In this paper, we present the design and implementation of a wireless sensor based piggybacking and tailgating detection system to detect unauthorized attempt to gain access to a secured area. A set of Sun SPOT wireless sensor platform is adopted for acceleration sensor, transmitter, and receiver units for the system. A wireless sensor embedded in a security door collects the signal of door movement constantly and transmits the signal wirelessly to another wireless sensor (base unit), which collects the transmitted signals and stores them in the memory of the computer system for analysis. The acceleration signal is analyzed in both time and frequency domain to detect and classify single and tailgate entries. The paper focuses on the description of the wireless sensor network and the sensor-based tailgate detection algorithm.
An analysis of Network Intrusion Detection System using SNORTijsrd.com
This paper describes the analysis of signature based intrusion detection systems. Snort which is a signature based intrusion detection system are used for this purpose. We use DARPA dataset for the evaluation of Intrusion detection system.
WSN Based Temperature Monitoring System for Multiple Locations in Industryijtsrd
Wireless sensor network technology has demonstrated a great potential for industrial, commercial, and consumer applications. Speci cally, in process monitoring and control, process data such as pressure, humidity, temperature, ow, level, viscosity, density and vibration intensity measurements can be collected through sensing units and transferred wirelessly to a control system for operation and management. Adopting WSNs for process monitoring and control provides great advantages over traditional wired system. In today's world we are facing with many di erent types of emergencies in the indoor environment. Response to such emergencies is critical in order to protect resources including human life and also we can save property from damage. This wireless sensor network for Temperature monitoring System which can report the emergency to the users in various forms, such as pop ups on a Computer screen, SMS on their cell phones and so on. Due to this exibility of reporting low cost wireless sensor network prepared for emergency response system of future. We are going to develop three wireless sensor nodes and we have to place in di erent position in the building using arduino board and we have to inform to the master node or monitoring node about the temperature available at each sensor node. While sending data to each and every sensor is very costly. Hence nodes are connected to WSN and their is only one node called 'Gateway' which collects the data from all other nodes and sends it to the cloud. Aditya Jogdand | Amit Chaudhari | Niranjan Kadu | Udaykumar Shroff ""WSN Based Temperature Monitoring System for Multiple Locations in Industry"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23124.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/23124/wsn-based-temperature-monitoring-system-for-multiple-locations-in-industry/aditya-jogdand
A simple and effective scheme to find malicious node in wireless sensor networkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A simple and effective scheme to find malicious node in wireless sensor networkeSAT Journals
Abstract Wireless Sensor Network consists of hundreds or thousands of sensor nodes. Impractical to maintain topology and protect each sensor nodes from attack. Wireless Sensor Network is often deployed in an unattended and hostile environment to perform the monitoring and data collection tasks. When sensor nodes are deployed in such an environment, sensor network lacks in physical protection and is subject to insertion of malicious node. After that an adversary may launch various attacks to disrupt the in-network communication through malicious node. In such attacks malicious node behave like normal nodes by selectively drop packets for make it harder to detect their malicious nature. Many schemes have been proposed to detect malicious nodes, but very few can identify attacks. But those proposals are send redundant packets, consume more energy and storage to identify malicious nodes. A simple and effective scheme proposed as Stop Transmit and Listen (STL) to find the malicious node. Each node is having the built-in time limit to stop their transmission. For every few seconds every node stops their transmission and listens for malicious behavior. Malicious nodes are not aware of non-transmitting time. If malicious node sends or forwards the data in non-transmitting time, malicious node is caught by their neighbor nodes in the network. Key Words: IDS, Secure Routing Protocol, Stop Transmit and Listen
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...CSCJournals
Determination of the position enables location awareness for mobile computers in any place and persistent wireless computing. In addition utilizing location information, location aware computers can render location based services possible for mobile users. In order to design and implement a technique to identify the source network interface card, a feasibility study should be done to keep the project within the budget; also tracking of new technologies will enhance the methodology of choosing these techniques. Wireless Local Area Network (WLAN) is vulnerable to malicious attacks due to their shared medium in unlicensed frequency spectrum, thus requiring security features for a variety of applications. This paper will discuss a technique that helps in determining the best location for access points using GPS system, in order to choose the optimal number of them; which guide to localize and identify attacks with optimal IDS method and cheapest price. The other thing is to locate the intruder within the monitored area by using a hybrid technique, which came from exist techniques, by focusing on the advantages of these techniques and come with a new one to give more accurate results with less price by using available resources
An analysis of Network Intrusion Detection System using SNORTijsrd.com
This paper describes the analysis of signature based intrusion detection systems. Snort which is a signature based intrusion detection system are used for this purpose. We use DARPA dataset for the evaluation of Intrusion detection system.
WSN Based Temperature Monitoring System for Multiple Locations in Industryijtsrd
Wireless sensor network technology has demonstrated a great potential for industrial, commercial, and consumer applications. Speci cally, in process monitoring and control, process data such as pressure, humidity, temperature, ow, level, viscosity, density and vibration intensity measurements can be collected through sensing units and transferred wirelessly to a control system for operation and management. Adopting WSNs for process monitoring and control provides great advantages over traditional wired system. In today's world we are facing with many di erent types of emergencies in the indoor environment. Response to such emergencies is critical in order to protect resources including human life and also we can save property from damage. This wireless sensor network for Temperature monitoring System which can report the emergency to the users in various forms, such as pop ups on a Computer screen, SMS on their cell phones and so on. Due to this exibility of reporting low cost wireless sensor network prepared for emergency response system of future. We are going to develop three wireless sensor nodes and we have to place in di erent position in the building using arduino board and we have to inform to the master node or monitoring node about the temperature available at each sensor node. While sending data to each and every sensor is very costly. Hence nodes are connected to WSN and their is only one node called 'Gateway' which collects the data from all other nodes and sends it to the cloud. Aditya Jogdand | Amit Chaudhari | Niranjan Kadu | Udaykumar Shroff ""WSN Based Temperature Monitoring System for Multiple Locations in Industry"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23124.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/23124/wsn-based-temperature-monitoring-system-for-multiple-locations-in-industry/aditya-jogdand
A simple and effective scheme to find malicious node in wireless sensor networkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A simple and effective scheme to find malicious node in wireless sensor networkeSAT Journals
Abstract Wireless Sensor Network consists of hundreds or thousands of sensor nodes. Impractical to maintain topology and protect each sensor nodes from attack. Wireless Sensor Network is often deployed in an unattended and hostile environment to perform the monitoring and data collection tasks. When sensor nodes are deployed in such an environment, sensor network lacks in physical protection and is subject to insertion of malicious node. After that an adversary may launch various attacks to disrupt the in-network communication through malicious node. In such attacks malicious node behave like normal nodes by selectively drop packets for make it harder to detect their malicious nature. Many schemes have been proposed to detect malicious nodes, but very few can identify attacks. But those proposals are send redundant packets, consume more energy and storage to identify malicious nodes. A simple and effective scheme proposed as Stop Transmit and Listen (STL) to find the malicious node. Each node is having the built-in time limit to stop their transmission. For every few seconds every node stops their transmission and listens for malicious behavior. Malicious nodes are not aware of non-transmitting time. If malicious node sends or forwards the data in non-transmitting time, malicious node is caught by their neighbor nodes in the network. Key Words: IDS, Secure Routing Protocol, Stop Transmit and Listen
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...CSCJournals
Determination of the position enables location awareness for mobile computers in any place and persistent wireless computing. In addition utilizing location information, location aware computers can render location based services possible for mobile users. In order to design and implement a technique to identify the source network interface card, a feasibility study should be done to keep the project within the budget; also tracking of new technologies will enhance the methodology of choosing these techniques. Wireless Local Area Network (WLAN) is vulnerable to malicious attacks due to their shared medium in unlicensed frequency spectrum, thus requiring security features for a variety of applications. This paper will discuss a technique that helps in determining the best location for access points using GPS system, in order to choose the optimal number of them; which guide to localize and identify attacks with optimal IDS method and cheapest price. The other thing is to locate the intruder within the monitored area by using a hybrid technique, which came from exist techniques, by focusing on the advantages of these techniques and come with a new one to give more accurate results with less price by using available resources
Wireless sensor networks are made up of number of tiny mobile nodes, which
have the capability of computation, sensing and wireless network communication. The
energy efficiency of each node in such kind of networks is one of the important issues under
consideration. Thus for these networks, sensor nodes life time is basically depends on use of
routing protocols for routing operations in WSN. There are various routing protocols
proposed by different researchers, which are considered as efficient on the basis of
performance of network lifetime and energy scavenging. There are different routing
protocols introduced for WSN such as flat routing protocols, clustering routing protocols,
hierarchical routing protocols etc. On the other hand, there are basically two types of
WSNs, homogeneous and heterogeneous sensor networks. As WSN is vulnerable to different
types of security threats, there are many security methods presented with their own
advantages and disadvantages. Most of security methods are applied only on homogeneous
WSN, but recently some methods were presented to provide the routing security in
heterogeneous WSNs as well. In this paper, the different security threats and Intrusions in
WSNs are presented, with review of different security methods.
A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...IJNSA Journal
Location privacy is one of the major security problems in a Wireless Body Area Networks (WBANs). An eavesdropper can keep track of the place and time devices are communicating. To make things even worse, the attacker does not have to be physically close to the communicating devices, he can use a device with a stronger antenna. The unique hardware address of a mobile device can often be linked to the identity of the user operating the device. This represents a violation of the user’s privacy. The user should decide when his/her location is revealed and when not. In this paper, we first categorize the type of eavesdroppers for WBANs, and then we propose a new scheme to provide the location privacy in Wireless Body Area Networks (WBANs).
2D mapping using omni-directional mobile robot equipped with LiDARTELKOMNIKA JOURNAL
A room map in a robot environment is needed because it can facilitate localization, automatic navigation, and also object searching. In addition, when a room is difficult to reach, maps can provide information that is helpful to humans. In this study, an omni-directional mobile robot equipped with a LiDAR sensor has been developed for 2D mapping a room. The YDLiDAR X4 sensor is used as an indoor scanner. Raspberry Pi 3 B single board computer (SBC) is used to access LiDAR data and then send it to a computer wirelessly for processing into a map. This computer and SBC are integrated in robot operating system (ROS). The movement of the robot can use manual control or automatic navigation to explore the room. The Hector SLAM algorithm determines the position of the robot based on scan matching of the LiDAR data. The LiDAR data will be used to determine the obstacles encountered by the robot. These obstacles will be represented in occupancy grid mapping. The experimental results show that the robot is able to follow the wall using PID control. The robot can move automatically to construct maps of the actual room with an error rate of 4.59%.
The proposed System for Indoor Location TrackingEditor IJCATR
Indoor location tracking systems are used to locate people or certain objects in buildings and in closed areas. For example,
finding co-workers in a large office building, locating customers within a shopping mall and locating patients in the hospital are a few
applications of indoor location tracking systems. Indoor tracking capability opens up multiple possibilities. To address this need, this
paper describes the implementation of a Bluetooth-based indoor location tracking system that utilizes the integrated Bluetooth modules
in any today's mobile phones to specify and display the location of the individuals in a certain building. The proposed system aims for
location tracking/monitoring and marketing applications for whom want to locate individuals carrying mobile phones and advertise
products and services.
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
The wireless sensor node is a tiny device that is used to capture environment information.
Sensor devices are used to capture temperature and pressure details from the environment. The
sensor devices are used in hospitals, home and production plants. The main components of a sensor
node are microcontroller, transceiver, external memory and power source. A wireless sensor network
(WSN) is a wireless network consisting of spatially distributed autonomous devices. Sensors are
used to cooperatively monitor physical or environmental conditions. Sensor network is equipped
with a radio transceiver or other wireless communications device. The sensor networks are deployed
with consideration of sensing and transmission coverage factors.
Sensor network security protocols provide confidentiality for the messages. Object location and data
sink information are the sensitive elements in the sensor network. Two techniques are used to
provide location privacy to monitored objects. They are Source-location privacy and Sink-location
privacy. Periodic collection and Source simulation models are used in Source-location privacy
technique. Sink simulation and backbone flooding models are used in Sink-location privacy
technique. Communication cost and latency factors are consider in the privacy protection model.
Source and destination location details are protected in the privacy model.
The proposed system integrates the location privacy and data security process for the wireless sensor
network. Region based query model is used to improve location privacy. Confidentiality and
integrity techniques are used for the security process. Rivest Cipher (RC4) algorithm and Secure
Hashing Algorithms (SHA) are used for the data security.
Target pursuit is one in all the key applications of wireless device networks (WSNs). Existing work largely
needs organizing teams of device nodes with measurements of a target’s movements or correct distance
measurements from the nodes to the target, and predicting those movements. These are, however, typically tough to
accurately accomplish in follow, particularly within the case of unpredictable environments, device faults, etc. during
this paper, we have a tendency to propose a brand new pursuit framework, referred to as Face Track, that employs the
nodes of a special region encompassing a target, referred to as a face. rather than predicting the target location singly
in an exceedingly face, we have a tendency to estimate the target’s moving toward another face. we have a tendency
to introduce a foothold detection algorithmic rule to come up with every face more in such how that the nodes will
prepare previous the target’s moving, that greatly helps pursuit the target in an exceedingly timely fashion and
convalescent from special cases, e.g., device fault, loss of pursuit. Also, we have a tendency to develop associate
optimum choice algorithmic rule to pick that sensors of faces to question and to forward the pursuit information.
Simulation results, compared with existing work, show that Face Track achieves higher pursuit accuracy and energy
potency.
Nuzzer algorithm based Human Tracking and Security System for Device-Free Pas...Eswar Publications
In recent years, majority of researches are focused on localization system for wireless environment. These researches rely on localization using devices to track the entities. In this paper, we use, a recently proposed Device-free Passive (DfP) that uses Probabilistic techniques to track locations in large-scale real environment without the need of carrying devices. The proposed system uses the Access Points (APs) and Monitoring Point (MPs) that works by monitoring and processing the changes in the received physical signals at one or more monitoring points to detect changes in the environment. The system uses continuous space estimator to return multiple location while the mortal is in motion. Our results show that the system can achieve very high probability of detection and tracking with very few false positives.
Image Processing Based Detecting and Tracking for Security SystemCSCJournals
Security systems are getting more attention and importance. Numeral security arrangements based on sensors and wireless communication are available in the form of mechanical and electronic applications. These systems are used widely in banks and government offices. However, these traditional systems lack qualities like they cannot examine, track the suspect and generate the alarm simultaneously. Thus, it is difficult to expand these systems with the help of the sensors because of the complexity of the algorithms used. Hence, viewing these points, this paper provides a security system based on Image Processing, which does not only inform the host side at the runtime through alarm but also detects and tracks the present situation by locating the target. The Optical Flow technique of image processing is used to detect using motion analysis of two consecutive frames from the imaging source. The block analysis determines the tracking capabilities of the system by the property of Good Features to track. The wireless link between the imaging sources is established through XAMPP. While the functionality of the alarm is performed at the commencement of the detection process. The results relating to the process of detecting, tracking and generating alarm simultaneously are encouraging and will help to increase the efficiency of the security systems.
An intrusion detection system plays a major role in network security. We
propose a model “DB-OLS: An Approach for IDS” which is a Deviation Based-Outlier
approach for Intrusion detection using Self Organizing Maps. In this model “Self
Organizing Map” approach is to be used for behavior learning and “Outlier mining”
approach, for detecting an intruder by calculating deviation from known user profile.
This model aims to improve the capability of detecting intruders.
Wireless Data Transmission and Acquisition for Alive DetectionIJMERJOURNAL
ABSTRACT: Wireless sensor network have a broad range of application in the category of detection and monitoring. Data acquisition plays an important role in the field of modern industry control .In any cases remote data should be transferred to monitor center which is far away from the manufacturing field .Traditional data acquisition system by means of wires could not satisfy the requirement,as there is rapid development of embedded system, wireless communication technology and depend on 3G as wireless data transmit terminals will be in use widely in industry. This paper presents a new data acquisition and analyzing system based on 3G technology .In this paper the problem of soldiers is alive or not is considered and a comprehensive framework is proposed for the use of wireless sensor network for real-time jawan’s detection and monitoring . This paper presents a development platform of pulse sensor ,capable of transmitting pulse rate via wireless technology to the control room where the set up has been made to receive these pulse rate data .The device would make the acquisition of pulse data through pulse sensor/heartbeat sensor ,easy to obtain and sent. The goal of work reported in this paper was to build a system to benefit and facilitate relative detection wirelessly. Today is the age of automation and centralized control of processes ,where emphasis is more and more towards coalescing of techniques to form a unifiesd entity that can support itself without much intervention from external agents .Automation eliminates human errors, while achieving better productivity and optimum utilization of resources with lesser requirement of time.With innovative and creative bent of mind, man comes out with solution for every problems.The use of wireless data transmission provided by wearable system is also interesting to avoid wires that could limit the movement of subjects in studies . The goal of work reported in this paper was to build a system to detect and monitor .without much human efforts by using our circuit we can monitor the generating units in alive detection and control the performance automatically.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM ijwmn
Communication networks are essential and it will create many crucial issues today. Nowadays, we
consider that the firewalls are the first line of defense but that policies cannot meet the particular
requirements of needed process to achieve security. Most of the research has been done in this area but
we are lagging to achieve security needs. Already many models such as ADAM, DHP, LERAD and
ENTROPHY are proposed to resolve security problems but we need an efficient model to detect new types
of various intrusions within the entire network. In this paper, we proposed to design a modernized
intrusion detection system which consist of two methods such as anomaly and misuse detection. Both are
integrated and also used to detect novel attacks. Our system proposed to discover temporal pattern of
attacker behaviors, which is profiled using an algorithm EAA (Enhanced Apriori Algorithm). This is
experimented with a simple interface to display the behaviors of attacks effectively
Mobile devices like laptops, iPhones and PDAs are highly susceptible to theft in public places like airport terminal, library and cafe.
Moreover, the exposure of sensitive data stored in the mobile device could be more damaging than the loss of device itself. In this work, we
propose and implement a mobile device protection system using sensors, based on sensing and wireless networking technologies. Comparing
with existing solutions, it is unique in providing an integrated protection to both device and data. It is a context-aware system which adjusts the
protection level to the mobile device dynamically according to the context information such as the user proximity to the mobile device, which is
collected via the interactions between the sensors carried by the user, embedded with the mobile device and deployed in the surrounding
environment.
Dependable integrated surveillance systems for the physical security of metro...Francesco Flammini
Poster presentation of the paper "Dependable integrated surveillance systems for the physical security of metro railways" at the 2009 Third ACM/IEEE International Conference on Distributed Smart Cameras (ICDSC-09)
Wireless sensor networks are made up of number of tiny mobile nodes, which
have the capability of computation, sensing and wireless network communication. The
energy efficiency of each node in such kind of networks is one of the important issues under
consideration. Thus for these networks, sensor nodes life time is basically depends on use of
routing protocols for routing operations in WSN. There are various routing protocols
proposed by different researchers, which are considered as efficient on the basis of
performance of network lifetime and energy scavenging. There are different routing
protocols introduced for WSN such as flat routing protocols, clustering routing protocols,
hierarchical routing protocols etc. On the other hand, there are basically two types of
WSNs, homogeneous and heterogeneous sensor networks. As WSN is vulnerable to different
types of security threats, there are many security methods presented with their own
advantages and disadvantages. Most of security methods are applied only on homogeneous
WSN, but recently some methods were presented to provide the routing security in
heterogeneous WSNs as well. In this paper, the different security threats and Intrusions in
WSNs are presented, with review of different security methods.
A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...IJNSA Journal
Location privacy is one of the major security problems in a Wireless Body Area Networks (WBANs). An eavesdropper can keep track of the place and time devices are communicating. To make things even worse, the attacker does not have to be physically close to the communicating devices, he can use a device with a stronger antenna. The unique hardware address of a mobile device can often be linked to the identity of the user operating the device. This represents a violation of the user’s privacy. The user should decide when his/her location is revealed and when not. In this paper, we first categorize the type of eavesdroppers for WBANs, and then we propose a new scheme to provide the location privacy in Wireless Body Area Networks (WBANs).
2D mapping using omni-directional mobile robot equipped with LiDARTELKOMNIKA JOURNAL
A room map in a robot environment is needed because it can facilitate localization, automatic navigation, and also object searching. In addition, when a room is difficult to reach, maps can provide information that is helpful to humans. In this study, an omni-directional mobile robot equipped with a LiDAR sensor has been developed for 2D mapping a room. The YDLiDAR X4 sensor is used as an indoor scanner. Raspberry Pi 3 B single board computer (SBC) is used to access LiDAR data and then send it to a computer wirelessly for processing into a map. This computer and SBC are integrated in robot operating system (ROS). The movement of the robot can use manual control or automatic navigation to explore the room. The Hector SLAM algorithm determines the position of the robot based on scan matching of the LiDAR data. The LiDAR data will be used to determine the obstacles encountered by the robot. These obstacles will be represented in occupancy grid mapping. The experimental results show that the robot is able to follow the wall using PID control. The robot can move automatically to construct maps of the actual room with an error rate of 4.59%.
The proposed System for Indoor Location TrackingEditor IJCATR
Indoor location tracking systems are used to locate people or certain objects in buildings and in closed areas. For example,
finding co-workers in a large office building, locating customers within a shopping mall and locating patients in the hospital are a few
applications of indoor location tracking systems. Indoor tracking capability opens up multiple possibilities. To address this need, this
paper describes the implementation of a Bluetooth-based indoor location tracking system that utilizes the integrated Bluetooth modules
in any today's mobile phones to specify and display the location of the individuals in a certain building. The proposed system aims for
location tracking/monitoring and marketing applications for whom want to locate individuals carrying mobile phones and advertise
products and services.
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
The wireless sensor node is a tiny device that is used to capture environment information.
Sensor devices are used to capture temperature and pressure details from the environment. The
sensor devices are used in hospitals, home and production plants. The main components of a sensor
node are microcontroller, transceiver, external memory and power source. A wireless sensor network
(WSN) is a wireless network consisting of spatially distributed autonomous devices. Sensors are
used to cooperatively monitor physical or environmental conditions. Sensor network is equipped
with a radio transceiver or other wireless communications device. The sensor networks are deployed
with consideration of sensing and transmission coverage factors.
Sensor network security protocols provide confidentiality for the messages. Object location and data
sink information are the sensitive elements in the sensor network. Two techniques are used to
provide location privacy to monitored objects. They are Source-location privacy and Sink-location
privacy. Periodic collection and Source simulation models are used in Source-location privacy
technique. Sink simulation and backbone flooding models are used in Sink-location privacy
technique. Communication cost and latency factors are consider in the privacy protection model.
Source and destination location details are protected in the privacy model.
The proposed system integrates the location privacy and data security process for the wireless sensor
network. Region based query model is used to improve location privacy. Confidentiality and
integrity techniques are used for the security process. Rivest Cipher (RC4) algorithm and Secure
Hashing Algorithms (SHA) are used for the data security.
Target pursuit is one in all the key applications of wireless device networks (WSNs). Existing work largely
needs organizing teams of device nodes with measurements of a target’s movements or correct distance
measurements from the nodes to the target, and predicting those movements. These are, however, typically tough to
accurately accomplish in follow, particularly within the case of unpredictable environments, device faults, etc. during
this paper, we have a tendency to propose a brand new pursuit framework, referred to as Face Track, that employs the
nodes of a special region encompassing a target, referred to as a face. rather than predicting the target location singly
in an exceedingly face, we have a tendency to estimate the target’s moving toward another face. we have a tendency
to introduce a foothold detection algorithmic rule to come up with every face more in such how that the nodes will
prepare previous the target’s moving, that greatly helps pursuit the target in an exceedingly timely fashion and
convalescent from special cases, e.g., device fault, loss of pursuit. Also, we have a tendency to develop associate
optimum choice algorithmic rule to pick that sensors of faces to question and to forward the pursuit information.
Simulation results, compared with existing work, show that Face Track achieves higher pursuit accuracy and energy
potency.
Nuzzer algorithm based Human Tracking and Security System for Device-Free Pas...Eswar Publications
In recent years, majority of researches are focused on localization system for wireless environment. These researches rely on localization using devices to track the entities. In this paper, we use, a recently proposed Device-free Passive (DfP) that uses Probabilistic techniques to track locations in large-scale real environment without the need of carrying devices. The proposed system uses the Access Points (APs) and Monitoring Point (MPs) that works by monitoring and processing the changes in the received physical signals at one or more monitoring points to detect changes in the environment. The system uses continuous space estimator to return multiple location while the mortal is in motion. Our results show that the system can achieve very high probability of detection and tracking with very few false positives.
Image Processing Based Detecting and Tracking for Security SystemCSCJournals
Security systems are getting more attention and importance. Numeral security arrangements based on sensors and wireless communication are available in the form of mechanical and electronic applications. These systems are used widely in banks and government offices. However, these traditional systems lack qualities like they cannot examine, track the suspect and generate the alarm simultaneously. Thus, it is difficult to expand these systems with the help of the sensors because of the complexity of the algorithms used. Hence, viewing these points, this paper provides a security system based on Image Processing, which does not only inform the host side at the runtime through alarm but also detects and tracks the present situation by locating the target. The Optical Flow technique of image processing is used to detect using motion analysis of two consecutive frames from the imaging source. The block analysis determines the tracking capabilities of the system by the property of Good Features to track. The wireless link between the imaging sources is established through XAMPP. While the functionality of the alarm is performed at the commencement of the detection process. The results relating to the process of detecting, tracking and generating alarm simultaneously are encouraging and will help to increase the efficiency of the security systems.
An intrusion detection system plays a major role in network security. We
propose a model “DB-OLS: An Approach for IDS” which is a Deviation Based-Outlier
approach for Intrusion detection using Self Organizing Maps. In this model “Self
Organizing Map” approach is to be used for behavior learning and “Outlier mining”
approach, for detecting an intruder by calculating deviation from known user profile.
This model aims to improve the capability of detecting intruders.
Wireless Data Transmission and Acquisition for Alive DetectionIJMERJOURNAL
ABSTRACT: Wireless sensor network have a broad range of application in the category of detection and monitoring. Data acquisition plays an important role in the field of modern industry control .In any cases remote data should be transferred to monitor center which is far away from the manufacturing field .Traditional data acquisition system by means of wires could not satisfy the requirement,as there is rapid development of embedded system, wireless communication technology and depend on 3G as wireless data transmit terminals will be in use widely in industry. This paper presents a new data acquisition and analyzing system based on 3G technology .In this paper the problem of soldiers is alive or not is considered and a comprehensive framework is proposed for the use of wireless sensor network for real-time jawan’s detection and monitoring . This paper presents a development platform of pulse sensor ,capable of transmitting pulse rate via wireless technology to the control room where the set up has been made to receive these pulse rate data .The device would make the acquisition of pulse data through pulse sensor/heartbeat sensor ,easy to obtain and sent. The goal of work reported in this paper was to build a system to benefit and facilitate relative detection wirelessly. Today is the age of automation and centralized control of processes ,where emphasis is more and more towards coalescing of techniques to form a unifiesd entity that can support itself without much intervention from external agents .Automation eliminates human errors, while achieving better productivity and optimum utilization of resources with lesser requirement of time.With innovative and creative bent of mind, man comes out with solution for every problems.The use of wireless data transmission provided by wearable system is also interesting to avoid wires that could limit the movement of subjects in studies . The goal of work reported in this paper was to build a system to detect and monitor .without much human efforts by using our circuit we can monitor the generating units in alive detection and control the performance automatically.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM ijwmn
Communication networks are essential and it will create many crucial issues today. Nowadays, we
consider that the firewalls are the first line of defense but that policies cannot meet the particular
requirements of needed process to achieve security. Most of the research has been done in this area but
we are lagging to achieve security needs. Already many models such as ADAM, DHP, LERAD and
ENTROPHY are proposed to resolve security problems but we need an efficient model to detect new types
of various intrusions within the entire network. In this paper, we proposed to design a modernized
intrusion detection system which consist of two methods such as anomaly and misuse detection. Both are
integrated and also used to detect novel attacks. Our system proposed to discover temporal pattern of
attacker behaviors, which is profiled using an algorithm EAA (Enhanced Apriori Algorithm). This is
experimented with a simple interface to display the behaviors of attacks effectively
Mobile devices like laptops, iPhones and PDAs are highly susceptible to theft in public places like airport terminal, library and cafe.
Moreover, the exposure of sensitive data stored in the mobile device could be more damaging than the loss of device itself. In this work, we
propose and implement a mobile device protection system using sensors, based on sensing and wireless networking technologies. Comparing
with existing solutions, it is unique in providing an integrated protection to both device and data. It is a context-aware system which adjusts the
protection level to the mobile device dynamically according to the context information such as the user proximity to the mobile device, which is
collected via the interactions between the sensors carried by the user, embedded with the mobile device and deployed in the surrounding
environment.
Dependable integrated surveillance systems for the physical security of metro...Francesco Flammini
Poster presentation of the paper "Dependable integrated surveillance systems for the physical security of metro railways" at the 2009 Third ACM/IEEE International Conference on Distributed Smart Cameras (ICDSC-09)
Monitoring behavior, numerous actions, or any such information is considered
as surveillance and is done for information gathering, influencing, managing,
or directing purposes. Citizens employ surveillance to safeguard their
communities. Governments do this for the purposes of intelligence collection,
including espionage, crime prevention, the defense of a method, a person, a
group, or an item; or the investigation of criminal activity. Using an internet
of things (IoT) rover, the area will be secured with better secrecy and
efficiency instead of humans, will provide an additional safety step. In this
paper, there is a discussion about an IoT rover for remote surveillance based
around a Raspberry Pi microprocessor which will be able to monitor a
closed/open space. This rover will allow safer survey operations and would
help to reduce the risks involved with it.
SIP Flooding Attack Detection Using Hybrid Detection AlgorithmEditor IJMTER
The session initiation protocol is the signalling protocol,for controlling voice and video
communication over the internet protocol.SIP is however designed with open structure vulnerable
to security attak.The SIP flooding attack is the most severe attack becouse it is easy to launch and
capable of quickly draining the resources of both network and node. The existing flooding
detection schemes are either anomaly based or misuse based.The anomaly based scheme can detect
unknown attack it does not need the proir knowledge of the attack,but it generates some false
alarm,suffers from accuracy problem and gives false positive.Similarly the misuse based schemes
have high detection accuracy,no false positive but it cannot detect unknown attack.To overcome
problems in both detection schemes a hybrid detection scheme is proposed.the proposed hybrid
scheme consist features of both anomaly based scheme and misuse based scheme,and it gives fast
response,increase accuracy of detection and no false alarm
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITORijesajournal
Embedded systems in the range of from a tiny microcontroller-based sensor device to mobile smart phones
have vast variety of applications. However, in the literature there is no up to date system-level design of
embedded hardware and software, instead academic publications are mainly focused on the improvement
of specific features of embedded software/hardware and the embedded system designs for specific
applications. Moreover, commercially available embedded systems are not disclosed for the view of
researchers in the literature. Therefore, in this paper we first present how to design a state of art embedded
system including emerged hardware and software technologies. Bedside Patient monitor devices used in
intensive cares units of hospitals are also classified as embedded systems and run sophisticated software
and algorithms for better diagnosis of diseases. We reveal the architecture of our, commercially available,
bedside patient monitor to provide a design example of embedded systemsrelating to emerged technologies.
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITORijesajournal
Embedded systems in the range of from a tiny microcontroller-based sensor device to mobile smart phones
have vast variety of applications. However, in the literature there is no up to date system-level design of
embedded hardware and software, instead academic publications are mainly focused on the improvement
of specific features of embedded software/hardware and the embedded system designs for specific
applications. Moreover, commercially available embedded systems are not disclosed for the view of
researchers in the literature. Therefore, in this paper we first present how to design a state of art embedded
system including emerged hardware and software technologies. Bedside Patient monitor devices used in
intensive cares units of hospitals are also classified as embedded systems and run sophisticated software
and algorithms for better diagnosis of diseases. We reveal the architecture of our, commercially available,
bedside patient monitor to provide a design example of embedded systemsrelating to emerged technologies.
PIP-MPU: FORMAL VERIFICATION OF AN MPUBASED SEPARATION KERNEL FOR CONSTRAINED...ijesajournal
Pip-MPU is a minimalist separation kernel for constrained devices (scarce memory and power resources).
In this work, we demonstrate high-assurance of Pip-MPU’s isolation property through formal verification.
Pip-MPU offers user-defined on-demand multiple isolation levels guarded by the Memory Protection Unit
(MPU). Pip-MPU derives from the Pip protokernel, with a full code refactoring to adapt to the constrained
environment and targets equivalent security properties. The proofs verify that the memory blocks loaded in
the MPU adhere to the global partition tree model. We provide the basis of the MPU formalisation and the
demonstration of the formal verification strategy on two representative kernel services. The publicly
released proofs have been implemented and checked using the Coq Proof Assistant for three kernel
services, representing around 10000 lines of proof. To our knowledge, this is the first formal verification of
an MPU based separation kernel. The verification process helped discover a critical isolation-related bug.
International Journal of Embedded Systems and Applications (IJESA)ijesajournal
International Journal of Embedded Systems and Applications (IJESA) is a quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Embedded Systems and applications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Embedded Systems and establishing new collaborations in these areas.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Embedded Systems & applications.
Pip-MPU: Formal Verification of an MPU-Based Separationkernel for Constrained...ijesajournal
Pip-MPU is a minimalist separation kernel for constrained devices (scarce memory and power resources). In this work, we demonstrate high-assurance of Pip-MPU’s isolation property through formal verification. Pip-MPU offers user-defined on-demand multiple isolation levels guarded by the Memory Protection Unit (MPU). Pip-MPU derives from the Pip protokernel, with a full code refactoring to adapt to the constrained environment and targets equivalent security properties. The proofs verify that the memory blocks loaded in the MPU adhere to the global partition tree model. We provide the basis of the MPU formalisation and the demonstration of the formal verification strategy on two representative kernel services. The publicly released proofs have been implemented and checked using the Coq Proof Assistant for three kernel services, representing around 10000 lines of proof. To our knowledge, this is the first formal verification of an MPU based separation kernel. The verification process helped discover a critical isolation-related bug.
International Journal of Embedded Systems and Applications (IJESA)ijesajournal
International Journal of Embedded Systems and Applications (IJESA) is a quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Embedded Systems and applications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Embedded Systems and establishing new collaborations in these areas.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Embedded Systems & applications.
Call for papers -15th International Conference on Wireless & Mobile Network (...ijesajournal
15th International Conference on Wireless & Mobile Network (WiMo 2023) is dedicated to addressing the challenges in the areas of wireless & mobile networks. The Conference looks for significant contributions to the Wireless and Mobile computing in theoretical and practical aspects. The Wireless and Mobile computing domain emerges from the integration among personal computing, networks, communication technologies, cellular technology, and the Internet Technology. The modern applications are emerging in the area of mobile ad hoc networks and sensor networks. This Conference is intended to cover contributions in both the design and analysis in the context of mobile, wireless, ad-hoc, and sensor networks. The goal of this Conference is to bring together researchers and practitioners from academia and industry to focus on advanced wireless and Mobile computing concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to.
Call for Papers -International Conference on NLP & Signal (NLPSIG 2023)ijesajournal
Scope & Topics
International Conference on NLP & Signal (NLPSIG 2023) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Signal and Natural Language Processing (NLP).
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to:
Topics of interest include, but are not limited to, the following
Chunking/Shallow Parsing
Dialogue and Interactive Systems
Deep learning and NLP
Discourseand Pragmatics
Information Extraction, Retrieval, Text Mining
Interpretability and Analysis of Models for NLP
Language Grounding to Vision, Robotics and Beyond
Lexical Semantics
Linguistic Resources
Machine Learning for NLP
Machine Translation
NLP and Signal Processing
NLP Applications
Ontology
Paraphrasing/Entailment/Generation
Parsing/Grammatical Formalisms
Phonology, Morphology
POS tagging
Question Answering
Resources and Evaluation
Semantic Processing
Sentiment Analysis, Stylistic Analysis, and Argument Mining
Speech and Multimodality
Speech Recognition and Synthesis
Spoken Language Processing
Statistical and Knowledge based methods
Summarization
Theory and Formalism in NLP
Signal Processing & NLP
Computer Vision, Image Processing& NLP
NLP, AI & Signal
Paper Submission
Authors are invited to submit papers through the conference Submission System by May 06, 2023. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by International Journal on Cybernetics & Informatics (IJCI) (Confirmed).
Selected papers from NLPSIG 2023, after further revisions, will be published in the special issue of the following journals.
International Journal on Natural Language Computing (IJNLC)
International Journal of Ubiquitous Computing (IJU)
International Journal of Data Mining & Knowledge Management Process (IJDKP)
Signal & Image Processing : An International Journal (SIPIJ)
International Journal of Ambient Systems and Applications (IJASA)
International Journal of Grid Computing & Applications (IJGCA)
Important Dates
Submission Deadline : May 06, 2023
Authors Notification : May 25, 2023
Final Manuscript Due : June 08, 2023
International Conference on NLP & Signal (NLPSIG 2023)ijesajournal
International Conference on NLP & Signal (NLPSIG 2023) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Signal and Natural Language Processing (NLP).
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to:
11th International Conference on Software Engineering & Trends (SE 2023)ijesajournal
11th International Conference on Software Engineering & Trends (SE 2023)
May 27 ~ 28, 2023, Vancouver, Canada
https://acsit2023.org/se/index
Scope & Topics
11th International Conference on Software Engineering & Trends (SE 2023) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Software Engineering. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding Modern software engineering concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of software engineering & applications. Topics of interest include, but are not limited to, the following.
Topics of interest include, but are not limited to, the following
The Software Process
Software Engineering Practice
Web Engineering
Quality Management
Managing Software Projects
Advanced Topics in Software Engineering
Multimedia and Visual Software Engineering
Software Maintenance and Testing
Languages and Formal Methods
Web-based Education Systems and Learning Applications
Software Engineering Decision Making
Knowledge-based Systems and Formal Methods
Search Engines and Information Retrieval
Paper Submission
Authors are invited to submit papers through the conference Submission System by April 08, 2023. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings (H index 35) in Computer Science & Information Technology (CS & IT) series (Confirmed).
Selected papers from SE 2023, after further revisions, will be published in the special issue of the following journals.
The International Journal of Software Engineering & Applications (IJSEA) -ERA indexed
International Journal of Computer Science, Engineering and Applications (IJCSEA)
Important Dates
Submission Deadline : April 08, 2023
Authors Notification : April 29, 2023
Final Manuscript Due : May 06, 2023
11th International Conference on Software Engineering & Trends (SE 2023)ijesajournal
11th International Conference on Software Engineering & Trends (SE 2023) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Software Engineering. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding Modern software engineering concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of software engineering & applications. Topics of interest include, but are not limited to, the following.
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXINGijesajournal
This article is based on preliminary work on the OSI model management layers to optimized industrial
wired data transfer on low data rate wireless technology. Our previous contribution deal with the
development of a demonstrator providing CAN bus transfer frames (1Mbps) on a low rate wireless channel
provided by Zigbee technology. In order to be compatible with all the other industrial protocols, we
describe in this paper our contribution to design an innovative Wireless Device (WD) and a software tool,
which will aim to determine the best architecture (hardware/software) and wireless technology to be used
taking in account of the wired protocol requirements. To validate the proper functioning of this WD, we
will develop an experimental platform to test different strategies provided by our software tool. We can
consequently prove which is the best configuration (hardware/software) compared to the others by the
inclusion (inputs) of the required parameters of the wired protocol (load, binary rate, acknowledge
timeout) and the analysis of the WD architecture characteristics proposed (outputs) as the delay introduced
by system, buffer size needed, CPU speed, power consumption, meeting the input requirement. It will be
important to know whether gain comes from a hardware strategy with hardware accelerator e.g or a
software strategy with a more perf
GENERIC SOPC PLATFORM FOR VIDEO INTERACTIVE SYSTEM WITH MPMC CONTROLLERijesajournal
Today, a significant number of embedded systems focus on multimedia applications with almost insatiable demand for low-cost, high performance, and low power hardware cosumption. In this paper, we present a re-configurable and generic hardware platform for image and video processing. The proposed platform uses the benefits offered by the Field Programmable Gate Array (FPGA) to attain this goal. In this context,
a prototype system is developed based on the Xilinx Virtex-5 FPGA with the integration of embedded processors, embedded memory, DDR, interface technologies, Digital Clock Managers (DCM) and MPMC.
The MPMC is an essential component for design performance tuning and real time video processing. We demonstrate the importance role of this interface in multi video applications. In fact, to successful the
deployment of DRAM it is mandatory to use a flexible and scalable interface. Our system introduces diverse modules, such as cut video detection, video zoom-in and out. This provides the utility of using this architecture as a universal video processing platform according to different application requirements. This platform facilitates the development of video and image processing applications.
This paper presents an inverting buck-boost DCDC converter design. A negative supply voltage is needed
in a variety of applications, but only a few DCDC converters are available on the market. OLED, a new
display type especially suited for small digital camera or mobile phone displays. Design challenges that
came up when negative voltages have to be handled on chip will be discussed, such as
continuous/discontinuous mode transition problems, negative voltage feedback and negative over-voltage
protection. Both devices operate in a fixed frequency PWM mode or alternatively in PFM mode. The single
inductor topology is called inverting buck-boost converter or simply inverter. The proposed converter has
been implemented with a TSMC 0.13-um 2P4M CMOS process, and the chip area is 325 x 300 um2.
A Case Study: Task Scheduling Methodologies for High Speed Computing Systems ijesajournal
High Speed computing meets ever increasing real-time computational demands through the leveraging of
flexibility and parallelism. The flexibility is achieved when computing platform designed with
heterogeneous resources to support multifarious tasks of an application where as task scheduling brings
parallel processing. The efficient task scheduling is critical to obtain optimized performance in
heterogeneous computing Systems (HCS). In this paper, we brought a review of various application
scheduling models which provide parallelism for homogeneous and heterogeneous computing systems. In
this paper, we made a review of various scheduling methodologies targeted to high speed computing
systems and also prepared summary chart. The comparative study of scheduling methodologies for high
speed computing systems has been carried out based on the attributes of platform & application as well.
The attributes are execution time, nature of task, task handling capability, type of host & computing
platform. Finally a summary chart has been prepared and it demonstrates that the need of developing
scheduling methodologies for Heterogeneous Reconfigurable Computing Systems (HRCS) which is an
emerging high speed computing platform for real time applications.
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...ijesajournal
Modern embedded systems are being modeled as Heterogeneous Reconfigurable Computing Systems
(HRCS) where Reconfigurable Hardware i.e. Field Programmable Gate Array (FPGA) and soft core
processors acts as computing elements. So, an efficient task distribution methodology is essential for
obtaining high performance in modern embedded systems. In this paper, we present a novel methodology
for task distribution called Minimum Laxity First (MLF) algorithm that takes the advantage of runtime
reconfiguration of FPGA in order to effectively utilize the available resources. The MLF algorithm is a list
based dynamic scheduling algorithm that uses attributes of tasks as well computing resources as cost
function to distribute the tasks of an application to HRCS. In this paper, an on chip HRCS computing
platform is configured on Virtex 5 FPGA using Xilinx EDK. The real time applications JPEG, OFDM
transmitters are represented as task graph and then the task are distributed, statically as well dynamically,
to the platform HRCS in order to evaluate the performance of the designed task distribution model. Finally,
the performance of MLF algorithm is compared with existing static scheduling algorithms. The comparison
shows that the MLF algorithm outperforms in terms of efficient utilization of resources on chip and also
speedup an application execution.
Payment industry is largely aligned in their desire to create embedded payment systems ready for the
modern digital age. The trend to embed payments into a software platform is often regarded as first step
towards a broader trend of embedded finance based on digital representation of fiat currencies. Since it
became clear to our research team that there are no technologies and protocols that are protected against
attacks of quantum computing, and that enable automatic embedded payments, online or offline with no
fear of counterfeit, P2P or device-to-device to be made in real time without intermediaries, in any
denomination, even continuous payments per time or service, while preserving the privacy of all parties,
without enabling illicit activities, we decided to utilize the Generic Innovation Engine [1] that is based on
the Artificial Intelligence Assistance Innovation acceleration methodologies and tools in order to boost the
progress of innovation of the necessary solutions. These methodologies accelerate innovation across the
board. It proposes a framework for natural and artificial intelligence collaboration in pursuit of an
innovative (R&D) objective The outcome of deploying these Artificial Innovation Assistant (AIA)
methodologies was tens of patents that yield solutions, that a few of them are described in this paper. We
argue that a promising avenue for automated embedded payment systems to fulfil people’s desire for
privacy when conducting payments, and national security agencies demand for quantum-safe security,
could be based on DeFi and digital currencies platforms that does not suffer from flaws of DLT-based
solutions, while introducing real advantages, in all aspects, including being quantum-resilient, enabling
users to decide with whom, if at all, to share information, identity, transactions details, etc., all without
trade-offs, complying with AML measures, and accommodating the potential for high transaction volumes.
It is not legacy bank accounts, and it is not peer-dependent, nor a self-organizing network.
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...ijesajournal
Modern embedded systems are being modeled as Heterogeneous Reconfigurable Computing Systems
(HRCS) where Reconfigurable Hardware i.e. Field Programmable Gate Array (FPGA) and soft core
processors acts as computing elements. So, an efficient task distribution methodology is essential for
obtaining high performance in modern embedded systems. In this paper, we present a novel methodology
for task distribution called Minimum Laxity First (MLF) algorithm that takes the advantage of runtime
reconfiguration of FPGA in order to effectively utilize the available resources. The MLF algorithm is a list
based dynamic scheduling algorithm that uses attributes of tasks as well computing resources as cost
function to distribute the tasks of an application to HRCS. In this paper, an on chip HRCS computing
platform is configured on Virtex 5 FPGA using Xilinx EDK. The real time applications JPEG, OFDM
transmitters are represented as task graph and then the task are distributed, statically as well dynamically,
to the platform HRCS in order to evaluate the performance of the designed task distribution model. Finally,
the performance of MLF algorithm is compared with existing static scheduling algorithms. The comparison
shows that the MLF algorithm outperforms in terms of efficient utilization of resources on chip and also
speedup an application execution.
2 nd International Conference on Computing and Information Technology ijesajournal
2
nd International Conference on Computing and Information Technology Trends
(CCITT 2023) will provide an excellent international forum for sharing knowledge and
results in theory, methodology and applications of Computing and Information Technology
Trends. The Conference looks for significant contributions to all major fields of the
Computer Science, Compute Engineering, Information Technology and Trends in theoretical
and practical aspects.
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...ijesajournal
Modern embedded systems are being modeled as Heterogeneous Reconfigurable Computing Systems
(HRCS) where Reconfigurable Hardware i.e. Field Programmable Gate Array (FPGA) and soft core
processors acts as computing elements. So, an efficient task distribution methodology is essential for
obtaining high performance in modern embedded systems. In this paper, we present a novel methodology
for task distribution called Minimum Laxity First (MLF) algorithm that takes the advantage of runtime
reconfiguration of FPGA in order to effectively utilize the available resources. The MLF algorithm is a list
based dynamic scheduling algorithm that uses attributes of tasks as well computing resources as cost
function to distribute the tasks of an application to HRCS. In this paper, an on chip HRCS computing
platform is configured on Virtex 5 FPGA using Xilinx EDK. The real time applications JPEG, OFDM
transmitters are represented as task graph and then the task are distributed, statically as well dynamically,
to the platform HRCS in order to evaluate the performance of the designed task distribution model. Finally,
the performance of MLF algorithm is compared with existing static scheduling algorithms. The comparison
shows that the MLF algorithm outperforms in terms of efficient utilization of resources on chip and also
speedup an application execution.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DESIGN AND PROTOTYPE OF A WIRELESS TAILGATE DETECTION SYSTEM USING SUN SPOT PLATFORM
1. International Journal of Embedded Systems and Applications (IJESA) Vol.1, No.1, September 2011
1
DESIGN AND PROTOTYPE OF A WIRELESS TAILGATE
DETECTION SYSTEM USING SUN SPOT PLATFORM
Andres Alarcon-Ramirez1
, Madeline Martinez-Pabón2
and Charles Kim3
1
Department of Electrical Engineering, Howard University, Washington DC
alarconramirezandr@bison.howard.edu
2
Department of Electrical Engineering, Howard University, Washington DC
martinezpabonmadelin@bison.howard.edu
3
Department of Electrical Engineering, Howard University, Washington DC
ckim@howard.edu
ABSTRACT
In this paper, we present the design and implementation of a wireless sensor based piggybacking and
tailgating detection system to detect unauthorized attempt to gain access to a secured area. A set of Sun
SPOT wireless sensor platform is adopted for acceleration sensor, transmitter, and receiver units for the
system. A wireless sensor embedded in a security door collects the signal of door movement constantly and
transmits the signal wirelessly to another wireless sensor (base unit), which collects the transmitted signals
and stores them in the memory of the computer system for analysis. The acceleration signal is analyzed in
both time and frequency domain to detect and classify single and tailgate entries. The paper focuses on the
description of the wireless sensor network and the sensor-based tailgate detection algorithm.
KEYWORDS
Tailgate, piggybacking, embedded system, wireless sensor network, acceleration sensor.
1. INTRODUCTION
The biggest weakness of automated access control systems is the fact that most systems cannot
actually control how many people enter a secured area when an access card is presented or a
security code is keyed. Most systems control which card works at which door, but once an
employee opens the door, any number of people can follow behind the employee and enter into
the building. Similarly, when an employee exits the building, it is very easy for a person to grab
the door and enter the building as the employee is leaving. This practice is known as "tailgating"
or "piggybacking"[1]. Tailgating can be done overtly, where the intruder makes his presence
known to the employee. In many cases, the overt "tailgater" may even call out to the employee to
hold the door open for him or her. With so many security breaches reported every day resulting in
burglary, attack, and other crimes, a reliable tailgate detection system for doors would become an
excellent way to keep places safe.
To overcome the deficiencies of the existing technologies and to provide a simple means of single
person and tailgate detection, a wireless tailgate system for a security door is designed and
implemented using Sun SPOT wireless network platform. The detection system embedded a
SPOT in the door to sense the acceleration motion of the door and to wireless transmit the motion
signal to another SPOT as the base station, which in turn is connected to a computer or PC. The
2. International Journal of Embedded Systems and Applications (IJESA) Vol.1, No.1, September 2011
2
PC analyzes the acceleration signals and indicates and alerts if more than one person enters
through the door. The detailed signal analysis and detection algorithm is described.
This paper is organized as follows. In the following section, there is a description of the related
work. In Section 3 the Sun SPOT platform and its development system environment are
introduced. Section 4 then describes the acceleration sensor embedded in the SPOT. Section 5
details the design and implementation of tailgate detection system using the SPOT platforms.
Section 6 covers the developed algorithm of tailgate alert as well as the preliminary test results of
the prototype system of tailgate detection. Finally, Section 7 concludes the paper.
2. RELATED WORK
An existing single person detector uses a 3D sensor using MLI (Modulated Light Intensity)
technology [2]. MLI technology is based on the optical time of flight principle. A non-scanning
light source emits modulated near-infrared light. The phase shift between the light emitted by the
source and the light reflected by the persons and objects in the field of view is measured to create
a real-time topographic image of the monitored area. By means of time of flight measurement, the
overhead-located 3D MLI sensor measures and processes topographic 3D data, in order to detect
the number of people in a specific area.
In [3] is reported an arrangement of two synchronized doors known as mantrap. For access to a
secure area, a person needs to pass through two doors. Initially, a person enters to a verification
area, where the space is arranged to locate only one person, by opening the first door. Once the
user is verified, the access to the secure area is authorized and the second door is opened.
Additionally, the first door remains locked until the second door is again closed avoiding
tailgating.
Another method of single person detector relies on a network of video cameras mounted on the
ceiling of the area in front of the access door to the area [4]. Each of the cameras watches over an
area of about one square meter and the video signal is fed to a computer that spots when someone
is walking up to the door. If it's a single person then he is allowed to authenticate himself at the
door and enter as normal but if there is someone else in the area the computer won't let the door
open until either the second person has also authenticated or until he walks away.
In the same way, a video camera is used in [5] as a security system to recognize tailgating by
comparing and analyzing behaviors against rules which has been defined beforehand in video
stream. Finding an event deemed to be a potential rule violation; it alerts personnel on a
customized basis.
T-DAR is another system which uses three-dimensional optical imaging to detect piggybacking
and tailgating attempts [6]. T-DAR systems can be adapted for two types of applications: secure
doorways and high-security mantraps. The primary difference between the two systems is that the
door system alerts security to tailgating and piggybacking incidents and sounds a local alarm, but
has no capability to stop the violator, while the mantrap system effectively prevents tailgating and
piggybacking by allowing only one person to pass through a vestibule at a time.
In [7] is presented a security system on access-controlled doors named Door Detective to prevent
the open door from tailgaters and other unauthorized entries. The Door Detective is constituted by
an infrared beam array crossing the doorway together with microprocessor-based intelligence to
ensure only one person passes through a door. A similar work constituted by an optical security
system, which uses unique algorithms and infrared sensor beams to detect tailgating, is presented
in [8]. Upon alarm, Door Detective can lock nearby entrance control doors or trigger cameras
while informing local and remote security personnel.
The work made by Jae Hoon Lee uses multiple of laser range finder. This technology measures
the range distance from sensor to target object [9]. The method has many merits in data
3. International Journal of Embedded Systems and Applications (IJESA) Vol.1, No.1, September 2011
3
manipulation, robustness, and resolution in distance information. Also, it uses Multi-target
tracking technology with Kalman filter to track human objects in motion and count their number
in the region of interest. Motion model and geometric feature of human is also considered for
detecting the walking humans. Unfortunately, the price of this system is very high, its installation
is very complex, and architectural modification is often required for different installations. In all,
the existing technologies are expensive and complex; therefore, an economical and simple
detection system is needed in replacement of the existing technologies.
3. SUN SPOT – WIRELESS SENSOR PLATFORM
A SPOT (Sun Small Programmable Object Technology) is a wireless sensor network mote
developed by Sun Microsystems. The device is built upon the IEEE 802.15.4 standard. Unlike
other mote systems, the SPOT is built on the Squawk Java Virtual Machine [10]. A SPOT is
about the size of a 3x5 card with a 32-bit ARM9 CPU, 1 MB RAM and 8 MB of flash memory, a
2.4 GHz radio and a USB interface. Our project also made used of a Java ME VM and the
NetBeans 7.0 Integrated Development Environment.
The hardware platform of SPOT includes a range of built-in sensors as well as the ability to easily
interface to external devices. There are two different kinds of SPOTs: Free-range SPOT and base
station SPOT. The anatomy of a free-range SPOT consists of a battery, a processor board, a
sensor board and a sunroof as shown in Figure 1. The sensor board has three difference kind of
sensor to measure acceleration, temperature and light intensity. Our single person detector used
only the acceleration sensor [11].
Figure 1. SPOT Anatomy
The base station SPOT does not have the sensor board and its purpose is to allow applications
running on the host to interact with applications running on targets. The Host can be any of the
supported platforms (e.g. Windows PC, Mac). The Host application is a J2SE program [12], and
the target application is a Squawk Java program. Host applications have access to libraries with a
subset of the API of the libraries used by SPOT applications. This means that a host application
can, for example, communicate with a SPOT via a base station using code identical that which
you would use to communicate between two SPOTs. Note that the host application does not run
on the base station; it sends commands to the base station over a USB connection.
The base station may run in either dedicated or shared mode. In dedicated mode, it runs within
the same Java VM as the host application and can only be used by that application. In this mode,
the host’s address is that of the base station. In shared mode, two Java virtual machines are
launched on the host computer: one manages the base station and another runs the host
application. In this mode, the host application has its own system-generated address, distinct from
that of the base station. Communication from host application to the target is therefore over two
radio hops, in contrast to one hop in the dedicated case. The main advantage of shared mode is
that more than one host application can use the same base station simultaneously. Shared mode
also allows multiple host processes to communicate with each other using the radio
4. International Journal of Embedded Systems and Applications (IJESA) Vol.1, No.1, September 2011
4
Accelerometer Program
communication stack, which makes it possible to simulate the communication behavior of a
group of SPOTs using host applications.
Two of the platforms used in our design and prototype are the SPOT Manager tool and NetBeans
7.0 Integrated Development Environment. The SPOT Manager comes with two important tools
for managing the software on the SPOTs: SPOT Manager and Solarium [13]. Each Sun SPOT is
listed by its IEEE network number. The solarium tap also is an important application because it
makes easier to manage SPOTs and the application software of those SPOTs. Solarium includes
an emulator that can be used to run applications on a virtual SPOT. Figure 2 shows two SPOTs
being simulated by the Solarium application.
Figure 2. Solarium Application
The other platform used in the prototype of the tailgating detection system to facilitate the
interaction of the accelerometer program written in Java and the SPOTs is NetBeans.
The NetBeans platform is a reusable framework for simplifying the development of Java
Swing desktop applications. It was used to compile, deploy and run the accelerometer program.
The steps that were followed when using NetBeans to run the accelerometer program are as
follow. First, the program has to be opened and set as main project. Second, it has to be cleaned
and built. After these two steps, the output panel shows the output from the compile operation.
This text ends with "BUILD SUCCESSFUL" and the time it took to build the object code as
shown in Figure 3.
Figure 3. NetBeans Window showing that the operation was successful
Accelerometer
5. International Journal of Embedded Systems and Applications (IJESA) Vol.1, No.1, September 2011
5
4. SPOT ACCELEROMETER SENSOR SYSTEM
4.1 General Architecture of SPOT-based System
The free range SPOT is an embedded computer that has an accelerometer sensor incorporated to
measure the orientation and motion in all three dimensions. The accelerometer wireless sensor
system inside a free-range SPOT that is used for our design of the tailgate detection system
monitors and measures the acceleration, and it constitutes a complete system with a base station,
and a PC as illustrated in Fig. 4. The accelerometer sensor runs a program using Java that
measures the acceleration motion of the door. The program was made using the 1.6.0_20 version
of Java and was run in a Sony PC.
Figure 4. Elements of the accelerometer sensor network
Once the accelerometer sensor of a free-range SPOT embedded in the door has captured the
acceleration data, this information is sent via wireless to the base station which is connected
through a USB cable to the PC. The base station connects by 802.15.4 radio to the free-range
SPOT. This free-range SPOT starts transmitting data to the base-station once the acceleration
program is deployed and run on it.
The PC contains all programs that the SPOTs need to run the acceleration program, including the
SPOT Manager [14] and NetBeans [15]. Additionally, the PC runs a program that analyzes the
acceleration data. This program is created in MatLab and is able to make a file with the
acceleration data, so this information can be analyzed for algorithm development for real-time
tailgate detection system. Figure 5 shows the acceleration data vs. time after two abrupt changes
in the door’s acceleration.
Figure 5. Acceleration vs. Time
Time
a
c
c
e
l
e
r
a
6. International Journal of Embedded Systems and Applications (IJESA) Vol.1, No.1, September 2011
6
Here, we discuss in detail the Free-range SPOT, base station SPOT, and the SPOT host software
architectures, as well s the characteristics of accelerometer sensor.
4.2 Free-range Sun SPOT Software Architecture
The free-range SPOT is not provided of any operating system; therefore, the Squawk JVM runs
on the bare hardware and provides low-level operating system support, as well as application
isolation. The various SPOT libraries allow access to the SPOT device and basic I/O. This
includes access to the low-level MAC radio protocol [16]. The Sun SPOT application, which
extends the Java ME MIDlet class, runs on top of a number of libraries which constitute the free-
range SPOT architecture. They provide an environment where a user-written SPOT application
can access to a variety of sensors and communication components with which the free-range
SPOT is provided.
4.3 Sun SPOT Host Software Architecture
The SPOT host software stack is comprised several elements. At the bottom of the stack is
located the host operating system, that is, Linux, Windows, Mac OS X or Solaris. Just above the
OS is a Java SE JVM along with all the regular Java class libraries. In the middle of the stack are
the various SPOT libraries that provide access to the SPOT device, basic I/O, and the low-level
MAC radio protocol such as USB connection to PC or socket connections to other host
applications. One SPOT library provides higher-level radio protocols, such as radiogram and
radio stream, and also takes care of routing of packets. Another gives access to a number of over-
the-air commands that can be sent to a free-range SPOT. This includes the command used to
discover SPOTs within radio range. Finally, at the top is the user-written host SPOT application,
which is just a regular Java SE program. It can do everything a regular Java application can do:
file I/O, display Swing GUI's, etc.
4.4 Base-Station SPOT Software Architecture
The base station SPOT software stack is constituted by two components, namely, squawk Java
ME JVM, and the SPOTlib library. The host applications communicate with free-range SPOTs
by using the base station's radio. Additionally, no user code runs on the base station; therefore,
the host application runs solely on the host computer. On the other hand, the host computer sends
packets to the base station via USB, which then sends them out over its radio. Similarly when the
base station receives a radio packet it forwards it to the host application. The base station can
also run on share-mode, where more than one host application uses the base station to broadcast
packets, and where a socket connection is established as a medium through which packets
received from other host applications are relayed to free-range SPOTs.
4.5 Accelerometer Sensor Architecture
Each of the free-range SUN SPOTs is constituted by a low-power, three-axis linear accelerometer
sensor. The SPOT uses MMA7455L accelerometer that can be set to measure accelerations over
a scale of ±2, ±4g or ± 8g. An accelerometer sensor can be visualized as a very small mass
suspended in the center of the device by tiny springs. When acceleration is applied to the device,
the mass deflects along one or more axes inside the device. Built-in circuitry constantly measures
the amount of deflection along each axis and translates it into voltage data. Then the data
becomes available to be read by an analog-to-digital converter, which receives as input a raw
voltage and generates a digital signal [17].
The MMA7455L accelerometer is a low power, micro-machined a Micro-Electro-Mechanical
System (MEMS) sensor capable of measuring acceleration along its X, Y, and Z axes [18]. The
sampling rate of the accelerometer is either 125 or 250 Hz. The output signal from the
accelerometer is read by the ARM9 processor and then converted to g-force units. The SPOT
library includes the IAccelerometer3D interface that defines the basic methods to read any three
7. International Journal of Embedded Systems and Applications (IJESA) Vol.1, No.1, September 2011
7
axis acceleration in the free-range SUN SPOT. The MMA7455L accelerometer classes
implement the IAccelerometer3D interface along with methods specific to the sensor.
5. DESIGN AND ALGORITHM FOR SPOT-BASED TAILGATE DETECTION
SYSTEM
The sensor-based tailgate detection system is formed by a door-embedded SPOT with internal
acceleration sensor and wireless transmitter unit, a receiver formed by a base-station SPOT, a PC,
and an alarm indicator such as speaker or LEDs (light emitting diodes). The accelerometer
MMA7455L [5] accelerometer used in the SPOT is set to measure accelerations over a scale of ±
2g. The free-range SPOT collects the signal of door movement continuously and transmits the
signal wirelessly to the base-station SPOT, which at the same time uses a serial port to transmit
via USB the data to a PC, where a program running constantly storages and analyses them.
In practical installation, the free-range SPOT can be placed inside or outside the door near the
door handle or any place of the door without compromising the dimensions or functional features
of the space, while the receiver or base station (another SPOT), the PC, and the alarm can be
remotely located in a security room or any place to monitor the door access. The alarm is
connected to the PC to generate an alarm when there are two or more unauthorized people trying
to access through the door. The diagram of the sensor-based tailgate detection system is shown in
Figure 6.
Figure 6. Diagram of the single person and tailgate detection system for doors.
The analysis of the characteristics of the acceleration signal will determine if a tailgate condition
is occurring. Figure 7 shows a single cycle of acceleration sensor signal for door opening/closing
followed by a much faster multi-cycle noise for the door contact moment with the door frame
when a person opens the door and enters an area.
8. International Journal of Embedded Systems and Applications (IJESA) Vol.1, No.1, September 2011
8
Figure 7. Acceleration signal of a single person entry condition.
When the door contact noise is ignored, the door movement signal for a door with a hydraulic
closer under single entry is characterized by a low frequency full cycle as an indication of door
opening and closing without any interruption in the signal pattern. However, as illustrated in
Figure 8, when other person(s) tailgate a person, then the usual door movement signal is added
with another cycle of similar door open/close signal followed by the same door contact-generated
faster multi-cycle noise.
Figure 8. Acceleration signal of a tailgate condition.
The two cycles of the signal, unequal magnitudes and unequal frequencies, result from the first
door opening and closing movement and, even before the movement is not completed,
immediately following next door opening and closing made by the second person. When the door
contact noise is ignored as above, the door movement signal for a door with a hydraulic closer
under tailgate entry is characterized by two or more concatenated cycles of different low
frequency signals.
9. International Journal of Embedded Systems and Applications (IJESA) Vol.1, No.1, September 2011
9
6. TAILGATE DETECTION PROTOTYPE AND INITIAL TESTS
The wireless sensor based tailgate detection algorithm is executed on a PC which receives data
from a base station SPOT. The algorithm developed for the prototype is summarized in a
flowchart of Figure 9 and each step of the algorithm is explained here.
Figure 9. Flow chart of sensor-based tailgate detection algorithm.
The algorithm analyzes constantly acceleration data following a set of stages to detect and alarm
piggybacking. The algorithm seeks to detect the first time where the acceleration is above or
below a range defined by a set of thresholds (positive and negative as horizontally lined in figure
7 and 8), and whose levels can be acquired from experience or heuristics. This point is called ts,
Set the value of thresholds,
Threshold1=0.6, Threshold2=-0.6
Receive acceleration data from
base station SUN SPOT
Storage the values of acceleration
and time in a buffer
Classify data into three windows:
1st
window: ts <time< tp2nd
window: tp <time< tw
Calculate the FFT and the Power
Spectral Density (PSD) to the
data into the first window
If PSD has
more than 1
peak
Alert: More than a person is
passing the door
Yes
No
If
acceleration>threshold1
Collect N samples during 15 seconds
from ts and te
10. International Journal of Embedded Systems and Applications (IJESA) Vol.1, No.1, September 2011
10
and is set to detect the door opening/closing signal. Then, a number of N samples are collected
for the next 15 seconds until a time te. The sampling rate used in the PC needs explanation since
the rate is much different, slower, from that of the accelerometer of the free-range SPOT. Even
though the sample rate from the MMA7455L accelerometer is of 8ms or 4ms, delays due to
storage, and transmission in the free range Sun SPOT, which are higher than 8ms, reduce
considerably the minimum rate at which the acceleration have to be read without loss of
information. That is, the transmission rate of the free range Sun SPOT is 250kbps, which means a
128-byte packet would take 4.096ms to be transmitted. However, there is an overhead of sending
the MAC and LowPan packet header information, which can be over one fourth of the packet of
128 bytes, so that reduces the payload data rate to 187.5kps.
Additionally, a time of 1.2ms is added for the SPOT to stuff the data in the packet before it can
hand it off to the radio code, bringing the payload data rate down to 145kbps. The SPOT radio
stack deliberately introduces a 15 msec delay after sending a packet so that one SPOT does not
use all of the radio bandwidth. This delay increases (by 5-15msec) for packets sent over multiple
hops so that the next packet sent does not collide with the retransmission of the previous packet.
Adding in the delay and the payload data rate is now down to about 38kbps. Another few
milliseconds for other overhead such as checking the route to the destination, waiting for the
ACK packet, flow control for a RadioStream, becomes data rate about 30kbps; namely, a 128-
byte packet would take about 42.6ms to be transmitted. For our application, one sample every 80
ms, which is higher than 42.4 ms, experimentally guarantees that the sensor data has enough time
to be arrived at the PC for real-time analysis for the algorithm execution for our tailgate detection
system.
By the much reduced rate of one sample every 80 ms in the PC and signal analysis, the number of
samples collected during 15 seconds is approximately N≈187. Additionally, the last pulse point
above or below the thresholds within 15 seconds is called tw., this point is used as reference to
select a range of data which begins at tw and ends in a point called tp.
Then, the acceleration data is selected from ts (first time the acceleration is above or under the
range defined by threshold 1 and threshold 2) to tp. This is a critical range that will define when
one or more people access the door. Figure 10(a) and 10(b) show the two situations that have to
be analyzed. Figure 10(a) represent the acceleration behavior when one person access the secured
area, while, figure 16(b) shows the acceleration between ts and tp when more than one person has
had access to this area.
Figure 10. (a) Acceleration between points – ts and tp- when one person accesses the door. (b)
Acceleration between points - ts and tp- when two people access the door.
The next step of the single person and tailgate detection/discrimination is to do frequency analysis
for the event signal segment between ts and tp. A simple signal analysis method is the Discrete
Fourier Transformation (DFT) but other method such as Wavelet analysis can also be applied to
11. International Journal of Embedded Systems and Applications (IJESA) Vol.1, No.1, September 2011
11
find the frequency component of the event signal segment. For this work it is used the Discrete
Fourier Transformation to analyze the acceleration signal that is previously sent by the
acceleration sensor to the PC.
Figure 11 shows the DFT result of the event signal of Figure 10(a) for the case of a single person
gaining access to the secured area. It shows only one peak detected above a certain threshold,
0.03 for example. This threshold can be adjusted and the system is able to continue working
properly. In the case of single person entry the tailgate detector does not trigger the alarm. It can
be appreciated that the DFT results are very accurate establishing when one person is having
access through the secured door.
Figure 11. Power spectral density for single person entry.
On the other hand, as illustrated in Figure 12, the DFT result of the event signal of Figure 10(b)
(multiple person entry case) which shows 2 peaks above the threshold. In this case, the algorithm
alerts of multi-person or tailgate entry. These four graphs show clearly that the calculation of the
DFT when two or more people are having access through the secured area is very accurate
because we get always the same pattern (two or more peaks above the threshold). It can be
possible to get more than two peaks above the threshold when more than two people are tailgating
a person. In the last case also an alert is triggered. Therefore, the number of peaks is the
determinant factor that detect if the door was correctly opened or not.
Figure 12. Power spectral density for tailgate entry.
As a preliminary test of the algorithm and the entire detection system, a number of 200 tests using
the designed platform were carried out in which 100 tests corresponded to single entries, and the
reminder, tailgates. As summarized in Table I, the result showed that 93% of the data was
12. International Journal of Embedded Systems and Applications (IJESA) Vol.1, No.1, September 2011
12
classified successfully as tailgate and a similar success rate for single entry classification, which
demonstrates a potential of the detection system in robust detection of tailgate entries.
Table 1. Preliminary Test Result of the Detection System.
Predicted
Single
Entry
Tailgate Total
Test
Cases
Single
Entry
94 6 100
Tailgate 8 92 100
Success
Rate
92.16% 93.88%
7. CONCLUSIONS
The paper described a design and prototype of an economical tailgate detection system
implemented using the SPOT wireless platform. The detection system tracks the acceleration of
the door constantly through a built-in accelerometer sensor of a free-range SPOT that is installed
inside the door to detect and alarm any unauthorized access. These acceleration signals are
transmitted to a base station SPOT which in turn send them via USB to a PC, and in the PC they
are analyzed in both time and frequency domain. The detection algorithm developed determines
if one or more people are attempting to get access to the secured area. When the system detects
that more than one person has gained access to the secured area, it provides an output by
triggering an alarm, thereby adding a security layer to the existing access control system,
unnoticed to the person.
ACKNOWLEDGEMENTS
The authors acknowledge Sun Microsystem's provision of the Sun SPOT kits through the 2009
“Change Your World” grant.
REFERENCES
[1] Seattle-Tacoma International Airport, Security Violations Handbook. Available at:
http://www.portseattle.org/downloads/about/employeeservices/idsecurityhandbook.pdf
[2] Airport Access Control and People Counting Systems. 2011. Available at:
http://www.airport-technology.com/contractors/access/iee/
[3] Suzanne Niles, “Physical Security in Mission Critical Facilities.” 2004. Available at:
www.apcmedia.com/salestools/SADE-5TNRPL_R1_EN.pdf
[4] Fujitsu Security System Targets Employee Tailgating. 2011. Available
at:http://www.csoonline.com/article/363313/fujitsu-security-system-targets-employee-tailgating
[5] System Solution Group, “Tailgating,” Available at: www.ssgroupinc.net/tailgating.html
13. International Journal of Embedded Systems and Applications (IJESA) Vol.1, No.1, September 2011
13
[6] Newton security innovation, “Overview of the T-DAR Anti-Tailgating System,” Available at:
www.newtonsecurityinc.com/tdar_overview.html
[7] Smarter Security Systems, “Smarter Security Systems Launches Latest Tailgate Detection System for
Doors.” Available at: http://www.prweb.com/releases/Smarter-Security/Tailgate-
Detection/prweb8210050.htm
[8] DETEX, “Tailgate Detection System,” Available at:
www.detex.com/uploadedFiles/Public_Content/Product_Catalog/LSSDH/Access_Control_Systems/E
S521_Series/ES-521-R1.pdf
[9] Jae Hoon Lee and Yong Shik Kim, "Security Door System Using Human Tracking Method with
Laser Range Finders," IEEE International Conference on Mechatronics and Automation, pp. 2060 –
2065, 2007.
[10] Simon, D., Cifuentes, C., Cleal, D., Daniels, J., White, D. Java™ on the Bare Metal of Wireless
Sensor Devices—The Squawk Virtual Machine. In VEE’06 June 14–16, Ottawa, Ontario, Canada.
ACM Press.
[11] Eric Arseneau, Ron Goldman and John Daniels, “Simplifying the Development of Sensor
Applications” Available at: http://ecoop2010.uni-
mb.si/images/Simplifying%20the%20Development%20of%20Sensor%20Applications.pdf
[12] J2SE program. Available at: http://www.oracle.com/technetwork/java/javase/1-5-0-139765.html
[13] Goldman, Ron. Sun Oracle. 16 9 2010. Available at:
www.sunspotworld.com/docs/AppNotes/AccelerometerAppNote.pdf
[14] Corporation, Oracle. Sun SPOT Word . 2011. Available at:
www.sunspotworld.com/SPOTManager.
[15] NetBeans. 2011.. Available at www.netbeans.org.
[16] Sun™ SPOT Programmer’s Manual. Available at:
http://sunspotworld.com/docs/Yellow/SunSPOT-Programmers-Manual.pdf
[17] Sun SPOT Tutorial. Available at: http://www.sunspotworld.com/Tutorial/SendDataHTTP.html
[18] FreeScale Semiconductor. 12 2009. Available at:
www.freescale.com/files/sensors/doc/data_sheet/MMA7455L.pdf
AUTHORS
Andres Alarcon-Ramirez is a PhD student in Electrical and Computer
Engineering at Howard University. He received his M.S. in Computer
Engineering from University of Puerto Rico (2009), where he was a research
assistant for The Bernard M. Gordon Center for Subsurface Sensing and
Imaging Systems. He also received a M.S. in Electrical Engineering (2006),
and his BS in Electrical Engineering (2003) from Universidad del Valle
(Cali-Colombia). Currently, he is working as research assistant at the
Electrical Department at Howard University.
14. International Journal of Embedded Systems and Applications (IJESA) Vol.1, No.1, September 2011
14
Madeline Martinez received her BS in Electronic Engineering (2007) from
Industrial University of Santander (Bucaramanga, Colombia). Currently,
she is an M.S student in Electrical Engineering at Howard University and
has worked on several areas such as Telecommunications and Power
Systems. Madeline’s research interest includes safety analysis of
Telecommunication Networks and sustainable energy systems.
Charles Kim (M’90, SM’06) received a Ph.D. degree in electrical
engineering from Texas A&M University (College Station, TX) in 1989.
Since, 1999, he has been with the Department of Electrical and Computer
Engineering at Howard University. Previously, Dr. Kim held teaching and
research positions at Texas A&M University and the University of Suwon.
Dr. Kim’s research interests include failure detection, anticipation, and
prevention in safety critical electrical/electronic systems in power,
aerospace, and nuclear industries.