In today’s market, the competing microprocessors are ARM (Advanced Risc Microprocessor), Intel, AMD.
ARM is preferred since it has been powering portable devices for decades and has simple architecture to keep
the energy waste to be minimum. The electronics advancements and embedded technology advancements have
become a challenging field in today’s techno world. In paper, the diligent features of embedded systems are
introduced. It deals about how a robot is controlled using embedded operating system and ARM. Based on the
combination of ARM, DSP and ARM Linux, the robot is controlled. The paper introduces development of
embedded robot control system using Wi-Fi and also IOT. The embedded control system design includes four
aspects. i.e., system structure, functions, hardware design and software design. By using these aspects (hardware
and software adjustments), many robotic applications can be developed. Due to the fast execution speed and
reasonable Ethernet speed in ARM processor, this system can be used in industrial oriented applications where
there is very much necessity of safety and security.
The Internet-based security Soft-i-Robot is modeled using Soft computing paradigms for problem solving and decision-making in complex and ill-structured situations. Soft-i-Robot monitors the workspace with multimedia devices and sensor using an Internet application program. The model has sensory subsystems such as Intruder detection which, detects intruder, captures image and sends to server, and an Obstacle Avoidance Unit to detect the objects in the path of the mobile robot. These multiple features with hybrid Soft computing techniques depart the developed Soft-i-Robot from the existing developments, proving that the streaming technology-based approach greatly improves the sensibility of robot tele-operation. The relatively powerful online robots available today provoke the simple question, in terms of two competing goals: recognition accuracy and computing time. Improved recognition accuracy and reduced computing time for face recognition of the intruder is obtained using Morphological Shared Weight Neural Network. To obtain a collision-free optimized path, Soft-i-Robot uses derivative free Genetic Algorithm. With rapid expansion of Robotics and Soft computing paradigms, robotic technology touches upon self-understanding of humans, socio-economic, legal and ethical issues leading to improved performance rate and information processing capabilities.
Design and implementation of microcontroller in fpga for io tIJARIIT
This document discusses the design and implementation of a microcontroller in an FPGA for Internet of Things applications. It begins with an introduction to sensor nodes, microcontrollers and FPGAs. It then reviews literature on microcontroller architectures and FPGA design. The paper describes developing a behavioral model of an 8-bit microcontroller in VHDL and synthesizing it for the Xilinx Spartan 3E FPGA. Simulation results showed the basic functionality of the microcontroller was achieved. The modular VHDL design allows expanding it to develop more advanced microcontrollers.
This document describes the design and development of an Ethernet interface for industrial applications using an ARM processor. Specifically, it connects an ARM cortex M3 processor to an Ethernet network to control the speed of a motor. An embedded web server is created to allow sending speed control values over the Ethernet network to vary the frequency of a variable frequency drive and thus control the motor speed remotely. The system provides a low-cost solution to connect industrial machines to the network and control them using a web interface.
Design and Implementation of Smart Bell Notification System using IoT journal ijrtem
This document describes the design and implementation of a smart bell notification system using IoT. The system uses a camera to capture an image of a visitor when the doorbell is pressed and sends the image to the owner via SMS along with an alert. It also saves the images to a Google Drive folder. The system aims to provide home security and convenience by allowing owners to see who is at the door and take appropriate action. It uses an ARM-7 microcontroller, GSM modem, camera and cloud storage to enable this smart doorbell notification feature.
This document describes an IoT-based smart home system using the Blynk framework. The system allows users to control and monitor home appliances and sensors via a smartphone. It uses a Raspberry Pi as a private server to store sensor data and communicate with users. NodeMCU microcontrollers connect appliances, sensors and the internet, acting as gateways. The system is designed to automate tasks like watering plants based on sensor readings when users are offline.
IRJET- IoT based Classroom Automation SystemIRJET Journal
This document describes an IoT-based classroom automation system that allows teachers to remotely control devices in the classroom using a mobile application. The system uses NodeMCU microcontrollers connected to sensors and appliances via relays to enable on/off control. An ultrasonic sensor detects human presence. Commands sent from the mobile app via WiFi are received by the NodeMCU which controls the relays. This allows automation of lighting, A/C, and other devices for improved energy efficiency, convenience and security while providing remote classroom monitoring capabilities.
IRJET- Text Reading for Visually Impaired Person using Raspberry PiIRJET Journal
1) The document presents a system to help visually impaired people read text using optical character recognition and text-to-speech conversion on a Raspberry Pi.
2) The system uses a camera mounted on glasses to take images of text, which are then processed using OCR and converted to audio using e-Speak for the user to hear.
3) It aims to allow visually impaired people to independently read text on product labels, documents and other materials by carrying a portable device that recognizes text in images and converts it to audio in real time.
Secured Way Of Offloading Mobile Cloud Process For Smart PhoneIRJET Journal
This document proposes a secured way of offloading mobile cloud processes to reduce computation power usage on smartphones. It introduces a ternary decision making (TDM) framework that determines whether a task should be performed on the smartphone or offloaded to the cloud based on estimated execution time and energy consumption. The tasks are offloaded to the cloud for remote execution using an encryption technique for security. This results in reduced computation power usage and battery consumption on smartphones by utilizing cloud resources instead.
The Internet-based security Soft-i-Robot is modeled using Soft computing paradigms for problem solving and decision-making in complex and ill-structured situations. Soft-i-Robot monitors the workspace with multimedia devices and sensor using an Internet application program. The model has sensory subsystems such as Intruder detection which, detects intruder, captures image and sends to server, and an Obstacle Avoidance Unit to detect the objects in the path of the mobile robot. These multiple features with hybrid Soft computing techniques depart the developed Soft-i-Robot from the existing developments, proving that the streaming technology-based approach greatly improves the sensibility of robot tele-operation. The relatively powerful online robots available today provoke the simple question, in terms of two competing goals: recognition accuracy and computing time. Improved recognition accuracy and reduced computing time for face recognition of the intruder is obtained using Morphological Shared Weight Neural Network. To obtain a collision-free optimized path, Soft-i-Robot uses derivative free Genetic Algorithm. With rapid expansion of Robotics and Soft computing paradigms, robotic technology touches upon self-understanding of humans, socio-economic, legal and ethical issues leading to improved performance rate and information processing capabilities.
Design and implementation of microcontroller in fpga for io tIJARIIT
This document discusses the design and implementation of a microcontroller in an FPGA for Internet of Things applications. It begins with an introduction to sensor nodes, microcontrollers and FPGAs. It then reviews literature on microcontroller architectures and FPGA design. The paper describes developing a behavioral model of an 8-bit microcontroller in VHDL and synthesizing it for the Xilinx Spartan 3E FPGA. Simulation results showed the basic functionality of the microcontroller was achieved. The modular VHDL design allows expanding it to develop more advanced microcontrollers.
This document describes the design and development of an Ethernet interface for industrial applications using an ARM processor. Specifically, it connects an ARM cortex M3 processor to an Ethernet network to control the speed of a motor. An embedded web server is created to allow sending speed control values over the Ethernet network to vary the frequency of a variable frequency drive and thus control the motor speed remotely. The system provides a low-cost solution to connect industrial machines to the network and control them using a web interface.
Design and Implementation of Smart Bell Notification System using IoT journal ijrtem
This document describes the design and implementation of a smart bell notification system using IoT. The system uses a camera to capture an image of a visitor when the doorbell is pressed and sends the image to the owner via SMS along with an alert. It also saves the images to a Google Drive folder. The system aims to provide home security and convenience by allowing owners to see who is at the door and take appropriate action. It uses an ARM-7 microcontroller, GSM modem, camera and cloud storage to enable this smart doorbell notification feature.
This document describes an IoT-based smart home system using the Blynk framework. The system allows users to control and monitor home appliances and sensors via a smartphone. It uses a Raspberry Pi as a private server to store sensor data and communicate with users. NodeMCU microcontrollers connect appliances, sensors and the internet, acting as gateways. The system is designed to automate tasks like watering plants based on sensor readings when users are offline.
IRJET- IoT based Classroom Automation SystemIRJET Journal
This document describes an IoT-based classroom automation system that allows teachers to remotely control devices in the classroom using a mobile application. The system uses NodeMCU microcontrollers connected to sensors and appliances via relays to enable on/off control. An ultrasonic sensor detects human presence. Commands sent from the mobile app via WiFi are received by the NodeMCU which controls the relays. This allows automation of lighting, A/C, and other devices for improved energy efficiency, convenience and security while providing remote classroom monitoring capabilities.
IRJET- Text Reading for Visually Impaired Person using Raspberry PiIRJET Journal
1) The document presents a system to help visually impaired people read text using optical character recognition and text-to-speech conversion on a Raspberry Pi.
2) The system uses a camera mounted on glasses to take images of text, which are then processed using OCR and converted to audio using e-Speak for the user to hear.
3) It aims to allow visually impaired people to independently read text on product labels, documents and other materials by carrying a portable device that recognizes text in images and converts it to audio in real time.
Secured Way Of Offloading Mobile Cloud Process For Smart PhoneIRJET Journal
This document proposes a secured way of offloading mobile cloud processes to reduce computation power usage on smartphones. It introduces a ternary decision making (TDM) framework that determines whether a task should be performed on the smartphone or offloaded to the cloud based on estimated execution time and energy consumption. The tasks are offloaded to the cloud for remote execution using an encryption technique for security. This results in reduced computation power usage and battery consumption on smartphones by utilizing cloud resources instead.
The document discusses the P-ISM personal networking gadget package which consists of 5 pen-style devices: a CPU pen, communication pen with cellular connectivity, virtual keyboard, small projector, and camera. These devices connect wirelessly and the communication pen allows internet access. The CPU pen contains a dual-core processor and runs on a Windows operating system. It discusses the basic components and operation of the CPU pen, including the control unit, microprocessor, fetch-decode-execute cycle, and binary number representation.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Modern computer network technologies discussed in the document include Internet of Things, Artificial Intelligence, 5G, Edge Computing, Software Defined Networking, Multi Cloud Technology, Quantum Computing, Digital Twin, Nano Network Technology, and Machine Learning. The Internet of Things describes all things connected to the Internet like sensors and smart devices. Artificial Intelligence aims to give human intelligence to machines through technologies like narrow AI and general AI. 5G promises high speeds, reliability and low latency to impact sectors like healthcare. Edge Computing reduces latency and bandwidth by bringing computing closer to data sources. Software Defined Networking abstracts network layers to make networks more agile. Multi Cloud Technology uses multiple public cloud providers for workloads. Quantum Computing performs calculations
01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...Sivaram P
This document discusses the AUTOSAR standard for automotive in-vehicle networks. It begins by comparing AUTOSAR to the OSI model for computer networks, noting that OSI helped standardize computer networking and led to benefits like easier troubleshooting. AUTOSAR aims to do the same for automotive in-vehicle networks. The document then discusses how AUTOSAR standardizes the architecture and integration of electronic control units and software to control different vehicle functional domains. This standardization brings benefits like reduced complexity, easier maintenance, and a more global automotive industry with options for interchangeable parts from different manufacturers. Finally, the document briefly outlines some of the main vehicle functional domains and the role of ECUs and software in controlling them.
Security Protocols for USB Mass Storage DevicesIRJET Journal
This document proposes a three-factor security protocol for USB mass storage devices using biometric authentication, passwords, and device verification. The protocol would allow for data transfer between USB drives without needing a computer by using an ARM processor-based device with a touchscreen interface. It describes using fingerprint scanning, a numeric password, and checking the connected drives to authenticate users before transferring data between drives for added security. This aims to provide more secure data transfer than existing methods while maintaining convenience without high power consumption.
IRJET- Survey on Face-Recognition and Emotion DetectionIRJET Journal
The document summarizes a research paper on developing a real-time security system using face recognition, motion detection, tracking, and emotion detection. The proposed system monitors an area using a network camera and detects any motion. If motion is detected, it captures live images and sends notifications to listed individuals. The system provides safety against unauthorized access or misbehavior using computer vision techniques like face recognition, motion detection and tracking implemented on a Raspberry Pi board with a camera module and OpenCV library.
IRJET - IoT based Portable Attendance SystemIRJET Journal
This document describes the design and implementation of a portable IoT-based fingerprint attendance system. The system uses a fingerprint sensor module connected to a NodeMCU ESP8266 microcontroller to scan and identify fingerprints. Registered user fingerprints and attendance data are stored in a Firebase database in the cloud. When a fingerprint is scanned, it is matched to the database to mark the user as present. An OLED display shows the user name. This system provides a wireless, portable alternative to traditional paper-based attendance methods that saves time and prevents fake attendance issues. It accurately tracks attendance using biometric fingerprint identification and IoT connectivity.
A Review on System-on-Chip (SoC) Designs for Real-Time Industrial Applicationijtsrd
Now-a-days System-on-a-chip (SoC) technology is used in small, increasingly complex consumer electronic devices. A system-on-a-chip (SoC) is a microchip with all the necessary electronic circuits and parts for a given system, such as a Smartphone or wearable computer, on a single integrated circuit (IC). Day by day the scope & use of the electronics concepts in industrial field is increasing step by step. In this paper the review of newly developed concepts is done for the SoC design for real time industrial application. This paper also reviews a power and area efficient for industrial application. Further the study of SoC designs for real time industrial application has been carried out. Mr. Abhijit Patil | Mr. A. A. Shirolkar"A Review on System-on-Chip (SoC) Designs for Real-Time Industrial Application" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-1 , December 2017, URL: http://www.ijtsrd.com/papers/ijtsrd7077.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/7077/a-review-on-system-on-chip-soc-designs-for--real-time-industrial-application/mr-abhijit-patil
This document describes a proposed college bus fare payment system using RFID technology. The system would allow students to pay bus fares automatically by swiping an RFID card linked to their account balance. A microcontroller, RFID reader, and other components would track fares and open/close a gate depending on whether a student's account balance is sufficient. The system aims to make fare collection more efficient compared to traditional systems relying on a conductor collecting cash from passengers. It would also allow fare records and balances to be automatically updated and monitored through a database interface.
This document is a certificate of completion for a specialization in programming the Internet of Things (IOT). The specialization included 6 courses that covered topics such as the Arduino and Raspberry Pi platforms, C and Python programming, interfacing with microcontrollers, and a capstone project to design and build an IOT device. The certificate verifies that Mohammed Ahmed Zaki successfully completed the online, non-credit specialization in IOT programming from the University of California, Irvine.
Synthesized Speech using a small Microcontrolleriosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document describes the implementation of a human health monitoring system using Zigbee wireless technology. It presents a prototype that can monitor biomedical signals from multiple biosensors using different communication standards. The prototype utilizes three different sensor types for autonomous healthcare monitoring. It also develops a Zigbee-compliant wireless system offering low power consumption, low cost, and advanced network configuration. Experimental results show the system can successfully perform wireless telemetry, data acquisition, and real-time monitoring of sensor signals over a range of 111 meters outdoors and 33 meters indoors.
- The document describes a smart SMD packer device that automatically counts, cuts, and packs SMD components into packets.
- It uses infrared sensors to precisely count the number of SMD components on a roll/strip and cuts the required number. The components then fall into a collection box.
- The system is controlled by a microcontroller and can be operated remotely through a smartphone application, allowing users to request a specific number of components from anywhere. This automates the packaging process and saves time and resources compared to manual packaging.
A Modern Technique for Unauthorized Human Detection and Intimationijtsrd
"Technological advancements are inevitable and the field of IoT is no exception. The utilization of the technologies in various sectors is highly employed. Even though we use technology in various sectors, the employment of technology for security purposes is very low. The Existing security in various places only CCTV is used for monitoring and recording. Even there are existing security systems where an alert is sent via an email which requires a stable internet connection. It is unlikely that we expect the user to be always connected to an internet source. In the Proposed system, authorized users faces will be trained and stored in a Database. Initially, when an unknown known person enters in the zone the camera module will capture the intruders face. The captured intruder's face will be compared with the trained faces in the database. If the person's face doesn't match, the micro controller will send an alert SMS to the recognized user and also the intruder's captured image will be E mailed to the user. The authorized user should acknowledge the SMS message. If he fails to acknowledge the message within a threshold time limit, an alert call will be made to the concerned user. By this the user gets intimated in real time. Keerthanna G. S | Praveen Kumar P | Vishnu Prasad K | Ms. S. Sri Heera ""A Modern Technique for Unauthorized Human Detection and Intimation"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21659.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/21659/a-modern-technique-for-unauthorized-human-detection-and-intimation/keerthanna-g-s"
IRJET - Eyeblink Controlled Virtual Keyboard using Raspberry PiIRJET Journal
This document describes an eyeblink-controlled virtual keyboard system using a Raspberry Pi. The system uses a webcam to capture a user's face and detect eyeblinks. By blinking at different positions on a virtual keyboard displayed on a monitor, the user can select letters and communicate through text. The Raspberry Pi runs Python programs for facial detection, tracking eye movements, and controlling a virtual keyboard and pointer. This allows people with disabilities preventing physical interaction to communicate through eyeblinks selecting letters on a keyboard. The goal is to provide an accessible communication method using existing eye movement capabilities.
Abstract Enhance Data Rate (EDR) in Bluetooth 2.0 specifications provide condition for Bluetooth multi-point communication. Aiming at application requirements of Bluetooth technique in wireless communication, Embedded Bluetooth Information Broadcast System (EBIBS) based on ARM9 microprocessor S3C2440 was designed and implemented. The system runs on ARM-Linux operation system and achieves single point transmission, multi-point transmission and information update based on Bluetooth 2.0 specifications. BlueZ protocol stacks and object exchange (OBEX) were utilized to complete multi-point transmission. Device driver technique was used to switch core functions and retransmission mechanism to ensure reliability of information broadcast. The system has been verified at broad-level and practical application. The result was also provided. Index Terms: ARM, Bluetooth, embedded, information broadcast
The document proposes a smart storage system for home applications using a Raspberry Pi. The system would use a Raspberry Pi to create a home cloud for storing and retrieving files. A Seed block algorithm would be used to provide secure access to stored data by encrypting files during upload and decrypting during download. The system aims to provide a low-cost, reliable home cloud with automation capabilities by connecting sensors and appliances to the Raspberry Pi and controlling them remotely using an Android app.
1) Online sales of luxury fashion are expected to surge significantly in major markets like the US, UK, and Germany by 2018, growing from 3% to 17% of the total luxury market.
2) Consumer surveys found that while convenient return policies and free shipping were universally important, preferences varied in each market - Americans valued one-stop department store sites, Brits favored multi-brand sites like Net-a-Porter, and Germans expected high service levels.
3) To increase online sales, brands and retailers should focus on offering exclusive products, competitive pricing, and improving the customer experience through reviews, better websites, and tailored offerings for each market.
This document discusses life learning or unschooling as an alternative to traditional schooling. It describes life learning as allowing education to happen naturally through daily life experiences rather than being forced through textbooks and lectures. Life learning focuses on developing real-world skills and independent thinking. It also allows children freedom to pursue their own interests, which fosters passion for learning. The document contrasts life learning with traditional schooling and notes that life learning incorporates learning from whole life experiences rather than isolated subjects. It provides examples of how one family implements life learning through outings, activities, online courses, community interactions, travel and integrating learning into other areas of life without rigid separation of school and leisure time.
This document discusses the importance of security programs for condo communities. It recommends that condo boards implement comprehensive security programs that include physical, technological, and procedural security measures, as well as security personnel. The security program should be integrated and continuously reviewed through audits. The document emphasizes that resident involvement is also key - a safe community involves residents reporting issues and being aware of suspicious activity. The biggest security investment is encouraging residents to invest in their community.
The document discusses the P-ISM personal networking gadget package which consists of 5 pen-style devices: a CPU pen, communication pen with cellular connectivity, virtual keyboard, small projector, and camera. These devices connect wirelessly and the communication pen allows internet access. The CPU pen contains a dual-core processor and runs on a Windows operating system. It discusses the basic components and operation of the CPU pen, including the control unit, microprocessor, fetch-decode-execute cycle, and binary number representation.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Modern computer network technologies discussed in the document include Internet of Things, Artificial Intelligence, 5G, Edge Computing, Software Defined Networking, Multi Cloud Technology, Quantum Computing, Digital Twin, Nano Network Technology, and Machine Learning. The Internet of Things describes all things connected to the Internet like sensors and smart devices. Artificial Intelligence aims to give human intelligence to machines through technologies like narrow AI and general AI. 5G promises high speeds, reliability and low latency to impact sectors like healthcare. Edge Computing reduces latency and bandwidth by bringing computing closer to data sources. Software Defined Networking abstracts network layers to make networks more agile. Multi Cloud Technology uses multiple public cloud providers for workloads. Quantum Computing performs calculations
01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...Sivaram P
This document discusses the AUTOSAR standard for automotive in-vehicle networks. It begins by comparing AUTOSAR to the OSI model for computer networks, noting that OSI helped standardize computer networking and led to benefits like easier troubleshooting. AUTOSAR aims to do the same for automotive in-vehicle networks. The document then discusses how AUTOSAR standardizes the architecture and integration of electronic control units and software to control different vehicle functional domains. This standardization brings benefits like reduced complexity, easier maintenance, and a more global automotive industry with options for interchangeable parts from different manufacturers. Finally, the document briefly outlines some of the main vehicle functional domains and the role of ECUs and software in controlling them.
Security Protocols for USB Mass Storage DevicesIRJET Journal
This document proposes a three-factor security protocol for USB mass storage devices using biometric authentication, passwords, and device verification. The protocol would allow for data transfer between USB drives without needing a computer by using an ARM processor-based device with a touchscreen interface. It describes using fingerprint scanning, a numeric password, and checking the connected drives to authenticate users before transferring data between drives for added security. This aims to provide more secure data transfer than existing methods while maintaining convenience without high power consumption.
IRJET- Survey on Face-Recognition and Emotion DetectionIRJET Journal
The document summarizes a research paper on developing a real-time security system using face recognition, motion detection, tracking, and emotion detection. The proposed system monitors an area using a network camera and detects any motion. If motion is detected, it captures live images and sends notifications to listed individuals. The system provides safety against unauthorized access or misbehavior using computer vision techniques like face recognition, motion detection and tracking implemented on a Raspberry Pi board with a camera module and OpenCV library.
IRJET - IoT based Portable Attendance SystemIRJET Journal
This document describes the design and implementation of a portable IoT-based fingerprint attendance system. The system uses a fingerprint sensor module connected to a NodeMCU ESP8266 microcontroller to scan and identify fingerprints. Registered user fingerprints and attendance data are stored in a Firebase database in the cloud. When a fingerprint is scanned, it is matched to the database to mark the user as present. An OLED display shows the user name. This system provides a wireless, portable alternative to traditional paper-based attendance methods that saves time and prevents fake attendance issues. It accurately tracks attendance using biometric fingerprint identification and IoT connectivity.
A Review on System-on-Chip (SoC) Designs for Real-Time Industrial Applicationijtsrd
Now-a-days System-on-a-chip (SoC) technology is used in small, increasingly complex consumer electronic devices. A system-on-a-chip (SoC) is a microchip with all the necessary electronic circuits and parts for a given system, such as a Smartphone or wearable computer, on a single integrated circuit (IC). Day by day the scope & use of the electronics concepts in industrial field is increasing step by step. In this paper the review of newly developed concepts is done for the SoC design for real time industrial application. This paper also reviews a power and area efficient for industrial application. Further the study of SoC designs for real time industrial application has been carried out. Mr. Abhijit Patil | Mr. A. A. Shirolkar"A Review on System-on-Chip (SoC) Designs for Real-Time Industrial Application" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-1 , December 2017, URL: http://www.ijtsrd.com/papers/ijtsrd7077.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/7077/a-review-on-system-on-chip-soc-designs-for--real-time-industrial-application/mr-abhijit-patil
This document describes a proposed college bus fare payment system using RFID technology. The system would allow students to pay bus fares automatically by swiping an RFID card linked to their account balance. A microcontroller, RFID reader, and other components would track fares and open/close a gate depending on whether a student's account balance is sufficient. The system aims to make fare collection more efficient compared to traditional systems relying on a conductor collecting cash from passengers. It would also allow fare records and balances to be automatically updated and monitored through a database interface.
This document is a certificate of completion for a specialization in programming the Internet of Things (IOT). The specialization included 6 courses that covered topics such as the Arduino and Raspberry Pi platforms, C and Python programming, interfacing with microcontrollers, and a capstone project to design and build an IOT device. The certificate verifies that Mohammed Ahmed Zaki successfully completed the online, non-credit specialization in IOT programming from the University of California, Irvine.
Synthesized Speech using a small Microcontrolleriosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document describes the implementation of a human health monitoring system using Zigbee wireless technology. It presents a prototype that can monitor biomedical signals from multiple biosensors using different communication standards. The prototype utilizes three different sensor types for autonomous healthcare monitoring. It also develops a Zigbee-compliant wireless system offering low power consumption, low cost, and advanced network configuration. Experimental results show the system can successfully perform wireless telemetry, data acquisition, and real-time monitoring of sensor signals over a range of 111 meters outdoors and 33 meters indoors.
- The document describes a smart SMD packer device that automatically counts, cuts, and packs SMD components into packets.
- It uses infrared sensors to precisely count the number of SMD components on a roll/strip and cuts the required number. The components then fall into a collection box.
- The system is controlled by a microcontroller and can be operated remotely through a smartphone application, allowing users to request a specific number of components from anywhere. This automates the packaging process and saves time and resources compared to manual packaging.
A Modern Technique for Unauthorized Human Detection and Intimationijtsrd
"Technological advancements are inevitable and the field of IoT is no exception. The utilization of the technologies in various sectors is highly employed. Even though we use technology in various sectors, the employment of technology for security purposes is very low. The Existing security in various places only CCTV is used for monitoring and recording. Even there are existing security systems where an alert is sent via an email which requires a stable internet connection. It is unlikely that we expect the user to be always connected to an internet source. In the Proposed system, authorized users faces will be trained and stored in a Database. Initially, when an unknown known person enters in the zone the camera module will capture the intruders face. The captured intruder's face will be compared with the trained faces in the database. If the person's face doesn't match, the micro controller will send an alert SMS to the recognized user and also the intruder's captured image will be E mailed to the user. The authorized user should acknowledge the SMS message. If he fails to acknowledge the message within a threshold time limit, an alert call will be made to the concerned user. By this the user gets intimated in real time. Keerthanna G. S | Praveen Kumar P | Vishnu Prasad K | Ms. S. Sri Heera ""A Modern Technique for Unauthorized Human Detection and Intimation"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21659.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/21659/a-modern-technique-for-unauthorized-human-detection-and-intimation/keerthanna-g-s"
IRJET - Eyeblink Controlled Virtual Keyboard using Raspberry PiIRJET Journal
This document describes an eyeblink-controlled virtual keyboard system using a Raspberry Pi. The system uses a webcam to capture a user's face and detect eyeblinks. By blinking at different positions on a virtual keyboard displayed on a monitor, the user can select letters and communicate through text. The Raspberry Pi runs Python programs for facial detection, tracking eye movements, and controlling a virtual keyboard and pointer. This allows people with disabilities preventing physical interaction to communicate through eyeblinks selecting letters on a keyboard. The goal is to provide an accessible communication method using existing eye movement capabilities.
Abstract Enhance Data Rate (EDR) in Bluetooth 2.0 specifications provide condition for Bluetooth multi-point communication. Aiming at application requirements of Bluetooth technique in wireless communication, Embedded Bluetooth Information Broadcast System (EBIBS) based on ARM9 microprocessor S3C2440 was designed and implemented. The system runs on ARM-Linux operation system and achieves single point transmission, multi-point transmission and information update based on Bluetooth 2.0 specifications. BlueZ protocol stacks and object exchange (OBEX) were utilized to complete multi-point transmission. Device driver technique was used to switch core functions and retransmission mechanism to ensure reliability of information broadcast. The system has been verified at broad-level and practical application. The result was also provided. Index Terms: ARM, Bluetooth, embedded, information broadcast
The document proposes a smart storage system for home applications using a Raspberry Pi. The system would use a Raspberry Pi to create a home cloud for storing and retrieving files. A Seed block algorithm would be used to provide secure access to stored data by encrypting files during upload and decrypting during download. The system aims to provide a low-cost, reliable home cloud with automation capabilities by connecting sensors and appliances to the Raspberry Pi and controlling them remotely using an Android app.
1) Online sales of luxury fashion are expected to surge significantly in major markets like the US, UK, and Germany by 2018, growing from 3% to 17% of the total luxury market.
2) Consumer surveys found that while convenient return policies and free shipping were universally important, preferences varied in each market - Americans valued one-stop department store sites, Brits favored multi-brand sites like Net-a-Porter, and Germans expected high service levels.
3) To increase online sales, brands and retailers should focus on offering exclusive products, competitive pricing, and improving the customer experience through reviews, better websites, and tailored offerings for each market.
This document discusses life learning or unschooling as an alternative to traditional schooling. It describes life learning as allowing education to happen naturally through daily life experiences rather than being forced through textbooks and lectures. Life learning focuses on developing real-world skills and independent thinking. It also allows children freedom to pursue their own interests, which fosters passion for learning. The document contrasts life learning with traditional schooling and notes that life learning incorporates learning from whole life experiences rather than isolated subjects. It provides examples of how one family implements life learning through outings, activities, online courses, community interactions, travel and integrating learning into other areas of life without rigid separation of school and leisure time.
This document discusses the importance of security programs for condo communities. It recommends that condo boards implement comprehensive security programs that include physical, technological, and procedural security measures, as well as security personnel. The security program should be integrated and continuously reviewed through audits. The document emphasizes that resident involvement is also key - a safe community involves residents reporting issues and being aware of suspicious activity. The biggest security investment is encouraging residents to invest in their community.
Se hai creduto in Cristo, sei passato dalla morte alla vita.; ora sei un suo capolavoro. Come stai
vivendo la tua nuova vita in Cristo? Come una nuova creatura, o come un morto vivente?
Michele Carson ci incoraggia, attraverso Efesini 2, a vivere in modo che la nostra vita testimoni di ciò che ha fatto Cristo per noi.
2015 Fuqua:Coach K Leadership Summit Participant List and BiosChristine Song
This document provides biographies for several summit participants, including Fernando Aguirre, John P. Angelos, and Donald A. Baer. It summarizes their professional experiences, roles, and accomplishments.
This document explains how to add and configure health packs in Active Directory Health Profiler. It outlines the steps to add health packs to a health profile, and that some health packs may require configuration before being executed successfully. It provides examples of configuring the "Get Active Directory Domain Security Group Membership" and "Get Active Directory Domain FSMO" health packs.
Evance Seven Mafuyeka has provided his curriculum vitae detailing his personal and contact information, education history, work experience, skills and references. He holds qualifications in motor mechanics and has over 10 years of experience in fleet management, panel beating and mechanics. His most recent role is as a Fleet Management Technician at Sabot since 2013 where he installs and maintains tracking units, drives cameras, and generates reports. He provides four references from previous supervisors who can speak to his abilities.
1. The board meeting notes discussed focus groups held with community members and employees to understand priorities. Topics that came up included art, testing, PE, pay and more.
2. The board discussed bonds and debt repayment. Enrollment is increasing so a new bond is needed before repaying the old one. Tax rates would stay consistent. Numbers presented were illustrative ahead of the bond election in 6-8 months.
3. Issues with preschool programs and full-day kindergarten included space and finding teachers. Existing programs like Head Start were discussed to see if they are self-sustaining.
The document outlines scoresheets for judges at the Patanjali Yoga Olympiad 2015 district competition in Thiruvananthapuram. The scoresheets are for three judges evaluating participants on group asanas and include categories like flexibility, perfection, layam, prasannatha, slowness, and uniformity. The judges will fill in participants' names, assessment of categories, overall scores, totals, remarks, signatures, and dates.
This document discusses direct objects and indirect objects in sentences. It states that a direct object is a noun or pronoun that receives the action of the main verb. The direct object answers the questions "what?" or "who?" after an action verb. An indirect object identifies who or what receives the direct object and is introduced by prepositions like "to" or "for". Some examples of sentences with direct and indirect objects are provided to illustrate these concepts.
This document provides details about a wedding that took place. It describes the preparations in the days leading up to the wedding, including decorating the marquee, hair and makeup preparations, and the arrival of the wedding party. On the day of the wedding, Rosemary got ready in her wedding dress and photos were taken. The wedding then proceeded at the church. Recent additions to the family, including a newborn nephew, were able to attend the special day as well.
Matt Martin Real Estate Management is rebranding as Chronos Solutions to better position itself for growth. The current name does not convey the size and scope of services provided beyond property management. The new name Chronos Solutions, referring to the Greek god of time, aims to portray the company as a national service provider with the flexibility of a boutique firm. It will officially launch at an industry conference with a new website and marketing campaign. Employees will receive updated email addresses and instructions for changes to phones, signatures and social media to complete the transition.
This document discusses the significance and organization of a science club. It begins by introducing the need for science clubs to supplement classroom learning and foster scientific skills like experimentation. It then outlines the objectives of a science club, which include developing interests in science, encouraging collaboration and problem-solving skills. Next, the importance of properly organizing a science club is described, with sections on functional, structural and preliminary organization. Key aspects highlighted are establishing roles for executive members, planning activities, and arranging speakers to engage members. Overall, the document provides an overview of how science clubs can enhance science education outside the classroom.
Embedded Web Server based Interactive data acquisition and Control SystemIOSR Journals
This document summarizes an embedded web server based interactive data acquisition and control system. The system uses an ARM9 processor running RTLinux to both acquire data from sensors and control industrial devices. It allows remote monitoring and control via a web browser. The ARM9 handles data acquisition, control functions, and an embedded web server simultaneously. Analog sensor signals are converted to digital with an ADC and stored in external memory. The web server portion allows clients to access the stored data and send control instructions via HTML pages to the ARM9 over Ethernet. This embedded single-board solution provides real-time data acquisition and control with remote access capabilities.
Embedded Web Server based Interactive data acquisition and Control SystemIOSR Journals
This document summarizes an embedded web server based interactive data acquisition and control system. The system uses an ARM9 processor running RTLinux to both acquire data from sensors and control industrial devices. It allows remote monitoring and control via a web browser. The ARM9 handles data acquisition, control functions, and an embedded web server simultaneously. Analog sensor signals are converted to digital with an ADC and stored in external memory. The web server portion allows clients to access the stored data and send control instructions via HTML pages. This embedded single-board solution provides reliable real-time data acquisition and remote control capabilities with low resource usage.
Internet of Things (Iot) Based Robotic ArmIRJET Journal
This document describes an Internet of Things (IoT) based robotic arm project. The robotic arm is controlled remotely through a web interface using a WiFi module. The arm consists of servomotors connected by joints to mimic a human arm. A microcontroller receives commands from the WiFi module and controls the servomotors. The arm can pick and place objects automatically and its movements can be recorded to perform tasks repeatedly. The project aims to control machines from distant locations using IoT for applications in industries and medical fields.
The Wireless Remote Control Car Based On Arm9IOSR Journals
Abstract: TheInternetof Things (IoT) are of great importance in promoting and guiding development of information technology and economic. At Present, theapplicationoftheIoT develops rapidly, but due to the special requirements of some applications, the existing technology cannot meet them very good. Much research work is doing to build IoT. Wi-Fi basedWirelessremote control has the features of high bandwidth and rate, non-line-transmission ability, large-scale data collection and high cost-effective, and it has the capability of video monitoring, which cannot be realized with RF. The research on Wi-Fi based remote control car has high practical significance to the development oftheInternetof Things. Based on the current research work ofapplicationsthe characteristics of Wi-Fi, this paper discusses controlling the car by using Wi-Fi module along with the conditions can be monitored through remote PC or Lap top which supports Wi-Fi technology. In PC or Lap top two tabs are present. In the first tab we can monitor the conditions and in the second tab four buttons are present to control the car in forward, back ward, left side and right side directions. Keywords: S3C2440 (ARM9), Wi-Fi Module, Camera, DC motors with driver IC and laptop with Wi-Fi module.
A Survey Embedded Systems Supporting By Different Operating Systems.pdfFiona Phillips
This document discusses different operating systems that support embedded systems. It begins by defining embedded systems and their increasing use in various applications like consumer electronics, medical devices, transportation systems, and wireless sensor networks. It then examines several commonly used operating systems for embedded systems like QNX, Windows CE, Linux, and domain-specific operating systems for sensor networks. For each OS, it provides details on features like architecture, scheduling algorithms, memory management, and language support. It concludes by characterizing embedded systems as either standalone or networked systems and provides examples of each type.
Remote temperature and humidity monitoring system using wireless sensor networkseSAT Journals
Abstract Today’s world has become very advanced with smart appliances and devices like laptops, tablets, televisions. smart phones with different features and their usage has been enormously increasing in our day-to-day life. The technology advancement in Digital Electronics and Micro Electro Mechanical Systems. In this scenario the most important role is played by Wireless Sensor Networks and its development and usage in heterogeneous fields and several contexts. the home automation field and process control systems and health control systems widely uses wireless sensor networks. Moreover with WSN we can monitor environments and its conditions also. We are designing a protocol to monitor the environmental temperature and humidity at different conditions. The architecture is simple to construct and ease to implement and also has an advantage of low power consumption. The aim of our paper to describe and show how to create a simple protocol for environment monitoring using a wireless development kit. we are using advanced technology of crossbow motes and NESC Language Programming. Keywords: Motes, WSN, sensor, TinyOS, Nesc.
IRJET- Multi Plug Control using Internet of ThingsIRJET Journal
This document presents a multi-plug control system using Internet of Things (IoT). The system allows users to control home appliances like lights and fans remotely through a mobile app and the internet. It uses an Arduino microcontroller connected to a WiFi module to receive commands from the app over the internet and control relays connected to devices. The system aims to automate homes and save energy by allowing remote control of devices from anywhere through the internet-connected microcontroller. It provides advantages over manual systems like saving time and being able to control devices from anywhere in the world.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Wireless Multimedia Sensor Network: A Survey on Multimedia Sensorsidescitation
Recently due to progress in Complementary Metal
Oxide Semiconductor (CM OS) technology, Wireless
Multimedia Sensor Networks (WMSNs) become focus of
research in a broader range of applications. In this survey
paper different WMSNs applications, research & design
challenges are outlined. In addition to this, different available
commercial multimedia sensors are discussed in detail and
compared. Also other then commercial available multimedia
sensors, some experimental multimedia sensor prototypes are
discussed. In addition to this different experimental deployed
test beds for WMSNs are outlined. Also few Wireless Sensor
Networks (WSNs) simulators and emulators are reviewed.
Depending upon the requirement a few physical multimedia
sensors can be integrated or embedded within available
simulators to observe more accurate results or to visualize in
a better way.
The document discusses challenges and security issues related to the Internet of Things (IoT). It notes that while IoT provides many benefits across various industries like healthcare, transportation, and more, it also faces challenges. Key challenges include the large number of devices and sensors requiring unique identification, and the need for proper data storage, management, and processing. Regarding security issues, the document states that IoT devices are vulnerable to attacks due to limited computing resources. It proposes using cloud computing and other techniques to help build a more secure IoT infrastructure.
Controlling Home Appliances by using Universal Remote Control System (IoT and...IRJET Journal
This document describes a system for controlling home appliances using a universal remote control over IoT and Bluetooth technologies. The system uses an ARM board connected to home appliances via the control box. An Android smartphone acts as the universal remote control and communicates with the ARM board and appliances wirelessly using IoT, Wi-Fi and Bluetooth. The system architecture includes the remote controller, target devices/appliances, and a software interface to generate control interfaces for different appliances on the remote. The system aims to provide simple control of multiple appliances using a single remote interface.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Internet Of Things: Architecture,Issues and ApplicationsIJERA Editor
Recent past year’s research on architecture standardization of IoT (Internet of thing) is going on, not yet concluded about standardization, It is still open and debatable how to make a standard platform. Thousands of researcher’s and Engineers are concentrating on IoT architecture standardization. Few open source community have already started working on IoT architecture for standardization. Yet lot of improvement is needed. Even some organization are collaborating and coming up with standardization. This will give base IoT Architecture standardization or Initial architecture which can evolve one of the solutions for making standardization. Seminar report gives full-fledged and complete modularity for IoT architecture. Depending on user application any unwanted module can be removed and addition of any number of modules to the architecture can be done easily. Mainly concentrates on modularity and scalability of the software. It helps IoT SoC(system on Chip) manufacturer to make hardware platform in-order to fit IoT applications.
ACCELERATED DEEP LEARNING INFERENCE FROM CONSTRAINED EMBEDDED DEVICESIAEME Publication
Hardware looping is a feature of some processor instruction sets whose hardware can repeat the body of a loop automatically, rather than requiring software instructions which take up cycles (and therefore time) to do so. Loop Unrolling is a loop transformation technique that attempts to advance a program's execution speed to the detriment of its twofold size, which is a methodology known as space–time tradeoff. A convolutional neural network is created with simple loops, with hardware looping, with loop unrolling and with both hardware looping and loop unrolling, and a comparison is made to evaluate the effectiveness of hardware looping and loop unrolling. The hardware loops alone will add to a cycle check decline, while the mix of hardware loops and dot product instructions will decrease the clock cycle tally further. The CNN is simulated on Xilinx Vivado 2021.1 running on Zync-7000 FPGA.
Design and Implementation of Smart Bell Notification System using IoTIJRTEMJOURNAL
This document describes the design and implementation of a smart bell notification system using IoT. The system uses a camera to capture an image of a visitor when the doorbell is pressed and sends the image to the owner via SMS along with an alert. It also saves the images to a Google Drive folder. The system aims to provide home security and convenience by allowing owners to see who is at the door and take appropriate action. It uses an ARM-7 microcontroller, GSM modem, camera and cloud storage to enable this smart doorbell notification feature.
This document summarizes a study on existing wireless sensor networks that can be used for structural health monitoring. It discusses three main wireless sensor network platforms: Sensor Andrew Architecture, a structural health monitoring system using smart sensors, and Snowfort, a new wireless sensor network platform designed for infrastructure monitoring. The document outlines the key components, advantages, and limitations of each wireless sensor network platform for structural health monitoring applications.
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNIAEME Publication
Wireless sensor networks are harshly restricted by storage capacity, energy and computing power. Wireless Sensor Networks have acquired a lot of attention by research community, manufacturer as well as actual users for monitoring remote trades and how to gather data in different environment. The wireless sensor nodes are especially battery powered devices having life can be extended for some times while long lasting and reliable for maintaining consumption of energy and network lifetime while designs applications and protocols. So it is essential to design effective and energy efficient protocol in order to enhance the network lifetime. In this paper we present the study of different energy efficient communication protocols of Wireless Sensor Networks (WSNs).Then some of the communication protocols which are widely used in WSNs to improve network performance are also discussed advantages and disadvantages of each protocols.
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET Journal
This document describes a smart attendance management system using RFID technology. The system uses RFID cards distributed to students that are read by an RFID reader module connected to a microcontroller. When a student taps their card, the unique ID is sent to a server for verification and their attendance is recorded in a MySQL database. If a student is absent or late, an SMS is sent to their parents. Staff can access student attendance data from a dashboard website. The system aims to automate the attendance process and make it faster and more secure than conventional paper-based methods.
The document describes a security protocol called SPINS (Security Protocols for Sensor Networks) that is optimized for resource-constrained wireless sensor networks. SPINS consists of two security building blocks: SNEP and TESLA. SNEP provides data confidentiality, authentication, integrity and freshness with low overhead. TESLA provides authenticated broadcast, which is challenging for sensor networks. The protocols were implemented on prototype sensor nodes and shown to perform well within the limited capabilities of the hardware.
As sensor networks edge closer towards wide-spread placement, security issues become a central concern. So far, much research has concentrated on making sensor networks feasible and useful, and has not focused on security.
We present a set of security building blocks optimized for resource constrained environments and wireless communication. SPINS has two secure building blocks: SNEP and TESLA. SNEP provides the following important baseline security primitives: Data confidentiality, two-party data authentication, and data freshness. A particularly hard problem is to provide effective broadcast authentication, which is an important mechanism for sensor networks. TESLA is a new protocol which provides authenticated broadcast for severely resource-constrained surroundings. We realized the above protocols, and show that they are practical straighly on minimal hardware: the performance of the protocol suite easily matches the data rate of our network. Additionally, we prove that the suite can be used for building higher level protocols
Similar to Embedded ARM Control Robotic Arm using BoaWeb server – a Survey (20)
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Embedded ARM Control Robotic Arm using BoaWeb server – a Survey
1. V.Sirisha Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 10, (Part - 2) October 2015, pp.33-39
www.ijera.com 33 | P a g e
Embedded ARM Control Robotic Arm using BoaWeb server – a
Survey
V.Sirisha*, V. Sachin Kumar**
*(Department of Electronics and Communication Engineering, Sreenidhi Institute Of Science And Technology,
Jawaharlal Nehru Technological University, Hyderabad-501301)
**(Department of Electronics and Communication Engineering, Scient Institute Of Technology, Jawaharlal
Nehru Technological University, Hyderabad)
ABSTRACT
In today’s market, the competing microprocessors are ARM (Advanced Risc Microprocessor), Intel, AMD.
ARM is preferred since it has been powering portable devices for decades and has simple architecture to keep
the energy waste to be minimum. The electronics advancements and embedded technology advancements have
become a challenging field in today’s techno world. In paper, the diligent features of embedded systems are
introduced. It deals about how a robot is controlled using embedded operating system and ARM. Based on the
combination of ARM, DSP and ARM Linux, the robot is controlled. The paper introduces development of
embedded robot control system using Wi-Fi and also IOT. The embedded control system design includes four
aspects. i.e., system structure, functions, hardware design and software design. By using these aspects (hardware
and software adjustments), many robotic applications can be developed. Due to the fast execution speed and
reasonable Ethernet speed in ARM processor, this system can be used in industrial oriented applications where
there is very much necessity of safety and security.
Keywords - ARM, ARM LINUX,Boa server, Embedded operating system, Embedded web server.
I. INTRODUCTION
1. Embedded Operating System
An embedded operating system is an operating
system for embedded computer systems. These
operating systems are designed to be compact,
efficient at resource usage, and reliable for many
functions that non-embedded computer operating
systems provide, and which may not be used by the
specialized applications they run. They are frequently
also referred to as real-time operating systems .
An important difference between most embedded
operating systems and desktop operating systems is
that the application, including the operating system,
is usually statically linked together into a single
executable image. Unlike a desktop operating system,
the embedded operating system does not load and
execute applications. This means that the system is
only able to run a single application.
The advantages of embedded Linux over
proprietary embedded operating systems include
multiple suppliers for software, development and
support, no royalties or licensing fees, a stable kernel,
the ability to read, modify and redistribute the source
code. The technical disadvantages include a
comparatively large memory footprint (kernel and
root file system), complexities of user mode and
kernel mode memory access, and a complex device
driver’s framework.
As more advanced control algorithms are
becoming available for the control of robotic arms,
traditional fixed controller boards and associated
code generators are becoming less convenient way to
test such control algorithms in real-time. The process
of using such boards is complex, time consuming,
and inflexible. By the advancement of electronics,
embedded technology has become a challenging field
in this modern age. The single functioned tightly
constrained, reactive and real-time feature of these
devices enhanced its importance in industrial,
consumer applications.
1.1 Literature Survey
1. Alen Rajan in his paper [1] proposed that
embedded technology is one of the emerging
technologies in this most modern era. When
networking technology is incorporated with the
former, there is no doubt that the scope of
embedded systems would be further more.
2. Alen Rajan has highlighted in the paper [2] that a
robot arm is an Electro-mechanical device that
performs various tasks ranging from simple
mechanical jobs to highly complex tasks. It can
be used to pick and place small parts on a
production line.
3. Li Yanhong proposed that [3], it can replace the
human operator in feeding industrial process
with discrete components.
RESEARCH ARTICLE OPEN ACCESS
2. V.Sirisha Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 10, (Part - 2) October 2015, pp.33-39
www.ijera.com 34 | P a g e
4. Reza Ezuan Samin in his paper [4] explained
that, with the increase usage of wireless
application, the demand for a system that could
easily connect devices for transfer of data over a
long distance - without cables, grew stronger.
Robotic arms are used in diverse manufacturing
processes including assembly, spot welding,
laser processing, cutting, grinding, polishing,
testing, painting and dispensing.
5. Tetsuya Akagia proved in his paper [5] that,
Robots have proved to help automakers to be
more agile, flexible and to reduce production
lead times. The robot arm using in this paper was
designed with DC motors which are driven by
the driver circuit
6. V.Billy Rakesh Roy1, Sanket Dessai1, and S.
G.Shiva Prasad Yadav in his paper [6] explained
about The ARM architecture is based on
Reduced Instruction Set Computer (RISC)
principles, and the instruction set and related
decode mechanism are much simpler than those
of micro programmed Complex Instruction Set
Computers. This simplicity results in a high
instruction throughput and impressive real-time
interrupt response from a small and cost-
effective processor core. Pipeline techniques are
employed so that all parts of the processing and
memory systems can operate continuously.
Typically, while one instruction is being
executed, its successor is being decoded, and a
third instruction is being fetched from memory
ARM based embedded system will be more
functional, reliable, cost effective, less in size
and low power consumption. Microcontroller has
low speed and poor memory, so it can only
execute simple control tasks.
7. Mohd Ashiq Kamaril Yusoff in his paper [7]
explained about a robotic arm saying that a
robotic arm is a robot manipulator, usually
programmable, with similar functions to a
human arm. The links of such a manipulator are
connected by joints allowing either rotational
motion (such as in an articulated robot) or
translational (linear) displacement. The links of
the manipulator can be considered to form a
kinematic chain. The business end of the
kinematic chain of the manipulator is called the
end effectors and it is analogous to the human
hand. The end effectors can be designed to
perform any desired task such as welding,
gripping, spinning etc., depending on the
application. The robot arms can be autonomous
or controlled manually and can be used to
perform a variety of tasks with great accuracy.
The robotic arm can be fixed or mobile (i.e.
wheeled) and can be designed for industrial or
home applications. The wireless mobile robots
also have been developing in previous years.
8. Junhua Yang in his paper [8] explains that Since
ARM is not directly connected with the Internet
system. A kind intelligence monitoring system
based on 32 bit ARM processor LPC2138 and
information fusion technology was provided.
ARM has advantages of high integration and
powerful information processing capability.
9. K.Bharath reddy, Ch. Rajendra Prasad in their
paper [9] explains about the system structure of
embedded Web server. The entire system uses
B/S mode. The client PC is connected to the
Internet through a browser and then gets access
to the embedded Web server. Through this way,
remote login and operation are realized.
Embedded Web Server (EWS) is a Web server
that runs on an embedded system with limited
computing resources and serves embedded Web
documents to a Web browser. By embedding a
Web server into a network device, it is possible
for a EWS to provide a powerful Web-based
management user interface constructed using
HTML, graphics and other features common to
Web browsers. When applied to embedded
systems, Web technologies offer graphical user
interfaces, which are user-friendly, inexpensive,
cross-platform, and network-ready. A Web
server can be embedded in a device to provide
remote access to the device from a Web browser
if the resource requirements of the Web server
are reduced. The end result of reducing the
resource requirements of the Web server is
typically a portable set of code that can run on
embedded systems with limited computing
resources.
10. Vaishak N. L,C.G. Ram Chandra explained
about ARM processor in his paper[10] explained
the software part was developed by using
embedded C. Existing system robot generally
works with microcontroller and it is basically
wired robots which works on CISC
microprocessor. Proposed System introduces the
configuration of the embedded system, and then
presents a robot control system based on an
embedded operating system and ARM. Based on
the combination of advanced RISC
microprocessor (ARM), DSP and ARM-Linux,
this project involves development of embedded
robot control systems through Wi-Fi. Here we
use ARM controller as the heart of the system.
ARM has high speed of execution and powerful
information processing capability. The capacity
of multi-parameter execution, multi-level
monitoring and networking of ARM processor
makes it suitable for a wide variety of
networking applications.
3. V.Sirisha Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 10, (Part - 2) October 2015, pp.33-39
www.ijera.com 35 | P a g e
Fig.1 Functional Diagram
II. ARM MICROPROCESSOR
2. ARM Architecture
ARM architecture is the most widely used 32-bit
ISA in terms of numbers produced. They were
originally conceived as a processor for desktop
personal computers by Acorn Computers, a market
now dominated by the x 86 families used by IBM PC
compatible and Apple Macintosh computers. The
ARM is a 32-bit reduced instruction set computer
(RISC) instruction set architecture (ISA) developed
by ARM Holdings. It was known as the Advanced
RISC Machine, and before that as the Acorn RISC
Machine. The relative simplicity of ARM processors
made them suitable for low power applications. This
has made them dominant in the mobile and
embedded electronics market, as relatively low cost,
and small microprocessors and microcontrollers. By
systematic maintenance it is possible to achieve
substantial savings in money, material and manpower
as every effort is directed towards avoiding
catastrophic failures
2.1 RISC Features
1. The ARM architecture includes the following
RISC features:
2. Load/store architecture.
3. No support for misaligned memory accesses
(now supported in ARMv6 cores, with some
exceptions related to load/store multiple word
instructions).
4. Uniform 16 × 32-bit register file.
5. Fixed instruction width of 32 bits to ease
decoding and pipelining, at the cost of decreased
code density. Later, "the Thumb instruction set"
increased code density.
6. Mostly single-cycle execution. To compensate
for the simpler design, compared with
contemporary processors like the Intel 80286 and
Motorola 68020, some additional design features
were used:
a. Conditional execution of most instructions,
reducing branch overhead and compensating
for the lack of a branch predictor.
b. Arithmetic instructions alter condition codes
only when desired.
c. 32-bit barrel shifter which can be used without
performance penalty with most arithmetic
instructions and address calculations.
d. Powerful indexed addressing modes.
e. A link register for fast leaf function calls.
f. Simple, but fast, 2-priority-level interrupts
subsystem with switched register banks.
2.1.1 Conditional Execution
The conditional execution feature (called
predication) is implemented with a 4-bitcondition
code selector (the predicate) on every instruction; one
of the four-bit codes is reserved as an "escape code"
to specify certain unconditional instructions, but
nearly all common instructions are conditional. Most
CPU architectures only have condition codes on
branch instructions. This cuts down significantly on
the encoding bits available for displacements in
memory access instructions, but on the other hand it
avoids branch instructions when generating code for
small if statements. One of the ways that Thumb code
provides a denser encoding is to remove that four bit
selector from non-branch instructions.
2.1.2 Instruction Set
To keep the design clean, simple and fast, the
original ARM implementation was hardwired without
microcode, like the much simpler 8-bit 6502
processor used in prior Acorn microcomputers.
2.1.3 Pipelines and other Implementation Issues
The ARM7 and earlier implementations have a
three stage pipeline; the stages being fetch, decode,
and execute. Higher performance designs, such as the
ARM9, have deeper pipelines: Cortex-A8 has
thirteen stages. Additional implementation changes
for higher performance include a faster adder, and
more extensive branch prediction logic.
2.1.4 Coprocessors
The architecture provides a non-intrusive way of
extending the instruction set using "coprocessors"
which can be addressed using MCR, MRC, MRRC,
MCRR, and similar instructions. The coprocessor
space is divided logically into 16 coprocessors with
numbers from 0 to 15, coprocessor 15 (cp15) being
reserved for some typical control functions like
managing the caches and MMU operation (on
processors that have one).In ARM-based machines,
peripheral devices are usually attached to the
processor by mapping their physical registers into
ARM memory space or into the coprocessor space or
connecting to another device (a bus) which in turn
attaches to the processor.
2.1.5 Debugging
All modern ARM processors include hardware
debugging facilities; without them, software
4. V.Sirisha Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 10, (Part - 2) October 2015, pp.33-39
www.ijera.com 36 | P a g e
debuggers could not perform basic operations like
halting, stepping, and break pointing of code starting
from reset.
2.1.6 Jazelle
Jazelle is a technique that allows Java Byte code
to be executed directly in the ARM architecture as a
third execution state (and instruction set) alongside
the existing ARM and Thumb-mode. Support for this
state is signified by the "J" in the
ARMv5TEJarchitecture, and in ARM9EJ-S and
ARM7EJ-S core names. Support for this state is
required starting in ARMv6 (except for the ARMv7-
M profile), although newer cores only include a
trivial implementation that provides no hardware
acceleration.
III. Embedded Web Server
If General web servers which were developed for
general-purpose computers such as NT servers or
UNIX and Linux workstations typically require
megabytes of memory, a fast processor, a Pre-
emptive multitasking operating system, and other
Resources. A web server can be embedded in a
device to Provide remote access to the device from a
web browser.
The embedded system can be utilized to serve
the embedded web documents, including static and
dynamic Information about embedded systems, to
web browsers.This type of web server is called an
Embedded Web Server.
Fig 3.1 Client-Server Architecture
An embedded web server is a microcontroller
that contains an Internet software suite as well as
application Code for monitoring and controlling
systems. Embedded Web servers are integral part of
an embedded network and Paves way for faster time
to market products. “Fig 3.1”. Shows the general-
purpose web server where, it requires a huge amount
of memory, special hardware, Software and an
operating system. An embedded web Server can
replace the “Fig 3.2” which is a single hardware With
an RTOS and the application.
Fig 3.2 Embedded Web Server Architecture
The web server is the Board that has the
application and the RTOS (μC/OS-II). The operating
system manages all the tasks such as sending the
HTML pages, connecting to new users etc.
The RTOS manages all the required tasks in
parallel, and in small amounts of time. Web based
management user Interfaces using embedded web
servers have many Advantages: ubiquity, user-
friendliness, low development Cost and high
maintainability. Embedded web servers have
different requirements, such as low resource usage,
High reliability, security and portability, for which
general Web server technologies are unsuitable.
There are also design issues such as HTTP and
embedded API.
3.1 The system diagram of Embedded Web server
The system structure of embedded Web server is
shown in figure 3.1. The entire system uses B/S
mode. The client PC is connected to the Internet
through a browser and then gets access to the
embedded Web server. Through this way, remote
login and operation are realized. Compared with the
traditional C/S mode, this mode is simple to use,
convenient to maintain, and easy to extend Figure
3.1(The system diagram of Embedded Web server).:
3.2 The choice of Embedded Web server
The embedded devices have limited resources
and don't need to handle the requests of many users
simultaneously. Therefore they do not need to use the
most commonly used Linux server Apache. Web
Server which is specifically designed for embedded
devices are applied in such case. This kind of Web
Server requires relatively small storage space and less
memory to run, which makes it quite suitable for
embedded applications. The typical embedded Web
server has three kinds, namely https, Boa and thttpd.
As the simplest Web server, https has the weakest
functions among the three. It does not support
authentication and CGI technology while Boa and
thttpd support these functions. If Web server only
provides some static Web pages such as simple
5. V.Sirisha Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 10, (Part - 2) October 2015, pp.33-39
www.ijera.com 37 | P a g e
online help and system Introduction, then a static
server can be adopted. If you need to improve system
security or interact with user Such as real-time status
query and landing, then you have to use dynamic
Web technologies.
Fig 3.3- EWS With External Ethernet Controller
In such situation Boa can achieve these goals.
This is vital important for embedded systems by
saving the maximum extent possible system
resources. Based on the above exposition, Boa
applied to the embedded platform has many
advantages. Therefore Boa is used as Web server .Its
architecture is showed in Fig.3.3 EWS with External
Ethernet Controller.In fig 3.4 - Architecture of boa
server, if you need to improve system security or
interact with users such as real-time status query and
landing, then you have to use dynamic Web
technologies. In such situation, either Boa or thttpd
can achieve these goals. In the present research, we
adopt Boa (the Web server) suitable for embedded
system, because thttpd has less function and needs far
more resources to run.
Fig 3.4 Architecture Of Boa Server
3.3 The principle of Embedded Web server Boa
Boa is a single task Web server. The difference
between Boa and traditional Web server is that when
a connection request arrives, Boa does not create a
separate process for each connection, nor handle
multiple connections by copying itself. Instead, Boa
handles multiple connections by establishing a list of
HTTP requests, but it only forks new process for CGI
program. In this way, the system resources are saved
to the largest extent. Like a common Web server, an
embedded web server can accomplish tasks such as
receiving requests from the client, analysing requests,
responding to those requests, and finally returning
results to the client. The following is its work
process.
1. Complete the initialization of the Web server,
such as creating an environment variable,
creating socket, binding port, listening to a port,
entering the loop, and waiting for connection
requests form a client. When there is a
connection request from a client, Web server is
responsible for receiving the request and saving
related information.
2. After receiving the connection request, Boa
analyses the request, calls analysis module, and
works out solutions, URL target, and information
of the list. At the same time, it processes the
request accordingly.
3. After the corresponding treatment is finished, the
Web server sends responses to the client browser
and then closes the TCP connection with the
client. For different request methods, the
embedded Web server Boa makes different
responses. If the request method is HEAD, the
response header will be sent to the browser. If
the request method is GET, in addition to
sending the response header, it will also read out
from the server the URL target file of the client
request and send it to the client browser. If the
request method is POST, the information of the
list will be sent to corresponding CGI program
and then take the information as a CGI parameter
to execute CGI program. Finally, the results will
be sent to client browser.
Fig 3.5 – Flow chart of Boa Server
IV. Hardware Design
S3C2440AL processor is used as core of the
hardware platform in this paper. Fig. 6 is the block
diagram of hardware system. Include: serial port,
Ethernet interface, JTAG port, storage systems and so
on. The frequency Samsung S3C2440AL is 400MHz
and can up to 533MHz in the maximum. According
6. V.Sirisha Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 10, (Part - 2) October 2015, pp.33-39
www.ijera.com 38 | P a g e
to its mode of internal circuit, 12 MHz chosen for the
crystal. JTAG (Joint Test Action Group) is an
international test protocol standard, software
simulation, single-step debug and u-boot download
can be carried out through the JTAG port, it's a
simple and efficient means of developing and
debugging embedded systems. The SDRAM capacity
in the system is 64MB, working voltage is 3.3V, data
bus is 32-bit, clock frequency up to100MHz, Auto-
Refresh and Self-Refresh are both supported.
Fig 4-Block Diagram of Hardware Design
V. Software Desgin
Software development process based OS
includes: the establishment of cross-compiler, the
transplant of Boot loader, the transplant of embedded
Linux, the development embedded Web server. To
begin with, system cross-compiler environment using
EABI-4.3.3 is established.uboot that developed by
the German DEXN group is used as Boot loader. The
function of Boot loader is to initialize the hardware
devices, establish memory mapping tables, thus
establish appropriate hardware and software
environment and prepare for the final call to the
operating system kernel. Besides, yaffs file system is
made.
Linux is used as operating system because Linux
system is a hierarchical structure and completely
open its kernel source, the important feature of Linux
is portability to support a wide range of hardware
platforms, can run in most of the architecture.
Contains a comprehensive set of editing, debugging
and other development tools, graphical interface, a
powerful network supporting and rich applications. In
addition, the kernel can be reduced by configuring.
VI. Conclusion
When the case of monitoring multiple
parameters comes, the EWS with integrated Ethernet
is showing better performance when speed and
reliability comes into picture. Thus EWS with
integrated Ethernet is suitable for real-time
monitoring of Industrial appliances. Moreover this
system has a wide variety of Industrial applications
such as remote monitoring and controlling etc. Since
ARM processor has fast execution capability and
Ethernet standard can provide internet access with
reasonable speed and this system is suitable for
enhancing security in industrial conditions by
remotely monitoring various industrial appliances
where high safety and care is a necessity. Finally, this
system will be useful for a wide variety of industrial
applications.
VII. Future Scope
This system can be extended with new web
servers and by using Raspberry Pi and many
applications can be developed.
REFERENCES
[1] Alen Rajan, Aby K. Thomas, “ARM Based
Embedded Web Server for Industrial
Applications”, International Conference on
Computing and Control Engineering
(ICCCE 2012), 12 & 13 April, 2012.
[2] Alen Rajan, Aby K. Thomas, Rejin Mathew,
“A Comparative Performance Analysis of
ARM based Web Servers with Integrated
and External Ethernet Interfaces for
Industrial Applications”, International
Journal of Computer Applications(IJCA
0975 – 8887) Volume 44– No.21, April
2012.
[3] Li Yanhong, Li Shuliang, “Based on the
ARM and PID Control Free Pendulum
Balance System”, 2012 International
Workshop on Information and Electronics
Engineering (IWIEE), Procedia Engineering
29 (2012) 3491 – 3495.
[4] Mohd Ashiq Kamaril Yusoff, Reza Ezuan
Samin, Babul Salam Kader Ibrahim,
“Wireless Mobile Robotic Arm”,
International Symposium on Robotics and
Intelligent Sensors 2012 (IRIS 2012),
Procedia Engineering 41 ( 2012 ) 1072 –
1078.
[5] Mohd Aliffa, Shujiro Dohtaa, Tetsuya
Akagia, Hui Lia, “Development of a simple-
structured pneumatic robot arm and its
control using low-cost embedded
controller”, International Symposium on
Robotics and Intelligent Sensors 2012 (IRIS
2012), Procedia Engineering 41 ( 2012 ) 134
– 142.
[6] V.Billy Rakesh Roy, Sanket Dessai, and S.
G.Shiva Prasad Yadav;” Design and
Development of ARM Processor Based Web
Server,” International Journal of Recent
Trends in Engineering(IJRET), Vol. 1, No.
4, May 2009
[7] Mohd Ashiq Kamaril Yusoff, Reza Ezuan
Samin, Babul Salam Kader Ibrahim;”
Wireless Mobile Robotic Arm,” International
7. V.Sirisha Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 10, (Part - 2) October 2015, pp.33-39
www.ijera.com 39 | P a g e
Symposium on Robotics and Intelligent
Sensors 2012 (IRIS 2012)
[8] Junhua Yang; Zhien Shang and Tao Xing,
“Intelligence Monitoring System Based on
ARM and Information Fusion,” (IEEE)
International Conference on Electric
Information and Control Engineering,
pp.487-490, April 2011.
[9] K.Bharath reddy, Ch. Rajendra Prasad; “The
Embedded Web server based Electrical
Ethernet Monitoring system using ARM,”
International Journal of Advanced Research
in Computer and Communication
Engineering,Vol. 2, Issue 5, May 2013
[10] Vaishak N. L, C.G. Ram Chandra;
“Embedded Robot Control System Based On
an Embedded Operating System, the
Combination of Advanced RISC
Microprocessor (ARM), DSP and ARM
Linux, “International Journal of Engineering
and Innovative Technology (IJEIT) Vol. 2,
Issue 6, December 2012.