International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
What is computer Introduction to Computing Ahmad Idrees
Computers make it easier to do a lot of things, but most of the things they make it easier to do don't need to be done.
Computers are useless. They can only give you answers.
What is computer Introduction to Computing Ahmad Idrees
Computers make it easier to do a lot of things, but most of the things they make it easier to do don't need to be done.
Computers are useless. They can only give you answers.
Element Management System - www.nocvue.comkantey007
Nocvue is an industry leader among Element Management System (EMS) and Network Management System (NMS),Element Management System Company,Ems Company,Nms Companies,Nms Company,Ems Companies.
www.nocvue.com
Contacts : 88 Cottontail Lane, Suite 420,
Somerset, NJ, USA,
Telephone:+1 (732) 981-0611
marketing_sales@velankani.com
A Presentation on raspberry pi. The newest presentation, it includes Raspberry Pi 2 Model B and Model A+.
Price comparison as well as technologies used.
Seminar report on Raspberry Pi, submitted in SEMINAR subject of GTU Gujarat Technological University by Nipun Parikh from Bhagwan Mahavir College of Engineering & Technology
Device to-device communication (pen drive) without pcIJARIIT
In present days, computers and laptops have become an inseparable part of our busy lives. One of the commonly
used devices for data transfers is Universal Serial Bus (USB) flash drives. Due to emerging technology, USB devices are
shrinking in size day by day, but not the equipment’s which is required to access them. Data transfer using portable devices is
the most important factor in today's scenario. Data transfer between two pen drives is generally done using laptops or desktops.
But it is not always possible to carry such a large size device to the particular location. So, to overcome this problem, we are
designing a hardware which is more compact to carry anywhere. With the help of this project we cannot only transfer the data
between devices but also, we can see the transfer of the particular file which we want to send by using LCD display. This
system pen drive to pen drive data transfer without PC is done by using Raspberry Pi. The pen drives are connected to USB
module through USB hub, the communication between two pen drives is done by using Raspberry Pi. Using this System, the
data transfer can be done from any place in the world.
Abstract: In present days, computers and laptops have become an inseparable part of our busy lives. One of the commonly
used devices for data transfers is Universal Serial Bus (USB) flash drives. Due to emerging technology, USB devices are
shrinking in size day by day, but not the equipment’s which is required to access them. Data transfer using portable devices is
the most important factor in today's scenario. Data transfer between two pen drives is generally done using laptops or desktops.
But it is not always possible to carry such a large size device to the particular location. So, to overcome this problem, we are
designing a hardware which is more compact to carry anywhere. With the help of this project we cannot only transfer the data
between devices but also, we can see the transfer of the particular file which we want to send by using LCD display. This
system pen drive to pen drive data transfer without PC is done by using Raspberry Pi. The pen drives are connected to USB
module through USB hub, the communication between two pen drives is done by using Raspberry Pi. Using this System, the
data transfer can be done from any place in the world.
The world of information technology and communication is moving towards standardization of hardware
ports. All kind of communication is now using USB as the port as it is universally recognized hardware
medium of data communication. It is become flexible and easy to use kind of things with portable USB
storage devices to copy data from one system to another system. It is possible to copy data within seconds
with the help of portable USB flash memory devices. It has leaded insecurity of data storage on computer
system. Various surveys has shown after network copy only USB data copy has made data insecure on
computer . It is also the source of malwares in the system. To disable the USB ports is not the solution to
this problem because almost all peripheral devices now uses the USB ports for communication. So, we have
implemented a system which has complete USB storage enable and disable control for Linux operating
system. The administrator will decide the storage devices connected to USB must be enabled or disabled .
We experimented the algorithm on Linux kernel version 3.11 onwards on Debian based linux distributions.
We have got 100% success rate of the said system with zero percent performance degradation.
USB 3.0 is the third major version of the Universal Serial Bus (USB) standard for interfacing computers and electronic devices. Among other improvements, USB 3.0 adds the new transfer rate referred to as SuperSpeed USB (SS) that can transfer data at up to 5 Gbit/s (625 MB/s), which is about ten times as fast as the USB 2.0 standard.
https://peoplelaptop.com/how-usb-ports-work/
How USB Ports Work: The Tiny Tech Powerhouse.Today, we're going on a deep dive into the world of USB ports, exploring their inner workings and what makes them so darn useful.
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
The paper addresses the importance of welding design to prevent corrosion at steel. Welding is
used to join pipe, profiles at bridges, spindle, and a lot more part of engineering construction. The
problems happened associated with welding are common issues in these fields, especially corrosion.
Corrosion can be reduced with many methods, they are painting, controlling humidity, and also good
welding design. In the research, it can be found that reducing residual stress on the welding can be
solved in corrosion rate reduction problem.
Preheating on 500oC and 600oC give better condition to reduce corosion rate than condition after
preheating 400oC. For all welding groove type, material with 500oC and 600oC preheating after 14 days
corrosion test is 0,5%-0,69% lost. Material with 400oC preheating after 14 days corrosion test is 0,57%-0,76%
lost.
Welding groove also influence corrosion rate. X and V type welding groove give better condition to reduce
corrosion rate than use 1/2V and 1/2 X welding groove. After 14 days corrosion test, the samples with
X welding groove type is 0,5%-0,57% lost. The samples with V welding groove after 14 days corrosion test is
0,51%-0,59% lost. The samples with 1/2V and 1/2X welding groove after 14 days corrosion test is 0,58%-
0,71% lost.
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
One of the major environmental concerns is the disposal of the waste materials and utilization of
industrial by products. Lime stone quarries will produce millions of tons waste dust powder every year. Having
considerable high degree of fineness in comparision to cement this material may be utilized as a partial
replacement to cement. For this purpose an experiment is conducted to investigate the possibility of using lime
stone powder in the production of SCC with combined use GGBS and how it affects the fresh and mechanical
properties of SCC. First SCC is made by replacing cement with GGBS in percentages like 10, 20, 30, 40, 50 and
by taking the optimum mix with GGBS lime stone powder is blended to mix in percentages like 5, 10, 15, 20 as
a partial replacement to cement. Test results shows that the SCC mix with combination of 30% GGBS and 15%
limestone powder gives maximum compressive strength and fresh properties are also in the limits prescribed by
the EFNARC.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
1. International Journal of Engineering Research and Development
ISSN: 2278-067X, Volume 1, Issue 6 (June 2012), PP.25-34
www.ijerd.com
USB TO USB Data Transfer without PC
Aniket Gundecha1, Milap Patel2, Saurabh Mehta3
1,2,3
E&TC Department, Maharashtra Academy of Engineering, Alandi (D), Pune.
Abstract—The Computer has become an inseparable part of life for many people in the world. Its innumerable uses have
changed the life of many, not only in technical field but also in non-technical field. Moreover, now-a-days, with
increasing use of the computer, people are getting well aware of the peripherals that are associated with it. These
peripherals give additional features to the already existing functionalities of the computer, while some enhance them.
Along with the advancements in capabilities of the Computer, the capabilities of these peripherals have also been
improved, thus, making it simpler and more user-friendly for the user. Gradually, using the computer has become very
easy these days. To make it even more simple, the interfacing of the peripherals with the computer have also changed and
improved a lot. The main idea of this project is related to one such peripheral the USB. This user friendly device is
actually recognized by its Connection type- the BUS; called the Universal Serial Bus. It comprises of just four connection
wires between the Host (Computer) and the Device, governed by a set of rules called the Protocol. The aim of this project
is to transfer data without using a computer, from one USB flash disk to another.
Keywords— USB, FAT, Flash disk, NTFS, VNCL1
I. INTRODUCTION
Several data and application are developed daily which common computer user has to transfer from one USB
Flash device into another, with the minimum wastage of time. For this user has to first find a computer then wait for it to
boot up, then plug in his device, and then transfer the data. Different types of USB ash devices are used now-a-days. It is
not necessary that all of these devices are supported by the computer and the operating system and their device drivers
are available and installed.
Carrying a computer or a laptop just for the sake of data transfer is not affordable these days in the age when
people want all devices to be handy. More- over, transferring data via a computer involves a lot of power to be wasted,
since the computer has to be entirely functional before it can transfer data. Also, the threat of viruses and malware has
made the life of computer users more complicated. These viruses get activated as soon as the device is plugged into the
system and get copied along with other data from one ash device into another. Our project here can provide a valuable
solution to all problems faced by person in above situations. Our aim is to build a small and handy device to transfer data
from one USB Flash device to another.
The device will have following features:-
1. Small, lightweight and handy device
2. Powered by 9V battery
3. Support for all USB Flash devices formatted with FAT32 file System
4. Support for USB 2.0
5. Plug and Go function
1.1 Universal Serial Bus (USB)
USB was initially designed to be an interface for communicating with many types of peripherals without the
limits and frustrations of older interfaces. Every recent PC includes USB ports that can connect to standard peripherals
such as keyboards, mice, scanners, cameras, printers, and storage drives. It is a very useful protocol designed for a
computer to communicate with almost any type of peripheral.
Some of its benefits for users include:
1. Single Interface for many devices.
2. Considerably high Data rate.
3. Automatic Configuration.
4. Easy connection.
5. Hot Pluggable.
6. No user Settings.
7. Frees Hardware Resources for other devices.
8. No extra Power Supply needed.
9. Low Cost and Low Power consumption.
Benefits for Developer include:
Versatility.
25
2. USB TO USB Data Transfer without PC
Operating system support.
Peripheral support.
Open source support available online.
1.1.1 Inside USB
As mentioned above, the connection comprises of four Connecting Lines viz.
1. Vcc
2. D-
3. D+
4. Ground
The VCC and Ground are the power supply signals to the device. D+ and D- are the data lines through which
actual data transfer takes place. Both D+ and D- are bidirectional lines, both carrying data in a single direction at a time
and data is modulated into deferential voltage levels to be transferred over them. The directions of D+ and D- are
reversed in TDM manner to transmit and receive data. It is connectivity with peer-to-peer communication.
Table I: USB Variants
Version Introduced Supported Speeds Compatibility
1.0 January1996 Low Speed --
1.1 September1998 Low speed, Full Backward
speed
2.0 April2000 Low Speed, Full USB 1.1, USB
Speed, High Speed 1.0
3.0 December2008 Super Speed USB 2.0
Low Speed has data rate of 1.536Mbits/s, Full Speed has 12Mbits/s, High Speed has 480Mbits/s, Super Speed
has 5Gbits/s[3].
II. LITERATURE REVIEW
A core team from Compaq, Hewlett Packard, Intel, Lucent, Microsoft, NEC and Philips leading the
development of the USB Speciation, version 2.0, that has in-creased data throughput by a factor of 40. This backwards-
compatible extension of the USB 1.1 speciation uses the same cables, connectors and software interfaces so the user will
see no change in the usage model. They will, however, benefit from an additional range of higher performance
peripherals, such as video-conferencing cameras, next-generation scanners and printers, and fast storage devices, with the
same ease-of-use features as todays USB peripherals [1] [2].
1. USB supports three bus speeds: high speed at 480 Megabits/sec., full speed at 12 Megabits/sec., and low speed
at 1.5 Megabits/sec. The USB host controllers in recent PCs support all three speeds [2].
2. The USB Host Controller is in charge of asking every USB device if it has any data to send. Because of this
topology, Device cannot start sending data without being prompted.
3. This justifies the need for a USB Host Controller and its Configuration.
2.1 Idea Innovation
The idea of this project was taken, looking at the problems faced in daily life of Flash Drive Users to transfer the data
from one disk to another. Carrying a computer or a laptop just for the sake of data transfer is not affordable these days in
the age when people want all devices to be as small and handy as possible. Moreover, transferring data via a computer
involves a lot of power to be wasted. There are numerous types of data transactions that are being carried out through
these devices. However to operate these devices most of the times an operating system is required which calls for the
hosts to be extremely complicated system hence accessing these devices requires complicated hardware, hence a
controller that can handle the data transfer and initiates the USB transactions was searched.
III. IMPLEMENTATION DETAILS
3.1 System Block Diagram
The study of block diagram of any system greatly simplifies its design construction so as to understand the
working of the system. The study of the block diagram is very helpful to the designer.
26
3. USB TO USB Data Transfer without PC
Fig. 1 System Block Diagram
ARM (LPC 2138): It is the heart of the system. It is important unit of the system because it reads data which we
programmed and stored into its ROM, then it execute it and controls the display as well as Vinculum VNC1L Embedded
USB Host controller. When key is press it read the data from source pen drive and writes to destination pen drive [5][7].
LCD Display: Frequently, a C program must interact with the outside world using input and output devices that
communicate directly with a human being. One of the most common devices attached to an ARM7 is an LCD display.
Some of the most common LCDs connected to the ARM7 are 16x2 and 20x4 displays. This means 16 characters per line
by 2 lines and 20 characters per line by 4 lines, respectively. It displays events taken into microcontroller step by step
alphanumerically. So it is convenient us to know what is currently running in the system. It displays the start and finish of
the data transfer.
Host Controller (VNC1L): It recognizes the input peripheral as host or slave according to firmware loaded in it. The sub
module physically interfaces with the USB flash drives and is responsible for converting raw data and information to
their proper NRZI encoding as specified by the USB technical specifications. Further-more, the sub module is capable of
encoding or decoding the incoming NRZI data from the USB flash drives and forwards it to their respective sub modules
for further processing. It handles all types of transfer between source destinations. We have USB Host controller which
has two independent USB 2.0 low speed/high speed USB Host ports. Individual ports can be configured as host or slave.
USB Connectors: There are two types of USB connector are available in market, here we use a Type-A USB connector
which is more popular use in almost all application. Another reason to use it is USB flash drive has Type-A USB male
connector.
3.2 USB Host Controller IC - VNC1L
To begin with, selection of the USB host controller IC is to be done. Host controllers can be found in market, in
two types viz. Dedicated IC for USB Host, Slave and device operations, and USB Host controllers included in
microcontrollers. The second most important criteria to look for is the presence of two USB ports on the Host Controller
to avoid the use of buffer and extra hardware. One more feature to look for was support for FAT-32 file system included
hardwired on the Host controller to avoid complications in microcontroller code to decode it. A dedicated USB Host
Controller from Vinculum was found- VNC1L. It has got following features over host controllers included on chip of
General Purpose Microcontrollers:
Two independent USB 2.0 Low speed / Full speed USB Host / Slave ports
Entire USB protocol handled on the chip
8/32bit MCU core
Twin DMA controllers for hardware acceleration
64kB embedded Flash ROM Prog. Memory, 4kB Data SRAM
Interface to MCU / PLD / FPGA via UART/ FIFO/SPI interface
Upto 28 GPIO interface pins for data I/O and command monitor interface
3.3V operation with 5V safe inputs
Selection criteria for VNC1L:
Twin Host Controllers inbuilt
Availability of Twin DMA controllers
Availability of ready VDAP
NCU- 32bit Numeric Co-processor Unit for handling of FAT32 file system
Handles entire USB protocol On Chip
27
4. USB TO USB Data Transfer without PC
3.3 VNC1L Block Diagram
Fig. 2 VNC1L Block Diagram, This IC is works as USB host. It can interface with the ARM processor and with help of
that we transfer data through one pen drive to other
USB Flash Disk: These are source and target Devices. They will be connected to the USB Host Controller IC via the
USB interface. Both the devices can be accessed simultaneously. The memory on them is in the form of Flash which is
accessed by an on board hardware. These devices have also got protocol handling hardware included on device.
Before making the devices available for use, the Operating system formats the device with a file format. FAT-8,
FAT-16, FAT-32, NTFS, are some file systems available in Microsoft Operating Systems. Majority of USB Flash
devices are formatted in FAT-32 file system. There may sometimes be Partitions on the drive. Data encrypted with all
above formats can be accessed with an efficient Firmware on the USB Host Controller.
USB Host Controller IC: This is a microcontroller which has an interface to connect a USB device. It has a Central
Processing Unit of its own. The requirement here is of 2 USB ports. It is the main device that handles the USB protocol
and does the jobs of the USB host. It may contain an Operating System and also device drivers to interact with the device.
It will be responsible for creation of endpoints, establishment of pipes, initiating transfers, enumeration etc. We can
preferably look for capability like DMA so that CPU remains free while Data transfer [8].
IV. METHODOLOGY
USB interfaces are everywhere today, with low cost ash memory drives and all kinds of USB peripherals being
readily available, but these are very much focused on the pc market. Attempt however to make use of these peripherals in
the 8-and 16bit embedded market, and you find that implementation, cost and power consumption become major
considerations.
Part of this is down to the embedded controllers that are used in such systems. Devices such as the LPC2138
family of controllers from PHILIPS are widely used with a broad range of memory densities and peripherals, but they
lack the interfaces, resources and performance to incorporate a USB host controller.
In this example application, a VNC1L Vinculum controller provides the interface between the LPC2138 as the
system controller and a USB2.0 full speed port. This allows a USB flash memory drive connection.
Vinculum is specifically targeted at the embedded USB controller market and requires a minimum of external
support components. One key feature of the Vinculum core is that its code length is significantly reduced compared with
common MCU cores. Reducing the code overhead of the core allows much more functionality to be squeezed into the on-
chip e-flash memory.
Using Vinculum to link a small LPC2138 MP to a USB A and USB B connector and hence to a USB flash
drive. Commands and data are sent via TXD (pin 6) to the VNC1L RXD (pin 32). VNC1L handles the FAT 12/16/32 file
creation and data storage on the USB flash drive communicating with the drive via USB2DM and USB2DP on pins 28
and 29. Data is read from the flash drive via the same pins, and sent from the VNC1L TXD (pin 31) to the RXD (pin 5)
of the LPC2138 for use by the system firmware.
The system is controlled by the firmware on the LPC2138, with the transfers controlled by instructions issued
by the LPC2138 and interpreted by the standard firmware on the Vinculum. Whilst that is a simple description of the
system, more is required to complete the design. The devices need power, crystals to control their clocks, and they need
to be programmed. Using a 12MHz crystal on pins 61and 62 of the LPC2138 allows for higher baud rates of up to
28
5. USB TO USB Data Transfer without PC
9600bits/sec in its UART interface as opposed to the maximum 9600 bits/sec achievable by using the internal 8MHz
oscillator, thus improving the performance of the system.
LPC2138 I/O pins10(RXD) and 11(TXD) are used by their firmware to simulate RTS/CTS handshake signals
with the VNC1Ls UART interface.
The VNC1L is shipped as a blank device. It must be programmed (when in boot loader mode) with firmware
before use. It can be programmed either pre-assembly, using the VPROG-1 standalone programmer or programmed in-
circuit via the UART interface. The VNC1L boot loader uses the UART interface to load new firmware into the
Vinculum Flash memory. To enable the boot loader, the PROG pin must be driven low and VNC1L must then be reset by
driving the RESET pin low then high. Run mode can be enabled by driving the PROG pin high and then resetting
VNC1L by driving the RESET pin low then high.
When VNC1L firmware is updated via a microcontroller with a UART, the microcontroller must be capable of
at least 115200 baud. The firmware can be upgraded in to the Flash memory via the UART interface or via a USB
interface.
A 5V regulated PSU at 250mA is required, providing up to 200mA at the USB A connector, 25mA to power
the VNC1L and 25mA to power the LPC2138 VNC1L requires a 3.3V supply which is provided by a 3.3V LDO
regulator, and has 5V tolerant I/O pins which enable it to connect to the LPC2138 without using level shifters.
For low-power applications the VNC1L can be put into a 2mA sleep mode when not required. To wake up the
device, strobe the ring indicator pin ( pin 16) of the UART interface. If this is connected to the RXD line, as here, it can
be triggered by an incoming dummy command to wake up the device. This design also includes a bi-color status LED
indicator powered from pins 16 and 18. This indicates successful enumeration of the USB flash drive and access to the
file system. The VNC1L is programmed with standard firmware, called VDAP (Vinculum Disk and Peripheral) that
interprets the commands coming from the LPC2138. These VDAP commands are DOS-like instructions such as DIR, RD
and WR. The command set also support single byte hex commands which are more suited to control by a microprocessor
[4][6].
For our project point of view we have to use VDFC firmware which enhances the transfer capabilities between
two BOMS type device further details about it explain below.
VDFC Firmware: Figure demonstrates using the VNC1L to connect two BOMS devices using the VDFC Firmware.
The monitor port allows access to either disk and the facility to copy between the disks.
Fig. 3 VNC1L with source and target disks, Figure indicates how source and target disks are connected to VNC1L
4.1 System Flow
The USB Slave to Slave File Transfer Device is a device that facilitates file and folder/directory transfers from
one flash drive to another flash drive using the USB 1.1 interface without the need for a Personal Computer (PC) to act as
mediator.
Figure shows the system setup while figure shows the general block diagram of the system. The system allows
the user to select files or folders/directories for copying from a source flash drive to a user selectable directory in the
destination flash drive. The device also supports a copy all function, which works the same way. Contents of the flash
drives are displayed in their 8.3 filename format thru a twenty character by four lines - sized dot-matrix character liquid
crystal display (LCD). The system is also able to check for identical le/folder/directory names and requests for a user
confirmation to either proceed and overwrite a file/folder/directory or not. In addition, the system is able to check if ther e
is sufficient memory space for the file/folder/directory to be copied onto the destination flash drive; if not, the system
requests the user to delete some files or folder/directories to free some memory in the destination flash drive. The user
may or may not opt to delete anything.
29
6. USB TO USB Data Transfer without PC
Fig. 4 System flow Diagram, Figure contains user block, USB Controller block, System memory, User Interface control
and File system control blocks are present for entire operation
4.2 User interface Controller Module
This module is responsible for obtaining user input and displaying user requested information through an LCD.
It consists of three sub modules namely the LCD Controller, Navigation and Screen Display Formatter. User input is
received through this module; however only two out of the six buttons are interpreted and executed within the User
Interface Module. These buttons are the Left and Right navigation buttons whose function are to scroll through the
displayed path or Long File Name (LFN) format of a file or directory. The input from the Up and Down navigation
buttons and Command Buttons 1 and 2 are converted to their corresponding command codes and are forwarded to the
File System Controller module for execution. All information to be displayed is received from the File System Controller
module.
4.3 File system controller
The File System Controller is responsible for all file management processes and FAT file system access for the
system. It mediates between the display/user interface and USB communications module. A large percentage of the
systems software is found in this module since it contains most of the systems core functions. Figure shows the block
diagram. The major commands handled by the sub module include the up and down navigation buttons and the different
functions attributed to command button 1 and 2 (i.e., copy, delete, browsing through files/folders.)
Fig. 5 User interface Diagram, It has LCD sub module, Navigation sub module, File system module etc.
30
7. USB TO USB Data Transfer without PC
Fig.6 File system controller Diagram, It used for controlling different file transfer operations and files/folders access
4.4 USB controller module
The USB Controller module is responsible for starting-up the system, handling the packets, computation and
checking of error checking bits, packet encoding, conversion of packets from parallel to serial and vice versa and NRZI
decoding and encoding. This module accepts the commands to either read or write onto a USB ash drive as requested by
the File System Controller Module. Input from the USB ash drives is the result of an earlier request for data. These
requests include content information (i.e. file names), actual content (i.e. files) or identification signals (i.e. the connected
USB device is checked if it falls under the Mass Storage Class (MSC) or Human Interface Device (HID)). Block diagram
is shown in figure.
Fig.7 USB control module Diagram, to check all USB operation or process
The module also governs the data that needs to be transmitted to the USB Flash Drives, as well as process and
send the results of the transaction to the File System Controller Module. In addition, the module also sends notifications
to alert the user of the status of the system or the operation (i.e. the status of a copy or delete command).
4.5 Data Transfer
Data transfer is unidirectional. That means that data can only be written, it cannot be read again. In contrast to
other displays, a busy query is not necessary with this display. The clock-pulse rate of the SCL line can be up to 20 MHz,
depending on the supply voltage.
Fig.8 Data Transfer, It shows how data is transfer on LCD. In that CSI,SI and clock signals are present
31
8. USB TO USB Data Transfer without PC
V. EXPERIMENTATION
5.1 System Flowchart
Fig.9 System Flowchart, This is giving us entire system working and how the system goes from one stage to other
5.2 Components Used
1. ARM processor
2. USB host controller IC- VNC1L
3. Power supply unit
4. Computer interface
5. Graphical LCD
5.3 Hardware Prototype
32
9. USB TO USB Data Transfer without PC
Fig.10 Device displaying name of the project:' ARM based data transfer system
Fig.11Requesting to insert source and target pendrives
Fig.12 Displaying transfer of data has been completed
VI. RESULT ANALYSIS
Problems are stepping stones towards success. Once we start working with the hardware we are bound to face
some obstacles in our way to reach our goal. While working on the hardware of the project we initially had opted for an
ARM board combined with the general purpose board. The idea was opted because we were new with the use of the
VNC1l IC and so the method we opted was the try and error method. We opted the general purpose board so that we can
easily demount the components if something goes wrong. Also it was used so that future modifications could be made
easier if required or necessary. We initially mounted all the circuit components related to the ARM board and so far the
work was going as we had planned. The problem arised as we mounted the VNCL1 IC, the board became bulky and it
became difficult for us to mount all the components that were to be interfaced between ARM and VNCL1. Size of the
33
10. USB TO USB Data Transfer without PC
board became the reason behind the bulkiness. We had to compromise with the spacing of the components and that made
the work very untidy and difficult for us to distinguish between various components. So finally we decided to switch the
boards. We then designed a board using ORCAD 9.0. This board was very specific with what we needed and was the
correct decision which leads us to the perfect working of our project.
VII. CONCLUSION
Transferring the data through USB in today’s scenario is the most common task. But the problem is that for
transferring the data to a personal computer or laptop is difficult if u don’t have any of them. It is affordable to purchase a
USB data drive than purchasing a laptop or PC. Therefore we came up with a handled battery operated affordable device
which can transfer the data between two USB data drives without the help of PC or laptop.
The advantage of this device is that it is battery operated so there is no need of power supply connection and
data transfer can take place at any place. Currently we have design the system for tranfer of data upto 2GB only, but it
can be increased by proper selection of the bus.
VIII. FUTURE SCOPE
While working on the development of the system and exploring the peripherals that can be interfaced with the
ARM 7 we found that with little modification in the project several new features could be added. Following are the things
that can be done with few modifications.
1. Add USB host capability to embedded products.
2. Interface USB Flash drive to MCU/PLD/FPGA.
3. Using Bluetooth in our device, We can connect with any Bluetooth enable devices making the data transfer
wireless.
4. Keypad and Graphical LCD could be replaced by touch screens which could make human work easier by drag
and drop method.
REFERENCES
[1]. JAN AXELSON, USB Complete, Penram Publications, 2nd edition, pp. 5-7. Nov 1999.
[2]. JAN AXELSON, USB mass storage, Lakeview Publications, @2nd edition, chp. 4, pp 57-69. 2000.
[3]. John Hyde, USB design, a technical introduction to USB 2.0, white papers.
[4]. USB Implementers Forum Inc, www.usb.org/ interoductionusb-2.0papers/
[5]. www.alldatasheets.com
[6]. FTDI Inc, www.ftdichip.com/document Reference No.: FT-000006v. Vinculum Firmware User Manual Version 2.05.
[7]. www.techpubs.sgi.com
[8]. USB Implementers Forum Inc, www.usb.org/ interoductionusb-2.0papers/
34