The document is a project report submitted by four students at MIT College of Engineering in Pune for their Bachelor of Engineering degree. The project is called WiPAt, which stands for WiFi Positioning System for Attendance. The report describes developing a system that will automate the process of marking student attendance in a college by using the WiFi positioning capabilities of mobile devices and routers located throughout the campus. The system aims to reduce the time and effort required for manual attendance marking by faculty. The report includes sections on related work done in the area of WiFi positioning systems, the goals and technologies used in developing the WiPAt system, design documents for the system, and code snippets from the implementation.
IRJET- Design and Implementation 4G Scenario on Qualnet 5.0.2IRJET Journal
This document discusses the design and implementation of a 4G network scenario using the QualNet network simulator. The authors created a virtual 4G network model in QualNet comprising of nodes such as routers, access points, and mobile phones connected by links like LAN segments and LTE connections. They simulated the behavior of the network under different operating scenarios and traffic patterns. The results of simulating Constant Bit Rate traffic showed a total of 12.5 MB of data sent, 24 packets transmitted, and a throughput of 4.4 Mbps. The authors concluded that QualNet is useful for network design, protocol research, and analysis of wireless applications but has some disadvantages like difficulty of installation on Linux. They proposed future work involving designing new protocol
IRJET- Internet Video Streaming Service for Social NetworkIRJET Journal
This document presents a system for internet video streaming service for social networks. It aims to improve quality of service for video streaming on mobile devices by developing an adaptive streaming method using a Markov Decision Process. The system uses Dynamic Adaptive Streaming over HTTP (DASH) to store multiple compressed video versions at different resolutions and qualities in segments. It formulates the multi-link video streaming as a reinforcement learning task and models it as a finite state Markov Decision Process. An algorithm is proposed to find near-optimal solutions in real-time to select the best video quality based on factors like bandwidth, buffer occupancy, and device resolution to improve streaming performance metrics while saving network bandwidth and costs. The system was tested using an Android emulator and Scalable Video
INVESTIGATION OF BEAM FORMING EFFECTIVENESS IN IEEE802.11AC INDOOR WIRELESS L...cscpconf
The strong demand for large capacity transmission due to an unprecedented growth in data traffic requires an enhancement in the quality of service in the medium access control. This
quality delivery features strongly in the IEEE802.11ac standard. Here, we have performed empirical measurements of an 802.11ac system based on the beam forming technology. In this
work, an empirical analysis was conducted to determine the effectiveness of Beamforming Technology as depicts in the quality of service (QoS) enhancement in the newest wireless
technology deployed on IEEE802.11ac standard. The experimental outcomes revealed the quality of service (QoS) enhancement in IEEE802.11ac. Although the realized throughput in real application scenario fell below designed specification. Nevertheless there is a considerable
data throughput improvement on the counterpart 802.11n. There remain opportunities for further enhancements in beam-forming technology.
High precision location tracking technology in ir4.0Journal Papers
1) The document discusses deploying an Ultra-Wideband (UWB) indoor positioning system (IPS) in a manufacturing factory for high-precision location tracking as part of Industry 4.0 initiatives.
2) Key challenges in deploying UWB IPS in a factory environment include radio signal reflections off metal surfaces, ensuring line-of-sight between tags and sensors, and strategic sensor placement and tag wearing.
3) Techniques to improve positioning accuracy include implementing Kalman filtering on position data and considering factors like tag placement, sensor density, and signal obstructions. The UWB IPS framework incorporates hardware, positioning algorithms, and a dashboard interface.
Implementation of vehicle ventilation system using node mcu esp8266 for remot...Journal Papers
This document summarizes an implementation of a vehicle ventilation system using a NodeMCU microcontroller as an Internet of Things platform. Temperature and rain sensors connected to the microcontroller collect data on vehicle conditions. A mobile application allows users to remotely monitor sensor readings and control vehicle accessories like windows and fans. Test results found that activating the ventilation system reduced average vehicle temperature by up to 12.4 degrees Celsius. The system provides a low-cost solution for remote monitoring of vehicle temperature.
This document reviews the Security and QoS Aware Dynamic Clustering (SQADC) Routing protocol for cognitive radio networks (CRNs). It first discusses existing routing protocols for CRNs and identifies gaps, including that most focus on improving quality of service but few address security issues. It then outlines the objectives of designing a new routing protocol to achieve a tradeoff between QoS performance and security performance for CRNs. The proposed SQADC protocol will use dynamic clustering based on ant colony optimization for cluster head selection and re-clustering to optimize spectrum allocation and quality of service while introducing a lightweight trust-based mechanism for detecting malicious nodes.
IRJET- Automated Detection of Diabetic Retinopathy using Compressed SensingIRJET Journal
This document describes a proposed method for automated detection of diabetic retinopathy using compressed sensing. It begins with an abstract that outlines the goal of identifying retinal diseases like diabetic retinopathy using image processing techniques. It then provides details on the proposed method, which involves preprocessing retinal images through steps like color conversion, filtering, and morphological operations. Features are then extracted using compressed sensing before classification of diabetic retinopathy. The method aims to allow early detection of retinal diseases to minimize vision damage.
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...IJERA Editor
The cloud computing has increased in many organizations. It provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may be untrusted. In this project we propose anIntrusion Detection and Countermeasure in Virtual Network Systems mechanism called NICE to prevent vulnerable virtual machines from being compromised in the cloud. NICE detects and mitigates collaborative attacks in the cloud virtual networking environment. The system performance evaluation demonstrates the feasibility of NICE and shows that the proposed solution can significantly reduce the risk of the cloud system from being exploited and abused by internal and external attackers.
IRJET- Design and Implementation 4G Scenario on Qualnet 5.0.2IRJET Journal
This document discusses the design and implementation of a 4G network scenario using the QualNet network simulator. The authors created a virtual 4G network model in QualNet comprising of nodes such as routers, access points, and mobile phones connected by links like LAN segments and LTE connections. They simulated the behavior of the network under different operating scenarios and traffic patterns. The results of simulating Constant Bit Rate traffic showed a total of 12.5 MB of data sent, 24 packets transmitted, and a throughput of 4.4 Mbps. The authors concluded that QualNet is useful for network design, protocol research, and analysis of wireless applications but has some disadvantages like difficulty of installation on Linux. They proposed future work involving designing new protocol
IRJET- Internet Video Streaming Service for Social NetworkIRJET Journal
This document presents a system for internet video streaming service for social networks. It aims to improve quality of service for video streaming on mobile devices by developing an adaptive streaming method using a Markov Decision Process. The system uses Dynamic Adaptive Streaming over HTTP (DASH) to store multiple compressed video versions at different resolutions and qualities in segments. It formulates the multi-link video streaming as a reinforcement learning task and models it as a finite state Markov Decision Process. An algorithm is proposed to find near-optimal solutions in real-time to select the best video quality based on factors like bandwidth, buffer occupancy, and device resolution to improve streaming performance metrics while saving network bandwidth and costs. The system was tested using an Android emulator and Scalable Video
INVESTIGATION OF BEAM FORMING EFFECTIVENESS IN IEEE802.11AC INDOOR WIRELESS L...cscpconf
The strong demand for large capacity transmission due to an unprecedented growth in data traffic requires an enhancement in the quality of service in the medium access control. This
quality delivery features strongly in the IEEE802.11ac standard. Here, we have performed empirical measurements of an 802.11ac system based on the beam forming technology. In this
work, an empirical analysis was conducted to determine the effectiveness of Beamforming Technology as depicts in the quality of service (QoS) enhancement in the newest wireless
technology deployed on IEEE802.11ac standard. The experimental outcomes revealed the quality of service (QoS) enhancement in IEEE802.11ac. Although the realized throughput in real application scenario fell below designed specification. Nevertheless there is a considerable
data throughput improvement on the counterpart 802.11n. There remain opportunities for further enhancements in beam-forming technology.
High precision location tracking technology in ir4.0Journal Papers
1) The document discusses deploying an Ultra-Wideband (UWB) indoor positioning system (IPS) in a manufacturing factory for high-precision location tracking as part of Industry 4.0 initiatives.
2) Key challenges in deploying UWB IPS in a factory environment include radio signal reflections off metal surfaces, ensuring line-of-sight between tags and sensors, and strategic sensor placement and tag wearing.
3) Techniques to improve positioning accuracy include implementing Kalman filtering on position data and considering factors like tag placement, sensor density, and signal obstructions. The UWB IPS framework incorporates hardware, positioning algorithms, and a dashboard interface.
Implementation of vehicle ventilation system using node mcu esp8266 for remot...Journal Papers
This document summarizes an implementation of a vehicle ventilation system using a NodeMCU microcontroller as an Internet of Things platform. Temperature and rain sensors connected to the microcontroller collect data on vehicle conditions. A mobile application allows users to remotely monitor sensor readings and control vehicle accessories like windows and fans. Test results found that activating the ventilation system reduced average vehicle temperature by up to 12.4 degrees Celsius. The system provides a low-cost solution for remote monitoring of vehicle temperature.
This document reviews the Security and QoS Aware Dynamic Clustering (SQADC) Routing protocol for cognitive radio networks (CRNs). It first discusses existing routing protocols for CRNs and identifies gaps, including that most focus on improving quality of service but few address security issues. It then outlines the objectives of designing a new routing protocol to achieve a tradeoff between QoS performance and security performance for CRNs. The proposed SQADC protocol will use dynamic clustering based on ant colony optimization for cluster head selection and re-clustering to optimize spectrum allocation and quality of service while introducing a lightweight trust-based mechanism for detecting malicious nodes.
IRJET- Automated Detection of Diabetic Retinopathy using Compressed SensingIRJET Journal
This document describes a proposed method for automated detection of diabetic retinopathy using compressed sensing. It begins with an abstract that outlines the goal of identifying retinal diseases like diabetic retinopathy using image processing techniques. It then provides details on the proposed method, which involves preprocessing retinal images through steps like color conversion, filtering, and morphological operations. Features are then extracted using compressed sensing before classification of diabetic retinopathy. The method aims to allow early detection of retinal diseases to minimize vision damage.
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...IJERA Editor
The cloud computing has increased in many organizations. It provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may be untrusted. In this project we propose anIntrusion Detection and Countermeasure in Virtual Network Systems mechanism called NICE to prevent vulnerable virtual machines from being compromised in the cloud. NICE detects and mitigates collaborative attacks in the cloud virtual networking environment. The system performance evaluation demonstrates the feasibility of NICE and shows that the proposed solution can significantly reduce the risk of the cloud system from being exploited and abused by internal and external attackers.
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
Using mobile and Internet of Things (IoT) applications is becoming very popular and obtained researchers’ interest and commercial investment, in order to fulfill future vision and the requirements for smart cities. These applications have common demands such as fast response, distributed nature, and awareness of service location. However, these requirements’ nature cannot be satisfied by central systems services that reside in the clouds. Therefore, edge computing paradigm has emerged to satisfy such demands, by providing an extension for cloud resources at the network edge, and consequently, they become closer to end-user devices. In this paper, exploiting edge resources is studied; therefore, a cooperative-hierarchical approach for executing the pre-partitioned applications’ modules between edges resources is proposed, in order to reduce traffic between the network core and the cloud, where this proposed approach has a polynomial-time complexity. Furthermore, edge computing increases the efficiency of providing services, and improves end-user experience. To validate our proposed cooperative-hierarchical approach for modules placement between edge nodes’ resources, iFogSim toolkit is used. The obtained simulation results show that the proposed approach reduces network’s load and the total delay compared to a baseline approach for modules’ placement, moreover, it increases the network’s overall throughput.
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoTIRJET Journal
This document proposes an energy efficient technique (ETREC) to reduce energy consumption in Internet of Things (IoT) networks based on packet size. It summarizes existing energy efficient routing protocols for IoT and identifies energy consumption as a key issue. The proposed ETREC technique selects the path with the minimum packet size from among available paths between a source and destination. It classifies paths as low, medium or maximum based on packet size and prioritizes forwarding along low packet size paths to minimize energy consumption. Simulation results using the Network Simulator 2 tool demonstrate that ETREC reduces energy consumption compared to existing techniques.
Vinay Kumar Boini is pursuing an M.Tech in Communication Engineering at IIT Guwahati with a CGPA of 8.0. His areas of research include modeling of photoconductive antennas for terahertz communication and he has worked on CAN-based distributed control systems. He is proficient in programming languages like C/C++ and tools like MATLAB. He was head of the membership development committee of the IIT Guwahati IEEE student branch and organized several workshops.
This document is a dissertation submitted for a Master of Technology degree in Electronics and Communication Engineering. The dissertation compares wavelet packet based multi-carrier code division multiple access (WP-MC-CDMA) to conventional MC-CDMA using the Hilbert-Huang transform tool. The dissertation was submitted by Manmohan Singh Chandoliya to his supervisor Mrs. Archana Mewara at Yagyavalkya Institute of Technology in Jaipur, India in August 2019 to fulfill the requirements for a Master's degree from Rajasthan Technical University.
This document is a dissertation submitted for a Master of Technology degree in Electronics and Communication Engineering with a specialization in Digital Communication. The dissertation compares wavelet packet based multi-carrier code division multiple access (WP-MC-CDMA) to conventional MC-CDMA using the Hilbert-Huang transform tool. The dissertation was submitted by Manmohan Singh Chandoliya to his supervisor Mrs. Archana Mewara of the Department of Electronics and Communication Engineering at Yagyavalkya Institute of Technology in Jaipur, India in August 2019.
This document is a dissertation submitted for a Master of Technology degree in Electronics and Communication Engineering. The dissertation compares wavelet packet based multi-carrier code division multiple access (WP-MC-CDMA) to conventional MC-CDMA using the Hilbert-Huang transform tool. The dissertation was submitted by Manmohan Singh Chandoliya to his supervisor Mrs. Archana Mewara at Yagyavalkya Institute of Technology in Jaipur, India in August 2019 to fulfill the requirements for a Master's degree from Rajasthan Technical University.
This document is a dissertation submitted for a Master of Technology degree in Electronics and Communication Engineering. The dissertation compares wavelet packet based multi-carrier code division multiple access (WP-MC-CDMA) to conventional MC-CDMA using the Hilbert-Huang transform tool. The dissertation was submitted by Manmohan Singh Chandoliya to his supervisor Mrs. Archana Mewara at Yagyavalkya Institute of Technology in Jaipur, India in August 2019 to fulfill the requirements for a Master's degree from Rajasthan Technical University.
This document outlines the education, projects, certifications, computer skills, achievements, internship experience, and personal details of Anwar Ul Islam. He received a B.E. in Telecommunication from Hamdard University with a CGPA of 3.03. His projects include a WSN-based intelligent helmet for coal miners and various microcontroller and electronics projects. He is certified in CCNA Routing and Switching and has taken online courses in computer networks and wireless sensor networks.
The document summarizes a PhD student's research proposal on developing an energy-efficient routing protocol for wireless sensor networks. It outlines the objectives to compute high-energy forwarding paths, find non-congested nodes, and determine sink mobility. It then reviews related work on routing protocols and identifies gaps regarding energy and buffer residual status. The literature review covers 18 publications and their applications and limitations. Finally, it provides an outline of the proposed methodology, models, conclusions and future work.
Sharmila Subhash Patil is currently pursuing an M.Tech in Communication Engineering from VIT Vellore with a specialization in wireless communication and networking, RF, and antenna design. She has a B.E. in Electronics and Telecommunication from RIT Sakharale. She has experience with simulation software like MATLAB, OptiSystem, and CST Microwave Studio. She is looking for an internship and has experience with projects in visible light communication, LTE scheduling algorithms, wearable antennas, and reconfigurable power amplifiers.
Review Paper on Design of A Coplanar Integrated Microstrip Antenna for ITS Ap...IRJET Journal
This document summarizes the design of a novel coplanar integrated microstrip antenna for intelligent transportation system (ITS) applications. The proposed antenna design uses a square patch and square-ring patch on a single dielectric layer to operate at 5.8 GHz for ITS. A coaxial probe feed is placed at the center of the square patch for vertical polarization. The square ring is used to load the square patch to improve impedance matching and bandwidth. Simulation results show the design has good impedance matching and provides an omnidirectional vertically polarized radiation pattern suitable for ITS. The single layer design is compact and low cost compared to previous dual-feed designs.
This document provides an overview of internet challenges in Iraq and potential solutions. It discusses Iraq's current internet infrastructure problems like outdated laws, poor backbone infrastructure, high bandwidth costs and few provider options. This results in low internet speeds and subscription rates. Technical solutions proposed include using licensed frequencies for fixed wireless access to increase speeds and ranges, and expanding wired fiber optic networks. The document also examines Iraq's autonomous system number which controls internet traffic flows and major providers. It recommends Iraq take steps to better control bandwidth, protect against cyberattacks, offer secure infrastructure and build internet exchange points to optimize local traffic.
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...IRJET Journal
This document proposes a cross-layer commit protocol for sensor data aggregation in smart cities. It implements query-based data aggregation using the network and application layers. The application layer initiates queries that are sent to sensor nodes. Nodes that can provide the requested data reply to form clusters. The node with the highest residual energy and closest average distance to members is selected as cluster head. As cluster head, it collects and aggregates data from members and sends it to the sink node. This approach reduces energy consumption compared to other data aggregation methods. A prototype was created to test the protocol for applications like garbage monitoring and weather sensing.
IRJET- Research on Dynamic Spectrum AllocationIRJET Journal
This document summarizes research on dynamic spectrum allocation using cognitive radio. It first provides background on the increasing interference in wireless networks due to the growing number of devices operating in unlicensed bands like the ISM band. It then introduces cognitive radio as a potential solution, which can detect available channels and adapt transmission accordingly to allow more concurrent devices. It discusses the main challenges for cognitive radios in not interfering with licensed users. The document reviews several papers on related topics like online spectrum allocation algorithms and surveys of spectrum management techniques. It also describes common spectrum sensing methods used by cognitive radios to detect spectrum holes like matched filtering, cyclostationary detection, and energy detection. Results are presented on performance metrics like end-to-end delay
The document presents the results of a survey about understanding and use of wireless technology. It finds that half of participants have an excellent understanding of wireless technology gained mostly through school and the internet. Television and phones are the most frequently used wireless devices. While most feel wireless technology benefits business, some are concerned about privacy and reduced face-to-face communication. Issues like unstable wifi and inaccurate location services were also cited. The document concludes that exposure to wireless technology positively correlates with understanding, and that further improvements could address user inconveniences.
Provisioning Quality of Service of Wireless Telemedicine for E-health Services Mustafa Algaet
This document discusses provisioning quality of service (QoS) for wireless telemedicine and e-health services. It proposes developing a mobile telemedicine system using existing infrastructure to expand telemedicine's reach. The system would use off-the-shelf hardware, standard cellular networks, and novel technologies to intelligently encode and distribute video over available wireless networks and degrade gracefully with disruptions. It reviews existing QoS solutions and proposes new methods to improve QoS for wireless telemedicine, to be tested in real networks.
This document summarizes a thesis on designing a secure wireless enterprise network architecture for the Department of Defense. The thesis analyzed requirements for confidentiality, integrity and availability from DoD security directives. It also examined the built-in security mechanisms of the IEEE 802.11 wireless networking standard, including Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and 802.11i. To meet DoD requirements, the thesis proposed a defense-in-depth architecture with: 1) a segregated and secured wired network, 2) wireless infrastructure outside the wired network perimeter, and 3) end-to-end security extending from the wired to wireless networks. It also explored additional security techniques like virtual private
9 Aab32 Dd Bdb9 137 E Ca2184 F057753212 154710guestbd2263
The document proposes a new scheme for secure communication in fiber optic systems using broadband optical noise. In the scheme, Alice and Bob receive identical replicas of a truly random broadband optical noise signal. They extract identical random binary sequences from the noise to use as an encryption key. The key is distributed through the use of identical optical scramblers by Alice and Bob, whose structures are not known to an eavesdropper Eve. The scheme allows for high data rates like conventional fiber systems and can be integrated into existing infrastructure.
IRJET- Internet Video Streaming Service for Social NetworkIRJET Journal
This document proposes an internet video streaming service for social networks that uses dynamic adaptive streaming over HTTP (DASH) and Markov decision processes (MDPs) to optimize quality of service for video streaming on mobile devices. It develops an MDP model to choose the most favorable video streaming method across multiple wireless networks in order to improve startup latency, playback fluency, average playback quality, playback smoothness, and wireless data cost. The system was tested using an Android emulator and scalable video coding to provide an efficient, adaptive streaming service for various mobile devices and dynamic network environments.
A genetic based indoor positioning algorithm using Wi-Fi received signal stre...IAESIJAI
The recent trend in location-based services has led to a proliferation of studies in indoor positioning technology. Wi-Fi received signal strength indicator (RSSI) Fingerprinting and pedestrian dead reckoning (PDR) are the two best representatives from both approaches. This research proposed a genetic algorithm to combine Wi-Fi Fingerprinting and PDR. By taking advantage of PDR and genetic algorithm, we only need to collect a limited number of points for the fingerprint dataset with known coordinates, then target trajectories' position can be estimated with high accuracy. Results from our experiments and simulations have shown that even in the scenario of noisy inertial measurement unit (IMU) sensors data, using RSSI measurements and the coordinate of 8 points, our proposed method was able to achieve 1.589 meters of average distance error which is 34.4 percent lower than the conventional Fingerprinting method.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
Using mobile and Internet of Things (IoT) applications is becoming very popular and obtained researchers’ interest and commercial investment, in order to fulfill future vision and the requirements for smart cities. These applications have common demands such as fast response, distributed nature, and awareness of service location. However, these requirements’ nature cannot be satisfied by central systems services that reside in the clouds. Therefore, edge computing paradigm has emerged to satisfy such demands, by providing an extension for cloud resources at the network edge, and consequently, they become closer to end-user devices. In this paper, exploiting edge resources is studied; therefore, a cooperative-hierarchical approach for executing the pre-partitioned applications’ modules between edges resources is proposed, in order to reduce traffic between the network core and the cloud, where this proposed approach has a polynomial-time complexity. Furthermore, edge computing increases the efficiency of providing services, and improves end-user experience. To validate our proposed cooperative-hierarchical approach for modules placement between edge nodes’ resources, iFogSim toolkit is used. The obtained simulation results show that the proposed approach reduces network’s load and the total delay compared to a baseline approach for modules’ placement, moreover, it increases the network’s overall throughput.
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoTIRJET Journal
This document proposes an energy efficient technique (ETREC) to reduce energy consumption in Internet of Things (IoT) networks based on packet size. It summarizes existing energy efficient routing protocols for IoT and identifies energy consumption as a key issue. The proposed ETREC technique selects the path with the minimum packet size from among available paths between a source and destination. It classifies paths as low, medium or maximum based on packet size and prioritizes forwarding along low packet size paths to minimize energy consumption. Simulation results using the Network Simulator 2 tool demonstrate that ETREC reduces energy consumption compared to existing techniques.
Vinay Kumar Boini is pursuing an M.Tech in Communication Engineering at IIT Guwahati with a CGPA of 8.0. His areas of research include modeling of photoconductive antennas for terahertz communication and he has worked on CAN-based distributed control systems. He is proficient in programming languages like C/C++ and tools like MATLAB. He was head of the membership development committee of the IIT Guwahati IEEE student branch and organized several workshops.
This document is a dissertation submitted for a Master of Technology degree in Electronics and Communication Engineering. The dissertation compares wavelet packet based multi-carrier code division multiple access (WP-MC-CDMA) to conventional MC-CDMA using the Hilbert-Huang transform tool. The dissertation was submitted by Manmohan Singh Chandoliya to his supervisor Mrs. Archana Mewara at Yagyavalkya Institute of Technology in Jaipur, India in August 2019 to fulfill the requirements for a Master's degree from Rajasthan Technical University.
This document is a dissertation submitted for a Master of Technology degree in Electronics and Communication Engineering with a specialization in Digital Communication. The dissertation compares wavelet packet based multi-carrier code division multiple access (WP-MC-CDMA) to conventional MC-CDMA using the Hilbert-Huang transform tool. The dissertation was submitted by Manmohan Singh Chandoliya to his supervisor Mrs. Archana Mewara of the Department of Electronics and Communication Engineering at Yagyavalkya Institute of Technology in Jaipur, India in August 2019.
This document is a dissertation submitted for a Master of Technology degree in Electronics and Communication Engineering. The dissertation compares wavelet packet based multi-carrier code division multiple access (WP-MC-CDMA) to conventional MC-CDMA using the Hilbert-Huang transform tool. The dissertation was submitted by Manmohan Singh Chandoliya to his supervisor Mrs. Archana Mewara at Yagyavalkya Institute of Technology in Jaipur, India in August 2019 to fulfill the requirements for a Master's degree from Rajasthan Technical University.
This document is a dissertation submitted for a Master of Technology degree in Electronics and Communication Engineering. The dissertation compares wavelet packet based multi-carrier code division multiple access (WP-MC-CDMA) to conventional MC-CDMA using the Hilbert-Huang transform tool. The dissertation was submitted by Manmohan Singh Chandoliya to his supervisor Mrs. Archana Mewara at Yagyavalkya Institute of Technology in Jaipur, India in August 2019 to fulfill the requirements for a Master's degree from Rajasthan Technical University.
This document outlines the education, projects, certifications, computer skills, achievements, internship experience, and personal details of Anwar Ul Islam. He received a B.E. in Telecommunication from Hamdard University with a CGPA of 3.03. His projects include a WSN-based intelligent helmet for coal miners and various microcontroller and electronics projects. He is certified in CCNA Routing and Switching and has taken online courses in computer networks and wireless sensor networks.
The document summarizes a PhD student's research proposal on developing an energy-efficient routing protocol for wireless sensor networks. It outlines the objectives to compute high-energy forwarding paths, find non-congested nodes, and determine sink mobility. It then reviews related work on routing protocols and identifies gaps regarding energy and buffer residual status. The literature review covers 18 publications and their applications and limitations. Finally, it provides an outline of the proposed methodology, models, conclusions and future work.
Sharmila Subhash Patil is currently pursuing an M.Tech in Communication Engineering from VIT Vellore with a specialization in wireless communication and networking, RF, and antenna design. She has a B.E. in Electronics and Telecommunication from RIT Sakharale. She has experience with simulation software like MATLAB, OptiSystem, and CST Microwave Studio. She is looking for an internship and has experience with projects in visible light communication, LTE scheduling algorithms, wearable antennas, and reconfigurable power amplifiers.
Review Paper on Design of A Coplanar Integrated Microstrip Antenna for ITS Ap...IRJET Journal
This document summarizes the design of a novel coplanar integrated microstrip antenna for intelligent transportation system (ITS) applications. The proposed antenna design uses a square patch and square-ring patch on a single dielectric layer to operate at 5.8 GHz for ITS. A coaxial probe feed is placed at the center of the square patch for vertical polarization. The square ring is used to load the square patch to improve impedance matching and bandwidth. Simulation results show the design has good impedance matching and provides an omnidirectional vertically polarized radiation pattern suitable for ITS. The single layer design is compact and low cost compared to previous dual-feed designs.
This document provides an overview of internet challenges in Iraq and potential solutions. It discusses Iraq's current internet infrastructure problems like outdated laws, poor backbone infrastructure, high bandwidth costs and few provider options. This results in low internet speeds and subscription rates. Technical solutions proposed include using licensed frequencies for fixed wireless access to increase speeds and ranges, and expanding wired fiber optic networks. The document also examines Iraq's autonomous system number which controls internet traffic flows and major providers. It recommends Iraq take steps to better control bandwidth, protect against cyberattacks, offer secure infrastructure and build internet exchange points to optimize local traffic.
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...IRJET Journal
This document proposes a cross-layer commit protocol for sensor data aggregation in smart cities. It implements query-based data aggregation using the network and application layers. The application layer initiates queries that are sent to sensor nodes. Nodes that can provide the requested data reply to form clusters. The node with the highest residual energy and closest average distance to members is selected as cluster head. As cluster head, it collects and aggregates data from members and sends it to the sink node. This approach reduces energy consumption compared to other data aggregation methods. A prototype was created to test the protocol for applications like garbage monitoring and weather sensing.
IRJET- Research on Dynamic Spectrum AllocationIRJET Journal
This document summarizes research on dynamic spectrum allocation using cognitive radio. It first provides background on the increasing interference in wireless networks due to the growing number of devices operating in unlicensed bands like the ISM band. It then introduces cognitive radio as a potential solution, which can detect available channels and adapt transmission accordingly to allow more concurrent devices. It discusses the main challenges for cognitive radios in not interfering with licensed users. The document reviews several papers on related topics like online spectrum allocation algorithms and surveys of spectrum management techniques. It also describes common spectrum sensing methods used by cognitive radios to detect spectrum holes like matched filtering, cyclostationary detection, and energy detection. Results are presented on performance metrics like end-to-end delay
The document presents the results of a survey about understanding and use of wireless technology. It finds that half of participants have an excellent understanding of wireless technology gained mostly through school and the internet. Television and phones are the most frequently used wireless devices. While most feel wireless technology benefits business, some are concerned about privacy and reduced face-to-face communication. Issues like unstable wifi and inaccurate location services were also cited. The document concludes that exposure to wireless technology positively correlates with understanding, and that further improvements could address user inconveniences.
Provisioning Quality of Service of Wireless Telemedicine for E-health Services Mustafa Algaet
This document discusses provisioning quality of service (QoS) for wireless telemedicine and e-health services. It proposes developing a mobile telemedicine system using existing infrastructure to expand telemedicine's reach. The system would use off-the-shelf hardware, standard cellular networks, and novel technologies to intelligently encode and distribute video over available wireless networks and degrade gracefully with disruptions. It reviews existing QoS solutions and proposes new methods to improve QoS for wireless telemedicine, to be tested in real networks.
This document summarizes a thesis on designing a secure wireless enterprise network architecture for the Department of Defense. The thesis analyzed requirements for confidentiality, integrity and availability from DoD security directives. It also examined the built-in security mechanisms of the IEEE 802.11 wireless networking standard, including Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and 802.11i. To meet DoD requirements, the thesis proposed a defense-in-depth architecture with: 1) a segregated and secured wired network, 2) wireless infrastructure outside the wired network perimeter, and 3) end-to-end security extending from the wired to wireless networks. It also explored additional security techniques like virtual private
9 Aab32 Dd Bdb9 137 E Ca2184 F057753212 154710guestbd2263
The document proposes a new scheme for secure communication in fiber optic systems using broadband optical noise. In the scheme, Alice and Bob receive identical replicas of a truly random broadband optical noise signal. They extract identical random binary sequences from the noise to use as an encryption key. The key is distributed through the use of identical optical scramblers by Alice and Bob, whose structures are not known to an eavesdropper Eve. The scheme allows for high data rates like conventional fiber systems and can be integrated into existing infrastructure.
IRJET- Internet Video Streaming Service for Social NetworkIRJET Journal
This document proposes an internet video streaming service for social networks that uses dynamic adaptive streaming over HTTP (DASH) and Markov decision processes (MDPs) to optimize quality of service for video streaming on mobile devices. It develops an MDP model to choose the most favorable video streaming method across multiple wireless networks in order to improve startup latency, playback fluency, average playback quality, playback smoothness, and wireless data cost. The system was tested using an Android emulator and scalable video coding to provide an efficient, adaptive streaming service for various mobile devices and dynamic network environments.
A genetic based indoor positioning algorithm using Wi-Fi received signal stre...IAESIJAI
The recent trend in location-based services has led to a proliferation of studies in indoor positioning technology. Wi-Fi received signal strength indicator (RSSI) Fingerprinting and pedestrian dead reckoning (PDR) are the two best representatives from both approaches. This research proposed a genetic algorithm to combine Wi-Fi Fingerprinting and PDR. By taking advantage of PDR and genetic algorithm, we only need to collect a limited number of points for the fingerprint dataset with known coordinates, then target trajectories' position can be estimated with high accuracy. Results from our experiments and simulations have shown that even in the scenario of noisy inertial measurement unit (IMU) sensors data, using RSSI measurements and the coordinate of 8 points, our proposed method was able to achieve 1.589 meters of average distance error which is 34.4 percent lower than the conventional Fingerprinting method.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Wi-Fi fingerprinting-based floor detection using adaptive scaling and weighte...CSITiaesprime
In practical applications, accurate floor determination in multi-building/floor environments is particularly useful and plays an increasingly crucial role in the performance of location-based services. An accurate and robust building and floor detection can reduce the location search space and ameliorate the positioning and wayfinding accuracy. As an efficient solution, this paper proposes a floor identification method that exploits statistical properties of wireless access point propagated signals to exponent received signal strength (RSS) in the radio map. Then, using single-layer extreme learning machine-weighted autoencoder (ELM-WAE) main feature extraction and dimensional reduction is implemented. Finally, ELM based classifier is trained over a new feature space to determine floor level. For the efficiency evaluation of our proposed model, we utilized three different datasets captured in the real scenarios. The evaluation result shows that the proposed model can achieve state-of-art performance and improve the accuracy of floor detection compared with multiple recent techniques. In this way, the floor level can be identified with 97.30%, 95.32%, and 96.39% on UJIIndoorLoc, Tampere, and UTSIndoorLoc datasets, respectively.
Here We are trying to Design performance Evaluation of a campus network based on routing protocols ( RIP, EIGRP, OSPF)
The campus is networking the essential part of every university. For this reason, authoriuty carry a lot of cost for this network. She tried to reduce the cost and created more safety and security.
Indoor Positioning System using Magnetic Positioning and BLE beaconsIRJET Journal
This document presents an indoor positioning system that uses magnetic positioning and Bluetooth Low Energy (BLE) beacons. It discusses how magnetic positioning works by detecting disturbances in the Earth's magnetic field caused by structural elements in buildings. An Android application is proposed that would collect magnetic fingerprints using the phone's magnetometer and send them to IndoorAtlas' API to determine the user's location. BLE beacons would also be used to improve positioning accuracy. The system does not require dedicated infrastructure. Magnetic positioning coupled with BLE allows for accurate indoor localization without extra hardware costs. It is presented as a potential standard for indoor positioning systems.
An analysis of a large scale wireless image distribution system deploymentConference Papers
This document describes two setups of a wireless image distribution system:
1. A setup using commercial network equipment like access points and an access controller, which supported over 125 connected devices and provided sufficient bandwidth for the system load in an auditorium with 159 seats.
2. A setup using a wireless mesh network of three NerveNet nodes, which provided a quick and easy setup without wired connections but needs further performance improvements. Results from tests of both setups were analyzed to evaluate the network technologies for smart community applications.
An analysis of a large scale wireless image distribution system deploymentConference Papers
This document describes two setups of a wireless image distribution system:
1. A setup using commercial network equipment like access points and an access controller, which supported over 125 connected devices and provided sufficient bandwidth for the system load during a conference.
2. A setup using a wireless mesh network of NICT NerveNet nodes, which provided a quick and easy setup but had room for improved performance based on analysis of the wireless backhaul links and connected devices. Both setups were tested and analyzed to evaluate network technologies for smart community applications.
With the rapid development of
smartphone industry, various positioning-enabled
sensors such as GPS receivers, accelerometers,
gyroscopes, digital compasses, cameras, Wi-Fi and
Bluetooth have been built in smartphones for
communication, entertainment and location-based
services. Smartphone users can get their locations
fixed according to the function of GPS receiver.
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...Munisekhar Gunapati
A three-layer framework is proposed for mobile data collection in wireless sensor networks, which includes the sensor layer, cluster head layer, and mobile collector (called SenCar) layer. The framework employs distributed load balanced clustering and dual data uploading, which is referred to as LBC-MIMO. The objective is to achieve good scalability, long network lifetime and low data collection latency. At the sensor layer, a distributed load balanced clustering (LBC) algorithm is proposed for sensors to self-organize themselves into clusters. In contrast to existing clustering methods, our scheme generates multiple cluster heads in each cluster to balance the work load and facilitate dual data uploading. At the cluster head layer, the inter-cluster transmission range is carefully chosen to guarantee the connectivity among the clusters. Multiple cluster heads within a cluster cooperate with each other to perform energy-saving inter-cluster communications. Through inter-cluster transmissions, cluster head information is forwarded to SenCar for its moving trajectory planning. At the mobile collector layer, SenCar is equipped with two antennas, which enables two cluster heads to simultaneously upload data to SenCar in each time by utilizing multi-user multiple-input and multiple-output (MU-MIMO) technique. The trajectory planning for SenCar is optimized to fully utilize dual data uploading capability by properly selecting polling points in each cluster. By visiting each selected polling point, SenCar can efficiently gather data from cluster heads and transport the data to the static data sink. Extensive simulations are conducted to evaluate the effectiveness of the proposed LBC-MIMO scheme. The results show that when each cluster has at most two cluster heads, LBC-MIMO achieves over 50 percent energy saving per node and 60 percent energy saving on cluster heads comparing with data collection through multi-hop relay to the static data sink, and 20 percent shorter data collection time compared to traditional mobile data gathering.
On the basis of this study ideas were explored, some of the different devices, techniques and aspects that influenced the formation of different rescue and protection systems. The research in various dimensions on the topic helped in enhancement of the knowledge in this field of technology. Analysis of each and every side of this project was done. The motive also constituted of expanding the applications of the project. In the past times, the rescue and protection systems which were constructed were bulky and slow. Here in this project, the aim is to reduce the size and increase its time efficiency using the ZigBee technology. There have been instances in the news over the past few years in which we have seen lack of responsibility for the people working in life threatening situations which even led to disasters some of the times. After examining different areas of the same we have come on the terms of agreement with the fact that this problem requires a lot of concern. Taking up the responsibility to eradicate such issues we finally decided to come up with the solution removing all the problems.
This document describes a proposed LoRa-based data acquisition system for monitoring vehicles. Key points:
- The system would use LoRa technology and sensors to monitor various parameters in a vehicle and report the data to users via an IoT dashboard.
- LoRa allows long-range and low-power wireless connectivity for IoT applications. The system aims to leverage these capabilities of LoRa for vehicle monitoring.
- The goals of the data acquisition system are to monitor operations, provide effective communication to identify issues, collect and store diagnostic data, and analyze performance metrics in real-time to ensure reliable operation.
Iot Based Society Automation Using GTBS ProtocolIRJET Journal
This document proposes an IoT-based society automation system using a Green Task-Based Scheduling (GTBS) protocol. The system uses wireless sensor networks to monitor and control gate security and home appliances. Sensors collect data on factors like fire, gas leaks, and intrusions. The GTBS protocol efficiently schedules sensor tasks to reduce redundant data transmission and conserve energy. The system aims to automate residential societies for improved security and convenience with minimal human intervention.
With the rapid development of smartphone industry,
various positioning-enabled sensors such as GPS receivers,
accelerometers, gyroscopes, digital compasses, cameras, WiFi and Bluetooth have been built in smartphones for
communication, entertainment and location-based services.
Smartphone users can get their locations fixed according to
the function of GPS receiver.
The rapid growth that has taken place in Computer Vision has been instrumental in driving the advancement of Image processing techniques and drawing inferences from them. Combined with the enormous capabilities that Deep Neural networks bring to the table, computers can be efficiently trained to automate the tasks and yield accurate and robust results quickly thus optimizing the process. Technological growth has enabled us to bring such computationally intensive tasks to lighter and lower-end mobile devices thus opening up a wide range of possibilities. WebRTC-the open-source web standard enables us to send multimedia-based data from peer to peer paving the way for Real-time Communication over the Web. With this project, we aim to build on one such opportunity that can enable us to perform custom object detection through an android based application installed on our mobile phones. Therefore, our problem statement is to be able to capture real-time feeds, perform custom object detection, generate inference results, and appropriately send intruder alerts when needed. To implement this, we propose a mobile-based over-the-cloud solution that can capitalize on the enormous and encouraging features of the YOLO algorithm and incorporate the functionalities of OpenCV’s DNN module for providing us with fast and correct inferences. Coupled with a good and intuitive UI, we can ensure ease of use of our application.
The document proposes a real-time mobile surveillance system using WebRTC. It utilizes computer vision techniques like YOLO for object detection on live video feeds captured by an Android application. The feeds are sent to a NodeJS server and then to a Flask server using REST APIs where OpenCV's DNN module performs inference. Detected objects and alerts are then sent back to the Android device. The system aims to provide low-latency, remote surveillance capabilities using mobile devices and over-the-cloud solutions.
This document is a resume for Jaehoon Jeong. It summarizes his professional experience, education, skills, and publications. Some key details include:
- He is currently a Software Engineer at Brocade Communications Systems, working on IPv6 and IPsec implementations.
- He received a Ph.D. in Computer Science from the University of Minnesota in 2009, with a focus on wireless sensor networking.
- He has published over 15 papers in international conferences on topics related to wireless sensor networks, vehicular networks, and IPv6 networking.
- His experience includes research positions at the University of Minnesota and ETRI in Korea, as well as internships at SGI and McData.
This document provides a summary of Kunal Prakash Vedpathak's contact information, objective, skills, qualifications, and work experience. It indicates that he has nearly 3 years of experience in telecom networking working with companies like IDC Technologies and Prime One Workforce on various projects involving routers, switches, fiber planning and troubleshooting networks. He holds a post graduate diploma in telecom management as well as bachelor's and diploma degrees in electronics and telecommunication.
This document provides details about a project to implement a smart campus network module at a college using Internet of Things (IoT) technology. The objectives are to present a local area network design suitable for colleges with limited budgets that ensures security, backup and other features of networks in developed countries. The project involves collecting data from various IoT devices on campus, analyzing the big data with techniques like data cleaning and visualization, and communicating between devices using protocols. It proposes a smart campus architecture with modules like campus operations, services and surrounding areas. Screenshots show simulations of the network in Packet Tracer. Advantages include enhanced security, time savings, access to real-time information and efficient electricity use.
Opnet based simulation and investigation of wimax network using different qo seSAT Publishing House
This document summarizes a study that used the OPNET simulation tool to evaluate the performance of WiMAX networks with different numbers of nodes under various quality of service (QoS) metrics. Three WiMAX network models were created with 15, 25, and 40 nodes. Key performance indicators like initial ranging activity, delay, transmission power, and path loss were analyzed. In general, initial ranging activity and path loss were highest for the medium sized network while delay and transmission power increased with network size. The analysis provided insights into how QoS is impacted by the scale of the WiMAX network.
Saurabh Shanbhag is a software engineer with experience building scalable backend services at Uber and Barclays using languages like Golang, Python, and Java. At Uber, he developed applications that reduced operating costs for JUMP bikes and scooters by automating repair workflows and enabling real-time dashboards. He also has a master's degree in computer science from North Carolina State University and has worked on projects involving reinforcement learning, distributed computing, and deep learning.
Saurabh Shanbhag is a software engineer with a Master's degree in Computer Science from North Carolina State University. He has experience developing highly scalable software using technologies like Java, Python, Apache Hadoop, and Spring. His projects include building distributed systems for processing Twitter data and detecting food items in images using deep learning algorithms. He is skilled in algorithms, machine learning, and distributed computing and has work experience developing low-latency trading tools and location-based apps.
Saurabh Shanbhag is an innovative software engineer with a Master's degree in Computer Science from North Carolina State University. He has experience developing large-scale systems using Java and Python. His past projects include building tools that reduced trade reporting latency by 13% and creating an AI chatbot for scheduling meetings. He is proficient in algorithms, machine learning, and data science techniques.
Saurabh Shanbhag is a software engineer with a Master's degree in Computer Science from North Carolina State University and a Bachelor's degree in Information Technology from MIT College of Engineering, Pune University, India. He has experience developing software using languages like Java, Python, and Node.js. Some of his projects include developing an algorithmic trading tool that reduced trade reporting latency, building a Wi-Fi positioning system, and creating a chatbot for scheduling meetings. He is currently seeking new opportunities as a software engineer.
Saurabh Shanbhag is a software engineer with experience in Java, Python, and algorithms. He has a Master's in Computer Science from North Carolina State University and a Bachelor's in IT from MIT College of Engineering in India. His projects include a meeting scheduler bot using Node.js, a gender predictor using Naive Bayes classification and K-NN clustering, and a hospital management system in Java and MongoDB. He is looking for opportunities as an innovative programmer and collaborative team leader.
Saurabh Shanbhag is a software developer with expertise in Java and Python. He created a positioning system that offers 4x better accuracy than GPS. He has a Master's in Computer Science from North Carolina State University and a Bachelor's in IT from MIT College of Engineering in India. His projects include a gender predictor using machine learning and a hospital management system. He is looking for opportunities as a software developer.
Saurabh Shanbhag is a software developer with expertise in Java and Python. He created a positioning system that offers 4x better accuracy than GPS. He has a Master's in Computer Science from North Carolina State University and a Bachelor's in IT from MIT College of Engineering in India. His projects include a gender predictor using machine learning and a hospital management system. He is looking for opportunities as a software developer.
Saurabh Shanbhag is a software developer with expertise in Java and Python. He created a positioning system that offers 4x better accuracy than GPS. He has a Master's in Computer Science from North Carolina State University and a Bachelor's in IT from MIT College of Engineering in India. His experience includes building an Android app for Wi-Fi positioning and attendance tracking as an intern at Persistent Systems and creating a chess tournament application as an intern at E-Zest Solutions. His projects include a gender predictor using machine learning and a hospital database management system.
Saurabh Shanbhag is a software developer with expertise in Java and Python. He has a Master's degree in Computer Science from North Carolina State University and a Bachelor's degree in Information Technology from MIT College of Engineering in India. His past experience includes building a Wi-Fi positioning system that offered 4x better accuracy than GPS and creating an interactive chess tournament application. He has strong skills in algorithms, machine learning, and data structures.
Saurabh Shanbhag is a software developer with experience building positioning systems and bots. He has a Master's in Computer Science from North Carolina State University and a Bachelor's in IT from MIT College of Engineering in India. Notable experiences include developing an Android app that achieved 4x better accuracy than GPS for indoor positioning at Persistent Systems and creating an interactive chess tournament bot and database at E-Zest Solutions. His skills include Java, Python, C++, and machine learning algorithms.
Saurabh Shanbhag is a software developer with experience building positioning systems and data processing applications. He has a Master's in Computer Science from North Carolina State University and a Bachelor's in Information Technology from MIT College of Engineering. His projects include developing an Android application that determined location within 1m for attendance tracking and creating a chess tournament application that extracted and processed data from online sources.
This document describes a Wi-Fi positioning system called WiPAt that is proposed to automate the attendance marking process. It aims to reduce human effort and fraud by using Wi-Fi signals to detect when students are present on campus. The system would work by fingerprinting Wi-Fi signal strengths to determine locations. It uses a weighted k-nearest neighbors algorithm to estimate positions based on past signal strength data. Screenshots show the Android app interface and system architecture is illustrated with data flow diagrams and UML diagrams. Potential applications and benefits are discussed along with challenges and future work.
This document discusses visual analytics and big data visualization. It defines big data and explains the need for big data analytics to uncover patterns. Data visualization helps make sense of large datasets and facilitates predictive analysis. Different visualization techniques are described, including charts, graphs, and diagrams suited to simple and big data. Visualization acts as an interface between data storage and users. Characteristics of good visualization and tools for big data visualization are also outlined.
This document proposes a Wi-Fi Positioning System called WiPAt to automate the attendance marking process. WiPAt will use trilateration of Wi-Fi signals from three routers to determine a device's location and mark attendance accordingly. This reduces human effort compared to traditional roll-call systems. The system architecture involves Android devices, Wi-Fi routers connected to a MySQL database managed by a web server. Potential applications include educational institutions and businesses, offering benefits like reduced time/errors and increased productivity over manual systems.
This certificate from Persistent Systems Ltd. certifies that four students - Rishi Sridhar, Omkar Khalipe, Saurabh Shanbhag, and Komal Ganjale from MITCOE completed their final year B.E. project titled "WiPAt: Wi-Fi Positioning System for Attendance" at Persistent Systems Ltd. for the 2016-17 academic year under the guidance of Mr. Indra Singh, the Senior Team Lead of BFSI at the company.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
1. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 1
PROJECT REPORT
ON
WiPAt:WIFI POSITIONING SYSTEM FOR
ATTENDANCE
Submitted By
RISHI SHRIDHAR (B120388669)
OMKAR KHALIPE (B120388641)
SAURABH SHANBHAG (B120388684)
KOMAL GANJALE (B120388560)
in partial fulfillment for the award of the degree
of
Bachelor of Engineering
of
Savitribai Phule Pune University
IN
INFORMATION TECHNOLOGY
MITCOE COLLEGE OF ENGINEERING
2016-2017
2. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 2
PROJECT REPORT
ON
WiPAt:WIFI POSITIONING SYSTEM FOR
ATTENDANCE
Submitted By
RISHI SHRIDHAR (B120388669)
OMKAR KHALIPE (B120388641)
SAURABH SHANBHAG (B120388684)
KOMAL GANJALE (B120388560)
Guided By
Prof. Dr.A.S.Hiwale
DEPARTMENT OF INFORMATION TECHNOLOGY
MITCOE COLLEGE OF ENGINEERING
PUNE
SAVITRIBAI PHULE PUNE UNIVERSITY
2016-2017
3. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 3
DEPARTMENT OF INFORMATION TECHNOLOGY
Certificate
This is to certify that,
RISHI SHRIDHAR (B120388669)
OMKAR KHALIPE (B120388641)
SAURABH SHANBHAG (B120388684)
KOMAL GANJALE (B120388560)
have successfully completed this project report entitled “Wipat:Wifi Positioning
System for Attendance”, under my guidance in partial fulfilment of the requirements
for the degree of Bachelor of Engineering in Department of Information Technology
of SavitibaiPhule Pune University, Pune during the academic year 2016-17.
Date –
Place-
Prof. Dr.A.S.Hiwale Prof. Dr. A.S. Hiwale
Guide Head Of Department
4. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 4
Acknowledgement
We take this opportunity to thank our project guide Prof.(Dr.) A. S. Hiwale and
Head of the Department Prof.(Dr.) A. S. Hiwale for their valuable guidance and for
providing all the necessary facilities, which were indispensable in the completion of
this project report. We are also thankful to all the staff members of the Department of
Information Technology of MIT College of Engineering, Savitibai Phule Pune
University for their valuable time, support, comments, suggestions and persuasion.
We would also like to thank the institute for providing the required facilities, Internet
access and important books. And finally, we would like to thank Mr. Indra Singh,
our project guide from the company Persistent Systems Ltd. for his help as a mentor
as a part of the project sponsorship our group has received.
Rishi Shridhar
Omkar Khalipe
Saurabh Shanbhag
Komal Ganjale
5. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 5
ABSTRACT
An accurate and transparent attendance marking system is of utmost importance in
educational institutions as well as businesses. In today’s fast-moving world, the main
drawback in traditional attendance systems is its tediousness, and manual effort that
the teacher has to put in. The primary motivation for this project is the need for
automation that would reduce the time and efforts required for this monotonous job.
An automated environment is attractive, reliable, advantageous, and desired by every
person nowadays. This project will enable us to automate the process of marking
attendance of students in a college, using Wi-Fi Positioning System, which works by
using routers and mobile devices, both of which are pretty commonly used today,
hence making the project cost-effective.
6. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 6
TABLE OF CONTENTS
CHP.NO. CHAPTER NAME PAGE NO.
1. Introduction 1.
a. Need 2
b. Basic Concepts 2
c. Application 2
2. Literature Survey 3
a. Related Work Done 4
b. Existing System 7
3. Project Statement 8
a. Problem Statement 9
b. Goals and Objectives 9
c. Technologies Used 9
4. System Requirement and Specification 13
a. Software Requirements 14
b. Hardware Requirements 14
5. System Design 15
a. Concept 16
b. Flowchart 19
c. Data Flow Diagrams 20
d. UML Diagrams 22
6. Working Code And Application 27
a. Locate.java 28
b. ScanBackground,java 38
7. Planning And Sheduling 46
8. References 49
7. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 7
LIST OF FIGURES
Fig. No. Description Page No.
1 Position estimator algorithm 9
2 Trilateration 11
3 System Architecture 12
4 Signals Emanating from Routers 16
5 8 Points and Calibrate Reading 16
6 Euclidean Distance from unknown point 17
7 Euclidean Distance from x and y 17
8 Nearest K Points are Chosen 18
9 Weighted Avg of Nearest 2 points 18
10 Flowchart 19
11 DFD – 0 20
12 DFD – 1 21
13 Use Case Diagram 22
14 Activity Diagram 23
15 Sequence Diagram 24
16 Collaboration Diagram 25
17 Class Diagram 26
18 Gantt Chart of Project 48
LIST OF TABLES
Table No. Description Page No.
1 Project Plan Table 48
8. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 8
Chapter 1
INTRODUCTION
9. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 9
1. INTRODUCTION
1.1 NEED
• Automation of attendance marking system
• Accuracy and transparency in attendance marking system
• Making efficient use of resources that are commonly available in today’s
world like Wi-Fi routers and mobile devices.
1.2 BASIC CONCEPTS
In recent years, many approaches have been used for running attendance systems such
as biometric sensors, face recognitions, etc. This endeavor aims to increase efficiency
and use minimal human intervention. The system will find and compare the signal
strengths from different routers at a given position to determine the relative position
of the device. The concept used for getting accurate signal strength is RSSI (Received
Signal Strength Indicator) and for comparing and determining the position, weighted
K-NN algorithm is implemented. Following this, it can automatically mark the
attendance by checking if the device is inside the classroom during the specified
period.
1.3 APPLICATION
• Attendance system in educational institutions
• Attendance system in offices
10. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 10
Chapter 2
LITERATURE SURVEY
11. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 11
a. RELATED WORK DONE
1. Peerapong Torteeka, Xiu Chundi:
“Hybrid technique for indoor positioning system based on Wi-Fi received signal
strength indication”- 2014, DOI-10.1109/IPIN.2014.7275467:
This IEEE paper is about an indoor positioning system based on Receive Signal
Strength Indication (RSSI) from wireless access equipment. While outdoor
environment using Global Navigation Satellite System (GNSS) and cellular network
work well and are widespread used for navigation. However, there is a problem with
signal propagation from satellites or cell site. They cannot be used effectively inside
complex building areas or even in an urban environment. In this paper, the hybrid
algorithm is proposed which is the combination of trilateration and location
fingerprint (dataset mining) systems, which is able to improve the accuracy, stability
and robustness. The performance of this algorithm is evaluated by the experimental
results, which shows that the proposed scheme can achieve a certain level of
positioning system accuracy.
Pros: The drawbacks of Satellite based positioning systems are effectively
removed using this approach. Also, the hybrid approach reduces fluctuations
caused by either of the two approaches.
2. An Analysis of Wi-Fi Based Indoor Positioning Accuracy
Gints Jekabsons, Vadim Kairish, Vadim Zuravlyov,( Riga Technical University)
The aim of this study is to examine several aspects of location fingerprinting based
indoor positioning that affect positioning accuracy. Overall, the positioning accuracy
achieved in the performed experiments is 2.0 to 2.5 meters. The increasing demand
for location based services inside buildings has made indoor positioning a significant
research topic. Although the Global Positioning System is the most popular outdoor
positioning system, its signals are easily blocked by most construction materials
making it useless for indoor positioning. This study deals with indoor positioning
using the Wireless Ethernet IEEE 802.11 (Wi-Fi) standard that has distinct advantage
of low cost over other indoor wireless technologies – it has relatively cheap
equipment and in many areas usually a Wi-Fi network already exists as a part of the
communication infrastructure avoiding expensive and time consuming infrastructure
deployment. Although Wi-Fi has not been designed for positioning, its radio signals
can be used for location estimation by exploiting the Received Signal Strength (RSS)
12. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 12
values measured in any off-the-shelf mobile device equipped with Wi-Fi facilities –
and no additional special-purpose hardware is required. Such a positioning system can
be relatively easily implemented for notebook computers, personal digital assistants
(PDAs), smartphones, and other Wi-Fi enabled mobile devices.
Pros: The use of Wireless networks makes it very user friendly as it is cheap and
present everywhere nowadays.
Cons: The small scale usage opens new problems such as power fluctuations,
propagation obstacles, etc.
3. Optimization Wifi Indoor Positioning KNN Algorithm Location-based
Fingerprint Xingbin Ge, Zhiyi Qu, School of Tnformation Science & Engineering,
Lanzhou University
Software Engineering and Service Science (ICSESS), 2016 7th IEEE International
Conference on 26-28 Aug. 2016
DOI: 10.1109/ICSESS.2016.7883033
Location-based services have been deep into all aspects of life and it provides a
convenient and efficient service experience for people. Currently, technology is
relatively mature and widely used in the outdoor positioning. By contrast, for indoor
positioning, although there are a lot of hot technologies, but they are mostly
insufficient lead to it is hard to popularize. So how to improve the popularity of
indoor positioning in the case of improves the positioning accuracy has become a hot
research topic. This paper analyzes and studies several typical fingerprint localization
algorithms, including NN, KNN and WKNN, and then proposes an algorithmic
improvement program.
Pros: The KNN approach helps the system to achieve accuracy by analyzing
multiple values and then determining the best possible position. Hence, degree of
accuracy is raised.
Cons: By this method, we can compare and decide, but the exact position cannot
be mapped and hence, needs more optimization.
13. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 13
4. Soumaya Zirari, Philippe Canalda , François Spies , “WiFi GPS based combined
positioning algorithm”, 2010, DOI: 10.1109/WCINS.2010.5544653:
This IEEE paper proposes a GPS-WiFi combined positioning algorithm, based on
trilateration technique. Real experiments and other simulation are conduced and
demonstrate accuracy gains, even where various criteria dilution of precision (GPS
dop's criteria, or WiFi geometrical and signal attenuation's dop proposal, or hybrid
dop ones) indicate all the disruption of positioning service. A testbed scenario issued
from a real urban campus environment validates not only the GPS-WiFi combined
positioning algorithm but also an implementation of pertinent positioning techniques
and dop's criteria. This work constitutes a further step to better position everywhere
and to ensure continuity of a positioning service.
Pros: The technique of trilateration is a very conceptually ideal method for
finding precise location of a device. This is precisely the technique used by GPS
using Satellites for triangulation.
Cons: Through intensive experiments, we found that this technique is not
practically feasible. The fluctuations in RSSI and dependencies on device
antenna strength, router capacity, power supply, obstacles, exponential distance
function, etc. make it impossible to give a single accurate position.
5. Beom-Ju Shin, Kwang-Won Lee, Sun-Ho Choi, Joo-Yeon Kim, Woo Jin Lee,
Hyung Seok Kim: “Indoor WiFi positioning system for Android-based
smartphone”, 2010, DOI: 10.1109/ICTC.2010.5674691:
WiFi positioning system has been studied in many fields since the past. Recently, a lot
of mobile companies are competing for smartphones. Accordingly, this IEEE paper
proposes an indoor WiFi positioning system using Android-based smartphones. This
emphasizes on how a device (Android in this case) interacts with routers, even when it
isn’t connected to the router or the internet. The MAC id of the device is used for
unique identification and positioning.
Pros: Scalability increases and effective use of concept is possible.
14. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 14
b. EXISTING SYSTEMS:
Over recent years, the potential of Location-based Services has been hotly debated, with
several methods being put forward to provide location information. GPS has emerged as the
leading method of providing position information but it has limited use indoors. There has
been a lot of research into methods which are capable of providing indoor location
information, however most of these require specialized equipment or have lengthy set-up
procedures. We are therefore developing a system which has neither of these drawbacks. We
are utilizing the standard Received Signal Strength (RSS) measurements available on Wi-Fi
equipment because Wi-Fi networks are becoming increasingly available, meaning that extra
specialized equipment is not required. The currently present models for indoor positioning
systems use the technique of trilateration with 3 routers. But the drawbacks of this approach
include signal fluctuations and obstacles in signal propagation. We have devised a method to
take care of all these problems.
15. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 15
Chapter 3
PROJECT STATEMENT
16. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 16
a. PROBLEM STATEMENT:
To create a system that can automate the process of marking attendance by using the
concept of Wi-Fi Positioning System.
Goals And Objectives:
➢ Automate the procedure of marking attendance.
➢ Increase the accuracy and efficiency of marking attendance
➢ Reducing the chances of fraudulent activity i.e. increase reliability.
b. TECHNOLOGIES USED:
To build this project, the following technologies have been used:
1. Location Fingerprinting
• Received Signal Strength (RSS) values from multiple routers act as a fingerprint for
a location. Different locations are most likely to have unique fingerprints
• Fingerprint of ith location is denoted by ri
ri = {ri1, ri2, ri3,......,rim }
rij = RSS value of jth router from ith location
• Several locations are chosen and RSS values from them are recorded and form a
radio map.
• The recording at the ith location is of the form : (qi,ri)
qi - the geometric coordinates (xi,yi)
ri - the location fingerprint
• A position estimator algorithm is used to find the coordinates of unknown location.
Fig:1 Basic concept (calibrate + locate)
17. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 17
2. Weighted k Nearest Neighbour Algorithm :
• The position estimator algorithm used is the Weighted k Nearest Neighbour (WkNN).
• Finds the k nearest chosen locations from unknown location based on Euclidean Distance.
• Calculates coordinates of unknown location as the weighted average of the nearest k
points. Weight is the inverse of the Euclidean distance.
• k can be considered as a tuning parameter in the algorithm.
• When k=1, algorithm acts as a simple look up table
3. Received signal strength indicator (RSSI):
Received signal strength indicator (RSSI) is a measurement of the power present in a
received radio signal. [5]. RSSI is usually invisible to a user of a receiving device.
However, because signal strength can vary greatly and affect functionality in wireless
networking, IEEE 802.11 devices often make the measurement available to users. The
RSSI is used to calculate the distance of the mobile device from the router.
Unit of Signal Strength - DBm:
dBm (sometimes dBmW or decibel-milliwatts) is an abbreviation for the power ratio
in decibels (dB) of the measured power referenced to one milliwatt (mW). It is used in
radio, microwave and fiber optic networks as a convenient measure of absolute power
because of its capability to express both very large and very small values in a short
form. dBm is used to measure the beacon strength of the router signal.
18. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 18
4. Trilateration (Alternative Method):
Trilateration is the process of determining absolute or relative locations of points by
measurement of distances, using the geometry of circles, spheres or triangles. [4] This
method has been used to locate the position of the mobile device. We initially tried to
make a working model of trilateration using 3 routers. But owing to the huge number
of uncertainties and fluctuations, we decided to change the approach and look for a
more accurate approach in KNN technique.
Fig 2. Trilateration
19. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 19
SYSTEM ARCHITECTURE
Fig.3. System Architecture
20. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 20
Chapter 4
SYSTEM REQUIREMENTS AND SPECIFICATIONS
21. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 21
4. SYSTEM REQUIREMENTS AND SPECIFICATIONS
4.1 SOFTWARE REQUIREMENTS:
A: Developer
Operating System : Windows 7/ 8/ 10
Programming Language : JAVA (Android)
Java Version : JDK 1.6 & above.
IDE : Android Studio
Database : MySQL 5.5.
Web Server : Apache
B: User
Operating System : Android
4.2 HARDWARE REQUIREMENTS:
A: Developer
Wireless Routers : Quantity: 3 or more, Signal Strength: 150m
B: User
Mobile phone : Android Smartphone
22. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 22
Chapter 5
SYSTEM DESIGN
23. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 23
5. System Design:
a. CONCEPT:
Fig:4
Fig:5
24. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 24
Fig:6
Fig:7
25. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 25
Fig:8
Fig:9
26. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 26
b.FLOWCHART
True
Is student’s
device inside
classroom?
Start Session
Locate Student Device
Do not mark
attendance
Mark Attendance
Update Attendance into DB
Stop
Start
Calibrate: Inside Classroom
Calibrate: Outside Classroom
False
27. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 27
c. DATA FLOW DIAGRAMS:
• DFD 0:
Fig 11: DFD - 0
28. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 28
• DFD 1:
Fig 12: DFD - 1
29. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 29
d.UML DIAGRAMS
• Use Case diagram
Fig 13. Use case diagram
30. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 30
• Activity diagram
Fig 14: Activity diagram
31. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 31
• Sequence (Interaction) diagram
Fig 15: Sequence diagram
32. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 32
• Collaboration diagram
Fig 16: Collaboration Diagram
33. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 33
Class diagram
Fig 17: Class diagram
34. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 34
Chapter 6
WORKING CODE AND APPLICATION
35. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 35
a. Locate.java –
package com.example.wipat;
import java.net.NetworkInterface;
import java.util.ArrayList;
import java.util.Collections;
import java.util.HashMap;
import java.util.List;
import java.util.Map;
import android.app.Activity;
import android.content.Intent;
import android.os.Bundle;
import android.util.Log;
import android.view.View;
import android.widget.ArrayAdapter;
import android.widget.Button;
import android.widget.TextView;
import android.widget.Toast;
import com.android.volley.Request;
import com.android.volley.Response;
import com.android.volley.VolleyError;
import com.android.volley.toolbox.StringRequest;
/*
import org.apache.http.HttpResponse;
import org.apache.http.NameValuePair;
import org.apache.http.client.ClientProtocolException;
import org.apache.http.client.HttpClient;
import org.apache.http.client.entity.UrlEncodedFormEntity;
import org.apache.http.client.methods.HttpPost;
import org.apache.http.impl.client.DefaultHttpClient;
import org.apache.http.message.BasicNameValuePair;
import org.apache.http.util.EntityUtils;*/
import org.json.JSONArray;
import org.json.JSONException;
public class Locate extends Activity {
String res;
int posflag=0;
ArrayList<String> buildings;
DatabaseHelper db;
ArrayAdapter<String> arrayAdapter;
ArrayList<PositionData> positionsData;
String b;
TextView result1;
Button locate;
TextView result2;
JSONArray jsonObject;
int flag;
String classid,lno,sub,topic,rollno;
StringBuilder current_mac;
String mac = "0";
public void btn(View view) {
Intent intent = new Intent(getApplicationContext(), Scan.class);
intent.putExtra("isLearning", false);
startActivityForResult(intent, 0);
}
public void onCreate(Bundle saveInstanceState) {
super.onCreate(saveInstanceState);
36. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 36
setContentView(R.layout.locate);
db = new DatabaseHelper();
try{
List<NetworkInterface> all =
Collections.list(NetworkInterface.getNetworkInterfaces());
for (NetworkInterface networkInterface : all) {
if (!networkInterface.getName().equalsIgnoreCase("wlan0"))
continue;
byte[] macBytes = networkInterface.getHardwareAddress();
if (macBytes == null) {
current_mac.append("00:00:00:00:00:00");
}
current_mac = new StringBuilder();
for (byte b : macBytes) {
current_mac.append(String.format("%02X", b));
}
if (current_mac.length() > 0) {
current_mac.deleteCharAt(current_mac.length() - 1);
}
}
/**************finish finding current mac*************/
} catch (Exception e) {
Toast.makeText(getApplicationContext(),"Exception:
"+e,Toast.LENGTH_LONG).show();
}
result1 = (TextView) findViewById(R.id.result);
result2 = (TextView) findViewById(R.id.result2);
arrayAdapter = new ArrayAdapter<String>(this,
android.R.layout.simple_spinner_item, buildings);
arrayAdapter = new ArrayAdapter<String>(this,
android.R.layout.simple_list_item_1, buildings);
// Set The Adapter
/*********start volley***************/
String ur="http://192.168.0.101/wipat/api.php";
StringRequest post = new StringRequest(Request.Method.POST, ur,
new Response.Listener<String>() {
@Override
public void onResponse(String response) {
try {
JSONArray jsonObject = new JSONArray(response);
mac =
jsonObject.getJSONObject(0).getString("mac");
} catch (JSONException e) {
Toast.makeText(getApplicationContext(),
response, Toast.LENGTH_LONG).show();
/* Intent i = new
Intent(Locate.this,StudentRegister.class);
startActivity(i);*/
//e.printStackTrace();
}
37. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 37
if(mac.equals(current_mac.toString()))
flag=1;
else
flag=0;
//Toast.makeText(getApplicationContext(),"Successfully
registered",Toast.LENGTH_LONG).show();
Button btnPos=(Button)findViewById(R.id.btnPos);
if(flag==0)
btnPos.setEnabled(false);
else
btnPos.setEnabled(true);
}
},
new Response.ErrorListener() {
@Override
public void onErrorResponse(VolleyError error) {
// error
Toast.makeText(getApplicationContext(), "req 13.
"+error.toString(), Toast.LENGTH_LONG).show();
Log.d("Error.Response", error.toString());
}
}
) {
@Override
protected Map<String, String> getParams() {
Map<String, String> params = new HashMap<String, String>();
params.put("req","req13");
params.put("current_mac",current_mac.toString());
return params;
}
};
MySingleton.getInstance(getApplicationContext()).addToRequestQueue(post);
/************end volley***************/
/*********start volley***************/
String u="http://192.168.0.101/wipat/api.php";
StringRequest pos = new StringRequest(Request.Method.POST, u,
new Response.Listener<String>() {
@Override
public void onResponse(String response) {
try {
JSONArray jsonObject = new JSONArray(response);
classid =
jsonObject.getJSONObject(0).getString("classid");
rollno=
jsonObject.getJSONObject(0).getString("rollno");
} catch (JSONException e) {
e.printStackTrace();
} Log.d("response",response);
38. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 38
}
},
new Response.ErrorListener() {
@Override
public void onErrorResponse(VolleyError error) {
// error
Toast.makeText(getApplicationContext(),
error.toString(), Toast.LENGTH_LONG).show();
Log.d("Error.Response", error.toString());
}
}
) {
@Override
protected Map<String, String> getParams() {
Map<String, String> params = new HashMap<String, String>();
params.put("req","req14");
params.put("current_mac",current_mac.toString());
return params;
}
};
MySingleton.getInstance(getApplicationContext()).addToRequestQueue(pos);
/************end volley***************/
}
@Override
protected void onActivityResult(final int requestCode, final int
resultCode,
final Intent intent) {
// TODO Auto-generated method stub
if (resultCode == RESULT_OK) {
final PositionData positionData = (PositionData) intent
.getSerializableExtra("PositionData");
DatabaseHelper db = new DatabaseHelper();
db.deleteReading(positionData.getName(),
getApplicationContext());
if (flag == 1) {
/*********start volley***************/
String u = "http://192.168.0.101/wipat/api.php";
StringRequest pos = new StringRequest(Request.Method.POST,
u,
new Response.Listener<String>() {
@Override
public void onResponse(String response) {
try {
JSONArray jsonObject = new
39. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 39
JSONArray(response);
lno =
jsonObject.getJSONObject(0).getString("lno");
sub =
jsonObject.getJSONObject(0).getString("sub");
} catch (JSONException e) {
Toast.makeText(getApplicationContext(),response,Toast.LENGTH_LONG).show();
Intent i = new
Intent(Locate.this,StartingScreen.class);
startActivity(i);
}
}
},
new Response.ErrorListener() {
@Override
public void onErrorResponse(VolleyError error) {
// error
Log.d("Error.Response", error.toString());
}
}
) {
@Override
protected Map<String, String> getParams() {
Map<String, String> params = new HashMap<String,
String>();
params.put("req", "req12");
params.put("classid", classid);
return params;
}
};
MySingleton.getInstance(getApplicationContext()).addToRequestQueue(pos);
/************end volley***************/
String closestPosition = null;
final ArrayList<Router> result = new ArrayList<Router>();
int a = 5;
String url = "http://192.168.0.101/wipat/api.php";
StringRequest postRequest = new
StringRequest(Request.Method.POST, url,
new Response.Listener<String>() {
@Override
public void onResponse(String response) {
try {
int db1[] = new int[10];
int db2[] = new int[10];
HashMap<String, PositionData> positions
= new HashMap<String, PositionData>();
jsonObject = new JSONArray(response);
for (int i = 0; i < jsonObject.length();
i++) {
40. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 40
result.add(new
Router(jsonObject.getJSONObject(i).getString("ssid"),
jsonObject.getJSONObject(i).getString("mac_id")));
}
int x = 0;
String routt[] = new String[40];
int mnn[] = new int[3];
mnn[0] = 100;
mnn[1] = 100;
mnn[2] = 100;
for (int i = 0; i < jsonObject.length();
i++) {
int myval =
Integer.parseInt(jsonObject.getJSONObject(i).getString("rssi"));
String mymac =
jsonObject.getJSONObject(i).getString("mac_id");
int min = 100;
for (final Map.Entry<String,
Integer> e : positionData.getValues().entrySet()) {
final String s1 = e.getKey();//
current mac
final int s2 = e.getValue();
//current rssi
if (mymac.equals(s1)) {
int sub = Math.abs(s2 -
myval);
if (sub <= mnn[i / 2]) {
mnn[i / 2] = sub;
routt[i / 2] =
jsonObject.getJSONObject(i).getString("position_id");
}
}
//
db1[i]=Integer.parseInt(jsonObject.getJSONObject(i).getString("rssi"));
}
x++;
}
int f = 0, s = 0;
//int k=0;
for (int i = 0; i < 3; i++) {
if
(jsonObject.getJSONObject(0).getString("position_id").length() == 0)
Toast.makeText(getApplicationContext(), "One or more friendly wifis is out
of range. Please check.", Toast.LENGTH_LONG).show();
else if
(routt[i].equals(jsonObject.getJSONObject(0).getString("position_id"))) {
f++;
}
Log.d("jsonob2nd",""+jsonObject.getJSONObject(1).getString("position_id"));
if
(jsonObject.getJSONObject(1).getString("position_id").length() == 0)
41. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 41
Toast.makeText(getApplicationContext(), "One or more friendly wifis is out
of range. Please check.", Toast.LENGTH_LONG).show();
else if
(routt[i].equals(jsonObject.getJSONObject(1).getString("position_id"))) {
s++;
}
}
if (f > s) {
res =
jsonObject.getJSONObject(0).getString("position_id");
posflag=1;
}
else {
res =
jsonObject.getJSONObject(1).getString("position_id");
posflag=0;
}
/*************nested volley
request******************************/
if (posflag==1) {
/*********start
volley***************/
String uuu =
"http://192.168.0.101/wipat/api.php";
StringRequest posss = new
StringRequest(Request.Method.POST, uuu,
new
Response.Listener<String>() {
@Override
public void
onResponse(String response) {
//Toast.makeText(getApplicationContext(),response,Toast.LENGTH_LONG).show();
}
},
new Response.ErrorListener()
{
@Override
public void
onErrorResponse(VolleyError error) {
// error
//
Toast.makeText(getApplicationContext(), "req 8 Your mobile device isn't
registered. Please register via student registration. " +error.toString(),
Toast.LENGTH_LONG).show();
Log.d("Error.Response", error.toString());
}
}
) {
@Override
protected Map<String, String>
getParams() {
Map<String, String> params =
new HashMap<String, String>();
params.put("req", "req8");
42. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 42
params.put("lecture_no",
lno);
;
params.put("Class_id",
classid);
params.put("subj_id", sub);
return params;
}
};
MySingleton.getInstance(getApplicationContext()).addToRequestQueue(posss);
/************end
volley***************/
/*********start
volley***************/
String uu =
"http://192.168.0.101/wipat/api.php";
StringRequest poss = new
StringRequest(Request.Method.POST, uu,
new
Response.Listener<String>() {
@Override
public void
onResponse(String response) {
Toast.makeText(getApplicationContext(), response, Toast.LENGTH_LONG).show();
}
},
new Response.ErrorListener()
{
@Override
public void
onErrorResponse(VolleyError error) {
// error
//
Toast.makeText(getApplicationContext(), "req 7 Your mobile device isn't
registered. Please register via student registration. "+error.toString(),
Toast.LENGTH_LONG).show();
Log.d("Error.Response", error.toString());
}
}
) {
@Override
protected Map<String, String>
getParams() {
Map<String, String> params =
new HashMap<String, String>();
params.put("req", "req7");
params.put("student_id",
rollno);
params.put("lecture_no",
lno);
params.put("topic", topic);
43. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 43
params.put("attendance",
"1");
params.put("Class_id",
classid);
params.put("subj_id", sub);
return params;
}
};
MySingleton.getInstance(getApplicationContext()).addToRequestQueue(poss);
/************end
volley***************/
}
else
Toast.makeText(Locate.this,"You are
outside the class or too far away from the centre. Attendance not
marked.",Toast.LENGTH_LONG).show();
/***************end nested volley
request******************/
Log.d("Final result is: ", res);
result1.setText("Your position is : " +
res);
System.out.println("Reading done");
positionsData = new
ArrayList<PositionData>();
for (Map.Entry<String, PositionData> e :
positions.entrySet())
positionsData.add(e.getValue());
} catch (JSONException e) {
Toast.makeText(getApplicationContext(),
"One or more friendly wifis is out of range. Please check.",
Toast.LENGTH_LONG).show();
}
}
},
new Response.ErrorListener() {
@Override
public void onErrorResponse(VolleyError error) {
// error
// Toast.makeText(getApplicationContext(),
"Enter correct IP address of server via admin login!!!",
Toast.LENGTH_LONG).show();
Log.d("Error.Response", error.toString());
}
44. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 44
}
) {
@Override
protected Map<String, String> getParams() {
Map<String, String> params = new HashMap<String,
String>();
params.put("req", "req6"); //make r1 global
// params.put("p", position_id);
return params;
}
};
MySingleton.getInstance(getApplicationContext()).addToRequestQueue(postReque
st);
}
else
Toast.makeText(getApplicationContext(), "Error.",
Toast.LENGTH_LONG).show();
}
super.onActivityResult(requestCode, resultCode, intent);
}
}
45. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 45
b. ScanBackground.java
package com.example.wipat;
import android.content.Context;
import android.net.wifi.ScanResult;
import android.net.wifi.WifiManager;
import android.os.AsyncTask;
import android.widget.Toast;
import java.util.ArrayList;
import java.util.List;
import java.util.Set;
import java.util.Timer;
import java.util.TimerTask;
import android.util.Log;
public class ScanBackground extends AsyncTask<Void, Void, PositionData> {
PositionData pos;
private int readingCount = 30;
private int currentCount;
String currentPositionName;
WifiManager wifi;
Timer timer;
TimerTask myTimerTask;
private Context context;
public ScanBackground(Context context){
this.context=context;
}
protected void onPreExecute(String status) {
Log.i("aaki", "reached pre");
Toast.makeText(context, "Scanning started!",
Toast.LENGTH_LONG).show();
}
@Override
protected void onPostExecute(PositionData posi) {
Toast.makeText(context, "Done scanning !",
Toast.LENGTH_LONG).show();
this.pos=posi;
}
public class ResultData {
private Router router;
public Router getRouter() {
return this.router;
}
public List<Integer> values;
public ResultData(Router router) {
// TODO Auto-generated constructor stub
this.router = router;
values = new ArrayList<Integer>();
}
}
private List<ResultData> resultsData;
46. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 46
private List<PositionData> positionsData;
private PositionData positionData;
@Override
protected PositionData doInBackground(Void... params) {
wifi = (WifiManager) context.getSystemService(Context.WIFI_SERVICE);
currentPositionName =null;
resultsData = new ArrayList<ResultData>();
currentCount = 0;
timer = new Timer();
myTimerTask = new TimerTask() {
@Override
public void run() {
// TODO Auto-generated method stub
refresh();
}
};
timer.schedule(myTimerTask, 0, 1000);
return null;
}
private void refresh() {
// TODO Auto-generated method stub
if (currentCount >= readingCount) {
if (myTimerTask != null) {
myTimerTask.cancel();
returnResults();
}
}
currentCount++;
wifi.startScan();
List<ScanResult> results = wifi.getScanResults();
for (int i = 0; i < results.size(); i++) {
// System.out.println("test2");
String ssid0 = results.get(i).SSID;
String bssid = results.get(i).BSSID;
int rssi0 = results.get(i).level;
boolean found = false;
for (int pos = 0; pos < resultsData.size(); pos++) {
if
(resultsData.get(pos).getRouter().getBSSID().equals(bssid)) {
found = true;
resultsData.get(pos).values.add(rssi0);
break;
}
}
if (!found) {
ResultData data = new ResultData(new Router(ssid0, bssid));
data.values.add(rssi0);
resultsData.add(data);
}
}
}
private void returnResults() {
// TODO Auto-generated method stub
positionData = new PositionData(currentPositionName);
for (int length = 0; length < resultsData.size(); length++) {
int sum = 0;
for (int l = 0; l < resultsData.get(length).values.size(); l++)
47. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 47
{
sum += resultsData.get(length).values.get(l);
}
int average = sum / resultsData.get(length).values.size();
positionData.addValue(resultsData.get(length).getRouter(),
average);
}
Set<String> keys=positionData.values.keySet();
for(String i: keys)
Log.i("a", Integer.toString(positionData.values.get(i)));
}
}
48. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 48
• Application
1 2
3 4
49. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 49
5 6
7 8
50. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 50
9 10
11 12
51. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 51
13 14
15
52. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 52
Attendance Report
53. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 53
• Test Cases
1. ADMIN LOGIN
S.No Test Case Excepted Result Test
Result
1 Login : Enter valid admin
username and password & click
on login button
Software should display
next window
Successful
2 Invalid login credentials Software should show toast
message saying invalid
details.
Successful
2. ADMIN CALIBRATION
SL.No Test Case Excepted Result Test
Result
1 On clicking Choose
Friendly Wi-Fi’s
Button
A window with checkbox options of all
routers in range should appear and user
can select routers from that list
Successful
2.
On the Click of Save
Button
Selected Wi-Fi’s will be saved to the
database and would appear on the
screen.
Successful
3.
On the Click of
Update Button
Change the selected Wi-Fi’s with a new
choice of routers.
Successful
4. On the Click of
Calibrate Button
Displays a textbox where we can name
the position that we are calibrating
which will be used for further reference.
Admin will do this twice: Inside and
outside class.
Successful
5.
On the Click of Start
Button
A timer for 30 seconds starts which
calculates RSSI values over those 30
seconds for that position id.
Successful
54. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 54
3. TEACHER LOGIN
S.No Test Case Excepted Result Test
Result
1 Login : Enter valid teacher
username and password & click on
login button
Software should display
next window
Successful
2 Invalid login credentials Software should show toast
message saying invalid
details.
Successful
4. TEACHER SESSION DETAILS
S.No Test Case Excepted Result Test
Result
1 On clicking
Start Session
button
The lecture number, subject and topic that the
teacher entered will be stored in the database.
Only after this, students can mark their
attendance.
Successful
2.
On clicking
Stop Session
button
This deletes the details of the class from the
temporary database. Students cannot mark
attendance after session is stopped.
Successful
5. STUDENT
SL.No Test Case Excepted Result Test Result
1 On clicking Student
Registration button
The next window should appear
where student needs to enter
details. This is a one-time
procedure and multiple
registrations are not allowed from
one device.
Successful
2.
On clicking Locate
Button
Once Locate function is started, a
30 second timer appears. The
device position is calculated. After
locating, the positions are
compared with calibrated positions
and the nearest position id is
determined.
Successful
55. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 55
6. ATTENDANCE DATABASE
SL.No Test
Case
Excepted Result Test
Result
1 After
Locate
Button
The nearest position id is compared with new
device location. If the resulting location is Inside
the classroom, add the attendance in the database
system. If it is outside, do not update the
attendance.
Successful
56. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 56
Chapter 7
PLANNING AND SCHEDULING
57. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 57
PROJECT PLANNING AND SCHEDULING
a. Project plan
Sr No Task Description Duration
(Days)
1 Problem Analysis Analyzing a real-world
problem
15
2 Problem Statement
Definition
Defining the problem
statement intended to be
solved.
5
3 Research Gaining deeper knowledge
about the problem statement
and looking for feasible
solutions.
20
4 Literature survey Analysis of technical
publications related to the
project.
10
5 Sponsorship meetings Regular meetings with the
sponsors and discussing the
feasibility and requirements of
the project.
5
6 Feasibility Study Finalizing the scope and
possibilities to be implemented.
10
7 Existing system analysis Studying methodologies and
draw-backs of existing
systems like ERP
15
8 Proposed system Proposal of an efficient and
improved system
10
9 Design Creation of algorithms and
various design models like
DFD, UML etc.
30
58. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 58
10 Development Implementation of algorithms 45
11 Testing Testing all aspects of the
project
80
12 Debugging Debugging the errors found 20
13 Documentation Documenting the project 140
Table 1. Project plan table
6.1.1 PERT chart/ Gantt chart
Fig 18: Gantt chart of project
59. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 59
`
Chapter 8
CONCLUSION AND FUTURE SCOPE
60. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 60
a. Future Scope:
Wi-Fi Positioning System is a technology with tremendous scope for the future. The
concepts, approach, tools and algorithms used by us enable efficient positioning with
minimum error. The attendance system can be put to use in various educational
institutions and offices with some more optimization. Basic optimizations include
techniques like face recognition/fingerprint to increase security. There are many other
areas where the Wi-Fi Positioning Systems can be used effectively. Some of them
are:-
1. Device/Person/Vehicle Tracking
2. Improved GPS accuracy with 3D Positioning
3. Crowd Handling
4. Augmented Reality
5. Security and Theft Detection
Since Wi-Fi based systems remove the drawbacks of satellite based systems, this
concept can prove to be a revolutionary one in the world of positioning systems in the
future. Also, in future, a separate sensor/device dedicated to this process of Wi-Fi
based positioning can be made and all students can carry this device.
b. Conclusion:
Thus, we have achieved a high degree of accuracy in Wi-Fi Positioning and used it in
our application, WiPAt. It is a very human friendly attendance system with highly
efficient technology and algorithms. Using this, human efforts can be reduced to
dramatic proportions and the time and resources that were wasted for this monotonous
process can be used for better causes. This system, after a few feasibility tests, can be
officially used in colleges and offices where traditional unautomated systems are still
in practice.
61. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 61
Chapter 8
REFERENCES
62. WiPAt: WiFi Positioning System for Attendance
MIT College of Engineering, Pune Page 62
8. REFERENCES
[1] Peerapong Torteeka, Xiu Chundi: “Hybrid technique for indoor positioning
system based on Wi-Fi received signal strength indication”- 2014, DOI-
10.1109/IPIN.2014.7275467
[2] Beom-Ju Shin, Kwang-Won Lee, Sun-Ho Choi, Joo-Yeon Kim, Woo Jin Lee,
Hyung Seok Kim: “Indoor WiFi positioning system for Android-based smartphone”,
2010, DOI: 10.1109/ICTC.2010.5674691
[3] Rui Zhang, A. Bannoura, F. Hoinger, L.M. Reindl, and C. Schindel-hauer.
“Indoor localization using a smart phone”- In Sensors Applications Symposium
(SAS), 2013 IEEE, pages 38-42, Feb 2013.
[4] An Analysis of Wi-Fi Based Indoor Positioning Accuracy
Gints Jekabsons1, Vadim Kairish2, Vadim Zuravlyov3, 1-3Riga Technical University
[5] Xingbin Ge; Zhiyi Qu : “Optimization WIFI indoor positioning KNN algorithm
location-based fingerprint”- in Software Engineering and Service Science (ICSESS),
2016 7th IEEE International Conference on 26-28 Aug. 2016
DOI: 10.1109/ICSESS.2016.7883033
[6] Jun Ma ; Xuansong Li ; Xianping Tao ; Jian Lu : Cluster filtered KNN: A
WLAN-based indoor positioning scheme.
IEEE International Conference on 23-26 June 2008
DOI: 10.1109/WOWMOM.2008.4594840
[7]http://scholarworks.wmich.edu/cgi/viewcontent.cgi?article=3411&context=honors
_theses