This document describes the development of an internet-based instrumentation system for real-time visual monitoring of volcanoes. The system consists of three main units: a sensing unit with CCTV cameras, a data acquisition and control unit built using a PC with virtual machines, and a network interface unit allowing remote access via the internet. Video data is captured and processed using virtual machines for data capturing, storage, classification, and streaming. The system is designed to be low-cost and efficient by utilizing virtual machine techniques to share PC hardware resources across multiple virtual servers.
The document provides information about various cybersecurity incidents involving critical infrastructure systems. It summarizes past events where control systems for wastewater treatment plants, nuclear power plants, oil pipelines, and more were compromised in various ways. Each event summary includes details about the specific impacts and lessons learned about how to better secure these types of industrial control systems.
Desing on wireless intelligent seneor network on cloud computing system for s...csandit
Sensors on (or attached to) mobile phones can enable attractive sensing applications in
different domains such as environmental monitoring, social networking, healthcare, etc. In this
paper we propose a cloud computing system dedicated on smart home applications. We design
the proposed wireless vision sensor network (WVSN) with its algorithm and hardware
implementation. In WVSN, The partial-vision camera strategy is applied to allocate the
computation task between the sensor node and the central server. Then we propose a high
performance segmentation algorithm. Meanwhile, an efficient binary data compression method
is proposed to cope with the result on labeling information. The proposed algorithm can provide
high precision rate for the smart home applications such as the gesture recognition and
humanoid tracking. To realize the physical system, we implement it on the embedded platform
and the central server with their transmission work
This document summarizes a research paper on developing a smart web cam motion detection surveillance system using a low-cost webcam. The system aims to detect intruders and stop intrusions in progress. It does this by comparing frames from the webcam video stream to detect motion. When motion is detected, it sounds an alarm, emails photos of the intruder to the administrator, and sends an SMS alert. The system is designed to be low-cost by using a webcam instead of more expensive security cameras. It outlines the system architecture, including capturing video, comparing frames to detect motion, storing motion frames, and alerting the administrator. It also discusses related work on motion detection and implementation details like background/foreground separation.
Human Motion Detection in Video Surveillance using Computer Vision TechniqueIRJET Journal
The document discusses a technique for detecting human motion in video surveillance using computer vision. It proposes a method called DECOLOR (Detecting Contiguous Outliers in the LOw-rank Representation) that formulates object detection as outlier detection in a low-rank representation of video frames. This allows it to detect moving objects flexibly without assumptions about foreground or background behavior. DECOLOR simultaneously performs object detection and background estimation using only the test video sequence, without requiring training data. The method models the outlier support explicitly and favors spatially contiguous outliers, making it suitable for detecting clustered foreground objects like people. It achieves more accurate detection and background estimation than state-of-the-art robust principal component analysis methods.
This document discusses network monitoring, management, and enhancement using VPN. It introduces the iManager M2000 tool for monitoring networks and describes some key network management reports. These reports contain information on network performance indicators and can help identify issues. The document also discusses using tools and macros to optimize network performance and improve key performance indicators like call setup success rate. Enhancing network monitoring and management using VPN is proposed to further improve efficiency.
Wireless Technology for Monitoring Site-specific Landslide in Vietnam IJECEIAES
Climate change has caused an increasing number of landslides, especially in the mountainous provinces of Vietnam, resulting in the destruction of vital transport and other infrastructure. Current monitoring and forecasting systems of the meteorology department cannot deliver accurate and reliable forecasts for weather events and issue timely warnings. This paper describes the development of a simple, low cost, and efficient system for monitoring and warning landslide in real-time. The authors focus on the use of wireless and related technologies in the implementation of a technical solution and some of the problems of the wireless sensor network (WSN) related to power consumption. Promising compressed sensing (CS) based solution for landslide monitoring is discussed and evaluated in the paper.
Automated Security Surveillance System in Real Time WorldIRJET Journal
This document describes an automated security surveillance system that uses image processing and computer vision techniques. The system uses a camera to capture images and compare them to detect differences from the background. Any differing foreground images are sent to a local database and then to a server database for further comparison. The system analyzes patterns and uses k-means clustering to identify unauthorized persons. If an unauthorized person is detected, an alert is sent to administrators via GSM with the captured image. The goal is to automate security monitoring and reduce reliance on human surveillance operators.
Air Programming on Sunspot with use of Wireless Networksijsrd.com
Wireless Sensor Networks (WSN) provides us an effective means to monitor physical environments. The computing nodes in a WSN are resource constrained devices whose resources need to be used sparingly. The main requirement of a WSN is to operate unattended in remote locations for extended periods of time. Physical conditions, environmental conditions, upgrades, user preferences, and errors within the code can all contribute to the need to modify currently running applications. Therefore, reprogramming of sensor nodes is required. One of the important terminologies that are associated with WSN network is that of OVER THE AIR PROGRAMMING. This concept has been utilized so far as for Imote2 sensors that has been relatively utilized for the processing of the Deluge port (DP). They have so far been able to successfully reboot each application. But this rebooting is still not reliable and secure as there are certain security features that are affected in the processing. I will provide a more reliable, robust and secure system that would have enriched functionalities of that of OTA programming on SUNSPOT. Some important features of the SUN SPOT that I will be utilizing in this practical approach is that it supports isolated application models such as sensor networks, it allows running multiple applications in one. It does not create overhead on the entire system node as it provides lower level asynchronous for proper message delivery. It also supports migration from one device to another. This paper focuses on developing a multi-hop routing protocol for communication among Sun SPOT sensor nodes and a user front-end (i.e. visualizer) to visualise the collected values from all the nodes. To test the routing protocol before deploying it to sensor nodes, a simulation using J-Sim is created.
The document provides information about various cybersecurity incidents involving critical infrastructure systems. It summarizes past events where control systems for wastewater treatment plants, nuclear power plants, oil pipelines, and more were compromised in various ways. Each event summary includes details about the specific impacts and lessons learned about how to better secure these types of industrial control systems.
Desing on wireless intelligent seneor network on cloud computing system for s...csandit
Sensors on (or attached to) mobile phones can enable attractive sensing applications in
different domains such as environmental monitoring, social networking, healthcare, etc. In this
paper we propose a cloud computing system dedicated on smart home applications. We design
the proposed wireless vision sensor network (WVSN) with its algorithm and hardware
implementation. In WVSN, The partial-vision camera strategy is applied to allocate the
computation task between the sensor node and the central server. Then we propose a high
performance segmentation algorithm. Meanwhile, an efficient binary data compression method
is proposed to cope with the result on labeling information. The proposed algorithm can provide
high precision rate for the smart home applications such as the gesture recognition and
humanoid tracking. To realize the physical system, we implement it on the embedded platform
and the central server with their transmission work
This document summarizes a research paper on developing a smart web cam motion detection surveillance system using a low-cost webcam. The system aims to detect intruders and stop intrusions in progress. It does this by comparing frames from the webcam video stream to detect motion. When motion is detected, it sounds an alarm, emails photos of the intruder to the administrator, and sends an SMS alert. The system is designed to be low-cost by using a webcam instead of more expensive security cameras. It outlines the system architecture, including capturing video, comparing frames to detect motion, storing motion frames, and alerting the administrator. It also discusses related work on motion detection and implementation details like background/foreground separation.
Human Motion Detection in Video Surveillance using Computer Vision TechniqueIRJET Journal
The document discusses a technique for detecting human motion in video surveillance using computer vision. It proposes a method called DECOLOR (Detecting Contiguous Outliers in the LOw-rank Representation) that formulates object detection as outlier detection in a low-rank representation of video frames. This allows it to detect moving objects flexibly without assumptions about foreground or background behavior. DECOLOR simultaneously performs object detection and background estimation using only the test video sequence, without requiring training data. The method models the outlier support explicitly and favors spatially contiguous outliers, making it suitable for detecting clustered foreground objects like people. It achieves more accurate detection and background estimation than state-of-the-art robust principal component analysis methods.
This document discusses network monitoring, management, and enhancement using VPN. It introduces the iManager M2000 tool for monitoring networks and describes some key network management reports. These reports contain information on network performance indicators and can help identify issues. The document also discusses using tools and macros to optimize network performance and improve key performance indicators like call setup success rate. Enhancing network monitoring and management using VPN is proposed to further improve efficiency.
Wireless Technology for Monitoring Site-specific Landslide in Vietnam IJECEIAES
Climate change has caused an increasing number of landslides, especially in the mountainous provinces of Vietnam, resulting in the destruction of vital transport and other infrastructure. Current monitoring and forecasting systems of the meteorology department cannot deliver accurate and reliable forecasts for weather events and issue timely warnings. This paper describes the development of a simple, low cost, and efficient system for monitoring and warning landslide in real-time. The authors focus on the use of wireless and related technologies in the implementation of a technical solution and some of the problems of the wireless sensor network (WSN) related to power consumption. Promising compressed sensing (CS) based solution for landslide monitoring is discussed and evaluated in the paper.
Automated Security Surveillance System in Real Time WorldIRJET Journal
This document describes an automated security surveillance system that uses image processing and computer vision techniques. The system uses a camera to capture images and compare them to detect differences from the background. Any differing foreground images are sent to a local database and then to a server database for further comparison. The system analyzes patterns and uses k-means clustering to identify unauthorized persons. If an unauthorized person is detected, an alert is sent to administrators via GSM with the captured image. The goal is to automate security monitoring and reduce reliance on human surveillance operators.
Air Programming on Sunspot with use of Wireless Networksijsrd.com
Wireless Sensor Networks (WSN) provides us an effective means to monitor physical environments. The computing nodes in a WSN are resource constrained devices whose resources need to be used sparingly. The main requirement of a WSN is to operate unattended in remote locations for extended periods of time. Physical conditions, environmental conditions, upgrades, user preferences, and errors within the code can all contribute to the need to modify currently running applications. Therefore, reprogramming of sensor nodes is required. One of the important terminologies that are associated with WSN network is that of OVER THE AIR PROGRAMMING. This concept has been utilized so far as for Imote2 sensors that has been relatively utilized for the processing of the Deluge port (DP). They have so far been able to successfully reboot each application. But this rebooting is still not reliable and secure as there are certain security features that are affected in the processing. I will provide a more reliable, robust and secure system that would have enriched functionalities of that of OTA programming on SUNSPOT. Some important features of the SUN SPOT that I will be utilizing in this practical approach is that it supports isolated application models such as sensor networks, it allows running multiple applications in one. It does not create overhead on the entire system node as it provides lower level asynchronous for proper message delivery. It also supports migration from one device to another. This paper focuses on developing a multi-hop routing protocol for communication among Sun SPOT sensor nodes and a user front-end (i.e. visualizer) to visualise the collected values from all the nodes. To test the routing protocol before deploying it to sensor nodes, a simulation using J-Sim is created.
The document is a complaint letter regarding alleged corruption in the implementation of development schemes in Jharkhand state. It summarizes an ongoing issue over the past year regarding lack of action on complaints of misuse of funds meant for public welfare. Several officers and contractors are accused of siphoning funds for personal gain through fake muster rolls and bogus bills. The complainant requests an investigation into master rolls and accounts of all development projects and welfare schemes in Latehar district to uncover the truth and take action against those found guilty.
A empresa de tecnologia anunciou um novo smartphone com câmera aprimorada, maior tela e bateria de longa duração. O dispositivo também possui processador mais rápido e armazenamento expansível. O novo modelo será lançado em outubro por um preço inicial de US$799.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document summarizes a research paper that proposes a new CPU scheduling algorithm called Efficient Round Robin (ERR). ERR aims to improve upon traditional Round Robin scheduling by sorting processes by arrival time and burst time, and executing processes for a time slice before moving to the next process. The paper includes an overview of existing CPU scheduling algorithms, defines key scheduling parameters, provides pseudocode for ERR, and describes a simulation that compares ERR to FCFS, SJF, priority, and Round Robin scheduling. Results of the simulation show that on average, ERR improves waiting time and turnaround time over the other algorithms.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document describes the development of a computer-based payroll system for Punjab Agricultural University using PHP, HTML, CSS, MySQL, and JavaScript. It outlines the software development life cycle used, including system analysis, design, implementation, testing and maintenance. Key features of the system include online access for employees, automated payroll calculations, generation of pay slips and reports, and storage of employee records. The system aims to streamline the payroll process and reduce errors compared to the previous manual system.
The efficiency of online advertising (Andrew Felbert - Nielsen)SEMPL
The nature of online advertising allows us the chance to deeply understand performance but in the past we haven’t done a very good job of making these capabilities work for us. The Nielsen representatives will show us how we are able to understand the effectiveness of brand based advertising online and use this information to become more efficient, but this requires organizational and attitudinal change.
The blog is dedicated to a school media coursework project on music videos. It features the group's name and lyrics from a Linkin Park song at the top. The header image is from Linkin Park's album "Living Things". The about section introduces the four group members and explains they will be studying music videos and creating their own. The background image is the Linkin Park logo. Posts on the blog document their video planning and project in categories like analysis, planning, and research.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
1) The document proposes a design for synchronization control based on a three-dimensional chaotic system that accounts for uncertainty in the controller parameters.
2) It applies linear feedback synchronization and designs a controller to tolerate uncertainty from changes in the controller itself.
3) The controller design constructs a Lyapunov function to prove that under certain conditions on the feedback gains, the error system is asymptotically stable, achieving synchronization between the driving and response chaotic systems.
This document outlines a one-week group project with the theme of Norwich. Students are divided into groups and must work together to complete a body of work including research, initial ideas, samples, and 4 finished pieces with variations. On the deadline, each group will present their work and ideas in a 15-minute pitch, followed by questions. The work will be assessed based on learning outcomes and each student's individual engagement will be noted. The groups will conduct peer assessment to determine the most successful project.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
The document presents a study on the adsorption-desorption behavior of Simazine, an anionic herbicide, on six agricultural soil samples. Kinetic experiments showed that adsorption followed first-order kinetics, with rate constants for adsorption higher than for desorption. Adsorption-desorption isotherms were fitted to linear, Freundlich and Langmuir models. Freundlich and Langmuir coefficients indicated moderate affinity of Simazine for soil samples. Hysteresis coefficients revealed irreversible adsorption on the soils. Organic matter was found to influence Simazine adsorption spontaneously through hydrogen bonding or proton transfer.
The document is a complaint letter regarding alleged corruption in the implementation of development schemes in Jharkhand state. It summarizes an ongoing issue over the past year regarding lack of action on complaints of misuse of funds meant for public welfare. Several officers and contractors are accused of siphoning funds for personal gain through fake muster rolls and supply bills without actual work being done. The complainant requests an investigation into master rolls and accounts of all development projects and welfare schemes in Latehar district to uncover wrongdoing and protect honest taxpayers.
The document provides a daily market snapshot and analysis of the Indian stock market. It summarizes that the key indices gained modestly, with the Sensex up 0.22% and Nifty up 0.31%, led by oil and gas and power stocks. FIIs were net buyers of Indian stocks while domestic institutions were net sellers. The report also recaps other domestic and global economic news and corporate developments.
1) The document describes a proposed intelligent system for monitoring and controlling water quality in natural bodies of water using wireless sensor networks and unmanned autonomous vehicles.
2) The system would use sensors to monitor water quality parameters, centralized monitoring to process the data and detect pollution, and controlled UAVs to locate and remove pollution sources.
3) The document discusses two key technical challenges - sensor selection to maximize sensor network lifetime and controlling UAVs over unreliable wireless networks. It proposes algorithms adapted from literature to address these challenges.
The Radiflow-NEC solution uses two-factor authentication and firewall rules enforced by Radiflow routers to securely limit industrial control system access during remote or on-site maintenance to specific devices and commands. NEC's physical security solutions combine with Radiflow's ruggedized routers to authenticate technicians' identities and continuously monitor their locations, only granting access to the devices and areas necessary to perform maintenance tasks. Any violations of the rules are instantly blocked and alerts are sent to the control center along with network traffic logs and video footage.
The document is a complaint letter regarding alleged corruption in the implementation of development schemes in Jharkhand state. It summarizes an ongoing issue over the past year regarding lack of action on complaints of misuse of funds meant for public welfare. Several officers and contractors are accused of siphoning funds for personal gain through fake muster rolls and bogus bills. The complainant requests an investigation into master rolls and accounts of all development projects and welfare schemes in Latehar district to uncover the truth and take action against those found guilty.
A empresa de tecnologia anunciou um novo smartphone com câmera aprimorada, maior tela e bateria de longa duração. O dispositivo também possui processador mais rápido e armazenamento expansível. O novo modelo será lançado em outubro por um preço inicial de US$799.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document summarizes a research paper that proposes a new CPU scheduling algorithm called Efficient Round Robin (ERR). ERR aims to improve upon traditional Round Robin scheduling by sorting processes by arrival time and burst time, and executing processes for a time slice before moving to the next process. The paper includes an overview of existing CPU scheduling algorithms, defines key scheduling parameters, provides pseudocode for ERR, and describes a simulation that compares ERR to FCFS, SJF, priority, and Round Robin scheduling. Results of the simulation show that on average, ERR improves waiting time and turnaround time over the other algorithms.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document describes the development of a computer-based payroll system for Punjab Agricultural University using PHP, HTML, CSS, MySQL, and JavaScript. It outlines the software development life cycle used, including system analysis, design, implementation, testing and maintenance. Key features of the system include online access for employees, automated payroll calculations, generation of pay slips and reports, and storage of employee records. The system aims to streamline the payroll process and reduce errors compared to the previous manual system.
The efficiency of online advertising (Andrew Felbert - Nielsen)SEMPL
The nature of online advertising allows us the chance to deeply understand performance but in the past we haven’t done a very good job of making these capabilities work for us. The Nielsen representatives will show us how we are able to understand the effectiveness of brand based advertising online and use this information to become more efficient, but this requires organizational and attitudinal change.
The blog is dedicated to a school media coursework project on music videos. It features the group's name and lyrics from a Linkin Park song at the top. The header image is from Linkin Park's album "Living Things". The about section introduces the four group members and explains they will be studying music videos and creating their own. The background image is the Linkin Park logo. Posts on the blog document their video planning and project in categories like analysis, planning, and research.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
1) The document proposes a design for synchronization control based on a three-dimensional chaotic system that accounts for uncertainty in the controller parameters.
2) It applies linear feedback synchronization and designs a controller to tolerate uncertainty from changes in the controller itself.
3) The controller design constructs a Lyapunov function to prove that under certain conditions on the feedback gains, the error system is asymptotically stable, achieving synchronization between the driving and response chaotic systems.
This document outlines a one-week group project with the theme of Norwich. Students are divided into groups and must work together to complete a body of work including research, initial ideas, samples, and 4 finished pieces with variations. On the deadline, each group will present their work and ideas in a 15-minute pitch, followed by questions. The work will be assessed based on learning outcomes and each student's individual engagement will be noted. The groups will conduct peer assessment to determine the most successful project.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
The document presents a study on the adsorption-desorption behavior of Simazine, an anionic herbicide, on six agricultural soil samples. Kinetic experiments showed that adsorption followed first-order kinetics, with rate constants for adsorption higher than for desorption. Adsorption-desorption isotherms were fitted to linear, Freundlich and Langmuir models. Freundlich and Langmuir coefficients indicated moderate affinity of Simazine for soil samples. Hysteresis coefficients revealed irreversible adsorption on the soils. Organic matter was found to influence Simazine adsorption spontaneously through hydrogen bonding or proton transfer.
The document is a complaint letter regarding alleged corruption in the implementation of development schemes in Jharkhand state. It summarizes an ongoing issue over the past year regarding lack of action on complaints of misuse of funds meant for public welfare. Several officers and contractors are accused of siphoning funds for personal gain through fake muster rolls and supply bills without actual work being done. The complainant requests an investigation into master rolls and accounts of all development projects and welfare schemes in Latehar district to uncover wrongdoing and protect honest taxpayers.
The document provides a daily market snapshot and analysis of the Indian stock market. It summarizes that the key indices gained modestly, with the Sensex up 0.22% and Nifty up 0.31%, led by oil and gas and power stocks. FIIs were net buyers of Indian stocks while domestic institutions were net sellers. The report also recaps other domestic and global economic news and corporate developments.
1) The document describes a proposed intelligent system for monitoring and controlling water quality in natural bodies of water using wireless sensor networks and unmanned autonomous vehicles.
2) The system would use sensors to monitor water quality parameters, centralized monitoring to process the data and detect pollution, and controlled UAVs to locate and remove pollution sources.
3) The document discusses two key technical challenges - sensor selection to maximize sensor network lifetime and controlling UAVs over unreliable wireless networks. It proposes algorithms adapted from literature to address these challenges.
The Radiflow-NEC solution uses two-factor authentication and firewall rules enforced by Radiflow routers to securely limit industrial control system access during remote or on-site maintenance to specific devices and commands. NEC's physical security solutions combine with Radiflow's ruggedized routers to authenticate technicians' identities and continuously monitor their locations, only granting access to the devices and areas necessary to perform maintenance tasks. Any violations of the rules are instantly blocked and alerts are sent to the control center along with network traffic logs and video footage.
Object Detection and Localization for Visually Impaired People using CNNIRJET Journal
The document presents a system to help visually impaired people by using CNNs (Convolutional Neural Networks) for object detection and localization based on camera images. The system aims to achieve over 95% accuracy in identifying objects captured by the camera and conveying this information to users through voice messages. It discusses existing assistive systems that use techniques like CNNs, speech recognition and custom object detection. The proposed system is intended to enable real-time object recognition and localization using a CNN model to improve awareness of the indoor environment for visually impaired individuals. Test results showed the CNN program for object recognition was implemented effectively.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
The document describes a design for an embedded web-based remote monitoring system for laboratory environments. The system uses an ARM microprocessor as the main controller connected to sensor networks, cameras, and communication modules. An embedded Linux system and web server allow remote monitoring and management of environmental data and video images through a web browser. Managers can view data, control equipment, and receive alerts. The system was implemented and experimental results showed it effectively enabled remote monitoring and local management of laboratory environments.
Real time approach of piezo actuated beam for wireless seismic measurement us...eSAT Journals
Abstract
Piezo-actuated beam is used for wireless seismic measurement and indication using Lab VIEW. Principle of piezoelectric materials
has been utilized here i.e. Piezoelectric materials deform when a voltage is applied to them and inversely will produce a voltage when
they are deformed. For this reason, they can be used as both sensors and actuators. Here, Lab VIEW 2013 version, NI ELVIS
(Educational Laboratory Virtual Instrumentation Suite) and Bluetooth device connected with PC has been utilized for acquiring and
indicating vibration. The developed design is expected to be used universally for measuring seismic waves and also in Industrial
applications for the measurement of micro vibration.
Keywords: Seismic measurement, Lab VIEW, wireless communication
Remote sensing and control of an irrigation system using a distributed wirele...nithinreddykaithi
This document describes the design of a remote irrigation system using a wireless sensor network. Sensors will monitor field conditions like voltage, current, temperature and irradiance. The sensor data will be transmitted periodically to a base station. A digital controller will regulate the power point using a DC-DC converter to identify the maximum power point based on a neural network model. A low-cost RF module wireless network will transmit communication data for remote monitoring and distributed control. Web-based software will provide remote access to field conditions and real-time control of power points in the smart photovoltaic system. The system uses a PIC microcontroller and sensors to monitor the field and an RF transmitter to send data to the receiver and base station
Smart surveillance systems play an important role in security today. The goal of security systems is to protect users against fires, car accidents, and
other forms of violence. The primary function of these systems is to offer security in residential areas. In today’s culture, protecting our homes is
critical. Surveillance, which ranges from private houses to large corporations, is critical in making us feel safe. There are numerous machine learning algorithms for home security systems; however, the deep learning convolutional neural network (CNN) technique outperforms the others. The
Keras, Tensorflow, Cv2, Glob, Imutils, and PIL libraries are used to train and assess the detection method. A web application is used to provide a
user-friendly environment. The flask web framework is used to construct it. The flash-mail, requests, and telegram application programming interface (API) apps are used in the alerting approach. The surveillance system tracks
abnormal activities and uses machine learning to determine if the scenario is normal or not based on the acquired image. After capturing the image, it is
compared with the existing dataset, and the model is trained using normal events. When there is an anomalous event, the model produces an output from which the mean distance for each frame is calculated.
Analysis of Water observation Organization Based on GSM and Wireless Sensor T...arpublication
The idea of ‘Wireless Sensor Network’ (WSN) is the basic building block of a water quality monitoring using wireless sensor network (WSN) technology. To monitor water quality over different sites as a real-time application, an excellent system architecture constituted by distributing sensor nodes and a base station is suggested. The nodes and base station are connected using WSN technology like Zigbee. Base stations are connected via Ethernet. Design and implementation of a prototype model using WSN technology are the challenging work. Data collected by various sensors on the node side such as pH, turbidity and oxygen level is sent via WSN to the base station. Data collected from the remote site can be displayed in visual format as well as it can be analyzed using different simulation tools at the base station. This novel system has advantages such as no carbon emission, low power consumption, more flexible to deploy at remote sites and so on.
Secure Dual-mode Robotic Intrusion Detection System for Remote SurveillanceCSCJournals
This document describes a secure dual-mode robotic intrusion detection system for remote surveillance. It presents a low complexity surveillance system that blends video streaming, robotics, obstacle avoidance, and security. The system uses a Raspberry Pi connected to a camera for video streaming and robot control. Ultrasonic sensors enable autonomous robot navigation and obstacle avoidance. Video is streamed using MJPEG compression for low latency transmission. Access to the monitoring web interface requires authentication for security. Testing showed the robot can navigate and avoid obstacles while streaming video with low latency.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
An Overview and Classification of Approaches to Information Extraction in Wir...M H
Recent advances in wireless communication have made it possible to develop low-cost, and low power Wireless Sensor Networks (WSN). The WSN can be used for several application areas (e.g., habitat monitoring, forest fire detection, and health care). WSN Information Extraction (IE) techniques can be classified into four categories depending on the factors that drive data acquisition: event-driven, time-driven, query-based, and hybrid. This paper presents a survey of the state-of-the-art IE techniques in WSNs. The benefits and shortcomings of different IE approaches are presented as motivation for future work into automatic hybridisation and adaptation of IE mechanisms.
DESIGN AND IMPLEMENTATION OF A RASPBERRYPI BASED HOME SECURITY AND FIRE SAFET...ijcsit
Fire alarms and building security systems are currently separate systems and are liable to monthly fees. Video recording for closed-circuit television (CCTV) is done locally subsequently requiring high storage space. Whenever there is a break-in, the footage records can be stolen consequently losing data. To address high data storage space, monthly premium subscriptions, cost of separate systems and data loss issues of the aforementioned systems, we design and implement a Raspberry-pi based fire and intrusion detection systems in this work. The system sends an SMS in the case of an intrusion or fire detection, and then records and uploads the surveillance videos. The system used a GSM modem for sending SMSs, a video, a PIR sensor to detect motion and a smoke or heat sensor to detect fire. The system is a low cost combined home security and fire detection Raspberry-pi system intended for home and small offices use.
Fire alarms and building security systems are currently separate systems and are liable to monthly fees. Video recording for closed-circuit television (CCTV) is done locally subsequently requiring high storage space. Whenever there is a break-in, the footage records can be stolen consequently losing data. To address high data storage space, monthly premium subscriptions, cost of separate systems and data loss issues of the aforementioned systems, we design and implement a Raspberry-pi based fire and intrusion detection systems in this work. The system sends an SMS in the case of an intrusion or fire detection, and then records and uploads the surveillance videos. The system used a GSM modem for sending SMSs, a video, a PIR sensor to detect motion and a smoke or heat sensor to detect fire. The system is a low cost combined home security and fire detection Raspberry-pi system intended for home and small offices use.
The rapid growth that has taken place in Computer Vision has been instrumental in driving the advancement of Image processing techniques and drawing inferences from them. Combined with the enormous capabilities that Deep Neural networks bring to the table, computers can be efficiently trained to automate the tasks and yield accurate and robust results quickly thus optimizing the process. Technological growth has enabled us to bring such computationally intensive tasks to lighter and lower-end mobile devices thus opening up a wide range of possibilities. WebRTC-the open-source web standard enables us to send multimedia-based data from peer to peer paving the way for Real-time Communication over the Web. With this project, we aim to build on one such opportunity that can enable us to perform custom object detection through an android based application installed on our mobile phones. Therefore, our problem statement is to be able to capture real-time feeds, perform custom object detection, generate inference results, and appropriately send intruder alerts when needed. To implement this, we propose a mobile-based over-the-cloud solution that can capitalize on the enormous and encouraging features of the YOLO algorithm and incorporate the functionalities of OpenCV’s DNN module for providing us with fast and correct inferences. Coupled with a good and intuitive UI, we can ensure ease of use of our application.
The document proposes a real-time mobile surveillance system using WebRTC. It utilizes computer vision techniques like YOLO for object detection on live video feeds captured by an Android application. The feeds are sent to a NodeJS server and then to a Flask server using REST APIs where OpenCV's DNN module performs inference. Detected objects and alerts are then sent back to the Android device. The system aims to provide low-latency, remote surveillance capabilities using mobile devices and over-the-cloud solutions.
IRJET- Survey on Flood Management SystemIRJET Journal
1. The document discusses flood management systems that use data mining algorithms and IoT technologies for flood prediction and detection. It analyzes algorithms like kNN and SVM that can be used for flood prediction by training models on historical data.
2. For flood detection, the document proposes using IoT nodes with sensors to collect water level data, microcontrollers to process the data, and cloud services/GSM modules to send alerts if water levels exceed thresholds.
3. Several existing works that implement flood monitoring systems using techniques like IoT, sensors, microcontrollers and cloud services are reviewed and compared. The goal is to develop a system that can predict flood severity and detect floods early to minimize damage.
Malware Detection in Cloud Computing Infrastructures
malware detection whole design and working in a short ppt effectively explaining the criteria and infrastructure
This document summarizes a chapter from a book on wireless sensor networks. It discusses wireless sensor networks and their applications in monitoring various environmental parameters in greenhouses. It describes the components of a wireless sensor network including sensor nodes that collect data and multi-hop gateway nodes that transmit data to a central location. It also discusses some challenges with wireless sensor networks including hardware limitations and issues with power consumption and software. Finally, it provides examples of platforms and databases that enable online collaboration of sensor data.
Wireless sensor network plays vital role in today’s life, it is a collection of sensors that are scattered in different directions which are further used to control and measure the physical conditions of environment as well as to organize to the data somewhere at centre location. As in context of greenhouse we can measure various parameters such as temperature, humidity, water level, insect monitoring and light intensity.
Similar to Welcome to International Journal of Engineering Research and Development (IJERD) (20)
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
This document summarizes a study on reducing corrosion rates in steel through welding design. The researchers tested different welding groove designs (X, V, 1/2X, 1/2V) and preheating temperatures (400°C, 500°C, 600°C) on ferritic malleable iron samples. Testing found that X and V groove designs with 500°C and 600°C preheating had corrosion rates of 0.5-0.69% weight loss after 14 days, compared to 0.57-0.76% for 400°C preheating. Higher preheating reduced residual stresses which decreased corrosion. Residual stresses were 1.7 MPa for optimal X groove and 600°C
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
The document summarizes a study on the use of ground granulated blast furnace slag (GGBS) and limestone powder to replace cement in self-compacting concrete (SCC). Tests were conducted on SCC mixes with 0-50% replacement of cement with GGBS and 0-20% replacement with limestone powder. The results showed that replacing 30% of cement with GGBS and 15% with limestone powder produced SCC with the highest compressive strength of 46MPa, meeting fresh property requirements. The study concluded that this ternary blend of cement, GGBS and limestone powder can improve SCC properties while reducing costs.
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Welcome to International Journal of Engineering Research and Development (IJERD)
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN : 2278-800X, www.ijerd.com
Volume 4, Issue 12 (November 2012), PP. 23-29
Development of Internet Based Instrumentation System
for Real-Timevisual Monitoring of Volcano
Didik R. Santoso1, Sukir Maryanto2, Rio A. Purnama3
1
Instrumentation-Div., Physics Dept., Brawijaya University, Jl. Veteran Malang 65145, Indonesia.
2
Geophysics-Div., Physics Dept., Brawijaya University, Jl. Veteran Malang 65145, Indonesia.
3
Graduate School of Physics, Brawijaya University, Jl. Veteran Malang 65145, Indonesia.
Abstract:- An instrumentation system for visual monitoring of volcano usually has a complex structure, this may
make difficulties not only in device procurement but also in terms of maintenance. Building the system in simple
structure and low budget is a challenge for researchers in the field of volcanology. Aim of this research is to
develop a simple and efficient instrumentation system for real time visual monitoring of volcano based on internet
network. In general, the system is built upon three main units, i.e.Sensing Unit (SU), Data Acquisition & Control
Unit (DACU), and Network Interface Unit (NIU). The SUis visual sensor module, built using commercial CCTV
camera and its electronic driver system. The DACU is control and data logger module, built based on PC’s
hardware and installed computer software that was developed for special purposes. The NIU is internet network
interface (hardware and software), it allowing the users to access the volcano activity that was monitored by real
time, from anywhere. We implemented a virtual machine techniques to reduce the hardware on DACU system in
order to make it simple and low-cost in budget.
Keywords:- Data acquisition, Internet, Volcano monitoring, Virtual machine, Visual sensor
I. INTRODUCTION
Continuously monitoring of volcanoes activity is very important for at least two reasons. First is to monitor the
level of volcano hazard relates to mitigation and management of natural disasters, and second is to understand the physical
processes that occur inside the volcano, such as magma migration and the mechanisms that exist within the volcano[1].There
are many methods have been utilized for monitoring the volcano activity. The efforts for establishing a good and reliable
system for monitoring and predicting the volcano eruption is never ended. Instruments will never replace the expertise of the
volcanologists in charge of the surveillance, but they definitely can help them in taking swift decisions in case of a crisis
such as an eruption [2]-[3].
As we know, there are many parameters in volcano monitoring system; one of these is the visual monitoring.
Visual inspections in volcano monitoring have been widely publicized, such as the mapping of activity as well as post-
processing record results glowing lava [4]-[6]. In visual observation, the use of visual data capture techniques play an
important role to get a good visual data without the need to await the time of the event. One of the challenges of visual
inspection of volcano observation is that the change in the object that runs slowly. Object observation will produce the same
visual data in a long time span. When emerging events, the data will be within the range of time that cannot be predicted. So
the techniques to how ease to obtain the events data quickly and accurately without the need to examine all the results of
observational data, it becomes very necessary.
On the other hand, advances in information and computer technology have successfully developed a method of
virtual machine (VM) in many applications. Virtualization techniques allow multiple virtual servers running on a single
physical machine (personal computer), and it has proven offer many solutions [7]-[9]. A VM is a software implementation of
a computing environment in which an operating system (OS) or program can be installed and run. The VM typically
emulates a physical computing environment, but requests for CPU, memory, hard disk, network and other hardware
resources are managed by a virtualization layer which translates these requests to the underlying physical hardware.
Software referred to as a ―hypervisor‖ enables multiple virtual machines to run on a hardware host system [10]. Therefore,
the implementation of the VM in the design of a data acquisition system will be able to reduce the use of hardware, thus
reducing the cost of manufacture and the system will be much simpler.
An instrumentation system for volcano monitoring usually has a complex structure and expensive, this may make
difficulties not only in device procurement but also in terms of maintenance. Building the system in the simple form and
low-cost in budget is a challenge for researchers in the field of volcanology. In the previous research [11], authors have
developed a simple instrumentation system for volcano monitoring especially for seismic activities, and the system has
proven work well. However, the performance improvement is still needed to produce a better monitoring system. In this case,
the capability of the data acquisition system i.e. the efficiency, access speed, and flexibility still needs to be improved. Aim
of this research is to develop a simple, an efficient, and a low-cost instrumentation system, for online visual monitoring of
volcano based on internet network by implementing VM technique. The system will be equipped with event detection
procedures in order to classify the results of the visual monitoring automatically.
23
2. Development of Internet Based Instrumentation System…
II. FUNCTIONAL BLOCK DIAGRAM AND DESCRIPTION OF THE SYSTEM
A. Hardware Structure
The basic structure of the instrumentation system that will be used for visual monitoring of the volcano can be seen
in Figure 1. This structure refers to the basic structure of modern instrumentation systems that have been established [8].
While the details of the proposed instrumentation system for visual volcano monitoring can be seen in Figure 2. The system
is built upon three main units, namely Sensing Unit (SU), Data Acquisition & Control Unit (DACU), and Network Interface
Unit (NIU). The SU is visual sensor module, it is built using commercial CCTV camera and its electronic driver system.
Output of this unit is a video image signal that can be controlled from DACU through a special computer program. The
DACU is control and data logger, built based on PC’s hardware and software that was developed for special purposes. In
addition, we implemented virtual machine techniques to reduce the hardware on DACU system in order to make it simple
and low-cost in budget. A VM-based DACU has the advantage to share resources on the PC’s hardware to multiple virtual
computers in accordance with their computing needs. Finally, the NIU is internet network interface (both hardware and
software). The NIU will allow the users to access the volcano activity that was monitored by real time, from anywhere.
DISPLAY
SIGNAL SIGNAL INTERNET
SENSOR
CONDITIONING PROCESSING NETWORK
CONTROL
NETWORK INTERFACE
Volcano Image
Fig.1: Basic structure of an instrumentation system
DACU: Data Acquisition & Control Unit
INTERNET
NETWORK
SU:Sensing Unit USB Port
VM-1: VM-3:
Data Capturing Data Classification
CCTV USB-DVR
User User
VM-2: VM-4: Monitoring Control
Data Storage Video Streaming
Fig.2:Functionalblock diagram of the developed system
B. Software Procedure
Retrieval techniques for visual image of the volcano is done by placing objects in the frame volcano camera based
on the photography principles of Rule of Thirds [12]. In this role, an object placed in the camera frame that meets 2/3 or 1/3
portion of the overall frame. It is intended that the main object of the volcano to be the main focus of the frame to get a
panoramic picture object, centrally. Furthermore, all observational data are recorded and detected changes (i.e. changes in
the visual image of the volcano) with motion detection methods. By this method, the visual changes to the object can be
detected specifically in a particular area. Data results from event detection are then stored on the Internet-based storage
media, that can be accessed by users via the Internet. Thus the visual monitoring of the volcano with event detection
facilities, can be done online and all the time. Figure 3 illustrates the flow diagram of visual monitoring performed, starting
from the data acquisition, storage, record the results, sending video data post-processing with motion detection and event
notification presence.
24
3. Development of Internet Based Instrumentation System…
START
Capturing Image of
Video Data
Stream Video
Output
Request Video Frame
Process of Realtime Video Files
Video Streaming Storage
Process of Motion
Detection
Image No
Change?
Yes
Save The Capture
and Time Event
Server for monitoring Send Notification and
and control services Save The Capture
STOP
Fig.3:Flowchart of the visual monitoring system
III. SYSTEM DESIGN AND IMPLEMENTATION
A. Hardware of the System
Instrumentation system offered in this study built both in hardware and software. The hardware system consist of
CCTV cameras and its electronic systems (i.e. Signal conditioning and control device), and a standard PC used as a server.
Figure 4show thehardware of the system, and details about the specifications of the hardware are as follows:
Visual Camera: Surveylance CCTV CCD with 22x Optical Zoom feature IR Cut-Off Filter.
Signal Conditioning & USB interface: USB-DVR Easycap DC60 Somagic SMI.
Control Device for Camera, with zoom and focus control.
Personal Computer (PC)-CPU: Intel Dual Core 2x2.5 GHz, 6 GB memory and 1 TB hard disk.
CCTV Camera
Camera Interface
Camera Control
PC-CPU
Visual Display
Fig.4:Hardware of the system
B. Design of VM-Based Data Acquisition & Control Unit (DACU)
The DACU is built by the use of standard PC, which also functioned as a server. It then divided into several VM,
namely VM-1, VM-2, VM-3, and VM-4 by using hypervisor software i.e. VMware vSphere ESXi. Each of the VM assigned
to conduct special task (see Figure 5).Human Machine Interface (HMI) is the software that serves to provide access for
monitoring and control to the user. HMI software developed using the VMware vSphere Client. Access control on the
DACU set using user permissions by entering user name and password.
25
4. Development of Internet Based Instrumentation System…
HMI Software
Access Control
Vmware vSphere Client
PC Server as Virtual Machine (VM)
VM-2
Data Storage
USB Port
Cloud
(Internet)
VM-3
VM-1 Data Classification
Data Capturing
VM-4
User User
Video Streaming Monitoring Control
Fig.5: The division of PC Server into several VMs
Functional description of each VM can be explained as follows. The task of the VM-1 (Data Capturing) is
capturing the video data transmitted by the SU through the USB interface, and forward it to three other VM. A video data
typically has fast flow, so that VM-1 requires adequate computer memory and processor resources, so the resource allocation
for the VM-1 should be prioritized, it aims to avoid the data loss due to insufficient resources. VM-2 (Data Storage) served
as data storage of all of the recorded video data by the VM-1, without going through the editing process or the other. In
addition, to serve access of users who want to see the video data records. Further, VM-3 (Data Classification) has fuction to
support the event detection system. This is an implementation of the method of Motion Range Event Detection, that can be
used as a event detection on the volcano object. It provides output from the report the change of events at a given time, and
also record the time of the incident simultaneously. VM-4 (Video Streaming) serves as an Internet access service on the
results of monitoring, so that the user can observe the results of visual record of volcano object in realtime. In ordr to
increase resource usage does not interfere with the performance of other VMs, the use of VM-4 to serve video streaming
only is needed.
Table 1 illustrates the distribution of the parameters of the needs of each VM on the developed visual monitoring
system. The division is intended that each VM can work optimally according to function, and the high load on one VM will
not affect the other VMs.
Table I: Parameter Resource Requirements for Each VM
VM Name Function Priority Resource Special Devices
Reading Data from Sensor USB- Interface, TCP/IP
Data Capturing
Interface
Processor Connection
Data Storage Storing Video Data Hardisk TCP/IP Connection
Analyzing the results of
Data Classification
monitoring video
Processor & Memory TCP/IP Connection
Video Streaming Serving User Access Processor & Memory TCP/IP Connection
C. Event Detection of the Volcanic Object
The process of taking pictures of the volcano based on how to determine the best of the "Field of View" (FOV) of
the volcano object to changes that may occur. Volcano is defined as a static object, it means that at an early stage in the
camera frame is set as fixed object and does not shift in position. So if there are changes in the FOV frame specified, it will
be detected as a volcanic event. After determining the POV frame, then performed the Sensing Area Definitive (SAD). The
SAD associated with motion detection system that will be imposed on the results captured from the FOV frame. This step is
useful for filtering the object to be detected specifically. For example, location of lava flows and pyroclastic can be predicted
in the area of the FOV frame, so the motion detection system does not need to check all of frames. Then it is important to
pay attention to the visual identification of the volcano object, since it is possible that many objects can move into the FOV
frame that can caused a false notification, such as flying animals, trees exposed to wind and rock slides.
The physical parameters were observed in the visual monitoring of the volcano are generally pyroclastic flows or
lava flows caused by volcanic eruptions. This physical phenomenon, typically occurs in certain areas of the volcano can be
predicted in advance. Table 2 describes the placement of main object the volcanic in FOV of camera.Placement the FOV is a
key role to identify the volcano were observed, so that it can produce a good data record to be implemented on the post-
processing work.
26
5. Development of Internet Based Instrumentation System…
Table II: Identification of the Environment to be Used in the Placement of FOV of the Volcanoes
Direction Movement
Parameters Location Source Frame FOV Placement
Prediction
Pyroclastic Flows Crater Up 1/3 part of Center-Top
Lava Flows Crater Down 2/3 part of Center-Bottom
Lava Flows Crater Right-Down 2/3 part of Left-Bottom
Lava Flows Crater Left-Down 2/3 part of Right-Bottom
IV. RESULT AND DISCUSSION
The results of implementation the VM-based DACU is as shown in Table 3. The table shown the distribution of
each VM that serves a process which has been determined according to the VM name and function of each. Naming VM
adapted to a given function, serves as the computer's host name identification to facilitate the management process. Each
VM is run by different operating systems according to the needs of each function. So that VM performance can be further
optimized in accordance with computing functions to be executed. Figure 6 shows the control interface to each VM on
DACU.
Table III: Distribution of VM onPC Server (DACU)
VM-Name Computer Host Function Operating System
VM-1 akusisi.video.geomonitoring Reading Data from Sensor Interface Windows XP SP3
VM-2 storage.video.geomonitoring Storing Video Data Unix FreeBSD Freenas
VM-3 motion.video.geomonitoring Analyzing the results of monitoring video Linux Ubuntu 12.04
VM-4 web.video.geomonitoring Serving User Access Linux Ubuntu 12.04
Fig.6: Control interface for each VM on the DACU
The advantages of the implementation of the VM on the development of a data acquisition system (DACU) lies in
the fulfillment computing processes on the system. If there are additional sensors on the SU, then the conventional DACU
have to make adjustments to the device and data communication lines first, this does not happen on VM-based DACU. The
use of interface hardware and data communication between the SU-DACU performed through a standard interface that has
been owned by the computer (USB). Therefore, the fulfillment of the SU services on a VM-based DACU can be more
efficient because it can accommodate multiple processes together, even for processes that require fast data transfer and
continue running simultaneously without interruption.
At the Human Machine Interface (HMI), VM-based DACU do control carried over long distances via the internet
network, by using the HMI software that are accessed from another computer. In the process DACU control, the kind of
control that can be done include making a new VM, regulate the distribution and use of resources VM, store and install a
new operating system, automation of work at SU, and so on.
Data monitoring results in the form of video files, stored in the storage network. Network Attached Storage (NAS)
is a method of storage system that can be accessed through the Internet. A NAS server is useful to run a data storage that can
be accessed from the network. Physically, the data remains in the hardisk, but functionally in virtual form. In Figure 7 is
shown the display of the video capture that accessible from the drive which is connected through the internet network.
27
6. Development of Internet Based Instrumentation System…
Fig.7: Video-datarecord that can be accessed via the internet
Event detection systems in volcanic activity carried out by a change in volcanic eruptions is visually recorded by a
video camera. The algorithm used is the frame differences. This algorithm is part of a motion detection application that
calculated using SAD.Event detection systems on volcanic activity carried out by using a change in volcanic eruptions is
visually recorded by a video camera. The algorithm used is the method of frame differences that set point pixel comparison
technique for two types of images simultaneously. This algorithm is part of a motion detection application applied through
methods SAD as shown in Figure 8.
Fig.8:The SADprocessfor Motion RangeEventDetection.
Figure 9 shows how the visual results of the monitoring process carried out through a connection between DACU
to users via the Internet. Visual monitoring of the user can be done from any location connected via the Internet.Results of
video capture can be accessed with the quality of the average frame rate of 10 fps to 15 fps. With a video resolution of
640x480 pixels (and can be digitally zoomed up to 3x), the volcano object can be seen clearly. So the visual monitoring
system can provide qualitative information to the user either directly through video streaming or event
detection.Furthermore, it should be presented herethat theinterpretation ofthe observationsdatais not themain goal in this
research. The researchisfocused onthe development ofvisualinstrumentationsystemthat can be accessedby usersvia
theinternetnetwork in real time;store the results ofthemonitoringand detecting thepresence ofspecificEventtobe observed.
28
7. Development of Internet Based Instrumentation System…
Fig.9:Online monitoringof the volcano via internet
V. CONCLUSIONS
Aim of this research is to develop the simple and efficient instrumentation system for real time visual-monitoring
of the volcano. The system is built upon three main units, namely Sensing Unit (SU), Data Acquisition & Control Unit
(DACU), and Network Interface Unit (NIU). The SU is visual sensor module, it is built using commercial CCTV camera and
its electronic driver system. The DACU is control and data logger, built based on PC’s hardware and software that developed
for special purposes. We implemented VM techniques to reduce the hardware on DACU system in order to make it simple
and low-cost. The NIU is internet network interface,it will allow the users to access the volcano activity that was monitored
by real time, from anywhere.The system equipped with event detection procedures in order to classify the results of the
visual monitoring automatically. This system has been implemented and tested for visual monitoring of volcano object and
proven work well.
ACKNOWLEDGMENT
This research is financed by The Directorate General of Higher Education, Ministry of Education and Culture,
Republic of Indonesia, on the scheme of ―Hibah Kompetensi‖ through contract No. 129/SP2H/PL/Dit.Litabnas/III/2012.
REFERENCES
[1]. Scarpa and Tilling, Monitoring and Mitigation of Volcano Hazards, Berlin, Germany: Springer-Verlag1996.
[2]. B. McGuire, C.R.J. Kilburn, J. Murray, Monitoring Active Volcanoes, London:UCL Press Limited,1995.
[3]. S. Maryanto, D.R..Santosa, I.Mulyana, M. Hendrasto, ―Fractal and Chaos Properties of Explosion Earthquakes
Followed by Harmonic Tremor at Semeru Volcano, East Java, Indonesia‖, IJSER Journal, Vol.2, Issue 7, July-
2011.
[4]. M. Nagaidan K. Honda, ―Concurrent Volcano Activity Mapping System With Ground Fixed Single Digital
Camera‖, Asian Conference on Remote Sensing, CRISP, 22 (2): 1, 2001
[5]. Patrick, R. dan L. Antolik,MATLAB Tools for Improved Characterization and Quantification of Volcanic
Incandescence—Techniques and Method, U.S. Geological Survey, Virginia, USA:2010.
[6]. T.R. Walter, ―Low cost volcano deformation monitoring: optical strain measurement and application toMount St.
Helens data‖, Geophys. J. Int. 186, 699–705,2011.
[7]. M. Pavlik, R. Mihal, L. Lacinak, I. Zolotova, ―Supervisory control and data acquisition systems in virtual
architecture built via VMware vSphere platform‖,[Online]. Available: www.wseas.us/e-library/
[8]. P. Bates (2009), The Rising Impact of Virtual Machine Hypervisor Technology on Digital Forensics Investigations
[Online]. Avalable: www.isaca.org/
[9]. P. Bates, ―The Rising Impact of Virtual Machine Hypervisor Technology on Digital Forensics Investigations‖,
ISACA Journal,Vol.6, 2009.
[10]. D.R. Santoso, S. Maryanto, and A.Y.P. Wardoyo, ―Development of Simple & Low Cost Instrumentation for Real
Time Volcano Monitoring‖, IJAET ,Vol. 2, Issue 1, pp. 532-542, Jan 2012.
[11]. J.P. Bentley, Principles of Measurement System, 3th.ed. Prentice Hall, 1995.
[12]. L. Mai and F. Liu,Rule of Thirds Detection from Photograph. Department of Computer Science, Portland State
University, Portland, US: 2011
29