According to Election Data Services the percentage of electronic voting machines per country is increasing, yet a full replacement of the traditional voting procedure is very unlikely. In it essence, an electronic voting ma-chine(EVM)is a computer assisted self-interviewing(CASI) device giving the voter the opportunity to review and change his/her vote before submitting it. The different types of voting machines allow for different kinds of interaction, such as using a touch screen technology, using a dial wheel, touching a paper panel or pressing a button on a LCD screen. Each machine provide feedback for blank ballots and under-voting and prevents selecting more choices than the maximum allowed. Our work presents an overview of the voting machines based on established theories and result from CASI and Fault tolerance of the voting machine with respect to different types of analysis
Electronic voting machine project using 8051 microcontroller is used to develop a electronic machine for
several advantages like security, accuracy etc.
This document describes an electronic voting machine that uses RFID technology. It contains a RFID reader and transponder to identify voters with RFID cards and allow them to cast votes. An Atmega 16 microcontroller is used as the control unit to process votes and display results. The machine aims to provide a more secure and easy voting process compared to traditional methods. Potential improvements include adding biometric verification of voters, data storage in EEPROM, and connecting multiple voting machines to aggregate results.
A Computer Based Artificial Neural Network Controller with Interactive Audito...theijes
The proposed design offers a complete online and offline solution to manage the industrial systems. The designed hardware able to, read analog signals, digital signals, and controls many devices in real time. The heart of the hardware part is microcontroller PIC18F4550 which communicate with a computer via USB. The software part is programmed using Visual C# software to control managed system requires. The system operator can monitor system and diagnostic faults manually or automatically based on artificial neural network. Finally, the system has been simulated and implemented successfully.
LCD based voting machine using 8051 microcontroller (Sohel Siddique
This project presents an electronic voting machine that displays vote counts on a 16x2 LCD screen using an AT89C51 microcontroller. The voting machine allows users to cast votes for four candidates using tactile switches connected to the microcontroller pins. It stores the vote counts in variables and displays a thank you message after each vote. When the stop button is pressed, it displays the candidate names with their vote counts and then the winner or candidates with a tie.
This project is designed for electronic voting machine by using the fingerprint identification method.
Here voters thumb impressions are used for identifying the voters.
During voting when the voter keeps his/her thumb in the scanner, the system will check whether it matches with pre stored impressions in the database.
If it matches then system will allow the voter to poll his vote and otherwise prevent the voter from polling.
ADVANTAGES
The main advantages of the systems are,
Providing the preventive measures system for voting.
It completely rules out the chance of invalid votes.
Its use results in reduction of polling time.
Results in fewer problems in electoral preparations, law and order candidates' expenditure.
Provide easy and accurate counting without any mischief at the counting centre.
It is capable of saving considerable printing stationery and transport of large volumes of electoral material.
FUTURE SCOPE OF THE PROJECT
This system can be used for elections since it provide complete security and will provide accurate results and save time and expenditure.
This can be modify by interfacing it with a PC through a serial port in order to provide additional security.
DEVELOPMENT OF AUTOMATIC GEOFENCING AND ACCIDENTAL MONITORING SYSTEM BASED ON...IJCSEA Journal
The main objective of this project is to design and develop an embedded system for vehicle to detect the road accident for immediate medical help as well as for security purpose in theft prevention using single shock sensor. In case of accidental mode the system should inform automatically via text message to medical rescue team indicating the position of vehicle location. When there is no car driver, vehicle should automatically go into security mode. When a person tries to steal the vehicle, this system should send an alert message to the owner. The system Geo fencing and accidental monitoring system based on AT89S52 as a central core. This includes various technologies: a shock sensor, Liquid crystal display (LCD), Dual relay and wireless communication. This system also includes Geo fencing technology. Geo fencing enables the remote monitoring of predefined set of boundaries and automatic detect when vehicle exit from these areas.
This document provides information about electronic voting machines (EVMs) used in India. It discusses how EVMs work, their components like the ballot unit and control unit, and the sequence of operations using the buttons on the control unit. Images show different parts of the EVM like the display screens and internal components. The document also briefly mentions awareness programs conducted to demonstrate EVMs and the process for counting votes cast using EVMs.
Literature on safety module for vehicular driver assistance IOSR Journals
This document summarizes a literature review on safety modules for vehicular driver assistance. It describes a system designed to provide driver assistance and safety through features like anti-collision detection and lane departure warning. The system uses an ultrasonic sensor and camera to monitor surrounding vehicles and lane boundaries. It is connected to a Raspberry Pi development board to process sensor data and display warnings. The document explains the working of ultrasonic sensors to detect distance between vehicles and discusses edge detection techniques for lane monitoring using the camera. It provides a block diagram and details the hardware components of the system aimed at enhancing safety while driving.
Electronic voting machine project using 8051 microcontroller is used to develop a electronic machine for
several advantages like security, accuracy etc.
This document describes an electronic voting machine that uses RFID technology. It contains a RFID reader and transponder to identify voters with RFID cards and allow them to cast votes. An Atmega 16 microcontroller is used as the control unit to process votes and display results. The machine aims to provide a more secure and easy voting process compared to traditional methods. Potential improvements include adding biometric verification of voters, data storage in EEPROM, and connecting multiple voting machines to aggregate results.
A Computer Based Artificial Neural Network Controller with Interactive Audito...theijes
The proposed design offers a complete online and offline solution to manage the industrial systems. The designed hardware able to, read analog signals, digital signals, and controls many devices in real time. The heart of the hardware part is microcontroller PIC18F4550 which communicate with a computer via USB. The software part is programmed using Visual C# software to control managed system requires. The system operator can monitor system and diagnostic faults manually or automatically based on artificial neural network. Finally, the system has been simulated and implemented successfully.
LCD based voting machine using 8051 microcontroller (Sohel Siddique
This project presents an electronic voting machine that displays vote counts on a 16x2 LCD screen using an AT89C51 microcontroller. The voting machine allows users to cast votes for four candidates using tactile switches connected to the microcontroller pins. It stores the vote counts in variables and displays a thank you message after each vote. When the stop button is pressed, it displays the candidate names with their vote counts and then the winner or candidates with a tie.
This project is designed for electronic voting machine by using the fingerprint identification method.
Here voters thumb impressions are used for identifying the voters.
During voting when the voter keeps his/her thumb in the scanner, the system will check whether it matches with pre stored impressions in the database.
If it matches then system will allow the voter to poll his vote and otherwise prevent the voter from polling.
ADVANTAGES
The main advantages of the systems are,
Providing the preventive measures system for voting.
It completely rules out the chance of invalid votes.
Its use results in reduction of polling time.
Results in fewer problems in electoral preparations, law and order candidates' expenditure.
Provide easy and accurate counting without any mischief at the counting centre.
It is capable of saving considerable printing stationery and transport of large volumes of electoral material.
FUTURE SCOPE OF THE PROJECT
This system can be used for elections since it provide complete security and will provide accurate results and save time and expenditure.
This can be modify by interfacing it with a PC through a serial port in order to provide additional security.
DEVELOPMENT OF AUTOMATIC GEOFENCING AND ACCIDENTAL MONITORING SYSTEM BASED ON...IJCSEA Journal
The main objective of this project is to design and develop an embedded system for vehicle to detect the road accident for immediate medical help as well as for security purpose in theft prevention using single shock sensor. In case of accidental mode the system should inform automatically via text message to medical rescue team indicating the position of vehicle location. When there is no car driver, vehicle should automatically go into security mode. When a person tries to steal the vehicle, this system should send an alert message to the owner. The system Geo fencing and accidental monitoring system based on AT89S52 as a central core. This includes various technologies: a shock sensor, Liquid crystal display (LCD), Dual relay and wireless communication. This system also includes Geo fencing technology. Geo fencing enables the remote monitoring of predefined set of boundaries and automatic detect when vehicle exit from these areas.
This document provides information about electronic voting machines (EVMs) used in India. It discusses how EVMs work, their components like the ballot unit and control unit, and the sequence of operations using the buttons on the control unit. Images show different parts of the EVM like the display screens and internal components. The document also briefly mentions awareness programs conducted to demonstrate EVMs and the process for counting votes cast using EVMs.
Literature on safety module for vehicular driver assistance IOSR Journals
This document summarizes a literature review on safety modules for vehicular driver assistance. It describes a system designed to provide driver assistance and safety through features like anti-collision detection and lane departure warning. The system uses an ultrasonic sensor and camera to monitor surrounding vehicles and lane boundaries. It is connected to a Raspberry Pi development board to process sensor data and display warnings. The document explains the working of ultrasonic sensors to detect distance between vehicles and discusses edge detection techniques for lane monitoring using the camera. It provides a block diagram and details the hardware components of the system aimed at enhancing safety while driving.
This document describes a system for automatically measuring the bore diameter of ball bearings using an LVDT sensor interfaced with a PLC. The system consists of auto-feeding, measuring, classifying, and data analysis parts. A servo motor pushes the bearing against the LVDT sensor based on PLC programming to obtain measurements at two locations. The measurements are displayed on an HMI and used to classify bearings as acceptable or needing rework/discard based on diameter and taper values. Simulation results show the system can accurately measure standard bearings to within 0.5um in 5 seconds, classifying grades and analyzing quality statistics.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Simulation of Signals with Field Signal SimulatorIOSR Journals
This document describes a field signal simulator (FSS) used to test real-time computer (RTC) systems for signal processing and control applications. The FSS can simulate over 1500 input/output signals at once using VME and PXI hardware. It includes simulation software that automates the testing process. The software uses a client-server model to generate field signals and test RTC systems thoroughly. Experimental results showed that using the FSS reduced testing time and improved reliability compared to previous passive simulation methods. The FSS can generate test reports to verify systems meet requirements and produce accurate, reliable results.
Railway transport system has proved to be a very sturdy and convenient mode of transport over the centuries. It still serves as the economic and most efficient means of mass transport in many countries. It is a widespread practice even today that most operations are manually carried out, leading to several dangerous accidents and mismanagement of the system. When it comes to the matter of scores of lives, error margin is of utmost importance to ensure an efficient and safe mode of travel. There is an utter need for a system that provides automation of the critical systems that play a pivotal role in the smooth functioning. The focus remains on certain key functions including locomotion, data logging for position, speed and health of he locomotive. This can increase the safety levels, while also reducing the time for relief in-case of unfortunate emergencies.
Railway transport system has proved to be a very sturdy and convenient mode of transport over the centuries. It still serves as the economic and most efficient means of mass transport in many countries. It is a widespread practice even today that most operations are manually carried out, leading to several dangerous accidents and mismanagement of the system. When it comes to the matter of scores of lives, error margin is of utmost importance to ensure an efficient and safe mode of travel. There is an utter need for a system that provides automation of the critical systems that play a pivotal role in the smooth functioning. The focus remains on certain key functions including locomotion, data logging for position, speed and health of he locomotive. This can increase the safety levels, while also reducing the time for relief in-case of unfortunate emergencies.
User guide for iLumTech DALI USB Bridge - The DALI/USB Bridge is a control and configuration device that connects a DALI bus with any computer equipped with a USB port. The DALI/USB Bridge allows for the setting of the operating parameters defined by the DALI standard and the operating parameters of iLumTech control devices. The small form factor and wiring simplicity of the DALI/USB Bridge makes it ideal for DALI bus setup and commissioning.
Fujitsu fi-5950 Intelligent MultiFeed Function (iMFF) for Advanced Ultrasonic...Kevin Neal
The document discusses the Fujitsu fi-5950 scanner's Intelligent MultiFeed Function (iMFF), which uses three independent ultrasonic sensors to detect overlapping pages and control the scanning process. It describes the three iMFF modes - Manual, Auto 1, and Auto 2 - and provides examples of medical records, EKG strips, and receipts to illustrate how iMFF can handle different types of documents with attached items or varying formats.
Electronic voting machines (EVMs) are used in Indian elections to record votes. The EVM displays candidates' names and party symbols. Voters cast their vote by pressing the button next to their chosen candidate. After polling ends, the EVMs are sealed and stored securely until counting begins on the announced date. The candidate who receives the most votes in a constituency is declared the winner. EVMs were first used in 50 polling stations in Kerala in 1982 but required a law change before nationwide adoption, which occurred in the late 1980s and early 1990s. EVMs save paper, are cost-effective, and reduce vote counting and result declaration times. However, some argue they have security and software issues and lack voter-verified
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This paper proposes the need of authenticated voting system in our election due to the increase in illegal voting or bogus voting in Loksabha and Rajyasabha election. Here the authentication of an individual is done using biometric and eligibility of the voter is verified using the Aadhar card. In this project, the database stored in the Aadhar card provides the reference data. Moreover, added tier of security is enforced as biometrics. The key functions of this paper are enrolment and matching. Initially, the voters’ fingerprints are enrolled and stored. Once the fingerprints are stored it can be retrieved at any time for authentication. During election, when the voter keeps his/her fingerprint the already stored Aadhar card details will be displayed from the database. An individual’s details can be deleted from the database if not required. The use of biometric requires less man power, save much time for voters and personnel, ensures accuracy, transparency and avoids bogus voting.
This document proposes an electronic voting system that uses Aadhar cards and biometric authentication to identify voters and prevent bogus voting. It involves using barcode scanners to read the enrollment ID on Aadhar cards to retrieve voter details stored in a database. Fingerprint authentication would then verify voters' identities. If verified, an electronic voting machine would activate for voters to cast their votes. The system aims to make voting more secure and efficient by leveraging Aadhar card data and biometric authentication compared to traditional paper-based systems.
Secure electronic voting system using fingerprint techniqueAshutha K
This document proposes a secure electronic voting system using fingerprint authentication. It begins with an introduction that explains the goals of allowing voters to cast their ballots securely while addressing disadvantages of existing systems. It then describes the existing e-voting process and proposes a new system that integrates fingerprint authentication technology. The proposed system uses fingerprint matching to verify voters' identities and link them to candidate selections stored in a microcontroller. The document outlines the system components, implementation, advantages over other systems in preventing fraud and recounts, and concludes the fingerprint-based system can deliver more transparent and faster elections.
Annunciator for Hazard Prevention & Temperature ControlIOSR Journals
This document describes a microcontroller-based annunciator system that detects faulty conditions such as fires and informs operators through audible and visual alerts. The system uses various sensors to monitor conditions and provides the information to an AT89C51 microcontroller. If an abnormality is detected, the microcontroller alerts owners and initiates responses through a DTMF generator. It can also control devices like relays to regulate temperatures or turn on water pumps to extinguish fires. The system was tested experimentally and results were found to match computational analyses with less than 2% error, likely due to potentiometer loading effects. In conclusion, such automation improves safety and efficiency in industrial and other settings.
This document provides an overview of the Automatic Fare Collection (AFC) system used by DMRC. The AFC system uses contactless smart cards and tokens to automate fare payments. It has a hierarchical architecture with central systems that communicate via WAN to station systems. The central systems include data centers that configure the system and store transaction data. Station systems include equipment like gates, ticket machines, and portable ticket decoders. The AFC system automates functions like access control, fare calculation, and stock management using the different fare media.
This document summarizes a wireless tire pressure monitoring system that uses sensors and radio frequency transmission. It consists of pressure and temperature sensors in each tire that transmit data via an RF transceiver to a receiver module. The receiver alerts the driver if pressure is too high or low via an LCD display and buzzer. Serial peripheral interface (SPI) protocol is used for communication between the microcontroller and RF transceiver to allow high-speed data transfer with few wires. Testing showed the system accurately measures pressure and warns of abnormal readings in real-time as needed for vehicle safety.
Current state of automotive network securityFFRI, Inc.
Many electronic devices have been used by automobiles.These devices are connected each other and communicate to control automobile. Recent years, automotive network has been connected to smartphones and the internet. It makes new threats turn up. This slides summarizes how automotive network security have been and what is expected as incoming threats.
This document summarizes several common Git commands:
- Git merge joins two or more development histories together in either a fast-forward or no fast-forward manner.
- Git log displays commit history and allows formatting and filtering options like oneline, decorate, stats, diffs, shortlog, graph and custom formats.
- Other commands covered include revert, checkout, reset, cherry-pick, rebase and filtering log output by amount, date, author, message, file, content and range.
Every year our local banks spend a lot of money for installing and maintaining switching software provided by foreign vendors. Is it possible to implement ATM/POS switch software in Bangladesh cost effectively? We tried to find out shortcomings of implementing ATM/POS switching software in Bangladesh. We did survey in Banks IT sector and talked with Vendor of Switching software to study details of Switching software.
The document provides an overview of the ISO8583 standard for financial transaction messaging. It defines key elements of ISO8583 messages including the message type identifier, bitmaps, and data elements. Common message type identifiers are provided for financial transactions, reversals, and network management messages. Examples of ISO8583 messages for transactions, reversals, and their responses are also given.
This document describes an ISO 8583 decoder user-defined function (UDF) for MySQL. The UDF allows MySQL to parse ISO 8583 message fields and retrieve data elements. To install the UDF, users can either manually copy the DLL file to the MySQL bin folder and run SQL commands, or use an installer program that prompts for the root password before installing. The ISO8583 function syntax extracts data from an ISO message based on the bit number, and optionally the ISO version.
ISO 8583 is an international standard for financial transaction card originated messages. It defines the interchange message format and content between automatic teller machines and payment card networks. The standard specifies a message type identifier, bitmaps to indicate included data elements, and up to 127 data elements containing transaction details. An ISO 8583 message facilitates electronic payment processing by transmitting necessary information through a network.
This slide I used to take lecture to my folks, I'll help understand ISO 8583 message format, conversions, limitations, organization, extension capability etc. you may contact me via mail for any kind of query regard this issue. thank you.
This document describes a system for automatically measuring the bore diameter of ball bearings using an LVDT sensor interfaced with a PLC. The system consists of auto-feeding, measuring, classifying, and data analysis parts. A servo motor pushes the bearing against the LVDT sensor based on PLC programming to obtain measurements at two locations. The measurements are displayed on an HMI and used to classify bearings as acceptable or needing rework/discard based on diameter and taper values. Simulation results show the system can accurately measure standard bearings to within 0.5um in 5 seconds, classifying grades and analyzing quality statistics.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Simulation of Signals with Field Signal SimulatorIOSR Journals
This document describes a field signal simulator (FSS) used to test real-time computer (RTC) systems for signal processing and control applications. The FSS can simulate over 1500 input/output signals at once using VME and PXI hardware. It includes simulation software that automates the testing process. The software uses a client-server model to generate field signals and test RTC systems thoroughly. Experimental results showed that using the FSS reduced testing time and improved reliability compared to previous passive simulation methods. The FSS can generate test reports to verify systems meet requirements and produce accurate, reliable results.
Railway transport system has proved to be a very sturdy and convenient mode of transport over the centuries. It still serves as the economic and most efficient means of mass transport in many countries. It is a widespread practice even today that most operations are manually carried out, leading to several dangerous accidents and mismanagement of the system. When it comes to the matter of scores of lives, error margin is of utmost importance to ensure an efficient and safe mode of travel. There is an utter need for a system that provides automation of the critical systems that play a pivotal role in the smooth functioning. The focus remains on certain key functions including locomotion, data logging for position, speed and health of he locomotive. This can increase the safety levels, while also reducing the time for relief in-case of unfortunate emergencies.
Railway transport system has proved to be a very sturdy and convenient mode of transport over the centuries. It still serves as the economic and most efficient means of mass transport in many countries. It is a widespread practice even today that most operations are manually carried out, leading to several dangerous accidents and mismanagement of the system. When it comes to the matter of scores of lives, error margin is of utmost importance to ensure an efficient and safe mode of travel. There is an utter need for a system that provides automation of the critical systems that play a pivotal role in the smooth functioning. The focus remains on certain key functions including locomotion, data logging for position, speed and health of he locomotive. This can increase the safety levels, while also reducing the time for relief in-case of unfortunate emergencies.
User guide for iLumTech DALI USB Bridge - The DALI/USB Bridge is a control and configuration device that connects a DALI bus with any computer equipped with a USB port. The DALI/USB Bridge allows for the setting of the operating parameters defined by the DALI standard and the operating parameters of iLumTech control devices. The small form factor and wiring simplicity of the DALI/USB Bridge makes it ideal for DALI bus setup and commissioning.
Fujitsu fi-5950 Intelligent MultiFeed Function (iMFF) for Advanced Ultrasonic...Kevin Neal
The document discusses the Fujitsu fi-5950 scanner's Intelligent MultiFeed Function (iMFF), which uses three independent ultrasonic sensors to detect overlapping pages and control the scanning process. It describes the three iMFF modes - Manual, Auto 1, and Auto 2 - and provides examples of medical records, EKG strips, and receipts to illustrate how iMFF can handle different types of documents with attached items or varying formats.
Electronic voting machines (EVMs) are used in Indian elections to record votes. The EVM displays candidates' names and party symbols. Voters cast their vote by pressing the button next to their chosen candidate. After polling ends, the EVMs are sealed and stored securely until counting begins on the announced date. The candidate who receives the most votes in a constituency is declared the winner. EVMs were first used in 50 polling stations in Kerala in 1982 but required a law change before nationwide adoption, which occurred in the late 1980s and early 1990s. EVMs save paper, are cost-effective, and reduce vote counting and result declaration times. However, some argue they have security and software issues and lack voter-verified
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This paper proposes the need of authenticated voting system in our election due to the increase in illegal voting or bogus voting in Loksabha and Rajyasabha election. Here the authentication of an individual is done using biometric and eligibility of the voter is verified using the Aadhar card. In this project, the database stored in the Aadhar card provides the reference data. Moreover, added tier of security is enforced as biometrics. The key functions of this paper are enrolment and matching. Initially, the voters’ fingerprints are enrolled and stored. Once the fingerprints are stored it can be retrieved at any time for authentication. During election, when the voter keeps his/her fingerprint the already stored Aadhar card details will be displayed from the database. An individual’s details can be deleted from the database if not required. The use of biometric requires less man power, save much time for voters and personnel, ensures accuracy, transparency and avoids bogus voting.
This document proposes an electronic voting system that uses Aadhar cards and biometric authentication to identify voters and prevent bogus voting. It involves using barcode scanners to read the enrollment ID on Aadhar cards to retrieve voter details stored in a database. Fingerprint authentication would then verify voters' identities. If verified, an electronic voting machine would activate for voters to cast their votes. The system aims to make voting more secure and efficient by leveraging Aadhar card data and biometric authentication compared to traditional paper-based systems.
Secure electronic voting system using fingerprint techniqueAshutha K
This document proposes a secure electronic voting system using fingerprint authentication. It begins with an introduction that explains the goals of allowing voters to cast their ballots securely while addressing disadvantages of existing systems. It then describes the existing e-voting process and proposes a new system that integrates fingerprint authentication technology. The proposed system uses fingerprint matching to verify voters' identities and link them to candidate selections stored in a microcontroller. The document outlines the system components, implementation, advantages over other systems in preventing fraud and recounts, and concludes the fingerprint-based system can deliver more transparent and faster elections.
Annunciator for Hazard Prevention & Temperature ControlIOSR Journals
This document describes a microcontroller-based annunciator system that detects faulty conditions such as fires and informs operators through audible and visual alerts. The system uses various sensors to monitor conditions and provides the information to an AT89C51 microcontroller. If an abnormality is detected, the microcontroller alerts owners and initiates responses through a DTMF generator. It can also control devices like relays to regulate temperatures or turn on water pumps to extinguish fires. The system was tested experimentally and results were found to match computational analyses with less than 2% error, likely due to potentiometer loading effects. In conclusion, such automation improves safety and efficiency in industrial and other settings.
This document provides an overview of the Automatic Fare Collection (AFC) system used by DMRC. The AFC system uses contactless smart cards and tokens to automate fare payments. It has a hierarchical architecture with central systems that communicate via WAN to station systems. The central systems include data centers that configure the system and store transaction data. Station systems include equipment like gates, ticket machines, and portable ticket decoders. The AFC system automates functions like access control, fare calculation, and stock management using the different fare media.
This document summarizes a wireless tire pressure monitoring system that uses sensors and radio frequency transmission. It consists of pressure and temperature sensors in each tire that transmit data via an RF transceiver to a receiver module. The receiver alerts the driver if pressure is too high or low via an LCD display and buzzer. Serial peripheral interface (SPI) protocol is used for communication between the microcontroller and RF transceiver to allow high-speed data transfer with few wires. Testing showed the system accurately measures pressure and warns of abnormal readings in real-time as needed for vehicle safety.
Current state of automotive network securityFFRI, Inc.
Many electronic devices have been used by automobiles.These devices are connected each other and communicate to control automobile. Recent years, automotive network has been connected to smartphones and the internet. It makes new threats turn up. This slides summarizes how automotive network security have been and what is expected as incoming threats.
This document summarizes several common Git commands:
- Git merge joins two or more development histories together in either a fast-forward or no fast-forward manner.
- Git log displays commit history and allows formatting and filtering options like oneline, decorate, stats, diffs, shortlog, graph and custom formats.
- Other commands covered include revert, checkout, reset, cherry-pick, rebase and filtering log output by amount, date, author, message, file, content and range.
Every year our local banks spend a lot of money for installing and maintaining switching software provided by foreign vendors. Is it possible to implement ATM/POS switch software in Bangladesh cost effectively? We tried to find out shortcomings of implementing ATM/POS switching software in Bangladesh. We did survey in Banks IT sector and talked with Vendor of Switching software to study details of Switching software.
The document provides an overview of the ISO8583 standard for financial transaction messaging. It defines key elements of ISO8583 messages including the message type identifier, bitmaps, and data elements. Common message type identifiers are provided for financial transactions, reversals, and network management messages. Examples of ISO8583 messages for transactions, reversals, and their responses are also given.
This document describes an ISO 8583 decoder user-defined function (UDF) for MySQL. The UDF allows MySQL to parse ISO 8583 message fields and retrieve data elements. To install the UDF, users can either manually copy the DLL file to the MySQL bin folder and run SQL commands, or use an installer program that prompts for the root password before installing. The ISO8583 function syntax extracts data from an ISO message based on the bit number, and optionally the ISO version.
ISO 8583 is an international standard for financial transaction card originated messages. It defines the interchange message format and content between automatic teller machines and payment card networks. The standard specifies a message type identifier, bitmaps to indicate included data elements, and up to 127 data elements containing transaction details. An ISO 8583 message facilitates electronic payment processing by transmitting necessary information through a network.
This slide I used to take lecture to my folks, I'll help understand ISO 8583 message format, conversions, limitations, organization, extension capability etc. you may contact me via mail for any kind of query regard this issue. thank you.
Exploring Payment Platforms - ISO 20022 and ISO 8583PECB
Have you thought about the process of communication in the financial institutions? On this webinar, we go over the importance of standards ISO 20022 and ISO 8583 and how it can help financial institution to create reports that are useful to all interested parties.
Main points covered:
• ISO 20022 and its importance on the financial communication.
• ISO 8583 and its usage on the most credit and debit card transaction.
• How can these two standards leverage to effectively manage the financial transactions and data?
Presenter:
This webinar was presented by Orlando Olumide Odejide. He is a PECB Certified Trainer and an experienced Enterprise Architect and Programme Director working on various technology solutions. His expertise spans to various ISO standard such as ISO 27001, ISO 20000 and ISO 22301, COBIT, CMMI, TOGAF, PRINCE2, ITIL.
Link of the recorded session published on YouTube: https://youtu.be/Ilx6isDrXEU
Report on ISO8583,EDCPOS vs mPOS and EMV vs Magnetic Strip CardsDarshana Senavirathna
The document discusses ISO 8583, which defines a common format for financial transaction card messages exchanged between acquirers and issuers. It describes the ISO 8583 message structure, including the message type indicator, bitmaps, and data elements. It also compares magnetic stripe cards and EMV chip cards, discussing their technology, transaction flows, security differences, and more. Finally, it analyzes electronic data capture point of sale devices versus mobile point of sale devices in terms of security, price, convenience, connectivity, and other aspects.
This document discusses electronic voting systems and provides background information on voting in Nigeria. It begins by defining electronic voting and describing different types of electronic voting technologies. It then provides details on Nigeria's existing voting system, including that Nigeria elects a president and national assembly. It has over 2000 elective positions across the federal, state and local levels. The document discusses the significance and objectives of studying electronic voting systems for Nigeria, which include improving accessibility, transparency and reducing errors and fraud. It provides definitions for key terms and outlines the scope and limitations of the study.
This document summarizes the services provided by a food industry consultancy firm in Romania. They offer:
- Practical, solutions-oriented consulting drawing on the founders' over 13 years of experience working in the food industry.
- Assistance with business strategy, management, investments, and representing foreign companies in the Romanian market.
- A mobile lab that performs analyses to identify opportunities to improve business performance and profitability.
- Interim management and representation services to help companies address staffing needs or vacant positions.
Their approach prioritizes practical experience and balanced blending of theoretical and practical knowledge to optimize clients' operations.
Have you ever wondered whether your retrospective format was actually effective at fueling learning and improvement? Are you ready to try something different?
"FOCOL Point" is Idea Flow Learning Framework's 5-step learning and improvement protocol. It works great for software improvement, but it also works for team reflection, personal reflection, or mentorship. Rather than searching for answers, a FOCOL Point is all about finding the right questions.
Once I walk through the protocol as a group, we'll make a FOCOL Point together!
First, we'll identify the biggest software problems faced by the audience using the "flashstorming" technique. Then we'll focus on the top problems of the group and start digging into the details by walking through a group-adapted version of the stop and think protocol:
1. **Focus**: What's the journey we're trying to understand?
2. **Observe**: What patterns do we see? (for all journey pattern types)
3. **Conclude**: What obstacles seem to be causing the pain?
4. **Optimize**: How could we have avoided the obstacles?
5. **Learn**: What questions should we ask ourselves in the future?
Amplify your learning by reflecting more productively on your own or with your team! You can immediately apply this technique on your own projects.
Node.js is a JavaScript runtime built on Chrome's V8 engine that allows JavaScript to run on the server side or as a standalone application. It uses an event-driven, non-blocking I/O model that makes it lightweight and efficient, as it can handle multiple concurrent connections while waiting for responses. Common uses of Node.js include building web servers, real-time applications, command line tools, and more due to its asynchronous and event-driven nature.
El documento discute las evidencias, causas y consecuencias del cambio climático. Las principales evidencias incluyen el aumento de la temperatura promedio y el nivel del mar. Las causas son las emisiones de gases de efecto invernadero debido a la quema de combustibles fósiles y la deforestación por parte de los seres humanos. Las consecuencias son temperaturas más cálidas, tormentas más intensas, y el derretimiento de los glaciares.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The document describes an electronic voting machine that consists of four main blocks: a keypad block, microcontroller block, display block, and control switches block. The microcontroller used is an 8051 which receives input from the keypad and displays output on the LCD screen. The machine has two modes - voting mode and counting mode - which are selected using toggle switches. It allows for convenient, secure, and time-efficient voting and counting while avoiding issues like invalid voting. An open development process could help improve the quality and security of electronic voting systems.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
The document presents a presentation on electronic voting machines. It discusses how electronic voting machines work using microcontrollers like the AT89S52 to allow for digital voting and counting of votes. The electronic voting machine consists of four main blocks - a keypad block, display block, microcontroller block, and control switches block. It operates in two modes - voting mode, where voters can cast their digital votes, and counting mode, where the total votes for each candidate can be displayed. Electronic voting machines provide advantages like being economical, time-efficient, and avoiding invalid voting compared to traditional voting methods.
FAULT DETECTION AND DIAGNOSIS OF INDUCTION MACHINE WITH ON-LINE PARAMETER PR...Sheikh R Manihar Ahmed
1. The document discusses a fault detection and diagnosis system for induction machines. It includes a microcontroller, sensors, ADC, and LCD display.
2. The system works by setting threshold values for parameters like temperature and current. It then continuously monitors these parameters and compares them to the thresholds.
3. If a parameter exceeds its threshold, the system isolates the specific fault, displays it on the LCD, and triggers an alarm. The user can acknowledge the fault to stop the alarm.
This document describes a proposed biometric voting machine that uses fingerprint recognition for voter authentication. The system uses an Arduino microcontroller with an ATmega328 chip for processing. A fingerprint sensor module is connected to authenticate voters based on their fingerprint. If a match is found, the voter can cast a single vote for one candidate. Results are displayed after polling ends when an administrator enters a password. The system aims to provide a more secure and reliable alternative to traditional electronic voting machines.
This document discusses the design of a SMS-based voting machine system using an Atmega32 microcontroller and GSM technology. It aims to develop a more efficient and secure alternative to traditional paper-based and electronic voting methods. The key components of the system include an Atmega32 microcontroller, GSM module, LCD display, and keypad. Voters would be able to cast their votes via SMS on their registered mobile phones. The system is designed to address issues with prior methods such as wasted resources, security vulnerabilities, and limited accessibility. It also outlines the technologies used, including GSM for cellular connectivity and Atmega32 for microcontroller functions.
This document discusses using the VT System for automated testing of an electronic control unit (ECU) in a vehicle. It describes how the VT System can simulate loads and sensors to test the ECU without needing the actual vehicle components. The VT System modules connect to the ECU inputs and outputs to drive and monitor them. The ECU also connects to the CANoe software via a CAN interface to simulate communications with other ECUs. Test cases are created in VTestStudio and can execute automatically to test the ECU functionality. This allows testing the ECU in early development phases in a controlled and repeatable way.
1. The document discusses the differences between analog and digital control systems. Digital control systems use digital computers, microcontrollers, and microprocessors to process discrete signals, while analog systems process continuous signals.
2. Digital control systems are now widely used over analog systems due to advantages like lower cost, improved communication and flexibility, easier digital interfacing, and better performance diagnostics.
3. In a digital control system, continuous signals are converted to discrete signals using sample and hold circuits and analog-to-digital converters, then processed digitally before being converted back with digital-to-analog converters.
This is basically a case study which is done on vehicles braking system which is effected due to emic effect which caused many accidents.
This presentation thus points out the emic effects and how it can be controlled in safety products
A Novel Idea on Semi-Automated Operation Theatre Assistance for Doctors Based...theijes
The idea of this article is to develop a robotic assistant for handling surgical instruments in Operation Theatres. Hence it is possible to minimize human intervention in turn the risk of contamination and the probability of human error. The robotic system principally has three functional parts : locomotion controlled by Bluetooth from an android device; rotatory array of medical instruments governed by a stepper motor that functions over a voice input and a robotic arm made of Gripper motor controlled remotely.
To impart knowledge about the elements, techniques and sensors involved in mechatronics systems which are very much essential to understand the emerging field of automation.
This document describes an electronic voting machine (EVM) created by students. It includes:
1) A brief history of voting machines, including early mechanical machines and the introduction of electronic versions.
2) The key components of the EVM, including a microcontroller, LCD display, power supply, and control switches.
3) Details on the operation of the EVM, which allows users to vote, has modes for voting and counting votes, and indicates selections with sound.
4) Advantages like reduced costs, time and manpower needed compared to traditional voting methods. Disadvantages include potential security issues and needing external storage.
Closed-loop control system modelling_pid.pptxKadiriIbrahim2
This document provides an overview of modeling, simulation, and virtualization of closed-loop control systems. It defines open-loop and closed-loop control and provides examples of each. It also describes how control systems can be represented using block diagrams and discusses single-input single-output and multiple-input multiple-output systems. The document concludes with an overview of proportional-integral-derivative controllers and examples of implementing closed-loop control using MATLAB.
Dispensing medications in a community pharmacy was a time-consuming operation. The pharmacist dispensed
most prescriptions that were in tablet or capsule form with a simple tray and spatula. Many new medications
were being developed by pharmaceutical manufacturers at an ever-increasing pace, and the prices of those
medications were rising steeply. A typical community pharmacist was working longer hours and often forced to
hire additional staff to handle increased workloads. This extra workload did not allow the time to focus on safety
issues. This new factor led to the concept of using a machine to count medications.
This paper introduces a design based on using microcontrollers for counting tablets and capsules . A
production flow is build to automate the whole operations
The document discusses the functions and components of automotive onboard computers. It begins by outlining the objectives of understanding input sensors, output devices, and the general purpose and function of onboard computers. It then describes the four basic functions of all computers as input, processing, storage, and output. It provides details on computer components, communication between modules, and diagnostic procedures.
This document summarizes a research paper on designing a metal detector mobile robot using a microcontroller. It includes the following key points:
1) The robot has three main systems - a mechanical system comprising two robot arms and a vehicle carriage, an electrical system with motors, batteries and a temperature sensor, and a control system using a PIC microcontroller.
2) The microcontroller controls the robot's movement and detects metal underground using a temperature sensor. It is programmed using PIC BASIC Pro language for manual and automatic operation.
3) The document provides details on the robot's design, components, programming and potential applications of using a microcontroller to control a metal detecting robot.
A microcontroller is a small and low-cost computer built for the purpose of dealing with
specific tasks. Microcontrollers are mainly used in products that require a degree of control to be
exerted by the user. It is generally built using a technology known as Complementary Metal Oxide
Semiconductor. A metal detector robot designed as a new application of microcontroller. It used the
microcontroller to control its mechanism movement. The robot has two links and two joints
supported on moving table to make its movement easy. A carriage vehicle used for carrying robot
which used the skid steered wheeled types to make its movement easy and safety on ground open
area. The robot’s movement orientation done very accurate depending on link between the
microcontroller and the user’s hand remote.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Similar to Electronic Voting Machine and Fault Analysis (20)
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Electronic Voting Machine and Fault Analysis
1. Electronic Voting Machine And Fault Analysis
A. B. M. Alim Al Islam , Swawibe Ul Alam(0805080), Nazmul Sarker(0805015)
Department of Computer Science and Engineering, Bangladesh University of Engineering and Technology
Email: swawibe@gmail.com, nazmul@gmail.com
Abstract—According to Election Data Services the per-
centage of electronic voting machines per country increas-
ing,yet a full replacement of the traditional voting proce-
dure is very unlikely.In it essence,an electronic voting ma-
chine(EVM)is a computer assisted self-interviewing(CASI)
device giving the voter the opportunity to review and
change his/her vote before submitting it.The different
types of voting machines allow for different kinds of
interaction, such as using a touch screen technology,using
a dial wheel,touching a paper panel or pressing a button
on a LCD screen.Each machine provide feedback for
blank ballots and under-voting and prevents selecting more
choices than the maximum allowed.The paper presents
an overview of the voting machines based on established
theories and result from CASI and Fault tolerance of the
voting machine with respect to different types of analysis.
I. INTRODUCTION
A. Why Electronic Voting Machine
Electronic Voting machines (EVM) retains all
the characteristics of voting by ballot papers,while
making polling a lot more expedient.Being fast
and absolutely reliable, the EVM saves consider-
able time,money and manpower.And,ofcourse helps
maintain total voting secrecy without the use of
ballot papers.At the end of the polling,just press a
Result button and there you have the results.
Now a days EVM is become an effective tool
for voting. It ensures flawless voting and thus has
become more widespread.It ensures people about
their vote being secured.It avoids any kind of
malpractice and invalid votes.Also such kind of
system becomes more economical as consequent
expenditure incurred on manpower is saved.It is also
convenient on part of voter,as he is to just press one
key which belongs to his candidates.
B. What is Electronic Voting Machine
Voting machines are the total combination of
mechanical,electromechanical or electronic equip-
ment,that is used to define ballots, to cast and
count votes, to report or display election results
and to maintain and produce any audit trail infor-
mation.The first voting machines were mechanical
but it is more common to use electronic voting
machines.
A voting system includes the practices and asso-
ciated documentation used to identify system com-
ponents and versions of such components, to test the
system during its development and maintainance,
to maintain records of system errors or defects,
to determine specific changes made after initial
certification and to make available any materials to
the voter. Traditionally, a voting machine has been
defined by the mechanism the system uses to cast
votes and further categorized by the location where
the system tabulates the votes.
Voting machines have different levels of usability,
security, efficiency and accuracy. Certain systems
may be more or less accessible to all voters, or
not accessible to those voters with certain types
of disabilities. They can also have an effect on the
public’s ability to oversee elections.
II. MAIN PARTS OF EVM
A. The control Unit
Conduction of polling, display of total votes
polled, sealing at the end of the poll, and finally,
declaration of results these are the various accom-
plishments of just one gadget : the control unit. In
total control of the polling, this electronic unit gives
you all necessary information at a press of a few
buttons. For instance, if you need to know the total
number of votes, you just have to press the Total
switch. Candidates-wise results can be had only at
the end of polling.
2. B. The Ballot Unit
A simple voting device, it displays the list of can-
didates. A facility to incorporate party names and
symbols is in-built. All the voter has to do is press
the desired switch located next to the name of each
candidate. The main advantage is the speed, apart
from the simplicity of operation, which requires no
training at all. A single ballot unit takes in the
names of 16 candidates. And thus, by connecting
four ballot units the EVM can accommodate a total
of 64 candidates in a single election.
III. BLOCK DIAGRAM OF EVM
Fig. 1: Block Diagram Of EVM
IV. DESCRIPTION OF EVM UNITS
The Electronic Voting Machine basically con-
sists of four main blocks. these are keypad, micro
controller, display and control switches:
1)Keypad:There are many keypad switch for se-
lecting Candidates.One voter can just press one
keypad for selecting candidate.
2)Micro controller: Micro controller senses the
signal given from switches and dthe mode of op-
eration voting mode it increments the data for
corresponding key i.e. respective candidate as well
as it sends signal to display block to indicate one
key is pressed. In counting mode micro controllers
fetchesdata from memory location and send it to
display devices.
Fig. 2: Micro Controller AT89C51
3) Display: Liquid Crystal Display which is com-
monly known as LCD is an Alphanumeric Display
it means that it can display Alphabets, Numbers as
well as special symbols thus LCD is a user friendly
Display device which can be used for display-
ing various messages unlike seven segment display
which can display only numbers and some of the
alphabets. The only disadvantage of LCD over seven
segment is that seven segment is robust display and
be visualized from a longer distance as compared
to LCD. Here I have used 16 x 2 Alphanumeric
Display which means on this display I can display
two lines with maximum of 16 characters in one
line.
Fig. 3: LCD Display Of EVM
3. 4) Control switches: There are three control
switches: I. Clear Votes. II. Controller switch. III.
Total Votes
V. Fault Analysis Of EVM
Every Device has a Drawback,EVM is not out
of that.EVM may be faulty in different condition.
Experts have explored many of its fault in differ-
ent ways.IN EVM we use Microcontroller,which
is sensitive to temperature,heat,humidity. So due to
abnormal temperature or humidity condition, it can
show different behavior than usual, which may turns
EVM to become faulty.
From Observation some of the Cases of Fault
Analysis it has been seen:
1. If there is a Power Glitch in voltage regulation
than Chip Erase mode erases Lock bits with
Program memory which makes the system to
inappropriate state.
2. The failure rate is high ifwe try Programmers on
breadboards, instead try them on general PCBs.
3. Failure in switch is a common fault in EVM
machine.
Arrhenius Theory For Fault Estimation :
According theory gives an Arrhenius’ accelera-
tion factor of:
Af = exp [Ea / k x (1 / Tu - 1 / Tt)] = exp [0.5 /
8.6171D-5 x (1 / (40 + 273.16) - 1 / (150 + 273.16)]
= 124
Ea = 0.5eV is the activation energy of failure
mechanism, k = 8.6171D-5 is Boltzmann’s Con-
stant, Tu is use condition junction temperature and
Tt is test condition junction temperature.
The failures in time (FITs) are estimated with the
help of chi-square distribution:
lambda = chi-square / 2 / Af / t x 1D+9 = 1.833
/ 2 / 124 / t x 1D+9 = 7,391,129 / t
chi-square = 1.833 represents ’zero failures’ and
’60% confidence level’.
AT89C51: 2.2FIT, which corresponds to a
MTTF (mean time to failure) of 57,078years
We can think fault analysis in three cases:
A. Microcontroller(AT89C51)
B. LCD screen
C. Switch
A. Microcontroller Failure Rate
AT-89C51 CMOS FLASH MICRO
CONTROLLER Failure Report DATA:
— 125C DYNAMIC OPERATING LIFE TEST
— 200C RETENTION BAKE
— 125C DYNAMIC OPERATING LIFE TEST
(PLASTIC)
— 125C RETENTION BAKE (PLASTIC)
— 15 PSIG PRESSURE POT
— 85C/85
TABLE I: 125C DYNAMIC OPERATING LIFE
TEST
k SAMPLE SIZE TOTAL CKT-HOURS NUMBER OF FAILURES
0 115 287.5 0
1 164 410.0 0
2 143 357.5 0
TABLE II: 125C DYNAMIC OPERATING LIFE
TEST Failure Rate
1 Total Device Hours 1,055,000 DEVICE HOURS
2 BEST ESTIMATE = 0.07 % PER 1,000 HOURS
3 50C AMBIENT = 0.002 % PER 1,000 HOURS (23 FITS)
TABLE III: 200C DATA RETENTION BAKE
k SAMPLE SIZE TOTAL CKT-HOURS NUMBER OF FAILURES
0 393 393.0 0
4. TABLE IV: 200C DATA RETENTION BAKE Fail-
ure Rate
1 Total Device Hours 393,000 Device Hours
2 Best Estimate = 0.18% Per 1000 hours
3 50C Ambient = 0.0006% per 1,000 hours(6 Fits)
TABLE V: 125C DYNAMIC OPERATING LIFE
TEST (Plastic Package)
k Sample size Total Ckt Hours Number of Failures
0 80 80 0
1 115 115 0
2 90 90 0
3 110 110 0
4 143 142 0
VI. Reliability Report Of AT89C51 :
A. AT-89C51 CMOS FLASH MICRO
CONTROLLER RELIABILITY DATA
- 125C DYNAMIC OPERATING LIFE TEST
- 200C RETENTION BAKE
- 125C DYNAMIC OPERATING LIFE TEST
(PLASTIC)
- 125C RETENTION BAKE (PLASTIC)
- 15 PSIG PRESSURE POT
- 85C/85% RELATIVE HUMIDITY OPERATING
LIFE TEST
- EXTENDED TEMPERATURE CYCLING -
EXTENDED THERMAL SHOCK
- 131C/85% RELATIVE HUMIDITY HAST TEST
VII. SIMULATION OF EVM
Using Proteus :
Proteus is a Virtual System Modelling (VSM) that
combines circuit simulation, animated components
and microprocessor models to co-simulate the com-
plete microcontroller based designs. This is the per-
fect tool for engineers to test their microcontroller
designs before constructing a physical prototype in
real time. This program allows users to interact
with the design using on-screen indicators and/or
LED and LCD displays and, if attached to the PC,
switches and buttons. One of the main components
of Proteus is the Circuit Simulation – a product that
uses a SPICE3f5 analogue simulatorkernel com-
bined with an event-driven digital simulator that
allow users to utilize any SPICE model by any
manufacturer. Proteus VSM comes with extensive
debugging features, including breakpoints, single
stepping and variable display for a neat design prior
to hardware prototyping. In summary, Proteus is
the program to use when you want to simulate the
interaction between software running on a micro-
controller and any analog or digital electronic device
connected to it.
Advantages Of Proteus:
1.Real time simulation.
2.Time and money saving.
Code For Proteus Simulation in C:
# include <reg51 . h>
s f r i n p u t =0x90 ;
s f r l d a t a =0xa0 ;
s b i t r s =P0 ˆ 7 ;
s b i t rw=P0 ˆ 6 ;
s b i t en=P0 ˆ 5 ;
s b i t m=P3 ˆ 0 ;
s b i t n=P3 ˆ 1 ;
s b i t buzz=P3 ˆ 2 ;
s b i t on=P3 ˆ 3 ;
void delay ( i n t ) ;
void lcdcmd ( char ) ;
void l c d d a t a 1 ( char ∗ ) ;
void l c d d a t a ( char ) ;
/ / void lcd ( ) ;
i n t i1 , i11 , i12 , i2 , i21 , i22 , i3 , i31 , i32 , i4 , i
void main ( )
{ on =0;
P1 =0; P3 =0;
while ( 1 )
{
lcdcmd (0 x38 ) ;
delay ( 1 0 ) ;
lcdcmd (0 x0e ) ;
delay ( 1 0 ) ;
lcdcmd (0 x01 ) ;
lcdcmd (0 x06 ) ;
delay (20) ;
5. i f ( n==1)
on =1;
i f (m==1&on ==1)
{
i f ( i n p u t ==0x01 )
{
buzz =1;
while ( i n p u t == 0x01 ) ;
i1 = i1 + 1;
i f ( i1 >=10)
i11= i1 / 1 0 ;
i12= i1 %10;
on =0;
buzz =0;
/ / ready =0;
}
i f ( i n p u t ==0x02 )
{ buzz =1;
while ( i n p u t == 0x02 ) ;
{
i2 = i2 + 1;
i f ( i2 >=10)
i21= i2 / 1 0 ;
i22= i2 %10;
on =0;
buzz =0;
}
}
i f ( i n p u t ==0x04 )
{
buzz =1;
while ( i n p u t ==0x04 ) ;
{
i3 = i3 + 1;
i f ( i3 >=10)
i31= i3 / 1 0 ;
i32= i3 %10;
on =0;
buzz =0;
}
}
i f ( i n p u t ==0x08 )
{
buzz =1;
while ( i n p u t == 0x08 ) ;
{
i4 = i4 + 1;
i f ( i4 >=10)
i41= i4 / 1 0 ;
i42= i4 %10;
on =0;
buzz =0;
}
}
i f ( i n p u t ==0x10 )
{
buzz =1;
while ( i n p u t == 0x10 ) ;
{
i5 = i5 + 1;
i f ( i5 >=10)
i51= i5 / 1 0 ;
i52= i5 %10;
i5 =0;
on =0;
buzz =0;
}
}
i f ( i n p u t ==0x20 )
{
buzz =1;
while ( i n p u t == 0x20 ) ;
{
i6 = i6 + 1;
i f ( i6 >=10)
i61= i6 / 1 0 ;
i62= i6 %10;
on =0;
buzz =0;
}
}
i f ( i n p u t ==0x40 )
{
buzz =1;
while ( i n p u t == 0x40 ) ;
{
i7 = i7 + 1;
i f ( i7 >=10)
i71= i7 / 1 0 ;
i72= i7 %10;
on =0;
buzz =0;
}
}
6. i f ( i n p u t ==0x80 )
{
buzz =1;
while ( i n p u t == 0x80 ) ;
{
i8 = i8 + 1;
i f ( i7 >=10)
i81= i8 / 1 0 ;
i82= i8 %10;
on =0;
buzz =0;
}
}}
i f (m==0) / / e l s e
{
i f ( i n p u t ==0x01 )
{
l c d d a t a 1 ( ” CONRESS=” ) ;
l c d d a t a ( i11 +0x30 ) ;
l c d d a t a ( i12 +0x30 ) ;
delay ( 1 0 0 ) ;
}
i f ( i n p u t ==0x02 )
{
lcdcmd (0 x01 ) ;
l c d d a t a 1 ( ” BJP=” ) ;
l c d d a t a ( i21 +0x30 ) ;
l c d d a t a ( i22 +0x30 ) ;
delay ( 1 0 0 ) ;
}
i f ( i n p u t ==0x04 )
{
lcdcmd (0 x01 ) ;
l c d d a t a 1 ( ” CP(M&I )= ” ) ;
l c d d a t a ( i31 +0x30 ) ;
l c d d a t a ( i32 +0x30 ) ;
delay ( 1 0 0 ) ;
}
i f ( i n p u t ==0x08 )
{
lcdcmd (0 x01 ) ;
l c d d a t a 1 ( ” TDP=” ) ;
l c d d a t a ( i41 +0x30 ) ;
l c d d a t a ( i42 +0x30 ) ;
delay ( 1 0 0 ) ;
}
i f ( i n p u t ==0x10 )
{
lcdcmd (0 x10 ) ;
l c d d a t a 1 ( ” TRS=” ) ;
l c d d a t a ( i51 +0x30 ) ;
l c d d a t a ( i52 +0x30 ) ;
delay ( 1 0 0 ) ;
}
i f ( i n p u t ==0x20 )
{
lcdcmd (0 x01 ) ;
l c d d a t a 1 ( ” PRP=” ) ;
l c d d a t a ( i61 +0x30 ) ;
l c d d a t a ( i62 +0x30 ) ;
delay ( 1 0 0 ) ;
}
i f ( i n p u t ==0x40 )
{
lcdcmd (0 x01 ) ;
l c d d a t a 1 ( ” INDEPENDANT1=” ) ;
l c d d a t a ( i71 +0x30 ) ;
l c d d a t a ( i72 +0x30 ) ;
delay ( 1 0 0 ) ;
}
i f ( i n p u t ==0x80 )
{
lcdcmd (0 x01 ) ;
l c d d a t a 1 ( ” INDEPENDANT2=” ) ;
l c d d a t a ( i81 +0x30 ) ;
l c d d a t a ( i82 +0x30 ) ;
delay ( 1 0 0 ) ;
}
e l s e {
lcdcmd (0 x01 ) ;
l c d d a t a 1 ( ” p r e s s key ” ) ;
delay (100) ;
}}
}}
void delay ( i n t time )
{
i n t i , j ;
for ( i =0; i<time ; i ++)
for ( j =0; j <900; j ++);
}
void lcdcmd ( char value )
{
l d a t a = value ;
r s =0;
7. rw =0;
en =1;
delay ( 2 ) ;
en =0;
}
void l c d d a t a 1 ( char ∗ value )
{ i n t i ;
for ( i =0; value [ i ]!= ’ 0 ’ ; i ++)
{
l d a t a = value [ i ] ;
r s =1;
rw =0;
en =1;
delay ( 1 ) ;
en =0;
}
}
void l c d d a t a ( char value )
{
l d a t a = value ;
r s =1;
rw =0;
en =1;
delay ( 1 ) ;
en =0;
}
VIII. FUTURE WORK
Real Life Implementation :
—We will try to Make EVM in Real life.
—We are trying to make it in PCB.So it will be
handy,easy to use.
—We will also give our trial version of EVM to
IICT for checking its perfection.
REFERENCES
[1] http://www.digchip.com/application-notes/8/16443.php
[2] http://www.8051projects.info/threads/at89c51-
programmer.423/page-2
[3] ATMEL corporation AT-89C51 CMOS FLASH MICRO CON-
TROLLER RELIABILITY DATA