
 the overall increase in time is very low
 and the quality of the system is not hampered.
METHODOLOGY USED CONTD...
 Machines also have various sensors including temperature,
pressure, humidity etc.
 Which regularly send data to the broker.
 These data can be used by company for analysis and improve
the efficiency of factory-floor.
 Depending on the availability of the required machines, the
broker publishes this information to the wearable.
 If all the required conditions are met ,the broker authorizes the
microcontroller inside the machine to turn on the device.
 And the system ensures that the person working with the
machine has the proper equipment on.
 RFID stickers in additionally placed RFID readers ensure that no
tool is working while unattended.
METHODOLOGY CONTD...
METHODOLOGY CONTD...
 Another dimension of safety is that checking the user is injured or
in pain.
 For this, system captures sound from surroundings using a
microphone connected to the Rpi.
 Sounds are captured in every 5s to reduce the load on Raspberry
Pi .
 The sound is then send to Google speech-to-text service using a
simple API call.
 API returns the text of the words spoken.
 This sentiment of this text is then acquired using another API(IBM
Watson API).
 Tone Analyzer which returns various sentiments like sadness,
happiness, anger etc.
 And a score associated with each one of them.
 This is used by our own logistic regression machine learning
algorithm
 To determine if the factory worker is in pain and requires some kind
of immediate assistance.
ADVANTAGES & DISADVANTAGES OF
PROPOSED SYSTEM
Advantages
 Increases the safety of the
system.
 Due to the small size of data,
 overall increase in time is
very low.
 and quality of the system is
not hampered.
 Enhances the quality and
simplicity.
 Cost-effective.
Disadvantages
 Need of hardware and software
maintenance.
 Availability of Wifi/plugged
internet.
 High maintenance cost.
FUTURE SCOPE
 This product is aimed to cut down accidents due to improper
protective gear.
 It is revolutionary product for the manufacturing industry.
 Using the power of IoT and the standard protocol MQTT, the
product is developed.
 That not only ensures safety of personnel working with large
machine, but also the machines themselves.
 It is predicted that, by 2020 the power tools market will be at
34 Billion Dollars globally.
 S.W.A.G aims to reduce the human error and reducing the
chances of accidents.
REFERENCES
 https://ieeexplore.ieee.org/document/8355176
 CPSC: 16 CFR Chapter 2.
 Consumer Product Safety Commission. Power tools Injury
Report, Oct 2017.
 "MQTT Security Fundamentals: TLS /SSL", HiveMQ, 2017.
 W. Wong, "Secure That Microcontroller", Electronic
Design, 2017.
CONCLUSION
 Companies are looking for ways to ensure a greater sense of
security at their factories.
 A safe, cheep alternative is exactly what they are looking for.
 The manufacturing industry is not the only place of use for
S,W.A.G
 Anyone use any type of power tool that requires protective gear to
be worn can use this product.
 It is aimed at large industries
 As well as everyday consumer.
 It is ensured that its adoption rate is high.
 Simple to use and cost-effective.
 By using technologies like the IoT, data analytics and RFID, it
ensured the standard of factory-floor.
THANK YOU
ARUNA BENNY

More Related Content

What's hot

FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREFINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREMichael George
 
Introduction To Embedded Systems
Introduction To Embedded SystemsIntroduction To Embedded Systems
Introduction To Embedded SystemsVishwa Mohan
 
Esd notes iae
Esd notes iaeEsd notes iae
Esd notes iaeMuru Gan
 
Wireless e-passport using smart card technology
Wireless e-passport using smart card technologyWireless e-passport using smart card technology
Wireless e-passport using smart card technologyIRJET Journal
 
The interconnecting mechanism for monitoring regular domestic condition
The interconnecting mechanism for monitoring regular domestic conditionThe interconnecting mechanism for monitoring regular domestic condition
The interconnecting mechanism for monitoring regular domestic conditioneSAT Publishing House
 
To protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyTo protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyeSAT Journals
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoTIRJET Journal
 
IRJET - Raspberry Pi based Intelligent Security System
IRJET -  	  Raspberry Pi based Intelligent Security SystemIRJET -  	  Raspberry Pi based Intelligent Security System
IRJET - Raspberry Pi based Intelligent Security SystemIRJET Journal
 
EMBEDDED BASED REMOTE ACCESS AND CONTROL SYSTEM THROUGH 3G COMMUNICATION
EMBEDDED BASED REMOTE ACCESS AND CONTROL SYSTEM THROUGH 3G COMMUNICATIONEMBEDDED BASED REMOTE ACCESS AND CONTROL SYSTEM THROUGH 3G COMMUNICATION
EMBEDDED BASED REMOTE ACCESS AND CONTROL SYSTEM THROUGH 3G COMMUNICATIONAM Publications
 
IRJET- Monitoring and Control of PLC based Automation System Parameters using...
IRJET- Monitoring and Control of PLC based Automation System Parameters using...IRJET- Monitoring and Control of PLC based Automation System Parameters using...
IRJET- Monitoring and Control of PLC based Automation System Parameters using...IRJET Journal
 
INDUSTRIAL SECURITY SYSTEM PROJECTS ABSTRACT:Industrial safety measures syste...
INDUSTRIAL SECURITY SYSTEM PROJECTS ABSTRACT:Industrial safety measures syste...INDUSTRIAL SECURITY SYSTEM PROJECTS ABSTRACT:Industrial safety measures syste...
INDUSTRIAL SECURITY SYSTEM PROJECTS ABSTRACT:Industrial safety measures syste...ASHOKKUMAR RAMAR
 
Secured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasSecured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasIRJET Journal
 
IRJET- An IoT based Remote HRV Monitoring System for Hypertensive Patients
IRJET-  	  An IoT based Remote HRV Monitoring System for Hypertensive PatientsIRJET-  	  An IoT based Remote HRV Monitoring System for Hypertensive Patients
IRJET- An IoT based Remote HRV Monitoring System for Hypertensive PatientsIRJET Journal
 
Review of Online Monitoring of status of air for Automation with alarm
Review of Online Monitoring of status of air for Automation with alarmReview of Online Monitoring of status of air for Automation with alarm
Review of Online Monitoring of status of air for Automation with alarmiosrjce
 
IRJET- Implementation of Cloud based Health Care Monitoring System using IoT
IRJET-  	  Implementation of Cloud based Health Care Monitoring System using IoTIRJET-  	  Implementation of Cloud based Health Care Monitoring System using IoT
IRJET- Implementation of Cloud based Health Care Monitoring System using IoTIRJET Journal
 
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...
IRJET-  	  Smart Security System in Homes using Simple Internet of Things Ena...IRJET-  	  Smart Security System in Homes using Simple Internet of Things Ena...
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...IRJET Journal
 

What's hot (19)

FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREFINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
 
Introduction To Embedded Systems
Introduction To Embedded SystemsIntroduction To Embedded Systems
Introduction To Embedded Systems
 
Esd notes iae
Esd notes iaeEsd notes iae
Esd notes iae
 
Wireless e-passport using smart card technology
Wireless e-passport using smart card technologyWireless e-passport using smart card technology
Wireless e-passport using smart card technology
 
The interconnecting mechanism for monitoring regular domestic condition
The interconnecting mechanism for monitoring regular domestic conditionThe interconnecting mechanism for monitoring regular domestic condition
The interconnecting mechanism for monitoring regular domestic condition
 
To protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyTo protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technology
 
(23 26) siraj pa
(23 26) siraj pa(23 26) siraj pa
(23 26) siraj pa
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
 
IRJET - Raspberry Pi based Intelligent Security System
IRJET -  	  Raspberry Pi based Intelligent Security SystemIRJET -  	  Raspberry Pi based Intelligent Security System
IRJET - Raspberry Pi based Intelligent Security System
 
EMBEDDED BASED REMOTE ACCESS AND CONTROL SYSTEM THROUGH 3G COMMUNICATION
EMBEDDED BASED REMOTE ACCESS AND CONTROL SYSTEM THROUGH 3G COMMUNICATIONEMBEDDED BASED REMOTE ACCESS AND CONTROL SYSTEM THROUGH 3G COMMUNICATION
EMBEDDED BASED REMOTE ACCESS AND CONTROL SYSTEM THROUGH 3G COMMUNICATION
 
IRJET- Monitoring and Control of PLC based Automation System Parameters using...
IRJET- Monitoring and Control of PLC based Automation System Parameters using...IRJET- Monitoring and Control of PLC based Automation System Parameters using...
IRJET- Monitoring and Control of PLC based Automation System Parameters using...
 
Ppt embedded systems
Ppt embedded systemsPpt embedded systems
Ppt embedded systems
 
INDUSTRIAL SECURITY SYSTEM PROJECTS ABSTRACT:Industrial safety measures syste...
INDUSTRIAL SECURITY SYSTEM PROJECTS ABSTRACT:Industrial safety measures syste...INDUSTRIAL SECURITY SYSTEM PROJECTS ABSTRACT:Industrial safety measures syste...
INDUSTRIAL SECURITY SYSTEM PROJECTS ABSTRACT:Industrial safety measures syste...
 
Secured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasSecured Spy for Highly Secured Areas
Secured Spy for Highly Secured Areas
 
IRJET- An IoT based Remote HRV Monitoring System for Hypertensive Patients
IRJET-  	  An IoT based Remote HRV Monitoring System for Hypertensive PatientsIRJET-  	  An IoT based Remote HRV Monitoring System for Hypertensive Patients
IRJET- An IoT based Remote HRV Monitoring System for Hypertensive Patients
 
IJISET_V2_I6_90
IJISET_V2_I6_90IJISET_V2_I6_90
IJISET_V2_I6_90
 
Review of Online Monitoring of status of air for Automation with alarm
Review of Online Monitoring of status of air for Automation with alarmReview of Online Monitoring of status of air for Automation with alarm
Review of Online Monitoring of status of air for Automation with alarm
 
IRJET- Implementation of Cloud based Health Care Monitoring System using IoT
IRJET-  	  Implementation of Cloud based Health Care Monitoring System using IoTIRJET-  	  Implementation of Cloud based Health Care Monitoring System using IoT
IRJET- Implementation of Cloud based Health Care Monitoring System using IoT
 
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...
IRJET-  	  Smart Security System in Homes using Simple Internet of Things Ena...IRJET-  	  Smart Security System in Homes using Simple Internet of Things Ena...
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...
 

Similar to Assisting gear

IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET Journal
 
Dharshan INTERNSHIP PPT-1.pptx
Dharshan INTERNSHIP PPT-1.pptxDharshan INTERNSHIP PPT-1.pptx
Dharshan INTERNSHIP PPT-1.pptxVinayakHiremath29
 
IRJET-5G Mobile Technology
IRJET-5G Mobile TechnologyIRJET-5G Mobile Technology
IRJET-5G Mobile TechnologyIRJET Journal
 
Energy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoTEnergy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoTIJEACS
 
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET Journal
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Industrial Internet of Things (IIOT)
Industrial Internet of Things (IIOT)Industrial Internet of Things (IIOT)
Industrial Internet of Things (IIOT)Ikbal Ahmed
 
IRJET - IoT based Advanced Home Automation
IRJET -  	  IoT based Advanced Home AutomationIRJET -  	  IoT based Advanced Home Automation
IRJET - IoT based Advanced Home AutomationIRJET Journal
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET Journal
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET Journal
 
IRJET- Real Time Analysis of Patient Health Monitoring and Home Automation us...
IRJET- Real Time Analysis of Patient Health Monitoring and Home Automation us...IRJET- Real Time Analysis of Patient Health Monitoring and Home Automation us...
IRJET- Real Time Analysis of Patient Health Monitoring and Home Automation us...IRJET Journal
 
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)IRJET Journal
 
IRJET- IoT based Home Automation and Smart Security System
IRJET- IoT based Home Automation and Smart Security SystemIRJET- IoT based Home Automation and Smart Security System
IRJET- IoT based Home Automation and Smart Security SystemIRJET Journal
 
IRJET- Multiple Motion Control System of Robotic Car Based on IoT
IRJET- Multiple Motion Control System of Robotic Car Based on IoTIRJET- Multiple Motion Control System of Robotic Car Based on IoT
IRJET- Multiple Motion Control System of Robotic Car Based on IoTIRJET Journal
 
Study on Smart Security Technology for Women based on IOT
Study on Smart Security Technology for Women based on IOTStudy on Smart Security Technology for Women based on IOT
Study on Smart Security Technology for Women based on IOTIRJET Journal
 
Internet of Things (Iot) Based Robotic Arm
Internet of Things (Iot) Based Robotic ArmInternet of Things (Iot) Based Robotic Arm
Internet of Things (Iot) Based Robotic ArmIRJET Journal
 
IRJET- Voice Based Home Automation System using Raspberry Pi
IRJET-  	  Voice Based Home Automation System using Raspberry PiIRJET-  	  Voice Based Home Automation System using Raspberry Pi
IRJET- Voice Based Home Automation System using Raspberry PiIRJET Journal
 
IRJET- Theft Control using IoT
IRJET-  	  Theft Control using IoTIRJET-  	  Theft Control using IoT
IRJET- Theft Control using IoTIRJET Journal
 
IRJET- Ambient Reflector– An IoT based Smart Notice Board System
IRJET-  	  Ambient Reflector– An IoT based Smart Notice Board SystemIRJET-  	  Ambient Reflector– An IoT based Smart Notice Board System
IRJET- Ambient Reflector– An IoT based Smart Notice Board SystemIRJET Journal
 

Similar to Assisting gear (20)

IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
 
Dharshan INTERNSHIP PPT-1.pptx
Dharshan INTERNSHIP PPT-1.pptxDharshan INTERNSHIP PPT-1.pptx
Dharshan INTERNSHIP PPT-1.pptx
 
IRJET-5G Mobile Technology
IRJET-5G Mobile TechnologyIRJET-5G Mobile Technology
IRJET-5G Mobile Technology
 
Energy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoTEnergy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoT
 
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital Assistants
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Industrial Internet of Things (IIOT)
Industrial Internet of Things (IIOT)Industrial Internet of Things (IIOT)
Industrial Internet of Things (IIOT)
 
IRJET - IoT based Advanced Home Automation
IRJET -  	  IoT based Advanced Home AutomationIRJET -  	  IoT based Advanced Home Automation
IRJET - IoT based Advanced Home Automation
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
IRJET- Real Time Analysis of Patient Health Monitoring and Home Automation us...
IRJET- Real Time Analysis of Patient Health Monitoring and Home Automation us...IRJET- Real Time Analysis of Patient Health Monitoring and Home Automation us...
IRJET- Real Time Analysis of Patient Health Monitoring and Home Automation us...
 
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
 
Industrial Iot and Legacy Scada system - the solution for future ?
Industrial Iot and Legacy Scada system - the solution for future ?Industrial Iot and Legacy Scada system - the solution for future ?
Industrial Iot and Legacy Scada system - the solution for future ?
 
IRJET- IoT based Home Automation and Smart Security System
IRJET- IoT based Home Automation and Smart Security SystemIRJET- IoT based Home Automation and Smart Security System
IRJET- IoT based Home Automation and Smart Security System
 
IRJET- Multiple Motion Control System of Robotic Car Based on IoT
IRJET- Multiple Motion Control System of Robotic Car Based on IoTIRJET- Multiple Motion Control System of Robotic Car Based on IoT
IRJET- Multiple Motion Control System of Robotic Car Based on IoT
 
Study on Smart Security Technology for Women based on IOT
Study on Smart Security Technology for Women based on IOTStudy on Smart Security Technology for Women based on IOT
Study on Smart Security Technology for Women based on IOT
 
Internet of Things (Iot) Based Robotic Arm
Internet of Things (Iot) Based Robotic ArmInternet of Things (Iot) Based Robotic Arm
Internet of Things (Iot) Based Robotic Arm
 
IRJET- Voice Based Home Automation System using Raspberry Pi
IRJET-  	  Voice Based Home Automation System using Raspberry PiIRJET-  	  Voice Based Home Automation System using Raspberry Pi
IRJET- Voice Based Home Automation System using Raspberry Pi
 
IRJET- Theft Control using IoT
IRJET-  	  Theft Control using IoTIRJET-  	  Theft Control using IoT
IRJET- Theft Control using IoT
 
IRJET- Ambient Reflector– An IoT based Smart Notice Board System
IRJET-  	  Ambient Reflector– An IoT based Smart Notice Board SystemIRJET-  	  Ambient Reflector– An IoT based Smart Notice Board System
IRJET- Ambient Reflector– An IoT based Smart Notice Board System
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Assisting gear

  • 1. SMART WORK-ASSISTING GEAR Aruna Benny Roll.no:NIE15CS006 Seminar Guide: Remya Raveendran
  • 2. CONTENT  Abstract  Introduction  Literature Survey  Methodology Used  Advantages and Disadvantages  Future Scope  Conclusion  References
  • 3. ABSTRACT  This describes the use of IoT hardware and protocols.  This gear is a wearable glove device  which can be used in various work spaces where power tools are being constantly used.  This proposed system is built around a micro-processor acting as the central server.  At the same time many sensors are interfaced with microcontrollers.  which act as the link for data transmission and perform various tasks.
  • 4. ABSTRACT CONTD...  The gloves contain safety features.  So workers are unable to use any dangerous power tools without wearing proper equipment.  A simple sweep based camera module is used.  To live-stream the captured video whenever any power tool is switched On.  This system proliferates the value of safety of a worker in a factory floor.
  • 5. INTRODUCTION  Power tools became a very important part of the factory floor.  Everyday, millions of people go to work and operate potentially life threatening machines.  Injuries in power tool related accidents, results a huge loss of precious work-force and other resources.  The idea of Connected Machines is an appealing one.  It can be applied to the large as well as small scale machines.  Internet-of-Things provides safety and improves efficiency with help of the aforementioned ideas .
  • 6. LITERATURE SURVEY  There have been a few attempts at building devices for factory workers like the Australian SmartCap Which measures brain activity to detect fatigue.  AIG, reportedly invested in Human Condition Safety(HCS), a company which makes wearable devices. monitor the workers in a factory.  There has been no significant product that directly monitors the physical safety of the factory floor workers.
  • 7. ADVANTAGES & DISADVANTAGES OF EXISTING SYSTEM Advantages  help to increases employee productivity.  Wearables can help keep employees safe.  Flexibility  Work from anywhere.  Convenience.  Enhanced communication.  Faster information process.  Greater information accuracy.  Automated reminders.  Benefits administration.  No drug level monitoring. Disadvantages  Some privacy concerns regarding wearables.  Equipments can be heavy/Expensive.  Can cause irritation in heat, side effects such as headache.  Human error during information input  Need specialized knowledge.  Fear of loss of confidential data.  Costly technology to update the system.
  • 8. METHODOLOGY USED  Wearable can be included in any type of protective gear.  Screen on the wearable and physical button allows which machine wants to work with.  This data and data from sensors allows Raspberry Pi to make decisions.  A self-built capacitive sensor monitors if it is worn or not.  Wearable is provided a piece of protective gear.  Any additional gear required to be worn for specific machine will have just the capacitive sensor.  This is analyzed by microcontroller.  Which act as an MQTT client.  Client send information to be server on the Raspberry Pi (MQTT broker).
  • 10. MQTT  Message Queue Telemetry Transport  ISO standard (ISO/IEC PRF 20922) Publish-Subscribe-based “Light Weight” messaging protocol.  For used on the top of TCP/IP protocol.  Designed for connections with remote locations where a “small code footprint” is required .  Or the network bandwidth is limited.  Publish-Subscribe message pattern requires a message broker.  They are responsible for distributing messages to interested clients.  MQTT is highly secure IoT protocol.  Used to implement smart devices.  Requires broker/centralized server to act as a communication link between all the connected device in the system.
  • 11. MQTT CONT...  Raspberry Pi  microprocessor  broker.  Due to the small footprint of MQTT the data packets size are smaller. • Transmission of data takes lower time other IoT protocols. • Consumer much less power during operations.  In compared with HTTP gigabit network  5100 ms/request, MQTT’s average Publish-Subscribe latency  120 ms/loopback request.  It is dependent on the availability of WiFi/plugged internet.  Due to which it has low range.  Can only be used in a local network in one isolated institution.  In which the operations of power tools are not going to be shared outside the work place.
  • 12. MQTT CONT...  It has several modes of usage.  PUBLISH function  to send data to one of the channels.  SUBSCRIBE function  to listen to the channel and receive the transmitted data.  It consumes less power.  As it is being used in QoS 2 mode  The data is received is highly secure and not damaged in any possible way.  QoS 2 mode increases the overall time of operation, but increases the safety of the system.  Due to the small size of data  the overall increase in time is very low  and the quality of the system is not hampered.
  • 13. METHODOLOGY USED CONTD...  Machines also have various sensors including temperature, pressure, humidity etc.  Which regularly send data to the broker.  These data can be used by company for analysis and improve the efficiency of factory-floor.  Depending on the availability of the required machines, the broker publishes this information to the wearable.  If all the required conditions are met ,the broker authorizes the microcontroller inside the machine to turn on the device.  And the system ensures that the person working with the machine has the proper equipment on.  RFID stickers in additionally placed RFID readers ensure that no tool is working while unattended.
  • 15. METHODOLOGY CONTD...  Another dimension of safety is that checking the user is injured or in pain.  For this, system captures sound from surroundings using a microphone connected to the Rpi.  Sounds are captured in every 5s to reduce the load on Raspberry Pi .  The sound is then send to Google speech-to-text service using a simple API call.  API returns the text of the words spoken.  This sentiment of this text is then acquired using another API(IBM Watson API).  Tone Analyzer which returns various sentiments like sadness, happiness, anger etc.  And a score associated with each one of them.  This is used by our own logistic regression machine learning algorithm  To determine if the factory worker is in pain and requires some kind of immediate assistance.
  • 16. ADVANTAGES & DISADVANTAGES OF PROPOSED SYSTEM Advantages  Increases the safety of the system.  Due to the small size of data,  overall increase in time is very low.  and quality of the system is not hampered.  Enhances the quality and simplicity.  Cost-effective. Disadvantages  Need of hardware and software maintenance.  Availability of Wifi/plugged internet.  High maintenance cost.
  • 17. FUTURE SCOPE  This product is aimed to cut down accidents due to improper protective gear.  It is revolutionary product for the manufacturing industry.  Using the power of IoT and the standard protocol MQTT, the product is developed.  That not only ensures safety of personnel working with large machine, but also the machines themselves.  It is predicted that, by 2020 the power tools market will be at 34 Billion Dollars globally.  S.W.A.G aims to reduce the human error and reducing the chances of accidents.
  • 18. REFERENCES  https://ieeexplore.ieee.org/document/8355176  CPSC: 16 CFR Chapter 2.  Consumer Product Safety Commission. Power tools Injury Report, Oct 2017.  "MQTT Security Fundamentals: TLS /SSL", HiveMQ, 2017.  W. Wong, "Secure That Microcontroller", Electronic Design, 2017.
  • 19. CONCLUSION  Companies are looking for ways to ensure a greater sense of security at their factories.  A safe, cheep alternative is exactly what they are looking for.  The manufacturing industry is not the only place of use for S,W.A.G  Anyone use any type of power tool that requires protective gear to be worn can use this product.  It is aimed at large industries  As well as everyday consumer.  It is ensured that its adoption rate is high.  Simple to use and cost-effective.  By using technologies like the IoT, data analytics and RFID, it ensured the standard of factory-floor.